<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2546 to 2560.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/censorship-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cdt-internet-neutrality"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards">
    <title>Centre’s order on computer surveillance is backed by law – but the law lacks adequate safeguards</title>
    <link>https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards</link>
    <description>
        &lt;b&gt;The Information Technology Act’s surveillance scheme furthers a colonial hangover.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nehaa Chaudhari and Tuhina Joshi was published by &lt;a class="external-link" href="https://scroll.in/article/906764/centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards"&gt;Scroll.in&lt;/a&gt; on December 23, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs &lt;a class="link-external" href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" rel="nofollow" target="_blank"&gt;issued&lt;/a&gt; a statutory order authorising 10 “security and intelligence agencies”  to intercept, monitor and decrypt electronic information and  communication. A media frenzy soon ensued, with Opposition political  parties seizing the notification as evidence that the government was  running a &lt;a class="link-external" href="https://indianexpress.com/article/india/centre-order-central-agencies-access-to-computers-opposition-reaction-5503615/" rel="nofollow" target="_blank"&gt;surveillance state&lt;/a&gt;. The ministry responded with a &lt;a class="link-external" href="http://pib.nic.in/PressReleseDetail.aspx?PRID=1556945" rel="nofollow" target="_blank"&gt;press release&lt;/a&gt;,  clarifying that the order was in keeping with Section 69(1) of the  Information Technology Act, 2000, and the Information Technology  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009, proving that the order was sound in law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several  government officials and Bharatiya Janata Party representatives have  since defended this order as being in India’s sovereign and national  security interest. They say it will bring transparency and  accountability into surveillance, and that is is only an extension of  the previous Congress-led government’s policy from 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;No doubt, Central and state governments have had the power to  intercept, monitor and decrypt any information in any computer resource  since 2008, when Section 69 of the Information Technology Act was  amended to expand the government’s powers of interception. This  amendment was &lt;a class="link-external" href="https://privacyinternational.org/state-privacy/1002/state-privacy-india#commssurveillance" rel="nofollow" target="_blank"&gt;one of many changes&lt;/a&gt; introduced to India’s surveillance framework to tackle crime and terrorism &lt;a class="link-external" href="https://www.livemint.com/Industry/UTc7pjvKRUB9HCWBCoUo0K/Tweaking-the-law-to-deal-with-cyber-terrorism.html" rel="nofollow" target="_blank"&gt;in the wake of the 2008 terrorist attacks&lt;/a&gt; in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However,  the ministry’s December 20 directive is the first time such an order  has been introduced under this section; and in this difference between a  legislation being on the statute books versus it being implemented lies  the reason for collective public outrage. That said, research by &lt;a class="link-external" href="https://cis-india.org/@@search?SearchableText=surveillance" rel="nofollow" target="_blank"&gt;the Centre for Internet and Society&lt;/a&gt; and &lt;a class="link-external" href="https://sflc.in/surveillance-there-need-judicial-oversight" rel="nofollow" target="_blank"&gt;SFLC.in&lt;/a&gt; shows that the Indian state has long engaged in surveilling electronic  communications, and other kinds of interception and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While railing against the ministry’s order is very welcome, it is futile  if it does not lead to a conversation around the root of the problem –  Section 69(1) of the Information Technology Act and the accompanying  Information Technology Rules. This section empowers the Central and  state governments to authorise government agencies to intercept, monitor  or decrypt “any information generated, transmitted, received or stored  in any computer resource”. It lays down six grounds on the basis of  which such authorisation may be granted. These are:&lt;/p&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt;
&lt;li&gt;The preservation of India’s sovereignty or integrity.&lt;/li&gt;
&lt;li&gt;The security of the state.&lt;/li&gt;
&lt;li&gt;Public order.&lt;/li&gt;
&lt;li&gt;Maintaining friendly relations with other countries.&lt;/li&gt;
&lt;li&gt;Preventing offences relating to 1. to 4. from being incited or committed.&lt;/li&gt;
&lt;li&gt;Criminal investigations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;All authorisation orders issued by the government under Section 69(1)  must be reasoned and written, and must be subject to the procedure laid  down in the Information Technology Rules. As per these rules, all such  orders must be scrutinised by a review committee of the Centre, or the  state in question, set up under &lt;a class="link-external" href="http://www.dot.gov.in/sites/default/files/358%2520GI-2014%2520dated%25208.2.2014_6.pdf?download=1" rel="nofollow" target="_blank"&gt;Rule 419A&lt;/a&gt; of the Indian Telegraph Rules, 1951. All review committees set up under  Rule 419A comprise only of government secretaries. This means that the  executive sits in judgment over its own decisions. This goes against one  of the most basic principles of justice and fairness – that no person  shall be a judge in their own case.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block" style="text-align: justify; "&gt;Threat to privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State  surveillance threatens individual privacy and must be subject to  adequate safeguards. Privacy is a fundamental right guaranteed by the  Constitution of India, as &lt;a href="https://scroll.in/latest/848304/supreme-court-upholds-right-to-privacy-as-a-fundamental-right"&gt;recognised&lt;/a&gt; by nine judges of the Supreme Court in August 2017. Like all other  fundamental rights, the right to privacy is not absolute, and can be  restricted. According to the Supreme Court, these restrictions must be:  (1) backed by law, (2) for a legitimate state aim, and (3)  proportionate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, any government order under Section  69(1) of the Information Technology Act must fulfil this three-part test  to be constitutional. The absence of judicial or legislative oversight  over the executive’s decision-making under Section 69(1) is likely to  make it a disproportionate restriction on an individual’s fundamental  right to privacy and, therefore, unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the  government-appointed Justice Srikrishna Committee of Experts, which has  been given the task of framing India’s data protection law, was &lt;a class="link-external" href="http://meity.gov.in/content/data-protection-committee-report" rel="nofollow" target="_blank"&gt;concerned&lt;/a&gt; about this lack of legislative or judicial review. This committee has  cited Germany, the United Kingdom, South Africa and the United States as  countries with adequate procedural safeguards over government  surveillance actions. On page 125 of its final report, it has noted,  “Executive review alone is not in tandem with comparative models in  democratic nations which either provide for legislative oversight,  judicial approval or both.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act and the  Information Technology Rules are but one of many means of government  surveillance in India. Similar provisions exist in the Indian Telegraph  Act, 1885, the Telegraph Rules, 1951, and the Indian Post Office Act,  1898. These laws are the extension of a colonial legacy, used by a  foreign power to keep tabs on an alien population. Disappointingly, the  Information Technology Act’s surveillance scheme only furthers this  colonial hangover. Indian privacy thought, especially in the past few  years, has reflected the idea that we must evolve an Indian privacy  framework, grounded in our constitutional values, and tailored to the  Indian context. It is about time that our surveillance laws begin to  reflect our constitutional values as well.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;ol class="cms-block-ol cms-block" style="text-align: justify; "&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards'&gt;https://cis-india.org/internet-governance/news/scroll-nehaa-chaudhari-and-tuhina-joshi-december-23-2018-centres-order-on-computer-surveillance-is-backed-by-law-but-the-law-lacks-adequate-safeguards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-24T17:04:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks">
    <title>Centre to form panel to 'encrypt' MGNREGA-DBT database and prevent leaks </title>
    <link>https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks</link>
    <description>
        &lt;b&gt;Around 5 crore bank accounts of active MGNREGA workers yet to be seeded with Aadhaar.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;div&gt;The article by Sanjeeb Mukherjee was &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks-117071400329_1.html"&gt;published in the Business Standard&lt;/a&gt; on July 14, 2017.&lt;/div&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Alarmed over reports of ‘public disclosure’ of sensitive Aadhaar data  through various portals and payment gateways, the Centre is in the  process of appointing a high-powered panel of almost 20 experts to  suggest ways and means through which data, particularly one which can be  accessed through the MGNREGA-DBT platform can be encrypted.&lt;/p&gt;
&lt;p&gt;Encryption, officials believe, would prevent the Aadhaar data and other related information from falling into wrong hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for proper encryption of Aadhaar data rose after the  government made it mandatory for availing almost all benefits - be it  school scholarships, payments of &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;wages, identification of beneficiaries under mid-day meal scheme and even public distribution system along with others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ensuring cyber security has become all the more necessary as the  Central government, in a notification issued last month, has made it  mandatory for all bank accounts to be seeded with Aadhaar numbers by  December 31, 2017, or else they would cease to be operational until the  time the account holder furnishes his &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Aadhaar+Number" target="_blank"&gt;Aadhaar number.&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This could seriously hamper payment of wages to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;workers because as per available information almost 5 crore active workers don’t have their bank accounts seeded with Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To complete the process before December 2017, the ministry of rural  development has planned special Aadhaar camps to be held in villages  from July 20 to September 2017.&lt;/p&gt;
&lt;p&gt;Recently, a website published all confidential details of customers of a  private telecom company including Aadhaar numbers and other  information.&lt;/p&gt;
&lt;p&gt;The breach was another instance of secure confidential information falling into public domain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials of the panel, which would be headed by former NASSCOM head  Kiran Karnik are expected to submit their report on the same within the  next few months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other members of the panel include Director General of National  Institute of Smart Governance (NISG), officials from Indian Computer  Emergency Response Team (ICERT) and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, cyber security experts believe that encrypting Aadhaar-DBT  details mainly for those schemes and programmes which have a direct  linkage with the public at this later stage has its own challenges as  the entire ecosystem around Aadhaar has grown manifold ever since it was  made mandatory for a variety of programmes.&lt;/p&gt;
&lt;p&gt;Also, in the absence of a national encryption policy, such a move will have its own legal and regulatory challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Ever since the government made Aadhaar mandatory for many things, the  entire ecosystem around it including the Central Identities Data  Repository (the agency which stores Aadhaar data is exposed to leaks,”  noted cyber law expert Pawan Duggal told &lt;i&gt;Business Standard.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said that without a proper national encryption law, it would be  extremely challenging to provide legal and regulatory backing to encrypt  all Aadhaar- DBT data details for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA.&lt;/a&gt; “Also now that the ‘cat is out of the bag,’ encryption of Aadhaar details will be hugely challenging,” Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Already, civil society activists said that after some concern, the  central government has removed all Aadhaar numbers and bank details from  &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;website, which has made tracking payments difficult.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent study by Amber Sinha and Srinivas Kodali from the Centre for  Internet and Society (CIS) found that granular details about individuals  including sensitive personally identifiable information such as Aadhaar  number, caste, religion, address, photographs and financial information  are only a few clicks away through government schemes dashboard and  portals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While initiatives such as the government open data portals may be  laudable for providing easy access to government data condensed for easy  digestion, however in the absence of proper controls exercised by the  government departments the results can be disastrous by divulging  sensitive and adversely actionable information about the individuals who  are responding units of such databases,” the report said.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;It specifically studied two major schemes of the ministry of rural  development; the National National Social Assistance Programme and &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;along with some state schemes.&lt;br /&gt;
&lt;blockquote class="styleQ1 blockquoteBG"&gt;
&lt;div&gt;&lt;span&gt;&lt;b&gt;Pointers&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;a)  Centre to form a panel to encrypt all MGNREGA-DBT database to prevent leaks.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;b) The panel might also suggest ways and means in which such ‘encryption’ could be applied in other platforms.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;c)  The panel is expected to be headed by former NASSCOM head Kiran Karnik.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;d) The encryption is essential as from January 2018 all non-Aadhaar  seeded bank accounts will cease to be operational unless the holders  seed them.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;e)  A recent study found that vivid details about individuals can be easily accessed from government platforms and databases.&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;f)   The &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mgnrega" target="_blank"&gt;MGNREGA &lt;/a&gt;database was one such publicly available platform which formed part of the study.&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks'&gt;https://cis-india.org/internet-governance/news/business-standard-sanjeeb-mukherjee-july-14-2017-centre-to-form-panel-to-encrypt-mgnrega-dbt-database-and-prevent-leaks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-07-14T10:46:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility">
