<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2726 to 2740.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/apps-can-give-personal-information-to-strangers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kashmir-watch-february-25-2019-any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anti-social-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2012-bulletin">
    <title>April 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2012-bulletin</link>
    <description>
        &lt;b&gt;In this issue of our newsletter, we bring you updates of our latest research, event reports, videos, news and media coverage during the month of April 2012:&lt;/b&gt;
        &lt;h2&gt;Internet Governance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Google Policy Fellowship&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;Intermediary      Liability in India: Chilling Effects on Free Expression on the Internet&lt;/a&gt;&lt;br /&gt;Rishabh Dara, Google Policy Fellow&lt;br /&gt;CIS in partnership with Google India conducted the Google Policy Fellowship 2011. This was offered for the first time in Asia Pacific as well as in India. Rishabh Dara was selected as a fellow. He researched upon issues relating to freedom of expression. The results of the paper demonstrate that the ‘Information Technology (Intermediaries Guidelines) Rules 2011’ notified by the Government of India on April 11, 2011 have a chilling effect on free expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Announcement&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cis-joins-gni"&gt;The Centre for Internet &amp;amp; Society Joins the Global Network Initiative&lt;/a&gt;&lt;br /&gt;CIS officially joined the Global Network Initiative. CIS would bring to GNI in-depth expertise on global internet governance as well as online freedom of expression and privacy in India. GNI Executive Director Susan Morgan said “&lt;i&gt;We are delighted to add our first member based in India and welcome CIS’s engagement in support of transparency and accountability in technology&lt;/i&gt;.”&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Op-ed in the Hindu&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/chilling-effects-frozen-words"&gt;Chilling      Effects and Frozen Words&lt;/a&gt; (Lawrence Liang, Hindu, April 30,      2012): “What if the real danger is not that we lose our freedom of speech      and expression but our sense of humour as a nation?...One hopes that our      lawmakers, even if they are averse to reading the Indian Constitution,      will be slightly more open to the poetic licence granted by Kautilya.” &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Columns in the Indian Express&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/idea-of-the-book"&gt;The Idea of the Book&lt;/a&gt; (Nishant Shah, Indian Express, April 8, 2012): “Its future lies in a trans-media format that is ever evolving... The form of the book is going to change as it has over the last 500 years. However, the idea of the book — a receptacle that contains and records collective wisdom, information, ideas, knowledge, experiences and imagination of humankind – is here to stay.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/india-broken-internet-law-multistakeholderism"&gt;India's Broken Internet Laws Need a Shot of Multi-stakeholderism&lt;/a&gt; by Pranesh Prakash. (An edited version of this article was published in the Indian Express as &lt;a href="http://www.indianexpress.com/story-print/941491/"&gt;"Practise what you preach"&lt;/a&gt; on Thursday, April 26, 2012.)&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Reports&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"&gt;The      All India Privacy Symposium&lt;/a&gt; (India International Centre, New      Delhi, February 4, 2012): The symposium was organised around five thematic      panel discussions: privacy and transparency, privacy and e-governance      initiatives, privacy and national security, privacy and banking and health      privacy. Privacy India in partnership with CIS, International Development      Research Centre, Privacy International, Commonwealth Human Rights      Initiative and Society in Action Group organised this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-report"&gt;The      High Level Privacy Conclave&lt;/a&gt; (Paharpur Business Centre, Nehru      Place Greens, New Delhi, February 3, 2012): The conclave was organised      around two panels: national Security and privacy and internet and privacy.      Malavika Jayaram moderated the first panel discussion on national Security      and privacy. Sunil Abraham moderated the second panel discussion on      internet and privacy. Privacy India in partnership with CIS, International      Development Research Centre, Privacy International, Commonwealth Human      Rights Initiative and Society in Action Group organised this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/resisting-internet-censorship"&gt;Resisting      Internet Censorship: Strategies for Furthering Freedom of Expression in      India&lt;/a&gt; (Bangalore International Centre, TERI Complex, Domlur,      April 21, 2012): CIS co-organised this event with the Foundation for Media      Professionals. Members of Parliament, P. Rajeeve and Rajeev Chandrashekar      and Member of Legislative Council, Karnataka, V.R. Sudarshan participated      in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/talk-by-vasant-gangavane"&gt;Konkan      Corridor Project — A Lecture by Vasant Gangavane&lt;/a&gt; (Ashoka      Innovators for the Public, Bangalore, April 16, 2012): Well known social      worker Vasant Gangavane gave a lecture.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/cybernetic-vehicles"&gt;Braitenberg      Cybernetic Vehicles: Workshop, Film Screening &amp;amp; Discussion&lt;/a&gt; (Metaculture Media Lab, CIS, Bangalore, April 14, 2012): There was a short      presentation about Braitenberg vehicles.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/giga-conference"&gt;GIGA International      Conference Series - 1&lt;/a&gt; (NALSAR University of Law, Justice City      Campus, Shameerpet, Hyderabad, April 5 and 6, 2012): The Institute of      Global Internet Governance and Advocacy and Department of Electronics and      Information Technology organised the conference. Sunil Abraham gave a      lecture on &lt;i&gt;Digital Natives vs.      Digital Naivety&lt;/i&gt; in the session on Internet Governance &amp;amp; Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Expert-Group      on Privacy Issues (New Delhi, April 13 and 14, 2012): The Planning      Commission constituted this expert group under the chairmanship of Justice      AP Shah. Sunil Abraham participated in the first meeting of the sub-group      on privacy issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/privacy-internationals-trip-to-asia"&gt;Privacy      International's Trip to Asia&lt;/a&gt; (by Emma Draper in Privacy      International blog): In February 2012, the Privacy International team      travelled to India, Bangladesh and Hong Kong to meet with local partners      in the region and speak at four conferences they had organized. The team      got a chance to interview its partners in India and Bangladesh on the      privacy issues facing them at the moment. This is captured in a video      about contemporary privacy issues in India and Bangladesh. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mainstream-vs-social"&gt;It’s      mainstream vs social&lt;/a&gt; (Guest column by Mahima Kaul, Sunday      Guardian, April 30, 2012): “&lt;i&gt;If the      video is judged to be 'obscene', then under s.67 of the Information      Technology Act, 'causing [obscenity] to be transmitted', is also a crime&lt;/i&gt;,”...Sunil      Abraham quoted in the Sunday Guardian.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/from-cyber-india-to-censor-india"&gt;From      Cyber India to Censor India: Groups challenge didactic govt&lt;/a&gt; (by      Satarupa Paul, Sunday Guardian, April 29, 2012): “&lt;i&gt;Instead of a court deciding what makes content illegal, private      intermediaries get to decide. And there is no penalty for anyone abusing      the take-down notice system,&lt;/i&gt;”...Sunil Abraham quoted in the Sunday      Guardian.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/social-media-indian-govt"&gt;Social      Media 1, Indian Government 0&lt;/a&gt; (by Heather Timmons, New York      Times, April 26, 2012): “&lt;i&gt;Because      India does not have a bilateral cyber-crime agreement with the United      States (as the European Union does), getting American companies like      Facebook and Google to take down or investigate the source of content that      offends Indian government officials can be a slow and cumbersome process&lt;/i&gt;,”...Sunil      Abraham quoted in the New York Times. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/private-sector-censors"&gt;Private      sector censors&lt;/a&gt; (by Salil Tripathi, LiveMint, April 25, 2012): “&lt;i&gt;Companies which have no interest in      free speech are now taking these decisions. They have the power to do so      and they are using it without any sense of responsibility&lt;/i&gt;,”...Sunil      Abraham quoted in LiveMint. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/left-may-for-once-be-right"&gt;Views      | Why the Left may for once be right&lt;/a&gt; (by Pramit Bhattacharya,      LiveMint, April 23, 2012): “&lt;i&gt;It has      become much easier in India to ban an e-book than a book&lt;/i&gt;,”...Pranesh      Prakash quoted in LiveMint. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/campaign-against-curbs-on-websites"&gt;Campaign      against curbs on websites gathers steam&lt;/a&gt; (by Arpan Daniel      Varghese, IBN Live, April 23, 2012): “&lt;i&gt;If      a company wants to target your organization’s social media network, they      can keep sending fraudulent emails to you and you will have to keep      deleting it unless you are ready to face litigation or government action.&lt;/i&gt;..Sunil      Abraham quoted in IBN Live.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/anti-net-censorship-echo-in-house"&gt;Expect      anti-net censorship echo in house&lt;/a&gt; (by Arpan Daniel Varghese,      IBN Live, April 25, 2012): “&lt;i&gt;why      should freedom of speech and expression be any different on the Internet?&lt;/i&gt;”...Sunil      Abraham quoted in IBN Live.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/mobilising-support-for-freedom-on-web"&gt;Mobilising      support for freedom on the Web&lt;/a&gt; (by Deepa Kurup Hindu, April 22,      2012): Rishabh Dara’s research published as part of the Google Policy      Fellowship is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/draconian-it-rules"&gt;MPs      to be taught ‘draconian’ IT Act Rules as India.net support galvanises for      annul motion&lt;/a&gt; (by Prachi Shrivastava, Legally India, April 23,      2012): Prachi has blogged about the Resisting Internet Censorship      co-organised by CIS and the Foundation for Media Professionals in      Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/india-arrests-professor-over-cartoon"&gt;India      arrests professor over political cartoon&lt;/a&gt; (by Rama Lakshmi,      Washington Post, April 13, 2012): “&lt;i&gt;The      state’s new-found aversion to non-believers has gone a bit too far&lt;/i&gt;,”...Pranesh      Prakash quoted in Washington Post.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/beauty-blog-creates-furore"&gt;A      beauty’s blog creates furore&lt;/a&gt; (by Lakshmi Krupa, Deccan      Chronicle, April 10, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Digital Natives&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a research inquiry that looks at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Public Lecture&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ignite-talks"&gt;5 Challenges for the      Future of Learning: Digital Natives and How We Shall Teach Them&lt;/a&gt; (Wyndham Parc 55 Hotel, San Francisco, California, March 1, 2012): Nishant      Shah gave a ignite talk. The video is now online.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Book Review...a few excerpts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/media-coverage/immigrants-not-natives"&gt;Immigrants      not Natives&lt;/a&gt;: “&lt;i&gt;‘To Be’,      ‘To Think’, ‘To Act’ and ‘To Connect’ provides many fascinating and      thought-provoking insights into the possibilities for reflection, action      and interaction&lt;/i&gt;,”... Sally Wyatt, eHumanities Group, Royal Netherlands      Academy of Arts &amp;amp; Sciences/Maastricht University.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Accessibility&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/itu-tutorial-event-report"&gt;ITU      Tutorial on Audiovisual Media Accessibility&lt;/a&gt; (India      International Centre, New Delhi, March 14 – 15, 2012): CIS in cooperation      with the ITU-APT Foundation of India organised a two-day tutorial on      Audio-Visual Media Accessibility. Sunil Abraham was the Master of Ceremony      on Day 1. Ravi Shanker, Administrator, Universal Service Obligation Fund,      Dr. Govind, CEO, National Internet Exchange of India, Swaran Lata,      Director and Head of Department, TDIL Programme, DIT, R.N. Jha, Deputy      Director General (International Relations), Department of      Telecommunications and Archana Gulati, Financial Advisor, National      Disaster Management Authority participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Fellow at CIS&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/people/fellow"&gt;Rahul      Cherian joins CIS&lt;/a&gt;: Disability policy activist, lawyer and      co-founder of Inclusive Planet, Rahul Cherian has joined CIS as a Fellow.      Rahul will be working on disability policy reform and advocacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Access to Knowledge&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;New Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/global-congress-on-ip"&gt;2012      Global Congress on Intellectual Property and the Public Interest&lt;/a&gt; (FGV Law School, Rio De Janeiro, Brazil, December 15 – 17, 2012): We are      pleased to announce the Second Global Congress on Intellectual Property      and the Public Interest. The theme for this year’s Congress will be      “Setting the positive agenda in motion,” and will have a special focus on      developments and opportunities in the so-called “BRICS” group of emerging      economies. &lt;a href="https://cis-india.org/a2k/global-congress-on-ip-call-for-participation"&gt;CIS      is one of the six members of the Global Congress Planning Committee&lt;/a&gt;..&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News &amp;amp; Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hacking-modding-making"&gt;Hacking,      Modding &amp;amp; Making&lt;/a&gt; (by Brendan Shanahan): “&lt;i&gt;If something has been made      technologically possible, we cannot make it illegal and hope that everyone      will now pretend that this is no longer technologically possible...We      can't have the government checking everyone's iPod and laptop. The better      move is to change the model&lt;/i&gt;,”...Sunil Abraham quoted in GQ.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Openness&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;h3&gt;Event Reports and Video&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/arduino-workshop-report"&gt;Arduino      Workshop at CIS&lt;/a&gt; (CIS, Bangalore, March 3, 2012). Video is now      online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/hejje-2014-together-with-kannada-technology-2"&gt;Hejje      — Together with Kannada &amp;amp; Technology&lt;/a&gt; (Bangalore, January      22, 2012): The event marked the first step to bring everyone working in      Kannada in the IT field to brainstorm the ideas for future steps, and      create a space for technological collaboration in Kannada. CIS      co-organised the event with Sanchaya.net, Vishwakannada.com and Chanda      Pustaka. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-government-partnership-brasilia-bangalore-meetup"&gt;Bangalore      Meet-up for the Open Government Partnership Brasilia&lt;/a&gt; (CIS,      Bangalore, April 17, 2012): Ananya Panda and Pranesh Prakash participated      in the first annual meeting of Open Government Partnership remotely.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/design-public-delhi"&gt;Design!PubliC      – Event in Delhi&lt;/a&gt; (New Delhi, April 19 and 20, 2012): The event      was co-organised by Centre for Knowledge Societies in partnership with      IBM, Bill &amp;amp; Melinda Gates Foundation, Google, HeadStart, India@75,      LiveMint and CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/international-space-apps-challenge"&gt;International      Space Apps Challenge&lt;/a&gt; (CIS, Bangalore, April 21 and 22, 2012):      An international codeathon-style event took place in seven continents, CIS      organised the event in Bangalore.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Telecom&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Column in Business Standard&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/build-comprehensive-ecosystems"&gt;China 3: Build Comprehensive Ecosystems&lt;/a&gt; (Shyam Ponappa, Business Standard, April 5, 2012): “Failures in      electricity, transport and broadband have common strands. China's approach      offers a possible alternative.”&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;About CIS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the e-Accessibility Policy Handbook for Persons with Disabilities with International Telecommunications Union, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1644&amp;amp;qid=165304" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1645&amp;amp;qid=165304" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1646&amp;amp;qid=165304" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With foreign governments we worked on National Enterprise Architecture and Government Interoperability Framework for Govt. of Iraq; Open Standards Policy for Govt. of Moldova; Free and Open Software Centre of Excellence project plan for Saudi Arabia; eGovernance Strategy Document for Govt. of Tajikistan. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1647&amp;amp;qid=165304" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1648&amp;amp;qid=165304" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1649&amp;amp;qid=165304" target="_blank"&gt;Interoperability Framework in eGovernance&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1650&amp;amp;qid=165304" target="_blank"&gt;Privacy Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1651&amp;amp;qid=165304" target="_blank"&gt;NIA Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1652&amp;amp;qid=165304" target="_blank"&gt;National Policy on Electronics&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1653&amp;amp;qid=165304" target="_blank"&gt;IT Act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is an accredited NGO at WIPO and has given &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1654&amp;amp;qid=165304" target="_blank"&gt;policy briefs&lt;/a&gt; to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1655&amp;amp;qid=165304" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1656&amp;amp;qid=165304" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us      on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=1657&amp;amp;qid=165304" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at www.cis-india.org&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2012-bulletin'&gt;https://cis-india.org/about/newsletters/april-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-07T06:26:40Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2011-bulletin">
    <title>April 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India.&lt;/p&gt;
&lt;h3&gt;Workshops organised in Bangalore&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=334&amp;amp;qid=39041" target="_blank"&gt;Shadow Search Project (SSP)&lt;/a&gt; [CIS, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=335&amp;amp;qid=39041" target="_blank"&gt;Facebook Resistance&lt;/a&gt;&lt;/span&gt; [CIS, April 2, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following were published in the month of April:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=336&amp;amp;qid=39041" target="_blank"&gt;Who the Hack?&lt;/a&gt;&lt;/span&gt; [Indian Express, April 24, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=337&amp;amp;qid=39041" target="_blank"&gt;One for the avatar&lt;/a&gt;&lt;/span&gt; [Indian Express, April 3, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives Newsletter&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Links in the Chain is a bi-monthly publication which highlights the projects, ideas and news of the Digital Natives with a Cause? The first issue of volume IV is here:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=338&amp;amp;qid=39041" target="_blank"&gt;links in the chain volume 4 Best Practices&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry by Samuel Tettner&lt;/h3&gt;
