<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2736 to 2750.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/asia-pacific-google-policy-fellows"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-roshan-nair-september-4-2019-android-10-out-big-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-insider-august-10-2016-and-now-aadhaar-enabled-smartphones-for-easy-verification-and-money-transfer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women">
    <title>Anti-harassment app wins hackathon for women</title>
    <link>https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women</link>
    <description>
        &lt;b&gt;A team of four young women coders from Porta Allegra in Brazil has won the IGNITE International Girls Hackathon with an anti-harassment app called Não Me Calo, which means “I will not shut up”.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was published in &lt;a class="external-link" href="http://www.scidev.net/global/gender/news/anti-harassment-app-wins-hackathon-women.html"&gt;Sci Dev Net&lt;/a&gt; on May 15, 2015. Rohini Lakshané gave her inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Não Me Calo allows users to review restaurants based on how they treat women. The &lt;a href="http://www.scidev.net/global/enterprise/data/"&gt;data&lt;/a&gt; then helps other patrons decide which restaurants are safest for women,  and publicly encourages restaurant owners and government officials to  fix harassment hotspots.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The team competed against coders from India, Taiwan and the United  States to create the best app addressing the challenge of creating safe  spaces for women. They will now work with partners from the &lt;a href="http://ignite.globalfundforwomen.org/about"&gt;Global Fund for Women&lt;/a&gt;, which organised the hackathon, to fully develop the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Catherine King, the executive producer of the Global Fund for Women, says that the hackathon is meant to address the &lt;a href="http://www.scidev.net/global/governance/gender/"&gt;gender&lt;/a&gt; gap in access to information &lt;a href="http://www.scidev.net/global/enterprise/technology/"&gt;technology&lt;/a&gt;, and to encourage women to create and shape technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“If girls aren’t accessing the internet and aren’t creating culture  themselves online and using their own voices online, then that means  other people are doing that,” Sara Baker, the coordinator of &lt;a href="https://www.takebackthetech.net/"&gt;Take Back the Tech!&lt;/a&gt;&lt;span&gt;,&lt;/span&gt; a global campaign to get more women online, told &lt;i&gt;SciDev.Net&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hackathon, which gave teams 24 hours to create their app, took place in February, and the winners were announced last month.&lt;br /&gt; &lt;br /&gt; King says that the teams’ responses to the challenge were influenced by  experiences in their own communities. For example, teams from India  designed apps for learning self-defence and sex &lt;a href="http://www.scidev.net/global/communication/education/"&gt;education&lt;/a&gt;.&lt;br /&gt; &lt;br /&gt; Women’s safety apps or features are becoming increasingly popular, particularly in &lt;a href="http://www.scidev.net/global/gender/analysis-blog/gender-atms-reporting-sexual-assault-bank-india.html"&gt;India where they are seen as a way to respond to public violence against women&lt;/a&gt;.  Earlier this year, Uber, the taxi-hailing app, added a new ‘SOS button’  to their Indian version after a driver raped a passenger in December  2014.&lt;br /&gt; &lt;br /&gt; But Rohini Lakshané, a researcher at the &lt;a href="http://www.cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in India, points out that these technologies can only go so far towards  preventing violence against women, and must be part of a broader  approach that also addresses the underlying social and cultural causes  of gender inequality.&lt;br /&gt; &lt;br /&gt; She adds that many apps fail to protect women because they are designed  by men who don’t understand the intricacies of women’s safety.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women'&gt;https://cis-india.org/internet-governance/news/anti-harassment-app-wins-hackathon-for-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-05-20T13:25:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection">
    <title>Another Step towards Privacy Law</title>
    <link>https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection</link>
    <description>
        &lt;b&gt;A comparison between the 2012 experts’ report and the 2017 white paper on data protection.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The column was published in &lt;/span&gt;&lt;a class="external-link" href="http://www.governancenow.com/views/columns/another-step-towards-privacy-law-data-protection" style="text-align: justify; "&gt;Governance Now&lt;/a&gt;&lt;span style="text-align: justify; "&gt; in January 15, 2018 issue.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PrivacyLaw.png/@@images/e6aec54f-c20a-4f80-8dfe-b5e48e585ee0.png" style="text-align: justify; " title="Privacy Law" class="image-inline" alt="Privacy Law" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;(Illustration: Ashish Asthana)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;On July 31 the ministry of electronics and information technology (MeitY) constituted a committee of experts, headed by justice (retired) BN Srikrishna, to deliberate on a data protection framework for India. The committee is another step in India’s journey in formulating a national-level privacy legislation.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;The formulation of a privacy law started as early as 2010 with an approach paper for a legislation on privacy towards envisioning a privacy framework for India. In 2011, a bill on right to privacy was drafted. In 2012 the planning commission constituted a group of experts, with justice (retired) AP Shah as its chief, which prepared a report recommending a privacy framework.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;A month after the formation of the committee, in August, the sectoral regulator, Telecom Regulatory Authority of India (TRAI), released the consultation paper, ‘Privacy, Security and Ownership of the Data in the Telecom Sector’. In the same month, the supreme court in a landmark decision recognised privacy as a fundamental right.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;In November 2017, the expert group released a ‘White Paper of the Committee of Experts on a Data Protection Framework for India’ to solicit public comments on the contours of a data protection law for India.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;To understand the evolution of the thinking around a privacy framework for India, this article outlines and analyses common themes and differences between (a) the 2012 group of experts’ report, and the 2017 expert committee’s white paper.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The white paper seeks to gather inputs from the public on key issues towards the development of a data protection law for India. The paper places itself in the context of the NDA government’s Digital India initiative, the justice Shah committee report, and the judicial developments on the right to privacy in India. It is divided into three substantive parts: (1) scope and exemptions, (2) grounds of processing, obligation and entities, individual rights, and (3) regulation and enforcement. Each part is comprised of deep dives into key issues, international practices, preliminary views of the committee, and questions for public consultation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the 2012 report defined nine national-level privacy principles and recommended a co-regulatory framework that consisted of privacy commissioners, courts, self-regulating organisations, data controllers, and privacy officers at the organisational level. At the outset, the 2017 white paper is different from that report simply by the fact that it is a consultation paper soliciting views as compared to a report that recommends a broad privacy framework for India. In doing so, the white paper explores a broader set of issues than those discussed in the justice Shah report – ranging from the implications of emerging technologies on the relevance of traditional privacy principles, data localisation, child’s consent, individual participation rights, the right to be forgotten, cross-border flow of data, breach notification etc. Given that the white paper is a consultation paper, this article examines the provisional views shared in it with the recommendations of the 2012 report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Key areas that the both the documents touch upon (though not necessarily agree on) include:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Applicability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 2012 report of experts recommended a privacy legislation that extends the right to privacy to all persons in India, all data that is processed by a company or equipment located in India, and to data that originate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper reflect this position, but also offer that applicability could be in part determined by the legitimate interest of the state, carrying on a business or offering services or goods in India, and if, despite location, the entity is processing the personal data of Indian citizens. The provisional views also touch upon retrospective application of a data protection law and agree with the 2012 report by recommending that a law apply to privacy and public bodies. They also go a step further by recommending specific exemptions in application for well defined categories of public or private entities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The experts’ report defined the following exceptions to the right to privacy: artistic and journalistic purposes, household purposes, historic and scientific research, and the Right to Information. Exceptions that must be weighed against the principles of proportionality, legality, and necessary in a democratic state included: national security, public order, disclosure in public &lt;span&gt;interest, prevention, detection, investigation, and prosecution of criminal offences, and protection of the individual or of the rights and freedoms of others.