<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2746 to 2760.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/dna-overview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/issues-in-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii">
    <title>Analyzing the Latest List of Blocked Sites (Communalism and Rioting Edition) Part II</title>
    <link>https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii</link>
    <description>
        &lt;b&gt;Snehashish Ghosh does a further analysis of the leaked list of the websites blocked by the Indian Government from August 18, 2012 till August 21, 2012 (“leaked list”). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Unnecessary Blocks and Mistakes:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;http://hinduexistance.files.wordpress.com/..., which appears on the leaked list, does not exist because the URL is incorrect. However, the correct URL does contain an image which, in my opinion, can be considered to be capable of inciting violence. It has not been blocked due to a spelling error in the order. Instead of blocking hinduexist&lt;b&gt;&lt;i&gt;e&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/... the DoT has ordered the blocking of hinduexist&lt;b&gt;&lt;i&gt;a&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/..., which does not exist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Two URLs in the block order are from the website of the High Council for Human Rights, Judiciary of the Islamic Republic of Iran. The reason for blocking these two links from this particular website is unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The website of the Union of NGOs of the Islamic World was blocked. Again, the reason for blocking this website remains unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;URLs such as, http://farazahmed.com/..., mumblingminion.blogspot.com, were blocked. The content on these URLs was in fact debunking the fake photographs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Certain blocked Facebook pages did not have any bearing on the North East exodus which was the main reason behind the blocks. For example, Facebook link leading to United States Institute for Peace page was blocked.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Duration of the Block&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Department of Telecommunications (DoT) did not specify the period for which the block has been implemented in its orders. As a result of which certain URLs still remain blocked while a majority of the links in the leaked list can be accessed. Lack of clear directions from the DoT has resulted in haphazard blocking and certain internet service providers (ISPs) have lifted the block on certain links whereas some other ISPs have continued with a complete block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How have the intermediaries reacted to the block orders?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by the leaked list of websites blocked by DoT, it issued the block orders to ‘all internet service licensees’. Intermediaries that do not fall in the category of 'internet service licensees’ were also sent  a separate set of requests for taking down third party content. However, it is unclear under which provision of the law such request was made by the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Service Licensees&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img src="https://cis-india.org/home-images/chart_1.png" alt="Implementation of the order at the ISP level" class="image-inline" title="Implementation of the order at the ISP level" /&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet service licensee or the ISPs have not followed any uniform system to notify that a particular URL or website in the leaked list is blocked according to DoT’s orders. The lack of transparency in the implementation of the block orders, have a chilling effect on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, BSNL returns the following messages:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications" or “This site has been blocked as per instructions from Department of Telecom (DOT).”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, these messages are not uniform across all the URLs/websites in the leaked list. BSNL does not generate any response for the majority of the URLs in the leaked list. This results in ‘invisible censorship’ as the person who is trying to access the blocked URL does not have any means to know whether a particular URL is unavailable or certain sites are blocked by government orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of notification does not only infringes upon the fundamental right  to freedom of speech and expression but also violates the fundamental  right to a constitutional remedy guaranteed under Article 32 of our  Constitution. The person aggrieved by such block orders cannot approach  the Court for a remedy because there is no means to figure out:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Description of the content blocked?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Who  has issued the block order/request?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Under which provision of the law such  block order/request has been issued?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Who has  implemented the block order/request? and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) What was the reason for the block?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intermediaries should provide with the above notification details while implementing a block order issued by the Government. &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediaries hosting third party content: &lt;/b&gt;&lt;/p&gt;
&lt;p align="right" style="text-align: justify; "&gt;More than 100 out of the 309 blocks are Facebook (http and https) URLs. Facebook has not informed its users about the reasons behind unavailability of certain pages or content. This is another instance of invisible censorship. However, YouTube, a Google service, has maintained certain level of transparency, and informs the user that the content has been blocked as per ‘government removal request’. It is interesting to note that certain YouTube user accounts were terminated as well. It is unclear whether this was as a result of the block order. Furthermore, links associated with blogger.com, which is another service provided by Google, have been removed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.medianama.com/2012/09/223-analyzing-the-latest-list-of-blocked-sites-communalism-rioting-edition-part-ii/"&gt;re-posted&lt;/a&gt; by Medianama on September 26, 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii'&gt;https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2012-09-27T10:42:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill">
    <title>Analyzing the Draft Human DNA Profiling Bill 2012</title>
    <link>https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society invites you to a workshop on analyzing the Draft Human DNA Profiling Bill on March 1, 2013 in its Bangalore office, from 2.00 p.m. to 5.00 p.m.&lt;/b&gt;
        &lt;p class="Copyright" style="text-align: justify; "&gt;The Draft Human DNA Profiling Bill seeks to establish DNA databases at the state, regional, and national level for the purposes of establishing identity in criminal and civil proceedings. The Draft Human DNA Profiling Bill has been critiqued by the committee chaired by &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Justice AP Shah in the “Report of Group of Experts on Privacy”&lt;/a&gt; for a lack of adequate privacy safeguards.&lt;/p&gt;
&lt;p class="Copyright" style="text-align: justify; "&gt;In Fall 2012 the Centre for Internet and Society held a series of&lt;a href="https://cis-india.org/internet-governance/blog/public-meeting-on-dna-profiling-bill"&gt; public meetings&lt;/a&gt; to raise awareness about the Bill and &lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;submitted feedback&lt;/a&gt; to the Department of Biotechnology. This workshop is in response to an &lt;a href="https://cis-india.org/internet-governance/blog/dna-profiling-bill-2012.pdf" class="internal-link"&gt;April 2012 draft of the Bill&lt;/a&gt; and seeks to analyze the text of the Bill, look at technical aspects of the Bill and DNA profiling, and compare the current draft of the Bill with previous drafts.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-25T09:56:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online">
    <title>Analytics to help govt read public mood online</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online</link>
    <description>
        &lt;b&gt;The Union government is in the process of commissioning a project to analyse public sentiment about it on various online platforms. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Talwar &lt;a class="external-link" href="http://www.business-standard.com/article/economy-policy/analytics-to-help-govt-read-public-mood-online-115022000044_1.html"&gt;published in the Business Standard&lt;/a&gt; quotes Pranesh Prakash.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The project will cover state-owned MyGov.in, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Social+Media" target="_blank"&gt;social media &lt;/a&gt;portals such as &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;and Twitter, and the top 10 &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=News+Websites" target="_blank"&gt;news websites &lt;/a&gt;in the country. The analysis will also extend to &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;and  Facebook accounts of government ministries and departments, according  to a document evincing interest from companies and defining scope of  work that has been posted on the website of the electronics and  information technology department. The Centre expects the platform to be  ready in two months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the first time that the Centre is deploying a tool to  'officially' listen in on social media conversations and monitor media  reports as well as subsequent public reaction. The idea is not to see  which journalist is saying what and tell the government "inhe ad dena  band kar do" (don't give them ads), said a government official familiar  with the plans. It has also got "nothing to do with politics or  elections", the official added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The stated objective is to gauge public opinion related to policy  matters and get a "comprehensive picture of the larger issues concerning  the people", the official said. According to the mandate, the company  will analyse comments posted on MyGov.in, which sees about 50,000  responses every week. It will also scan through social media sites,  articles posted on news portals and the comments section, and categorise  these into three "tag clouds" - negative, positive and neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Analytics are not strong if you are looking at it with a tunnel  vision," said the government official, adding they needed to be  comprehensive and corroborated across different platforms. The idea  behind extending the mandate to social media websites and news  organisations, according to the official, is to make sure the  government's policies and initiatives are in sync with the people's  wishes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the government claimed it would only study posts that are  "public" and not build backend access into the network of social media  companies to get a look at all content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the official, the Centre was not interested in "listening  to everything that people are talking about", rather it will restrict  its queries that relate to its business of policymaking. "Anything  beyond that is not our mandate," the official clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mahesh Murthy, founder of digital media firm Pinstorm,  these kinds of sentiment-analysis tools have become quite popular lately  with both companies and political parties, who use these to gauge  public mood before elections.&lt;br /&gt; &lt;br /&gt; "They can cost anywhere between Rs 2 lakh and Rs 10 lakh a month," he  said, adding there were hardly any privacy implications since the data  being analysed was in public domain.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash of the Centre for Internet and Society said, "Privacy  concerns aren't as acute if there is no profiling that is happening."  Prakash added the concept might be worrisome if algorithms became the  determining factor for policymaking, as they could be dangerous for  democratic functioning. "They are like black boxes and you don't how  they function."&lt;br /&gt; &lt;br /&gt; Launched about six months ago, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Mygov.in" target="_blank"&gt;MyGov.in &lt;/a&gt;is  the National Democratic Alliance government's citizen-engagement  platform through which it solicits ideas and inputs from the public on  government business.&lt;br /&gt; &lt;br /&gt; Once the sentiment-analysis project is implemented, the government will  be able to automate the process of providing summary of inputs on  discussion topics to the government agencies concerned.&lt;br /&gt; &lt;br /&gt; The volume of comments received on the platform is making it difficult  for the Centre to manually sift through these for the most relevant  ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The solution would display two sets of dashboards. One would be in  public domain. The other would be restricted through the multi-level  role-based access system provisioned by the solution," said the document  evincing expression of interest from companies.&lt;br /&gt; &lt;br /&gt; Those interested will have to provide a proof of concept before being selected.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online'&gt;https://cis-india.org/internet-governance/news/business-standard-february-20-2015-surabhi-agarwal-analytics-to-help-govt-read-public-mood-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T16:57:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right">
