<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2646 to 2660.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/beyond-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/beyond-clicktivism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/best-practices-meet-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/best-bits"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">
    <title>Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</link>
    <description>
        &lt;b&gt;The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Keerthana Sankaran was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html"&gt;New Indian Express&lt;/a&gt; on December 26, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While last week's government order on  snooping caused an uproar, the Centre's plans for a far-reaching  monitoring system have been in the making for almost a decade -- with  the groundwork being done by the previous UPA regime. The recently  released 2017-18 annual report of the Centre for Development of  Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS)  is “practically complete”, confirming that the Orwellian ‘Big Brother’  is here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says that surveillance equipment is being rolled out in 21  service areas across the country and operations have commenced in 12  service areas. The system will monitor and intercept calls and messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims the CMS is based on the Telegraph Act of 1885  which states that the central or state government may intercept messages  if the government is “satisfied that it is necessary or expedient to do  so in the interests of the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states or public  order or for preventing incitement to the commission of an offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the surveillance system was publicly announced in 2009,  C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a  “lawful interception, monitoring” system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the Cabinet Committee on Security during the  UPA government in 2011, receiving flak from experts and the press for  not safeguarding the citizen’s right to privacy. However, in a Lok Sabha  session in May 2016, Telecom Minister Ravi Shankar Prasad said that the  system is for the “process of lawful interception”, adding that  regional monitoring centres in Delhi and Mumbai had been  operationalised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest C-DOT report also talks about a Centre of Excellence for  Lawful Interception being set up, which would use high-end technologies -  such as open source intelligence, image processing and search engine  tools to scan Twitter and Facebook - for surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs released a notification,  authorising 10 central agencies to intercept, monitor and decrypt any  "information generated, transmitted, received or stored in any  computer." While the public and opposition parties expressed alarm over  the new order, the C-DOT report clearly shows that state surveillance  plans are already in an advanced stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These government moves are taking place despite the August 2017  landmark judgement by the Supreme Court, which declared the right to  privacy as a fundamental right which will protect citizens from  intrusive activities by the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'&gt;https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-26T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight">
    <title>Beyond the Searchlight</title>
    <link>https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight</link>
    <description>
        &lt;b&gt;Should we be wary of Google’s all-pervasiveness? &lt;/b&gt;
        &lt;p&gt;This article Debarshi Dasgupta was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?288214"&gt;published in the Outlook&lt;/a&gt; on October 23, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Search Google&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Some queries to type in the window&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is what is good for Google good for India, especially after Brazil and the EU question its actions?&lt;/li&gt;
&lt;li&gt;Are politicians sending out the right signals by associating with Google’s initiatives?&lt;/li&gt;
&lt;li&gt;Is Google directing the internet intellectual discourse in a way that will benefit it?&lt;/li&gt;
&lt;li&gt;Does Google initiate the kind of offline activities it does here in other democracies?&lt;/li&gt;
&lt;li&gt;Is Google shutting out potential competition by obtaining a stranglehold on the internet?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Google’s policy, its CEO Eric Schmidt had once said, was to get right  up to the creepy line, but not cross it. It has generated contentious  debate about the firm’s activities and products, whether it’s accessing  your e-mails to feed you targeted ads, something we have now come to  accept grudgingly, or its soon-to-be-rel­eased Google Glass that comes  fitted with miniature cameras and has advocates all worried about the  next big breach on the privacy frontier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just online, where privacy violations and anti-competitive  practices have raised concerns globally, some of Google’s offline  activities in India too should have us asking questions based on  conflict of interest and lack of transparency. Here too, the company  seems to have placed itself right next to the creepy line. Especially  the way it has gone about sponsoring research at key think-tanks and  academia on areas that direc­tly concern its business interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing illustrates this better than the work of PRS Legislative  Research, which Google has funded  in the past. PRS produces policy  briefi­ngs that are sent out to lawmakers and the media, including on  internet governance. PRS hasn’t got a clearance to receive foreign funds  since it became independent of the Centre for Policy Research in 2010,  where it was launched, and has since then been largely funded by  domestic sources.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ISpy.png/@@images/3132fe8b-54a1-4e6b-a14a-f744172a7cc9.png" alt="I Spy" class="image-inline" title="I Spy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Prashant.png" alt="Prashant" class="image-inline" title="Prashant" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prashant Reddy, Blogger&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“That an Indian user seeking arbitration&lt;br /&gt;with Google has to do so in a California &lt;br /&gt;court reeks of double standards.”&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Does this growing network mean Google is having a say in shaping  internet governance laws? Maybe yes. They should have a say by all  means, just as other interested parties must get theirs. But given its  influence and the certain opaqueness that marks its activities, some  more transparency can only boost the cred­entials of a firm whose  informal motto is—“Don’t be evil”. Google may have helped you find that  bit of information from the googol tera bytes of online data but it has  so far largely evaded discussion on how it has gone on to become big and  influential in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But while it may have been forced to back out from fun­ding PRS   direc­tly, Google’s web of res­earch fellows in this country is growing.   In August this year, the Asia Internet Coalition, of which Goo­gle is a   founding member, selected its two inaugural India fellows—Shehla  Rashid  Shora and Astik Sinha, both of whom will analyse policies  concerning  the internet environment here. Sinha also happens to be a  social media  advisor for BJP MP Anurag Thakur.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So big that it hobnobs with Narendra Modi in the first of its Hangout series  and, quite contrary to its espousal of free speech, has comfortable  questions pitched to him. Or so influential that it has telecom minister  Kapil Sibal, its bete noire from 2011 when his ministry was forcing  them to pull down content, to attend the launch of  chand­nichowkonline.in, a business direct­ory of Sibal’s constituency. &lt;i&gt;Outlook&lt;/i&gt; made several attempts to get a reaction from Google but rec­eived none by the time this article had to go to the press.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Google.png" alt="Nikon" class="image-inline" title="Nikon" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;Blurred lines&lt;/b&gt; Paid ads seem no different from search results for cameras &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Google, since 2011, has also placed three fellows so far under its  annual Google Public Policy Fellowship prog­ramme at the Bangalore-based  Cen­tre for Internet and Society (CIS). The research is supposed to  focus on “acc­ess to knowledge, openness in India, freedom of  expression, pri­vacy, and telecom”. Yet another crucial funding in May  2013 went to the Centre for Communication Gover­na­nce at the National  Law University in New Delhi, which does research on areas directly  linked to its business interests. The agreement contains a clause that  says “Google will not be excluded from any future business  opportunities”. Its research director Chi­n­mayi Arun did not respond to  &lt;i&gt;Outlook&lt;/i&gt;’s e-mail and said she was too busy to speak when &lt;i&gt;Outlook&lt;/i&gt; called her up.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;A third institution Google has fun­ded is the media watch website The  Hoot. After the 26/11 attacks in Mum­bai when the government hastily  amended the IT Act, clamping down in a restrictive spirit, noted  journalist and the website’s editor Sevanti Ninan was one of the many  criticising the government publi­cly in her articles. Google, she says,  contac­ted her somewhere around mid-2009 seeking a proposal on how they  could help with what she was working on. Ninan sent one proposing a Free  Speech Hub and received a grant of $22,000 in January 2010  (approximately Rs 10 lakh at 2010 exchange rates) from Google to do so.  The hub is an online forum to track free speech violation and highlight  problems surrounding freedom of speech and expression and regulation of  media.&lt;/p&gt;
&lt;p&gt;The commitment was renewed in February 2012 with ano­ther grant  of Rs 42 lakh. Ninan says that while Goo­gle was “not interested in  media ethics but free speech”, its app­roach was entirely “hands-off” to  what the site could include on the hub. “I think it’s entirely up to  the org­anisation being funded to decide how it handles a grant. At the  same time, anything Google does should be under scrutiny just like other  corporations.”&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Anja.png" alt="Anja Kovacs" class="image-inline" title="Anja Kovacs" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“More transparency&lt;br /&gt;and accountability&lt;br /&gt;can only be good,&lt;br /&gt;both for Google and for the organisation&lt;br /&gt;it funds.”&lt;br /&gt;&lt;/b&gt;Anja Kovacs, Internet Democracy Project&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So just as it is necessary to publicise that Shell has ties with the India  chapter of Brookings Institution or that Reliance sponsors the Observer  Resea­rch Foundation, it is important that people know where Google is  putting its money and for what gains. In fact, more so in the case of  Google, a firm that touches our lives in so many more ways that Shell or  Reliance does. Yet, a lot of what Google has been doing has gone  without adequate publicity and scrutiny. Should we be any less sceptical  of Google funding resea­rch that helps formulate policies on internet  governance than we should be of, let’s say, the Tatas and Jindals on  mining? “Google has huge money and its funding of research can be a very  contentious issue, especially if it seeks to influence resea­rch.  Therefore, parties who swear by full disclosure and transparency must  adhere to it,” says senior journalist Paranjoy Guha Thakurta. “More  transpare­ncy and accountability can only be good, both for Google and  the organisations it funds,” adds Anja Kovacs, who works with the  Internet Democracy Project.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/narendramodi.png" alt="Narendra Modi" class="image-inline" title="Narendra Modi" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;The great connector&lt;/b&gt; Hangout with Narendra Modi&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;But there has been little of that transparency online. For instance, the  Rules and Regulations Review of The Infor­mation Technology Rules, 2011,  put out and sent to MPs by PRS Legislative Research has no mention that  an interested party (Google) has funded its work. Similarly, The Hoot  has no mention of Google funding it on the ‘About the Hub’ page even  though it has details of Google’s funding on the ‘Support The Hoot’  page. Google has also funded numerous ngos, in areas such as health and  education, and has sought to promote the use of technology (often  theirs, such as in the ongoing Google Impact Challenge Award).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sunil.png" alt="sunil" class="image-inline" title="sunil" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“Because there is &lt;br /&gt;no privacy &lt;br /&gt;commissioner, &lt;br /&gt;Indian citizens are &lt;br /&gt;left vulnerable to &lt;br /&gt;Google when it comes to &lt;br /&gt;privacy.”&lt;/b&gt;&lt;br /&gt;Sunil Abraham, CIS, Bangalore&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;This offline influence apart, Google’s hold online is worrying enough to  call for action. The way it manipulates search results to favour  clients of its AdSense programme is a global concern. For instance, a  search for a popular phone model throws up matches of Google’s clients  and features them more prominently than the actual site of the product.  The Jaipur-based Consumer Unity and Trust Society (CUTS) conducted a  survey that found most internet users could not tell an ad from an  organic search result from Google. Says Madhav Dar, an independent  anti-trust economist, “Given its financial clout and dominance of  e-commerce, Google can directly deny traffic to downstream sites. And  because the internet ecosystem is still in a formative stage here, this  is something that requires intense and urgent scrutiny by the  Competition Commission of India (CCI).”&lt;/p&gt;
&lt;p&gt;CUTS filed a formal complaint with the CCI in June last year alleging  anti-competitive practices and abuse of its dominant position.  Bharat­Matrimony.com too filed a complaint with the CCI in 2012 accusing  it of directing online users’ search for “Bharat+Matrimony” to its  rivals.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;For many, Google crossed the creepy line when it declared, in a court  filing in August this year, that people sending e-mails to any of  Google’s 425 million Gmail users need have no “reasonable expectation”  that their communications are confidential. This is something that  concerns Sunil Abraham, the executive director of CIS, which hosts  Google fellows but has received no funding from the firm. “India has no  omnibus horizontal statutes, neither sufficiently evolved vertical  statutes in specific areas of telecommunication or the internet,” he  says. “And because of that there is no office of the privacy  commissioner in India and the absence of this regulator doesn’t tame the  voracious appetite that Google has for personal information. This  happens in other jurisdictions, but the Indian citizen is left  vulnerable to Google when it comes to privacy.” “Part of Google’s  practice can be absolutely abhorrent, such as the way in which it seeks  to have a monopoly in digitising information and being the only one to  organise it,” adds Kovacs.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/amitabh.png" alt="Amitabh" class="image-inline" title="Amitabh" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Amitabh Bachchan Google maps his home at WEF in Davos&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Another controversial move online has been the decision between Airtel and Google to allow the former’s subscribers free usage of Google’s service up to 1 GB. This has thrown up concerns of violation of “network neutrality”, a widely acknowledged concept that requires internet service providers to not discriminate against third party applications and service.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Journalist and blogger Shivam Vij, however, thinks concerns surrounding Google’s offline activities are misplaced. “As long as they keep coming out with transparency reports that show the majority of requests for user data and content removal are refused, I’d consider them an ally. One should be grateful that Google is funding to protect free speech and ashamed that Indian firms aren’t,” he says. “And if they really have been trying to influence MPs, they would have bribed them, not put out research.”