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the 2017 white paper broadly mirror the exemptions defined in the experts’ report, but do not weigh exceptions related to national security and public interest etc. against the principles of proportionality, legality, and necessary in a democratic state and instead explored a review mechanism for these exceptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper on consent note that aspects of consent should include that it is freely given, informed and specific and that standards for implied consent need to be evolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 experts’ report defined a principle for choice and consent, this principle did not define aspects of what would constitute valid consent, yet it did incorporate an opt-out mechanism.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper hold that notice is important in enabling consent and explore a number of mechanisms that can be implemented to effect meaningful notice such as codes of practice for designing notice, multilayered notices, assessing notices in privacy impact assessments, assigning ‘data trust scores’ based on their data use policy, and having a ‘consent dashboard’ to help individuals manage their consent across entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These views build upon and complement the principle of notice defined in the 2012 report which defined components of a privacy policy as well as other forms of notice including data breach (also addressed in the white paper) and legal access to personal information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Purpose limitation/minimisation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper recognise the challenges that evolving technology is posing to the principle of purpose limitation and recommend that layered privacy policies and the standard of reasonableness can be used to contextualise this principle to actual purposes and uses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 report defined a purpose limitation principle, the principle does not incorporate a standard of reasonableness or explore methods of implementation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention and Quality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper suggest that the principles of data retention and data quality can be guided by the terms “reasonably and necessary” to ensure that they are not overly burdensome on industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2012 report of experts briefly touched on data retention in the principle of purpose limitation –holding that practices should be in compliance with the national privacy principles.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper recognise the importance of the right confirmation, access, and rectify personal information of the individual, but note that this is increasingly becoming harder to enforce with respect to data that is observed behavioral data and derived from habits. A suggested solution is to impose a fee on individuals for using these rights to deter frivolous requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 report defined a principle of access and correction it did not propose a fee for using this right and it included the caveat that if the access would affect the privacy rights of others, access may not be given by the data controller.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Enforcement Mechanisms&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the 2017 white paper broadly agree with the appropriateness of the model of co-regulation and development of codes of practice as suggested in the 2012 report. Within the system envisioned in the 2012 report of experts, self-regulating organisations at the indu&lt;span&gt;stry level will have the ability to develop industry specific norms and standards in compliance with the national privacy principles to be approved by the privacy commissioner.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accountability&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provisional views of the white paper go beyond the principle of accountability defined in the 2012 report by suggesting that data controllers should not only be held accountable for implementation of defined data protection standards, but in defined circumstances, also for harm that is caused to an individual.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Additional Obligations and Data Controllers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provisional views in the white paper suggest the following mechanisms as methods towards ensuring accountability of specific categories of data controllers: registration, data protection impact assessment, data audits, and data protection officers that are centres of accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2012 experts’ report also envisioned impact assessments and investigations carried out by the privacy commissioner and the role of a data controller, but did not explore registration of these entities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Authorities and Adjudication&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The both documents are in agreement on the need for a privacy commissioner/data protection authority and envision similar functions such as conducting privacy impact assessments, audits, investigation, and levying of fines. The white paper differs from the 2012 experts’ report in its view that the appellate tribunals under the IT Act and bodies like the National Commission Disputes Redressal Commission could potentially be appropriate venues for adjudicating and resolving disputes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the 2012 experts’ report recommended that complaints can be issued through an alternative dispute resolution mechanism, to central and regional level commissioners, or to the courts – for remedies– enforcement of penalties should involve district and high-level courts and the supreme court. The 2012 report specified that a distinct tribunal should not be created nor should existing tribunals be relied upon as there is the possibility that the institution will not have the capacity to rule on a broad right of privacy. Individuals that can be held liable by individuals include data controllers, organisation directors, agency directors, and heads of governmental departments.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Penalty and Remedy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The white paper goes much further in its thinking on penalties, remedies and compensation than the 2012 report of experts – discussing potential models for calculation of civil penalties including nature and extent of violation of the data protection obligation, nature of personal information involved, number of individuals affected, whether infringement was intentional or negligent, measures taken by the data controller to mitigate the damage, and previous track record of the data controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The white paper is a progressive and positive step towards formulating a data protection law for India that is effective and relevant nationally and internationally. It will be interesting to see the public response to it and the response of the committee to the inputs received from the consultation as well as how the final recommendations differ, build upon, and incorporate previous policy steps towards a comprehensive privacy framework for India.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection'&gt;https://cis-india.org/internet-governance/blog/governance-now-elonnai-hickok-another-step-towards-privacy-law-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-18T01:50:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir">
    <title>Anonymous joins protests against Internet shutdown in Kashmir</title>
    <link>https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir</link>
    <description>
        &lt;b&gt;Hacktivist group Anonymous joined thousands of others to protest the shutdown of internet services in Kashmir for the fourth consecutive day by authorities after the hanging of Afzal Guru, a key accused in the Parliament attack case.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indu Nandakumar's article was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-02-12/news/37059201_1_twitter-accounts-guy-fawkes-masks-internet-services"&gt;published in the Economic Times&lt;/a&gt; on February 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Anonymous, which shot to fame in India after it brought down the websites of the &lt;a href="http://economictimes.indiatimes.com/topic/Supreme%20Court"&gt;Supreme Court&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Congress%20Party"&gt;Congress Party&lt;/a&gt; last year, on Tuesday expressed its support to the people of Kashmir until the ban on internet and media services are lifted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We stand with # Kashmiras it comes to the end of its 3rd day under  curfew. The comms blockade will fall. We are with you. # KashmirNow," a  message posted on one of the &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; accounts of Anonymous read.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Twitter account of the same group said, "#OpKashmir - Lift the media and internet blackout in #Kashmir".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile internet services were suspended across Kashmir Valley on Saturday after the hanging of &lt;a href="http://economictimes.indiatimes.com/topic/Afzal%20Guru"&gt;Afzal Guru&lt;/a&gt; in New Delhi. Online protests gathered steam by evening and thousands  took to Twitter to express their anger censorships and blockades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A senior official from the Department of Telecom, which had last year  ordered the blocking of several Twitter accounts and websites, said  internet services were blocked to avoid any further escalation of  violence in Kashmir. But internet experts said a ban of communication  services do not result in peace, instead it curtails the basic right of  citizens to exchange messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Government can ban certain class  of messages and certain class of users, but definitely not a blanket ban  of all services," said &lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/executive%20director"&gt;executive director&lt;/a&gt; of Bangalore-based research organisation, the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Essential commodities such as medicines, newspapers etc too are in  short supply in Kashmir, where three people died and over 50 were  injured in clashes since Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anonymous has also been  posting photographs from the region. One of the Twitter accounts of the  group, @ anon_warlockon Tuesday tweeted, "A gag has been put on  everything, information at best is trickling down".