    <title>Centre for Internet and Society joins the Dynamic Coalition for Platform Responsibility</title>
    <link>https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) has joined the multistakeholder cooperative engagement amidst stakeholders towards creating Due Diligence Recommendations for online platforms and Model Contractual Provisions to be enshrined in ToS. This blog provides a brief background of the role of dynamic coalitions within the IGF structure, establishes the need for the coalition and provides an update on the action plan and next steps for interested stakeholders.&lt;/b&gt;
        &lt;p class="callout" style="text-align: justify; "&gt;"Identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations."&lt;br /&gt;Tunis Agenda (Para 72.g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first United Nations Internet Governance Forum (IGF), in 2006 saw the emergence of the concept of Dynamic Coalition and a number of coalitions have been established over the years. The IGF is structured to bring together multistakeholder groups to,&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Discuss public policy issues related to key elements of Internet governance in order to foster the sustainability, robustness, security, stability and development of the Internet."&lt;br /&gt;Tunis Agenda (Para 72.a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While IGF workshops allow various stakeholders to jointly analyse "hot topics" or to examine progress that such issues have undertaken since the previous IGF, dynamic coalitions are informal, issue-specific groups comprising members of various stakeholder groups. With no strictures upon the objects, structure or processes of dynamic coalitions claiming association with the IGF, and no formal institutional affiliation, nor any access to the resources of the IGF Secretariat, IGF Dynamic Coalitions allow collaboration of anyone interested in contributing to their discussions. Currently, there are eleven active dynamic coalitions at the IGF and can be divided into three distinct types—networks, working groups and Birds of Feather (BOFs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Workshops at the IGF are content specific events that, though valuable in informing participants, are limited in their impact by being confined to the launch of a report or by the issues raised within the conference room. The coalitions on the other hand are expected to have a broader function, acting as a coalescing point for interested stakeholders to gather and analyse progress around identified issues and plan next steps. The coalitions can also make recommendations around issues, however, no mechanism has been developed so far, by which the recommendations can be considered by the plenary body. The long-term nature of coalition is perhaps, most suited to engage stakeholders in heterogeneous groups, towards understanding and cooperating around emerging issues and to make recommendations to inform policy making.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Social networks and other interactive online services, give rise to 'cyber-spaces' where individuals gather, express their personalities and exchange information and ideas. The transnational and private nature of such platforms means that they are regulated through contractual provisions enshrined in the platforms' Terms of Service (ToS). The provisions delineated in the ToS not only extend to users in spite of their geographical location, the private decisions undertaken by platform providers in implementing the ToS are not subject to constitutional guarantees framed under national jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While ToS serve as binding agreement online, an absence of binding international rules in this area despite the universal nature of human rights represented is a real challenge, and makes it necessary to engage in a multistakeholder effort to produce model contractual provisions that can be incorporated in ToS. The concept of 'platform responsibility' aims to stimulate behaviour in platform providers to provide intelligible and solid mechanisms, in line with the principles laid out by the UN Guiding Principles on Business and Human Rights and equip platform users with common and easy-to-grasp tools to guarantee the full enjoyment of their human rights online. The utilisation of model contractual provisions in ToS may prove instrumental in fostering trust in online services for content production, use and dissemination, increasing demand of services and ultimately consumer demand may drive the market towards human rights compliant solutions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Dynamic Coalition on Platform Responsibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To nurture a multi-stakeholder endeavour aimed at the elaboration of model contractual-provisions, Mr. Luca Belli, Council of Europe / Université Paris II, Ms Primavera De Filippi, CNRS / Berkman Center for Internet and Society and Mr Nicolo Zingales, Tilburg University / Center for Technology and Society Rio, initiated and facilitated the creation of the Dynamic Coalition on Platform Responsibility (DCPR). DCPR has over fifty individual and organisational members from civil society organisations, academia, private sector organisations and intergovernmental organisations and held its first meeting at the IGF in Istanbul. The meeting began with an overview of the concept of platform responsibility, highlighting relevant initiatives from Council of Europe, Global Network Initiative, Ranking Digital Rights and the Center for Democracy and Technology have undertaken in this regard. Existing issues such as difficulty in comprehension and lack of standardization of redress across rights were raised along with the fundamental lack of due process in terms of transparency across existing mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online platforms compliance to human rights is often framed around the duty of States to protect human rights and often, Internet companies do not sufficient consideration of the effects of their  business practices on users fundamental rights undermining trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting focused it efforts with a call to identify issues of process and substance and specific rights and challenges to be addressed by the DCPR. The procedural issues raised concerned  'responsibility' in decision-making e.g., giving users the right to be heard and an effective remedy before an impartial decision-making body, and obtaining their consent for changes in the contractual terms.  The concerns raised around substantive rights such as privacy and freedom of expression eg., disclosure of personal information and content removal and need to promote 'responsibility' through establishing concrete mechanisms to deal with such issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was suggested that concept of responsibility including in case of conflict between different rights could be grounded in Human Rights case law eg., from European Court of Human Rights jurisprudence. It was also established that any framework that would evolve from this coalition would consider the distinction between users (eg., adults, children, and people with or without continuous access to the Internet) and platforms (eg., in terms of size and functionality).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Action Plan&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The participants at the DCPR meeting agreed to establish a multistakeholder cooperative engagement amidst stakeholders that will go beyond dialogue and produce concrete proposals. Particularly, participants suggested developing:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Due Diligence Recommendations: Recommendations to online platforms with regard to processes of compliance with internationally agreed human rights standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Model Contractual Provisions: Elaboration of a set of principles and provisions protecting platform users’ rights and guaranteeing transparent mechanisms to seek redress in case of violations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;DCPR will ground the development of these frameworks in the preliminary step of compilation of existing projects and initiatives dealing with the analysis of ToS compatibility with human rights  standards. Members, participants and interested stakeholders are invited to highlight and share relevant initiatives by 10th October regarding:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Processes of due diligence for human rights compliance;&lt;/li&gt;
&lt;li&gt;The evaluation of ToS cocompliance with human rights standards;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Further to this compilation, a first recommendation draft regarding online platforms' due diligence will be circulated on the mailing list by 30th October 2014. CIS will be contributing to the drafting which will be led and elaborated by the DCPR coordinators. This draft will be open for comments via the DCPR mailing list until 30th November 2014 and we encourage you to sign up to the mailing list (&lt;a class="external-link" href="http://lists.platformresponsibility.info/listinfo/dcpr"&gt;http://lists.platformresponsibility.info/listinfo/dcpr&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;A second draft will be developed compiling the comments expressed via the mailing-list and shared for comments by 10 December 2014. The final version of the recommendation will be drafted by 30 December. Subsequently, the first set of model contractual provisions will be elaborated  building upon such recommendation. A call for inputs will be issued in order to gather suggestions on the content of these provisions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility'&gt;https://cis-india.org/internet-governance/blog/cis-joins-dynamic-coalition-for-platform-responsibility&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Terms of Service</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Platform Responsibility</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-10-07T10:54:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws">
    <title>Centre draws red lines for Whatsapp over fake news, says must comply with Indian laws</title>
    <link>https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws</link>
    <description>
        &lt;b&gt;In a meeting with WhatsApp’s CEO Chris Daniels, Union minister Ravi Shankar Prasad said India put forward several demands, including that the company must have a grievance officer in India and have proper compliance of Indian laws.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nakul Sridhar was published in the &lt;a class="external-link" href="https://www.hindustantimes.com/india-news/centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws/story-Lcxosvi1gl11MZv3tVNQ2J.html"&gt;Hindustan Times&lt;/a&gt; on August 21, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Union government on Tuesday told the Facebook-owned WhatsApp to  comply with Indian law, set up an  Indian entity, and appoint a  grievance officer in India to who people can reach immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  directive comes at a when the government has pulled up the company for  fake news spread on the social media platform serving as a contributory  factor in several incidents of mob lynching across the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravi  Shankar Prasad, Minister for Electronics and Information Technology,  conveyed this to the global head of WhatsApp, Chris Daniels, who is in  India this week. This is the first time that the government has spelt  out its key expectations from the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I told him there  have been sinister developments like fake news and revenge porn, which  are criminal and against Indian laws. I suggested three points: they  must have a grievance officer in India; they must comply with Indian  laws; and they must have a local, corporate entity in India,” Prasad  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Daniels,  he added, had agreed to the three conditions. WhatsApp did not offer an  independent confirmation or respond to questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasad said he  also told Daniels that WhatsApp would have to comply with Reserve Bank  of India (RBI) guidelines to start its payments services in India,  saying that the firm would have to store the financial data it collects  from India within the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After at least 30 lynchings in the  past one year were linked to rumours and fake news spread through the  WhatsApp platform, the IT ministry sent two notices to the company last  month, asking it to curb the spread of such messages. WhatsApp’s chief  operating officer, Matthew Idema, had met the IT ministry secretary Ajay  Sawhneytowards the end of July to discuss the issue of fake news  with the ministry and explain the steps it was taking in curbing its  spread.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The application made it more difficult to forward media by  removing shortcuts, limited the number of people a forwarded message  can be sent to at a time to five, and introduced a ‘forwarded’ label for  such messages after the push from the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explaining its  broad approach, a top government functionary, who asked not to be named,  said, “We cannot accept digital imperialism. India is an open society.  We have embraced technology and innovation. But no one should think they  can come and do as they like. Firms like WhatsApp must conform to our  rules, laws, and address problems.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reiterating his demand that  WhatApp must find “a technological solution” to trace the origin of  rumour-mongering messages, Prasad said, “It does not need rocket science  to locate a message being circulated thousands and lakhs of times on  the same day, on the same issue, in the same district and same state.”  He said Daniels agreed to comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But experts believe that  delivering on these demands will be challenging. “WhatsApp, according to  my understanding, does not store metadata (such as phone number sent  from) for text messages that are transmitted using their application or  via the web client. Unfortunately, WhatsApp does not make this explicit  in their public documentation,” said Sunil Abraham, founder of the think  tank, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Therefore, many  governments erroneously believe that sources of specific messages can be  determined by big data analysis similar to the analysis of SMS metadata  from telecom operators,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Metadata includes information  such as the sender and recipient, date and time. “Now it would also  include whether the message is forwarded,” said Abraham.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws'&gt;https://cis-india.org/internet-governance/news/hindustan-times-august-21-2018-centre-draws-red-lines-for-whatsapp-over-fake-news-says-must-comply-with-indian-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-27T14:24:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites">
    <title>Centre brings in new safeguards following cases of Aadhaar data leaks on government websites</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites</link>
    <description>
        &lt;b&gt;The Centre has put in new safeguards following a number of cases of Aadhaar data leaks on government websites. All ministries are being asked to encrypt all Aadhaar data and personal financial details. Also, officials are being "sensitised" about legal consequences of data breach. And every government department is to now have one official responsible for Aadhaar data protection.