&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa, who runs Medianama, a digital media news and analysis website, is another person who says “he won’t look a gift horse in the mouth”. “I don’t know what the motives are, but I support what they are doing, especially given the way the state and Indian firms are failing us when it comes to protecting free speech online,” he adds. The only concern he has about Google is regarding its reported unwillingness to agree to a deal between the Advertising Agencies Association of India (AAAI) and the Internet and Mobile Association of India (IAMAI). The deal seeks to ensure smaller online publishers and advertising networks are paid on time by advertisers, who, in most cases, delay payments to smaller entities but always pay bigger players like Google on time. “Smaller players are suffering due to delay in payments, which can extend up to a year, a problem that Google does not face. The IAMAI initiative is something that Google is unwilling to support because it does not impact them,” he adds.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/SevantiNinan.png" alt="Sevanti Ninan" class="image-inline" title="Sevanti Ninan" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;"Anything that &lt;br /&gt;Google does should &lt;br /&gt;be under scrutiny &lt;br /&gt;just like other corporations."&lt;/b&gt;&lt;br /&gt;Sevanti Ninan, Editor, The Hoot&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ChandniChowk.png" alt="Chandni Chowk" class="image-inline" title="Chandni Chowk" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Qutub.png" alt="Qutub" class="image-inline" title="Qutub" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;The outreach&lt;/b&gt; Sibal attends the launch of chandnichowkonline, a business directory of his constituency; Qutub Minar, digitised&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Criticising or questioning some of Google’s policies does not amount to  siding with the government on cracking down on free speech on the  internet. &lt;a href="http://images.outlookindia.com/images/coverpics/outlookindia/large/big_cover_20111219.jpg" target="_blank"&gt;&lt;i&gt;Outlook&lt;/i&gt; ran a cover in December 2011&lt;/a&gt; where it was severely critical of the government’s atte­mpt to muzzle  online dissent. Neither does concern about Google’s activities stem from  a fear of the foreign hand. Its expansion into Indian civil society has  to be seen as an attempt by a profits-driven corporation to ensure its  market interests in India are protected. The country becomes all the  more important given the trouble it has been having in Brazil and in  Europe, where the firm has been slapped with a slew of anti-trust  charges. Keeping a close watch will only help enforce Google’s policy in  India—not crossing the creepy line.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight'&gt;https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T11:15:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill">
    <title>Beyond the PDP Bill: Governance Choices for the DPA</title>
    <link>https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill</link>
    <description>
        &lt;b&gt;This article  examines the specific governance choices the Data Protection Authority (DPA) in India  must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019, was introduced in the Lok Sabha on 11 December 2019. It lays down an overarching framework for personal data protection in India. Once revised and approved by Parliament, it is likely to establish the first comprehensive data protection framework for India. However, the provisions of the Bill are only one component of the forthcoming data protection framework It further proposes setting up the Data Protection Authority (DPA) to oversee the final enforcement, supervision, and standard-setting. The Bill consciously chooses to vest the responsibility of administering the framework with a regulator instead of a government department. As an independent agency, the DPA is expected to be autonomous from the legislature and the Central Government and capable of making expert-driven regulatory decisions in enforcing the framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA is not merely an implementing authority; it is also expected to develop privacy regulations for India by setting standards. As such, it will set the day-to-day obligations of regulated entities under its supervision. Thus, the effectiveness with which it carries out its functions will be the primary determinant of the impact of this Bill (or a revised version thereof) and the data protection framework set out under it.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The final version for the PDP Bill may or may not provide the DPA with clear guidance regarding its functions. In this article, we emphasise the need to look beyond the Bill and instead examine the specific governance choices the DPA must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;A brief timeline of the genesis of a distinct privacy regulator for India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The vision of an independent regulator for data protection in India emerged over the course of several intervening processes that set out to revise India’s data protection laws. In fact, the need for a dedicated data protection regulation for India, with enforceable obligations and rights, was debated years before the &lt;a href="https://thewire.in/government/privacy-aadhaar-supreme-court"&gt;Aadhaar&lt;/a&gt;, &lt;a href="https://www.thehindu.com/news/national/urgent-need-for-data-protection-laws-experts/article23314655.ece"&gt;Cambridge Analytica&lt;/a&gt;, and &lt;a href="https://www.livemint.com/opinion/online-views/pegasus-has-given-privacy-legislation-a-jab-of-urgency-11628181453098.html"&gt;Pegasus&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;revelations captured the public imagination and mainstreamed conversations on privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;Right to Privacy Bill, 2011&lt;/a&gt;, which never took off, recognised the right to privacy in line with Article 21 of the Constitution of India, which pertains to the right to life and personal liberty. The Bill laid down express conditions for collecting and processing data and the rights of data subjects. It also proposed setting up a Data Protection Authority (DPA) to supervise and enforce the law and advise the government in policy matters. Upon review by the Cabinet, it was &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;suggested&lt;/a&gt; that the Authority be revised to an Advisory Council, given its role under the Bill was limited.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Subsequently, in 2012, the AP Shah Committee Report &lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf"&gt;recommended&lt;/a&gt; a principle-based data protection law, focusing on set standards while refraining from providing granular rules, to be enforced through a co-regulatory structure. This structure would consist of central and regional-level privacy commissioners, self-regulatory bodies, and data protection officers appointed by data controllers. There were also a few private members’ bills &lt;a href="https://saveourprivacy.in/media/all/Brief-PDP-Bill-25.12.2020.pdf"&gt;introduced&lt;/a&gt; between 2011 and 2019.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;None of these efforts materialised, and the regulatory regime for data protection and privacy remained embedded within the Information Technology Act, 2000, and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI Rules). Though the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR313E_10511%281%29_0.pdf"&gt;SPDI Rules&lt;/a&gt; require body corporates to secure personal data, their enforcement is &lt;a href="https://www.indiacode.nic.in/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;amp;orderno=49"&gt;limited&lt;/a&gt; to cases of negligence in abiding by these limited set of obligations pertaining to sensitive personal information only, and which have caused wrongful loss or gain – a high threshold to prove for aggrieved individuals. Otherwise, the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%281%29_0.pdf"&gt;Intermediary Guidelines&lt;/a&gt;, 2011 require all intermediaries to generally follow these Rules under Rule 3(8).&amp;nbsp; The enforcement of these obligations is &lt;a href="https://www.ikigailaw.com/dispute-resolution-framework-under-the-information-technology-act-2000/#acceptLicense"&gt;entrusted&lt;/a&gt; to adjudicating officers (AO) appointed by the central government, who are typically bureaucrats appointed as AOs in an ex-officio capacity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;By 2017, the Aadhaar litigations had provided additional traction to the calls for a dedicated and enforceable data protection framework in India. In its judgement, the Supreme Court &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;recognised&lt;/a&gt; the right to privacy as a fundamental right in India and stressed the need for a dedicated data protection law. Around the same time, the Ministry of Electronics and Information Technology (MeitY) constituted a &lt;a href="https://pib.gov.in/newsite/PrintRelease.aspx?relid=169420"&gt;committee of experts&lt;/a&gt; under the chairmanship of Justice BN Srikrishna. The Srikrishna Committee undertook public consultations on a 2017 &lt;a href="https://www.meity.gov.in/writereaddata/files/white_paper_on_data_protection_in_india_171127_final_v2.pdf"&gt;white paper&lt;/a&gt;, which culminated in the nearly comprehensive &lt;a href="https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;Personal Data Protection Bill, 2018&lt;/a&gt;, and an accompanying &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;report&lt;/a&gt;. This 2018 Bill outlined a regulatory framework of personal data processing for India and defined data processing entities as fiduciaries, which owe a duty of care to individuals to whom personal data relates. The Bill provided for the setting up of an independent regulator that would, among other things, specify further standards for data protection and administer and enforce the provisions of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MeitY invited public comments on this Bill and tabled a revised version, the Personal Data Protection &lt;a href="http://164.100.47.4/BillsTexts/LSBillTexts/Asintroduced/373_2019_LS_Eng.pdf"&gt;Bill&lt;/a&gt;, 2019 (PDP Bill), in the Lok Sabha in December 2019. Following public pressure calling for detailed discussions on the Bill before its passing, it was referred to a &lt;a href="http://loksabhaph.nic.in/Committee/CommitteeInformation.aspx?comm_code=73&amp;amp;tab=1"&gt;Joint Parliamentary Committee&lt;/a&gt; (JPC) constituted for this purpose. It currently remains under review; the JPC is &lt;a href="https://www.hindustantimes.com/india-news/need-state-level-data-protection-authorities-joint-parliamentary-committee-mp-amar-patnaik-101632679181340.html"&gt;reportedly&lt;/a&gt; expected to table its report in the 2021 Winter Session of Parliament. Though the Bill is likely to undergo another &lt;a href="https://www.hindustantimes.com/india-news/over-100-drafting-changes-proposed-to-jpc-on-data-protection-bill-101631730726756.html"&gt;round of revisions&lt;/a&gt; following the JPC’s review, this is the closest India has come to realising its aspirations of establishing a dedicated and enforceable data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This Bill carries forward the choice of a distinct regulatory body, though &lt;a href="https://thewire.in/tech/india-data-protection-authority-needs-constitutional-entrenchment"&gt;questions remain&lt;/a&gt; on the degree of its independence, given the direct control granted to the central government in appointing its members and funding the DPA.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Conceptualising an Independent DPA&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Srikrishna Committee’s 2017 white paper and its 2018 report on the PDP Bill discuss the need for a regulator in the context of &lt;em&gt;enforcement&lt;/em&gt; of its provisions. However, the DPA under the PDP Bill is tasked with extensive powers to frame detailed regulations and codes of conduct to inform the day-to-day obligations of data fiduciaries and processors. To be clear, the standard-setting function for a regulator &lt;a href="https://ssrn.com/abstract=1393647"&gt;entails&lt;/a&gt; laying down the standards based on which regulated entities (i.e. the data fiduciaries) will be held accountable, and the manner in which they may conduct themselves while undertaking the regulated activity (i.e. personal data processing). This is in addition to its administrative and enforcement, and quasi-judicial functions, as outlined below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Functions of the DPA under the PDP Bill 2019&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;img src="https://cis-india.org/home-images/PDPBill.png/@@images/93bcf598-962a-48f1-b1b1-78933dac5d27.png" alt="null" class="image-inline" title="PDP" /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At this stage, it is important to note that the choice of regulation via a regulator is distinct from the administration of the Bill by the central or state governments. Creating a distinct regulatory body allows government procedures to be replaced with expert-driven decision-making to ensure sound economic regulation of the sector. At the same time, the independence of the regulatory authority &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;insulates it&lt;/a&gt; from political processes. The third advantage of independent regulatory authorities is the scope for ‘operational flexibility’, which is embodied in the relative autonomy of its employees and its decision-making from government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is also the rationale provided by the Srikrishna Committee in stating their choice to entrust the administration of the data protection law to an independent DPA. The 2017 white paper that preceded the 2018 Srikrishna Committee Report proposed a distinct regulator to provide expert-driven enforcement of laws for the highly specialised data protection sphere. Secondly, the regulator would serve as a single point of contact for entities seeking guidance and will ensure consistency by issuing rules, standards, and guidelines. The Srikrishna Committee Report concretised this idea and proposed a sector-agnostic regulator that is expected to &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;undertake&lt;/a&gt; expertise-driven standard-setting, enforcement, and adjudication under the Bill.&lt;sup&gt; &lt;/sup&gt; The PDP Bill carries forward this conception of a DPA, which is distinct from the central government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Conceptualised as such, the DPA has a completely new set of questions to contend with. Specifically, regulatory bodies require additional safeguards to overcome the legitimacy and accountability questions that &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;arise&lt;/a&gt; when law-making is carried out not by elected members of the legislature, but via the unelected executive. The DPA would need to incorporate democratic decision-making processes to overcome the deficit of public participation in an expert-driven body. Thus, the meta-objective of ensuring autonomous, expertise-driven, and legitimate regulation of personal data processing necessitates that the regulator has sufficient independence from political interference, is populated with subject matter experts and competent decision-makers, and further has democratic decision-making procedures.&lt;/p&gt;
&lt;p&gt;Further, the standard-setting role of the regulator does not receive sufficient attention in terms of providing distinct procedural or substantive safeguards either in the legislation or public policy guidance.&lt;/p&gt;
&lt;h3&gt;Reconnaissance under the PDP Bill: How well does it guide the DPA?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;At this time, the PDP Bill is the primary guidance document that defines the DPA and its overall structure. India also lacks an overarching statute or binding framework that lays down granular guidance on regulation-making by regulatory agencies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The PDP Bill, in its current iteration, sets out skeletal provisions to guide the DPA in achieving its objectives. Specifically,&amp;nbsp; the Bill provides guidance limited to the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Parliamentary scrutiny of regulations:&lt;/em&gt; The DPA must table all its regulations before the Parliament. This is meant to accord &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;legislative scrutiny&lt;/a&gt; to binding legal standards promulgated by unelected officials.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Consistency with the Act:&lt;/em&gt; All regulations should be consistent with the Act and the rules framed under it. This integrates a standard of administrative law to a limited extent within the regulation-making process. &lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, India’s past track record &lt;a href="https://prsindia.org/theprsblog/how-well-does-parliament-examine-rules-framed-under-various-laws"&gt;indicates&lt;/a&gt; that regulations, once tabled before the Parliament, are rarely questioned or scrutinised. Judicial review is typically based on ‘thin’ procedural considerations such as whether the regulation is unconstitutional, arbitrary, &lt;em&gt;ultra vires&lt;/em&gt;, or goes beyond the statutory obligations or jurisdiction of the regulator. In any event, judicial review is possible only when an instrument is challenged by a litigant, and, therefore, it may not always be a robust &lt;em&gt;ex-ante&lt;/em&gt; check on the exercise of this power. A third challenge arises where instruments other than regulations are issued by the regulator. These could be circulars, directions, guidelines, and even FAQs, which are &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rarely bound&lt;/a&gt; by even the minimal procedural mandate of being tabled before the Parliament. To be sure, older regulators including the Reserve Bank of India (RBI) and the Securities and Exchange Board of India (SEBI) also face similar issues, which they have attempted to address through various methods including voluntary public consultations, stakeholder meetings, and publication of minutes of meetings. These are useful tools for the DPA to consider as well.&lt;/p&gt;