&lt;p&gt;Samuel Tettner is a Digital Natives Coordinator in CIS. He has written the following blog entry:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=339&amp;amp;qid=39041" target="_blank"&gt;Cyber Fears: What scares Digital Natives and those around them&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Workshop organised in Hyderabad&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=340&amp;amp;qid=39041" target="_blank"&gt;Web Sites Accessibility Evaluation Methodologies: Conference Report&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software. Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=341&amp;amp;qid=39041" target="_blank"&gt;Comments on Draft National Policy on ICT in School Education&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=342&amp;amp;qid=39041" target="_blank"&gt;Towards Open and Equitable Access to Research and Knowledge for Development&lt;/a&gt;&lt;/span&gt; [PLoS, March 29, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;Featured&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=343&amp;amp;qid=39041" target="_blank"&gt;DIT's Response to RTI on Website Blocking&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=344&amp;amp;qid=39041" target="_blank"&gt;What are the legal provisions for blocking websites in India?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=345&amp;amp;qid=39041" target="_blank"&gt;We are anonymous, we are legion&lt;/a&gt;&lt;/span&gt; [published in the Hindu, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=346&amp;amp;qid=39041" target="_blank"&gt;You Have the Right to Remain Silent&lt;/a&gt;&lt;/span&gt; [published in the Sunday Guardian, April 17, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Study Tour&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=347&amp;amp;qid=39041" target="_blank"&gt;Iraq Delegation to Visit India for Study of E-Governance in Indian Cities ― Meetings in Bangalore and Delhi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=348&amp;amp;qid=39041" target="_blank"&gt;The DNA Profiling Bill 2007 and Privacy&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=349&amp;amp;qid=39041" target="_blank"&gt;Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Interview&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=350&amp;amp;qid=39041" target="_blank"&gt;An Interview with Activist Shubha Chacko: Privacy and Sex workers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshops organized in Ahmedabad and Bangalore&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=351&amp;amp;qid=39041" target="_blank"&gt;'Privacy Matters', Ahmedabad: Conference Report&lt;/a&gt;&lt;/span&gt; [Ahmedabad Management Association, Ahmedabad, March 26, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=352&amp;amp;qid=39041" target="_blank"&gt;Privacy, By Design&lt;/a&gt;&lt;/span&gt; [CIS, April 16, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=353&amp;amp;qid=39041" target="_blank"&gt;Is Data Protection Enough?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=354&amp;amp;qid=39041" target="_blank"&gt;Surveillance Technologies&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=355&amp;amp;qid=39041" target="_blank"&gt;Encryption Standards and Practices&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=356&amp;amp;qid=39041" target="_blank"&gt;News Broadcasting Standards Authority censures TV9 over privacy violations!&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=357&amp;amp;qid=39041" target="_blank"&gt;Learning from Fukushima&lt;/a&gt;&lt;/span&gt; [published in the Business Standard on April 7, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=358&amp;amp;qid=39041" target="_blank"&gt;The Gary Chapman International School on Digital Transformation&lt;/a&gt;&lt;/span&gt;[International School on Digital Transformation, July 17-22, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=359&amp;amp;qid=39041" target="_blank"&gt;Iraqi delegation in Bangalore to study e-governance projects&lt;/a&gt;&lt;/span&gt; [Economic Times, April 20, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=360&amp;amp;qid=39041" target="_blank"&gt;Dark waders&lt;/a&gt;&lt;/span&gt; [Time Out Bengaluru, Vol. 3, Issue 20, April 15 - 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=361&amp;amp;qid=39041" target="_blank"&gt;Beyond Clicktivism&lt;/a&gt;&lt;/span&gt; [Outlook, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=362&amp;amp;qid=39041" target="_blank"&gt;Gone in a flash&lt;/a&gt;&lt;/span&gt; [Times of India, April 16, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=363&amp;amp;qid=39041" target="_blank"&gt;How Web 2.0 responded to Hazare&lt;/a&gt;&lt;/span&gt; [Hindu, April 11, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=364&amp;amp;qid=39041" target="_blank"&gt;EU Commissioner Hedegaard to deliver keynote address at consumer world congress&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=365&amp;amp;qid=39041" target="_blank"&gt;Net cracker&lt;/a&gt;&lt;/span&gt; [Time Out Bengaluru Vol. 3 Issue 19, April 1 - 14, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=366&amp;amp;qid=39041" target="_blank"&gt;On the Path to Global Open Access: A Few More Miles to Go&lt;/a&gt;&lt;/span&gt; [PLoS, March 2011, Volume 8, Issue 3]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=367&amp;amp;qid=39041" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=368&amp;amp;qid=39041" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=369&amp;amp;qid=39041" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=370&amp;amp;qid=39041" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2011-bulletin'&gt;https://cis-india.org/about/newsletters/april-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T10:45:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2010-bulletin">
    <title>April 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! We bring you updates of our research, events and news for the month of April 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates &lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;Worries voiced over ID Project&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Government of India's Unique Identification (UID) Project came under flak at a workshop organised jointly by the Citizen Action Forum (CAF), the People's Union of Civil Liberties - Karnataka, the Alternative Law Forum and the Centre for Internet and Society - An article in The Hindu - 17th April.&lt;br /&gt; &lt;a href="https://cis-india.org/news/worries-voiced-over-id-project" target="_blank"&gt;http://cis-india.org/news/worries-voiced-over-id-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID: A debate on the Fundamental Rights&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;UID: A debate on the Fundamental Rights - was jointly organized by the Citizen Action Forum, People's Union for Civil Liberties - Karnataka, Alternative Law Forum and the Centre for Internet and Society on April 16th at IAT, Queens Road, Bangalore - An article in the Prajavani news paper - April 17th. &lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-a-debate-on-fundamental-rights" target="_blank"&gt;http://cis-india.org/news/uid-a-debate-on-fundamental-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID is an invasion of Privacy: Experts&lt;/b&gt;&lt;br /&gt; The Nandan Nilekani headed Unique Identification Authority of India (UIDAI) came in for much criricism at the first of a series of debates on the issue organised in the city on Friday - Deccan Chronicle, April 17th.&lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts" target="_blank"&gt;http://cis-india.org/news/uid-is-an-invasion-of-privacy-experts&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Experts debate on UID and rights &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Bangalore, Apr 16, DHNS: A debate on ‘UID and Fundamental Rights’ organised by several city-based organisations, discussed the social, ethical issues, economic and legal issues that accompanies the UID. &lt;br /&gt; &lt;a href="https://cis-india.org/news/experts-debate-on-uid-and-rights" target="_blank"&gt;http://cis-india.org/news/experts-debate-on-uid-and-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Amendment to Copyright Act opposed &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A report on the press conference held on 15th April, at the Press Club, Bangalore: The Hindu &lt;br /&gt; &lt;a href="https://cis-india.org/news/amendment-to-copyright-act-opposed" target="_blank"&gt;http://cis-india.org/news/amendment-to-copyright-act-opposed&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;They fight for the visually challenged &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Times News Network - A report on the press conference held at the Press Club, Bangalore on 15th April, 2010. &lt;br /&gt; &lt;a href="https://cis-india.org/news/they-fight-for-the-visually-challenged" target="_blank"&gt;http://cis-india.org/news/they-fight-for-the-visually-challenged&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Digital Natives Research Project Coordinator &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Centre for Internet and Society, Bangalore, in collaboration with Hivos Netherlands, is looking for a Research Project Coordinator to help develop a knowledge network and coordinate international workshops for the project "Digital Natives with a Cause?" &lt;br /&gt; &lt;a href="https://cis-india.org/news/research-coordinator" target="_blank"&gt;http://cis-india.org/news/research-coordinator&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Expel or not? That is the question &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The decision of an international school to expel 14 students for their alleged ‘promiscuous’ behaviour has led to much debate and discussion. &lt;br /&gt; &lt;a href="https://cis-india.org/news/expel-or-not" target="_blank"&gt;http://cis-india.org/news/expel-or-not&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Nokia eyes GeNext to tap mobile email mkt &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Finnish handset giant banks on youth to be in the technology race &lt;br /&gt; &lt;a href="https://cis-india.org/news/nokia-eyes-genNext" target="_blank"&gt;http://cis-india.org/news/nokia-eyes-genNext&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Critical Point of View: Videos &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Second event for the Critical Point of View reader on Wikipedia was held in Amsterdam, by the Institute of Network Cultures and the Centre for Internet and Society. A wide range of scholars, academics, researchers, practitioners, artists and users came together to discuss questions on design, analytics, access, education, theory, art, history and processes of knowledge production. The videos for the full event are now available for free viewing and dissemination.&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Colour Me Political &lt;/b&gt;&lt;br /&gt; What are the tools that Digital Natives use to mobilise groups towards a particular cause? How do they engage with crises in their immediate environments? Are they using their popular social networking sites and web 2.0 applications for merely entertainment? Or are these tools actually helping them to re-articulate the realm of the political? Nishant Shah looks at the recent Facebook Colour Meme to see how new forms of political participation and engagement are being initiated by young people across the world.&lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn2" target="_blank"&gt;http://cis-india.org/research/dn/dn2&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Meet the Web 2.0 Suicide Machine&lt;/b&gt;&lt;br /&gt;Digital Natives live their lives differently. But sometimes, they also die their lives differently! What happens when we die online? Can the digital avatar die? What is digital life? The Web 2.0 Suicide machine that has now popularly been called the 'anti-social-networking' application brings some of these questions to the fore. As a part of the Hivos-CIS "Digital Natives with a Cause?" research programme, Nishant Shah writes about how Life on the Screen is much more than just a series of games. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn1" target="_blank"&gt;http://cis-india.org/research/dn/dn1&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Digital Natives with a Cause? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Digital Natives With A Cause? - a product of the Hivos-CIS collaboration charts the scholarship and practice of youth and technology with a specific attention for developing countries to create a framework that consolidates existing paradigms and informs further research and intervention within diverse contexts and cultures. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dnrep" target="_blank"&gt;http://cis-india.org/research/dn/dnrep&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;e-Accessibility: A Wiki Project &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Envisaged and funded by the National Internet Exchange of India, and executed by the Centre for Internet and Society, a Wiki site pertaining to issues of disability and e-accessibility has recently been launched. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Copyright Law as a tool for Inclusion &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Can Copyright Law be used as a tool for Inclusion? Rahul Cherian examines this in his blog on copyright. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Web Accessibility as a Government Mandate?&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;/span&gt;Is Web accessibility just a Government Mandate? Should private sites be ignored? Wesolowski examines this in light of the steps taken by ictQATAR to make its website accessible to W3C standards, and hopes that Qatar and eventually all other Arab nations will follow suit and make Web accessibility much more of a mandate. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;When Copyright Goes Bad &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A part of the Access to Knowledge Project, this short film by Consumers International is available on DVD and online at A2Knetwork.org/film. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad" target="_blank"&gt;http://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Research Project on Open Video in India &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Open Video Alliance and the Centre for Internet and Society are calling for researchers for a project on open video in India, its potentials, limitations, and recommendations on policy interventions. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/open-video-research" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/open-video-research&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Does the Social Web need a Googopoly?&lt;/b&gt;&lt;br /&gt;While the utility of the new social tool Buzz is still under question, the bold move into social space taken last week by the Google Buzz team has Gmail users questioning privacy implications of the new feature. In this post, I posit that Buzz highlights two privacy challenges of the social web. First, the application has sidestepped the consensual and contextual qualities desirable of social spaces. Secondly, Google’s move highlights the increasingly competitive and convergent nature of the social media landscape. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;The (in)Visible Subject: Power, Privacy and Social Networking &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Does the Safe-Harbor Program Adequately Address Third Parties Online? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Sense and censorship &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/sense-and-censorship" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/sense-and-censorship&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Report on the Fourth Internet Governance Forum for Commonwealth IGF &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;This report by Pranesh Prakash reflects on the question of how useful is the IGF in the light of meetings on the themes of intellectual property, freedom of speech and privacy. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;The Right Ring Tone &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Focus on improving service quality with a strong partner, and not on one-shot stake sales, says Shyam Ponappa in his article published in the Business Standard on April 1, 2010. &lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/ring-tone" target="_blank"&gt;http://cis-india.org/advocacy/telecom/blog/ring-tone&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Other Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Maps for Making Change Wiki Now Open to the Public &lt;/b&gt;&lt;br /&gt; Since December 2009, CIS has been coordinating and nurturing the Maps for Making Change project, organised in collaboration with Tactical Tech. During the past four months, participants have been on a challenging yet fertile and inspiring journey that is now slowly coming to an end. Would you like to know more about what has happened in the time that has passed? The Maps for Making Change wiki is a good place to start. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public" target="_blank"&gt;http://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2010-bulletin'&gt;https://cis-india.org/about/newsletters/april-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-13T04:51:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/apps-can-give-personal-information-to-strangers">
    <title>Apps can give personal information to strangers</title>
    <link>https://cis-india.org/internet-governance/news/apps-can-give-personal-information-to-strangers</link>
    <description>
        &lt;b&gt;We love our apps. A study done last year, found that app usage in India has grown 131 per cent. But apps are notorious for accessing personal data and we’re obligingly careless with our privacy. Inadvertently, users give away third-parties access to their phone calls and right to operate cameras on their mobiles.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mebin John was published in the &lt;a class="external-link" href="http://www.newindianexpress.com/cities/bengaluru/Apps-can-give-personal-information-to-strangers/2016/08/08/article3568223.ece"&gt;New Indian Express&lt;/a&gt; on August 8, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Therefore, they can listen in to conversations and click photos as and when it pleases them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: left; float: none; "&gt;“The detailed privacy policy of most of these apps run into pages and people rarely read through them,” says Sunil Abraham, Executive Director of The Centre for Internet and Society. “The policy is also loaded with tech jargon, which is lost on the general public.”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A study, done in June this year by Norton, reveals that one in two Indians have permitted access to their contacts and mobile data in exchange for free applications. Forty per cent have allowed access to their camera and browsing history, and 50 per cent given permission to send promotional text/emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A mobile application developer in Bengaluru, who wishes to remain anonymous, says, “App developers collect personal information of individuals and make a massive database. They then sell this data base to marketing agencies.” A database of 5 crore people pays `5,000 and this is sold over and over again.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many application developers claim that they make large databases with the help of applications. “I have a database with email IDs of 2.5 lakh people,” says another app developer of the data he mined from one app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief Technology Officer at T.I.G.E.R Innovations and Publicize Bengaluru, Geo Joy, says: “It is true that we can track an individual’s personal conversations and activities using mobile applications. I’ve heard that many applications scoop details from phone conversations for marketing purposes.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If you are not paying for anything, then you are the product,” Abraham puts it succinctly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to him, with access to your conversations or GPS, a third party could monitor your activities. It can get more specifid: with data from GPS, accelerometer and gyroscope, a developer can read your driving pattern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Laws here are easy on developers too. Elonnai Hickok, a researcher from CIS, says, “Apart from Section 43A of the Information Technology Act, we don't have any strict laws or enforcement agencies to monitor these applications that breach the privacy of an individual.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, since we don’t have a statutory body to monitor applications and their privacy violations, experts suggest individuals exercise caution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CTO Joy suggests upgrading your operating systems. “Latest versions of all operating systems will warn you when an external medium tries to track your information,” he says. “So people who use the older versions should switch to the latest one or upgrade the software.&lt;/p&gt;
&lt;div class="body" style="text-align: justify; "&gt;
&lt;p&gt;CE picks five permissions and how they could be misused.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/apps-can-give-personal-information-to-strangers'&gt;https://cis-india.org/internet-governance/news/apps-can-give-personal-information-to-strangers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-08T01:22:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kashmir-watch-february-25-2019-any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster">
    <title>Any failure to resolve the Kashmir problem could lead the South Asia to a nuclear disaster </title>
    <link>https://cis-india.org/internet-governance/news/kashmir-watch-february-25-2019-any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster</link>
    <description>
        &lt;b&gt;World Kashmir Awareness (WKA) Board in its meeting on February 23, 2019 regrets the death of 45 Indian soldiers recently killed at Pulwama, Kashmir.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="http://kashmirwatch.com/any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster/"&gt;Kashmir Watch&lt;/a&gt; on February 25, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Further, WKA is  saddened by the fast deteriorating human rights situation, particularly  in the valley and Jammu. It calls up on Mr. Narendra Modi, the prime  minister of India to address the human rights situation earnestly. We  cannot escape the &lt;b&gt;&lt;i&gt;brazen disregard for the fundamental rights of  Kashmiris shown by Prime Minister Modi and his most inhumane draconian  apparatus in Kashmir&lt;/i&gt;&lt;/b&gt;. It is time that India joins the community  of civilized nations and allows the people of Jammu and Kashmir to  exercise the right of self –determination as agreed upon by both India  and Pakistan, endorsed and accepted by the United Nations Security  Council.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;The gross human  rights violations are documented by various international and impartial  human rights agencies. A brief illustration of those violations are  given below.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;The crisis is so severe that the &lt;b&gt;&lt;i&gt;United Nations High Commissioner on Human Rights&lt;/i&gt;&lt;/b&gt;,  for the first time in June 2018, released a report detailing atrocities  committed [by the Indian occupation (uniformed) forces] in Kashmir. The  report alludes to the special powers granted to the Indian occupation  (security) forces allowing them total impunity. “No armed forces  personnel have faced prosecution since the powers went into effect 28  years ago, and the authorities have made little effort to investigate  various allegations, including reports of mass graves”, the report said.  It criticized the Indian occupation forces, in particular, “for  inflicting mass civilian casualties in response to escalating protests”  and called for an “&lt;b&gt;&lt;i&gt;international investigation&lt;/i&gt;&lt;/b&gt; into these  gross abuses”. The conflict “has robbed millions of their basic human  rights and continues to this day to inflict untold suffering,” said the  United Nations Human Rights Commissioner, while presenting the report.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;Prior to this report, an Indian author Gautam Navlakha in his report &lt;b&gt;&lt;i&gt;“Internal War and Civil Rights: Disappearances in Jammu and Kashmir&lt;/i&gt;&lt;/b&gt;” in the &lt;b&gt;&lt;i&gt;Economic and Political Weekly&lt;/i&gt;&lt;/b&gt;,  says that “The recent Amnesty International report examines the  phenomenon of disappearances in Jammu and Kashmir. While some of the  ‘missing’ may have crossed the border, by far the larger number have &lt;i&gt;fallen victim to state terrorism&lt;/i&gt; –  arrest, detention, torture and death at the hands of the security  forces. Courts cannot provide much relief as court orders are ignored by  bureaucrats and armed forces”.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;In an interview published on August 28 2016, the &lt;b&gt;&lt;i&gt;South Asia Director of Human Rights Watch&lt;/i&gt;&lt;/b&gt;,  Meenakshi Ganguly, while calling for the repeal of the Armed Forces  Special Powers Act (AFSPA) and other draconian laws that provide Indian  military and para-military immunity from prosecution, said the way “to  persuade people to believe in rule of law is for the state to set an  example by first and foremost, holding itself accountable.”&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;The interview was  conducted at a time when 70 civilians had been killed, over 500 youth  blinded by pellets in one or both eyes and over 5000 civilians injured  by Indian rogue army in just 50 days immediately prior to the interview.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;In a most  despicable act, the rogue Indian Army does not even hesitate to use  civilians in Kashmir as human shield. In its editorial entitled “Cruelty  and Cowardice in Kashmir”, New York Times in April, 2017 wrote “Members  of &lt;b&gt;&lt;i&gt;India’s armed forces reached a new low in the long history of alleged human rights&lt;/i&gt;&lt;/b&gt; abuses  in the Indian state of Jammu and Kashmir when they beat and then tied a  24-year-old shawl weaver named Farooq Ahmad Dar to the front of a jeep  on April 9, using him as a &lt;b&gt;&lt;i&gt;human shield&lt;/i&gt;&lt;/b&gt; against stone-throwing crowds”.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;The New York Times  reported that many in India expressed shock and revulsion on this  report. Yet “large sections of India’s booming news media — some  editors, some columnists — &lt;b&gt;&lt;i&gt;openly celebrated what could well be a violation of the Geneva Conventions&lt;/i&gt;&lt;/b&gt;”.  India’s attorney general defended the use of human shields, praising  the officer who made the decision. The army should be applauded, he  said. The report went on to say that “&lt;b&gt;&lt;i&gt;A judge&lt;/i&gt;&lt;/b&gt; on India’s  Armed Forces Tribunal, which hears court-martial appeals, tweeted that  it was “an innovative idea.” Mr. Ahmad was turned into a war cry on  prime-time television and on social media. Such is the status of Indian  Democracy!?&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;During the same  period, as Mr. Modi was going around the world projecting the “Greatness  of India”, The Washington Post reported banning of 22 social media  sites in Indian controlled Kashmir. Pranesh Prakash, policy director for  the Indian advocacy group the Center for Internet and Society, called  the ban a “blow to freedom of speech” and “legally unprecedented in  India.”&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;And, where is Mr. Modi’s outrage regarding the &lt;b&gt;&lt;i&gt;‘Dead Eyes’ Epidemic in Kashmir&lt;/i&gt;&lt;/b&gt; brought  on by the use of lead pellets by his “courageous soldiers”, as reported  by international press. In less than two months (July-August 2016), New  York Times reported that “more than 570 patients have reported to  Srinagar’s main government hospital with eyes ruptured by lead pellets,  sometimes known as birdshot, fired by [Indian] occupation (security)  forces armed with pump-action shotguns…..The patients have mutilated  retinas, severed optic nerves, irises seeping out like puddles of ink”.  The victim even includes recent victim an 18-month old toddler&lt;b&gt;&lt;i&gt;. “2016 will almost certainly be remembered as the year of dead eyes.”&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716normal" style="text-align: justify; "&gt;Commenting on  “Kashmir in Crisis”, The Editorial Board of New Times, yet again wrote  that a “major cause of the uprising is the resentment among Kashmiri  youths who have come of age under an &lt;b&gt;&lt;i&gt;Indian security apparatus that acts against civilians with impunity&lt;/i&gt;&lt;/b&gt;.  Kashmir is subject to India’s Armed Forces Special Powers Act, or  AFSPA, which grants the military wide powers to arrest, shoot to kill,  occupy or destroy property. The result is a culture of brutal disdain  for the local population.”&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716MsoNormal" style="text-align: justify; "&gt;The Board  trusts that the involvement of the international community, particularly  the world powers in this matter will bring its influence to bear on  both India and Pakistan to initiate a peace process with which the  United Nations as well as the accredited leadership of the people of  Jammu &amp;amp; Kashmir will be associated so as to ensure that settlement  arrived at will be based on the principles of justice.&lt;/p&gt;