&lt;/b&gt;
        &lt;p&gt;The article by Nidhi Sharma was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/economy/policy/centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites/articleshow/58952785.cms"&gt;Economic Times&lt;/a&gt; on June 2, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ministry of electronics and information technology has written to all departments on better data security. ET has reviewed the new guidelines. Aadhaar, a 12-digit unique identity number issued on the basis of biometric data, is linked to a person's bank account and used by government agencies to directly transfer benefits of several social welfare schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior officials, who spoke off record, told ET all departments have been asked to immediately review their website content to check if personal data is on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Untitled-4" src="http://economictimes.indiatimes.com/img/58952889/Master.jpg" title="Untitled-4" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A set of 27 dos and 9 don'ts has been circulated on data handling. This includes instructions on masking Aadhaar data and bank details as well as encrypting data. The government has mandated regular audits to check safety of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ministry letter says, "It has come to notice there have been instances wherein personal identity or information of residents, along with Aadhaar numbers and demographic information, and other sensitive personal data ... have been published online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also spells out legal consequences of such data breach and warns the government departments to check future leaks. "Publishing identity information, i.e. Aadhaar number along with demographic information is in clear contravention of the provisions of the Aadhaar Act 2016 and constitutes an offence punishable with imprisonment up to 3 years. Further, publishing of financial information including bank details, being sensitive personal data, is also in contravention of provision under IT Act 2000 with violations liable to pay damages by way of compensation to persons affected."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move to protect personal data comes after reports that data of 130 million Aadhaar cardholders has been leaked from four government websites. Reports, based on a study conducted by the Centre for Internet and Society (CIS) said Aadhaar numbers and details have been leaked.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites'&gt;https://cis-india.org/internet-governance/news/economic-times-june-2-2017-nidhi-sharma-centre-brings-in-new-safeguards-following-cases-of-aadhaar-data-leaks-on-government-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-06T15:41:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-">
    <title>Centre blocks 32 websites for security reasons, restores some later </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-</link>
    <description>
        &lt;b&gt;The Centre on Wednesday asked Internet Service Providers (ISP) to block 32 websites citing national security concerns, especially from terror group ISIS.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by S. Ronendra Singh was &lt;a class="external-link" href="http://www.thehindubusinessline.com/features/smartbuy/tech-news/centre-blocks-32-websites-for-security-reasons-restores-some-later/article6742568.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on December 31, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The move created a flutter on social networking sites,  as most of the Web sites, such as archive.org, vimeo.com, github.com,  pastebin.com, codepad.org and paste2.org, were being used by global  communities like application developers for free movies and books,  coders and text sharing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By late evening, some sites were restored.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sources in the Ministry of Telecommunications and Information Technology confirmed the development and told &lt;i&gt;BusinessLine&lt;/i&gt;: “It was based on some national security issues, and we cannot compromise with our nation’s security….”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  senior official from the Department of Telecommunications (DoT) said  the directive had come from a Mumbai court after the Maharashtra  Anti-Terrorism Squad (ATS) had approached it to block some Web sites  carrying anti-India content.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The matter came to light  after a circular, purportedly sent by DoT to ISPs, showed up on social  networking sites, listing the sites, along with some screen shots.  Incidentally, the said circular had edited out the letter head, date and  the signature below. The ruling Bharatiya Janata Party’s IT cell head,  Arvind Gupta, tweeted saying ‘the Web sites that have been blocked were  based on an advisory by the Anti-Terrorism Squad, and were carrying  anti-India content from ISIS’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, later in the  evening, Gupta, in his tweet said, some of the Web sites such as  vimeo.com have been restored because they have removed ‘objectionable  content and/or cooperated with the on going investigations’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However,  the blocked Web sites raised a furore in the social media wherein  people said the Government should amend the laws than do such things.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The  problem isn’t just about the specific sites that are blocked; the  problem is always about the bad law + process relating to #GoIBlocks,”  Pranesh Prakash, Policy Director at Centre for Internet and Society  tweeted. He said the 69A Rules (of the IT Act 2000) does not allow for  transparency, accountability and time-limits on blocks, so it is easily  misused by the Government, the courts and individuals.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-'&gt;https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T14:13:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations">
    <title>Central Monitoring System to make government privy to phone calls, text messages and social media conversations</title>
    <link>https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations</link>
    <description>
        &lt;b&gt;The government last month quietly began rolling out a project that gives it access to everything that happens over India's telecommunications network—online activities, phone calls, text messages and even social media conversations. Called the Central Monitoring System, it will be the single window from where government arms such as the National Investigation Agency or the tax authorities will be able to monitor every byte of communication. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Indu Nandakumar was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/Business/India-Business/Central-Monitoring-System-to-make-government-privy-to-phone-calls-text-messages-and-social-media-conversations/articleshow/19927923.cms"&gt;published in the Times of India&lt;/a&gt; on May 7, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;But privacy and Internet  freedom advocates are worried that in the name of security, the  government could end up snooping on people, possibly abusing a system  that does not have enough safeguards to protect ordinary citizens. &lt;br /&gt;&lt;br /&gt; "In the absence of a strong privacy law that promotes transparency  about surveillance and thus allows us to judge the utility of the  surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens." &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;After the Mumbai blasts in  November 2008, the government has been arming itself with powers and  technology to help it eavesdrop on digital communications. The  information technology law, enacted in 2000 and amended twice in 2008  and 2011, gives designated government officials the authority to listen  in on phone calls, read SMSes, emails, and monitor websites. &lt;br /&gt;&lt;br /&gt; Such access is allowed for purposes of "reasonable security practices and procedures". &lt;br /&gt;&lt;br /&gt; However, Pavan Duggal, a Supreme Court advocate specialising in cyber  law, said the government has given itself unprecedented powers to  monitor private Internet records of citizens. "This system is capable of  tremendous abuse," he said. The Central Monitoring System, being set up  by the Centre for Development of Telematics, plugs into telecom gear  and gives central and state investigative agencies a single point of  access to call records, text messages and emails as well as the  geographical location of individuals. &lt;br /&gt;&lt;br /&gt; Duggal, who closely  follows New Delhi's battle with Internet firms, said there hasn't been  much details from the government on what exactly the system intends to  monitor and under what conditions. &lt;br /&gt;&lt;br /&gt; In December 2012, the then  information technology minister Milind Deora told Parliament that the  monitoring system, on which the government is spending Rs 400 crore,  will "lawfully intercept Internet and telephone services". &lt;br /&gt;&lt;br /&gt; Work  on the system has been kept under wraps for nearly two years. Several  government agencies have issued tenders seeking specialised equipment  and systems for such monitoring. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;&lt;span id="advenueINTEXT"&gt;As part of modernisation,  the home ministry is updating all its offices in state capitals with  such gear. C-DOT group head Shikha Srivastava declined comment.  Information technology ministry spokeswoman Mamta Verma redirected the  queries to Gulshan Rai, director of India's Cyber Emergency Response  Team, but Rai declined comment. &lt;br /&gt;&lt;br /&gt; With over 100 million users,  India is one of the fastest-growing Internet markets in the world. The  government has come under criticism from activists for increased  censorship and tracking of user records. Internet activist group  Anonymous has started raising the pitch against the monitoring system,  claiming that security is just a pretext for spying on citizens. &lt;br /&gt;&lt;br /&gt; Disclosures by Google show that the number of requests from the  government seeking personal information has been on the rise. In the  second half of 2012, the government made nearly 2,500 requests, Google  said. &lt;br /&gt;&lt;br /&gt; "Even legitimate conversations could end up being tracked," cautioned Duggal, the Supreme Court lawyer. &lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations'&gt;https://cis-india.org/news/times-of-india-indu-nandakumar-may-7-2013-cms-to-make-govt-privy-to-phone-calls-text-messages-and-social-media-conversations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:17:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart">
    <title>Censorship makes India fall two places on global internet freedom chart </title>
    <link>https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart</link>
    <description>
        &lt;b&gt;A recently released global report on the internet freedom rated India 39th in 2012, a slip from two places last year.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Dilnaz Boga was &lt;a class="external-link" href="http://www.dnaindia.com/india/report_censorship-makes-india-fall-two-places-on-global-internet-freedom-chart_1745778"&gt;published&lt;/a&gt; in DNA on September 27, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report titled, Freedom on the net 2012 (FOTN): A global assessment of internet and digital media by Freedom House, a Washington-based monitoring group conducted a comprehensive study of internet freedom in 47 countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Quoting Bangalore-based Centre for Internet and Society, the report said 309 specific items (URLs, Twitter accounts, img tags, blog posts, blogs, and a handful of websites) have been blocked by the government. But officially, the government has admitted to blocking 245 web pages for inflammatory content hosting of provocative content.&lt;br /&gt;&lt;br /&gt;Ketan Tanna, India analyst for Freedom House told DNA, “A reflection of the downward spiral in the freedom on the net that Indians enjoy is evident in the upward revision of scores for India in the FOTN 2012 report. India was one of the only 4 of the 20 countries that “recently experienced declines” and are democracies. The other three are Mexico, Turkey and South Korea.”&lt;br /&gt;&lt;br /&gt;Internet usage in India continues to increase, with tens of millions of new users getting online each year. According to the International Telecommunications Union, internet penetration was 10% — or about 120 million people at the end of 2011. Among internet users, 90 million were ‘active,’ accessing it at least once a month (70 million urban and 20 million rural).&lt;br /&gt;&lt;br /&gt;The report has mentioned that in India, “amid several court cases regarding intermediaries’ responsibility for hosting illegal content, much evidence has surfaced that intermediaries are taking down content without fully evaluating or challenging the legality of the request”.&lt;br /&gt;&lt;br /&gt;Citing an example, Tanna said in December 2011, the website Cartoons against Corruption was suspended by its hosting company after a complaint filed with the Mumbai police alleged that the site’s cartoons ridiculed parliament and national emblems. “As a result of such dynamics, large swaths of online content are disappearing, and the losses are far more difficult to reverse than the mere blocking of a website,” he added.&lt;br /&gt;&lt;br /&gt;More common than website blocking is the removal of content based on judicial orders, government directives, and citizen complaints. This phenomenon that has increased in recent years and in some cases, targeted content on political, social, and religious topics, the report said.&lt;br /&gt;&lt;br /&gt;The Indian authorities had submitted 68 removal requests covering 358 items between January and June 2011. According to Google, 255 items related to what it categorised as “government criticism,” while 39 involved defamation and 8 pertained to hate speech.&lt;br /&gt;&lt;br /&gt;In January, responding to a freedom of information request, the home ministry reported that the government orders 7,500 to 9,000 phone interceptions per month, the report disclosed. Criticising this practice and the government’s disregard for the Constitution, the data revealed, “Established guidelines regulate the ability of state officials to intercept communications, but India lacks an appropriate legal framework and procedures to ensure proper oversight of Intelligence agencies’ growing surveillance and interception capabilities, opening the possibility of misuse and unconstitutional invasion of citizens’ privacy.”&lt;br /&gt;&lt;br /&gt;As another method of controlling speech and activism online, governments have imposed temporary shutdowns of the internet or mobile phone networks during protests or other sensitive times. Localised internet shutdowns and mobile phone shutdowns occurred in India due to security concerns, the report said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart'&gt;https://cis-india.org/news/dna-india-sep-27-2012-dilnaz-boga-censorship-makes-india-fall-two-places-on-global-internet-freedom-chart&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-27T10:37:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india">