&lt;p&gt;Apart from these, specific guidance is provided with respect to issuing and approving codes of practice and issuing directions as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Codes of practice: The DPA is required to (i) ensure transparency,&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) consult with other sectoral regulators and stakeholders, and (iii) follow a procedure to be prescribed by the central government prior to the notification of codes of practice under the Bill.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Directions: The DPA may issue directions to individual, regulated entities or their classes from time to time, provided these entities have been given the opportunity to be heard by the DPA before such directions are issued.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, the meaning of transparency and the process for engaging with sectoral regulators remains unspecified under the Bill. Furthermore, the central government has been provided vast discretion to formulate these procedures, as the Bill does not specify the principles or outcomes sought to be achieved via these procedures. The Bill also does not specify instances where such directions may be issued and in which form.&lt;/p&gt;
&lt;p&gt;Thus, as per its last publicly available iteration, the Bill remains silent on the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The principles that may guide the DPA in its functioning.&lt;/li&gt;
&lt;li&gt;The procedure to be followed for issuing regulations and other subordinate legislation under the Bill.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The relevant regulatory instruments, other than regulations and codes of practice – such as circulars, guidelines, FAQs, etc. – that may be issued by the DPA.&lt;/li&gt;
&lt;li&gt;The specifics regarding the members and employees within the DPA who are empowered to make these regulations.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;It is unclear whether the JPC will revise the DPA’s structure or recommend statutory guidance for the DPA in executing any of its functions. This is unlikely, given that parent statutes for other regulators typically omit such guidance. As a result, the DPA may be required to make intentional and proactive choices on these matters, much like their regulatory counterparts in India. These are discussed in the section below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Envisaging a Proactive Role for the DPA&lt;/h3&gt;
&lt;p&gt;As the primary regulatory body in charge of the enforcement of the forthcoming data protection framework, what should be the role of the DPA in setting standards for data protection?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The complexity of the subject matter, and the DPA’s role as the frontline body to define day-to-day operational standards for data protection for the entire digital economy, necessitates that it develop transparent guiding principles and procedures. Furthermore, given that the DPA’s autonomy and capacity are currently unclear, the DPA will need to make deliberate choices regarding how it conducts itself. In this regard, the skeletal nature of the PDP Bill also allows the DPA to determine its own procedures to carry out its tasks effectively.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is not uncommon in India: various regulators have devised frameworks to create benchmarks for themselves. The Airports Economic Regulatory Authority (AERA) is &lt;a href="http://aera.gov.in/aera/upload/uploadfiles/files/AERAACT.pdf"&gt;obligated&lt;/a&gt; to follow a dedicated consultation process as per an explicit transparency mandate under the parent statute. However, the Insolvency and Bankruptcy Board of India (IBBI) has, on its own initiative, &lt;a href="https://ibbi.gov.in/webadmin/pdf/legalframwork/2018/Oct/IBBI(Mechamism%20for%20Issuing%20Regulations)%20Regulations,%202018_2018-10-26%2011:59:43.pdf"&gt;formulated regulations&lt;/a&gt; to guide its regulation-making functions. In other cases, consultation processes have been integrated into the respective framework through judicial intervention: the Telecom Regulatory Authority of India (TRAI) has been mandated to undertake consultations through &lt;a href="https://clpr.org.in/wp-content/uploads/2018/10/Cellular-Operators-v.-TRAI.pdf"&gt;judicial interpretation&lt;/a&gt; of the requirement for transparency under the Telecom Regulatory Authority of India Act, 1997 (TRAI Act).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, we develop a list of considerations that the DPA should look to address while carrying out its standard-setting functions. We also draw on best practices by Indian regulators and abroad, which can help identify feasible solutions for an effective DPA for India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The choice of regulatory instruments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DPA is empowered to issue regulations, codes of practice, and directions under the Bill. At the same time, regulators in India routinely issue other regulatory instruments to assign obligations and clarify them. Some commonly used regulatory instruments are outlined below. The terms used for instruments are not standard across regulators, and the list and description set out below outline the main concepts and not fixed labels for the instruments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Overview of regulatory instruments&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Circulars   and Master Circulars&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;FAQs&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Directions&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Content&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Circulars are used to prescribe detailed obligations   and prohibitions for regulated entities and can mimic regulations. Master   circulars consolidate circulars on a particular topic periodically.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These may be administrative or substantive,   depending on the practice of the regulator in question.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued in public interest by regulators to   clarify the regulatory framework administered by them. They cannot prescribe   new standards or create obligations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued to provide focused instructions to   individual entities or class of entities in response to an adjudicatory   action or in lieu of a current challenge.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Binding   character&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They are generally &lt;a href="https://indiankanoon.org/doc/1588871/"&gt;binding&lt;/a&gt; in the &lt;a href="https://indiankanoon.org/doc/1316639/"&gt;same manner&lt;/a&gt; as regulations and rules. However, if they go beyond   the parent Act or existing rules and regulations, they may be &lt;a href="https://indiankanoon.org/doc/15876695/"&gt;struck down&lt;/a&gt; following a judicial review.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They may or may not be binding depending   upon the language employed or the regulator’s practice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unclear whether these are binding and to   what extent. However, crucial clarifications on important concepts sometimes   emerge from FAQs.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Binding in respect of the class of regulated   entities to whom this is issued.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Parliamentary   scrutiny&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Unlike regulations, these do not have to be   laid before the Parliament.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Thus, all these instruments, to varying degrees, have &lt;a href="https://www.ncaer.org/news_details.php?nID=1399"&gt;been used&lt;/a&gt; to create binding obligations for regulated entities. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;choice of regulatory instrument&lt;/a&gt; is not made systematically. Indeed, even a &lt;a href="https://www.bis.org/bcbs/publ/d321.pdf"&gt;hierarchy of instruments&lt;/a&gt; and their functions are not clearly set out by most regulators. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rationale&lt;/a&gt; for deciding why a circular is issued as against a regulation is also unclear. A study on regulatory performance in India by Burman and Zaveri (2018) has &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;highlighted&lt;/a&gt; an over-reliance on instruments such as circulars. As per their study, between 2014 and 2016, RBI and SEBI issued 1,016 and 122 circulars, as against 48 and 51 regulations, respectively. These circulars are not bound by the same pre-consultative mandate nor are they mandated to be laid before the Parliament. While circulars may have&amp;nbsp; been intended for routine to routinely used to lay down administrative or procedural requirements, the study narrows its frame of reference to circulars which lay down substantive regulatory requirements. In this instance, it is unclear why parliamentary scrutiny is mandated for regulations alone, and not for instruments like circulars and directions, even though they lay down similarly substantive requirements. Furthermore, there have also been&lt;a href="https://indiacorplaw.in/2014/11/are-sebis-faqs-binding-on-partiessebi.html"&gt; instances&lt;/a&gt; where certain instruments like FAQs have gone beyond their advisory scope to provide new directions or definitions that were not previously shared under binding instruments like regulations or circulars.&lt;/p&gt;
&lt;p&gt;The DPA has been provided specific powers to issue regulations, codes of practice, and directions. However, the rationale for issuing one instead of the other has been &lt;a href="https://www.medianama.com/2020/01/223-pdp-bill-2019-data-protection-authority/"&gt;absent&lt;/a&gt; from the PDP Bill so far. In such a scenario, it is important that the DPA transparently outlines the &lt;em&gt;types&lt;/em&gt; of instruments it wishes to use, whether they are binding or advisory, and the procedure to be followed for issuing each.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-legislative consultative rule-making&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;Participatory and consultative processes have emerged as core components of democratic rule-making by regulators. Transparent consultative mechanisms could also ameliorate capacity challenges in a new regulator (particularly for technical matters) and help enhance public confidence in the regulator.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, several regulators have adopted consultation mechanisms even when there is no specific statutory requirement. &lt;a href="https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&amp;amp;sid=4&amp;amp;smid=35&amp;amp;ssid=38"&gt;SEBI&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/public-comments/comments-on"&gt;IBBI&lt;/a&gt; routinely issue discussion papers and consultation papers. The RBI also issues draft instruments &lt;a href="https://www.rbi.org.in/Scripts/DraftNotificationsGuildelines.aspx"&gt;soliciting comments&lt;/a&gt;. As discussed previously, TRAI and AERA have distinct transparency mandates under which they carry out consultations before issuing regulations. However, these processes are not mandated all forms of subordinate legislation. Taking cognizance of this, the Financial Sector Legislative Reform Committee (FSLRC) has &lt;a href="https://dea.gov.in/sites/default/files/fslrc_report_vol1_1.pdf"&gt;recommended&lt;/a&gt; transparency in the regulation-making process. This was &lt;a href="https://dea.gov.in/sites/default/files/Handbook_GovEnhanc_fslrc_2.pdf"&gt;carried forward&lt;/a&gt; by the Financial Stability and Development Council (FSDC), which recommended that consultation processes should be a prerequisite for all subordinate legislations, including circulars, guidelines, etc. A &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;study&lt;/a&gt; on regulators’ adherence to these mandates, spanning TRAI, AERA, SEBI, and RBI, demonstrated that this pre-consultation mandate is followed inconsistently, if at all. Predictable consultation practices are therefore critical.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the study stated that it &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;could not determine&lt;/a&gt; whether the consultation processes yielded meaningful participation, given that regulators are not obligated to disclose how public feedback was integrated into the rule-making process. Subordinate legislations issued in the form of circulars and guidelines also do not typically undergo the same rigorous consultation processes. Thus, an ideal consultation framework would &lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;comprise&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Publication of the draft subordinate legislation along with a detailed explanation of the policy objectives. Further, the regulator should publish the internal or external studies conducted to arrive at the proposed legislation to &lt;a href="https://legalinstruments.oecd.org/public/doc/669/51f6da97-c198-4c93-922f-1a5d80beae86.pdf"&gt;engender&lt;/a&gt; meaningful discussion.&lt;/li&gt;
&lt;li&gt;Permitting sufficient time for the public and interested stakeholders to respond to the draft.&lt;/li&gt;
&lt;li&gt;Publishing all feedback received for the public to assess, and allowing them to respond to the feedback.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;However, beyond specifying the manner of conducting consultations, it will be important for the DPA to determine where they are mandatory and binding, and for which type of subordinate legislations. These are discussed in the next section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Choice of consultation mandates for distinct regulatory      instruments&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the Bill provides for consultation processes for issuing and approving codes of practice, no such mechanism has been set out for other instruments. Nevertheless, specifying consultation mandates for different regulatory instruments is important to ensure that decision-making is consistent and regulation-making remains bound by transparent and accountable processes. As discussed above, regulatory instruments such as circulars and FAQs are not necessarily bound by the same consultation mandates in India. This distinction has been clarified in more sophisticated administrative law frameworks abroad. For instance, under the Administrative Procedures Act in the United States (US), all substantive rules made by regulatory agencies are &lt;a href="https://www.reginfo.gov/public/reginfo/Regmap/regmap.pdf"&gt;bound&lt;/a&gt; by a consultation process, which requires notice of the proposed rule-making and public feedback. This does &lt;a href="https://www.federalregister.gov/uploads/2011/01/the_rulemaking_process.pdf"&gt;not preclude&lt;/a&gt; the regulatory agency from issuing clarifications, guidelines, and supplemental information on the rules issued. These documents do not require the consultation process otherwise required for formal rules. However, they cannot be used to expand the scope of the rules, set new legal standards, or have the effect of amending the rules. Nevertheless, agencies are not precluded from choosing to seek public feedback on such documents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, the Information Commissioner’s Office in the United Kingdom (UK) takes into consideration &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/"&gt;public consultations&lt;/a&gt; and &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/ico-call-for-views-on-employment-practices/"&gt;surveys&lt;/a&gt; while issuing toolkits and guidance for regulated entities on how to comply with the data protection framework in the UK.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Here, the DPA may choose to subject strictly binding instruments like regulations and codes of practice to pre-legislative consultation mandates, while softer mechanisms like FAQs may be subject to the publication of a detailed outline of the policy objective or online surveys to invite non-binding, advisory feedback. For each of these, the DPA will nonetheless need to create specific criteria by which it classifies instruments as binding and advisory, and further outline specific pre-legislative mandates for each category.