    <title>Analysis: Data Protection in India - Getting It Right</title>
    <link>https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right</link>
    <description>
        &lt;b&gt;Indian Government Plans Ambitious Data Protection Legislation Rollout by October&lt;/b&gt;
        &lt;p&gt;The blog post by Suparna Goswami and Varun Haran was &lt;a class="external-link" href="http://www.inforisktoday.in/analysis-data-protection-in-india-getting-right-a-9866"&gt;published by Info Risk Today&lt;/a&gt; on April 26, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The government of India recently informed the Supreme Court of India that it expects to put in place a comprehensive data protection framework by October. The Telecom Regulatory Authority of India will be heading up the initiative and has already started consultations for preparing a draft framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government on April 5 acknowledged that there was no proper regulatory framework to deal with privacy concerns of citizens arising out of "over-the-top" popular messaging services such as Whatsapp, Facebook and Skype. Consequently, the Department of Telecommunications is exploring creating a "regulatory framework" through legislation to address data protection and citizens' privacy concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the European Union already preparing to enforce its &lt;a href="http://gdpr.inforisktoday.com/"&gt;General Data Protection Regulation&lt;/a&gt; next year, India may be late to the party. But the need for a data  protection and privacy law in India is pressing. And when it's enacted,  it will define provisions for protecting sensitive personally  identifiable information and spell out liabilities in the event PII gets  breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many security practitioners, however, say the government's goal of having a law by October seems aggressive.&lt;/p&gt;
&lt;p&gt;Shivangi Nadkarni, co-founder &amp;amp; CEO at Arrka Consulting, points  out that once the government publishes a draft regulation for public  comment, it must allow two months for gathering feedback. "It has to  align with the schedule of the Monsoon Session of Parliament if it has  to meet the October deadline," Nadkarni says (see: &lt;a href="http://www.inforisktoday.in/blogs/its-time-to-get-serious-about-privacy-p-2054"&gt;&lt;i&gt;It's Time to get Serious About Privacy&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3&gt;Existing Provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India already has some data protection and privacy provisions in the  Information Technology Act 2000, amended in 2008 and the subsequent IT  rules defined in 2011. But the IT Act 2000/8 doesn't define sensitive  personal information directly and only provides guidance for reasonable  security practice and due diligence - the actual implementation  standards have not been explicitly prescribed, says Bengaluru-based &lt;a href="http://www.inforisktoday.in/interviews/legal-expert-poor-infosec-culture-to-blame-in-tcs-vs-epic-i-3173"&gt;Na. Vijayashankar&lt;/a&gt;, a cyber law expert and information risk consultant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current data protection regime is under section 43A of the IT Act  2000/8, and the regulations made thereunder, says Pranesh Prakash,  policy director at Bengaluru-based research think tank the Center for  Internet and Society. He contends those regulations are weak, do not  specify any governmental agency, and do not lay out penalties for  violations.  Other relevant provisions, such as section 72A, are also  far too onerous and aren't ever applied in practice to such cases, he  says (see: &lt;a href="http://www.inforisktoday.in/interviews/evolution-cyberlaw-i-2844"&gt;&lt;i&gt;Pavan Duggal&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on &lt;/i&gt;&lt;a href="http://www.inforisktoday.in/interviews/indias-cyberlaw-must-rapidly-evolve-i-2617"&gt;&lt;i&gt;Why India's Cyberlaw Must Rapidly Evolve&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Section 43A and the 'reasonable security rules' didn't change much,  given the lack of teeth in the regulations, and the onerous job of  proving "wrongful gain or wrongful loss" of property due to data  breaches," Prakash says. In addition, as a complement to a strong, yet  flexible, data protection/data security regime, the government also  needs to put in a &lt;a href="http://www.inforisktoday.in/privacy-c-151"&gt;privacy&lt;/a&gt; regime that covers both the private and public sectors, he adds.&lt;/p&gt;
&lt;h3&gt;Right to Privacy&lt;/h3&gt;
&lt;p&gt;India lacks a clear framework that categorically recognizes the sanctity of privacy, says &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;J. Sai Deepak&lt;/a&gt;,  an independent cyber law expert and arguing counsel at the Delhi High  Court. Because the status of the fundamental right to privacy is yet to  be adjudicated upon by the Supreme Court, Sai Deepak is uncertain of the  basis on which the regulatory mechanism that the government is  developing, would function (see: &lt;a href="http://www.inforisktoday.in/interviews/india-needs-comprehensive-privacy-law-i-2565"&gt;&lt;i&gt;Why India Needs Comprehensive Privacy Law&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This is important because if you treat privacy as a fundamental right,  then the mechanism has to take into account the constitutional  obligations and limitations that come with such treatment," Sai Deepak  says. A telecom-centric or a single sector-centric approach to privacy  as a reaction to a particular litigation may do more harm than good, he  adds (see: &lt;a href="http://www.inforisktoday.in/interviews/re-evaluating-privacy-i-3058"&gt;&lt;i&gt;Re-Evaluating Privacy in India&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I hope the government goes beyond this context and addresses privacy  comprehensively. It is for this reason that I am not sure TRAI is the  best entity to vest this mandate with," he says. "After all, we are  looking at safeguarding privacy even outside the telecom sphere" he  adds.&lt;/p&gt;
&lt;p&gt;The government needs to clearly spell out all principles and rights  of individuals in the context of privacy as a foundation, experts say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Declare that privacy is a right of an Indian citizen and is protected  by law," Vijayashankar says. The law should apply to protection of data  in any form and require appropriate security measures to be adopted by  anyone who collects, processes and manages PII, he adds (see: &lt;a href="http://www.inforisktoday.in/interviews/privacy-india-inc-needs-it-i-3086"&gt;&lt;i&gt;Privacy: Why India Inc. Needs It&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Viable Roadmap&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.inforisktoday.in/interviews/evolving-security-mindset-i-2921"&gt;Vinayak Godse&lt;/a&gt;,  senior director at Data Security Council of India, says Indian  companies, including IT services and outsourcing firms, are losing in  European markets because of the high data protection standards followed  in those countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We have already been struggling in some markets as our data protection  mechanisms don't match to the evolving global expectations for privacy,"  Godse says. "Questions have been raised by several geographies  especially EU on India's regulatory posture in terms of data  protection." (See: &lt;a href="http://www.inforisktoday.in/interviews/indias-2015-data-privacy-agenda-i-2547"&gt;&lt;i&gt;India's 2015 Data Privacy Agenda&lt;/i&gt;&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vijayashankar says India needs to immediately appoint a data  commissioner to efficiently address data privacy violations, which are  currently being judged under ITA 2000/8. This will also help Indian  enterprises that conduct business with the EU when the GDPR is enforced  starting May 25, 2018 (see: &lt;a href="http://www.inforisktoday.in/interviews/how-will-europes-gdpr-affect-businesses-worldwide-i-3518"&gt;&lt;i&gt; How Will Europe's GDPR Affect Businesses Worldwide?&lt;/i&gt;&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni of Arrka says the framework should:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clearly define and articulate what qualifies a personal information.&lt;/li&gt;
&lt;li&gt;Clearly spell out all principles and rights of individuals in the  context of privacy and elaborate on specific aspects as required within  each principle/ right.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank"&gt;Justice AP Shah committee report&lt;/a&gt; of 2012 which proposed comprehensive set of data privacy principles and  measures had a wide acceptance by various stakeholders, and should be a  good starting point to draft an omnibus data privacy law in India,   says Srinivas Poosarla, vice president and head (global), privacy &amp;amp;  data protection at Infosys.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the way the enforcement of any such law enacted, would differ at the center and at state level, some of the areas that Poosarla contends need attention are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mandating that organizations appoint data privacy officers;&lt;/li&gt;
&lt;li&gt;Providing platforms to report grievances and receive compensation from organizations in a timely manner;&lt;/li&gt;
&lt;li&gt;Ensuring accountability of organizations for data privacy and to have them promptly &lt;a href="http://www.inforisktoday.in/notification-c-327"&gt;report&lt;/a&gt; any data breach to affected individuals where there is likely to be material impact;&lt;/li&gt;
&lt;li&gt;Identifying and empowering a body at national or state level to enforce implementation of the law.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;GDPR as a Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nadkarni suggests that the EU's GDPR would be a good benchmark for India. Poosarla and others also agree that the EU GDPR is a good template to draw from. Most importantly, the government should involve all stakeholders, especially privacy and data security advocates, in the drafting of the law, they say.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The best practices and principles from GDPR should be adopted, keeping the cultural and demographic needs of Indian society in mind, Vijayshankar adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash of CIS notes: "Any law must keep the evolution of technology in mind. The law can't be so rigid that technological developments are prevented, nor can it be so flexible that technology defeats the basic guarantees provided by the law. For instance, the role of "consent" in a world where indefinite consent is easily obtained by inserting a clause in a long standard-form contract that no one reads, must be taken into account."&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right'&gt;https://cis-india.org/internet-governance/news/inforisk-today-april-26-2017-suparna-goswami-varun-haran-analysis-data-protection-in-india-getting-it-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-28T01:42:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations">