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, Anonymous, known for its use of &lt;a href="http://economictimes.indiatimes.com/topic/Guy%20Fawkes"&gt;Guy Fawkes&lt;/a&gt; masks, had organised rallies across Indian cities to protest internet censorship after India's &lt;a href="http://economictimes.indiatimes.com/topic/Department%20of%20Telecom"&gt;Department of Telecom&lt;/a&gt; blocked over 250 websites and 30 Twitter accounts for posting communal  images and videos that led to people from Northeast exit Bangalore and a  few other Indian cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Internet service providers in the Valley were asked by officials in the &lt;a href="http://economictimes.indiatimes.com/topic/Ministry%20of%20Home%20Affairs"&gt;Ministry of Home Affairs&lt;/a&gt; to switch off connectivity on Saturday morning. There has been no  further communication from the Ministry until now and we don't expect  any withdrawal in the next few days," a senior industry executive with  direct knowledge of the matter told ET. He added that any decision on  withdrawal of the ban will be taken only after the MHA and intelligence  officials take stock of the situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre of Internet's  Abraham said he was not sure if messages on social media were being  taken seriously by the government. "Research shows that during the times  of public disruption, ban of communication services will only make  things worse. &lt;a href="http://economictimes.indiatimes.com/topic/Enlightened"&gt;Enlightened&lt;/a&gt; governments should know this and act accordingly."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir'&gt;https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-01T04:46:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive">
    <title>Anonymous India’s Takedowns Could Be Counterproductive</title>
    <link>https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive</link>
    <description>
        &lt;b&gt;Nikhil Pahwa's blog post was published in Medianama on June 6, 2012.&lt;/b&gt;
        
&lt;p&gt;As I write this, Anonymous India has &lt;a class="external-link" href="https://twitter.com/opindia_revenge/status/210245329419902976"&gt;apparently taken down&lt;/a&gt; MTNL’s &lt;a class="external-link" href="http://www.mtnl.net.in/"&gt;website&lt;/a&gt;, citing the ISPs decision to block sites, without apparently being quite aware why it is doing that. Last night, the collective claimed to have taken down the website of the ISPAI, India’s ISP Association. Last Saturday, there were discussions on the groups IRC to take down the website for the Ministry of Company Affairs. So far, it has taken down websites for the &lt;a class="external-link" href="http://www.apgenco.gov.in/"&gt;Andhra Pradesh Power Generation Corporation Limited, All Indian Trinamool Congress (AITMC)&lt;/a&gt;, as well as several websites &lt;a class="external-link" href="http://pastehtml.com/view/bzs859j8o.txt"&gt;related&lt;/a&gt; to the Mizoram government, apart from accessing and publishing server logs from Reliance Communications.&lt;/p&gt;
&lt;p&gt;Anonymous India’s activities do help: they increase awareness of India’s war on the Internet, both by the government through legislation and censorship, and by movie producers and copyright owners through takedown notices and John Doe orders. There still remain citizens online who aren’t aware of why they aren’t able to access legitimate content – last night, someone from the books publishing industry asked me why she wasn’t able to access the video&lt;a class="external-link" href="http://ilovetypography.com/2012/05/21/books-vs-books/"&gt; in this post on ‘Designing for the Future Book&lt;/a&gt;‘ on her Airtel connection. The video is hosted on Vimeo, which remains blocked in India.&amp;nbsp; Now she knows why.&lt;/p&gt;
&lt;p&gt;Anonymous India has also shed light on what all is being blocked by sharing what are allegedly Reliance Communications’ logs on blocks. These logs suggest that ISPs were going beyond the mandate given to them by the courts and the government. It’s also clear that ISPs aren’t protecting the rights of their customers, and are implementing blocks either in a ham-handed manner, or in a manner that suits them or their related companies. They are as much to blame as those getting the orders issued, and so there is undoubtedly some schadenfreude in seeing both government and ISP websites taken down by Anonymous India.&lt;/p&gt;
&lt;p&gt;Still, you&amp;nbsp; have to wonder about how the powers that be will react to this situation: no government will show that it is bucking under what it perceives to be cyber terrorism: it’s not just an ego thing; there is also a legitimate fear that if the government is seen as buckling under such attacks, it would lead to cyber attacks whenever there is something that warrants a protest. The attacks by Anonymous could be counterproductive for two other reasons: firstly, because the natural reaction to any kind of attack is to increase spending and changes in laws. While India is already spending on surveillance and identification, cyberattacks will justify these spends, make the case for more, and lead to more changes in government policy.&lt;/p&gt;
&lt;p&gt;The second reason is that these attacks could lead to the undoing of a lot of work done by activists for Internet freedom. The Software Freedom Law Center, Centre For Internet and Society, Avaaz, Change.org, The Internet Democracy Project, and many many others have spent many months reaching out to and educating parliamentarians and the lawmakers of the country on issues related to the draconian IT Rules. The IT Rules have resulted in websites and ISPs censoring content online when they have been send unfair and flawed takedown notices, and they need to be changed. The cyberattacks could once again be used by the Home Ministry and those at CERT-IN to justify continuing with such draconian rules, and especially since many MP’s are not aware of the nuances of the potential for misuse; some MPs (I’ve observed) appear to be choosing to be on the fence on this, either on account of lack of interest or lack of depth of understanding.&lt;/p&gt;
&lt;p&gt;Activities that bring more information on the blocks to light help strengthen the case for more specificity in court orders by highlighting misuse by copyright owners and ISPs, and also for modification in the IT Rules. Taking down sites weakens it.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2012/06/223-anonymous-indias-takedowns-could-be-counterproductive/"&gt;Click&lt;/a&gt; to read the original here&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive'&gt;https://cis-india.org/news/anonymous-indias-takedowns-could-be-counterproductive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-18T06:05:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012">
    <title>Annual Conference on Human Rights 2012</title>
    <link>https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012</link>
    <description>
        &lt;b&gt;Malavika Jayaram participated in this conference as a panelist in this event organised by Estonia and Google.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Read the original published by&lt;a class="external-link" href="http://www.eihr.ee/en/annualconference/conference-2012/program/"&gt; Estonian Institute of Human Rights&lt;/a&gt; on December 9, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Monday, December 10, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;09:30-10:00 Registration of participants&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10:00-11:00 Opening session&lt;/b&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Welcoming remarks:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/hanno-pevkur/" title="Hanno Pevkur"&gt;&lt;span class="highlight"&gt;Hanno Pevkur&lt;/span&gt;&lt;/a&gt;, Minister of Social of Affairs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presentation of the Report&lt;br /&gt; on Human Rights in Estonia:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/mart-nutt/" title="Mart Nutt"&gt;&lt;span class="highlight"&gt;Mart Nutt&lt;/span&gt;&lt;/a&gt;, MP, Member of Supervising Board of Estonian Institute of Human Rights&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/karin-reivart/" title="Karin Reivart"&gt;&lt;span class="highlight"&gt;Karin Reivart&lt;/span&gt;&lt;/a&gt;, Research Manager, Turu-uuringute AS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Moderator:&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/vootele-hansen/" title="Vootele Hansen"&gt;&lt;span class="highlight"&gt;Vootele Hansen&lt;/span&gt;&lt;/a&gt;, Chairman of Estonian Institute of Human Rights&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11:00 – 12:40 Session 1&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Human Rights and Security: Protecting victims and providing justice&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the modern world, the vast majority of casualties in armed  conflicts are civilians. How should the international community react to  human rights violations in conflict zones? Could a conflict exist  between the requirements of peace on the one hand and justice, on the  other? How can we implement the concept of Responsibility to Protect in  practice? How does the promotion of human rights influence the ability  of Western nations and institutions to interact with the rest of the  world?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Keynote speech:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/stephen-j-rapp/" title="Stephen J. Rapp"&gt;&lt;span class="highlight"&gt;Stephen J. Rapp&lt;/span&gt;&lt;/a&gt;, United States Ambassador-at-Large for War Crimes Issues in the Office of Global Criminal Justice.