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Framework for issuing regulatory instruments and instructions&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the DPA is likely to issue several instruments, the system based on which these instruments will be issued is not yet clear. Without a clearly thought-out framework, different departments within the regulator &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;typically issue&lt;/a&gt; a series of directions, circulars, regulations, and other instruments. This raises questions regarding the consistency between instruments. This also requires stakeholders to go through multiple instruments to find the position of law on a given issue. Older Indian regulators are now facing challenges in adapting their ad hoc system into a framework. For example, the RBI currently issues a series of circulars and guidelines that are periodically consolidated on a subject-matter basis as Master Circulars and Master Directions. These are then updated and published on their website. IBBI also publishes &lt;a href="https://ibbi.gov.in/uploads/publication/e42fddce80e99d28b683a7e21c81110e.pdf"&gt;handbooks&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/publication/information-brochures"&gt;information brochures&lt;/a&gt; that consolidate instruments in an accessible manner.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While these are useful improvements, these practices cannot keep pace with rapid changes in regulatory instructions and are not complete or user-friendly (for example, the subject-matter based consolidation does not allow for filtering regulatory instructions by entity). Other jurisdictions have developed different techniques such as formal codification processes to consolidate regulations issued by government agencies under one &lt;a href="https://www.govinfo.gov/help/cfr"&gt;unified code&lt;/a&gt;, &lt;a href="https://www.oaic.gov.au/privacy/privacy-registers/privacy-codes-register/"&gt;register&lt;/a&gt;, or &lt;a href="https://www.handbook.fca.org.uk/handbook"&gt;handbook&lt;/a&gt;,&amp;nbsp; websites that allow for searches based on different parameters (subject-matter, type of instrument, chronology, entity-based), and &lt;a href="https://www.handbook.fca.org.uk/handbook-guides"&gt;guides&lt;/a&gt; tailored to different types of entities. The DPA, as a new regulator, can learn from this experience and adopt a consistent framework right from the beginning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, an ethos of responsive regulation also requires the DPA to evaluate and revise directions and regulations periodically, in response to market and technology trends. A commitment to periodic evaluation of subordinate legislations entrenched in the rules is critical to reducing the dependence on officials and leadership, which may change. For instance, the &lt;a href="https://www.ibbi.gov.in/webadmin/pdf/whatsnew/2018/Oct/Mechanism%20for%20issuing%20regulations%20October%20after%20Board%20meeting%20final_2018-10-22%2020:42:06.pdf"&gt;IBBI&lt;/a&gt; has set out a mandatory review of regulations issued by it every three years.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Dedicating capacity for drafting subordinate legislations&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The DPA has been granted the discretion to appoint experts and staff its offices with the personnel it needs. A &lt;a href="https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/risk/deloitte-nl-risk-reports-resources.pdf"&gt;study&lt;/a&gt; of European data protection authorities shows that by the time the General Data Protection Regulation, 2016 became effective, most of the authorities increased the number of employees with some even reporting a 240% increase. The annual spending on the authorities also went up for most countries. While these authorities do not necessarily frame subordinate legislations, they nonetheless create guidance toolkits and codes of practice as part of their supervisory functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, the DPA will need to ensure it has dedicated capacity in-house to draft subordinate legislations. Since regulators are generally seen as enforcement authorities, there is inadequate investment in capacity-building for drafting legislations in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Moreover, considering the multiplicity of instruments and guidance documents the DPA is expected to issue, it may seek to create templates for these instruments, along with compulsory constituents of different types of instruments. For instance, the Office of the Australian Information Commissioner is required to include a &lt;a href="https://www.oaic.gov.au/privacy/guidance-and-advice/guidelines-for-developing-codes/"&gt;mandatory set of components&lt;/a&gt; while issuing or approving binding industry codes of practice.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019 (in the final form recommended by the JPC and accepted by the MeitY) will usher in a new chapter in India’s data protection timeline. While the Bill will finally effectuate a nearly comprehensive data protection framework for India, it will also establish a new regulatory framework that sets up a new regulator, the DPA, to oversee the new data protection law. This DPA will be empowered to regulate entities across sectors and is likely to determine the success of the data protection law in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA must not only contend with the complexity of markets and the fast pace of technological change, but it must also address &lt;a href="https://blog.theleapjournal.org/2018/02/a-pragmatic-approach-to-data-protection.html"&gt;anticipated&lt;/a&gt; regulatory capacity deficits, low levels of user literacy, the number and diversity of enities within its regulatory ambit, and the need to secure individual privacy within and outside the digital realm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus, looking ahead, we must account for the questions of governance that the forthcoming DPA is likely to face, as these will directly impact how entities and citizens engage with the DPA. In India, regulatory agencies adopt distinct choices to fulfil their functions. Regulators have also &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;fared variably&lt;/a&gt; in ensuring transparent and accountable decision-making driven by demonstrable expertise. Even if the final form of the PDP Bill does not address these gaps, the DPA has the opportunity to integrate benchmarks and best practices as discussed above within its own governance framework from the get-go as it takes on its daunting responsibilities under the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;The authors are Research Fellow, Law, Technology and Society Initiative and Project Lead, Regulatory Governance Project respectively at the National Law School of India University, Bangalore. Views are personal.)&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;&lt;em&gt;This post was reviewed by Vipul Kharbanda and Shweta Mohandas&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;For a discussion on distinct regulatory choices, please see TV Somanathan, &lt;em&gt;The Administrative and Regulatory State&lt;/em&gt; in Sujit Choudhary, Madhav Khosla, et al. (eds), &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;Oxford Handbook of the Indian Constitution&lt;/a&gt; (2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;On best practices for consultative law-making, see generally &lt;em&gt;European Union Better Regulation &lt;/em&gt;&lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;&lt;em&gt;Communication&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;Guidelines for Effective Regulatory Consultations &lt;/em&gt;(&lt;a href="https://www.tbs-sct.gc.ca/rtrap-parfa/erc-cer/erc-cer-eng.pdf"&gt;Canada&lt;/a&gt;),&amp;nbsp; and&lt;em&gt; &lt;/em&gt;&lt;a href="https://read.oecd-ilibrary.org/governance/the-governance-of-regulators_9789264209015-en#page81"&gt;&lt;em&gt;OECD&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;&lt;em&gt;Best Practice Principles for Regulatory Policy: The Governance of Regulators&lt;/em&gt;,&lt;em&gt; 2014.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(3).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(4).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 51.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill'&gt;https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Trishi Jindal and S.Vivek</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2021-11-10T07:32:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/beyond-sharing">
    <title>Beyond Sharing: Towards our Digital Futures</title>
    <link>https://cis-india.org/internet-governance/beyond-sharing</link>
    <description>
        &lt;b&gt;The battle is not about file sharing and a petty film producer wanting to rake in the box office earnings. It is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.downtoearth.org.in/content/beyond-sharing-towards-our-digital-futures"&gt;Down to Earth published Nishant Shah's Op-ed on May 31, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Unless you have been hiding under an analogue rock, wearing a tin-foil hat and staying away from electricity, chances are you have heard about the recent court order that bans access to a massive number of file-sharing websites from India. A John Doe order by the Madras High Court, following a complaint by the producers of the movie 3, has meant Internet Service Providers across the country have had to deny access to a number of websites that have been listed as providing free access to copyrighted material. In an attempt to ensure box-office collections for their movie, whose claim to fame, ironically, is the viral ‘Kolaveri Di’ song that had captured the country’s pulse last year, the producers have now denied access to something that is the basic function of anybody immersed in Web 2.0 environments–sharing of information.&lt;/p&gt;
&lt;p&gt;Much has been written about this ban. The battlelines are clearly drawn and from both sides we have strong arguments being made for and against piracy. Various media and culture industry people are supporting this ban, recounting losses that they have made because of people accessing pirated material online. Hacker and civil liberties groups are decrying this heavy censorship, providing numerous instances of how piracy has actually helped cultural productions gain more fame and money than they would have otherwise. There are yet others, who, while they respect the rights of the right-holders to protect themselves against copyright infringement, are furious that this blanket ban also disallows them to access material which was under a public license and material that they had produced and shared through these networks. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;International Hacker groups like Anonymous are mobilising people in large numbers to come to the streets as a sign of protest against such draconian measures.&lt;/p&gt;
&lt;p&gt;Most of these debates eventually are at loggerheads, with each side becoming louder and shriller, their positions attaining cult-like devotion and faith. In this cacophony there are some other points which get missed out. This issuance of the John Doe order has betrayed some startling flaws in how the Internet is governed in India and the alarming implications it has to the future of free, open and inclusive information societies.&lt;/p&gt;
&lt;p&gt;One thing that this court order has made excruciatingly clear is how the Internet is not the utopian space of exchange, collaboration, crowd sourcing and sharing it was meant to be. Despite the government’s own investments in building digital infrastructure, and its rhetoric of becoming more accountable, transparent and accessible by granting digital access to the citizens, it is obvious that this is still a space that is looked at with great suspicion.&lt;/p&gt;
&lt;p&gt;It comes as a shock to many of us that a high court issued an order which does not only impinge on freedom of speech and expression, but also fails to understand the nature of the Internet. In all reality, this ban is a farce. Everybody who has been used to the shared cultures of the online world, has found proxy servers and Internet anonymisers which allow them to hide their identity and continue with their everyday practice online. The cool kids are already doing this anyway. All we have is a stark realisation that the state might be investing heavily in digital technologies but it still has not been able to get out of the centralised broadcast ways of thinking about it.&lt;/p&gt;
&lt;p&gt;All sharing is not piracy. Some of it is just actually sharing. All debates seem to centre only around the copyrighted material being accessed through the file sharing websites. It is a concern which is legitimate. What about all the material that is in the public domain, in the commons and available for free? The user generated content, content which might not have direct economic value but is valuable to the people who created and shared it, is also now inaccessible. In order to protect some people from piracy we have also violated the rights of many more to share. And that is a distinction that is worth preserving, as we increasingly move into becoming an information society.&lt;/p&gt;
&lt;p&gt;In the Web 2.0 world, we are all producers of data. We not only leave traces but also put out material of cultural significance–from videos of dancing babies to knowledge that we want to share–through these peer-2-peer networks. A sudden collapse of this infrastructure almost seems to show how it is only the money-making material that is important to the state and not the other.&lt;/p&gt;
&lt;p&gt;There is not going to be a clear, correct position in this case against file-sharing. The legal technicalities will always be hollow in the face of ideologies of openness and inclusion. The moral indignation will always be countered by facts and numbers. But in the middle of all the fights and discussions, it is also good to pay attention to what is at stake. This battle is not merely about file sharing, though there is nothing “mere” about file sharing. This battle is not about a petty film producer wanting to rake in the box office earnings. This battle is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/p&gt;
&lt;p&gt;The way we resolve these differences is going to determine the future of what it means to be public, open, free, and inclusive. Those of us who are fighting to get the word out, are not doing it only because the access to our favourite cultural products has become cumbersome, but because scared that this might well be the beginning of the end of all that we had dreamt of our digital futures.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/beyond-sharing'&gt;https://cis-india.org/internet-governance/beyond-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-01T04:39:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable">
    <title>Beyond Scale: How to make your digital development program sustainable</title>
    <link>https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable</link>
    <description>
        &lt;b&gt;A dissemination workshop was organized by BBC Media Action, with support from the Digital Impact Alliance and the Bill &amp; Melinda Gates Foundation on February 21, 2018 in Bangalore. Sunil Abraham participated in the workshop.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;9.00 to 9.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Registration and coffee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;9.50 to 10.05&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to ‘&lt;i&gt;Beyond Scale’&lt;/i&gt;, Kate Willson, CEO, Digital Impact Alliance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.15 to 11.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;‘Surviving the Valley of Death’, panel discussion with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rahul Mullick, ICT lead, Bill &amp;amp; Melinda Gates Foundation, India, &lt;/li&gt;
&lt;li&gt;Nehal Sanghavi, Senior Advisor for Innovation and Partnership, USAID, India&lt;/li&gt;
&lt;li&gt;Kate Wilson, CEO, Digital Impact Alliance&lt;/li&gt;
&lt;li&gt;Priyanka Dutt, Country Director, BBC Media Action&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Moderated by Sara Chamberlain, Digital Director, BBC Media Action&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.15 to 11.30 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.30 to 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the table workshop sessions&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.45 to 1.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each table works to identify solutions to some of the digital development sector’s most pressing challenges in the areas of organizational change management, regulatory compliance, legal protection and risk, public sector adoption, private sector business models, solution design, technical architecture for scale, partnerships and human capacity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1 PM to 2.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2.00 to 2.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each table finalizes its presentation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.00 to 4.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Presentations, Q&amp;amp;A and discussion of each table’s group work&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.15 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee will be served at the tables&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.30 to 4.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the ‘Expert Bar’&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.45 to 6.00 &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There will be one or more ‘experts’ in specific focus areas of the guide seated at each table. Participants are free to visit the tables that interest them to discuss their challenges and share their own expertise.  &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6.00 – 9.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Networking reception with open bar and snacks&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable'&gt;https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2018-02-26T14:23:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf'&gt;https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:19:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers</link>