&lt;p class="m_2436148444718150698ydpc0a48716MsoNormal" style="text-align: justify; "&gt;Lastly, the  Board urges the Secretary General of the United Nations to bring this  matter to the attention of the Security Council. Whether this could be  done successfully depends on the attitudes and policies of the permanent  members, but they should be left in no doubt that any failure to  resolve the problem could lead the South Asian Subcontinent to a nuclear  disaster, with incalculable consequences for the whole world.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kashmir-watch-february-25-2019-any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster'&gt;https://cis-india.org/internet-governance/news/kashmir-watch-february-25-2019-any-failure-to-resolve-the-kashmir-problem-could-lead-the-south-asia-to-a-nuclear-disaster&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-03-03T06:17:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence">
    <title>Anvar v. Basheer and the New (Old) Law of Electronic Evidence</title>
    <link>https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence</link>
    <description>
        &lt;b&gt;The Supreme Court of India revised the law on electronic evidence. The judgment will have an impact on the manner in which wiretap tapes are brought before a court. &lt;/b&gt;
        &lt;p&gt;Read the original &lt;a class="external-link" href="http://notacoda.net/2014/09/25/anvar-v-basheer-and-the-new-old-law-of-electronic-evidence/"&gt;published by Law and Policy in India&lt;/a&gt; on September 25, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The case&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 18 September 2014, the Supreme Court of India delivered its judgment in the case of &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CBwQFjAA&amp;amp;url=http%3A%2F%2Fjudis.nic.in%2Fsupremecourt%2Fimgs1.aspx%3Ffilename%3D41931&amp;amp;ei=D6sjVOaeL8njuQSM7YDYAQ&amp;amp;usg=AFQjCNGzIq7qaNntgpFmwprehVy3D__AAA&amp;amp;bvm=bv.76247554,d.c2E" target="_blank"&gt;&lt;i&gt;Anvar&lt;/i&gt; v. &lt;i&gt;P. K. Basheer&lt;/i&gt;&lt;/a&gt; (Civil Appeal 4226 of 2012) to declare new law in respect of the evidentiary admissibility of the contents of electronic records. In doing so, Justice Kurian Joseph, speaking for a bench that included Chief Justice Rajendra M. Lodha and Justice Rohinton F. Nariman, overruled an earlier Supreme Court judgment in the 1995 case of &lt;a href="http://indiankanoon.org/doc/1769219/" target="_blank"&gt;&lt;i&gt;State (NCT of Delhi)&lt;/i&gt; v. &lt;i&gt;Navjot Sandhu alias Afsan Guru&lt;/i&gt;&lt;/a&gt;(2005) 11 SCC 600, popularly known as the Parliament Attacks case, and re-interpreted the application of sections 63, 65, and 65B of the &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/index.php?Title=Indian%20Evidence%20Act,%201872" target="_blank"&gt;Indian Evidence Act, 1872&lt;/a&gt; (“Evidence Act”). To appreciate the implications of this judgment, a little background may be required.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The hearsay rule&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Evidence Act was drafted to codify principles of evidence in the common law. Traditionally, a fundamental rule of evidence is that oral evidence may be adduced to prove all facts, except documents, provided always that the oral evidence is direct. Oral evidence that is not direct is challenged by the hearsay rule and, unless it is saved by one of the exceptions to the hearsay rule, is inadmissible. In India, this principle is stated in &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank"&gt;sections 59&lt;/a&gt; and &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/60.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Oral%20evidence%20must%20be%20direct" target="_blank"&gt;60&lt;/a&gt; of the Evidence Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hearsay rule is both fundamental and complex; a proper examination would require a lengthy excursus, but a simple explanation should suffice. In the landmark House of Lords decision in &lt;i&gt;R&lt;/i&gt; v. &lt;i&gt;Sharp&lt;/i&gt; [1988] 1 All ER 65, Lord Havers – the controversial prosecutor who went on to become the Lord Chancellor – described hearsay as “&lt;i&gt;Any assertion other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of any fact or opinion asserted.&lt;/i&gt;” This definition was applied by courts across the common law world. &lt;a href="http://www.legislation.gov.uk/ukpga/2003/44/section/114" target="_blank"&gt;Section 114&lt;/a&gt; of the United Kingdom’s (UK) Criminal Justice Act, 2003, which modernised British criminal procedure, uses simpler language: “&lt;i&gt;a statement not made in oral evidence in the proceedings.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hearsay evidence is anything said outside a court by a person absent from a trial, but which is offered by a third person during the trial as evidence. The law excludes hearsay evidence because it is difficult or impossible to determine its truth and accuracy, which is usually achieved through cross examination. Since the person who made the statement and the person to whom it was said cannot be cross examined, a third person’s account of it is excluded. There are a few exceptions to this rule which need no explanation here; they may be left to another post.&lt;/p&gt;
&lt;h3&gt;Hearsay in documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The hearsay rule is straightforward in relation to oral evidence but a little less so in relation to documents. As mentioned earlier, oral evidence cannot prove the contents of documents. This is because it would disturb the hearsay rule (since the document is absent, the truth or accuracy of the oral evidence cannot be compared to the document). In order to prove the contents of a document, &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20contents%20of%20documents" target="_blank"&gt;either primary or secondary evidence&lt;/a&gt; must be offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Primary evidence of the contents of a document is the document itself [&lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/62.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Primary%20evidence" target="_blank"&gt;section 62&lt;/a&gt; of the Evidence Act]. The process of compelling the production of a document in court is called ‘discovery’. Upon discovery, a document speaks for itself. Secondary evidence of the contents of a document is, amongst other things, certified copies of that document, copies made by mechanical processes that insure accuracy, and oral accounts of the contents by someone who has seen that document. &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/63.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Secondary%20evidence" target="_blank"&gt;Section 63&lt;/a&gt; of the Evidence Act lists the secondary evidence that may prove the contents of a document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondary evidence of documentary content is an attempt at reconciling the hearsay rule with the difficulties of securing the discovery of documents. There are many situations where the original document simply cannot be produced for a variety of reasons. &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Cases%20in%20which%20secondary%20evidence%20relating%20to%20documents%20may%20be%20given" target="_blank"&gt;Section 65&lt;/a&gt; of the Evidence Act lists the situations in which the original document need not be produced; instead, the secondary evidence listed in section 63 can be used to prove its content. These situations arise when the original document (i) is in hostile possession; (ii) has been stipulated to by the prejudiced party; (iii) is lost or destroyed; (iv) cannot be easily moved, i.e. physically brought to the court; (v) is a public document of the state; (vi) can be proved by certified copies when the law narrowly permits; and (vii) is a collection of several documents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Electronic documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As documents came to be digitised, the hearsay rule faced several new challenges. While the law had mostly anticipated primary evidence (i.e. the original document itself) and had created special conditions for secondary evidence, increasing digitisation meant that more and more documents were electronically stored. As a result, the adduction of secondary evidence of documents increased. In the &lt;i&gt;Anvar&lt;/i&gt; case, the Supreme Court noted that “&lt;i&gt;there is a revolution in the way that evidence is produced before the court&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India before 2000, electronically stored information was treated as a document and secondary evidence of these electronic ‘documents’ was adduced through printed reproductions or transcripts, the authenticity of which was certified by a competent signatory. The signatory would identify her signature in court and be open to cross examination. This simple procedure met the conditions of both sections 63 and 65 of the Evidence Act. In this manner, Indian courts simply adapted a law drafted over one century earlier in Victorian England. However, as the pace and proliferation of technology expanded, and as the creation and storage of electronic information grew more complex, the law had to change more substantially.&lt;/p&gt;
&lt;h3&gt;New provisions for electronic records&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To bridge the widening gap between law and technology, Parliament enacted the &lt;a href="http://www.vakilno1.com/bareacts/informationtechnologyact/informationtechnologyact.html" target="_blank"&gt;Information Technology Act, 2000&lt;/a&gt; (“IT Act”) [official pdf &lt;a href="http://www.dot.gov.in/sites/default/files/itbill2000_0.pdf" target="_blank"&gt;here&lt;/a&gt;] that, amongst other things, created new definitions of “data”, “electronic record”, and “computer”. According to section 2(1)(t) of the IT Act, an electronic record is “&lt;i&gt;data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche&lt;/i&gt;” (sic).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act amended &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank"&gt;section 59&lt;/a&gt; of the Evidence Act to exclude electronic records from the probative force of oral evidence in the same manner as it excluded documents. This is the re-application of the documentary hearsay rule to electronic records. But, instead of submitting electronic records to the test of secondary evidence – which, for documents, is contained in sections 63 and 65, it inserted two new evidentiary rules for electronic records in the Evidence Act: &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65a.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Special%20provisions%20as%20to%20evidence%20relating%20to%20electronic%20record" target="_blank"&gt;section 65A&lt;/a&gt; and &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Admissibility%20of%20electronic%20records" target="_blank"&gt;section 65B&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 65A of the Evidence Act creates special law for electronic evidence:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;b&gt;&lt;i&gt;65A. Special provisions as to evidence relating to electronic record. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;The contents of electronic records may be proved in accordance with the provisions of section 65B.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 65A of the Evidence Act performs the same function for electronic records that &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20contents%20of%20documents" target="_blank"&gt;section 61&lt;/a&gt; does for documentary evidence: it creates a separate procedure, distinct from the simple procedure for oral evidence, to ensure that the adduction of electronic records obeys the hearsay rule. It also secures other interests, such as the authenticity of the technology and the sanctity of the information retrieval procedure. But section 65A is further distinguished because it is a special law that stands apart from the documentary evidence procedure in sections 63 and 65.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Admissibility%20of%20electronic%20records" target="_blank"&gt;Section 65B&lt;/a&gt; of the Evidence Act details this special procedure for adducing electronic records in evidence. Sub-section (2) lists the technological conditions upon which a duplicate copy (including a print-out) of an original electronic record may be used: (i) at the time of the creation of the electronic record, the computer that produced it must have been in regular use; (ii) the kind of information contained in the electronic record must have been regularly and ordinarily fed in to the computer; (iii) the computer was operating properly; and, (iv) the duplicate copy must be a reproduction of the original electronic record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-section (4) of section 65B of the Evidence Act lists additional non-technical qualifying conditions to establish the authenticity of electronic evidence. This provision requires the production of a certificate by a senior person who was responsible for the computer on which the electronic record was created, or is stored. The certificate must uniquely identify the original electronic record, describe the manner of its creation, describe the device that created it, and certify compliance with the technological conditions of sub-section (2) of section 65B.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Non-use of the special provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, the special law and procedure created by sections 65A and 65B of the Evidence Act for electronic evidence were not used. Disappointingly, the cause of this non-use does not involve the law at all. India’s lower judiciary – the third tier of courts, where trials are undertaken – is vastly inept and technologically unsound. With exceptions, trial judges simply do not know the technology the IT Act comprehends. It is easier to carry on treating electronically stored information as documentary evidence. The reasons for this are systemic in India and, I suspect, endemic to poor developing countries. India’s justice system is decrepit and poorly funded. As long as the judicial system is not modernised, India’s trial judges will remain clueless about electronic evidence and the means of ensuring its authenticity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By bypassing the special law on electronic records, Indian courts have continued to apply the provisions of sections 63 and 65 of the Evidence Act, which pertain to documents, to electronically stored information. Simply put, the courts have basically ignored sections 65A and 65B of the Evidence Act. Curiously, this state of affairs was blessed by the Supreme Court in Navjot Sandhu (the Parliament Attacks case), which was a particularly high-profile appeal from an emotive terrorism trial. On the question of the defence’s challenge to the authenticity and accuracy of certain call data records (CDRs) that the prosecution relied on, which were purported to be reproductions of the original electronically stored records, a Division Bench of Justice P. Venkatarama Reddi and Justice P. P. Naolekar held:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;According to Section 63, secondary evidence means and includes, among other things, “copies made from the original by mechanical processes which in themselves ensure the accuracy of the copy, and copies compared with such copies”. Section 65 enables secondary evidence of the contents of a document to be adduced if the original is of such a nature as not to be easily movable. It is not in dispute that the information contained in the call records is stored in huge servers which cannot be easily moved and produced in the court. That is what the High Court has also observed at para 276. Hence, printouts taken from the computers/servers by mechanical process and certified by a responsible official of the service-providing company can be led into evidence through a witness who can identify the signatures of the certifying officer or otherwise speak to the facts based on his personal knowledge.&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Flawed justice and political expediency in wiretap cases&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court’s finding in Navjot Sandhu (quoted above) raised uncomfortable questions about the integrity of prosecution evidence, especially in trials related to national security or in high-profile cases of political importance. The state’s investigation of the Parliament Attacks was shoddy with respect to the interception of telephone calls. The Supreme Court’s judgment notes in prs. 148, 153, and 154 that the law and procedure of wiretaps was violated in several ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Evidence Act mandates a special procedure for electronic records precisely because printed copies of such information are vulnerable to manipulation and abuse. This is what the veteran defence counsel, Mr. Shanti Bhushan, pointed out in &lt;i&gt;Navjot Sandhu&lt;/i&gt; [see pr. 148] where there were discrepancies in the CDRs led in evidence by the prosecution. Despite these infirmities, which should have disqualified the evidence until the state demonstrated the absence of &lt;i&gt;mala fide&lt;/i&gt; conduct, the Supreme Court stepped in to certify the secondary evidence itself, even though it is not competent to do so. The court did not compare the printed CDRs to the original electronic record. Essentially, the court allowed hearsay evidence. This is exactly the sort of situation that section 65B of the Evidence Act intended to avoid by requiring an impartial certificate under sub-section (4) that also speaks to compliance with the technical requirements of sub-section (2).&lt;/p&gt;
&lt;p&gt;When the lack of a proper certificate regarding the authenticity and integrity of the evidence was pointed out, this is what the Supreme Court said in pr. 150:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Irrespective of the compliance of the requirements of Section 65B, which is a provision dealing with admissibility of electronic records, there is no bar to adducing secondary evidence under the other provisions of the Evidence Act, namely, Sections 63 and 65. It may be that the certificate containing the details in sub-section (4) of Section 65B is not filed in the instant case, but that does not mean that secondary evidence cannot be given even if the law permits such evidence to be given in the circumstances mentioned in the relevant provisions, namely, Sections 63 and 65.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the years that followed, printed versions of CDRs were admitted in evidence if they were certified by an officer of the telephone company under sections 63 and 65 of the Evidence Act. The special procedure of section 65B was ignored. This has led to confusion and counter-claims. For instance, the 2011 case of &lt;a href="http://indiankanoon.org/doc/1082001/" target="_blank"&gt;&lt;i&gt;Amar Singh&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/a&gt; (2011) 7 SCC 69 saw all the parties, including the state and the telephone company, dispute the authenticity of the printed transcripts of the CDRs, as well as the authorisation itself. Currently, in the case of &lt;i&gt;Ratan Tata&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; Writ Petition (Civil) 398 of 2010, a compact disc (CD) containing intercepted telephone calls was introduced in the Supreme Court without following any of the procedure contained in the Evidence Act.&lt;/p&gt;