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anthony-dworkin/" title="Anthony Dworkin"&gt;&lt;span class="highlight"&gt;Anthony Dworkin&lt;/span&gt;&lt;/a&gt;, European Council on Foreign Relations, Senior Policy Fellow&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/gentian-zyberi/" title="Gentian Zyberi"&gt;&lt;span&gt;&lt;b&gt;Gentian Zyberi&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;, University of Oslo, Norwegian Centre for Human Rights, Associate Professor&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/jeffrey-d-levine/" title="Jeffrey D. Levine"&gt;&lt;span class="highlight"&gt;Jeffrey D. Levine&lt;/span&gt;&lt;/a&gt;, United States Ambassador in Estonia&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt; Moderator: &lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/riina-kionka/" title="Riina Kionka"&gt;&lt;span class="highlight"&gt;Riina Kionka&lt;/span&gt;&lt;/a&gt;,  Head of Central Asia Division, European External Action Service; former  Personal Representative for Human Rights in the area of CFSP for SG/HR&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:40 – 14:00 Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14:00 – 15:40 Session 2&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Human Rights and the Internet: Shuting down the Internet, shuting up the world&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;UN Human Rights Council Resolution L13 (6 July 2012) stresses that  human rights must also be guaranteed in cyberspace. There is no doubt  that the Internet has become an important resource for acquiring  information, disseminating points of view and creating networks.  Restricting Internet freedom also poses a direct threat to human rights.  The panel will discuss these threats: who wants to restrict the  Internet? Why and how are they doing it? How should we respond?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Keynote speech:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/dunja-mijatovic/" title="Dunja Mijatovic"&gt;&lt;span class="highlight"&gt;Dunja Mijatovic&lt;/span&gt;&lt;/a&gt;, OSCE Representative on Freedom of the Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/toomas-hendrik-ilves/" title="Toomas Hendrik Ilves"&gt;&lt;span class="highlight"&gt;Toomas Hendrik Ilves&lt;/span&gt;&lt;/a&gt;, President of Estonia&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/thomas-zerdick/" title="Thomas Zerdick"&gt;&lt;span class="highlight"&gt;Thomas Zerdick&lt;/span&gt;&lt;/a&gt;, policy officer, DG Justice, European Commission&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/malavika-jayaram/" title="Malavika Jayaram"&gt;&lt;span class="highlight"&gt;Malavika Jayaram&lt;/span&gt;&lt;/a&gt;, Fellow at the Centre for Internet and Society, India&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/david-mothander/" title="David Mothander"&gt;&lt;span class="highlight"&gt;David Mothander&lt;/span&gt;&lt;/a&gt;, Google Nordic Policy Counsel&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Moderator:&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/katrin-nyman-metcalf/" title="Katrin Nyman-Metcalf"&gt;&lt;span class="highlight"&gt;Katrin Merike Nyman-Metcalf&lt;/span&gt;&lt;/a&gt;,  Tallinn University of Technology, member of the Council of Estonian Human Rights Centre&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15:40 – 16:10 Coffee break&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16:10 – 17:50 Session 3&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Contemporary Human Rights Challenges in a Changing Global Balance of Power&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The panel will focus on the role of human rights policy in the  changing international environment. Does the shift in global power away  from the West force a system based on democracy, human rights and the  rule of law onto the defensive? How do we promote our values while  engaging with authoritarian countries? Should human rights policy  consider local needs and conditions?&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Panelists:&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anna-sevortian/" title="Anna Sevortian"&gt;&lt;span class="highlight"&gt;Anna Sevortian&lt;/span&gt;&lt;/a&gt;, Director of Human Rights Watch´s Russia Office&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/frank-johansson/" title="Frank Johansson"&gt;&lt;span class="highlight"&gt;Frank Johansson&lt;/span&gt;&lt;/a&gt;, Director of Amnesty International´s Finland Office&lt;br /&gt; &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/douglas-davidson/" title="Douglas Davidson"&gt;&lt;span class="highlight"&gt;Douglas Davidson&lt;/span&gt;&lt;/a&gt;, US State Department Special Envoy for Holocaust Issues; former Head of the OSCE Mission to Bosnia and Herzegovina&lt;br /&gt; Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/anja-mihr/" title="Anja Mihr"&gt;&lt;span class="highlight"&gt;Anja Mihr&lt;/span&gt;&lt;/a&gt;, Netherlands Institute of Human Rights, Associate Professor&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt; Moderator: &lt;/i&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/hannes-hanso/" title="Hannes Hanso"&gt;&lt;span class="highlight"&gt;Hannes Hanso&lt;/span&gt;&lt;/a&gt;, Researcher, International Centre for Defence Studies&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17:50 – 18:00 Conclusions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr &lt;a href="http://www.eihr.ee/en/annualconference/conference-2012/program/mart-nutt/" title="Mart Nutt"&gt;&lt;span class="highlight"&gt;Mart Nutt&lt;/span&gt;&lt;/a&gt;, MP, Member of Supervising Board of EIHR&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18:30 – 21:30 Dinner, &lt;/b&gt;&lt;b&gt;hosted by the President of Estonia, Toomas Hendrik Ilves&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dinner will be the Swissôtel Tallinn (6. floor).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;N.B! The organiser reserves the right to make changes in the programme and the presenters&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012'&gt;https://cis-india.org/news/estonian-institute-of-human-rights-december-9-2012-annual-conference-on-human-rights-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-07T10:47:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/asia-pacific-google-policy-fellows">
    <title>Announcing the Asia Pacific Google Policy Fellows</title>
    <link>https://cis-india.org/news/asia-pacific-google-policy-fellows</link>
    <description>
        &lt;b&gt;Posted by Ross LaJeunesse, Head of Public Policy and Government Affairs, Asia Pacific&lt;/b&gt;
        
&lt;p&gt;There are now more than 2 billion people online, with approximately 850 million of them in Asia Pacific.&lt;/p&gt;
&lt;p&gt;Given Asia Pacific’s importance, we're excited to announce the extension of the &lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt;Google Policy Fellowship&lt;/a&gt; program to this part of the world. The goal of the program is to assist public interest organizations at the forefront of debates on important Internet policy issues, and to support talented young advocates and scholars. Since its inception in 2007, the Google Policy Fellowship has provided a platform for students interested in technology policy to contribute to the public dialogue on these issues, and to explore future academic and professional interests.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Asia Pacific program for 2011 includes one Fellow each in Australia, Hong Kong and India. The &lt;a class="external-link" href="http://jmrc.arts.unsw.edu.au/news-events/google-research-fellow-913.html"&gt;University of New South Wales&lt;/a&gt;, the &lt;a class="external-link" href="http://www6.cityu.edu.hk/com/en_student_google.aspx"&gt;City University of Hong Kong&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.cis-india.org/advocacy/igov/blog/google-policy-fellowship"&gt;Centre for Internet and Society &lt;/a&gt;in Bangalore will be serving as the respective host institutions.&lt;/p&gt;
&lt;p&gt;In this region, we see many policy challenges concerning access to information online. The 2011 Asia Pacific Fellows will therefore focus on legal and policy issues related to the open Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Congratulations to our first class of Asia Pacific Google Policy Fellows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Lauren Loz, University of New South Wales, Faculty of Law Australia&lt;/li&gt;&lt;li&gt;Henry Hu Ling, University of Hong Kong, Faculty of Law, Hong Kong&lt;/li&gt;&lt;li&gt;Rishabh Dara, Indian Institute of Management, Ahmedabad, India&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We extend our sincere thanks to everyone who applied. If this pilot program proves to be a success, we hope to expand the Policy Fellowship for 2012.&lt;/p&gt;
&lt;p&gt;Cross-posted from the &lt;a class="external-link" href="http://googlepublicpolicy.blogspot.com/"&gt;Google Public Policy Blog&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/asia-pacific-google-policy-fellows'&gt;https://cis-india.org/news/asia-pacific-google-policy-fellows&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-30T09:26:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement">
    <title>Announcement of a Three-Region Research Alliance on the Appropriate Use of Digital Identity</title>
    <link>https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement</link>
    <description>
        &lt;b&gt;Omidyar Network has recently announced its decision to invest in establishment of a three-region research alliance — to be co-led by the Institute for Technology &amp; Society (ITS), Brazil, the Centre for Intellectual Property and Information Technology Law (CIPIT) , Kenya, and the CIS, India — on the Appropriate Use of Digital Identity. As part of this Alliance, we at the CIS will look at the policy objectives of digital identity projects, how technological policy choices can be thought through to meet the objectives, and how legitimate uses of a digital identity framework may be evaluated.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As governments across the globe are implementing new, digital foundational identification systems or modernizing existing ID programs, there is a dire need for greater research and discussion about appropriate design choices for a digital identity framework. There is significant momentum on digital ID, especially after the adoption of UN Sustainable Development Goal 16.9, which calls for legal identity for all by 2030. Given the importance of this subject, its implications for both the development agenda as well its impact on civil, social and economic rights, there is a need for more focused research that can enable policymakers to take better decisions, guide civil society in different jurisdictions to comment on and raise questions about digital identity schemes, and provide actionable material to the industry to create identity solutions that are privacy enhancing and inclusive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Excerpt from the &lt;a href="https://www.omidyar.com/blog/appropriate-use-digital-identity-why-we-invested-three-region-research%C2%A0alliance" target="_blank"&gt;blog post by Subhashish Bhadra&lt;/a&gt; announcing this new research alliance&lt;/h4&gt;