    <title>Analysis of Key Provisions of the Aadhaar Act Regulations </title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations</link>
    <description>
        &lt;b&gt;In exercise of their powers under of the powers conferred by Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016, (Aadhaar Act) the UIDAI has come out with a set of five regulations in late 2016 last year. In this policy brief, we look at the five regulations, their key provisions and highlight point out the unresolved, issues, unaddressed, and created issues as result of these   regulations. &lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This blog post was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset it is important to note that a concerning feature of these regulations is that they intend to govern the processes of a body which has been in existence for over six years, and has engaged in all the activities sought to be governed by these policies at a massive scale, considering the claims of over one billion Aadhaar number holders. However, the regulation do not acknowledge, let alone address past processes, practices, enrollments, authentications, use of technology etc.  this fact, and there are no provisions that effectively address  the past operations of the UIDAI. Below is an analysis of the five regulations issued thus far by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Transactions of Business at Meetings of the Authority) Regulations&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations framed under clause (h) of sub-section (2) of section 54 read with sub-section (1) of section 19 of the Aadhaar Act, deal with the meetings of the UIDAI, the process following up to each meeting, and the manner in which all meetings are to be conducted.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 3.&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Meetings of the Authority– (1) There shall be no less than three meetings of the Authority in a financial year on such dates and at such places as the Chairperson may direct and the interval between any two meetings shall not in any case, be longer than five months&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The number of times that UIDAI would meet in a year is far too less, taking in account the significance of the responsibilities of UIDAI as the sole body for policy making for all issues related to Aadhaar. In contrast, the Telecom Regulatory Authority of India is required to meet at least once a month. Other bodies such as SEBI and IRDAI are also required to meet at least four times&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and six times&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in a year respectively.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 8 (5)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Decisions taken at every meeting of the Authority shall be published on the website of Authority unless the Chairperson determines otherwise on grounds of ensuring confidentiality.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The Chairperson has the power to determine withholding publication of the decisions of the meeting on the broad grounds of ‘confidentiality’. Given the fact that the decisions taken by UIDAI as a public body can have very real implications for the rights of residents, the ground of confidentiality is not sufficient to warrant withholding publication. It is curious that instead of referring to the clearly defined exceptions laid down in other similar provisions such as the exceptions in Section 8 of the Right to Information Act, 2005, the rules merely refer to vague and undefined criteria of ‘confidentiality’.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 14 (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Members of the Authority and invitees shall sign an initial Declaration at the first meeting of the Authority for maintaining the confidentiality of the business transacted at meetings of the Authority in Schedule II.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above provision, combined with the fact that there is no provision regarding publication of the minutes of the meetings of UIDAI raise serious questions about the transparency of  its functioning.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unique Identification Authority of India (Enrolment and Update) Regulations&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (a), (b), (d,) (e), (j), (k), (l), (n), (r), (s), and (v) of sub-section (2), of Section 54 of the Aadhaar Act deals with the enrolment process, the generation of an Aadhaar number, updation of information and governs the conduct of enrolment agencies and associated third parties.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 8 (2), (3) and (4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standard enrolment/update software shall have the security features as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All equipment used in enrolment, such as computers, printers, biometric devices and other accessories shall be as per the specifications issued by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The biometric devices used for enrolment shall meet the specifications, and shall be certified as per the procedure, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 3 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards for collecting the biometric information shall be as specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 4 (5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The standards of the above demographic information shall be as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For residents who are unable to provide any biometric information contemplated by these regulations, the Authority shall provide for handling of such exceptions in the enrolment and update software, and such enrolment shall be carried out as per the procedure as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 14 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of rejection due to duplicate enrolment, resident may be informed about the enrolment against which his Aadhaar number has been generated in the manner as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Though in February 2017,  the UIDAI published technical specifications for registered devices&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the regulations  leave unaddressed issues such as lack of appropriately defined security safeguards in the Aadhaar. There is a general trend of continued deferrals in the regulations by stating that matters would be specified later on important aspects such as rejection of applications, uploading of the enrolment packet to the CIDR, the procedure for enrolling residents with biometric exceptions, the procedure for informing residents about acceptance/rejection of enrolment application, specifying the convenience fee for updation of residents’ information, the procedure for authenticating individuals across services etc.c. There is a clear failure to exercise the mandate delegated to UIDAI, leaving key matters to determined at a future unspecified date. The delay and ambiguity around when regulations will be defined is  all the more problematic  in light of the fact that the project has been implemented since 2010 and the Aadhaar number is now mandatory for availing a number of services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further it is important to note that a number of policies put out by the UIDAI predate these regulations, on which the regulations are  completely silent, thus neither endorsing previous policies  nor suggesting that they may be revisited. Further, the regulations choose to not engage with the question of operation of the Aadhaar project, enrolment and storage of data etc prior to the notification of these regulations, or the policies which these regulations may regularise. For instance, the regulations do not specify any measures to deal with issues arising out of enrolment devices used prior to the development of the February 2017 specifications.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 32&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority shall set up a contact centre to act as a central point of contact for resolution of queries and grievances of residents, accessible to residents through toll free number(s) and/ or e-mail, as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The contact centre shall:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provide a mechanism to log queries or grievances and provide residents with a unique reference number for further tracking till closure of the matter;&lt;/li&gt;
&lt;li&gt;Provide regional language support to the extent possible;&lt;/li&gt;
&lt;li&gt;Ensure safety of any information received from residents in relation to their identity information;&lt;/li&gt;
&lt;li&gt;Comply with the procedures and processes as may be specified by the Authority for this purpose.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;(3) Residents may also raise grievances by visiting the regional offices of the Authority or through any other officers or channels as may be specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While the setting up of a grievance redressal mechanism under the regulations is a welcome move, there is little clarity about the procedure to be followed, nor is a timeline for it specified. The chapter on grievance redressal is in fact one of the shortest chapters in the regulations. The only provision in this chapter deals with the setting up of a contact centre, a curious choice of term for what is supposed to be the primary quasi judicial grievance redressal body for the Aadhaar project. In line with the indifferent and insouciant terminology of ‘contact centre’, the chapter is restricted to the matters of the logging of queries and grievances by the contact centre, and does not address the matter of procedure or timelines, and even the substantive provisions about the nature of redress available. Furthermore, the obligation on the contact centre to protect information received is limited to ‘ensuring safety’ an ambiguous standard that does not speak to any other standards in Indian law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Authentication) Regulations, 2016&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These regulations, framed under  sub-section (1), and sub-clauses (f) and (w) of sub-section (2) of Section 54 of the Aadhaar Act deals with the authentication framework for Aadhaar numbers, the governance of authentication agencies and the procedure for collection, storage of authentication data and records.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provisions:&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 5 (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time of authentication, a requesting entity shall inform the Aadhaar number holder of the following details:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the nature of information that will be shared by the Authority upon authentication;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the uses to which the information received during authentication may be put; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) alternatives to submission of identity information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-Regulation 6 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A requesting entity shall obtain the consent referred to in sub-regulation (1) above in physical or preferably in electronic form and maintain logs or records of the consent obtained in the manner and form as may be specified by the Authority for this purpose.