    <title>Censorship and sensibility in India</title>
    <link>https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india</link>
    <description>
        &lt;b&gt;The past few weeks in India have seen films, an all-girl rock band, a fashion show, a Booker prize-winning novelist and a reputed academic become targets of harassment, legal action or threats of violence.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Samanth Subramanian was &lt;a class="external-link" href="http://www.thenational.ae/news/world/censorship-and-sensibility-in-india"&gt;published&lt;/a&gt; in the National on February 6, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The most prominent case involved &lt;i&gt;Vishwaroopam&lt;/i&gt;, a Tamil film  that will be released in Tamil Nadu on Friday after a two-week delay.  The film was blocked by the state government after some Muslim groups  protested that it depicted Muslims in poor light. The director, Kamal  Haasan, had to agree to cut seven scenes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The culture of taking  offence has acquired an epidemic proportion, and we are moving in a  direction where nothing, it seems, is a safe topic," said Salil  Tripathi, who wrote the 2009 book &lt;i&gt;Offence: The Hindu Case&lt;/i&gt;, on how Hindu fundamentalists have succeeded in censoring and banning many cultural works and teachings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If  India doesn't step back from this abyss, it will begin to resemble the  dictatorships where people speak in coded language, where real thoughts  go underground," Mr Tripathi added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Sunday, a fashion show in the southern city of Visakhapatnam was  cancelled after the Vishwa Hindu Parishad (VHP), a right-wing Hindu  group, protested against women modelling dresses bearing images of Hindu  deities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Delhi, an art gallery had to temporarily shut down on  Monday after the VHP called for a ban on a retrospective of the modern  nude because the exhibit included "indecent pictures". The VHP's women's  wing, the Durga Vahini, harrassed women who were smoking and drinking  in a restaurant in Mangalore last week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, on Sunday, a  Muslim cleric in Kashmir a fatwa against Pragaash, an all-girl high  school rock band that was deemed "un-Islamic". The band has dissolved,  although Omar Abdullah, the chief minister of Jammu and Kashmir,  defended them last weekend on Twitter, saying: "I hope these talented  young girls will not let a handful of morons silence them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last  week, the author Salman Rushdie cancelled a visit to a literary festival  in Kolkata, citing security concerns after protests by Muslim groups.  The fair's organisers subsequently denied having invited him. Yesterday,  the Indian Christian Republican Party complained to the police that &lt;i&gt;Kadal&lt;/i&gt;, a new movie set in a Tamil Catholic fishing community, shows a framed picture of Jesus Christ being thrown to the floor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These instances have sparked widespread criticism of what an editorial last week in &lt;i&gt;The Hindu &lt;/i&gt;newspaper called India's "flourishing outrage industry". In the &lt;i&gt;International Herald Tribune,&lt;/i&gt; the columnist Manu Joseph called modern India "a paradise for those who take offence".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian constitution guarantees freedom of speech and expression,  but it is not without caveat. The constitution allows for "reasonable  restrictions" on this right, in the interests of "public order, decency  or morality".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Penal Code contains two laws that have been invoked repeatedly to cramp free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section  295A punishes those who "outrage [the] religious feelings of any class"  by spoken, written or visual means, with a fine or a prison term of up  to three years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 505(2) promises a similar punishment to  those who make "statements creating or promoting enmity, hatred or  ill-will between classes" on grounds of religion, caste, language or  race.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Mehra, a lawyer who practises in the Supreme Court, said both laws are antiquated holdovers from colonial India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  problem is that these laws are so broadly worded that cases can be  impossible to quash, because it is difficult for a judge to take the  view that some piece of speech does not promote enmity between groups,"  Mr Mehra said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I'd say there's no chance that these laws will be  struck off the books," he said. "Politically, nobody will do it, because  we have such a huge vacuum of leadership that nobody has the guts to  step up and suggest such changes."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy  director at the Bangalore-based Centre for Internet and Society, has  extensively analysed cases where these laws are applied in conjunction  with India's information technology act, which governs online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Given  India's history of communal violence, it would be extraordinary for  courts to directly criticise such laws," Mr Prakash said. But these laws  are two among many "patently unconstitutional laws" in India's statute  books, he pointed out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"How could it be constitutional to prevent  the free broadcast of news over radio, for instance, or to prohibit  speech online that causes 'annoyance'?" Mr Prakash said. "Not only are  antiquated and speech-restricting laws not being struck off, more such  laws are being added to the statute books all the time."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An  example, he said, was section 66a of the information technology act,  which aims to curtail "offensive messages" online but is often used to  target dissidents and even posts on social media.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india'&gt;https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T04:09:02Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/censorship-2020">
    <title>CENSORSHIP 2020:  The Future of Free Speech Online</title>
    <link>https://cis-india.org/news/censorship-2020</link>
    <description>
        &lt;b&gt;The DC Chapter of the Internet Society, in conjunction with the U.S. Department of State, invite you to an informal discussion on CENSORSHIP 2020: The Future of Free Speech Online on Monday, June 25, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://cct.georgetown.edu/300237.html"&gt;Published in Communication, Culture &amp;amp; Technology&lt;/a&gt;&lt;/span&gt;. For more info, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://http//censorship2020.eventbrite.com/"&gt;visit here&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Arab Spring demonstrated how Internet technologies such as Twitter, blogs, and Facebook could be used to mobilize protesters, publicize corruption and human rights violations, and connect activists and emigres. But in Iran , Syria , and elsewhere, we have seen repressive governments use the Internet to identify and track dissidents, to spread disinformation, and defame political opponents. Will the technologies of anonymization win out over new digital monitoring tools? Will new wireless data technologies foster democracy--or lead to more effective tracking and surveillance? Join us for an informal discussion with six people fighting for free speech on the Internet in their country--and around the world:&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;Dlshad Othman (Syria), an activist and IT engineer providing Syrians with digital security tools&lt;/li&gt;
&lt;li&gt;Pranesh Prakash (India), a blogger and cyberlaw expert who is promoting a free Internet and online freedom of speech.&lt;/li&gt;
&lt;li&gt;Koundjoro Gabriel Kambou (Burkina Faso), a journalist at Lefaso.net, is promoting human rights, democracy particularly among young people.&lt;/li&gt;
&lt;li&gt;Sopheap Chak (Cambodia), the Deputy Director of the Cambodian Center for Human Rights (CCHR) and one of Cambodia ’s leading bloggers.&lt;/li&gt;
&lt;li&gt;Andres Azpurua (Venezuela) has trained 300 youth on using Web 2.0 tools to publicize human rights violations.&lt;/li&gt;
&lt;li&gt;Emin Milli (Azerbaijan), a writer who is using YouTube, Facebook and Twitter to spread information about human rights violations.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="_mcePaste"&gt;Moderator: Ambassador (ret.) Richard Kauzarlich, Deputy Director, Terrorism, Transnational Crime and Corruption Center (TraCCC), George Mason University, &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://traccc.gmu.edu/"&gt;http://traccc.gmu.edu/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="visualHighlight"&gt;&lt;span style="text-align: justify; "&gt;Hosted by the Communication, Culture and Technology Program of Georgetown University 2nd Floor, Car Barn, 3520 Prospect St., N.W. , Washington , DC (enter from Prospect St.)&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/censorship-2020'&gt;https://cis-india.org/news/censorship-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T10:01:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-censorship">
    <title>Censorship — A Death Knell for Freedom of Expression Online</title>
    <link>https://cis-india.org/news/internet-censorship</link>
    <description>
        &lt;b&gt;On December 8, 2011, NDTV aired an interesting discussion on internet censorship. Shashi Tharoor, Soli Sorabjee, Shekhar Kapoor, Ken Ghosh and Sunil Abraham participated in this discussion with NDTV's Sonia Singh.&lt;/b&gt;
        
&lt;p&gt;Sunil said that we need to reflect upon the limitations of freedom of expression which was listed out by Soli Sorabjee and then ask the question whether they are the same limitations in the IT Act. If one reads section 66A, one comes to the conclusion that the IT Act places many additional limitations on the freedom of expression (annoying speech, speech harmful to minors, inconvenient speech) and these are limitations that don’t have existing definitions either in the IT Act or any other statute or case laws.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Sunil further said that through section 79 which is the intermediary liability regime, the government places together a private censorship regime. We did some research at CIS. We sent fraudulent take down notices to seven large international and national intermediaries and through our empirical research we can demonstrate that these intermediaries over-comply with these fraudulent take down notices. So there is already (since the amended IT Act and the notification of the Rules in April this year) a huge chilling effect on the internet thanks to post facto censorship and what the minister is now calling for is preemptive or pro-active censorship which is really going to be the death knell for freedom of expression online.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLkg3YA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLkg3YA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-censorship'&gt;https://cis-india.org/news/internet-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-12-19T10:12:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet">
    <title>Censoring the Internet: A brief manual</title>
    <link>https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet</link>
    <description>