&lt;h3&gt;Returning sanity to electronic record evidence, but at a price&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2007, the United States District Court for Maryland handed down a landmark decision in &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.mdd.uscourts.gov%2Fopinions%2Fopinions%2Florraine%2520v.%2520markel%2520-%2520esiadmissibility%2520opinion.pdf&amp;amp;ei=LrEjVLTKEdLiuQTGvYHgAw&amp;amp;usg=AFQjCNEGlYKs3f11PxzwjmFccTUynlIVzA&amp;amp;bvm=bv.76247554,d.c2E" target="_blank"&gt;&lt;i&gt;Lorraine&lt;/i&gt; v. &lt;i&gt;Markel American Insurance Company&lt;/i&gt;&lt;/a&gt;241 FRD 534 (D. Md. 2007) that clarified the rules regarding the discovery of electronically stored information. In American federal courts, the law of evidence is set out in the &lt;a href="http://www.law.cornell.edu/rules/fre" target="_blank"&gt;Federal Rules of Evidence&lt;/a&gt;. &lt;i&gt;Lorraine&lt;/i&gt; held when electronically stored information is offered as evidence, the following tests need to be affirmed for it to be admissible: (i) is the information relevant; (ii) is it authentic; (iii) is it hearsay; (iv) is it original or, if it is a duplicate, is there admissible secondary evidence to support it; and (v) does its probative value survive the test of unfair prejudice?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a small way, &lt;i&gt;Anvar&lt;/i&gt; does for India what &lt;i&gt;Lorraine&lt;/i&gt; did for US federal courts. In &lt;i&gt;Anvar&lt;/i&gt;, the Supreme Court unequivocally returned Indian electronic evidence law to the special procedure created under section 65B of the Evidence Act. It did this by applying the maxim &lt;i&gt;generalia specialibus non derogant&lt;/i&gt; (“the general does not detract from the specific”), which is a restatement of the principle &lt;i&gt;lex specialis derogat legi generali&lt;/i&gt; (“special law repeals general law”). The Supreme Court held that the provisions of sections 65A and 65B of the Evidence Act created special law that overrides the general law of documentary evidence [see pr. 19]:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Proof of electronic record is a special provision introduced by the IT Act amending various provisions under the Evidence Act. The very caption of Section 65Aof the Evidence Act, read with Sections 59 and 65B is sufficient to hold that the special provisions on evidence relating to electronic record shall be governed by the procedure prescribed under Section 65B ofthe Evidence Act. That is a complete code in itself. Being a special law, the general law under Sections 63 and 65 has to yield.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By doing so, it disqualified oral evidence offered to attest secondary documentary evidence [see pr. 17]:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The Evidence Act does not contemplate or permit the proof of an electronic record by oral evidence if requirements under Section 65B of the Evidence Act are not complied with, as the law now stands in India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope for oral evidence is offered later. Once electronic evidence is properly adduced according to section 65B of the Evidence Act, along with the certificate of sub-section (4), the other party may challenge the genuineness of the original electronic record. If the original electronic record is challenged, &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/22a.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=When%20oral%20admission%20as%20to%20contents%20of%20electronic%20records%20are%20relevant" target="_blank"&gt;section 22A&lt;/a&gt; of the Evidence Act permits oral evidence as to its genuineness only. Note that section 22A disqualifies oral evidence as to the contents of the electronic record, only the genuineness of the record may be discussed. In this regard, relevant oral evidence as to the genuineness of the record can be offered by the Examiner of Electronic Evidence, an expert witness under section 45A of the Evidence Act who is appointed under section 79A of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While &lt;i&gt;Anvar&lt;/i&gt; is welcome for straightening out the messy evidentiary practice regarding electronically stored information that &lt;i&gt;Navjot Sandhu&lt;/i&gt;had endorsed, it will extract a price from transparency and open government. The portion of &lt;i&gt;Navjot Sandhu&lt;/i&gt; that was overruled dealt with wiretaps. In India, the wiretap empowerment is contained in &lt;a href="http://indiankanoon.org/doc/1445510/" target="_blank"&gt;section 5(2)&lt;/a&gt;of the &lt;a href="http://indiankanoon.org/doc/357830/" target="_blank"&gt;Indian Telegraph Act, 1885&lt;/a&gt; (“Telegraph Act”). The Telegraph Act is an inherited colonial law. Section 5(2) of the Telegraph Act was almost exactly duplicated thirteen years later by &lt;a href="http://indiankanoon.org/doc/72724899/" target="_blank"&gt;section 26&lt;/a&gt; of the Indian Post Office Act, 1898. When the latter was referred to a Select Committee, P. Ananda Charlu – a prominent lawyer, Indian nationalist leader, and one of the original founders of the Indian National Congress in 1885 – criticised its lack of transparency, saying: “&lt;i&gt;a strong and just government must not shrink from daylight&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wiretap leaks have become an important means of discovering governmental abuse of power, corruption, and illegality. For instance, the massive fraud enacted by under-selling 2G spectrum by A. Raja, the former telecom minister, supposedly India’s most expensive corruption scandal, caught the public’s imagination only after taped wiretapped conversations were leaked. Some of these conversations were recorded on to a CD and brought to the Supreme Court’s attention. There is no way that a whistle blower, or a person in possession of electronic evidence, can obtain the certification required by section 65B(4) of the Evidence Act without the state coming to know about it and, presumably, attempting to stop its publication.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Anvar&lt;/i&gt; neatly ties up electronic evidence, but it will probably discourage public interest disclosure of inquity.&lt;/p&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="360" src="http://www.youtube.com/embed/n6V6BfdRorw?feature=player_embedded" width="400"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence'&gt;https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-04T15:53:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade">
    <title>Anushka finds support for her anti-litter tirade</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade</link>
    <description>
        &lt;b&gt;She is well within her rights to shame the affluent man who threw plastic waste out of his swanky car, many say.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Nina C. George was published in &lt;a class="external-link" href="https://www.deccanherald.com/metrolife/your-bond-bengaluru/anushka-finds-support-her-anti-litter-tirade-675797.html"&gt;Deccan Herald&lt;/a&gt; on June 19, 2018. Swaraj Barooah was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Tuesday, movie star Anushka Sharma caught a man throwing out litter from the window his luxury car, and took him to task. In a 17-second-long clip that went viral, she gave a furious dressing down to the man, identified as Arhhan Singh, sitting in a chaffeur-driven sedan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Arhhan Singh later described her as a “crazy roadside person”. Many started trolling Anushka. Her cricketer-husband Virat Kohli soon jumped in to back her and her cause.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Elli AvrRam&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The actor says Anushka was right in shaming Arhhan Singh. “It is everybody’s duty to stop littering,” she says.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pooja Chopra&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The actor says the video is a message loud and clear to all those in chauffeur-driven cars who don’t think twice before littering. “The man who threw out plastic should have apologised. It’s not about Anushka flaunting her celebrity status. I would have also done it had I been in her place," she says.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;MK Raghavendra&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The well-known film critic feels celebrities have, for once, proved useful. “Anybody who sees people throwing garbage on the street must take exception to it. Throwing garbage is a social nuisance and I think it should be ideally treated as a minor criminal offence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Rahul Rajashekharan&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Actor and Mr. India runner-up says, “She wasn’t rude and was only telling the man not to throw garbage. Educated people throwing garbage on the street is unacceptable.” People in Mumbai have been working towards cleaning their beaches, and movements across the world are campaigning against the use of plastic. She did the right thing by posting the video on social media, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Raghu Dixit&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The singer and composer says he has protested against anything that “goes against basic civic sense.” The people he confronts, he says, sometimes apologise, and at other times get defensive. “It’s not about being a celebrity. We should decisively act towards making our country litter-free," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Guru Prasanna, Advocate, HC, Karnataka&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was natural for Anushka to question somebody throwing garbage on the street. The damaging part was perhaps Virat Kohli’s tweet calling Arhhan Singh, the man in the car, “brainless.” Arhhan Singh and his family have taken offence to the public shaming but they don’t really have a legal case against Anushka and Virat. “There is no action here against which a person can claim any sort of injury. If there is a conscious campaign to bring down somebody’s reputation then it could have legal implications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Swaraj Barooah, senior programme manager, Centre for Internet and Society, Bengaluru&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It may be poor form to shame a private person, as the point about littering could be made as easily without revealing the identity of the person. But it would be incorrect to claim a legitimate expectation of privacy while committing a public act, which is littering, in this case. On the question of whether this is harassment: This is unlikely to be seen as a legal case of harassment, as it is just one act, and not one of many acts. Nor do Virat and Anushka have a history of going about and ‘shaming’ people online.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade'&gt;https://cis-india.org/internet-governance/news/deccan-herald-june-19-2018-anushka-finds-support-her-anti-litter-tirade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-23T01:11:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship">
    <title>Anti-trafficking Bill may lead to censorship</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship</link>
    <description>
        &lt;b&gt;There are a few problematic provisions in the proposed legislation—it may severely impact freedom of expression.&lt;/b&gt;
        &lt;p class="S3l" style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.livemint.com/Opinion/GxZ795DUjW3fFrFcWcWp6N/Antitrafficking-Bill-may-lead-to-censorship.html"&gt;Livemint&lt;/a&gt; on July 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="S3l" style="text-align: justify; "&gt;The  legislative business of the monsoon session of Parliament kicked off on  18 July with the introduction of the Trafficking of Persons  (Prevention, Protection and Rehabilitation) Bill, 2018, in the Lok  Sabha. The intention of the Union government is to “make India a leader  among South Asian countries to combat trafficking” through the passage  of this Bill. Good intentions aside, there are a few problematic  provisions in the proposed legislation, which may severely impact  freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  instance, Section 36 of the Bill, which aims to prescribe punishment  for the promotion or facilitation of trafficking, proposes a minimum  three-year sentence for producing, publishing, broadcasting or  distributing any type of material that promotes trafficking or  exploitation. An attentive reading of the provision, however, reveals  that it has been worded loosely enough to risk criminalizing many  unrelated activities as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  phrase “any propaganda material that promotes trafficking of person or  exploitation of a trafficked person in any manner” has wide amplitude,  and many unconnected or even well-intentioned actions can be construed  to come within its ambit as the Bill does not define what constitutes  “promotion”. For example, in moralistic eyes, any sexual content online  could be seen as promoting prurient interests, and thus also promoting  trafficking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather  than imposing a rigorous standard of actual and direct nexus with the  act of trafficking or exploitation, a vaguer standard which includes  potentially unprovable causality, including by actors who may be  completely unaware of such activity, is imposed. This opens the doors to  using this provision for censorship and&lt;b&gt; &lt;/b&gt;imposes a chilling  effect on any literary or artistic work which may engage with sensitive  topics, such as trafficking of women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  the past, governments have been keen to restrict access to online  escort services and pornography. In June 2016, the Union government  banned 240 escort sites for obscenity even though it cannot do that  under Section 69A or Section 79 of the Information Technology Act, or  Section 8 of the Immoral Traffic (Prevention) Act. In July 2015, the  government asked internet service providers (ISPs) to block 857  pornography websites sites on grounds of outraging “morality” and  “decency”, but later rescinded the order after widespread criticism. If  historical record is any indication, Section 36 in this present Bill  will legitimize such acts of censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 39 proposes an even weaker standard for criminal acts by proposing that any act of publishing or advertising “which &lt;i&gt;may &lt;/i&gt;lead  to the trafficking of a person shall be punished” (emphasis added) with  imprisonment for 5-10 years. In effect, the provision mandates  punishment for vaguely defined actions that may not actually be  connected to the trafficking of a person at all. This is in stark  contrast to most provisions in criminal law, which require &lt;i&gt;mens rea &lt;/i&gt;(intention) along with &lt;i&gt;actus reus &lt;/i&gt;(guilty  act). The excessive scope of this provision is prone to severe abuse,  since without any burden of showing a causal connect, it could be argued  that anything “may lead” to the trafficking of a person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another  by-product of passing the proposed legislation would be a dramatic  shift in India’s landscape of intermediary liability laws, i.e., rules  which determine the liability of platforms such as Facebook and Twitter,  and messaging services like Whatsapp and Signal for hosting or  distributing unlawful content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisions  in the Bill that criminalize the “publication” and “distribution” of  content, ignore that unlike the physical world, modern electronic  communication requires third-party intermediaries to store and  distribute content. This wording can implicate neutral communication  pipeways, such as ISPs, online platforms, mobile messengers, which  currently cannot even know of the presence of such material unless they  surveil all their users. Under the proposed legislation, the fact that  human traffickers used Whatsapp to communicate about their activities  could be used to hold the messaging service criminally liable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  proposing such, the Bill is in direct conflict with the internationally  recognized Manila Principles on Intermediary Liability, and in  dissonance with existing principles of Indian law, flowing from the  Information Technology Act, 2000, that identify online platforms as  “safe harbours” as long as they act as mere conduits. From the  perspective of intermediaries, monitoring content is unfeasible, and  sometimes technologically impossible as in the case of Whatsapp, which  facilitates end-to-end encrypted messaging. And as a 2011 study by the  Centre for Internet &amp;amp; Society showed, platforms are happy to  over-comply in favour of censorship to escape liability rather than  verify actual violations. The proposed changes will invariably lead to a  chilling effect on speech on online platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering  these problematic provisions, it will be a wise move to send the Bill  to a select committee in Parliament wherein the relevant stakeholders  can engage with the lawmakers to arrive at a revised Bill, hopefully one  which prevents human trafficking without threatening the Constitutional  right of free speech.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship'&gt;https://cis-india.org/internet-governance/blog/livemint-july-24-2018-swaraj-barooah-and-gurshabad-grover-anti-trafficking-bill-may-lead-to-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Swaraj Barooah and Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-08-02T13:59:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions">
    <title>Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions</link>
    <description>
        &lt;b&gt;This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Note:- This analysis is a part of a larger attempt at formulating a model anti-spam law for India by analyzing the existing spam laws across the world.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;CAN-SPAM Act, 2003&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Act, 2003 (Australia)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Control Act, 2007 (Singapore)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Canada's Anti-Spam Legislation, 2014&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;The Privacy and Electronic Communications (EC Directive) Regulations, 2003&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;(United Kingdom)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The defendant must be either an inhabitant of the United States or have a physical place of business in the US.[1]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have an "Australian link" i.e.&lt;/p&gt;
&lt;p&gt;(a) the message originates in Australia; or&lt;/p&gt;
&lt;p&gt;(b) the individual or organisation who sent the message, or&lt;/p&gt;
&lt;p&gt;authorised the sending of the message, is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation whose central management and control&lt;/p&gt;
&lt;p&gt;is in Australia when the message is sent; or&lt;/p&gt;
&lt;p&gt;(c) the computer, server or device that is used to access the&lt;/p&gt;
&lt;p&gt;message is located in Australia; or&lt;/p&gt;
&lt;p&gt;(d) the relevant electronic account-holder is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is&lt;/p&gt;
&lt;p&gt;Spam Act, 2003, § 7&lt;/p&gt;
&lt;p&gt;Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p&gt;Canada's Anti-Spam Legislation, 2014, §accessed; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation that carries on business or activities in&lt;/p&gt;
&lt;p&gt;Australia when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address does not exist-assuming that the&lt;/p&gt;
&lt;p&gt;electronic address existed, it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, server&lt;/p&gt;
&lt;p&gt;or device located in Australia.[2]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have a "Singapore link"&lt;/p&gt;
&lt;p&gt;An electronic message has a Singapore link in the following circumstances:&lt;/p&gt;
&lt;p&gt;(a) the message originates in Singapore;&lt;/p&gt;
&lt;p&gt;(b) the sender of the message is -&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an entity whose central management and control is in Singapore when the message is sent;&lt;/p&gt;
&lt;p&gt;© the computer, mobile telephone, server or device that is used to access the message is located in Singapore;&lt;/p&gt;
&lt;p&gt;the recipient of the message is-&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(ii)an entity that carries on business or activities in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address has ceased to exist (assuming that the electronic address existed), it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, mobile telephone, server or device located in Singapore.[3]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Extends to cases where the mail originates in a foreign state but is accessed in Canada&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6 of the CASL prohibits the sending of unsolicited CEMs.[4]&lt;/p&gt;
&lt;p&gt;As per Section 12 of the CASL, A person contravenes section 6 only if a computer system located in Canada is used to send &lt;i&gt;or&lt;/i&gt; access the electronic message.&lt;/p&gt;
&lt;p&gt;CASL applies to CEMs sent from, or accessed in, Canada.[5]&lt;/p&gt;
&lt;p&gt;So, if a CEM is sent to Canadians from another jurisdiction, CASL will apply. Notably, there is an exception where the person sending the 					message "reasonably believes" that the message will be accessed in one of a list&lt;/p&gt;
&lt;p&gt;of prescribed jurisdictions with anti-spam laws thought to&lt;/p&gt;
&lt;p&gt;be 'substantially similar' to CASL and the message complies with the laws of that jurisdiction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;European Union&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;These regulations can be enforced against a person or a company anywhere in the European Union who violates the regulations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Definition Of Spam&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic mail"[6], where&lt;/p&gt;
&lt;p&gt;a commercial electronic mail is "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a 					commercial product or service"[7]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic messages" where electronic message means a message sent "using an internet carriage service or any other 					listed carriage service; and to an electronic address in connection with: an e-mail account; or an instant messaging account; or a 					telephone&lt;/p&gt;
&lt;p&gt;account; or a similar accounts."[8]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic message sent in bulk", where&lt;/p&gt;
&lt;p&gt;a CEM is &lt;i&gt;unsolicited&lt;/i&gt; if the recipient did not-&lt;/p&gt;
&lt;p&gt;i) request to receive the message; or&lt;/p&gt;
&lt;p&gt;ii)consent to the receipt of the message;[9] and&lt;/p&gt;
&lt;p&gt;CEMs shall be deemed to be sent in bulk if a person sends, causes to be sent or authorizes the sending of-&lt;/p&gt;
&lt;p&gt;a) more than 100 messages containing the same subject matter during a 24-hour period;&lt;/p&gt;
&lt;p&gt;b) more than 1,000 messages containing the same subject matter during a 30-day period;&lt;/p&gt;
&lt;p&gt;c) more than 10,000 messages containing the same subject matter during a one-year period.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic message"[10]&lt;/p&gt;
&lt;p&gt;where, an "electronic message" means a message sent by any means of telecommunication, including a text, sound, voice or image message.[11]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These rules apply to all unsolicited direct marketing communications by automatic call machines[12], fax[13], calls[14] or e-mail[15].&lt;/p&gt;
&lt;p&gt;Where, "direct marketing" is defined as "the communication (by whatever means) of any advertising or marketing material which is directed 					to particular individuals"[16]&lt;/p&gt;
&lt;p&gt;The UK used its discretion to include voice-to-voice telephone calls as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;&lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message provides-&lt;/p&gt;
&lt;p&gt;(i)clear and conspicuous identification that the message is an advertisement or solicitation;&lt;/p&gt;
&lt;p&gt;(ii)clear and conspicuous notice of the opportunity under paragraph (3) to decline to receive further commercial electronic mail messages 					from the sender; and&lt;/p&gt;
&lt;p&gt;(iii) a valid physical postal address of the sender.[17]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 16 prohibits the sending of unsolicited commercial electronic messages. However, where a recipient has consented to the sending of 					the message, the said prohibition does not apply.[18]&lt;/p&gt;