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Sub-regulation 5 mentions that at the time of authentication, requesting entities shall inform the Aadhaar number holder of alternatives to submission of identity information for the purpose of authentication. Similarly, sub-regulation 6 mentions that requesting entity shall obtain the consent of the Aadhaar number holder for the authentication. However, in neither of the above circumstances do the regulations specify the clearly defined options that must be made available to the Aadhaar number holder in case they do not wish submit identity information, nor do the regulations specify the procedure to be followed in case the Aadhaar number holder does not provide consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most significantly, this provision does little by way of allaying the fears raised by the language in Section 8 (4) of the Aadhaar Act which states that UIDAI “shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information.” This section gives a very wide discretion to UIDAI to share personal identity information with third parties, and the regulations do not temper or qualify this power in any way.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Sub-Regulation 11 (1) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The Authority may enable an Aadhaar number holder to permanently lock his biometrics and temporarily unlock it when needed for biometric authentication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Authority may make provisions for Aadhaar number holders to remove such permanent locks at any point in a secure manner.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;A welcome provision in the regulation is that of biometric locking which allows Aadhaar number holders to permanently lock his biometrics and temporarily unlock it only when needed for biometric authentication. However, in the same breath, the regulation also provides for the UIDAI to make provisions to remove such locking without any specified grounds for doing so.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 18 (2), (3) and (4)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The logs of authentication transactions shall be maintained by the requesting entity for a period of 2 (two) years, during which period an Aadhaar number holder shall have the right to access such logs, in accordance with the procedure as may be specified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Upon expiry of the period specified in sub-regulation (2), the logs shall be archived for a period of five years or the number of years as required by the laws or regulations governing the entity, whichever is later, and upon expiry of the said period, the logs shall be deleted except those records required to be retained by a court or required to be retained for any pending disputes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The requesting entity shall not share the authentication logs with any person other than the concerned Aadhaar number holder upon his request or for grievance redressal and resolution of disputes or with the Authority for audit purposes. The authentication logs shall not be used for any purpose other than stated in this sub-regulation.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;While it is specified that the authentication logs collected by the requesting entities shall not be shared with any person other than the concerned Aadhaar number holder upon their request or for grievance redressal and resolution of disputes or with the Authority for audit purposes, and that the authentication logs may not be used for any other purpose, the maintenance of the logs for a period of seven years seems excessive. Similarly, the UIDAI is also supposed to store Authentication transaction data for over five years. This is in violation of the widely recognized data minimisation principles which seeks that data collectors and data processors delete personal data records when the purpose for which it has been collected if fulfilled. While retention of data for audit and dispute-resolution purpose is legitimate, the lack of specification of security standards and the overall lack of transparency and inadequate grievance redressal mechanism greatly exacerbate the risks associated with data retention.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar (Sharing of Information) Regulations, 2016 and Aadhaar (Data security) Regulations, 2016&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Framed under the powers conferred by sub-section (1), and sub-clause (o) of sub-section (2), of Section 54 read with sub-clause (k) of sub-section (2) of Section 23, and sub-sections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) and (4) of Section 29, of the Aadhaar Act, the Sharing of Information regulations look at the restrictions on sharing of identity information collected by the UIDAI and requesting entities. The Data Security regulation, framed under powers conferred by clause (p) of subsection (2) of section 54 of the Aadhaar Act, looks at security obligations of all service providers engaged by the UIDAI.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Provision: Sub-Regulation 6 (1)&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;All agencies, consultants, advisors and other service providers engaged by the Authority, and ecosystem partners such as registrars, requesting entities, Authentication User Agencies and Authentication Service Agencies shall get their operations audited by an information systems auditor certified by a recognised body under the Information Technology Act, 2000 and furnish certified audit reports to the Authority, upon request or at time periods specified by the Authority.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Observations:&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The regulation states that audits shall be conducted by an information systems auditor certified by a recognised body under the Information Technology Act, 2000. However, there is no such certifying body under the Information Technology Act. This suggests a lack of diligence in framing the rules, and will inevitably to lead to inordinate delays, or alternately, a lack of a clear procedure in the appointment of  an auditor. Further, instead of prescribing a regular and proactive process of audits, the regulation only limits audits to when requested or as deemed appropriate by UIDAI. This is another, in line of many provisions, whose implication is power being concentrated in the hands of  UIDAI, with little scope for accountability and transparency.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, it must be stated that the regulations promulgated by the UIDAI leave a lot to be desired. Some of the most important issues raised against the Aadhaar Act, which were delegated to the UIDAI’s rule making powers have not been addressed at all. Some of the most important issues such as data security policies, right to access records of Aadhaar number holders, procedure to be followed by the grievance redressal bodies, uploading of the enrolment packet to the CIDR, procedure for enrolling residents with biometric exceptions, procedure for informing residents about acceptance/rejection of enrolment application have left unaddressed and ‘may be specified’ at a later data. These failures leave a gaping hole especially in light of the absence of a comprehensive data protection legislation in India, as well the speed and haste with the enrolment and seeding has been done by the UIDAI, and the number of services, both private and public, which are using or planning to use the Aadhaar number and the authentication process as a primary identifier for residents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1"&gt;https://www.irda.gov.in/ADMINCMS/cms/frmGeneral_Layout.aspx?page=PageNo62&amp;amp;flag=1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.sebi.gov.in/acts/boardregu.html"&gt;http://www.sebi.gov.in/acts/boardregu.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at:  https://uidai.gov.in/images/resource/aadhaar_registered_devices_2_0_09112016.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at &lt;a href="https://uidai.gov.in/legal-framework/acts/regulations.html"&gt;https://uidai.gov.in/legal-framework/acts/regulations.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations'&gt;https://cis-india.org/internet-governance/blog/analysis-of-key-provisions-of-aadhaar-act-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UIDAI</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2017-04-03T14:05:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016">
    <title>Analysis of ICANN revenue shows ambiguity in their records</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016</link>
    <description>
        &lt;b&gt;We, The Centre for Internet and Society, have been instrumental in having ICANN become transparent about their revenue with our persistent requests for their sources of revenue. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/icann-analysis"&gt;download&lt;/a&gt; a PDF of the Analysis&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;In 2014, CIS' Sunil Abraham demanded greater 	financial transparency of ICANN at both the Asia Pacific IGF and the ICANN 	Open Forum at the IGF. Later that year, CIS was provided with a list of 	ICANN's sources of revenue for the financial year 2014, including payments 	from registries, registrars, sponsors, among others, by ICANN India Head 	Mr. Samiran Gupta.This was a big step for CIS and the Internet community, 	as before this, no details on granular income had ever been publicly 	divulged by ICANN on request.&lt;a name="_ftnref1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; Our efforts have resulted in this information now being publicly available 	from the years 2012 onwards. We then decided to analyze all these years of 	financial data collaborating with Ashoka fellow Arjun Venkatraman and 	following are our observations:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To get a clear picture of ICANN's revenue, it can be seen that over the 	years it has been growing steadily. In 2016 it was 1.7 times the revenue it 	made in 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann1.jpg" alt="ICANN's total revenue from 2012 to 2016" class="image-inline" title="ICANN's total revenue from 2012 to 2016" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A breakdown by country reveals that a significantly higher proportion of 	their revenue is from sources registered in the United States.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann2.jpg" alt="Country wise contribution to ICANN revenue" class="image-inline" title="Country wise contribution to ICANN revenue" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It is also interesting to note that revenue from China has seen a spike in 	the past 2 years, especially in the period of 2015-2016. Verisign CEO, 	James Bidzos confirmed in an interview to analysts that Chinese activity 	had surprised them as well though they expected the activity to slow down 	in the second quarter of 2016.&lt;a name="_ftnref2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann3.jpg" alt="Country wise contribution without USA" class="image-inline" title="Country wise contribution without USA" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Verisign also happens to be the top paying customer for ICANN every year, 	running the .com/.net names. Their payments are orders of magnitude greater 	than payments made by any other single entity or even several collective 	entities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann4.jpg" alt="Highest contributing individual entities" class="image-inline" title="Highest contributing individual entities" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ICANN differentiates its sources of revenues by each class of entity which 	stand for the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;RYN - Registry&lt;/li&gt;
&lt;li&gt;OTH - Other&lt;/li&gt;
&lt;li&gt;RYG - Registry&lt;/li&gt;
&lt;li&gt;RIR - Regional Internet Registry&lt;/li&gt;
&lt;li&gt;RYC - ccTLD (Top Level Domains)&lt;/li&gt;
&lt;li&gt;IDN - Internationalized Domain Names&lt;/li&gt;
&lt;li&gt;RAR - Registrar&lt;/li&gt;