        &lt;b&gt;Blocking websites on the Internet should be proportionate to harm they intend. However, the government of India's approach is against the principles of natural justice.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.tehelka.com/story_main53.asp?filename=Ws230812Internet.asp"&gt;Tehelka&lt;/a&gt; on August 23, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;When:&lt;/b&gt; Speech should be regulated when there is harm, or when there is clear and imminent harm. The extent of regulation must be in proportion to the harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mass exodus of people from the Northeast, from certain Indian-cities is clear indication of a ‘public order’ crisis. The government of India, for the very first time, has legitimate reasons for cracking down on intermediaries such as Google and Facebook and their users, unlike in the past when only the egos of politicians, bureaucrats and others in public office or public life were at stake. In most cases temporary restrictions on speech are sufficient to mitigate harm. When potential for harm has dissipated the restrictions should be lifted. Whilst videos and images related to the violations of the human-rights to the Rohingya community might be sensitive material today, there is no reason why such content should be blocked forever, unlike, for example, in the case of child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How:&lt;/b&gt; Does this mean that the Internet rules that were notified in April last year were future-looking policies justified in retrospect? No. When a block is implemented, or a takedown is complied with, three types of notices are required — either immediately or after the imminent harm has been prevented. First, the censored individuals/groups should be informed, so that they can seek redressal and reinstatement; second, those trying to consume the censored material must be warned; and third, the general public has a right to know either immediately or in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in authoritarian states like Saudi Arabia, visitors to blocked websites are given clear reasons why the website was blocked along with contact details to seek redressal. There are, also, safe harbour provisions for intermediaries, meaning that they absolve themselves of liability in exchange for acting upon takedown orders sent by non-state actors. Suitable safeguards are required to prevent over-compliance by intermediaries, and the resulting chilling effect on free speech as demonstrated by CIS's research. The intermediary liability rules under the Indian IT Act 2008 have no such safeguards and therefore does not comply with principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who:&lt;/b&gt; Block and takedown orders need to be very specific. The advisory note issued to Internet intermediaries by the Department of Electronics and Information Technology, Ministry of Communications &amp;amp; Information Technology on the 17 August did not mention details such as URLs, user accounts, group names and content identifiers. Most of the censored material at first glance, appears to be communal in nature. Unfortunately, there are several URLs from mainstream media publications, a few Wikipedia pages and also at least two blog entries debunking rumours in the list, perhaps because of oversight. Images of unrelated human rights violations featuring people with similar racial features are being used to fuel the current rumours. However, blocking all websites featuring such images will not stop such rumour mongering. Censorship must be targeted and proportionate to the potential harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why:&lt;/b&gt; Speaking aloud just once in the analog world could either result in harm or good. Imagine shouting “bomb” in a crowded airport. The network effect of technologies such as SMS, social media and micro-blogging amplifies the impact of speech. Article 19(2) of the Constitution of India lists eight reasons for which reasonable restrictions may be applied to the right to free speech. This applies to both analog and speech mediated via networked technologies. Some of these restrictions such as 'public order' and 'incitement to discrimination, hostility or violence' are part of international treaties such as the International Covenant on Civil and Political Rights. Fringe phenomenon and exceptional circumstances should not be the basis for formulating policy. For example — knives used as murder weapons does not necessitate regulations on cutlery. Similarly, criminalising rumour mongering will not prevent false information from going viral, online, and disrupting public order. Videos and photos are doctored and manipulated for a wide variety of legitimate reasons. The existing law regulating speech in the interests of public order are sufficient to deal with the circulation of falsehoods on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sunil Abraham is the Executive Director of Bangalore based research organisation, the Centre for Internet and Society&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet'&gt;https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-24T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment">
    <title>Celebrating One Year of the Justice K.S. Puttaswamy v. Union of India Judgment</title>
    <link>https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment</link>
    <description>
        &lt;b&gt;Shweta Mohandas was a panelist at the event, "Celebrating One Year of the Justice K.S. Puttaswamy v. Union of India Judgment", organised by Indian Council for Research on International Economic Relations, and the Centre for Communication Governance at National Law University Delhi. It took place on Friday, 24 August 2018 at India International Centre, New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event began with Dr. Usha Ramanathan's Opening remarks on the State of Privacy in India &amp;amp; the Challenges to Realising Puttaswamy’s Promise. This was then followed by two panel discussions, the first on Data Protection for a Free and Fair Digital Economy and the second on the Legacy of the Justice K.S. Puttaswamy v. Union of India Judgment. Shweta participated in the second panel.  More details of the event &lt;a class="external-link" href="https://ccgnludelhi.wordpress.com/2018/08/22/celebrating-one-year-of-the-puttaswamy-judgment-august-24-6-00-pm-iic/"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment'&gt;https://cis-india.org/internet-governance/news/celebrating-one-year-of-the-justice-k-s-puttaswamy-v-union-of-india-judgment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-08-30T02:53:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis">
    <title>Celebrating 5 Years of CIS</title>
    <link>https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is celebrating 5 years of its existence with an exhibition showcasing its activities and accomplishments. The exhibition will be held at its offices in Bangalore and Delhi from May 20 to 23, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-5-years-all-posters.zip" class="internal-link"&gt;Download all the posters exhibited during the recent exhibition here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;As a move to promote transparency, CIS is inviting the general public to be its auditors by throwing open its account books and contracts which show how it has spent the Rs. 13.13 crores received from its donors. The four-day event will see renowned artists like Kiran Subbaiah, Tara Kelton, Navin Thomas and Abhishek Hazra featuring their work and also giving live demonstrations.&lt;/p&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;h2 align="JUSTIFY"&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;h2 align="JUSTIFY"&gt;Agenda&lt;/h2&gt;
&lt;p align="JUSTIFY"&gt;&lt;i&gt;Open exhibition on all the 4 days from 10.00 a.m. to &lt;/i&gt;&lt;i&gt;8&lt;/i&gt;&lt;i&gt;.00 p.m., in Bangalore and Delhi. The evening  programmes will be held in Bangalore&lt;/i&gt;. &lt;i&gt;Dinner will be served right afterwards.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Evening Programmes&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 align="JUSTIFY"&gt;May&lt;i&gt; &lt;/i&gt;20&lt;i&gt;, &lt;/i&gt;2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why did I buy a set-top box?: What we know, don't know and need to know about Digitalisation &lt;/b&gt;&lt;b&gt;— A Talk by Vibodh Parthasarathi&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Why are we being asked to install set-top boxes? How will this change what we want, and pay for, on TV? Grappling with these questions, the talk will evaluate the rationale of the digital migration in cable currently underway, and the less talked about digital migration being planned for the public broadcaster. These scarcely debated and often contentious issues form the core of a recent &lt;a href="http://www.opensocietyfoundations.org/reports/mapping-digital-media-india"&gt;Country Report on the Media in India&lt;/a&gt;, anchored by the speaker. The India Country Report, the first inter-sectoral and policy oriented study of our electronic media landscape, finds the ongoing digitalisation of cable, the infusion of digital tools in the press and the proposed digital switchover of the public broadcaster, posing varied challenges not only to journalism but to public interest at large. This report is part of a global initiative, &lt;a href="http://www.opensocietyfoundations.org/projects/mapping-digital-media" target="_blank"&gt;Mapping Digital Media&lt;/a&gt;, examining opportunities and risks amidst the transitions to a digital media ecology across 50 countries.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/N8gCYiYS9VY" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Film Screening on Cyber Cafes of Rural India by Video Volunteers&lt;/b&gt;&lt;br /&gt;Video Volunteers in partnership with CIS have been documenting the cyber cafes of rural India. Kamini Menon and Christy Raj will do the screening of seven 2-minute films:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Trends Slowly Changing in Imphal&lt;/b&gt; by Achungmei Kamei (Manipur)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Transgender Interaction with Cyber Cafes &lt;/b&gt; by Christy Raj (Karnataka)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafes Prevail Over Mobile Phones in Nagaland&lt;/b&gt; by Meribeni Kikon (Nagaland)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Mobile Technology Threatens Cyber Cafes in HP&lt;/b&gt; by Avdhesh Negi (Himachal Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Cyber Cafe Visit - A Day's Journey&lt;/b&gt; by Saroj Paraste (Madhya Pradesh)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Challenges of Establishing Cyber Cafes&lt;/b&gt; by Rohini Pawar (Maharashtra)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Community Service Centre - Myth or Reality?&lt;/b&gt; by Neeru Rathod (Gujarat)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Video&lt;/b&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2OxWtwIWNdc" width="250"&gt;&lt;/iframe&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.30&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Hindustani Classical Performance by Aditya Dipankar &lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 align="JUSTIFY"&gt;May 21, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;18.00&lt;br /&gt;19.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Screening of Sabaka &lt;br /&gt;&lt;/b&gt;&lt;b&gt; &lt;/b&gt;A young elephant trainer in India vows revenge against the cult that killed his family. He seeks help from the local Maharajah who refuses, and he sets out alone to battle the enemy... &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sabaka"&gt;Sabaka&lt;/a&gt; is a 1954 film produced and directed by Frank Ferrin starring Boris  Karloff, Reginald Denny, June Foray, et.al.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.00&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Slouching towards Tlön: An Encyclopedia for the 2nd century of Indian cinema — A Talk by Lawrence Liang &lt;/b&gt;&lt;br /&gt;Ashish Rajadhyaksha and Paul Willemen’s Encyclopedia of Indian cinema (1994) marked an important moment for the study of Indian film history. In the two decades since its publication we have seen a rise in the academic community working on Indian film history along with the rise of various new archival initiatives online. Materials that were hitherto unavailable have also made their way into the public domain via the efforts of film historians, cinephiles and other enthusiasts. It is perhaps fitting to think about what a collaborative encyclopedia of Indian cinema for the 21st century may look like. Using Rajadhayksha and Willemen’s Encyclopedia as a base, Lawrence has been working on an online version that incorporates moving images, photographs and archival materials and his presentation will open up questions of how one thinks of an online encyclopedia as well as larger conceptual questions of the relationship between the encyclopedias, the internet and moving image archives.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2n5ZON8M_0E" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 22, 2013&lt;/h3&gt;
&lt;p&gt;Cybersecurity, Privacy and Surveillance&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;“&lt;b&gt;The Indian Surveillance State”&lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;A Talk by Maria Xynou &lt;/b&gt;&lt;br /&gt;The Central Monitoring System confirms that, starting from last month ‘Big Brother’ is a reality in India. But how do authorities get the tech to spy on us? Maria has started investigating surveillance technology companies operating in India. So far, 76 companies have been detected which are producing and selling different types of surveillance gear to Indian law enforcement agencies. Join us to see India´s first investigation of who is aiding our watchers!&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/fshPBINoACs" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.30&lt;br /&gt;19.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Why Privacy and How?&lt;/b&gt; &lt;b&gt;A Talk &lt;/b&gt;&lt;b&gt;by Bernadette Langle &lt;/b&gt;&lt;br /&gt;"But I have nothing to hide!" That's what most people think. Are you sure? What about all the services you use for free, don't you think the service provider has to spend money on that, and that he needs to earn it somehow? Bernadette will show some alternatives and also how easy it can be, to put your messages in a virtual private envelope as you use to do with messages on paper.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/DVa8dkda1D0" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.00&lt;br /&gt;19.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Cyber Security Preview &lt;/b&gt;&lt;b&gt;—&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;Presentation&lt;/b&gt;&lt;b&gt; by Laird Brown&lt;/b&gt; and&lt;b&gt; Purba Sarkar &lt;/b&gt;&lt;br /&gt;CIS in cooperation with Citizen Lab, Munk School of Global Affairs at the University of Toronto, is developing a film project on cyber security in India from a civil society perspective. Laird will show the preview of the project. The preview will include an overview of the project along with a video footage from the first series of interviews.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/moqgZ6tDl4g" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;19.45&lt;br /&gt;20.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Faking of Fingerprints: &lt;/b&gt;&lt;b&gt;A Presentation by &lt;/b&gt;&lt;b&gt;Bernadette Langle &lt;/b&gt;&lt;br /&gt;Bernadette will give a brief presentation on how easy it is to fake a fingerprint. Afterwards you can get hands-on. Fake a fingerprint yourself and take it with you to your home.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/3q6UBK6lLRI" width="250"&gt;&lt;/iframe&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;May 23, 2013&lt;/h3&gt;