&lt;p&gt;...In the absence of any widely-accepted thinking on this issue, we run the risk of digital identity systems suffering from mission creep, that is being made mandatory or being used for an ever-expanding set of services. We believe this creates several risks. First, people may be excluded from services if they do not have a digital identity or because it malfunctions. Second, this approach creates a wider digital footprint that can be used to create a profile of an individual, sometimes without consent. This can increase privacy risk. Third, this approach increases the power of institutions versus individuals and can be used as rationale to intentionally deny services, especially to vulnerable or persecuted groups.&lt;/p&gt;
&lt;p&gt;Three exceptional research groups have undertaken the effort of answering this complex and important question. Over the next six months, these think tanks will conduct independent research, as well as involve experts from across the globe. Based in South America, Africa, and Asia, these institutions represent the collective wisdom and experiences of three very distinct geographies in emerging markets. While drawing on their local context, this research effort is globally oriented. The think tanks will create a set of recommendations and tools that can be used by stakeholders to engage with digital identity systems in any part of the world...&lt;/p&gt;
&lt;p&gt;This research will use a collaborative and iterative process. The researchers will put out some ideas every few weeks, with the objective of seeking thoughts, questions, and feedback from various stakeholders. They will participate in several digital rights and identity events across the globe over the next several months. They will also organize webinars to seek input from and present their interim findings to interested communities from across the globe. Each of these provide an opportunity for you to provide your thoughts and help this research program provide an independent, rigorous, transparent, and holistic answer to the question of when it’s appropriate for digital identity to be used. We need a diversity of viewpoints and collaborative dissent to help solve the most pressing issues of our times.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement'&gt;https://cis-india.org/internet-governance/blog/appropriate-use-of-digital-identity-alliance-announcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2019-05-13T09:06:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-roshan-nair-september-4-2019-android-10-out-big-on-privacy">
    <title>Android 10 out, big on ‘privacy’</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-roshan-nair-september-4-2019-android-10-out-big-on-privacy</link>
    <description>
        &lt;b&gt;Companies aware of new concerns, says expert.&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;The article by Roshan H. Nair &lt;/span&gt;&lt;a class="external-link" href="https://www.deccanherald.com/metrolife/metrolife-your-bond-with-bengaluru/android-10-out-big-on-privacy-759085.html" style="text-align: justify; "&gt;published in Deccan Herald &lt;/a&gt;&lt;span style="text-align: justify; "&gt;quotes Sunil Abraham.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The much-awaited ‘Android 10’ software for phones was launched on Wednesday. In a video put out by the company, a host of new features is visible, one of the most prominent being enhanced privacy. The video says Android 10 has “privacy features that put you in control".&lt;/p&gt;
&lt;p&gt;Android 10 is only the latest in a series of tech products that project ‘privacy’ as a special feature.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The world is still recovering from the shock of the Cambridge Analytica scandal, and has become more protective about its personal data and suspicious about big tech companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Originally, it was only Apple products that advertised privacy as one of its special features. Now, every platform seems to want to mark themselves ‘safe’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“WhatsApp is promising end-to-end encryption. Facebook is saying all messaging will become like it is in WhatsApp. Microsoft, setting itself apart from Google and Facebook, is claiming that it doesn’t depend on customer’s data for its business model,...Sunil Abraham, executive director of The Centre for Internet and Society, Bengaluru, says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“More and more, companies are using systems such as local storage, local processing, end-to-end encryption for messages, commitment not to upload your personal data and encryption of cloud storage. These are all broad movements in what is called Privacy Enhancing Technologies’, now a domain of technology,” Abraham says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the moment, only Pixel phones have Android 10.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The software will be available on more phones in the coming months.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-roshan-nair-september-4-2019-android-10-out-big-on-privacy'&gt;https://cis-india.org/internet-governance/news/deccan-herald-roshan-nair-september-4-2019-android-10-out-big-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Roshan H. Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-25T02:05:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-insider-august-10-2016-and-now-aadhaar-enabled-smartphones-for-easy-verification-and-money-transfer">
    <title>And now, Aadhaar-enabled smartphones for easy verification and money transfer</title>
    <link>https://cis-india.org/internet-governance/news/business-insider-august-10-2016-and-now-aadhaar-enabled-smartphones-for-easy-verification-and-money-transfer</link>
    <description>
        &lt;b&gt;As reported earlier, the Indian government has planned to make Aadhaar-enabled smartphones , with which users would be able to self-authenticate and let businesses and banks verify the identity of their clients. This would also help in the government's aim of a cashless society. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.businessinsider.in/Aadhaar-enabled-smartphones-for-money-transfer/articleshow/53630610.cms"&gt;published in Business Insider&lt;/a&gt; on August 10, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While applauding this plan Nandan Nikelani, former chairman of UIDAI told   &lt;a href="http://economictimes.indiatimes.com/industry/banking/finance/banking/aadhaar-enabled-smartphones-will-ease-money-transfer/articleshow/53625690.cms"&gt;ET&lt;/a&gt; that, "Iris and fingerprint sensors are now becoming a standard  feature in smartphones anyway, and this requirement will only take a  minor tweak to the operating system. Once enabled, people will be able  to use phones to do self-authentication and KYC (know your customer)."   &lt;br /&gt; &lt;br /&gt; In July, senior executives of UIDAI and smartphone companies met to  discuss ways to allow smartphones let citizens authenticate their  fingerprints and iris on the phone, so that they could avail government  services from the comfort of their homes.   &lt;br /&gt; &lt;br /&gt; The most immediate use for these smartphones would be the Unified  Payment Interface (UPI), a new payment system which would allow money  transfer between any two parties by simply using their mobile phones and  a virtual payment address.   &lt;br /&gt; &lt;br /&gt; "The two-factor authentication in UPI is now being done with mobile  phone as one factor, and MPIN as the second factor. But once you have  Aadhaar authentication on the phone, then the second factor can be  biometric authentication through Aadhaar," said Nilekani.   &lt;br /&gt; &lt;br /&gt; With time, Aadhaar authentication will also be made open to third  party apps, said another person familiar with the ongoing discussions on  the condition of anonymity.   &lt;br /&gt; &lt;br /&gt; This would let users allow apps to access their biometric and iris  scans, just like they grant access to other features like camera,  contacts, SMS etc. However, from their end, handset makers have raised  security concerns about using iris scan for Aadhar authentication.   &lt;br /&gt; &lt;br /&gt; "The primary challenge lies in safe storing of the iris scan between  the time it is captured by the camera and then sent to UIDAI server  seeking authentication," said an industry insider.   &lt;br /&gt; &lt;br /&gt; For this, the he proposal includes a "hardware secure zone" which would encrypt biometric data before sending it out. However, even this isn't a foolproof idea.   &lt;br /&gt; &lt;br /&gt; "Unfortunately, from the biometric sensor the data goes to the  hardware secure zone via the operating system. Therefore, the biometric  data can be intercepted by the operating system before it is sent to the  hardware secure zone," said Sunil Abraham, executive director at  Bengaluru-based research organisation, the Centre for Internet and  Society.   &lt;br /&gt; &lt;br /&gt; To this, Nilekani said, "the reluctance to make changes at the vendor  level is mainly coming from a desire for control of biometric data for  strategic and commercial purposes. Privacy and security are bogus  reasons." He added that both ends, the handset and the Aadhaar database,  will be using the highest level of encryption.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-insider-august-10-2016-and-now-aadhaar-enabled-smartphones-for-easy-verification-and-money-transfer'&gt;https://cis-india.org/internet-governance/news/business-insider-august-10-2016-and-now-aadhaar-enabled-smartphones-for-easy-verification-and-money-transfer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-12T02:50:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot">
    <title>Analyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot</link>
    <description>