&lt;li&gt;SPN - Sponsor&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann5.jpg" alt="Contribution of entities by class" class="image-inline" title="Contribution of entities by class" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;span style="text-align: justify;"&gt;It is evident that the Registries and Registrars contribute the most to 	revenue however the classification of these groups in itself is ambiguous. 	RYG and RYN both stand for registry but we do not find any explanation 	given for the double entry for a single group. Secondly, Sponsors are 	included yet it is unclear how they have sponsored ICANN, whether through 	travel and accommodation of personnel or any other mode of institutional 	sponsorship. The Regional Internet Registries are clubbed under one heading 	and as a consequence it is not possible to determine individual RIR 	contribution such as how much did APNIC pay for the Asia and Pacific 	region. The total payment made by RIRs is a small fraction of the payments 	made by many other entities and they all pay through the Numbers Resources 	Organization (NRO), who is listed as paying from Uruguay however the MOU 	creating the NRO does not specify their location as being there. The NRO 	website states that " &lt;/span&gt;&lt;em&gt; RIRs may be audited by external parties with regards to their financial 		activities or their operations. RIRs may also allow third parties to 		report security incidents with regards to their services." &lt;/em&gt;&lt;span style="text-align: justify;"&gt; &lt;/span&gt;&lt;a name="_ftnref3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt; Their records show that financial disclosure is done in an inconsistent 	manner with the last publication from AFRINIC being for the year 2013 &lt;/span&gt;&lt;a name="_ftnref4"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;&lt;span style="text-align: justify;"&gt; while the RIPE NCC who coordinates the area of Central Europe, Middle East 	and Russia last published an annual report for the year 2016 but had no 	financial information in it. &lt;/span&gt;&lt;a name="_ftnref5"&gt;&lt;sup&gt;5&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The most frequently found words in their sources which can give us an idea 	of the structure of the contributing entity yields the following result.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/icann6.jpg" alt="Different structures of the sources" class="image-inline" title="Different structures of the sources" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Several clients have registered multiple corporate entities to increase 	their payments to ICANN such as DropCatch, Everest and Camelot. 	&lt;a name="_ftnref6"&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;/a&gt; The first of them, DropCatch, is a domain drop catcher, essentially selling 	expired domain names to the highest bidder. By the end of 2016, about 43% 	of all ICANN-accredited registrars were controlled by them. 	&lt;a name="_ftnref7"&gt;&lt;sup&gt;7&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Many clients have reported themselves from different countries over the 	years as well such as 'Verisign Sarl' which has been reported as 	originating from Switzerland and in a different year from the United 	States. 	&lt;a name="_ftnref8"&gt;&lt;sup&gt;8&lt;/sup&gt;&lt;/a&gt; Another curious case is of the entity, 'Afilias plc', which when 	categorized as a sponsor (SPN) is reported from Ireland however as a 	registry (both RYG and RYN) is reported from the United States. Some 	entities have originated from one place such as the United Arab Emirates 	and then moved to other countries such as India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To summarize, the key takeaways from the information we have dissected so 	far are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- ICANN's revenue has been steadily increasing with the 2016 seeing a 1.6 	times increase of its revenue generated in 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- United States is the country that most of the revenue originates from.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- After the US, China is now the largest contribution to ICANN revenue, 	significantly increase their contributions from 2015.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- Verisign is the top contributing entity, their contribution much greater 	than other entities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- Registries and Registrars are the main sources of revenue though there is 	ambiguity as to the classifications provided by ICANN such as the 	difference between RYG and RYN. The mode of contribution of sponsors 	exactly is not highlighted either.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;- Several entities have been listed from different places in different 	years, sometimes depending on the role they have played such as whether 	they are a sponsor or registry. Registering multiple corporate entities to 	acquire more registrars has occurred as well.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;div id="_ftnref1" style="text-align: justify;"&gt;
&lt;p&gt;1&lt;a name="_ftn1"&gt;&lt;/a&gt;. Venkataraman, P. (2017). &lt;a href="https://cis-india.org/internet-governance/blog/cis2019-efforts-towards-greater-financial-disclosure-by-icann"&gt;&lt;em&gt;CIS' Efforts Towards Greater Financial Disclosure by ICANN&lt;/em&gt; .&lt;/a&gt; [online] The Centre for Internet and Society.[Accessed 14 Mar. 2018].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref2" style="text-align: justify;"&gt;
&lt;p&gt;2&lt;a name="_ftn2"&gt;&lt;/a&gt;. Murphy, K. (2016). 			&lt;a href="http://domainincite.com/20361-verisign-has-great-quarter-but-sees-china-growth-slowing"&gt;&lt;em&gt; Verisign has great quarter but sees China growth slowing | 				Domain Incite - Domain Name Industry News, Analysis &amp;amp; 				Opinion &lt;/em&gt;&lt;/a&gt; . [online] DomainIncite. [Accessed 14 Mar. 2018].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref3" style="text-align: justify;"&gt;
&lt;p&gt;3&lt;a name="_ftn3"&gt;&lt;/a&gt;. Nro.net. (2018). &lt;a href="https://www.nro.net/about-the-nro/rir-accountability/"&gt;&lt;em&gt; RIR Accountability Questions and Answers | The Number Resource Organization &lt;/em&gt; &lt;/a&gt;. [online]		[Accessed 11 			Mar. 2018].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref4" style="text-align: justify;"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; 4. &lt;a class="external-link" href="https://www.afrinic.net/images/AFRINIC_Auditors_Report_2013.pdf"&gt;African Network Information Centre - Annual Report&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref5" style="text-align: justify;"&gt;
&lt;p&gt;5.&lt;a name="_ftn5"&gt;&lt;/a&gt; &lt;a class="external-link" href="https://www.ripe.net/participate/meetings/gm/meetings/may-2017/supporting-documents/ripe-ncc-annual-report-2016.pdf"&gt;RIPE Network Coordination Centre Annual Report 2016&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref6" style="text-align: justify;"&gt;
&lt;p&gt;6.&lt;a name="_ftn6"&gt;&lt;/a&gt; Murphy, K. (2016). 			&lt;a href="http://domainincite.com/21309-dropcatch-spends-millions-to-buy-five-hundred-more-registrars"&gt; DropCatch spends millions to buy FIVE HUNDRED more registrars | 				Domain Incite - Domain Name Industry News, Analysis &amp;amp; 				Opinion &lt;/a&gt; . [online] DomainIncite.[Accessed 13 Mar. 2018].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref7" style="text-align: justify;"&gt;
&lt;p&gt;7.&lt;a name="_ftn7"&gt;&lt;/a&gt; Id&lt;/p&gt;
&lt;/div&gt;
&lt;div id="_ftnref8" style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;8.&lt;a name="_ftn8"&gt;&lt;/a&gt; Detailed list is available on request&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016'&gt;https://cis-india.org/internet-governance/blog/analysis-of-icann-financials-from-2012-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sunil Abraham, Arjun Venkatraman and Akriti Bopanna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-04-27T10:01:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking">
    <title>Analysis of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;In this blog post, Pranesh Prakash briefly analyses the DIT's response to an RTI request on website blocking alongside the most recent edition of Google's Transparency Report, and what it tells us about the online censorship regime in India.&lt;/b&gt;
        
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;What the DIT's Response Tells Us, and What It Doesn't&lt;/h2&gt;
&lt;p&gt;We at the Centre for Internet and Society had sent in a right to information request to the Department of Information Technology (DIT) asking for more information about website blocking in India. The &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="internal-link" title="Text of DIT's Response to Second RTI on Website Blocking"&gt;response we got from the DIT&lt;/a&gt; was illuminating in many ways. The following are the noteworthy points, in brief:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Six government officials, and one politician have so far made requests for 'disabling access' to certain online content under s.69A of the Information Technology (IT) Act.&lt;/li&gt;

    &lt;li&gt;68 individual items have been requested to be blocked, those being 64 websites (domain-level blocking), 1 sub-domain, and 3 specific web pages. Seemingly, none of these requests have been accepted.&lt;/li&gt;

    &lt;li&gt;The data provided by the government seemingly conflicts with the data released by the likes of Google (via its Transparency Report).&lt;/li&gt;

    &lt;li&gt;India's law enforcement agencies are circumventing the IT Act, the Indian Penal Code (IPC), and ultimately the Constitution, by not following proper procedure for removal of online content.&lt;/li&gt;

    &lt;li&gt;Either the DIT is not providing us all the relevant information on blocking, or is not following the law.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="conflicting-data-on-censorship-requests"&gt;Conflicting Data on Censorship Requests&lt;/h2&gt;
&lt;p&gt;The latest &lt;a href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google Transparency Report&lt;/a&gt;, released on October 25, 2011, shows that there were 68 written requests (imaginably taking the form of forceful requests/orders) from Indian law enforcement agencies for removal of 358 items from Google's various. If you take the figures since January 2010, it adds up to over 765.&lt;/p&gt;
&lt;p&gt;However, the official government statistics show only eight separate requests having been made to the&amp;nbsp; DIT (which, under the IT Act, is the only authority that can order the blocking of online content), adding up to a total of 64 websites (domain-level), 1 sub-domain, and 3 specific web pages. Of these only 3 are for Google's services (2 for Blogger, and 1 for YouTube).&lt;/p&gt;
&lt;p&gt;If classified according to presumable reason for seeking of the block, that would be 61 domains hosting adult content; 1 domain (tamil.net.in), 1 sub-domain (ulaginazhagiyamuthalpenn.blogspot.com), and 2 specific pages (video of a speech by Bal Thackeray on YouTube and Wikipedia page for Sukhbir Singh Badal) for political content; 1 for religious content (a blog post titled "Insults against Islam" in Malay); and 1 domain hosting online gambling (betfair.com). It is unclear for why one of the requests was made (topix.net).&lt;sup&gt;&lt;a id="fnref1" class="footnoteRef" name="fnref1" href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="content-removal-vs.-content-blocking"&gt;Content Removal vs. Content Blocking&lt;/h2&gt;
&lt;p&gt;Section 69A of the IT Act provides the Central Government the power to "direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource". The only person through whom this power can be exercised is the 'Designated Officer' (currently Dr. Gulshan Rai of the DIT), who in turn has to follow the procedure laid down in the rules drafted under s.69A ("Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009", the 'Blocking Rules').&lt;/p&gt;
&lt;p&gt;Because of this, we see everyone from the Secretary of the Public Law and Order Department of Tamil Nadu to the Joint Commissioner of Police of Mumbai and the State President of the Bharatiya Janata Minority Morcha approaching the Designated Officer for blocking of websites.&lt;/p&gt;