&lt;p&gt;Kannada Language and IT&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.00&lt;br /&gt;18.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Kannada in Modern Era: A Guest Talk&lt;/b&gt;&lt;b&gt; by Dr. Chandrashekhara Kambara &lt;/b&gt;&lt;br /&gt;Dr. Chandrashekhara will be the chief guest for this session and will give a guest lecture.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/9bMUu08f_JU" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;18.15&lt;br /&gt;19.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;From Palm Leaf to Tablet – Journey of Kannada: A Talk by Dr. U.B. Pavanaja &lt;/b&gt;&lt;br /&gt;Kannada language which has a history of 2000 years and quite rich in literature started on palm leaves. Kannada advanced with modern times adopting the marvels of Information Technology. This is accomplished by successfully implementing Kannada in various facets of IT. It is being used everywhere from data driven applications to websites to hand held devices like tablets. These aspects will be brought out during the talk.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Summary in Kannada:&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;ತಾಳೆಗರಿಯಿಂದ ಟ್ಯಾಬ್ಲೆಟ್ ತನಕ ಕನ್ನಡದ ಪಯಣ&lt;br /&gt;ಸುಮಾರು ಎರಡು ಸಾವಿರ ವರ್ಷಗಳ ಭವ್ಯ ಇತಿಹಾಸವಿರುವ ಕನ್ನಡ ಸಾಹಿತ್ಯದ ಉಗಮ ತಾಳೆಗರಿಗಳ ಮೇಲೆ ಆಯಿತು. ಕನ್ನಡ ಭಾಷೆಯು ಆಧುನಿಕ ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಅದ್ಭುತ ಕೊಡುಗೆಗಳನ್ನು ತನ್ನದಾಗಿಸಿಕೊಂಡು ಬೆಳೆಯಿತು. ಮಾಹಿತಿ ತಂತ್ರಜ್ಞಾನದ ಎಲ್ಲ ಅಂಗಗಳಲ್ಲಿ ಕನ್ನಡವನ್ನು ಅಳವಡಿಸಿ ಬಳಸಿಕೊಳ್ಳುವುದರ ಮೂಲಕ ಇದು ಸಾಧ್ಯವಾಯಿತು. ಆನ್ವಯಿಕ ತಂತ್ರಾಂಶವಿರಲಿ, ಪ್ರತಿಸ್ಪಂದನಾತ್ಮಕ ಜಾಲತಾಣವಿರಲಿ, ಕೈಯಲ್ಲಿ ಹಿಡಿದು ಕೆಲಸ ಮಾಡುವ ಟ್ಯಾಬ್ಲೆಟ್ ಇರಲಿ –ಎಲ್ಲ ಕಡೆ ಕನ್ನಡದ ಬಳಕೆ ಆಗುತ್ತಿದೆ. ಈ ಎಲ್ಲ ವಿಷಯಗಳ ಕಡೆ ಒಂದು ಪಕ್ಷಿನೋಟವನ್ನು ಈ ಭಾಷಣದಲ್ಲಿ ನೀಡಲಾಗುವುದು.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/w4CiHwpX9X0" width="250"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;19.30&lt;br /&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Carnatic Music Performance by Nirmita Narasimhan&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Video&lt;br /&gt;&lt;br /&gt; &lt;iframe frameborder="0" height="255" src="http://www.youtube.com/embed/-P4v5u_Q34M" width="250"&gt;&lt;/iframe&gt; &lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Dinner&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;RSVP&lt;/b&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Bernadette Längle (&lt;a href="mailto:bernadette@cis-india.org"&gt;bernadette@cis-india.org&lt;/a&gt;), Ph: +91 80 4092 6283 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Prasad Krishna (&lt;a href="mailto:prasad@cis-india.org"&gt;prasad@cis-india.org&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;About the Speakers&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/VPforblurb.jpg" alt="Vibodh" class="image-inline" title="Vibodh" /&gt;&lt;br /&gt;Vibodh Parthasarathi&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Vibodh Parthasarathi &lt;/b&gt;works with the Centre for Culture and Media Governance, Jamia Millia Islamia, New  Delhi. He is also a Board Member at the Centre for Internet and Society, Bangalore. He maintains a multidisciplinary interest in media and development policy, business history of creative industries, and governance of media infrastructure. At the Centre for Culture, Media &amp;amp; Governance, Jamia Millia Islamia, New Delhi, his ongoing research addresses media policy literacy, the TV news industry and the digital switchover in India. He is the co-editor of the critically acclaimed tri-series on Communication Process (Sage).&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Lawrence.png" alt="Lawrence" class="image-inline" title="Lawrence" /&gt;&lt;/p&gt;
&lt;p&gt;Lawrence Liang&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="JUSTIFY"&gt;&lt;b&gt;Lawrence Liang&lt;/b&gt; is the Chairman of the Board at the Centre for Internet and Society. He is a  graduate of the National Law School. He subsequently pursued his Masters degree in Law and Development at Warwick, on a Chevening Scholarship. His key areas of interest are law, technology and culture, the politics of copyright and he has been working closely with Sarai, New Delhi on a joint research project Intellectual Property and the Knowledge/Culture Commons. A keen follower of the open source movement in software, Lawrence has been working on ways of translating the open source ideas into the cultural domain. He has written extensively on these issues and is the author of &lt;i&gt;The Public is Watching: Sex, Laws and Videotape&lt;/i&gt; and &lt;i&gt;A Guide to Open Content Licenses&lt;/i&gt;. Lawrence has taught at NLS, the Asian College of Journalism, NALSAR, etc., and is currently working on a Ph.D. on the idea of cinematic justice at Jawaharlal Nehru University.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_maria.jpg" alt="Maria" class="image-inline" title="Maria" /&gt;&lt;br /&gt;Maria Xynou&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Maria Xynou&lt;/b&gt; is a Policy Associate on the Privacy Project at the CIS. She has previously interned with Privacy International and with the Parliament of Greece. Maria holds a Master of Science in Security Studies from the University College London (UCL). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bernadette.jpg" alt="Bernadette" class="image-inline" title="Bernadette" /&gt;
&lt;p&gt;Bernadette Langle&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Bernadette Längle &lt;/b&gt;recently graduated in social and cultural anthropology, philosophy and computer science. She is also a so-called hacktivist together with one of the oldest hacker associations of the world, the Chaos Computer Club, having a lot of influence in German politics. As one of the core-team organizer of Chaos Communication Congress in Germany she also has a lot of experience in organizing events.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_Laird.png" alt="Laird Brown" class="image-inline" title="Laird Brown" /&gt;&lt;br /&gt;Laird Brown&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt; is a strategic planner and writer. His core competencies are brand analysis, public relations, and resource management. Laird has worked at the United Nations in New York; high-tech ventures in North America, Europe, and India; and, is a guest speaker at ICT conferences internationally. He is currently working on a film project for CIS on cyber security in India with Purba Sarkar.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/purba.jpg" alt="Purba" class="image-inline" title="Purba" /&gt;&lt;br /&gt;Purba Sarkar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Purba Sarkar&lt;/b&gt; is an associate producer with the cyber security film project. She holds a Bachelor in Technology degree from West Bengal University of Technology. Purba worked as a strategic advisor in the field of SAP Retail for 4 years before joining CIS in January, 2013.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kambara.png" alt="Kambara" class="image-inline" title="Kambara" /&gt;Dr.Chandrashekhara Kambara&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Chandrashekhara Kambara&lt;/b&gt; is a prominent poet, playwriter, folklorist, film director in Kannada language. He is also the founder-vice-chancellor of Kannada University in Hampi. He is known for his effective usage of North Karnataka dialect of Kannada language in his plays and poems and is often compared with D.R. Bendre. He has been conferred with many prestigious awards including the Jnanpith Award (the highest literary honour conferred in India) in 2011 for the year 2010, the Sahitya Akademi Award, the Padma Shri by Government of India, Kabir Samman, Kalidas Samman and Pampa Award. After his retirement, Kambara was nominated Member of Karnataka Legislative Council, to which he made significant contributions through his interventions. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_Pavanaja.png" alt="Pavanaja" class="image-inline" title="Pavanaja" /&gt;&lt;br /&gt;Dr. U.B. Pavanaja&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr U B Pavanaja&lt;/b&gt; holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at the Bhabha Atomic Research Centre, Mumbai, for about 15 years. He has done advanced research in Taiwan. He resigned from BARC in 1997 and dedicated himself fully for the cause of Computer and Indian languages. He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc. His Kannada logo won the Manthan Award for the year 2006. He was a member of the technical advisory committee setup by the Govt. of Karnataka for Standardization of Kannada on Computers (2000). He is also a member of the Kannada Software Committee of Govt. of Karnataka (2008-current). &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;The Artists&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Kiran.png" alt="Kiran Subbaiah" class="image-inline" title="Kiran Subbaiah" /&gt;&lt;br /&gt;Kiran Subbaiah&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Kiran Subbaiah&lt;/b&gt; studied sculpture at Santiniketan, MSU Baroda and the RCA London. He was an artist in residence at the Rijksakademie Amsterdam where he worked on art that incorporated informatics and electro-mechanics. He is also known for making videos using custom-built tools that enable him to perform multi-person film-making tasks single-handed. His art is shown extensively in India and abroad. Subbaiah is based in Bangalore and is represented by the Chatterjee and Lal gallery in Mumbai. Kiran will present the Spectator, a robot that can sense the presence of human beings around it. It tries to appreciate them as works of art.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Tara.png" alt="Tara Kelton" class="image-inline" title="Tara Kelton" /&gt;&lt;br /&gt;Tara Kelton&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Tara Kelton&lt;/b&gt; is an artist and designer. She has been living in Brooklyn, USA and Bangalore, India for the last three years. She received her MFA from the Yale School of Art in 2009. Kelton’s video, print, and web-based works investigate moments in which technology alters our perception of the physical world. Kelton has taught at the Srishti School of Art, Design, and Technology and has recently exhibited her work at Vox Populi (USA), Franklin Street Works (USA), GALLERYSKE (Bangalore) and the India Design Forum (Mumbai). Tara will present &lt;i&gt;Trace&lt;/i&gt;, a surveillance camera feed drawn in real-time by anonymous online workers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Navin.png" alt="Navin Thomas" class="image-inline" title="Navin Thomas" /&gt;&lt;br /&gt;Navin Thomas&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Navin Thomas&lt;/b&gt; is a multimedia artist and a professional scrap market junkie, he spends a good quality of his precious time looking for obscure cultural misfits... after destroying most of himself in the 90's, he now spends his time restoring your mother's brother’s tin space toys and other unusual situations.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Abhishek.png" alt="Abhishek Hazra" class="image-inline" title="Abhishek Hazra" /&gt;Abhishek Hazra&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Abhishek Hazra&lt;/b&gt; approaches his art with a particular emphasis on the study of the historiography of science. He uses videos and prints that often integrate textual fragments drawn from real and fictional scenarios. He has previously exhibited and performed at Science Gallery, Dublin, HEART Herning Museum of Contemporary Art, Denmark, Astrup Fearnley Museum of Modern Art, Oslo, Casino Luxembourg Forum d’art Contemporain, Experiment Marathon Reykjavik, Reykjavik Art Museum and Kunstmuseum Bern. Abhishek was most recently an artist in residence at SymbioticA, the Centre for Excellence in Biological Arts, University of Western Australia, Perth. It was first  performed as part of Beam Me Up, curated by Reinhard Storz and Gitanjali Dang, which was acknowledged by Pro Helvetia, New Delhi and German Book Office, New Delhi. Abhishek will be presenting #cloudrumble56 (attempted to re-animate sections of the Indian parliamentary archives — specifically, the transcripts of the scientist M.N. Saha's (1893-1956) interventions — through a performance that was transmitted only through live tweets on Twitter).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Aditya.png" alt="Aditya Dipankar" class="image-inline" title="Aditya Dipankar" /&gt;Aditya Dipankar&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Aditya Dipankar &lt;/b&gt;started fiddling with music at the age of 4 when he started learning the &lt;i&gt;tabla&lt;/i&gt; and then went on to play it for a long time. Years later, he discovered his strong inclination towards singing. Now, under the noble guidance of Pandit Vijay Sardeshmukh (Senior disciple of Pandit Kumar Gandharva), he is trying to understand the simplicity and spontaneity in the rich tradition of Hindustani classical music.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Nirmita.png" alt="Nirmita Narasimhan" class="image-inline" title="Nirmita Narasimhan" /&gt;Nirmita Narasimhan&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Nirmita Narasimhan&lt;/b&gt; is a Policy Director at CIS and works on accessibility for persons with disabilities. She was awarded the national award for empowerment of persons with disabilities by the President of India and also received the NIVH Excellence Award. Nirmita Narasimhan is a disciple of Dr. Radha Venkatachalam and renowned maestro Prof. T.R. Subramanyam. She began learning music at the age of 5 and went on to complete her Ph.D. in this subject from the Delhi University. Nirmita has been performing since 1995 and received several accolades such as the Sahitya Kala Parishad Scholarship and prizes in several competitions. She received the Gold medal in MA for standing first in the University and also stood first in MPhil. She has released a CD on Ponnayya Pillai compositions and also sung in an album of &lt;i&gt;varnams&lt;/i&gt;. Nirmita has performed in different places in India such as Delhi, Chennai, Tirupathi and Bangalore as well as in Singapore and has also given several thematic concerts such as &lt;i&gt;Eka Raga Sandhya&lt;/i&gt; and &lt;i&gt;Pallavi&lt;/i&gt; concerts. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sharathcopy.jpg" alt="Sharath Chandra Ram" class="image-inline" title="Sharath Chandra Ram" /&gt;&lt;/p&gt;
&lt;p&gt;Sharath Chandra Ram&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan) has interests in multimodal art, cognitive science, accessibility, digital humanities and network cultures. He is a faculty at the Centre for Experimental Media Arts at the Srishti School of Art Design and Technology. At the Centre for Internet and Society he helped set up and manage activities at the Metaculture Media Lab : an open hackerspace and alternative platform for research and exchange. His writings and musings at CIS maybe found here: &lt;a href="https://cis-india.org/author/sharath"&gt;http://cis-india.org/author/sharath&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He graduated from the University of Edinburgh with a degree in Artificial Intelligence specializing in interactive virtual environments. Previously as a Research Associate at the National Institute of Mental Health and Neurosciences he received a special mention award at the International Conference on Consciousness (2012) held at the National Institute of Advanced Studies for his work on ‘Cross modal Integration’. As an amateur radio broadcaster, he is a proponent of the free use of airwaves for relief work, education and transmission art. He has also been a development related radio journalist (PANOS @ Nepal, Voices UNDP@Bangalore), speaker at the International Ham Radio Convention (Port Blair, 2006) and as a film enthusiast has been a Press Reviewer for the Edinburgh International Film Festival.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Locations&lt;/span&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;span class="author-g-ecflmmhkz122zm34g8fj"&gt;Bangalore&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;No. 194, Second 'C' Cross, Domlur,&lt;br /&gt;2nd Stage, Bangalore - 560071,&lt;br /&gt;Karnataka, India &lt;br /&gt;Ph: +91 80 4092 6283                 &lt;br /&gt; Fax: +91 80 2535 0955&lt;/p&gt;