    <description>
        &lt;b&gt;In the past few years, social networking sites have come to play a central role in intermediating the public’s access to and deliberation of information critical to a thriving democracy. In stark contrast to early utopian visions which imagined that the internet would create a more informed public, facilitate citizen-led engagement, and democratize media, what we see now is the growing association of social media platforms with political polarization and the entrenchment of racism, homophobia, and xenophobia.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There is a dire need to think of regulatory strategies that look beyond the ‘dumb conduit’ metaphors that justify safe harbor protection to social networking sites. Alongside, it is also important to critically analyze the outcomes of regulatory steps such that they do not adversely impact free speech and privacy. By surveying the potential analogies of company towns, common carriers, and editorial functions, this essay provides a blueprint for how we may envision differentiated intermediary liability rules to govern social networking sites in a responsive manner.&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Only months after Donald Trump’s 2016 election victory — a feat mired in controversy over alleged Russian interference using social media, specifically Facebook — Mark Zuckerberg remarked that his company has grown to serve a role more akin to government, rather than a corporation. Zuckerberg argued that Facebook was responsible for creating guidelines and rules that governed the exchange of ideas of over two billion people online. Another way to look at the same argument is to acknowledge that, today, a quarter of the world’s population (and of India) are subject to the laws of Facebook’s terms and conditions and privacy policies, and public discourse around the globe is shaped within the constraints and conditions they create. Social media platforms, like Facebook, wield hitherto unimaginable power to catalyze public opinions, causing a particular narrative to gather steam — that Big Tech can pose an existential threat to democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This, of course, is in absolute contrast to the early utopian visions which imagined that the internet would create a more informed public, facilitate citizen-led engagement, and democratize media. Instead, what we see now is the growing association of social media platforms with political polarization and the entrenchment of racism, homophobia, and xenophobia. The regulation of social networking sites has emerged as one of the most important and complex policy problems of this time. In this essay, I will explore the inefficacy of the existing regulatory framework, and provide a blueprint for how to think of appropriate regulatory metaphors to revisit it.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://itforchange.net/digital-new-deal/2020/11/01/beyond-public-squares-dumb-conduits-and-gatekeepers-the-need-for-a-new-legal-metaphor-for-social-media/"&gt; Click on to read the article&lt;/a&gt; published by IT for Change&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf" class="external-link"&gt;Download the PDF&lt;/a&gt; (34,328 Kb) to read the full article, pages 126 - 138.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers'&gt;https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:23:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/beyond-clicktivism">
    <title>Beyond Clicktivism </title>
    <link>https://cis-india.org/news/beyond-clicktivism</link>
    <description>
        &lt;b&gt;Moral support Hazare has in plenty. Count the missed calls, writes Debarshi Dasgupta in this article published in the Outlook on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;Want to commit sedition against the government?” “Join Dandi March-II.” “A Mahatma&amp;nbsp;announces a fast-unto-death.” These were some of the clarion calls that organisers of the protest against corruption led by Anna Hazare were making online. And people from all classes responded in massive numbers. Possibly fed up with the scale of the CWG and 2G scams and exasperated by the petty and mundane corruption they encounter daily.&lt;/p&gt;
&lt;p&gt;Anna Hazare and Jantar Mantar were among the top 10 global trending topics on Twitter on April 7 afternoon. “Earthquake named Anna Hazare lashes on corrupted Indian Politicians, epicenter India, it measures 1.22 Billion Richter Hearts,” said one. A disengaged youngster tweeted: “OK, enough of ignorance...time to read up on Anna Hazare.” On the ‘India Against Corruption’ page on Facebook, people from across the country left posts either announcing their local programme to support Hazare or asking for advice to organise one. Leaflets urged people to give a missed call on a Mumbai landline expressing support. With 6,00,000 missed calls, the organisers were urging more to call in to take that number to over 25 lakh.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, said the organisers of this social media campaign had adopted a “funnel approach”, in which they get people involved gradually. “Clicking on the ‘Like’ function on Facebook to making a call—they are increasing the action, incrementally getting people to become proper activists from being armchair slacktivists.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?271256"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/beyond-clicktivism'&gt;https://cis-india.org/news/beyond-clicktivism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-20T04:33:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy">
    <title>Beyond Anonymous: Shit people say on Internet piracy</title>
    <link>https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy</link>
    <description>
        &lt;b&gt;This post is a series of provocations around piracy, censorship and the state of Internet in India. Like all good tasting things, these observations need to be taken with a pinch of salt. But it is the hope of the author that this serves as a response to otherwise very persistent voices that have been demonizing file-sharing online.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/beyond-anonymous-shit-people-say-on-internet-piracy-335588.html"&gt;Firstpost published Nishant Shah's column along with the video that CIS and ALF had made on 'shit people say about piracy' as a lead story on June 7, 2012&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;9 June is going to be a big day in India, for all concerned with internet regulation, censorship and the current attacks on file-sharing.&lt;/p&gt;
&lt;p&gt;The International Hacker group Anonymous – a group that has become iconic with its members wearing Guy Fawkes mask as they mobilise protest and hacker attacks on what they see as tyrannical regimes – has called for marched protests in 16 Indian cities, to demand a free and open Internet.&lt;/p&gt;
&lt;p&gt;They have already started launching Denial of Service attacks and taking down websites owned by the Indian government to express their displeasure about the recent regulation of the internet. Whether or not their guerrilla tactics are efficient and effective, in the right or not, is something that has been discussed quite popularly.&lt;/p&gt;
&lt;p&gt;There are hordes of people who think of them as the NewAge Mutant Ninja Hackers, who are protecting our digital worlds from being clamped down. There are others who paint them as the Big Bad Wolf who huffed and puffed and will blow our houses away.&lt;/p&gt;
&lt;p&gt;You might be sympathetic, suspicious or scared of the emergence of such a ‘crowd vigilante’, sporting the slogan that has spawned Internet memes galore – Y U No Wake up? – But there is no doubt that the rise of such a collective signals how discourse around piracy, rights, and openness is no longer in the domain of the uber-geek and the academic researcher.&lt;/p&gt;
&lt;p&gt;These are concepts with very material realities that affect our everyday functioning and require not only better policies but also a more nuanced public discourse. Today, I look at some of the most ludicrous things that have been said about file-sharing, around the world, wondering why this idea of sharing has evoked such startling responses from different quarters.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and depression&lt;/strong&gt;: There has always been a concern about the physical well-being of internet users. From Internet addiction rehabilitation clinics in China to online support groups for internet addicts (I swear I am not making this up!), from doctors worried about posture and eye-sight to mothers concerned about violent video games, we thought we had heard it all.&lt;/p&gt;
&lt;p&gt;And then came the extraordinary study that suggested that file sharing might lead to depression. Or rather, if you are an avid file-sharer on the internet, you are prone to attacks of depression. This had the twitter world abuzz, where people were trying to make sense of this ‘scientific’ study that connected spending long hours on the interwebz with mental illness. A trending tweet just about summed up the situation, when it said, “File sharers are depressed only because of what is done to them when they share”.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and jobs&lt;/strong&gt;: There was a time when the Music and Film Industry Associations (MAFIA) around the world used to protest file sharing by painting a romanticised picture of the independent starving artists, from whose mouths, we stole morsels, as we shared their work without paying for it. But that argument collapsed in the days of Napster (remember that?) and it has been proven over and over again, that the artist almost always benefits from their work being shared.&lt;/p&gt;
&lt;p&gt;However, lately, research from respectable universities (expensively funded by respectable interested parties) have started hitting the real you, rather than the imagined artist. Every torrent being downloaded on the web is correlated with a lost job, because these companies can no longer afford to hire as many people as they used to, because of the growing losses. And then it goes into complicated mumbo-jumbo about how that one torrent that sits merrily on your computer, actually affects all the jobs to kingdom come and will be responsible for your children’s unemployment.&lt;/p&gt;
&lt;p&gt;They remain silent about the jobs lost because of the funding that went into buying supporting this research.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I am not a Pirate&lt;/strong&gt;: And lest you go away with the idea that the rest of the junta does not gaff, here are some of the gems that have come our way while working with people in the field. It is common, for instance, for people to take a moral stance on piracy, radiating a holier-than-thou ethical persona, without realising that recording that last IPL match to watch later on your tablet is also an act of piracy.&lt;/p&gt;
&lt;p&gt;Then there are those who only consume material pirated by others, happily ignoring the fact that the ring-tone that they copied from their friend is also an act of piracy. Ditto, people who claim “I am not a pirate”, meaning that they haven’t yet figured out the bittorrent system and hence go to the local corner shop to buy pirated DVDs of the latest releases. In their heads, they have paid somebody for the material and hence it must be alright.&lt;/p&gt;
&lt;p&gt;Piracy is not a one-point source process. It is a networked ecosystem, and I am still to find that one person who has never shared anything and make a video of them saying “I am not a pirate”. But that is probably just wishful thinking.&lt;/p&gt;
&lt;p&gt;There are many more such instances which make your mind boggle and your eyes goggle and you wonder if you heard it right for the first time. Do share your favourite ones if you can. In the meantime you might also want to look at the &lt;a class="external-link" href="http://youtu.be/xYjqe_n3sv8"&gt;new meme video ‘Sh!t People say about Piracy’&lt;/a&gt; that captures some of these responses in their absurdity.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;iframe src="http://www.youtube.com/embed/xYjqe_n3sv8" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;
&lt;p&gt;(Video by The Centre for Internet and Society , and the Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Follow the video on &lt;a class="external-link" href="http://www.youtube.com/watch?v=xYjqe_n3sv8&amp;amp;feature=youtu.be"&gt;YouTube&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy'&gt;https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T14:01:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion">
    <title>Beyond Access as Inclusion</title>
    <link>https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion</link>
    <description>
        &lt;b&gt;On 13 September, the day before the fifth Internet Governance Forum opens, CIS is coorganising in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting is to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet.&lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;One of the most attractive characteristics of the
Internet – and perhaps also one of the most debated ones – is its
empowering, democratising potential. In expositions in favour of
access to the Internet for all, this potential certainly often plays
a central role: as the Internet can help us to make our societies
more open, more inclusive, and more democratic, everybody should be
able to reap the fruits of this technology, it is argued. In other
words, in debates on access to the Internet, most of us take as our
&lt;em&gt;starting point&lt;/em&gt; the desirability of such access, for the above
reasons. But how justified is such a stance? Is an Internet-induced
democratic transformation of our societies what is actually happening
on the ground?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I would like to move away, in this blog post, from
the more traditional approaches to the issue of access, where debates
mostly veer towards issues of infrastructure (spectrum, backbones,
last mile connectivity, …) or, under the banner of “diversity”,
towards the needs of specific, disadvantaged communities (especially
linguistic minorities and the disabled). To remind us more sharply of
the issues at stake and of the wide range of human rights that need
our active attention to make our dreams a reality, I would like to
take a step back and to ask two fundamental questions regarding
access: why might access be important? And what do we actually have
access to?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Let me start, then, by exploring the first question:
why, actually, is Internet access important? In his canonical work on
the information age, and especially in the first volume on the rise
of the network society, Manuel Castells (2000) has perhaps provided
the most elaborate and erudite description of the ways in which new
technologies are restructuring our societies and our lives. We are
all all too familiar with the many and deep-seated ways in which the
Internet changes the manner in which we learn, play, court, pay, do
business, maintain relationships, dream, campaign. And yet, the exact
nature of the divide created by the unequal distribution of technical
infrastructure and access, despite being so very real, receives
relatively little attention: this divide is not simply one of
opportunities, it is crucially one of power. If in traditional
Marxist analysis the problem was that the oppressed did not have
access to the means of production, today, one could well argue, the
problem is that they do not have access to the means of communication
and information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Indeed, the Internet is not something that is simply
happening to us: there are people who are responsible for these new
evolutions. And so it becomes important to ask: who is shaping the
Internet? Who is creating this new world? Let us, by way of example,
consider some figures relating to Internet use in India. So often
hailed as the emerging IT superpower of the world, there are, by the
end of 2009, according to official government figures, in this
country of 1 billion 250 million people slightly more than 15 million
Internet connections. Of these, only slightly more than half, or
almost 8 million, are broadband connections – the rest are still
dial-up ones (TRAI 2010). The number of Internet users is of course
higher – one survey estimates that there are between 52 million and
71 million Internet users in urban areas, where the bulk of users is
still located (IAMAI 2010). But while this is a considerable number,
it remains a fraction of the population in a country so big. What
these figures put in stark relief, then, is that the poor and
marginalised are not so much excluded from the information society
(in fact, many have to bear the consequences of new evolutions made
possible by it in rather excruciating fashion), but rather, that they