&lt;p&gt;However, as the data from Google shows, there are many times more requests being sent to remove content. The only explanation for this is that an order to 'block for access... or cause to be blocked for access by the public' is taken to be different from an order for removal of content. Nothing in the IT Act, nor in the Blocking Rules actually address this issue.&lt;sup&gt;&lt;a id="fnref2" class="footnoteRef" name="fnref2" href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, there is a possibility that the forcible removal of content is treated separately from blocking of content. That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits.&lt;sup&gt;&lt;a id="fnref3" class="footnoteRef" name="fnref3" href="#fn3"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="role-of-the-indian-penal-code-and-code-of-criminal-procedure"&gt;Role of the Indian Penal Code and Code of Criminal Procedure&lt;/h2&gt;
&lt;p&gt;There are existing provisions in the Indian Penal Code that provide the government the power to censor book, pamphlets, and other material on varied grounds, including obscenity, causing of enmity between communities, etc. The police is provided powers to enforce such governmental orders. Section 95 of the Code of Criminal Procedure allows the State Government to declare (through an official notification) certain publications which seem to violate the Indian Penal Code as 'forfeited to the Government' and to issue search warrants for the same. After this the police can enforce that notification.&lt;/p&gt;
&lt;p&gt;It is clear that this is not the case for any of the content removal requests that were sent to Google.&lt;/p&gt;
&lt;h2 id="police-are-defeating-the-constitution-and-the-it-act"&gt;Police Are Defeating the Constitution and the IT Act&lt;/h2&gt;
&lt;p&gt;Therefore, it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.&lt;/p&gt;
&lt;p&gt;However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.&lt;/p&gt;
&lt;p&gt;This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/p&gt;
&lt;h2 id="dit-either-evasive-or-not-following-rules"&gt;DIT Either Evasive or Not Following Rules&lt;/h2&gt;
&lt;p&gt;The DIT did not provide answers on:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Whether any block ordered by the DIT has ever been revoked&lt;/li&gt;

    &lt;li&gt;On what basis DIT decides which intermediary (web host, ISP, etc.) to send the order of blocking to&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It also provided the minutes for only one meeting&lt;sup&gt;&lt;a id="fnref4" class="footnoteRef" name="fnref4" href="#fn4"&gt;4&lt;/a&gt;&lt;/sup&gt; of the committee that decides whether to carry out a block, when we had requested for minutes of all the meetings it has ever held. That committee (the Committee for Examination of Requests, constituted under Rule 8(4) of the Blocking Rules) has to consider every single item in every single request forwarded to the Designated Officer, and 68 items were sent to the Designated Officer in 6 requests. Quite clearly something doesn't add up. Either the Committee is not following the Blocking Rules or the DIT is not providing a full reply under the RTI Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
      &lt;li id="fn1"&gt;
&lt;p&gt;A request was made to block http://www.topix.net, by the 'Commmissioner, Maharashtra State, Colaba, Mumbai—400001', presumably the Commissioner of State Intelligence Department of Maharashtra, whose office is located in Colaba. &lt;a title="Jump back to footnote 1" class="footnoteBackLink" href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn2"&gt;
&lt;p&gt;However, the Blocking Rules require the person or the hosting intermediary being contacted for a response. This provides the person/intermediary the opportunity to remove the content voluntarily or to oppose the request for blocking.&lt;/p&gt;
&lt;p&gt;"Rule 8. Examination of request: (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary." &lt;a title="Jump back to footnote 2" class="footnoteBackLink" href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn3"&gt;
&lt;p&gt;While it is possible to imagine that the Indian Penal Code and the Code of Criminal Procedure lay down limits, it is clear from the Google Transparency Report that the requests from removal are not coming based only on court orders, but from the executive and the police. The police have no powers under the IPC or the CrPC to request removal of content without either a public notification issued by the State Government or a court order. &lt;a title="Jump back to footnote 3" class="footnoteBackLink" href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn4"&gt;
&lt;p&gt;The minutes of the meeting held on August 24, 2010, on the request for blocking of www.betfair.com were sent as 'Annexure III' of the DIT response.&amp;nbsp; This request was not granted.&amp;nbsp; &lt;a title="Jump back to footnote 4" class="footnoteBackLink" href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-12-02T09:26:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles">
    <title>Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles</link>
    <description>
        &lt;b&gt;Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “Aadhaar Act”) was introduced in the Lok Sabha (lower house of the Parliament) by Minister of Finance, Mr. Arun Jaitley, in on March 3, 2016, and was passed by the Lok Sabha on March 11, 2016. It was sent back by the Rajya Sabha with suggestions but the Lok Sabha rejected those suggestions, which means that the Act is now deemed to have been passed by both houses as it was originally introduced as a Money Bill. Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/p&gt;
&lt;p&gt;In order for the reader to better understand the frame of reference on which we shall analyse the Aadhaar Act, the nine principles contained in the report of the Group of Experts on Privacy are explained in brief below:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Principle 1: Notice&lt;/strong&gt; - Does the legislation/regulation require that entities governed by the Act give simple to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 2: Choice and Consent&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act provide the individual with the option to opt in/opt out of providing their personal information.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 3: Collection Limitation&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act collect personal information from individuals only as is necessary for a purpose identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 4: Purpose Limitation&lt;/strong&gt; - Does the legislation/regulation require that personal data collected and processed by entities governed by the Act be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 5: Access and Correction&lt;/strong&gt; - Does the legislation/regulation allow individuals: access to personal information about them held by an entity governed by the Act; the ability to seek correction, amendments, or deletion of such information where it is inaccurate, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 6: Disclosure&lt;/strong&gt; - Does the legislation ensure that information is only disclosed to third parties after notice and informed consent is obtained. Is disclosure allowed for law enforcement purposes done in accordance with laws in force.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 7: Security&lt;/strong&gt; - Does the legislation/regulation ensure that information that is collected and processed under that Act, is done so in a manner that protects against loss, unauthorized access, destruction, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 8: Openness&lt;/strong&gt; - Does the legislation/regulation require that any entity processing data take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data that is collected and processed and is this information made available to all individuals in an intelligible form, using clear and plain language?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 9: Accountability&lt;/strong&gt; - Does the legislation/regulation provide for measures that ensure compliance of the privacy principles? This would include measures such as mechanisms to implement privacy policies; including tools, training, and education; and external and internal audits.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Analysis of the Aadhaar Act&lt;/h2&gt;
&lt;p&gt;The Aadhaar Act has been brought about to give legislative backing to the most ambitious individual identity programme in the world which aims to provide a unique identity number to the entire population of India. The rationale behind this scheme is to correctly identify the beneficiaries of government schemes and subsidies so that leakages in government subsidies may be reduced. In furtherance of this rationale the Aadhaar Act gives the Unique Identification Authority of India (“UIDAI”) the power to enroll individuals by collecting their demographic and biometric information and issuing an Aadhaar number to them. Below is an analysis of the Act based on the privacy principles enumerated I the A.P. Shah Committee Report.&lt;/p&gt;
&lt;h3&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Collection of Biometric and Demographic Information:&lt;/strong&gt; The Aadhaar Act entitles every “resident”
&lt;strong&gt;[1]&lt;/strong&gt; to obtain an Aadhaar number by submitting his/her biometric (photograph, finger print, Iris scan) and demographic information (name, date of birth, address &lt;strong&gt;[2]&lt;/strong&gt;) &lt;strong&gt;[3]&lt;/strong&gt;. It must be noted that the Act leaves scope for further information to be included in the collection process if so specified by regulations. It must be noted that although the Act specifically provides what information can be collected, it does not specifically prohibit the collection of further information. This becomes relevant because it makes it possible for enrolling agencies to collect extra information relating to individuals without any legal implications of such act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Authentication Records:&lt;/strong&gt; The UIDAI is mandated to maintain authentication records for a period which is yet to be specified (and shall be specified in the regulations) but it cannot collect or keep any information regarding the purpose for which the authentication request was made &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unauthorized Collection:&lt;/strong&gt; Any person who in not authorized to collect information under the Act, and pretends that he is authorized to do so, shall be punishable with imprisonment for a term which may extend to three years or with a fine which may extend to Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[5]&lt;/strong&gt;. It must be noted that the section, as it is currently worded seems to criminalize the act of impersonation of authorized individuals and the actual collection of information is not required to complete this offence. It is not clear if this section will apply if a person who is authorized to collect information under the Act in general, collects some information that he/she is not authorized to collect.&lt;/p&gt;
&lt;h3&gt;Notice&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Notice during Collection:&lt;/strong&gt; The Aadhaar Act requires that the agencies enrolling people for distribution of Aadhaar numbers should give people notice regarding: (a) the manner in which the information shall be used; (b) the nature of recipients with whom the information is intended to be shared during authentication; and (c) the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made &lt;strong&gt;[6]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[7]&lt;/strong&gt;. It must be noted that the Act leaves the manner of giving such notice in the realm of regulations and does not specify how this notice is to be provided, which leaves important specifics to the realm of the executive.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Notice during Authentication:&lt;/strong&gt; The Aadhaar Act requires that authenticating agencies shall give information to the individuals whose information is to be authenticated regarding (a) the nature of information that may be shared upon authentication; (b) the uses to which the information received during authentication may be put by the requesting entity; and (c) alternatives to submission of identity information to the requesting entity &lt;strong&gt;[8]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[9]&lt;/strong&gt;. Just as in the case of notice during collection, the manner in which the notice is required to be given is left to regulations leaving an unclear picture as to how comprehensive, accessible, and frequent this notice must be.&lt;/p&gt;