&lt;h3&gt;Delhi&lt;/h3&gt;
&lt;p&gt;Centre for Internet and Society&lt;br /&gt;G 15, Top floor&lt;br /&gt;Behind Hauz Khas, G Block Market&lt;br /&gt;Hauz Khas,&lt;br /&gt;New Delhi 110016&lt;br /&gt;Ph: + 91 011 40503285&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Event Brochure&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-celebrates-5-years.pdf" class="internal-link"&gt;Event Flier&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Event Posters/Banners and Videos&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3&gt;Accessibility&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;National Resource Kit (&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;NVDA E-Speak (&lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/nvda-espeak" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;International Collaborations (&lt;a href="https://cis-india.org/accessibility/blog/international-collaborations.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/international-collaborations" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Partners (&lt;a href="https://cis-india.org/accessibility/blog/partners.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/partners" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Publications (&lt;a href="https://cis-india.org/accessibility/blog/publications.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/publications" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/accessibility/blog/timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/accessibility/blog/timeline" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Inclusive Planet (PDF, &lt;a href="https://cis-india.org/accessibility/blog/inclusive-planet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;In the below video Anandhi Viswanathan gives a demo of the National Resource Kit project  and Rameshwar Nagar gives a demo of the NVDA and ESpeak (Text-to-Speech)  project during the exhibition.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/2Z1xfwvkFoQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Broadcast Treaty (&lt;a href="https://cis-india.org/a2k/blogs/broadcast-treaty.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/broadcast-treaty" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Copyright (&lt;a href="https://cis-india.org/a2k/blogs/copyright-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/copyright" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 1 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Software Patent 2 (&lt;a href="https://cis-india.org/a2k/blogs/software-patent-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/software-patent-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Pervasive Technologies (&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies-exhibition-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/pervasive-technologies-poster.pdf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Access to Knowledge (Wikipedia)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Factsheet (&lt;a href="https://cis-india.org/openness/blog-old/indian-language-factsheet.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/indian-language-wikipedia-factsheet" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Reaching Out (&lt;a href="https://cis-india.org/openness/blog-old/reaching-out.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/reaching-out-to-participants" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Outreach (&lt;a href="https://cis-india.org/openness/blog-old/outreach.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/outreach" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Bridging Gender Gap (&lt;a href="https://cis-india.org/openness/blog-old/bridging-gender-gap.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/bridging-the-gender-gap" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Press Coverage (&lt;a href="https://cis-india.org/openness/blog-old/press-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wikipedia-press-coverage" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Education Programmes (&lt;a href="https://cis-india.org/openness/blog-old/education-programmes.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/wiki-education-programs" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Team Achievements (&lt;a href="https://cis-india.org/openness/blog-old/achievements.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/access-to-knowledge-team-achievements" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Visualization (&lt;a href="https://cis-india.org/openness/blog-old/visualization.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/indic-wikipedia-project-visualization" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Open Access to Scholarly Literature (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-scholarly-literature.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-scholarly-literature" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Access to Law (&lt;a href="https://cis-india.org/openness/blog-old/open-access-to-law-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-access-2-law" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Open Standards (&lt;a href="https://cis-india.org/openness/blog-old/open-standards-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/open-standards" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Free/Open Source Software (&lt;a href="https://cis-india.org/openness/blog-old/foss-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/openness/blog/foss" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Free Speech)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Blocking of Websites (&lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/blocking-websites" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Freedom of Speech  (&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-speech.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/free-speech" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Intermediary Liability (&lt;a href="https://cis-india.org/internet-governance/blog/intermediary-liability-poster.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/intermediary" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet Governance Forum (&lt;a href="https://cis-india.org/internet-governance/blog/internet-governance-forum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/igf" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Internet Governance (Privacy)&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Privacy Events (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-events.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Timeline (&lt;a href="https://cis-india.org/internet-governance/blog/privacy-timeline.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/events" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;UID (1) (&lt;a href="https://cis-india.org/internet-governance/blog/uid" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/uid" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="internal-link"&gt;&lt;/a&gt;UID (2) (&lt;a href="https://cis-india.org/internet-governance/blog/uid-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/unique-identity" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (1) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-1.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-1" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;DNA (2) (&lt;a href="https://cis-india.org/internet-governance/blog/dna-2.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-2" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Institutional Framework for Indian Telecommunication (&lt;a href="https://cis-india.org/telecom/blog/institutional-framework-for-indian-telecommunication.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/institutional-framework" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Growth of Telecom Industry in India (&lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom-industry-in-india.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/growth-of-telecom" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Delicensed Spectrum (&lt;a href="https://cis-india.org/telecom/blog/delicensed-spectrum.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/delicensed" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Spectrum Sharing (&lt;a href="https://cis-india.org/telecom/blog/spectrum-sharing.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/telecom/blog/spectrum" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;RAW Monographs&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Archives and Access (&lt;a href="https://cis-india.org/raw/archives-and-access.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/archives-access" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Internet, Society and Space in Indian Cities (&lt;a href="https://cis-india.org/raw/internet-society-and-space.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/internet-society-space" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The Last Cultural Mile (&lt;a href="https://cis-india.org/raw/last-cultural-mile.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/last-cultural-mile" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Porn, Law, Video Technology (&lt;a href="https://cis-india.org/raw/porn-law-video-technology.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/porn-law-video-technology" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Re:Wiring Bodies (&lt;a href="https://cis-india.org/raw/rewiring-bodies.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/re-wiring-bodies" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Community Informatics and Open Government Data (Special Issue) (&lt;a href="https://cis-india.org/raw/community-informatics-open-govt-data.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/raw/digital-humanities/spl-issue-community-informatics-and-ogd" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;News and Media&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Media Coverage (&lt;a href="https://cis-india.org/internet-governance/blog/media-coverage.pdf" class="internal-link"&gt;PDF&lt;/a&gt;, &lt;a href="https://cis-india.org/home-images/MC.png/view" class="external-link"&gt;PNG&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Organizational Chart (&lt;a href="https://cis-india.org/internet-governance/blog/organizational-chart.pdf" class="internal-link"&gt;PDF&lt;/a&gt;)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis'&gt;https://cis-india.org/internet-governance/events/celebrating-5-years-of-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-02-25T09:15:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cdt-internet-neutrality">
    <title>CDT Provides Answers to Questions on Internet Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cdt-internet-neutrality</link>
    <description>
        &lt;b&gt;Pranesh Prakash of CIS asked David Sohn of CDT a few pointed questions on the emerging hot topic of 'Internet neutrality', and received very useful responses.  Those questions and Mr. Sohn's responses are documented in this blog post.&lt;/b&gt;
        
&lt;p&gt;As part of the Centre for Democracy and Technology's (CDT's) excellent "&lt;a class="external-link" href="https://www.cdt.org/ask"&gt;Ask CDT&lt;/a&gt;" initiative, we were provided the opportunity to clear up some of our doubts around "net neutrality" (which CDT prefers referring to as Internet neutrality rather than network neutrality) by asking an expert: David Sohn, CDT's Senior Policy Counsel.&amp;nbsp; Reproduced below are &lt;a class="external-link" href="https://www.cdt.org/ask#comment-2015"&gt;the questions that I asked&lt;/a&gt; (inset and in gray), and &lt;a class="external-link" href="https://www.cdt.org/ask#comment-2024"&gt;David's replies&lt;/a&gt; (provided below each question).&amp;nbsp; Some of the questions I asked below were doubts that I had, while some others are instances of donning the roles of devil's advocate.&amp;nbsp; We hope this will be helpful in clarifying doubts that some of the readers of this blog have had as well.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;1a. "As far as I can understand, content distribution networks (CDNs) such as Akamai, don't really fall within your understanding of violations of Internet neutrality. Why not? In what cases is 'spending more to get faster speeds' permitted for content hosts? Since not only specialised companies like Akamai, but regular Tier 1 companies like Level3 and AT&amp;amp;T also engage in CDN-like behaviour, does it make it more liable to illicit/underhand/non-transparent service differentiation techniques?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;1a. That's correct, CDNs don't violate either Internet neutrality
principles or the FCC's recent rules. I talked about this at &lt;a class="external-link" href="http://www.cdt.org/blogs/david-sohn/neutrality-and-caching"&gt;some length
in a blog post a couple years ago&lt;/a&gt;. The short
answer is that Internet neutrality does not aim to guarantee that all
online content and services will work equally well, but rather to
prevent ISPs from exercising "gatekeeper" control with respect to their
subscribers. Thus, content providers who have money can purchase various
advantages -- for example, more or better servers, upgraded software, or
caching services from a CDN such as Akamai. Significantly, things like
servers and caching are available from competitive sources; no supplier
has gatekeeper control. In contrast, priority treatment on the
transmission facilities serving any given Internet user is an advantage
that only that user's ISP could provide. Another difference is that when
one content provider purchases caching, it doesn't slow anybody else's
traffic (indeed, it could speed it up, since it may help reduce overall
network congestion). By contrast, when an ISP designates favoured traffic
for priority transmission, non-favoured traffic by definition is
de-prioritized. Think about a line of "bits" waiting in a router queue
-- if you let some bits "cut in line," it inevitably lengthens the wait
for those who don't get to cut.