&lt;p&gt;Consent means:&lt;/p&gt;
&lt;p&gt;(a) express consent; or&lt;/p&gt;
&lt;p&gt;(b) consent that can reasonably be inferred from:&lt;/p&gt;
&lt;p&gt;(i) the conduct; and&lt;/p&gt;
&lt;p&gt;(ii) the business and other relationships;&lt;/p&gt;
&lt;p&gt;of the individual or organisation concerned.[19]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message contains-&lt;/p&gt;
&lt;p&gt;1 a) an electronic mail address, an Internet location address, a telephone number, a facsimile number or a postal address that the 					recipient may use to submit an unsubscribe request; and&lt;/p&gt;
&lt;p&gt;b) a statement the above information may be utilized to send an unsubscribe request.&lt;/p&gt;
&lt;p&gt;2. Where the unsolicited CEM is received by text or multimedia message sent to a mobile telephone number, the CEM must include a mobile 					telephone number to which the recipient may send an unsubscribe request. [20]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the CASL, it is prohibited to send or cause or permit to be sent to an electronic address a commercial electronic message unless,&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person to whom the message is sent has consented to receiving it, whether the consent is express or implied; &lt;i&gt;and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;)&lt;/p&gt;
&lt;p&gt;The message must-&lt;/p&gt;
&lt;p&gt;(i) set out prescribed information that identifies the person who sent the message and the person - if different - on whose behalf it is 					sent;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;ii&lt;/i&gt;) set out information enabling the person to whom the message is sent to readily contact one of the persons referred to in 					paragraph&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;i&lt;/i&gt;); and&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;iii)&lt;/i&gt; set out an unsubscribe mechanism in accordance with subsection 11(1) of CASL.[21]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Under Section 19&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, communications comprising recorded matter for direct marketing 					purposes by means of an automated calling system except in the circumstances where the called line is that of a subscriber who has 					previously notified the caller that &lt;i&gt;for the time being he consents to such communications&lt;/i&gt; being sent by, or at the instigation of, 					the caller on that line.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 20&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, unsolicited communications for direct marketing purposes by means of 					a facsimile machine where the called line is that of an individual or a company except in the circumstances where the individual subscriber 					has previously notified the caller that he consents for the time being to such communications being sent by, or at the instigation of, the 					caller.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 21,&lt;/b&gt; A person shall neither use, nor instigate the use of, a public electronic communications service for the purposes of making unsolicited calls for direct marketing purposes where the called line is that of a subscriber who has					&lt;i&gt;previously notified the caller that such calls should not for the time being be made on that line&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 22&lt;/b&gt; , a person shall neither transmit, nor instigate the transmission of, unsolicited communications for the purposes of direct marketing by means of electronic mail unless the recipient of the electronic mail has previously notified the sender that					&lt;i&gt;he consents for the time being to such communications being sent by, or at the instigation of, the sender.&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Labelling Requirements&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Warning Labels mandatory on e-mails containing pornographic content&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;No person may send to a protected computer, any commercial electronic mail message that includes sexually oriented material and-&lt;/p&gt;
&lt;p&gt;(a) fail to include in subject heading for the electronic mail message the marks or notices prescribed by the law; or&lt;/p&gt;
&lt;p&gt;(B) fail to provide that the matter in the message&lt;/p&gt;
&lt;p&gt;that is initially viewable to the recipient, when the message is opened by any recipient and absent any further actions by the recipient, 					includes only-&lt;/p&gt;
&lt;p&gt;(i) material which the recipient has consented to;&lt;/p&gt;
&lt;p&gt;(ii) the identifier information required to be included in pursuance Section 5(5); and&lt;/p&gt;
&lt;p&gt;(iii) Instructions on how to access, or a mechanism to access, the sexually oriented material.[22]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;True e-mail title and clear identification of advertisements with "ADV" label&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Every unsolicited CEM must contain-&lt;/p&gt;
&lt;p&gt;a) where there is a subject field, a title which is not false or misleading as to the content of the message;&lt;/p&gt;
&lt;p&gt;b) the letters "&amp;lt;ADV&amp;gt;" with a space before the title in the subject field or if there is no subject field, in the words first 					appearing in the message to clearly identify that the message is an advertisement;&lt;/p&gt;
&lt;p&gt;c) header information that is not false or misleading; and&lt;/p&gt;
&lt;p&gt;d) an accurate and functional e-mail address or telephone number by which the sender can be readily contacted.[23]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Other Banned/Restricted Activities&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Illegal Access-&lt;/i&gt; &lt;i&gt;Prohibition Against Predatory and Abusive Commercial E-Mail-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"Whoever, in or affecting interstate or foreign&lt;/p&gt;
&lt;p&gt;commerce, knowingly-&lt;/p&gt;
&lt;p&gt;(1) accesses a protected computer without authorization, and intentionally initiates the transmission of multiple CEMs from or through such 					computer,&lt;/p&gt;
&lt;p&gt;(2) uses a protected computer to relay or retransmit multiple&lt;/p&gt;
&lt;p&gt;CEMs, with the intent to&lt;/p&gt;
&lt;p&gt;deceive or mislead recipients, or any Internet access service, as to the origin of such messages,&lt;/p&gt;
&lt;p&gt;(3) &lt;i&gt;materially falsifies header information&lt;/i&gt; in multiple commercial electronic mail messages and intentionally initiates&lt;/p&gt;
&lt;p&gt;the transmission of such messages,&lt;/p&gt;
&lt;p&gt;(4) registers, using information that materially &lt;i&gt;falsifies the identity of the actual registrant,&lt;/i&gt; for five or more electronic mail 					accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple&lt;/p&gt;
&lt;p&gt;commercial electronic mail messages from any combination of such accounts or domain names, or&lt;/p&gt;
&lt;p&gt;(5) falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet 					Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses, or 					conspires to do so, shall be punished as provided for in the Act.[24]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Supply of address harvesting software and harvested‑address lists &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"A person must not supply or offer to supply:&lt;/p&gt;
&lt;p&gt;(a) address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(b) a right to use address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(c) a harvested address list; or&lt;/p&gt;
&lt;p&gt;(d) a right to use a harvested‑address list;&lt;/p&gt;
&lt;p&gt;to another person if:&lt;/p&gt;
&lt;p&gt;(e) the supplier is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(f) the customer is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer."&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Dictionary Attacks and Address harvesting software&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"No person shall send, cause to be sent, or authorize the sending of, an electronic message to electronic addresses generated or obtained 					through the use of-&lt;/p&gt;
&lt;p&gt;a) a dictionary attack;&lt;/p&gt;
&lt;p&gt;b) address harvesting software.[25]&lt;/p&gt;
&lt;p&gt;Where,&lt;/p&gt;
&lt;p&gt;"dictionary attack" means the method which by which the electronic address of a recipient is obtained using an automated means that 					generates possible electronic addresses by combining names, letters, numbers, punctuation marks or symbols into numerous permutations.[26] 					And,&lt;/p&gt;
&lt;p&gt;"address harvesting software" means software that is specifically designed or marketed for use for-&lt;/p&gt;
&lt;p&gt;a)searching the Internet for electronic addresses; and,&lt;/p&gt;
&lt;p&gt;b) collecting, compiling, capturing or otherwise harvesting those electronic addresses."[27]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Altering Transmission Data&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"It is prohibited, in the course of a commercial activity, to alter or cause to be altered the transmission data in an electronic message 					so that the message is delivered to a destination other than or in addition to that specified by the sender, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the alteration is made with the express consent of the sender or the person to whom the message is sent, and the person 					altering or causing to be altered the data complies with subsection 11(4) of CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the alteration is made in accordance with a court order.[28]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Installation of Computer Program&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person must not, in the course of a commercial activity, install or cause to be installed a computer program on any other person's 					computer system or, having so installed or caused to be installed a computer program, cause an electronic message to be sent from that 					computer system, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person has obtained the express consent of the owner or an authorized user of the&lt;/p&gt;
&lt;p&gt;computer system and complies with subsection 11(5) of the CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the person is acting in accordance with a court order.&lt;/p&gt;
&lt;p&gt;(2) A person contravenes subsection (1) only if the computer system is located in Canada at the relevant time or if the person either is in 					Canada at the relevant time or is acting under the direction of a person who is in Canada at the time when they give the directions."[29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic mail for direct marketing purposes where the identity or address of the sender is concealed&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person shall neither transmit, nor instigate the transmission of, a communication for the purposes of direct marketing by means of 					electronic mail-&lt;/p&gt;
&lt;p&gt;(a) where the identity of the person on whose behalf the communication has been sent has been disguised or concealed; or&lt;/p&gt;
&lt;p&gt;(b)where a valid address to which the recipient of the communication may send a request that such communications cease has not been 					provided.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Types of Senders Covered&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;the term ''sender'', when used with respect to a commercial electronic mail message, means a person who initiates such a message and whose 					product, service, or Internet web site is advertised or promoted by the message."[30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person must not &lt;i&gt;send&lt;/i&gt;, or &lt;i&gt;cause to be sent&lt;/i&gt;, a commercial electronic message that:&lt;/p&gt;
&lt;p&gt;(a) has an Australian link; and&lt;/p&gt;
&lt;p&gt;(b) is not a designated commercial electronic message.[31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers,&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;beneficiaries, and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;providers of support&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;services&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"sender" means a person who sends a message, causes the message to be sent, or authorizes the sending of the message.[32]&lt;/p&gt;
&lt;p&gt;Further, persons aiding or abetting the offences under Section 9 or 11 are also punishable under the Act.[33]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Under Section 6, it is prohibited to &lt;i&gt;send&lt;/i&gt; or &lt;i&gt;cause or permit to be sent&lt;/i&gt; to an electronic address a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 7, It is prohibited, in the course of a commercial activity, to &lt;i&gt;alter or cause to be altered&lt;/i&gt; the transmission data 					in a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 8, A person must not, in the course of a commercial activity, &lt;i&gt;install or cause to be installed&lt;/i&gt; a computer program on 					any other person's computer system or, &lt;i&gt;having so installed or caused to be installed&lt;/i&gt; a computer program, cause an electronic 					message to be sent from&lt;/p&gt;
&lt;p&gt;that computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The texts of Sections 19, 20, 21 and 22 all prohibit the transmission as well as the instigation of the transmission of, communications for 					direct marketing purposes without the consent of the recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Who Can Sue&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;FTC[34], Attorney Generals[35], ISPs and IAPs[36] and most recently even companies/private entities[37]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Australian Communications and Media Agency (ACMA)[38]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[39]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[40]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who suffers damage by reason of any contravention of any of the requirements of these Regulations.[41]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Transactional or Relationship Messages&lt;/i&gt; [42]&lt;/p&gt;
&lt;p&gt;where,&lt;/p&gt;
&lt;p&gt;The term ''transactional or relationship&lt;/p&gt;
&lt;p&gt;message'' means an electronic mail message the primary purpose of which is-&lt;/p&gt;
&lt;p&gt;(i) to facilitate, complete, or confirm a commercial&lt;/p&gt;
&lt;p&gt;transaction;&lt;/p&gt;
&lt;p&gt;(ii) to provide warranty information, product recall information, etc. with respect to a commercial product or service used or purchased by 					the recipient;&lt;/p&gt;
&lt;p&gt;(iii) to provide notifications-&lt;/p&gt;
&lt;p&gt;(I) concerning a change in the terms or features of;&lt;/p&gt;
&lt;p&gt;(II) of a change in the recipient's standing or status with respect to; or&lt;/p&gt;
&lt;p&gt;(III) information with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship involving the&lt;/p&gt;
&lt;p&gt;ongoing purchase or use by the recipient of products or services offered by the sender;&lt;/p&gt;
&lt;p&gt;(iv) to provide information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, participating,&lt;/p&gt;
&lt;p&gt;or enrolled; or&lt;/p&gt;
&lt;p&gt;(v) to deliver goods or services, including product updates or upgrades, that the recipient is entitled to receive under the terms of a 					transaction that the recipient has previously agreed to enter into with the sender.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Designated Commercial Electronic Message&lt;/i&gt; (DCEM). A DCEM is a message containing &lt;i&gt;purely factual information&lt;/i&gt;, any related comments of non-commercial nature and some limited 					commercial information as to the identity of the sender company/individual.[43]&lt;/p&gt;
&lt;p&gt;A message is a DCEMs if-&lt;/p&gt;
&lt;p&gt;a) the sending of the message is authorized by any of the following bodies:&lt;/p&gt;
&lt;p&gt;(i) a government body;&lt;/p&gt;
&lt;p&gt;(ii) a registered political party;&lt;/p&gt;
&lt;p&gt;(iii) a religious organization;&lt;/p&gt;
&lt;p&gt;(iv) a charity or charitable institution; and&lt;/p&gt;
&lt;p&gt;(b) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(c) the body is the supplier, or prospective supplier, of the goods or services concerned.[44]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Messages from educational institutions:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;an electronic message is a &lt;b&gt;&lt;i&gt;DCEM &lt;/i&gt;&lt;/b&gt;if:&lt;/p&gt;
&lt;p&gt;(a) the sending of the message is authorised by an educational institution; and&lt;/p&gt;
&lt;p&gt;(b) either or both of the following subparagraphs applies:&lt;/p&gt;
&lt;p&gt;(i) the relevant electronic account‑holder is, or has been, enrolled as a student in that institution;&lt;/p&gt;
&lt;p&gt;(ii) a member or former member of the household of the relevant electronic account‑holder is, or has been, enrolled as a student in 					that institution; and&lt;/p&gt;
&lt;p&gt;(c) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(d) the institution is the supplier, or prospective supplier, of the goods or services concerned.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic Messages authorized by the Government&lt;b&gt;[45]&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on 					the occurrence of any public emergency, in the public interest or in the interests of public security or national defence.[46]&lt;/p&gt;
&lt;p&gt;A certificate signed by the Minister shall be conclusive evidence of existence of a public emergency and the other above stated 					matters.[47]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt;Family and Personal relationships, &lt;/i&gt; where &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;"Family relationship" is a relationship between two people related through marriage, a common law partnership, or any legal parent-child 					relationship who have had direct, voluntary two-way communications; and&lt;/p&gt;
&lt;p&gt;"personal relationship" means a relationship between two people who have had direct, voluntary two-way communications where it would be 					reasonable to conclude that the relationship is personal.[48]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt; Mails sent to an individual who practices a particular commercial activity with the mail containing solely an inquiry or 							application related to that activity&lt;b&gt;[49]&lt;/b&gt;. &lt;/i&gt; &lt;/li&gt;
&lt;li&gt; &lt;i&gt;A mail which&lt;/i&gt; - provides a quote or estimate for the supply of a product, goods, a service, etc. if requested by the recipient; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;· facilitates, completes or confirms a commercial transaction that the recipient previously agreed to enter into with the sender;&lt;/p&gt;
&lt;p&gt;· provides warranty information, product recall information etc. about a product, goods or a service that the recipient uses, has used 					or has purchased;&lt;/p&gt;
&lt;p&gt;· provides notification of factual information about-&lt;/p&gt;
&lt;p&gt;(i) the ongoing use or ongoing purchase by the recipient of a product, goods or a service offered under a subscription, membership, 					account, loan or similar relationship by the sender, or&lt;/p&gt;
&lt;p&gt;· provides information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, is currently participating or is currently enrolled;&lt;/p&gt;
&lt;p&gt;· delivers a product, goods or a service, including updates or upgrades, that the recipient is entitled to receive under the terms of 					a transaction that they have previously entered into with the sender.[50]&lt;/p&gt;
&lt;p&gt;· Telecommunications service provider merely because the service provider provides a telecommunications service that enables the 					transmission of the message.[51]&lt;/p&gt;
&lt;p&gt;· CEMs which are two-way voice communication between individuals sent by means of a facsimile or a voice recording sent to a telephone 					account.[52]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A person may send or instigate the sending of electronic mail for the purposes of direct marketing where&lt;/i&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the contact details of the recipient of that electronic mail in the course of the sale or negotiations for the sale of a product or 					service to that recipient;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the direct marketing is in respect of that person's similar products and services only; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the recipient has been given a simple means of refusing (free of charge except for the costs of the transmission of the refusal) the 					use of his contact details for the purposes of such direct marketing, at the time that the details were initially collected, and, where he 					did not initially refuse the use of the details, at the time of each subsequent communication.[53]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil and Criminal&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Statutory damages-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Amount calculated by multiplying the number of violations by up to $250. Total amount of damages may not exceed $2,000,000. [54]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Imprisonment- &lt;/b&gt; upto 5 years.[55]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Forfeiture from the offender, of-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;i) any property, real or personal, constituting or&lt;/p&gt;
&lt;p&gt;traceable to gross proceeds obtained from such offense;&lt;/p&gt;
&lt;p&gt;ii) any equipment, software, or other technology used or intended to be used to commit or to facilitate the commission of such offense.[56]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate with prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 500 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 250 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 10,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 5,000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 20 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 10 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 400 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 200 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person with prior record,&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1,000 penalty units in any other case.[57]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;i) &lt;b&gt;Injunction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Damages-&lt;/b&gt; calculated in terms of loss suffered as a direct or indirect result of the contravention of the Act.&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Statutory Damages&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;not exceeding $25 for each CEM; and not exceeding in the aggregate $1 million, unless the plaintiff proves that his actual loss from such 					CEMs exceeds $1 million.[58]&lt;/p&gt;
&lt;p&gt;iii)Costs of litigation to the plaintiff.[59]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Administrative Monetary Penalty&lt;/b&gt; , the purpose of which is to promote compliance with the Act and not to punish.[60]&lt;/p&gt;
&lt;p&gt;The maximum penalty for a violation is $1,000,000 in the case of an individual, and $10,000,000 in the case of any other person.[61]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil on private action; Criminal for non-compliance with IC's notice&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person who suffers damage by reason of any contravention of any of the requirements of these Regulations by any other person shall be 					entitled to bring proceedings &lt;i&gt;for compensation&lt;/i&gt; from that other person for that damage.[62]&lt;/p&gt;