&lt;h3&gt;Access and Correction&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Updating Information:&lt;/strong&gt; The Aadhaar Act give the UIDAI the power to require residents to update their demographic and biometric information from time to time so as to maintain its accuracy &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Information:&lt;/strong&gt; The Aadhaar Act provides that Aadhaar number holders may request the UIDAI to provide access to their identity information expect their core biometric information &lt;strong&gt;[11]&lt;/strong&gt;. It is not clear why access to the core biometric information &lt;strong&gt;[12]&lt;/strong&gt; is not provided to an individual. Further, since section 6 seems to place the responsibility of updation and accuracy of biometric information on the individual, it is not clear how a person is supposed to know that the biometric information contained in the database has changed if he/she does not have access to the same. It may also be noted that the Aadhaar Act provides only for a request to the UIDAI for access to the information and does not make access to the information a right of the individual, this would mean that it would be entirely upon the discretion of the UIDAI to refuse to grant access to the information once a request has been made.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alteration of Information:&lt;/strong&gt; The Aadhaar Act gives individuals the right to request the UIDAI to alter their demographic if the same is incorrect or has changed and biometric information if it is lost or has changed. Upon receipt of such a request, if the UIDAI is satisfied, then it may make the necessary alteration and inform the individual accordingly. The Act also provides that no identity information in the Central database shall be altered except as provided in the regulations &lt;strong&gt;[13]&lt;/strong&gt;. This section provides for alteration of identity information but only in the circumstances given in the section, for example demographic information cannot be changed if it has been lost, similarly biometric information cannot be changed if it is inaccurate. Further, the section does not give a right to the individual to get the information altered but only entitles him/her to request the UIDAI to make a change and the final decision is left to the “satisfaction” of the UIDAI.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Authentication Record:&lt;/strong&gt; Every individual is given the right to obtain his/her authentication record in a manner to be specified by regulations. [14]&lt;/p&gt;
&lt;h3&gt;Disclosure&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Sharing during Authentication:&lt;/strong&gt; The UIDAI is entitled to reply to any authentication query with a positive, negative or any other response which may be appropriate and may share identity information except core biometric information with the requesting entity &lt;strong&gt;[15]&lt;/strong&gt;. The language in this provision is ambiguous and it is unclear what 'identity information' may be shared and why it would be necessary to share such information as Aadhaar is meant to be  only a means of authentication so as to remove duplication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Disclosure during Maintenance of CIDR:&lt;/strong&gt; The UIDAI has been given the power to appoint any one or more entities to establish and maintain the Central Identities Data Repository (CIDR) &lt;strong&gt;[16]&lt;/strong&gt;. If a private entity is involved in the maintenance and establishment of the CIDR it can be presumed that there is the possibilty that they would, to some degree, have access to the information stored in the CIDR, yet there are no clear standards in the Act regarding this potential access. And the process for appointing such entities. The fact that the UIDAI has been given the freedom to appoint an outside entity to maintain a sensitive asset such as the CIDR raises security concerns.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Restriction on Sharing Information:&lt;/strong&gt; The Aadhaar Act creates a blanket prohibition on the usage of core biometric information for any purpose other than generation of Aadhaar numbers and also prohibits its sharing for any reason whatsoever &lt;strong&gt;[17]&lt;/strong&gt;. Other identity information is allowed to be shared in the manner specified under the Act or as may be specified in the regulations &lt;strong&gt;[18]&lt;/strong&gt;. The Act further provides that the requesting entities shall not disclose the identity information except with the prior consent of the individual to whom the information relates &lt;strong&gt;[19]&lt;/strong&gt;. There is also a prohibition on publicly displaying Aadhaar number or core biometric information except as specified by regulations &lt;strong&gt;[20]&lt;/strong&gt;. Officers or the UIDAI or the employees of the agencies employed to maintain the CIDR are prohibited from revealing the information stored in the CIDR or authentication record to anyone &lt;strong&gt;[21]&lt;/strong&gt;. It is not clear why an exception has been carved out and what circumstances would require publicly displaying Aadhaar numbers and core biometric information, especially since the reasons for which such important information may be displayed has been left up to regulations which have relatively less oversight. The section also provides the requesting entities with an option to further disclose information if they take consent of the individuals. This may lead to a situation where a requesting entity, perhaps the of an essential service, may take the consent of the individual to disclose his/her information in a standard form contract, without the option of saying no to such a request. It may lead to situations where the option is between giving consent to disclosure or denial or service altogether. For this reason it is necessary that there should be an opt in and opt out provision wherever a requesting entity has the power to ask for disclosure of information, so that people are not coerced into giving consent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Disclosure in Specific Cases:&lt;/strong&gt; The prohibition on disclosure of information (except for core biometric information) does not apply in case of any disclosure made pursuant to an order of a court not below that of a District Judge &lt;strong&gt;[22]&lt;/strong&gt;. There is another exception to the prohibition on disclosure of information (including core biometric information) in the interest of national security if so directed by an officer not below the rank of a Joint Secretary to the Government of India specially authorised in this behalf by an order of the Central Government. Before any such direction can take effect, it will be reviewed by an oversight committee consisting of the Cabinet Secretary and the Secretaries to the Government of India in the Department of Legal Affairs and the Department of Electronics and Information Technology. Any such direction shall be valid for a period of three months and may be extended by another three months after the review by the Oversight Committee &lt;strong&gt;[23]&lt;/strong&gt;. Although this provision has been criticized, and rightly so, for the lack of accountability since the entire process is being handled within the executive and there is no independent oversight, however it must be mentioned that the level of oversight provided here is similar to that provided to interception requests, which involve a much graver if not the same level of invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Disclosure:&lt;/strong&gt; Any person who intentionally and in an unauthorized manner discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication shall be punishable with imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[24]&lt;/strong&gt;. Further any person who intentionally and in an unathorised manner, accesses information in the CIDR &lt;strong&gt;[25]&lt;/strong&gt;, downloads, copies or extracts any data from the CIDR &lt;strong&gt;[26]&lt;/strong&gt;, or reveals or shares or distributes any identity information, shall be punishable with imprisonment of upto 3 years and a fine of not less than Rs. 10,00,000/-.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Consent for Authentication:&lt;/strong&gt; A requesting entity has to take the consent of the individual before collecting his/her identity information for the purposes of authentication and also has to inform the individual of the alternatives to submission of the identity information &lt;strong&gt;[27]&lt;/strong&gt;. Although this provision requires entities to take consent from the individuals before collecting information for authentication, however how useful this requirement of consent would be, still remains to be seen. There may be instances where a requesting entity may take the consent of the individual in a standard form contract, without the individual realizing what he/she is consenting to.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The Aadhaar Act provides no requirement or standard for the form of consent that must be taken during enrollment. This is significant as it is the point at which individuals are providing raw biometric material and during previous enrollment, has been a point of weakness as the consent taken is an enabler to function creep as it allows the UIDAI to share information with engaged in delivery of welfare services &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Purpose&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Use of Information:&lt;/strong&gt; The authenticating entities are allowed to use the identity information only for the purpose of submission to the CIDR for authentication &lt;strong&gt;[29]&lt;/strong&gt;. Further, the Act specifies that identity information available with a requesting entity shall not be used for any purpose other than that specified to the individual at the time of submitting the information for authentication &lt;strong&gt;[30]&lt;/strong&gt;. The Act also provides that any authentication entity which uses the information for any purpose not already specified will be liable to punishment of imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Security&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Security and Confidentiality of Information:&lt;/strong&gt; It is the responsibility of the UIDAI to ensure the security and confidentiality of the identity and authentication information and it is required to take all necessary action to ensure that the information in the CIDR is protected against unauthorized access, use or disclosure and against accidental or intentional destruction, loss or damage &lt;strong&gt;[32]&lt;/strong&gt;. The UIDAI is required to adopt and implement appropriate technical and organisational security measures and also ensure that its contractors do the same &lt;strong&gt;[33]&lt;/strong&gt;. It is also required to ensure that the agreements entered into with its contractors impose the same conditions as are imposed on the UIDAI under the Act and that they shall act only upon the instructions of the UIDAI &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Biometric Information to be Electronic Record:&lt;/strong&gt; The biometric information collected by the UIDAI has been deemed to be an “electronic record” as well as “sensitive personal data or information”, which would mean that in addition to the provisions of the Aadhaar Act, the provisions contained in the Information Technology Act, 2000 will also apply to such information &lt;strong&gt;[35]&lt;/strong&gt;. It must be noted that while the Act lays down the principle that UIDAI is required to ensure the saecurity of the information, it does not  lay down any guidelines as to the minimum security standards to be implemented by the Authority. However, through this section the legislature has linked the security standards contained in the IT Act to the information contained in this Act. While this is a clean way of dealing with the issue, some people may argue that the extremely sensitive nature of the information contained in the CIDR requires the standards for security to be much stricter than those provided in the IT Act. However, a perusal of Rule 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 shows that the Rules themselves provide that the standard of security must be commensurate with the information assets being protected. It would thus seem that the Act provides enough room to protect such important information, but perhaps leaves too much room for interpretation for such an important issue.