are fundamentally excluded from shaping the critical ways in which
our societies are being transformed.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To have at least the possibility to access the
Internet is, then, of central significance in this context for the
possibility of participation it signals in the restructuring of our
societies at the community, national and global level, and this in
two ways: in the creation of visions of where our societies should be
going, and in the actual shaping of the architecture of our societies
in the information age.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we agree that access attains great significance
in this sense, then a second question poses itself, and that is: in
practice, what exactly are we getting access to? This query should be
of concern to all of us. With the increasing corporatisation of the
Internet and the seemingly growing urges of governments on all
continents to survey and control their citizens, new challenges are
thrown up of how to nurture the growth of open, inclusive, democratic
societies, that all of us are required to take an interest in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yet it is in the case of poor and marginalised
people that the challenges are most pronounced.&amp;nbsp; Efforts to
include them in the information society are disproportionately
legitimised on the basis of the contribution these can make to
improving their livelihoods. Initiatives, often using mobile
technology, that allow farmers to get immediate information about the
market prices of the produce they are intending to sell, are perhaps
the most well-known and oft-cited examples in this category. Other
efforts aim to improve the information flow from the government to
citizens: India has set up an ambitious network of Common Service
Centres, for example, that aim to greatly facilitate the access of
citizens to particular government services, such as obtaining birth
or caste certificates – and going by first indications, this also
seems to be succeeding in practice. Only rarely, however, do
initiatives to “include” the poor in the information society
address them as holistic beings who do not only have economic lives,
but political, emotional, creative and intellectual existences as
well.&amp;nbsp; This is not to say that economic issues are not of
importance. But by highlighting only this aspect of poor people's
lives, we promote a highly impoverished understanding of their
existences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The focus on a limited aspect of the poor's identity
- important as that aspect may be - has a function, however: it makes
it possible to hide from view the extremely restrictive terms on
which poor people are currently being integrated into the information
society. Even initiatives such as the Common Service Centres are in
fact based on a public-private-partnership model that explicitly aims
to “align [..] social and commercial goals” (DIT 2006: 1), and in
effect subordinates government service design to the requirements of
the CSC business model (Singh 2008). The point is not simply that we
need strong privacy and data protection policies in such a context –
although we clearly do. There is a larger issue here, which is that
efforts to include the poor in the information society, in the
present circumstances, really seem to simply integrate them more
closely into a capitalist system over which they have little control,
or to submit them to ever greater levels of government and corporate
surveillance. Their own capacity to give shape to the system in which
they are “included”, despite the oft-heralded capacities of the
Internet to allow greater democratic participation and to turn
everybody into a producer and distributor, as well as a consumer,
remains extremely limited.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such tendencies have not gone unnoticed. For
example, unlike in many other parts of the world, social movements in
India fighting against dams, special economic zones or mining
operations in forest areas - all initiatives that lead to large-scale
displacement – have not embraced technology as enthusiastically as
one might have expected. There are various reasons for this. Within
Indian nationalism, there have always been strands deeply critical of
technology, with Gandhi perhaps their most illustrious proponent. But
for many activists, technology often also already comes with an
ideological baggage: an application such as Twitter, for example, in
so many of its aspects is clearly manufactured by others, for others,
drawing on value sets that activists often in many ways are reluctant
to embrace. And such connotations only gain greater validity because
of the intimate connections that exist in India between the IT boom
and neoliberalism: technology has great responsibility for many of
the trends and practices these activists are fighting against. While
the Internet might have made possible many new publics, most
movements do not – as movements – recognise these publics as
their own (Kovacs, forthcoming).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To some extent, these are of course questions of the
extent of access that people are granted. But they also raise the
important issue of the value structure of the Internet. Efforts at
inclusion always take for granted a standard that is already set. But
what if the needs and desires of the many billions that still need to
be included are not served by the Internet &lt;em&gt;as it exists&lt;/em&gt;? What
if, for it to really work for them, they need to be able to make the
Internet a different place than the one we know today? While it is
obvious that different people will give different answers in
different parts of the world, such debates are complicated
tremendously by the fact that it is no longer sufficient to reach a
national consensus on the issues under discussion, as was the case in
earlier eras. The global nature of the Internet's infrastructure
requires that the possibility of differing opinions, too, needs to be
facilitated at the global level. What are the consequences of this
for the development of democracy?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For access to the Internet to be substantively
meaningful from a human rights perspective in the information age, it
is crucial, then, that at a minimum, the openness of the Internet is
ensured at all levels. Of course, openness can be considered a value
in itself. But perhaps more importantly, at the moment, it is the
only way in which the possibility of a variety of answers to the
pressing question of what shape our societies should take in the
information age can emerge. Open standards and the portability of
data, for example, are crucial if societies are to continue to decide
on the role corporations should play in their public life, rather
than having corporations &lt;em&gt;de facto&lt;/em&gt; rule the roost. Similarly,
under no circumstances should anyone be cut off from the Internet, if
people are to participate in the public life of the societies of
which they are members. And these are not just concerns for
developing countries: if recent incidents from France to Australia
are anything to go by, new possibilities facilitated by the Internet
have, at least at the level of governments, formed the impetus for a
clear shift to the right of the political spectrum in many developed
countries. In the developed world, too, the questions of access and
what it allows for are thus issues that should concern all. In the
information age, human rights will only be respected if such respect
is already inscribed in the very architecture of its central
infrastructure itself.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;List of References&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Castells, Manuel (2000). &lt;em&gt;The Rise of the Network
Society, 2&lt;sup&gt;nd&lt;/sup&gt; edition&lt;/em&gt;. Oxford: Blackwell.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Department of Information Technology (DIT) (2006).
&lt;em&gt;Guidelines for the Implementation of Common Services Centers
(CSCs) Scheme in States&lt;/em&gt;. New Delhi: Department of Information
Technology, Government of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Internet and Mobile Association of India (IAMAI)
(2010). &lt;em&gt;I-Cube 2009-2010: Internet in India&lt;/em&gt;. Mumbai: Internet
and Mobile Association of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Kovacs, Anja (forthcoming). &lt;em&gt;Inquilab 2.0?
Reflections on Online Activism in India&lt;/em&gt; (working title).
Bangalore: Centre for Internet and Society.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Singh, Parminder Jeet (2008). &lt;em&gt;Recommendations for a
Meaningful and Successful e-Governance in India&lt;/em&gt;. IT for Change Policy
Brief, IT for Change, Bangalore.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Telecom Regulatory Auhority of India (TRAI) (2010).
&lt;em&gt;The Indian Telecom Services Performance Indicators,
October-December 2009&lt;/em&gt;. New Delhi: Telecom Regulatory Auhority of
India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion'&gt;https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    

   <dc:date>2011-08-02T07:29:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global">
    <title>Between the Local and the Global: Notes Towards Thinking the Nature of Internet Policy</title>
    <link>https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global</link>
    <description>
        &lt;b&gt;This post by Nishant Shah is part of a series related to the 2014 Milton Wolf Seminar on Media and Diplomacy: The Third Man Theme Revisited: Foreign Policies of the Internet in a Time Of Surveillance and Disclosure, which takes place in Vienna, Austria from March 30 – April 1, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;The 2014 seminar is jointly organized  by the Center for Global Communication Studies (CGCS) at the University  of Pennsylvania’s Annenberg School for Communication, the American  Austrian Foundation (AAF), and the Diplomatic Academy of Vienna (DA).   For more information visit the &lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects-location.cgi?id=123"&gt;seminar webpage&lt;/a&gt; and &lt;a href="https://www.facebook.com/MiltonWolfSeminar"&gt;Facebook Page&lt;/a&gt;. Dr. Nishant Shah is the co-founder and &lt;a href="http://www.cis-india.org/"&gt;Director-Research at the Centre for Internet and Society, Bangalore&lt;/a&gt;, India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's post was published on April 1st, 2014 | &lt;a class="external-link" href="http://cgcsblog.asc.upenn.edu/2014/04/01/between-the-local-and-the-global-notes-towards-thinking-the-nature-of-internet-policy/"&gt;by cgcsblog&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;An imagined and perceived gap between the global and the local informs transnational politics and internet policy. The global views the local as both the site upon which the global can manifest itself as well as the microcosm that supports and strengthens global visions by providing mutations, adaptations and reengineering of the governance practices. The local is encouraged to connect with the global through a series of outward facing practices and policies, thus producing two separate domains of preservation and change.  On the one hand, the local, the organic and the traditional, needs to be preserved and make the transnational and the global the exotic other. On the other hand, the local also needs to be in a state of aspiration, transforming itself to belong to global networks of polity and policy that are deemed as desirable, especially for a development and rights based vision of societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these negotiations and transactions are often fruitful and local, national, and transnational structures and mechanics have been developed to facilitate this flow, this relationship is precarious. There is an implicit recognition that the local and the transnational, dialectically produced, are often opaque categories and empty signifiers. They sustain themselves through unquestioned presumptions of particular attributes that are taken for granted in these interactions. There have been many different metaphors that have been used to understand and explain these complex transfers of knowledge and information, resources and capital, bodies and ideologies. Vectors, Flows, Disjunctures, Intersections are some of the examples. However, with the rise of the digital technologies and vocabularies, especially the internet, the metaphor of the Network with its distributed nodes has become one of the most potent explanations of contemporary politics. This idea of living in networked worlds is so seductive and ‘common-sense,’ that it has become an everyday practice to think of the global as a robust, never-ending, all-inclusive network where the local becomes an important node because it enables both connectivity within but also an expansion of the edges, in order to connect to that which is outside the traffic capacities of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ‘Network Society’ paradigm is distinct from earlier rubrics of information and open society that have informed existing information and communication policies. In this paradigm we have the opportunity to revisit and remap the ways in which local governments and populations function and how they produce locals who can feed into the transnational and global discourse. The network facilitates some knowledge that is valuable and allows us to map inequity and mal-distribution of resources by offering comparisons between the different nodes. Networks force our attention to the edges, the no-person’s-zone which is porous but still serves as an osmotic filter that often keeps the underprivileged and the unintelligible outside its fold. Networks as metaphors are valuable because they produce a cartographic vision of the world with multiple boundaries and layers, dealing with big data sets to create patterns that might otherwise be invisible. They enable the replication of models that can be further localised and adapted to fit the needs of the context.  Networks make the world legible – we write it through the lens of the network, intelligible – we understand it through the language and vocabulary of the network, and accessible – it allows for knowledge and practices to transfer across geographies and times.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, networks are a vicious form of organisation because they work through the logic of resource maximisation, efficiency and optimisation, often disallowing voices of dissent that threaten the consensus making mechanisms of the network. Networks have a self-referential relationship with reality because they produce accounts of reality which can easily stand in for the material and the real. They are the new narratives that can operate with existing data sets and produce such rich insights for analysis that we forget to account for that which cannot be captured in the database structures of these data streams. Networks work through a principle of homogeneity and records, thus precluding forms of operation which cannot be easily quantified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given this complex nature of networks and the fact that they are emerging as the de facto explanations of not only social and cultural relationships but also economic and political transactions, it might be fruitful to approach the world of policy and politics, the local and the transnational, through the lens of the network. Building a critique of the network while also deploying the network as a way to account for the governmental practices might produce key insights into how the world operates. What does it mean to imagine the world in the image of the internet as a gigantic network? What are the ways in which a networked visualisation of policy and governmental processes can help us analyse and understand contemporary politics? What tools can we develop to expose the limitations of a network paradigm and look at more inclusive and sensitive models for public discourse and participation? How do we document events, people, and drivers of political change that often get overlooked in the networked imagination of transnational politics? These are the kind of questions that the Center for Global Communication Study’s Internet Policy Observatory (IPO) could initiate, building empirical, qualitative and historical research to understand the complex state of policy making and its relationship with enforcement, operationalization and localisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the scope and scale of these questions, there are a few specific directions that can be followed to ensure that research is focused and concentrated rather than too vague and generalised:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Bird’s eye views:&lt;/b&gt; The big picture understanding of  transnational political and policy networks is still missing from our  accounts of contemporary discourse. While global representative networks  of multi-stakeholder dialogues have been established, there is not  enough understanding of how they generate traffic (information,  knowledge, data, people, policies) within the network through the  different nodes. Producing an annotated and visual network map that  looks at the different structural and organisational endeavours and  presences, based on available open public data, bolstered by qualitative  interviews would be very useful both as a research resource but also an  analytic prototype to understand the complex relationships between the  various stakeholders involved in processes of political change. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Crisis Mapping:&lt;/b&gt; One of the most important things within Network studies is how the  network identifies and resolves crises. Crises are the moment when the  internal flaws, the structural weaknesses, and the fragile  infrastructure become visible. The digital network, like the internet,  has specific mechanisms of protecting itself against crises. However,  the appearance of a crisis becomes an exciting time to look at the  discrepancy between the ambition of the network and its usage. A crisis  is generally a symptom that shows the potentials for radical subversion,  overthrowing, questioning and the abuse of network designs and visions.  Locating ICT related crises with historical and geographical focuses  could similarly reveal the discrepancies of the processes of making  policy and orchestrating politics.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Longitudinal Studies:&lt;/b&gt; The network remains strong because it works through a prototype  principle. Consequently, no matter how large the network is, it is  possible to splice, slice, and separate a small component of the network  for deep dive studies. This microcosm offers rich data sets, which can  then be applied across the network to yield different results. Further,  working with different actors – from individual to the collective, from  the informal the institutional – but giving them all equal valency  provides a more equal view of the roles, responsibilities, and  aspirations of the different actors involved in the processes. This kind  of a longitudinal study, working on very small case-studies and then  applying them to analyse the larger social and political conditions help  in understanding the transnational and global processes in a new way.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;These research based inquiries could result in many different outputs based on the key users that they are working with and for. The methods could be hybrid, using existing local and experimental structures, with predefined criteria for rigour and robustness. The research, given its nature, would necessitate working with existing networks and expanding them, thus building strong and sustainable knowledge networks that can be diverted towards intervention through capacity building and pedagogy directed at the different actors identified within these nodes.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Dr. Nishant Shah is the co-founder and Director-Research at the Centre for Internet and Society, Bangalore, India. He is an International Tandem Partner at the Centre for Digital Cultures, Leuphana University, Germany and a Knowledge Partner with the Hivos Knowledge Programme, The Netherlands. In these varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He is the editor for a series of monographs on ‘Histories of Internet(s) in India’ that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He is also the principle researcher for a research programme that produced the four-volume anthology ‘Digital AlterNatives With a Cause?’ that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global'&gt;https://cis-india.org/internet-governance/blog/cgcs-nishant-shah-april-1-2014-between-the-local-and-the-global&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-04T03:49:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/best-practices-meet-2014">
    <title>Best Practices Meet</title>
    <link>https://cis-india.org/news/best-practices-meet-2014</link>
    <description>
        &lt;b&gt;The Best Practices Meet 2014 is being organized by DSCI at Hotel Leela Palace on July 9, 2014. Sunil Abraham will participate as a panelist at the event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;SMAC: new paradigm for Security?&lt;br /&gt;&lt;br /&gt;Convergence of Social, Mobile, Analytics, and Cloud, is collectively referred as SMAC technologies. The success of social media products and sites such as Facebook, Twitter, Linkedin many more has been driving organizations’ investment in social computing. Mobile is another example of how technologies invented initially for personal use, entrenched itself into the enterprise ecosystem. Social computing and mobile blurs the boundaries between personal, social and business transactions. They lead to the explosion of information, which provides interesting insights, critical for business benefits. This reflects in huge impetus that has been seen in analytics, widely known as Big Data analytics. On the other hand, cloud brings completely new paradigm of organizing entperise IT, developing new products and services and delivering consumer experiences.&lt;br /&gt;&lt;br /&gt;Increasing adoption of SMAC stack by enterprises breaks the existing paradigm of security. The data explosion on mobile devices exposes organizations’ information to inadvertent loss of revenue and brand value. Malicious applications may steal vital information stored on an employee’s mobile device and pave the way for a major data breach. Web application attacks remain the most significant threat for environments of cloud-hosting providers, amongst other apprehensions about data security. Data sovereignty also continue to pose serious concerns, which organizations need to tackle while moving their data to the cloud. Big data facilitates advanced analytics; however, requires protection from intrusion, corruption and securing its access. Furthermore, social media platforms are continuously exploited to launch malicious content and stealthy payload on devices. Social technologies are also plagued by the use of malicious techniques to mine confidential personal information under the guise of innocuous looking web pages via social engineering techniques.&lt;br /&gt;&lt;br /&gt;Apart from security concerns, privacy supposed to be a big causality, as each component of the SMAC stack is considered intrusive enough to compromise the personal rights. Convergence and nexus of them add to the woes.&lt;br /&gt;&lt;br /&gt;The collaborative and cumulative effect of all of these technologies working in unison essentially magnifies the efforts of the organizations that are able to wield them effectively. This evolution is challenging the ability of current security capabilities to address business critical risks. The way forward for organizations would be to understand the perspective of end users and IT infrastructure in terms of its integration with any or all the elements of SMAC. The organizations will have to deal with the new paradigm of security that will take them to more scalable, granualar, complex, independent and diverse challenges.&lt;br /&gt;&lt;br /&gt;The DSCI Best Practices Meet, 2014 brings the security community and other stakeholders together, to deliberate and ponder over these diverse set of issues and challenges. It is aimed at deliberating on the new security paradigm from the perspectives of public policy, enterprise strategies, technology and practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Click to download the agenda and &lt;a href="https://cis-india.org/internet-governance/blog/bpm-2014-meet.pdf" class="external-link"&gt;other details here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/best-practices-meet-2014'&gt;https://cis-india.org/news/best-practices-meet-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-06T06:25:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/best-bits">
    <title>Best Bits 2012</title>
    <link>https://cis-india.org/news/best-bits</link>
    <description>
        &lt;b&gt;Best Bits organized a workshop at the IGF. It was held on November 3 and 4, 2012. Pranesh Prakash and Elonnai Hickok participated in the event.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Day 1, Saturday, November 3, 2012&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9.00 - 10.45&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Internet governance history and review&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Mapping Internet governance – institutions and actors&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Last 20 years of Internet governance: ITU, ISOC, WSIS and IGF&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Last 2 years – ACTA, SOPA/PIPA and online activism eg. StopTheMeter.ca, government assertions of sovereignty over IG&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Southern perspectives on global Internet governance&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00 - 12.45&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;The ITU and the International Telecommunications Regulations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the real dangers of the proposed ITR revisions?&lt;/li&gt;
&lt;li&gt;Remaining opportunities for input into the WCIT process&lt;/li&gt;
&lt;li&gt;How to engage with your national delegation to the ITU&lt;/li&gt;
&lt;li&gt;Beyond WCIT – WTPF, WTSA, IMPACT, and the Dedicated Group&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.45 - 14.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch and networking break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00 - 17.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Drafting a civil society statement to WCIT&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid51"&gt;
&lt;ul&gt;
&lt;li&gt;Draws together points of consensus&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid52"&gt;
&lt;ul&gt;
&lt;li&gt;Defines the legitimate role of the ITU&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid53"&gt;
&lt;ul&gt;
&lt;li&gt;Judges it against the WSIS criteria&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid54"&gt;
&lt;ul&gt;
&lt;li&gt;Refers to statement on IG principles&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, Sunday, November 4, 2012&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9.00 - 10.30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Declarations of Internet rights and Internet governance principles&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid59"&gt;
&lt;ul&gt;
&lt;li&gt;Background to Internet principles declarations 1999 to 2012&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid60"&gt;
&lt;ul&gt;
&lt;li&gt;Declaration of Internet Freedom – first and second iterations&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid61"&gt;
&lt;ul&gt;
&lt;li&gt;Other current initiatives – “rival” Declaration, Marco Civil, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid62"&gt;
&lt;ul&gt;
&lt;li&gt;Respective advantages of consolidation and maintaining diversity&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.45 - 12.15&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Process towards enhanced cooperation on Internet public policy issues&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid66"&gt;
&lt;ul&gt;
&lt;li&gt;If not the ITU, then what?&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid67"&gt;
&lt;ul&gt;
&lt;li&gt;The global vacuum on Internet-related public policy issues&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid68"&gt;
&lt;ul&gt;
&lt;li&gt;Likely scenarios (favourable or not) if the vacuum is not filled&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid69"&gt;
&lt;ul&gt;
&lt;li&gt;Discussion of reform proposals – Committee on Internet Related Policies, Enhanced Cooperation Task Force&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 - 13.00&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Lunch and networking break&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00 - 16.00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Drafting civil society IG principles for the IGF&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid75"&gt;
&lt;ul&gt;
&lt;li&gt;Development of existing statements&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid76"&gt;
&lt;ul&gt;
&lt;li&gt;Reinforces multi-stakeholder approach&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid77"&gt;
&lt;ul&gt;
&lt;li&gt;Suggests roadmap for improved implementation of enhanced cooperation&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.15 - 17.45&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Next steps&lt;/b&gt;&lt;/p&gt;
&lt;div id="magicdomid81"&gt;
&lt;ul&gt;
&lt;li&gt;Making an inclusive civil society network on IG issues sustainable&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid82"&gt;
&lt;ul&gt;
&lt;li&gt;Other existing civil society+ networks – Internet Defence League,  Internet Governance Caucus, Global Network Initiative, CSISAC, OpenMedia  network, Internet Progress Administration&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div id="magicdomid83"&gt;
&lt;ul&gt;
&lt;li&gt;Recap of upcoming events and campaigns for possible joint action&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Participants&lt;/p&gt;
&lt;ul&gt;
&lt;li class="author-profile" id="user-11"&gt;Alejandro Pisanty                      &lt;a href="http://pisanty.blogspot.com"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Professor at UNAM, Mexico. Chair of ISOC Mexico. Former member of WGIG, IGF MAG, ISOC Board of Trustees, ICANN Board of Directors."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-32"&gt;Andrew Puddephatt                               &lt;span class="add-tooltip with-icon" title="Global Partners"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-51"&gt;Anja Kovacs                               &lt;span class="add-tooltip with-icon" title="Internet Democracy Project"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-47"&gt;Anna Orlova                               &lt;span class="add-tooltip with-icon" title="Humboldt Universität zu Berlin"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-40"&gt;Anriette Esterhuysen                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-37"&gt;Antonio Medina Gomez                               &lt;span class="add-tooltip with-icon" title="Gobernanza de Internet Colombia"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-38"&gt;Arthit Suriyawongkul                               &lt;span class="add-tooltip with-icon" title="Thai Netizen Network"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-44"&gt;Ashnah Kalemera                               &lt;span class="add-tooltip with-icon" title="Collaboration on International ICT Policy for East and Southern Africa (CIPESA)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-16"&gt;Avri Doria                               &lt;span class="add-tooltip with-icon" title="dotgay"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-74"&gt;bdelachapelle &lt;/li&gt;
&lt;li class="author-profile" id="user-18"&gt;Brett Solomon                               &lt;span class="add-tooltip with-icon" title="Access (accessnow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-55"&gt;Carlos Alberto Afonso                      &lt;a href="http://www.nupef.org.br"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-2"&gt;Claudio Ruiz                      &lt;a href="http://www.derechosdigitales.org/"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-31"&gt;Deborah Brown                               &lt;span class="add-tooltip with-icon" title="Access (www.Accessnow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-25"&gt;Dixie Hawtin                               &lt;span class="add-tooltip with-icon" title="Global Partners &amp;amp; Associates"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-78"&gt;Donny B U &lt;/li&gt;
&lt;li class="author-profile" id="user-35"&gt;Elonnai Hickok                               &lt;span class="add-tooltip with-icon" title="Centre for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-7"&gt;Emma Llanso                               &lt;span class="add-tooltip with-icon" title="Policy Counsel, Center for Democracy &amp;amp; Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-61"&gt;Fouad Bajwa                      &lt;a href="http://internetsgovernance.blogspot.com"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Public Policy Analysis, Research and Advocacy."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-22"&gt;Gene Kimmelman                               &lt;span class="add-tooltip with-icon" title="Global Partners &amp;amp; Associates"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-27"&gt;Iarla Flynn                               &lt;span class="add-tooltip with-icon" title="Google"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-36"&gt;Imran Ahmed Shah                               &lt;span class="add-tooltip with-icon" title="Internet Governance Forum of Pakistan"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-1"&gt;Jeremy Malcolm                      &lt;a href="http://A2Knetwork.org/"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Senior Policy Officer, Consumers International"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-43"&gt;Joana Varon Ferraz                               &lt;span class="add-tooltip with-icon" title="Center for Technology and Society (CTS/FGV)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-29"&gt;Jochai Ben-Avie                               &lt;span class="add-tooltip with-icon" title="Access (AccessNow.org)"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-28"&gt;Joonas Mikael Mäkinen                               &lt;span class="add-tooltip with-icon" title="Electronic Frontier Finland"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-6"&gt;Joy Liddicoat                      &lt;a href="http://rights.apc.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-30"&gt;Katitza Rodriguez                               &lt;span class="add-tooltip with-icon" title="EFF"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-20"&gt;Kevin Bankston                               &lt;span class="add-tooltip with-icon" title="Center for Democracy &amp;amp; Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-65"&gt;LAURA ABBA &lt;/li&gt;