&lt;p&gt;The enforcement authority for these regulations is Britain's Information Commissioner who oversees both the Act and the Regulations, and 					investigates complaints and makes findings in the form of various types of notices.[63]&lt;/p&gt;
&lt;p&gt;Failure to comply with any notice issued by the Information Commissioner is a criminal offence and is punishable with a fine of upto 					£5000 in England and Wales and £10,000 Scotland.[64]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;THE PROBLEM OF SPAM -WHY IT PERSISTS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per a study conducted by &lt;i&gt;Kaspersky Lab &lt;/i&gt;in 2014, 66.34% of all messages exchanged over the internet were spam.[65] Over the 2000s, several 	countries recognized the threats posed by spam and enacted specific legislations to tackle the same. The ones taken into consideration in this paper are 	the CAN-SPAM Act, 2003 of the United States, Canada's Anti-Spam Legislation, 2014, The Spam Act, 2003 of Australia, Singapore's Spam Control Act, 2007 and 	The Privacy and Electronic Communications (EC Directive) Regulations, 2003 (United Kingdom). As will be analyzed in the course of this paper, none of these 	laws have evolved to become comprehensive mechanisms for combating spam yet. Nevertheless, post the enactment of these laws, spam has reduced as a 	percentage of the net email traffic; however, the absolute quantity of spam has increased owing to the exponential growth of email traffic universally.[66]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who Benefits from Spam?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;Commercial establishments -&lt;/i&gt; Spamming is one of the most cost-effective means of promoting products and services to a large number of potential 	customers. Spams are not necessarily duplicitous and often contain legitimate information to which a fraction of the recipients respond positively. As per 	a recent study, for spam to be profitable, only 1 in 25,000 spam recipients needs to open the email, get enticed, and make a gray-market purchase.[67]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Non-commercial establishments benefitting from advertisements -&lt;/i&gt; Many seemingly non-profit messages benefit from revenue generated through 	advertisements when recipients visit their site. Advertisers pay these sites either per click or per impression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Spammers &lt;/i&gt;- The costs incurred by spammers largely include the cost of e-mail/phone number harvesting and the cost of paying botnet operators. 	As compared to the revenue generated as a percentage of profits earned by the merchant on whose behalf spam messages are sent, these costs are 	negligible.[68]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, spamming proves to be an activity that involves minimal investment and often yields some response from prospective clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The impact of spam is clearly widespread. Presently, India lacks a specific anti-spam legislation. In consideration of the swelling growth of spam across 	the globe and the increasing number of Indian users, it is of utmost urgency that a specific legislation is formulated to tackle the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OBSERVATIONS AND ANALYSIS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Definition of Spam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;'Spam' must be defined in a technologically neutral manner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legislations analyzed in this paper deal with either one or a cluster of modes of communication through which spam may be sent. However, it is 	essential that 'spam' is defined in a manner that is technologically neutral. Most commercial spam is aimed at promoting products and services to a large 	number of prospective customers. Thus, making only spam e-mails illegal, like the CAN-SPAM Act does, fails to address the issue wholly as companies would 	always retain the option of sending unsolicited messages through other communicative devices. It becomes an issue of merely switching modes of 	communication without there being any actual deterrence to spamming. Thus, a narrow understanding of spam, limiting it to one or few modes of 	communication, is problematic and for a model law, a broader definition that discourages unsolicited messages sent via any network is warranted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Non-commercial spam must also be addressed&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The five legislations examined in this paper address only the issue of unsolicited 'commercial' mails/messages. For instance, under the CAN-SPAM, a commercial mail means "	&lt;i&gt;any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service&lt;/i&gt;". 	Singapore's Spam Control Act defines a commercial message in a similar fashion but more elaborately. CASL, while limiting the scope of the law to 	commercial mail, additionally prescribes that such communication need not have a profit motive. Australia's Spam Act defines a commercial message as a 	message that has the purpose of offering, advertising or promoting goods or services or the supplier or prospective supplier of goods or services. Under 	the EC Directive, the term used is 'marketing communication'; however, in essence, it includes only commercial communications.[69] These definitions suffer 	from an obvious exclusion error. It is known from experience that not all unsolicited messages received are in pursuance of commercial interests. Often, 	unsolicited mails and messages are received with explicit sexual content as well as promoting political and religious agendas sent by party volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it would be in higher consonance with the greater aim of curbing spam to broaden the scope of these legislations to address both commercial as well 	as non-commercial messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Bulk requirement and its quantification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Singaporean law makes 'sent in bulk' a mandatory requirement for spam. However, deciding what quantity of a particular message qualifies it as bulk is 	difficult. If an objective threshold is set, say 100 messages in 24 hours, then anything short of that, say even 99 messages, go unaddressed simply because 	it does not meet the statutory requirement of being in bulk. This enables spammers to misuse the law by marginally falling short of the threshold and still 	continuing to spam. The issue here is comparable to the one faced in setting age as bar to criminal culpability. No matter what, any number arrived at is 	likely to be arbitrary and consequently subject of criticism. A possible way to tackle this would be to strengthen the unsubscribe mechanisms by virtue of 	which individuals are able to, at the very least, stop receiving unsolicited mails. For the determination of threshold for State action and its 	feasibility, a much more detailed study is merited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt- out Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Double Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Countries following the model&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States of America and Singapore&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Canada, Australia and the United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;None at present.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;When messages may be sent&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;At all times until recipient voluntarily opts out/unsubscribes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient voluntarily opts-in/subscribes to receive messages by submitting his/her contact details to be part of a 					particular mailing list.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient responds in the affirmative to the confirmation mail sent by the sender on receiving an opt-in request from the 					recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Specific requirements&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The mail/message must bear a clear identifier of its content. E.g. marked as 'ADVT' for advertisements;&lt;/p&gt;
&lt;p&gt;2. An 'unsubscribe' option must be provided in the message which may be utilized by the recipient to express his/her disinterest in the 					message; and&lt;/p&gt;
&lt;p&gt;3. The message must conspicuously bear a valid physical postal address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Promotes commercial speech rights-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Since the default position presumes the right to market, average collection rates are considerably higher as more emails can be sent to 					more people.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Reduction in unsolicited messages-&lt;/i&gt; Commercial messages are not sent until the recipient voluntarily consents to receiving such 					messages by submitting his/her contact information.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;Availability of unsubscribe option-&lt;/i&gt; Even after a recipient voluntarily opts in, he/she still has the right to withdraw from 					such messages by unsubscribing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Ensures people are entering their information correctly, which equals a cleaner list and lowers bounce rates.&lt;/p&gt;
&lt;p&gt;2. Reduces the probability of spam complaints because subscribers have had to take the extra step to confirm their consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disadvantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. This merely places the &lt;i&gt;burden of reduction of spam on the recipients&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;2. The &lt;i&gt;functionality of the 'unsubscribe' link is itself questionable.&lt;/i&gt; Very often these links themselves are fraudulent. In such a 					case, the recipient is further harmed before any opting-out can even take place.&lt;/p&gt;
&lt;p&gt;3. In the absence of any strict regulatory oversight, there exists &lt;i&gt;no&lt;/i&gt; &lt;i&gt;incentive&lt;/i&gt; for the senders to strictly address 					unsubscribe requests.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Consent may be obtained in fact but not in spirit&lt;/i&gt; through inconspicuous pre-ticked check boxes.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;E-mail addresses may be added to a list by spambots&lt;/i&gt;. Where, the person 'opted-in' may not actually be the person opting in.&lt;/p&gt;
&lt;p&gt;3. &lt;i&gt;Errors may be made when entering emails&lt;/i&gt;; a typo may result in someone submitting an address that is not theirs.&lt;/p&gt;
&lt;p&gt;4. Legitimate addresses may be added by someone who does not own the address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Genuine subscribers may not understand clearly the confirmation process and fail to click the verification link.&lt;/p&gt;
&lt;p&gt;2. Confirmation emails may get stuck in spam filters.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The comparison above highlights that the opt-out model as well as the opt-in model may leave loopholes. The opt-in model has been advocated for as the 	better model as compared to the opt-out model as it prohibits the sending of messages unless the recipient consents to receiving such messages. However, as 	pointed out above, in this model consent may be given by entities other than the owner of the contact details. In such a situation, a double opt-in model 	may be a viable option to contemplate as it is the only model where it can be ensured that only the addressee is enabled to successfully opt-in.[70]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the double opt-in model has not been adopted by any of the countries discussed in this paper. Nonetheless, it seems to have the potential to aid 	the fight against spam more effectively than the existing models. Its real efficacy however, shall be proven only on practical implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;Family and Personal Relationships&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the CASL, an exception is made for &lt;i&gt;'personal&lt;/i&gt; &lt;i&gt;relationships'&lt;/i&gt; and &lt;i&gt;'family relationship'&lt;/i&gt;. However, these terms are defined 	quite narrowly. For instance, family relationship is defined as 'a relationship between two people related through marriage, a common law partnership, or 	any legal parent-child relationship and those individuals have had direct, voluntary, two-way communication'.&lt;sup&gt;[71]&lt;/sup&gt; This implies that in a 	situation where an individual wants to send a message offering to sell something to an individual in his extended family, say his cousins, doing so without 	obtaining their consent first, would qualify his mail as spam under the CASL. This would become especially problematic in the Indian context where 	comparatively larger family structures prevail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the anti-spam legislations of the other four countries, no such exceptions are made. Quite obviously, these exceptions are of crucial significance and 	must be provided in any anti-spam legislation; however, it is important that they are defined in a manner such that their actual purpose i.e. of exclusion 	of familial and personal relationships from regulations applicable to spammers, is effectively achieved and the law does not become a creator for 	unnecessary litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Transactional Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term 'transactional messages' is used only under the CAN-SPAM Act of the USA. It basically covers messages sent when the recipient stands in an 	existing transactional relationship with the sender and the mail contains information specific to the recipient. It also includes employment relationships. 	In CASL, a similar exception is made under Section 6(6). The section is worded almost identically as the CAN-SPAM provision, though the term 'transactional 	messages' is not used. In the UK laws, messages for the purpose of direct marketing may be sent where the contact information of the recipient is received 	in the course of the sale or negotiations for the sale of a product or service to that recipient, thus implying an existing transactional relationship. One 	added proviso under the UK law is that the recipient must be clearly and distinctively given the opportunity to object, free of charge and in an easy 	manner, to the use of the e-mail address when collected and on the occasion of each message in case the customer has not initially refused such use.[72]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception for transactional messages is essential to ensure freedom of commercial speech rights even while effectively tackling spam. In the formulation 	of a model law, a combination of the American and the English laws may be workable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Governmental Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Spam Act, 2003 of Australia makes an exemption for &lt;i&gt;'designated commercial electronic message (DCEM)'&lt;/i&gt;. This exemption is to avoid any 	unintended restriction on communication between the government and the community.&lt;sup&gt;[73]&lt;/sup&gt; In order to be a DCEM, a message must-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Be authorized by the government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Contain purely factual information and any related comments of non-commercial nature; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Contain some information as to the identity of the sender company/individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DCEMs need not always be sent by government bodies and may also be sent by third parties authorized by the government.&lt;sup&gt;[74]&lt;/sup&gt; Such messages are 	exempt from the consent requirement as well as the unsubscribe option requirement but must comply with the identifier requirement. However, where 	government bodies are operating in a competitive environment, the provisions of the act would apply normally to them.&lt;sup&gt;[75]&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Singapore's Spam Control Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on the occurrence of any &lt;i&gt;public emergency&lt;/i&gt;, in &lt;i&gt;public interest&lt;/i&gt; or in the &lt;i&gt;interests of public security&lt;/i&gt; or	&lt;i&gt;national defence&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These exemptions are essential in order to enable free communication of important information between the government and the citizens. The Singaporean 	wording of the exception is rather broad and would give the government immense space for misusing the law. Such a wording might be more effective if 	supplemented with the Australian proviso wherein governmental communications operating in a competitive environment are excluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Penalties must be higher than benefit from spamming&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the penalty prescribed itself is too low, such that loss suffered from paying penalties is lower than net benefit from spamming, the spammer is not 	sufficiently deterred. Four out of the five countries analyzed in this paper prescribe only civil penalties in the form of fines for spamming. Recently, a 	Facebook spammer was found to have made a profit of $200 million in a year.[76] For instance, as noted above, the Australian law sets a limit for penalty 	at $1 million. Thus, such a penalty would constitute a small fraction of the profit from spamming and would not deter a spammer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. High penalty does not imply effective deterrence where probability of prosecution is low.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CAN-SPAM Act prescribes the harshest penalties including both civil as well as criminal penalties. However, it has been rather ineffective in reducing spam. This is for the reason that this Act is more about how to spam legally than anything else. It is more like- '	&lt;i&gt;you can spam but do not use false headers&lt;/i&gt;.'[77] As a consequence, unintentional spam from ignorant commercial establishments has reduced. However, 	due to easy compliance standards, the 'real' spammers still go undetected to a large extent.[78] Thus, even moderate penalties may serve as good deterrents 	where the probability of prosecution is high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. Effective enforcement is the key to effective deterrence.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cornerstone of an effective spam law is effective enforcement. Penalties must be enforced in a manner that the cost of punishment is always higher than 	the benefit from spamming and the probability of conviction is high. In order to implement legislative measures effectively, governments should also 	undertake an information campaign on spam issues targeting users, business communities, private sector groups and other stakeholders as the one primary 	reason for sustenance of spam is the response received from certain recipients. Such supplementary activities would also facilitate the preservation of 	commercial rights as excessive penalties could inhibit regular commercial activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The observations made in this paper are crucial to the formulation of a model anti-spam law for India. The most important part of any ant-spam legislation 	would be the definition of 'spam' which, as established above, must be technologically neutral in order to be able to address as much unsolicited 	communication as possible. On the question of consent, a double opt-in is what this paper would propose. This model has been contemplated and recommended 	by academic and policy researchers as a possibly more effective consent model for spam laws; however, it has not been codified as a legal regime till date. 	It could be a rather groundbreaking approach that India could adopt as this clearly is the only model where 'opting-in' is realized in fact and in spirit. 	Further, exceptions are necessary in order to prevent the abuse of laws making certain such exceptions do not suffer from inclusive or exclusion errors. A 	combination of the exceptions under the Australian and the American laws seems ideal at this stage of research. In terms of penalty, this paper observed 	that only prescribing harsh penalties is not sufficient to effectively deter spammers but efficient modes of enforcement have to be formulated to ensure 	actual deterrence. Lastly, while a well-drafted national anti-spam legislation is clearly the need of the hour for India; additional steps have to be taken 	towards sensitizing citizens to the fact that the problem of spam is real and a costly threat to the communications infrastructure of the country and 	combat has to begin at the individual level.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[1] CAN-SPAM Act, § 7706(f) (7).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2] Spam Act, 2003, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Canada's Anti-Spam Legislation, 2014, § 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Canada's Anti-Spam Legislation, 2014, § 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6] 15 U.S.C. § 7701 (2003).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] CAN-SPAM Act, Section 3 (2)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Spam Act, 2003, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Spam Control Act, 2007, § 5(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Canada's Anti-Spam Legislation, 2014, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Canada's Anti-Spam Legislation, 2014, § 1(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Regulation 19, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13] Regulation 20, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Regulation 21, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Regulation 22, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Section 11, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] CAN-SPAM Act, Section 5(5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Spam Act, 2003, § 16(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Spam Act, 2003, Schedule 2 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Spam Control Act, 2007 Section 11, Schedule 2(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Canada's Anti-Spam Legislation, 2014, Section 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] CAN-SPAM Act, 2003, Section 5(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Spam Control Act, 2007, Schedule 2, 3(1), Section 11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Chapter 47 of title 18, U.S.C., § 1037, inserted through an amendment by the CAN-SPAM Act, § 4(a) (1); '§ 5(A)(1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Spam Control Act, 2007, '§ 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Canada's Anti-Spam Legislation, 2014, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29] Canada's Anti-Spam Legislation, 2014, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30] CAN-SPAM Act, 2003, § 3(16)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Spam Act, 2003, Section 16(1), Section 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Spam Control Act, 2007, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Spam Control Act, 2007, § 12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] CAN-SPAM Act, 2003, § 7(a)(c)(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] CAN-SPAM Act, 2003, § 7(f)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] CAN-SPAM Act, 2003, § 7(g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] &lt;i&gt;MySpace, Inc. v. The Globe.com, Inc.