        &lt;b&gt;The Department of Telecommunications (DoT) in its order dated February 14, 2013 has issued directions to the Internet Service Providers (ISPs) to block seventy eight URLs. The block order has been issued as a result of a court order. Snehashish Ghosh does a preliminary analysis of the list of websites blocked as per the DoT order.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p&gt;Medianama has &lt;a class="external-link" href="http://www.medianama.com/wp-content/uploads/blocking-instruction-II-14-Feb-2013.pdf"&gt;published the DoT order&lt;/a&gt;, dated February 14, 2013, on its website.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;What has been blocked?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order contains seventy eight URLs. Seventy three URLs are related to the Indian Institute of Planning and Management (IIPM). &amp;nbsp;The other five URLs contain the term “highcourt”. The order also contains links from reputed news websites and news blogs including The Indian Express, Firstpost, Outlook, Times of India, Economic Times, Kafila and Caravan Magazine, and satire news websites Faking News and Unreal Times. The order also directs blocking of a public notice issued by the University Grants Commission (UGC).&lt;/p&gt;
&lt;p&gt;The block order does not contain links to any social media website. However, some content related to IIPM has been removed but it finds no mention in the block order. Pursuant to which order or direction such content has been removed remains unclear. For example, Google has removed search results for the terms &amp;lt;Fake IIPM&amp;gt; pursuant to Court orders and it carries the following notice:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;"In response to a legal request submitted to Google, we have removed 1 result(s) from this page. If you wish, you may &lt;/em&gt;&lt;a href="http://www.chillingeffects.org/notice.cgi?sID=432099"&gt;&lt;em&gt;read more about the request&lt;/em&gt;&lt;/a&gt;&lt;em&gt; at ChillingEffects.org."&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;Are there any mistakes in the order?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The direction issued by the DoT is once again inaccurate and mired with errors. In effect, the DoT has blocked sixty one unique URLs and the block order contains numerous repetitions. By its order the DoT has directed the ISPs to block an entire blog [&lt;a class="external-link" href="http://iipmexposed.blogspot.in"&gt;http://iipmexposed.blogspot.in&lt;/a&gt;] along with URLs to various posts in the same blog.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Reasons for Blocking Websites&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://economictimes.indiatimes.com/tech/internet/directed-by-gwalior-court-government-blocks-70-urls-critical-of-iipm/articleshow/18523107.cms"&gt;According to news reports&lt;/a&gt;, the main reason for blocking of websites by the DoT is a Court order issued by a Court in Gwalior. The reason for issuing such a block order might have been a court proceeding with respect to defamation and removal of defamatory content thereof. However, the reasons for blocking of domain names containing the term ‘high court’, which is not at all related to the IIPM Court case&amp;nbsp; is unclear. The DoT by its order has also blocked a link in the website of a internet domain registrar which carried advertisement for the domain name [&lt;a class="external-link" href="http://www.highcourt.com"&gt;www.highcourt.com&lt;/a&gt;].&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Are the blocks legitimate?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order may have been issued by the DoT under Rule 10 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Court order seems to be an interim injunction in a defamation suit. Generally, Courts exercise utmost caution while granting interim injunction in defamation cases.&amp;nbsp; According to the Bonnard Rule (Bonnard v. Perryman, [1891] 2 Ch 269) in a defamation case, “interim injunction should not be awarded unless a defence of justification by the defendant was certain to fail at trial level.” Moreover, in the case of Woodward and Frasier, Lord Denning noted “that it would be unjust to fetter the freedom of expression, when actually a full trial had not taken place, and that if during trial it is proved that the defendant had defamed the plaintiff, then should they be liable to pay the damages.” &amp;nbsp;&amp;nbsp;The Delhi High Court in &lt;em&gt;&lt;a href="http://www.indiankanoon.org/doc/562656/"&gt;Tata Sons Ltd. v. Green Peace International&lt;/a&gt;&lt;/em&gt; followed the Bonnard Rule and the Lord Denning’s judgements and ruled against the award of interim injunction for removal of defamatory content and stated:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“The Court notes that the rule in Bonnard is as applicable in regulating grant of injunctions in claims against defamation, as it was when the judgment was rendered more than a century ago. This is because the Courts, the world over, have set a great value to free speech and its salutary catalyzing effect on public debate and discussion on issues that concern people at large. The issue, which the defendant’s game seeks to address, is also one of public concern. The Court cannot also sit in value judgment over the medium (of expression) chosen by the defendant since in a democracy, speech can include forms such as caricature, lampoon, mime parody and other manifestations of wit.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Therefore, it appears that the Court order has moved away from the settled principles of law while awarding an interim injunction for blocking of content related to&amp;nbsp; IIPM. It is also interesting to note that in &lt;em&gt;Green Peace International&lt;/em&gt;, the Court also answered the question as to whether there should be different standard for posting or publication of defamatory content on the internet. It was observed by the Court that publication is a comprehensive term, ‘embracing all forms and medium – including the Internet’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Blocking a Public Notice issued by a Statutory Body of Government of India&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The block order mentions a URL which contains a public notice issued by University Grants Commission (UGC) related to the derecognition of IIPM as a University. The blocking of a public notice issued by the statutory body of the Government of India is unprecedented. A public notice issued by a statutory body is a function of the State. It can only be blocked or removed by a writ order issued by the High Court or the Supreme Court and only if it offends the Constitution. However, so far, ISPs such as BSNL have not enforced the blocking of this URL.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Implementation of the order by the ISPs&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As pointed out in my previous &lt;a href="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt;blog post&lt;/a&gt; on blocking of websites, the ISPs have again failed to notify their consumers the reasons for the blocking of the URLs. This lack of transparency in the implementation of the block order has a chilling effect on freedom of speech.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot'&gt;https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-02-17T07:35:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii">
    <title>Analyzing the Latest List of Blocked Sites (Communalism and Rioting Edition) Part II</title>
    <link>https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii</link>
    <description>
        &lt;b&gt;Snehashish Ghosh does a further analysis of the leaked list of the websites blocked by the Indian Government from August 18, 2012 till August 21, 2012 (“leaked list”). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Unnecessary Blocks and Mistakes:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;http://hinduexistance.files.wordpress.com/..., which appears on the leaked list, does not exist because the URL is incorrect. However, the correct URL does contain an image which, in my opinion, can be considered to be capable of inciting violence. It has not been blocked due to a spelling error in the order. Instead of blocking hinduexist&lt;b&gt;&lt;i&gt;e&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/... the DoT has ordered the blocking of hinduexist&lt;b&gt;&lt;i&gt;a&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/..., which does not exist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Two URLs in the block order are from the website of the High Council for Human Rights, Judiciary of the Islamic Republic of Iran. The reason for blocking these two links from this particular website is unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The website of the Union of NGOs of the Islamic World was blocked. Again, the reason for blocking this website remains unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;URLs such as, http://farazahmed.com/..., mumblingminion.blogspot.com, were blocked. The content on these URLs was in fact debunking the fake photographs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Certain blocked Facebook pages did not have any bearing on the North East exodus which was the main reason behind the blocks. For example, Facebook link leading to United States Institute for Peace page was blocked.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Duration of the Block&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Department of Telecommunications (DoT) did not specify the period for which the block has been implemented in its orders. As a result of which certain URLs still remain blocked while a majority of the links in the leaked list can be accessed. Lack of clear directions from the DoT has resulted in haphazard blocking and certain internet service providers (ISPs) have lifted the block on certain links whereas some other ISPs have continued with a complete block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How have the intermediaries reacted to the block orders?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by the leaked list of websites blocked by DoT, it issued the block orders to ‘all internet service licensees’. Intermediaries that do not fall in the category of 'internet service licensees’ were also sent  a separate set of requests for taking down third party content. However, it is unclear under which provision of the law such request was made by the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Service Licensees&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img src="https://cis-india.org/home-images/chart_1.png" alt="Implementation of the order at the ISP level" class="image-inline" title="Implementation of the order at the ISP level" /&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet service licensee or the ISPs have not followed any uniform system to notify that a particular URL or website in the leaked list is blocked according to DoT’s orders. The lack of transparency in the implementation of the block orders, have a chilling effect on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, BSNL returns the following messages:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications" or “This site has been blocked as per instructions from Department of Telecom (DOT).”