&lt;li class="author-profile" id="user-23"&gt;matthew shears                               &lt;span class="add-tooltip with-icon" title="CDT - Center for Democracy and Technology"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-48"&gt;Mawaki Chango                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-39"&gt;Michael Gurstein                               &lt;span class="add-tooltip with-icon" title="Centre for Community Informatics Research, Development and Training"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-15"&gt;Nnenna Nwakanla &lt;/li&gt;
&lt;li class="author-profile" id="user-8"&gt;Norbert Bollow                               &lt;span class="add-tooltip with-icon" title="Swiss Open Systems User Group /ch/open"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-24"&gt;Parminder Jeet Singh                               &lt;span class="add-tooltip with-icon" title="IT for Change, India"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-34"&gt;Pranesh Prakash                               &lt;span class="add-tooltip with-icon" title="Centre for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-21"&gt;Premila Kumar                               &lt;span class="add-tooltip with-icon" title="Consumer Council of Fiji"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-26"&gt;Raquel Gatto                               &lt;span class="add-tooltip with-icon" title="NIC.br"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-17"&gt;Rashmi Rangnath                               &lt;span class="add-tooltip with-icon" title="Public Knowledge"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-62"&gt;Sanja_Kelly &lt;/li&gt;
&lt;li class="author-profile" id="user-53"&gt;Shahzad Ahmad                               &lt;span class="add-tooltip with-icon" title="Bytes for All, Pakistan"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-52"&gt;Shita Laksmi                               &lt;span class="add-tooltip with-icon" title="Hivos"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-66"&gt;STEFANO TRUMPY &lt;/li&gt;
&lt;li class="author-profile" id="user-49"&gt;Stephanie Borg Psaila                               &lt;span class="add-tooltip with-icon" title="DiploFoundation"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-77"&gt;Sylwia Rudnik                               &lt;span class="add-tooltip with-icon" title="ISOC Poland Chapter Ambassador"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-33"&gt;Tapani Tarvainen                               &lt;span class="add-tooltip with-icon" title="Electronic Frointier Finland"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-41"&gt;Theresa Züger                               &lt;span class="add-tooltip with-icon" title="Humboldt Inistute for Internet and Society"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-19"&gt;Valeria Betancourt                               &lt;span class="add-tooltip with-icon" title="Association for Progressive Communications"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-9"&gt;William Drake                      &lt;a href="http://williamdrake.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="William J. Drake is an International Fellow and Lecturer in the Institute of Mass Communication and Media Research at the University of Zurich, as well as a consultant, based in Geneva.  Current activities include serving as co-editor of the MIT Press book series, The Information Revolution and Global Politics; an elected representative of noncommercial users on the Council of the Generic Names Supporting Organization, and on the Board of Directors of the European At Large Organization, in the Internet Corporation for Names and Numbers; a member of the Multistakeholder Advisory Group of the Internet Governance Forum; a member of the Civil Society Information Society Advisory Council of the Organization for Economic Cooperation and Development;  a member of the Group of High-Level Advisors of the UN Global Alliance for ICT and Development; a core faculty member in the European and South Schools on Internet Governance; a founding member of Global Internet Governance Academic Network and the civil society Internet Governance Caucus; and an Affiliated Researcher of the Institute for Tele-Information at Columbia University.  In December 2012, he will serve on the US delegation to ITU’s World Conference on International Telecommunications treaty negotiation.  Some previous positions held include, Senior Associate of the Centre for International Governance at the Graduate Institute of International and Development Studies in Geneva; President of Computer Professionals for Social Responsibility; Senior Associate and Director of the Project on the Information Revolution and World Politics at the Carnegie Endowment for International Peace; founding Associate Director of the Communication, Culture and Technology Program at Georgetown University; and Assistant Professor of Communication at the University of California, San Diego.  Some previous activities have included serving as a member of the UN Working Group on Internet Governance; Working Group 1 of the UN Information and Communication Technologies Task Force; and the World Economic Forum Task Force on the Global Digital Divide.   Drake received his Ph.D. in Political Science from Columbia University.  Some of his publications include: Editor, Internet Governance: Creating Opportunities for All---The Fourth Internet Governance Forum (United Nations, 2010); Co-Editor, Governing Global Electronic Networks: International Perspectives on Policy and Power (MIT Press, 2008); Editor, Reforming Internet Governance: Perspectives from the UN Working Group on Internet Governance (United Nations, 2005); and Editor, The New Information Infrastructure: Strategies for US Policy (Century Foundation, 1995)."&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-46"&gt;Wolfgang Kleinwächter &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Attending Remotely&lt;/h3&gt;
&lt;ul&gt;
&lt;li class="author-profile" id="user-50"&gt;AHM Bazlur Rahman                               &lt;span class="add-tooltip with-icon" title="Bangladesh NGOs Network for Radio and Communication"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-81"&gt;Alex Comninos                      &lt;a href="http://comninos.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="Doctoral Candidate, Department of Geography, Justus-Liebig University Giessen"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-68"&gt;Baudouin SCHOMBE                      &lt;a href="http://akimambo.unblog.fr"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-56"&gt;chaitanyabd &lt;/li&gt;
&lt;li class="author-profile" id="user-59"&gt;cveraq &lt;/li&gt;
&lt;li class="author-profile" id="user-80"&gt;De &lt;/li&gt;
&lt;li class="author-profile" id="user-70"&gt;encels &lt;/li&gt;
&lt;li class="author-profile" id="user-75"&gt;Fatima Cambronero &lt;/li&gt;
&lt;li class="author-profile" id="user-63"&gt;ganda                      &lt;a href="https://me.yahoo.com/a/NT_ueU1w18ryXb5juaCg6wfMhQ--#cbcd9"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-72"&gt;Hanane &lt;/li&gt;
&lt;li class="author-profile" id="user-13"&gt;Hindenburgo Francisco Pires                      &lt;a href="http://www.cibergeo.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-71"&gt;Jorge Gonzalez &lt;/li&gt;
&lt;li class="author-profile" id="user-60"&gt;Julian Casasbuenas G.                      &lt;a href="http://www.colnodo.apc.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-67"&gt;Lorna Tingu Makuma &lt;/li&gt;
&lt;li class="author-profile" id="user-54"&gt;Narine Khachatryan                               &lt;span class="add-tooltip with-icon" title="Media Education Center, Armenia"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-76"&gt;natienciso &lt;/li&gt;
&lt;li class="author-profile" id="user-42"&gt;Pitshou Bulembi Ndongala                               &lt;span class="add-tooltip with-icon" title="Groupe de Recherche-Action pour le Développement Intégral"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-58"&gt;richaraix &lt;/li&gt;
&lt;li class="author-profile" id="user-73"&gt;rohanjay                      &lt;a href="http://www.indexoncensorship.org"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-64"&gt;Siranush Vardanyan &lt;/li&gt;
&lt;li class="author-profile" id="user-14"&gt;Sonigitu Asibong Ekpe                      &lt;a href="http://www.crossriverstate.gov.ng"&gt;&lt;img src="http://bestbits.igf-online.net/wp-content/themes/expo18/img/icons/0093.png" /&gt;&lt;/a&gt; &lt;span class="add-tooltip with-icon" title="I am from Nigeria, currently working with the Cross River State Ministry of Agriculture and Natural Resources as a Senior Fisheries Officer with an ad-hoc duty as a Project Support Officer [Agriculturist] in the Cross River Farm Credit Scheme. I hold an M.Sc degree in Forestry and Environmental Management    A great advocate for Global Governance, with the Internet serving as a basis to supporting the move from MANIPULATED / GROUPTHINK POWER to COLLECTIVE INTELLIGENCE POWER and ultimately to PUBLIC WISDOM POWER, from the "&gt;&lt;/span&gt; &lt;/li&gt;
&lt;li class="author-profile" id="user-79"&gt;Susan Coughtrie &lt;/li&gt;
&lt;li class="author-profile" id="user-57"&gt;thierrys &lt;/li&gt;
&lt;li class="author-profile" id="user-69"&gt;vinsolo &lt;/li&gt;
&lt;li class="author-profile" id="user-45"&gt;Virginia Paque                               &lt;span class="add-tooltip with-icon" title="DiplpFoundation"&gt;&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/best-bits'&gt;https://cis-india.org/news/best-bits&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-06T06:46:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel">
    <title>Bengaluru gives data safety tips to panel</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel</link>
    <description>
        &lt;b&gt;A crucial consultation ahead of the framing of the country's data protection laws witnessed animated discussions here on Saturday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.deccanherald.com/content/653716/bengaluru-gives-data-safety-tips.html"&gt;Deccan Heral&lt;/a&gt;d on January 14, 2018&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Participants raised a variety of concerns. Held on the IISc campus, it discussed everything from revenge porn and human genomics to artificial intelligence and the right to be forgotten.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cybersecurity experts, academics, lawyers and others attended the day-long event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They made their submissions to the Srikrishna Committee, formed on July 31 last year to frame principles for data protection laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The session was chaired by Justice B N Srikrishna, retired Supreme Court judge. Also on the panel were Rama Vedashree, CEO, Data Security Council of India, and Gopalakrishnan S.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The basis of the discussion was a 200-page document drafted by the nine members of the Srikrishna Committee. January 31 is the deadline to respond to the committee's white paper.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Classification of data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several dystopian scenarios, such as profiling and discrimination with the help of behavioural and psychometric data, led to discussions on the need for classification of data types.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Darshana, a lawyer from the People's Union of Civil Liberties (PUCL), spoke about how people were being denied rations for not holding Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The collection of children's biometric data brought up the question of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srikrishna clarified the white paper contained a chapter on consent: it suggests an age limit below which parental consent will have to be mandatory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A discussion on the right to be forgotten arose after some participants sought a provision to revoke consent already given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions associated with genome sequencing were raised by Vijay Chandru, professor, IISc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We need to pay special attention to this type of information. The collection of DNA in the form of saliva, when, say, you make a visit to a weight loss clinic, has become the commercial norm. The Insurance Regulatory Act can have huge implications as genetic data can be used to discriminate and deny health coverage," Chandru said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, head of the Centre for Internet and Society, said he was delighted with the quality of debate and discussion.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel'&gt;https://cis-india.org/internet-governance/news/deccan-herald-january-14-2018-pranshu-rathee-bengaluru-gives-data-safety-tips-to-panel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:19:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm">
    <title>Bengaluru cops' twitter handle in ethical storm</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm</link>
    <description>
        &lt;b&gt;The city's privacy activists are among the most strident in trying to prevent the Union government from gaining unprecedented access to citizens' personal information through Aadhaar. But in their own backyard, Bengaluru police have been publishing on Twitter the phone numbers of thousands of citizens reporting various crimes such as gambling on the streets, random quarrels and harassment of women.&lt;/b&gt;
        &lt;p&gt;The article by Umesh Yadav was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/bengaluru-cops-twitter-handle-in-ethical-storm/articleshow/58042187.cms"&gt;published in the Times of India&lt;/a&gt; on April 6, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The police control room has put out more than 46,000 tweets since April  2015 containing the numbers of complainants calling the emergency number  100. The phone numbers of citizens reaching the control room through  Bengaluru police's new emergency &lt;a href="http://economictimes.indiatimes.com/topic/mobile-application" target="_blank"&gt;mobile application&lt;/a&gt;, Suraksha, too are being published through this handle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thankfully, the Twitter handle, @BCPCR, had a mere 66 followers as on  the evening of April 5, nearly 30 per cent of which were various police  stations in the city. On Wednesday evening, the police closed the  account for public view.  &lt;br /&gt; &lt;br /&gt; ET has screenshots of tweets from  the account. A senior police officer at Bengaluru police's Command  Control was unapologetic for the breach of privacy. The tweets are  generated automatically and meant to `show' the number of calls received  by the control room and the number of people using the new app, he  said.  &lt;br /&gt; &lt;br /&gt; On the matter of compromising the safety of the  complainants, the officer said, "It is obvious that the accused will  know who registered the complaint and privacy does not matter here."  &lt;br /&gt; &lt;br /&gt; Expectedly, privacy and law experts are indignant.  &lt;br /&gt; &lt;br /&gt; "This is horrible and unpardonable," said Supreme Court advocate KV  Dhananjay. "The fact that the police did not consider it necessary to  ask for permission before broadcasting someone's identity shows how  insensitive the Police Commissioner's office has become to the privacy  concern of our society." Pranesh Prakash, Policy Director at the &lt;a href="http://economictimes.indiatimes.com/topic/Centre-for-Internet-and-Society" target="_blank"&gt;Centre for Internet and Society&lt;/a&gt; and who has been at the forefront of the campaign against any potential  misuse of Aadhaar, too said the "police officer who ordered to create  such an account should be held responsible if any harm comes to a  complainant."  &lt;br /&gt; &lt;br /&gt; Complainants ET spoke with were startled  about the abuse of their privacy. Gowda, a complainant, who had informed  the police control room about the sale of cigarettes within 100 metres  of a school, had specifically requested the police to not disclose his  identity.  &lt;br /&gt; &lt;br /&gt; "(This is why) it is better to keep quiet when  you see lawbreakers," he said on hearing that Bengaluru police had  published his phone number on Twitter.  &lt;br /&gt; &lt;br /&gt; "This is injustice  and this is the reason why people are scared to inform the police of  crimes. If the accused send people to beat me, what should I do?"  Dhanusha had called the control room about some teenagers who were  teasing girls at a bus stop. The police arrived and took the boys in.  She, too, is now worried. "If the accused get my number, they are going  to harass me. The police do not have any right to display our phone  numbers in public."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-april-6-2017-umesh-yadav-bengaluru-cops-twitter-handle-in-ethical-storm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T02:38:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