&lt;/i&gt;, 2007 WL 1686966 (C.D. Cal., Feb. 27, 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Spam Act, 2003, § 26(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Spam Control Act, 2007, § 13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[40] Canada's Anti-Spam Legislation, § 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[41] Regulation 30(1), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[42] CAN-SPAM Act, 2003, § 3(2)(B)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[43] Spam Act, 2003, Schedule 1, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[44] Spam Act, 2003, Schedule 1, § 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[45] Spam Control Act, 2007, § 7(3)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[46] Spam Control Act, 2007, First Schedule Clause (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[47] Spam Control Act, 2007, First Schedule Clause (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[48] Canada's Anti-Spam Legislation, § 6(5a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[49] Canada's Anti-Spam Legislation, § 6(5b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[50] Canada's Anti-Spam Legislation, § 6(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[51] Canada's Anti-Spam Legislation, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[52] Canada's Anti-Spam Legislation, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[53]Section 22(3), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[54] CAN-SPAM Act, § 7 (f)(3)(A).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[55] CAN-SPAM Act, § 4 (b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[56] CAN-SPAM Act, § 4 (c)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[57] Spam Act, 2003, Sections 24, 25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[58] Spam Control Act, 2007, § 14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[59] Spam Control Act, 2007, § 15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[60] Canada's Anti-Spam Legislation, 2014, § 20(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[61] Canada's Anti-Spam Legislation, 2014, § 20(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[62] Regulation 30(1), EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[63] Regulations 31-32, EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[64] Section 47 and 60, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[65] Spam and Phishing Statistics Report Q1-2014, Kaspersky Lab&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q1-2014#.VVQxNndqN5I (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[66] Snow and Jayakar, Krishna, &lt;i&gt;Can We Can Spam? A Comparison of National Spam Regulations,&lt;/i&gt; August 15, 2013. TPRC 41: The 41st Research Conference 	on Communication, Information and Internet Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[67] Justin Rao and David Reiley, &lt;i&gt;The Economics of Spam, &lt;/i&gt;Vol.&lt;i&gt; &lt;/i&gt;26, No. 3 The Journal of Economic Perspectives (2012), p. 104.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[68] Supra n. 66; p. 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[69] Refer Table in Section 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[70] Dr. Ralph F. Wilson, &lt;i&gt;Spam, Spam Bots, and Double Opt-in E-mail Lists, &lt;/i&gt;April 21, 2010; available at 	http://webmarketingtoday.com/articles/wilson-double-optin/ (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[71] Section 2(a), Electronic Commerce Protection Regulations, http://fightspam.gc.ca/eic/site/030.nsf/eng/00273.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 	2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[72] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[73] &lt;i&gt;Spam Act 2003- A Practical Guide for Government, &lt;/i&gt;Australian Communications Authority, available at- 	http://www.acma.gov.au/webwr/consumer_info/spam/spam_act_pracguide_govt.pdf (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[74] &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[75] &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[76] Charles Arthur, &lt;i&gt;Facebook spammers make $200m just posting links, researchers say, &lt;/i&gt;The Guardian, 28&lt;sup&gt;th&lt;/sup&gt; August 2013, 	http://www.theguardian.com/technology/2013/aug/28/facebook-spam-202-million-italian-research (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[77] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[78] Carolyn Duffy Marsan, &lt;i&gt;CAN-SPAM: What went wrong?, &lt;/i&gt;6&lt;sup&gt;th&lt;/sup&gt; October 2008, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://www.networkworld.com/article/2276180/security/can-spam--what-went-wrong-.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions'&gt;https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rakshanda Deka</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-02T16:21:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anti-social-network">
    <title>Anti-Social Network</title>
    <link>https://cis-india.org/news/anti-social-network</link>
    <description>
        &lt;b&gt;Social media is driving teens to a reality they can't handle. This article by Max Martin was published in Mail Today on February 27, 2011. &lt;/b&gt;
        
&lt;p&gt;THIS is the generation of instant messaging and two-minute noodles. Impatient teenagers are always plugged in to their computers and cell phones. Their reality is virtual and most of their friends can be found online. "It's the coolest way to keep in touch," says Charlotte William, a college student in Bangalore whose Facebook was got flooded with birthday greetings on Saturday. Her FB page is an almost-instantly updated open book of her life.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Such minute-by-minute minute updates are an integral part of any teenager's life but the older generation is cautious. Not just old-fashioned people but even the tech-savvy are raising several issues with this uncontrolled explosion of social networking. India is the seventh largest social networking market in the world, with millions of users and many issues like privacy, etiquette, commercial, and political interests. Even though people have control over the information they post online, unauthorised access&amp;nbsp;--&amp;nbsp;usage and republication -- is a major cause of concern, says Nikhil Pahwa, who publishes MediaNama, a mobile business news site based in Delhi. "You put up information about friends and family without realising the enormous consequences of it being in the public domain," says Pahwa.&lt;/p&gt;
&lt;p&gt;"I see a lot of people exchanging personal messages and phone numbers on their walls. A lot of people are rather nonchalant about it," says Christian Wolff, a German development researcher, living in Hyderabad, who finds it amazing how Indians are not as concerned about their privacy as they should be. Bangalore-based lawyer Sarim Naved says the internet gives people a misplaced sense of anonymity, which makes them shed their inhibitions -- and etiquette. Should you allow a friend to post pictures of you from that crazy party last night? What if a family member sees them? We still live by traditional values and customs and footloose pictures may not be appreciated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;And while you may think that your privacy settings are in place to never allow such an unfortunate incident take place, privacy settings give a false sense of security. "Many people cannot figure out how to put filters on," says Yamini Atmavilas, a teacher of gender studies in Hyderabad. She also says that social networking is a mixed bag: "Studies show that women use social networks differently from men. They have helped build women's social capital, providing an outlet for connection and expression."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AARTI Mundkur, who was involved in the national 'Pink Chaddi' campaign against the pub-attacking Sri Ram Sene, agrees. "Social networks capture only the imagination of the upper middle class -- and fail to evoke any other kind of response," says this activist lawyer. While the social media is powerful -- and can be used for many purposes -- it is limited in scope.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, these sites are turning into what Wolff calls 'all-devouring marketing machines'. Facebook, for instance, is always in the midst of some controversy over its automatic personalisation or using technology to accommodate differences between individuals, so that disbursing personalised advertisements gets easier. Most of us do not realise that every little bit of information we post online is under the scrutiny of corporate entities that analyse and track browsing, spending, networking, and even music preferences.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"They make money with the data you post online for free," says Anivar Aravind, an IT consultant and commentator who started the online campaign for justice for Binayak Sen. "Even worse is when these service providers pass on this personal information to the government as Yahoo did in China leading to the imprisonment of a journalist," says Aravind.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also getting increasingly active in the online circuit are crooks, says Shantanu Ghosh, who handles the India product operations of Symantec, a leading network and computer security firm. These crooks, he says, launch virus attacks, put up false events to attract people, and spoof networking sites to extract personal data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This attack was observed before the Cricket World Cup 2011. Attackers had created a page offering ticket deals for the World Cup final in Mumbai, requiring users to log into their social networking accounts. Those who fell for this trick would have ended up revealing their confidential login information to these attackers." Ghosh advises: "You should treat anything you see online with skepticism -- especially if it involves clicking a link or installing an application." Also make sure you check and understand privacy policies and settings.&lt;/p&gt;
&lt;p&gt;This is even more important because existing laws on cyber crime are not strong enough. Also, the question whether new laws will be effective remains.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"It really depends on the law. If it goes into too much detail then it will be rendered irrelevant because of advancements in technology," says Sunil Abraham, who heads Centre for Internet and Society, a Bangalore-based research group. "A good law usually focuses on principles. What we need in India is a privacy regulator that can dynamically interpret the principles in law to quickly react to developments on the internet."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;&lt;li&gt;Read the article in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=2722011"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Also see the article in the Free Library &lt;a class="external-link" href="http://www.thefreelibrary.com/ANTI-+SOCIAL+NETWORK+(+Social+media+is+driving+teens+to+a+reality...-a0250124694"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the news from Mail Today &lt;a href="https://cis-india.org/advocacy/anti-social-network.pdf" class="internal-link" title="Anti-Social Network (PDF)"&gt;here&lt;/a&gt; (pdf, 2.92 MB)&lt;/li&gt;&lt;/ul&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anti-social-network'&gt;https://cis-india.org/news/anti-social-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:59:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women">
    <title>Anti-harassment app wins hackathon for women</title>
    <link>https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women</link>
    <description>
        &lt;b&gt;A team of four young women coders from Porta Allegra in Brazil has won the IGNITE International Girls Hackathon with an anti-harassment app called Não Me Calo, which means “I will not shut up”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was published in &lt;a class="external-link" href="http://www.scidev.net/global/gender/news/anti-harassment-app-wins-hackathon-women.html"&gt;Sci Dev Net&lt;/a&gt; on May 15, 2015. Rohini Lakshané gave her inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Não Me Calo allows users to review restaurants based on how they treat women. The &lt;a href="http://www.scidev.net/global/enterprise/data/"&gt;data&lt;/a&gt; then helps other patrons decide which restaurants are safest for women,  and publicly encourages restaurant owners and government officials to  fix harassment hotspots.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team competed against coders from India, Taiwan and the United  States to create the best app addressing the challenge of creating safe  spaces for women. They will now work with partners from the &lt;a href="http://ignite.globalfundforwomen.org/about"&gt;Global Fund for Women&lt;/a&gt;, which organised the hackathon, to fully develop the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Catherine King, the executive producer of the Global Fund for Women, says that the hackathon is meant to address the &lt;a href="http://www.scidev.net/global/governance/gender/"&gt;gender&lt;/a&gt; gap in access to information &lt;a href="http://www.scidev.net/global/enterprise/technology/"&gt;technology&lt;/a&gt;, and to encourage women to create and shape technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If girls aren’t accessing the internet and aren’t creating culture  themselves online and using their own voices online, then that means  other people are doing that,” Sara Baker, the coordinator of &lt;a href="https://www.takebackthetech.net/"&gt;Take Back the Tech!&lt;/a&gt;&lt;span&gt;,&lt;/span&gt; a global campaign to get more women online, told &lt;i&gt;SciDev.Net&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hackathon, which gave teams 24 hours to create their app, took place in February, and the winners were announced last month.&lt;br /&gt; &lt;br /&gt; King says that the teams’ responses to the challenge were influenced by  experiences in their own communities. For example, teams from India  designed apps for learning self-defence and sex &lt;a href="http://www.scidev.net/global/communication/education/"&gt;education&lt;/a&gt;.&lt;br /&gt; &lt;br /&gt; Women’s safety apps or features are becoming increasingly popular, particularly in &lt;a href="http://www.scidev.net/global/gender/analysis-blog/gender-atms-reporting-sexual-assault-bank-india.html"&gt;India where they are seen as a way to respond to public violence against women&lt;/a&gt;.  Earlier this year, Uber, the taxi-hailing app, added a new ‘SOS button’  to their Indian version after a driver raped a passenger in December  2014.&lt;br /&gt; &lt;br /&gt; But Rohini Lakshané, a researcher at the &lt;a href="http://www.cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in India, points out that these technologies can only go so far towards  preventing violence against women, and must be part of a broader  approach that also addresses the underlying social and cultural causes  of gender inequality.&lt;br /&gt; &lt;br /&gt; She adds that many apps fail to protect women because they are designed  by men who don’t understand the intricacies of women’s safety.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women'&gt;https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-20T13:25:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection">
    <title>Another Step towards Privacy Law</title>
    <link>https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection</link>
    <description>
        &lt;b&gt;A comparison between the 2012 experts’ report and the 2017 white paper on data protection.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The column was published in &lt;/span&gt;&lt;a class="external-link" href="http://www.governancenow.com/views/columns/another-step-towards-privacy-law-data-protection" style="text-align: justify; "&gt;Governance Now&lt;/a&gt;&lt;span style="text-align: justify; "&gt; in January 15, 2018 issue.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PrivacyLaw.png/@@images/e6aec54f-c20a-4f80-8dfe-b5e48e585ee0.png" style="text-align: justify; " title="Privacy Law" class="image-inline" alt="Privacy Law" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;(Illustration: Ashish Asthana)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;On July 31 the ministry of electronics and information technology (MeitY) constituted a committee of experts, headed by justice (retired) BN Srikrishna, to deliberate on a data protection framework for India. The committee is another step in India’s journey in formulating a national-level privacy legislation.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The formulation of a privacy law started as early as 2010 with an approach paper for a legislation on privacy towards envisioning a privacy framework for India. In 2011, a bill on right to privacy was drafted. In 2012 the planning commission constituted a group of experts, with justice (retired) AP Shah as its chief, which prepared a report recommending a privacy framework.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;A month after the formation of the committee, in August, the sectoral regulator, Telecom Regulatory Authority of India (TRAI), released the consultation paper, ‘Privacy, Security and Ownership of the Data in the Telecom Sector’. In the same month, the supreme court in a landmark decision recognised privacy as a fundamental right.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;In November 2017, the expert group released a ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ to solicit public comments on the contours of a data protection law for India.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;To understand the evolution of the thinking around a privacy framework for India, this article outlines and analyses common themes and differences between (a) the 2012 group of experts’ report, and the 2017 expert committee’s white paper.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The white paper seeks to gather inputs from the public on key issues towards the development of a data protection law for India. The paper places itself in the context of the NDA government’s Digital India initiative, the justice Shah committee report, and the judicial developments on the right to privacy in India. It is divided into three substantive parts: (1) scope and exemptions, (2) grounds of processing, obligation and entities, individual rights, and (3) regulation and enforcement. Each part is comprised of deep dives into key issues, international practices, preliminary views of the committee, and questions for public consultation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the 2012 report defined nine national-level privacy principles and recommended a co-regulatory framework that consisted of privacy commissioners, courts, self-regulating organisations, data controllers, and privacy officers at the organisational level. At the outset, the 2017 white paper is different from that report simply by the fact that it is a consultation paper soliciting views as compared to a report that recommends a broad privacy framework for India. In doing so, the white paper explores a broader set of issues than those discussed in the justice Shah report – ranging from the implications of emerging technologies on the relevance of traditional privacy principles, data localisation, child’s consent, individual participation rights, the right to be forgotten, cross-border flow of data, breach notification etc. Given that the white paper is a consultation paper, this article examines the provisional views shared in it with the recommendations of the 2012 report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Key areas that the both the documents touch upon (though not necessarily agree on) include:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Applicability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 2012 report of experts recommended a privacy legislation that extends the right to privacy to all persons in India, all data that is processed by a company or equipment located in India, and to data that originate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper reflect this position, but also offer that applicability could be in part determined by the legitimate interest of the state, carrying on a business or offering services or goods in India, and if, despite location, the entity is processing the personal data of Indian citizens. The provisional views also touch upon retrospective application of a data protection law and agree with the 2012 report by recommending that a law apply to privacy and public bodies. They also go a step further by recommending specific exemptions in application for well defined categories of public or private entities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The experts’ report defined the following exceptions to the right to privacy: artistic and journalistic purposes, household purposes, historic and scientific research, and the Right to Information. Exceptions that must be weighed against the principles of proportionality, legality, and necessary in a democratic state included: national security, public order, disclosure in public &lt;span&gt;interest, prevention, detection, investigation, and prosecution of criminal offences, and protection of the individual or of the rights and freedoms of others.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the 2017 white paper broadly mirror the exemptions defined in the experts’ report, but do not weigh exceptions related to national security and public interest etc. against the principles of proportionality, legality, and necessary in a democratic state and instead explored a review mechanism for these exceptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper on consent note that aspects of consent should include that it is freely given, informed and specific and that standards for implied consent need to be evolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 experts’ report defined a principle for choice and consent, this principle did not define aspects of what would constitute valid consent, yet it did incorporate an opt-out mechanism.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper hold that notice is important in enabling consent and explore a number of mechanisms that can be implemented to effect meaningful notice such as codes of practice for designing notice, multilayered notices, assessing notices in privacy impact assessments, assigning ‘data trust scores’ based on their data use policy, and having a ‘consent dashboard’ to help individuals manage their consent across entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These views build upon and complement the principle of notice defined in the 2012 report which defined components of a privacy policy as well as other forms of notice including data breach (also addressed in the white paper) and legal access to personal information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Purpose limitation/minimisation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper recognise the challenges that evolving technology is posing to the principle of purpose limitation and recommend that layered privacy policies and the standard of reasonableness can be used to contextualise this principle to actual purposes and uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 report defined a purpose limitation principle, the principle does not incorporate a standard of reasonableness or explore methods of implementation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention and Quality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper suggest that the principles of data retention and data quality can be guided by the terms “reasonably and necessary” to ensure that they are not overly burdensome on industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2012 report of experts briefly touched on data retention in the principle of purpose limitation –holding that practices should be in compliance with the national privacy principles.