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, these messages are not uniform across all the URLs/websites in the leaked list. BSNL does not generate any response for the majority of the URLs in the leaked list. This results in ‘invisible censorship’ as the person who is trying to access the blocked URL does not have any means to know whether a particular URL is unavailable or certain sites are blocked by government orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of notification does not only infringes upon the fundamental right  to freedom of speech and expression but also violates the fundamental  right to a constitutional remedy guaranteed under Article 32 of our  Constitution. The person aggrieved by such block orders cannot approach  the Court for a remedy because there is no means to figure out:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Description of the content blocked?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Who  has issued the block order/request?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Under which provision of the law such  block order/request has been issued?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Who has  implemented the block order/request? and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) What was the reason for the block?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intermediaries should provide with the above notification details while implementing a block order issued by the Government. &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediaries hosting third party content: &lt;/b&gt;&lt;/p&gt;
&lt;p align="right" style="text-align: justify; "&gt;More than 100 out of the 309 blocks are Facebook (http and https) URLs. Facebook has not informed its users about the reasons behind unavailability of certain pages or content. This is another instance of invisible censorship. However, YouTube, a Google service, has maintained certain level of transparency, and informs the user that the content has been blocked as per ‘government removal request’. It is interesting to note that certain YouTube user accounts were terminated as well. It is unclear whether this was as a result of the block order. Furthermore, links associated with blogger.com, which is another service provided by Google, have been removed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.medianama.com/2012/09/223-analyzing-the-latest-list-of-blocked-sites-communalism-rioting-edition-part-ii/"&gt;re-posted&lt;/a&gt; by Medianama on September 26, 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii'&gt;https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2012-09-27T10:42:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill">
    <title>Analyzing the Draft Human DNA Profiling Bill 2012</title>
    <link>https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society invites you to a workshop on analyzing the Draft Human DNA Profiling Bill on March 1, 2013 in its Bangalore office, from 2.00 p.m. to 5.00 p.m.&lt;/b&gt;
        &lt;p class="Copyright" style="text-align: justify; "&gt;The Draft Human DNA Profiling Bill seeks to establish DNA databases at the state, regional, and national level for the purposes of establishing identity in criminal and civil proceedings. The Draft Human DNA Profiling Bill has been critiqued by the committee chaired by &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Justice AP Shah in the “Report of Group of Experts on Privacy”&lt;/a&gt; for a lack of adequate privacy safeguards.&lt;/p&gt;
&lt;p class="Copyright" style="text-align: justify; "&gt;In Fall 2012 the Centre for Internet and Society held a series of&lt;a href="https://cis-india.org/internet-governance/blog/public-meeting-on-dna-profiling-bill"&gt; public meetings&lt;/a&gt; to raise awareness about the Bill and &lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;submitted feedback&lt;/a&gt; to the Department of Biotechnology. This workshop is in response to an &lt;a href="https://cis-india.org/internet-governance/blog/dna-profiling-bill-2012.pdf" class="internal-link"&gt;April 2012 draft of the Bill&lt;/a&gt; and seeks to analyze the text of the Bill, look at technical aspects of the Bill and DNA profiling, and compare the current draft of the Bill with previous drafts.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-25T09:56:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online">
    <title>Analytics to help govt read public mood online</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online</link>
    <description>
        &lt;b&gt;The Union government is in the process of commissioning a project to analyse public sentiment about it on various online platforms. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Talwar &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/analytics-to-help-govt-read-public-mood-online-115022000044_1.html"&gt;published in the Business Standard&lt;/a&gt; quotes Pranesh Prakash.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The project will cover state-owned MyGov.in, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Social+Media" target="_blank"&gt;social media &lt;/a&gt;portals such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and Twitter, and the top 10 &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=News+Websites" target="_blank"&gt;news websites &lt;/a&gt;in the country. The analysis will also extend to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and  Facebook accounts of government ministries and departments, according  to a document evincing interest from companies and defining scope of  work that has been posted on the website of the electronics and  information technology department. The Centre expects the platform to be  ready in two months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the first time that the Centre is deploying a tool to  'officially' listen in on social media conversations and monitor media  reports as well as subsequent public reaction. The idea is not to see  which journalist is saying what and tell the government "inhe ad dena  band kar do" (don't give them ads), said a government official familiar  with the plans. It has also got "nothing to do with politics or  elections", the official added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The stated objective is to gauge public opinion related to policy  matters and get a "comprehensive picture of the larger issues concerning  the people", the official said. According to the mandate, the company  will analyse comments posted on MyGov.in, which sees about 50,000  responses every week. It will also scan through social media sites,  articles posted on news portals and the comments section, and categorise  these into three "tag clouds" - negative, positive and neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Analytics are not strong if you are looking at it with a tunnel  vision," said the government official, adding they needed to be  comprehensive and corroborated across different platforms. The idea  behind extending the mandate to social media websites and news  organisations, according to the official, is to make sure the  government's policies and initiatives are in sync with the people's  wishes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government claimed it would only study posts that are  "public" and not build backend access into the network of social media  companies to get a look at all content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the official, the Centre was not interested in "listening  to everything that people are talking about", rather it will restrict  its queries that relate to its business of policymaking. "Anything  beyond that is not our mandate," the official clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Murthy, founder of digital media firm Pinstorm,  these kinds of sentiment-analysis tools have become quite popular lately  with both companies and political parties, who use these to gauge  public mood before elections.&lt;br /&gt; &lt;br /&gt; "They can cost anywhere between Rs 2 lakh and Rs 10 lakh a month," he  said, adding there were hardly any privacy implications since the data  being analysed was in public domain.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash of the Centre for Internet and Society said, "Privacy  concerns aren't as acute if there is no profiling that is happening."  Prakash added the concept might be worrisome if algorithms became the  determining factor for policymaking, as they could be dangerous for  democratic functioning. "They are like black boxes and you don't how  they function."&lt;br /&gt; &lt;br /&gt; Launched about six months ago, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mygov.in" target="_blank"&gt;MyGov.in &lt;/a&gt;is  the National Democratic Alliance government's citizen-engagement  platform through which it solicits ideas and inputs from the public on  government business.&lt;br /&gt; &lt;br /&gt; Once the sentiment-analysis project is implemented, the government will  be able to automate the process of providing summary of inputs on  discussion topics to the government agencies concerned.&lt;br /&gt; &lt;br /&gt; The volume of comments received on the platform is making it difficult  for the Centre to manually sift through these for the most relevant  ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The solution would display two sets of dashboards. One would be in  public domain. The other would be restricted through the multi-level  role-based access system provisioned by the solution," said the document  evincing expression of interest from companies.&lt;br /&gt; &lt;br /&gt; Those interested will have to provide a proof of concept before being selected.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online'&gt;https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T16:57:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right">
    <title>Analysis: Data Protection in India - Getting It Right</title>
    <link>https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right</link>
    <description>
        &lt;b&gt;Indian Government Plans Ambitious Data Protection Legislation Rollout by October&lt;/b&gt;