Given CDT's general comfort level with CDNs and the existence of
competitive offerings in the marketplace, I'm not too concerned about
who provides the service (Akamai, Level3, AT&amp;amp;T, etc.). It doesn't seem
to be a case of the ISP leveraging its unique control over access to
subscribers.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;1b. "A large part of the claims of Internet neutrality supporters are founded on the basis of 'dumb networks', which can also be seen as a reformulation of the end-to-end principle. A question arises, which is often posed by the likes of Dave Farber, Bob Kahn and Robert Pepper: why should we stick dogmatically to the end-to-end principle when embedding 'intelligence' in the core is/will soon be a viable option &lt;strong class="moz-txt-star"&gt;&lt;span class="moz-txt-tag"&gt;*&lt;/span&gt;without&lt;span class="moz-txt-tag"&gt;*&lt;/span&gt;&lt;/strong&gt; jeopardising the simplicity of the Internet? If you are fine with CDNs, then are you fine with a partial supplanting of the dogmatism of the end-to-end principle (because, after all, CDNs are in a sense, intelligence in the core rather than in the edges)?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;1b. I don't think that supporting Internet neutrality requires a
dogmatic opposition to any and all built-in "intelligence" in the
network. Certainly a strong case can be made for handling certain
network management matters, such as some cyber security issues, at the
network level. I get concerned on neutrality grounds not by the mere
existence of "intelligence" in the core, but by the use of that
intelligence to make judgments and decisions about which applications
and services are most important or most in need of special treatment --
as opposed to remaining application-agnositic or, in the alternative,
leaving the decision to end users. Intelligence that is put in the
service of end users, allowing the users themselves to make judgments
about what to prioritize, does not concern me at all. But if the
network-level intelligence results in broader reliance on centralized
evaluation and categorization of the type or content of Internet
communications, and centralized decisions about what to favor or
disfavor, then I think it poses a neutrality problem. The bottom line
is, the idea that networks could benefit from some built-in intelligence
does not argue for giving ISPs unbounded discretion to discriminate
among traffic. Indeed, a network that empowered users themselves to
determine the relative priority levels of their traffic based on their
individual needs would be far "smarter" than on in which ISPs make
broad, across-the-board choices.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;2. "What is the bright-line rule that separates some IP-based networks that are 'private' (and hence free to do as they please), and others that are part of the 'Internet' (and hence need to follow Internet neutrality)? Where does IPTV fall? (While answering that question, think not only of present-day IPTV, but keep in mind its potential applications.) Where do 'walled gardens' of the WWW fall?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;2. In CDT's view, Internet access service provides a general-purpose
ability to send and receive data communications across the Internet.
Other services could be exempt from neutrality rules if they serve
specific and limited functional purposes and have limited impact on the
technical performance of Internet traffic. CDT's comments to the FCC
went into considerable detail -- see, for example, &lt;a class="external-link" href="http://www.cdt.org/comments/fcc-comments-specialized-and-application-openness-principles-mobile-wireless-platforms"&gt;the comments we filed
in October&lt;/a&gt;.
The FCC rules took a similar but not identical tack, saying that
Internet access services are services that provide the capability to
send and receive data "from all or substantially all Internet endpoints"
or that provide a functional equivalent of such a service. In any event,
the question of how clear the line is between Internet access services
that are subject to neutrality rules and other services that are not is
an important one that will bear close watching over time.

As for IPTV, it offers a specific function -- access to video
programming -- rather than general purpose access to the entire
Internet. So IPTV can be distinguished from Internet service. As for
"walled gardens," it likely would depend how large the garden is. If the
garden seeks to offer a wide enough variety of sites that it can be used
as a substitute for Internet access, then the FCC could choose to apply
neutrality rules. At some point, a garden can become big and
general-purpose enough that it is effectively serving as a non-neutral
version of an Internet access service. That kind of end-run around
neutrality rules shouldn't be allowed.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;3a. "Should Internet neutrality be kept at the level of non-enforceable (but still important) enunciation of principles, or should they be enforceable laws? In either case, who has the authority to regulate Internet neutrality, given the non-territoriality of the 'Internet' (and especially keeping in mind the direction that ICANN's been taking with things like the Affirmation of Commitments). Why should the FCC have such powers? Why should any American governmental body have such powers?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;3a. It is important to have some enforceable rules. The FCC enunciated
principles back in its 2005 broadband Policy Statement -- but when the
agency tried to act after Comcast violated those principles, a court
ruled that the FCC had no ability to do so. Enunciated principles are of
little value if ISPs are free to violate them without consequence. For
U.S. Internet users, I think the FCC is an appropriate agency in which
to lodge the authority to police neutrality violations; the FCC has a
long history of working to ensure that providers of physical
communications infrastructure do not abuse their position. And since the
focus is on the provisions of physical communications connections, I
don't the the territoriality issue you raise is a major problem. The
United States has the authority to establish rules for companies
providing last-mile communications links to U.S.-based subscribers. The
Internet is of course a global medium, but the endpoint connections have
a clear geographic location.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;3b. "If Internet neutrality is really about ensuring fair competition (so an ISP doesn't promote one company's content), then why not just allow competition law / anti-trust law to ensure that fair competition? What are the lacunae in global competition laws that necessitate the separate articulation of 'Internet neutrality' principles/rules?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;3b. The ability of antitrust law to protect Internet openness is pretty
limited. Absent a clear anticompetitive motive, network operators likely
could curtail Internet openness in a variety of ways without running
afoul of antitrust law. Antitrust’s prohibition against anticompetitive
conduct is a far cry from any kind of affirmative policy to preserve the
Internet’s uniquely open network structure. Nor can antitrust law take
into account the major non-economic reasons for maintaining an open
Internet, such as the impact on independent speech and civic
empowerment. Finally, as a practical matter, antitrust cases tend to
drag on for many years. Individual innovators and small startup
companies – key beneficiaries of Internet openness – are unlikely to be
in a position to bring antitrust cases against major network operators.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;4a. "One of the strongest arguments of anti-Internet neutrality folks is that adoption of Internet neutrality principles/rules will ensure that it is only the consumers who foot the bill for bandwidth consumption, and bandwidth hogs (like NetFlix) don't ever pay. This, they say, is unfair on consumers. How do you respond to this?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;4a. First, I question the statement that "bandwidth hogs like NetFlix
don't ever pay." For starters, NetFlix buys a huge amount of bandwidth
connecting its servers to the Internet. Once on the Internet, its
traffic is carried onward pursuant to peering agreements between the
ISPs and backbone providers. When NetFlix traffic volume grows, it may
trigger new payment demands between carriers, as we've seen in the
recent dispute between Comcast and Level3. But the bottom line is,
nobody is forced to carry any traffic they haven't contractually agreed
to handle. Of course, it is true that NetFlix doesn't make payments to
(for example) AT&amp;amp;T for delivering NetFlix traffic to AT&amp;amp;T's customers.
That might seem unfair if you think of NetFlix as a "bandwidth hog"
eating up AT&amp;amp;T's capacity. I believe that is the wrong way to think
about it. NetFlix has no ability to forcefeed traffic onto AT&amp;amp;T's
network. Every bit it sends was requested by an AT&amp;amp;T subscriber. So if
there are "bandwidth hogs" here, they are the end users -- they are the
ones that pull all those bits onto AT&amp;amp;T's network. And they have already
paid AT&amp;amp;T for the ability to get those bits. I would add that when
individual users choose to download huge volumes, I have no problem with
the ISP charging them more.

Second, you suggest that it may be unfair to ask consumers to foot the
full bill for their connectivity. But the Internet is such an open and
innovation-friendly platform precisely because it is so user-driven.
This user-centric focus could change if ISPs start thinking of
themselves as providing services not just to end user subscribers, but
also to non-subscribers such as large online content providers to whom
the ISPs do not directly provide bandwidth. The ISPs would then have
divided loyalties; rather than just focusing on empowering users, they
would be collecting fees to steer users in particular directions. Sure,
in other contexts there are examples of "two-sided markets" in which end
users foot only part of the bill. Newspapers are often cited. But
including paid advertising in newspapers doesn't have much impact in how
the overall product is perceived or presented to users. In contrast,
ISPs charging content providers for special transmission priority would
be akin to a newspaper in which advertisers pay not just to place ads,
but also to influence where the substantive articles appear -- which
ones go on the front page and which on the interior, for example. In
turn, content providers of all stripes would need to think about
striking deals with multiple ISPs -- something that is not necessary
today. In the end, turning the Internet into a two-sided market would
make the medium dramatically less open, less innovative, and less
empowering of users.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span class="moz-txt-citetags"&gt;&lt;/span&gt;4b. "If a consumer wants a faster connection (to access content faster), she can get that by paying the ISP more and getting more bandwidth. If a business wants a faster connection (to deliver content faster), it can get that by paying the ISP more bandwidth. However, certain kinds of paying for faster delivery of content are sought to be curbed. Where should we draw that line? And Why should we hold on so dearly to a certain model of accounting for costs?"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;4b. Consumers and businesses should be able to pay their respective ISPs
for more bandwidth. I think that is very different from paying other
people's ISPs for preferential treatment. The latter arrangement turns
ISPs into gatekeepers with respect to their subscribers -- because once
the quality of delivery depends on which content providers have struck a
deal with the subscribers' ISP, every content provider needs to
negotiate with that ISP in order to keep up with its competitors. We
hold on to the Internet's model of accounting for costs because it is
part of what makes the Internet such an open, innovative environment:
content providers and innovators don't face the hurdle of having to
negotiate deals with all their users' ISPs.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cdt-internet-neutrality'&gt;https://cis-india.org/internet-governance/blog/cdt-internet-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-04T05:56:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