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper recognise the importance of the right confirmation, access, and rectify personal information of the individual, but note that this is increasingly becoming harder to enforce with respect to data that is observed behavioral data and derived from habits. A suggested solution is to impose a fee on individuals for using these rights to deter frivolous requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 report defined a principle of access and correction it did not propose a fee for using this right and it included the caveat that if the access would affect the privacy rights of others, access may not be given by the data controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Enforcement Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the 2017 white paper broadly agree with the appropriateness of the model of co-regulation and development of codes of practice as suggested in the 2012 report. Within the system envisioned in the 2012 report of experts, self-regulating organisations at the indu&lt;span&gt;stry level will have the ability to develop industry specific norms and standards in compliance with the national privacy principles to be approved by the privacy commissioner.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provisional views of the white paper go beyond the principle of accountability defined in the 2012 report by suggesting that data controllers should not only be held accountable for implementation of defined data protection standards, but in defined circumstances, also for harm that is caused to an individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Additional Obligations and Data Controllers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper suggest the following mechanisms as methods towards ensuring accountability of specific categories of data controllers: registration, data protection impact assessment, data audits, and data protection officers that are centres of accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2012 experts’ report also envisioned impact assessments and investigations carried out by the privacy commissioner and the role of a data controller, but did not explore registration of these entities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Authorities and Adjudication&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The both documents are in agreement on the need for a privacy commissioner/data protection authority and envision similar functions such as conducting privacy impact assessments, audits, investigation, and levying of fines. The white paper differs from the 2012 experts’ report in its view that the appellate tribunals under the IT Act and bodies like the National Commission Disputes Redressal Commission could potentially be appropriate venues for adjudicating and resolving disputes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 experts’ report recommended that complaints can be issued through an alternative dispute resolution mechanism, to central and regional level commissioners, or to the courts – for remedies– enforcement of penalties should involve district and high-level courts and the supreme court. The 2012 report specified that a distinct tribunal should not be created nor should existing tribunals be relied upon as there is the possibility that the institution will not have the capacity to rule on a broad right of privacy. Individuals that can be held liable by individuals include data controllers, organisation directors, agency directors, and heads of governmental departments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Penalty and Remedy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The white paper goes much further in its thinking on penalties, remedies and compensation than the 2012 report of experts – discussing potential models for calculation of civil penalties including nature and extent of violation of the data protection obligation, nature of personal information involved, number of individuals affected, whether infringement was intentional or negligent, measures taken by the data controller to mitigate the damage, and previous track record of the data controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper is a progressive and positive step towards formulating a data protection law for India that is effective and relevant nationally and internationally. It will be interesting to see the public response to it and the response of the committee to the inputs received from the consultation as well as how the final recommendations differ, build upon, and incorporate previous policy steps towards a comprehensive privacy framework for India.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection'&gt;https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-18T01:50:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir">
    <title>Anonymous joins protests against Internet shutdown in Kashmir</title>
    <link>https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir</link>
    <description>
        &lt;b&gt;Hacktivist group Anonymous joined thousands of others to protest the shutdown of internet services in Kashmir for the fourth consecutive day by authorities after the hanging of Afzal Guru, a key accused in the Parliament attack case.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indu Nandakumar's article was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-02-12/news/37059201_1_twitter-accounts-guy-fawkes-masks-internet-services"&gt;published in the Economic Times&lt;/a&gt; on February 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Anonymous, which shot to fame in India after it brought down the websites of the &lt;a href="http://economictimes.indiatimes.com/topic/Supreme%20Court"&gt;Supreme Court&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Congress%20Party"&gt;Congress Party&lt;/a&gt; last year, on Tuesday expressed its support to the people of Kashmir until the ban on internet and media services are lifted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We stand with # Kashmiras it comes to the end of its 3rd day under  curfew. The comms blockade will fall. We are with you. # KashmirNow," a  message posted on one of the &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; accounts of Anonymous read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Twitter account of the same group said, "#OpKashmir - Lift the media and internet blackout in #Kashmir".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile internet services were suspended across Kashmir Valley on Saturday after the hanging of &lt;a href="http://economictimes.indiatimes.com/topic/Afzal%20Guru"&gt;Afzal Guru&lt;/a&gt; in New Delhi. Online protests gathered steam by evening and thousands  took to Twitter to express their anger censorships and blockades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior official from the Department of Telecom, which had last year  ordered the blocking of several Twitter accounts and websites, said  internet services were blocked to avoid any further escalation of  violence in Kashmir. But internet experts said a ban of communication  services do not result in peace, instead it curtails the basic right of  citizens to exchange messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Government can ban certain class  of messages and certain class of users, but definitely not a blanket ban  of all services," said &lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/executive%20director"&gt;executive director&lt;/a&gt; of Bangalore-based research organisation, the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Essential commodities such as medicines, newspapers etc too are in  short supply in Kashmir, where three people died and over 50 were  injured in clashes since Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anonymous has also been  posting photographs from the region. One of the Twitter accounts of the  group, @ anon_warlockon Tuesday tweeted, "A gag has been put on  everything, information at best is trickling down".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, Anonymous, known for its use of &lt;a href="http://economictimes.indiatimes.com/topic/Guy%20Fawkes"&gt;Guy Fawkes&lt;/a&gt; masks, had organised rallies across Indian cities to protest internet censorship after India's &lt;a href="http://economictimes.indiatimes.com/topic/Department%20of%20Telecom"&gt;Department of Telecom&lt;/a&gt; blocked over 250 websites and 30 Twitter accounts for posting communal  images and videos that led to people from Northeast exit Bangalore and a  few other Indian cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Internet service providers in the Valley were asked by officials in the &lt;a href="http://economictimes.indiatimes.com/topic/Ministry%20of%20Home%20Affairs"&gt;Ministry of Home Affairs&lt;/a&gt; to switch off connectivity on Saturday morning. There has been no  further communication from the Ministry until now and we don't expect  any withdrawal in the next few days," a senior industry executive with  direct knowledge of the matter told ET. He added that any decision on  withdrawal of the ban will be taken only after the MHA and intelligence  officials take stock of the situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre of Internet's  Abraham said he was not sure if messages on social media were being  taken seriously by the government. "Research shows that during the times  of public disruption, ban of communication services will only make  things worse. &lt;a href="http://economictimes.indiatimes.com/topic/Enlightened"&gt;Enlightened&lt;/a&gt; governments should know this and act accordingly."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir'&gt;https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-01T04:46:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive">
    <title>Anonymous India’s Takedowns Could Be Counterproductive</title>
    <link>https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive</link>
    <description>
        &lt;b&gt;Nikhil Pahwa's blog post was published in Medianama on June 6, 2012.&lt;/b&gt;
        
&lt;p&gt;As I write this, Anonymous India has &lt;a class="external-link" href="https://twitter.com/opindia_revenge/status/210245329419902976"&gt;apparently taken down&lt;/a&gt; MTNL’s &lt;a class="external-link" href="http://www.mtnl.net.in/"&gt;website&lt;/a&gt;, citing the ISPs decision to block sites, without apparently being quite aware why it is doing that. Last night, the collective claimed to have taken down the website of the ISPAI, India’s ISP Association. Last Saturday, there were discussions on the groups IRC to take down the website for the Ministry of Company Affairs. So far, it has taken down websites for the &lt;a class="external-link" href="http://www.apgenco.gov.in/"&gt;Andhra Pradesh Power Generation Corporation Limited, All Indian Trinamool Congress (AITMC)&lt;/a&gt;, as well as several websites &lt;a class="external-link" href="http://pastehtml.com/view/bzs859j8o.txt"&gt;related&lt;/a&gt; to the Mizoram government, apart from accessing and publishing server logs from Reliance Communications.&lt;/p&gt;
&lt;p&gt;Anonymous India’s activities do help: they increase awareness of India’s war on the Internet, both by the government through legislation and censorship, and by movie producers and copyright owners through takedown notices and John Doe orders. There still remain citizens online who aren’t aware of why they aren’t able to access legitimate content – last night, someone from the books publishing industry asked me why she wasn’t able to access the video&lt;a class="external-link" href="http://ilovetypography.com/2012/05/21/books-vs-books/"&gt; in this post on ‘Designing for the Future Book&lt;/a&gt;‘ on her Airtel connection. The video is hosted on Vimeo, which remains blocked in India.&amp;nbsp; Now she knows why.&lt;/p&gt;
&lt;p&gt;Anonymous India has also shed light on what all is being blocked by sharing what are allegedly Reliance Communications’ logs on blocks. These logs suggest that ISPs were going beyond the mandate given to them by the courts and the government. It’s also clear that ISPs aren’t protecting the rights of their customers, and are implementing blocks either in a ham-handed manner, or in a manner that suits them or their related companies. They are as much to blame as those getting the orders issued, and so there is undoubtedly some schadenfreude in seeing both government and ISP websites taken down by Anonymous India.&lt;/p&gt;
&lt;p&gt;Still, you&amp;nbsp; have to wonder about how the powers that be will react to this situation: no government will show that it is bucking under what it perceives to be cyber terrorism: it’s not just an ego thing; there is also a legitimate fear that if the government is seen as buckling under such attacks, it would lead to cyber attacks whenever there is something that warrants a protest. The attacks by Anonymous could be counterproductive for two other reasons: firstly, because the natural reaction to any kind of attack is to increase spending and changes in laws. While India is already spending on surveillance and identification, cyberattacks will justify these spends, make the case for more, and lead to more changes in government policy.&lt;/p&gt;
&lt;p&gt;The second reason is that these attacks could lead to the undoing of a lot of work done by activists for Internet freedom. The Software Freedom Law Center, Centre For Internet and Society, Avaaz, Change.org, The Internet Democracy Project, and many many others have spent many months reaching out to and educating parliamentarians and the lawmakers of the country on issues related to the draconian IT Rules. The IT Rules have resulted in websites and ISPs censoring content online when they have been send unfair and flawed takedown notices, and they need to be changed. The cyberattacks could once again be used by the Home Ministry and those at CERT-IN to justify continuing with such draconian rules, and especially since many MP’s are not aware of the nuances of the potential for misuse; some MPs (I’ve observed) appear to be choosing to be on the fence on this, either on account of lack of interest or lack of depth of understanding.&lt;/p&gt;
&lt;p&gt;Activities that bring more information on the blocks to light help strengthen the case for more specificity in court orders by highlighting misuse by copyright owners and ISPs, and also for modification in the IT Rules. Taking down sites weakens it.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2012/06/223-anonymous-indias-takedowns-could-be-counterproductive/"&gt;Click&lt;/a&gt; to read the original here&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive'&gt;https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-18T06:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012">
    <title>Annual Conference on Human Rights 2012</title>
    <link>https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012</link>
    <description>
        &lt;b&gt;Malavika Jayaram participated in this conference as a panelist in this event organised by Estonia and Google.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the original published by&lt;a class="external-link" href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt; Estonian Institute of Human Rights&lt;/a&gt; on December 9, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Monday, December 10, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;09:30-10:00 Registration of participants&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10:00-11:00 Opening session&lt;/b&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Welcoming remarks:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/hanno-pevkur/" title="Hanno Pevkur"&gt;&lt;span class="highlight"&gt;Hanno Pevkur&lt;/span&gt;&lt;/a&gt;, Minister of Social of Affairs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presentation of the Report&lt;br /&gt; on Human Rights in Estonia:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/mart-nutt/" title="Mart Nutt"&gt;&lt;span class="highlight"&gt;Mart Nutt&lt;/span&gt;&lt;/a&gt;, MP, Member of Supervising Board of Estonian Institute of Human Rights&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/karin-reivart/" title="Karin Reivart"&gt;&lt;span class="highlight"&gt;Karin Reivart&lt;/span&gt;&lt;/a&gt;, Research Manager, Turu-uuringute AS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Moderator:&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/vootele-hansen/" title="Vootele Hansen"&gt;&lt;span class="highlight"&gt;Vootele Hansen&lt;/span&gt;&lt;/a&gt;, Chairman of Estonian Institute of Human Rights&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11:00 – 12:40 Session 1&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Human Rights and Security: Protecting victims and providing justice&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the modern world, the vast majority of casualties in armed  conflicts are civilians. How should the international community react to  human rights violations in conflict zones? Could a conflict exist  between the requirements of peace on the one hand and justice, on the  other? How can we implement the concept of Responsibility to Protect in  practice? How does the promotion of human rights influence the ability  of Western nations and institutions to interact with the rest of the  world?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Keynote speech:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/stephen-j-rapp/" title="Stephen J. Rapp"&gt;&lt;span class="highlight"&gt;Stephen J. Rapp&lt;/span&gt;&lt;/a&gt;, United States Ambassador-at-Large for War Crimes Issues in the Office of Global Criminal Justice.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anthony-dworkin/" title="Anthony Dworkin"&gt;&lt;span class="highlight"&gt;Anthony Dworkin&lt;/span&gt;&lt;/a&gt;, European Council on Foreign Relations, Senior Policy Fellow&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/gentian-zyberi/" title="Gentian Zyberi"&gt;&lt;span&gt;&lt;b&gt;Gentian Zyberi&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;, University of Oslo, Norwegian Centre for Human Rights, Associate Professor&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/jeffrey-d-levine/" title="Jeffrey D. Levine"&gt;&lt;span class="highlight"&gt;Jeffrey D. Levine&lt;/span&gt;&lt;/a&gt;, United States Ambassador in Estonia&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt; Moderator: &lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/riina-kionka/" title="Riina Kionka"&gt;&lt;span class="highlight"&gt;Riina Kionka&lt;/span&gt;&lt;/a&gt;,  Head of Central Asia Division, European External Action Service; former  Personal Representative for Human Rights in the area of CFSP for SG/HR&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:40 – 14:00 Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14:00 – 15:40 Session 2&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Human Rights and the Internet: Shuting down the Internet, shuting up the world&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UN Human Rights Council Resolution L13 (6 July 2012) stresses that  human rights must also be guaranteed in cyberspace. There is no doubt  that the Internet has become an important resource for acquiring  information, disseminating points of view and creating networks.  Restricting Internet freedom also poses a direct threat to human rights.  The panel will discuss these threats: who wants to restrict the  Internet? Why and how are they doing it? How should we respond?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Keynote speech:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/dunja-mijatovic/" title="Dunja Mijatovic"&gt;&lt;span class="highlight"&gt;Dunja Mijatovic&lt;/span&gt;&lt;/a&gt;, OSCE Representative on Freedom of the Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/toomas-hendrik-ilves/" title="Toomas Hendrik Ilves"&gt;&lt;span class="highlight"&gt;Toomas Hendrik Ilves&lt;/span&gt;&lt;/a&gt;, President of Estonia&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/thomas-zerdick/" title="Thomas Zerdick"&gt;&lt;span class="highlight"&gt;Thomas Zerdick&lt;/span&gt;&lt;/a&gt;, policy officer, DG Justice, European Commission&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/malavika-jayaram/" title="Malavika Jayaram"&gt;&lt;span class="highlight"&gt;Malavika Jayaram&lt;/span&gt;&lt;/a&gt;, Fellow at the Centre for Internet and Society, India&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/david-mothander/" title="David Mothander"&gt;&lt;span class="highlight"&gt;David Mothander&lt;/span&gt;&lt;/a&gt;, Google Nordic Policy Counsel&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Moderator:&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/katrin-nyman-metcalf/" title="Katrin Nyman-Metcalf"&gt;&lt;span class="highlight"&gt;Katrin Merike Nyman-Metcalf&lt;/span&gt;&lt;/a&gt;,  Tallinn University of Technology, member of the Council of Estonian Human Rights Centre&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15:40 – 16:10 Coffee break&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16:10 – 17:50 Session 3&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Contemporary Human Rights Challenges in a Changing Global Balance of Power&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The panel will focus on the role of human rights policy in the  changing international environment. Does the shift in global power away  from the West force a system based on democracy, human rights and the  rule of law onto the defensive? How do we promote our values while  engaging with authoritarian countries? Should human rights policy  consider local needs and conditions?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anna-sevortian/" title="Anna Sevortian"&gt;&lt;span class="highlight"&gt;Anna Sevortian&lt;/span&gt;&lt;/a&gt;, Director of Human Rights Watch´s Russia Office&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/frank-johansson/" title="Frank Johansson"&gt;&lt;span class="highlight"&gt;Frank Johansson&lt;/span&gt;&lt;/a&gt;, Director of Amnesty International´s Finland Office&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/douglas-davidson/" title="Douglas Davidson"&gt;&lt;span class="highlight"&gt;Douglas Davidson&lt;/span&gt;&lt;/a&gt;, US State Department Special Envoy for Holocaust Issues; former Head of the OSCE Mission to Bosnia and Herzegovina&lt;br /&gt; Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anja-mihr/" title="Anja Mihr"&gt;&lt;span class="highlight"&gt;Anja Mihr&lt;/span&gt;&lt;/a&gt;, Netherlands Institute of Human Rights, Associate Professor&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt; Moderator: &lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/hannes-hanso/" title="Hannes Hanso"&gt;&lt;span class="highlight"&gt;Hannes Hanso&lt;/span&gt;&lt;/a&gt;, Researcher, International Centre for Defence Studies&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17:50 – 18:00 Conclusions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/mart-nutt/" title="Mart Nutt"&gt;&lt;span class="highlight"&gt;Mart Nutt&lt;/span&gt;&lt;/a&gt;, MP, Member of Supervising Board of EIHR&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18:30 – 21:30 Dinner, &lt;/b&gt;&lt;b&gt;hosted by the President of Estonia, Toomas Hendrik Ilves&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dinner will be the Swissôtel Tallinn (6. floor).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;N.B! The organiser reserves the right to make changes in the programme and the presenters&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012'&gt;https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-07T10:47:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