        &lt;p&gt;The blog post by Suparna Goswami and Varun Haran was &lt;a class="external-link" href="http://www.inforisktoday.in/analysis-data-protection-in-india-getting-right-a-9866"&gt;published by Info Risk Today&lt;/a&gt; on April 26, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The government of India recently informed the Supreme Court of India that it expects to put in place a comprehensive data protection framework by October. The Telecom Regulatory Authority of India will be heading up the initiative and has already started consultations for preparing a draft framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government on April 5 acknowledged that there was no proper regulatory framework to deal with privacy concerns of citizens arising out of "over-the-top" popular messaging services such as Whatsapp, Facebook and Skype. Consequently, the Department of Telecommunications is exploring creating a "regulatory framework" through legislation to address data protection and citizens' privacy concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the European Union already preparing to enforce its &lt;a href="http://gdpr.inforisktoday.com/"&gt;General Data Protection Regulation&lt;/a&gt; next year, India may be late to the party. But the need for a data  protection and privacy law in India is pressing. And when it's enacted,  it will define provisions for protecting sensitive personally  identifiable information and spell out liabilities in the event PII gets  breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many security practitioners, however, say the government's goal of having a law by October seems aggressive.&lt;/p&gt;
&lt;p&gt;Shivangi Nadkarni, co-founder &amp;amp; CEO at Arrka Consulting, points  out that once the government publishes a draft regulation for public  comment, it must allow two months for gathering feedback. "It has to  align with the schedule of the Monsoon Session of Parliament if it has  to meet the October deadline," Nadkarni says (see: &lt;a href="http://www.inforisktoday.in/blogs/its-time-to-get-serious-about-privacy-p-2054"&gt;&lt;i&gt;It's Time to get Serious About Privacy&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3&gt;Existing Provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India already has some data protection and privacy provisions in the  Information Technology Act 2000, amended in 2008 and the subsequent IT  rules defined in 2011. But the IT Act 2000/8 doesn't define sensitive  personal information directly and only provides guidance for reasonable  security practice and due diligence - the actual implementation  standards have not been explicitly prescribed, says Bengaluru-based &lt;a href="http://www.inforisktoday.in/interviews/legal-expert-poor-infosec-culture-to-blame-in-tcs-vs-epic-i-3173"&gt;Na. Vijayashankar&lt;/a&gt;, a cyber law expert and information risk consultant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current data protection regime is under section 43A of the IT Act  2000/8, and the regulations made thereunder, says Pranesh Prakash,  policy director at Bengaluru-based research think tank the Center for  Internet and Society. He contends those regulations are weak, do not  specify any governmental agency, and do not lay out penalties for  violations.  Other relevant provisions, such as section 72A, are also  far too onerous and aren't ever applied in practice to such cases, he  says (see: &lt;a href="http://www.inforisktoday.in/interviews/evolution-cyberlaw-i-2844"&gt;&lt;i&gt;Pavan Duggal&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on &lt;/i&gt;&lt;a href="http://www.inforisktoday.in/interviews/indias-cyberlaw-must-rapidly-evolve-i-2617"&gt;&lt;i&gt;Why India's Cyberlaw Must Rapidly Evolve&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Section 43A and the 'reasonable security rules' didn't change much,  given the lack of teeth in the regulations, and the onerous job of  proving "wrongful gain or wrongful loss" of property due to data  breaches," Prakash says. In addition, as a complement to a strong, yet  flexible, data protection/data security regime, the government also  needs to put in a &lt;a href="http://www.inforisktoday.in/privacy-c-151"&gt;privacy&lt;/a&gt; regime that covers both the private and public sectors, he adds.&lt;/p&gt;
&lt;h3&gt;Right to Privacy&lt;/h3&gt;
&lt;p&gt;India lacks a clear framework that categorically recognizes the sanctity of privacy, says &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;J. Sai Deepak&lt;/a&gt;,  an independent cyber law expert and arguing counsel at the Delhi High  Court. Because the status of the fundamental right to privacy is yet to  be adjudicated upon by the Supreme Court, Sai Deepak is uncertain of the  basis on which the regulatory mechanism that the government is  developing, would function (see: &lt;a href="http://www.inforisktoday.in/interviews/india-needs-comprehensive-privacy-law-i-2565"&gt;&lt;i&gt;Why India Needs Comprehensive Privacy Law&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is important because if you treat privacy as a fundamental right,  then the mechanism has to take into account the constitutional  obligations and limitations that come with such treatment," Sai Deepak  says. A telecom-centric or a single sector-centric approach to privacy  as a reaction to a particular litigation may do more harm than good, he  adds (see: &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;&lt;i&gt;Re-Evaluating Privacy in India&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I hope the government goes beyond this context and addresses privacy  comprehensively. It is for this reason that I am not sure TRAI is the  best entity to vest this mandate with," he says. "After all, we are  looking at safeguarding privacy even outside the telecom sphere" he  adds.&lt;/p&gt;
&lt;p&gt;The government needs to clearly spell out all principles and rights  of individuals in the context of privacy as a foundation, experts say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Declare that privacy is a right of an Indian citizen and is protected  by law," Vijayashankar says. The law should apply to protection of data  in any form and require appropriate security measures to be adopted by  anyone who collects, processes and manages PII, he adds (see: &lt;a href="http://www.inforisktoday.in/interviews/privacy-india-inc-needs-it-i-3086"&gt;&lt;i&gt;Privacy: Why India Inc. Needs It&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Viable Roadmap&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.inforisktoday.in/interviews/evolving-security-mindset-i-2921"&gt;Vinayak Godse&lt;/a&gt;,  senior director at Data Security Council of India, says Indian  companies, including IT services and outsourcing firms, are losing in  European markets because of the high data protection standards followed  in those countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have already been struggling in some markets as our data protection  mechanisms don't match to the evolving global expectations for privacy,"  Godse says. "Questions have been raised by several geographies  especially EU on India's regulatory posture in terms of data  protection." (See: &lt;a href="http://www.inforisktoday.in/interviews/indias-2015-data-privacy-agenda-i-2547"&gt;&lt;i&gt;India's 2015 Data Privacy Agenda&lt;/i&gt;&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vijayashankar says India needs to immediately appoint a data  commissioner to efficiently address data privacy violations, which are  currently being judged under ITA 2000/8. This will also help Indian  enterprises that conduct business with the EU when the GDPR is enforced  starting May 25, 2018 (see: &lt;a href="http://www.inforisktoday.in/interviews/how-will-europes-gdpr-affect-businesses-worldwide-i-3518"&gt;&lt;i&gt; How Will Europe's GDPR Affect Businesses Worldwide?&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni of Arrka says the framework should:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clearly define and articulate what qualifies a personal information.&lt;/li&gt;
&lt;li&gt;Clearly spell out all principles and rights of individuals in the  context of privacy and elaborate on specific aspects as required within  each principle/ right.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank"&gt;Justice AP Shah committee report&lt;/a&gt; of 2012 which proposed comprehensive set of data privacy principles and  measures had a wide acceptance by various stakeholders, and should be a  good starting point to draft an omnibus data privacy law in India,   says Srinivas Poosarla, vice president and head (global), privacy &amp;amp;  data protection at Infosys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the way the enforcement of any such law enacted, would differ at the center and at state level, some of the areas that Poosarla contends need attention are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mandating that organizations appoint data privacy officers;&lt;/li&gt;
&lt;li&gt;Providing platforms to report grievances and receive compensation from organizations in a timely manner;&lt;/li&gt;
&lt;li&gt;Ensuring accountability of organizations for data privacy and to have them promptly &lt;a href="http://www.inforisktoday.in/notification-c-327"&gt;report&lt;/a&gt; any data breach to affected individuals where there is likely to be material impact;&lt;/li&gt;
&lt;li&gt;Identifying and empowering a body at national or state level to enforce implementation of the law.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;GDPR as a Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni suggests that the EU's GDPR would be a good benchmark for India. Poosarla and others also agree that the EU GDPR is a good template to draw from. Most importantly, the government should involve all stakeholders, especially privacy and data security advocates, in the drafting of the law, they say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The best practices and principles from GDPR should be adopted, keeping the cultural and demographic needs of Indian society in mind, Vijayshankar adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash of CIS notes: "Any law must keep the evolution of technology in mind. The law can't be so rigid that technological developments are prevented, nor can it be so flexible that technology defeats the basic guarantees provided by the law. For instance, the role of "consent" in a world where indefinite consent is easily obtained by inserting a clause in a long standard-form contract that no one reads, must be taken into account."&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right'&gt;https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-28T01:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