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Unauthorised Access:&lt;/strong&gt; Apart from the security provisions included in the legislation, the Aadhaar Act also provides for punishment of imprisonment of upto 3 years and a fine which shall not be less than Rs. 10,00,000/-, in case of the following offences:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;introduction of any virus or other computer contaminant in the CIDR &lt;strong&gt;[36]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;causing damage to the data in the CIDR &lt;strong&gt;[37]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;disruption of access to the CIDR &lt;strong&gt;[38]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;denial of access to any person who is authorised to access the CIDR &lt;strong&gt;[39]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;destruction, deletion or alteration of any information stored in any removable storage media or in the CIDR or diminishing its value or utility or affecting it injuriously by any means &lt;strong&gt;[40]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;stealing, concealing, destroying or altering any computer source code used by the Authority with an intention to cause damage &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Further, unauthorized usage or tampering with the data in the CIDR or in any removable storage medium with the intent of modifying information relating to Aadhaar number holder or discovering any information thereof, is also punishable with imprisonment for a term which may extend to 3 years and also a fine which may extend to Rs. 10,000/- &lt;strong&gt;[42]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Accountability&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspections and Audits:&lt;/strong&gt; One of the functions listed in the powers and functions of the UIDAI is the power to call for information and records, conduct inspections, inquiries and audit of the operations of the CIDR, Registrars, enrolling agencies and other agencies appointed under the Aadhaar Act &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Grievance Redressal:&lt;/strong&gt; Another function of the UIDAI is to set up facilitation centres and grievance redressal mechanisms for redressal of grievances of individuals, Registrars, enrolling agencies and other service providers &lt;strong&gt;[44]&lt;/strong&gt;. It must be said here that considering the importance that the government has given to and intends to give to Aadhaar in the future, an essential task such as grievance redressal should not be left entirely to the discretion of the UIDAI and some grievance redressal mechanism should be incorporated into the Act itself.&lt;/p&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;There does not seem to be any provision in the Aadhaar Act which requires the UIDAI to make its privacy policies and procedure available to the public in general even though the UIDAI has the responsibility to maintain the security and confidentiality of the information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; A resident is defined as any person who has resided in India for a period of atleasy 182 days in the previous 12 months.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; It has been specified that demographic information will not include race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Section 3(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Section 32(1) and 32(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Section 36 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Section 3(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Section 8(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Section 6 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 28, &lt;em&gt;proviso&lt;/em&gt; of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Core biometric information is defined as fingerprints, iris scan or other biological attributes which may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; Section 31 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Section 32(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Section 8(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Section 10 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Section 29(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Section 29(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; Section 29(3)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Section 29(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Section 28(5) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; Section 33(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; Section 33(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Section 38(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Section 38(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Section 8(2)(a) and (c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; For example, see: &lt;a href="http://www.karnataka.gov.in/aadhaar/Downloads/Application%20form%20-%20English.pdf"&gt;http://www.karnataka.gov.in/aadhaar/Downloads    /Application%20form%20-%20English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; Section 8(2)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; Section 29(3)(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; Section 28(1), (2) and (3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; Section 28(4)(a) and (b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; Section 28(4)(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; Section 30 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; Section 38(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; Section 38(d) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; Section 38(e) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Section 38(f) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; Section 38(h) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; Section 38(i) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; Section 39 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; Section 23(2)(l) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; Section 23(2)(s) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles'&gt;https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-17T19:43:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism">
    <title>Analysing Latest List of Blocked Sites (Communalism &amp; Rioting Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism</link>
    <description>
        &lt;b&gt;Pranesh Prakash does preliminary analysis on a leaked list of the websites blocked from August 18, 2012 till August 21, 2012 by the Indian government.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Note&lt;/b&gt;: This post will be updated as more analysis is done. Last update: 23:59 on August 22, 2012. This is being shared under a &lt;a href="http://creativecommons.org/licenses/by-nc/3.0/"&gt;Creative Commons Attribution-NonCommercial licence&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;img src="https://docs.google.com/spreadsheet/oimg?key=0AqefbzxbW_b_dE5rTG9XbkRab0cxWFdoOEgyN01YcWc&amp;amp;oid=1&amp;amp;zx=dskyfic7thzd" /&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;How many items have been blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There   are a total of 309 specific items (those being URLs, Twitter accounts,   img tags, blog posts, blogs, and a handful of websites) that have been   blocked. This number is meaningless at one level, given that it doesn't   differentiate between the blocking of an entire website (with dozens  or  hundreds of web pages) from the blocking of a single webpage.  However,  given that very few websites have been blocked at the  domain-level, that  number is still reasonably useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please   also note, we currently only have information related to what telecom   companies and Internet Service Providers (ISPs) were asked to block  till  August 21, 2012. We do not have information on what individual web   services have been asked to remove. That might take the total count  much  higher.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why have these been blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As far   as I could determine, all of the blocked items have content (mostly   videos and images have been targeted, but also some writings) that are related to communal issues and rioting. (Please note: I am not calling the content itself "communal" or "incitement to rioting", just that the   content relates to communal issues and rioting.) This has been done in the context of the recent riots in Assam, Mumbai, UP, and the mass   movement of people from Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There   were reports of parody Twitter accounts having been blocked.  Preliminary  analysis on the basis of available data show that parody  Twitter  accounts and satire sites have &lt;i&gt;not&lt;/i&gt; been targetted solely  for  being satirical. For instance, very popular parody Twitter  accounts,  such as @DrYumYumSingh are not on any of the four orders  circulated by  the Department of Telecom. (I have no information on  whether such parody  accounts are being taken up directly with Twitter  or not: just that  they aren't being blocked at the ISP-level. Media  reports indicate &lt;a href="http://goo.gl/GI9jP"&gt;six accounts have been taken up with Twitter&lt;/a&gt; for being similar to the Prime Minister's Office's account.)&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Are the blocks legitimate?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The   goodness of the government's intentions seem, quite clearly in my   estimation, to be unquestionable. Yet, even with the best intentions,   there might be procedural illegalities and over-censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There   are circumstances in which freedom of speech and expression may   legitimately be limited. The circumstances that existed in Bangalore   could justifiably result in legitimate limitations on freedom of speech.   For instance, I believe that temporary curbs — such as temporarily   limiting SMSes &amp;amp; MMSes to a maximum of five each fifteen minutes for   a period of two days — would have been helpful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However   it is unclear whether the government has exercised its powers   responsibly in this circumstance. The blocking of many of the items on   that list are legally questionable and morally indefensible, even while a   some of the items ought, in my estimation, to be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the   government has blocked these sites under s.69A of the Information   Technology Act ("Power to Issue Directions for Blocking for Public   Access of Any Information through any Computer Resource"), the persons   and intermediaries hosting the content should have been notified   provided 48 hours to respond (under Rule 8 of the Information Technology   (Procedure and Safeguards for Blocking for Access of Information by   Public) Rules 2009). Even if the emergency provision (Rule 9) was used,   the block issued on August 18, 2012, should have been introduced before   the "Committee for Examination of Request" by August 20, 2012 (i.e.,   within 48 hours), and that committee should have notified the persons   and intermediaries hosting the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly,   even though many of the items on that list are repugnant and do  deserve  (in my opinion) to be removed, ordering ISPs to block them is  largely  ineffectual. The people and companies hosting the material  should have  been asked to remove it, instead of ordering Internet  service providers  (ISPs) to block them. All larger sites have clear  content removal  policies, and encouraging communal tensions and hate  speech generally  wouldn't be tolerated. That this can be done without  resort to the  dreadful Intermediary Guidelines Rules (which were passed  last year)  shows that those Rules are unnecessary. It is our belief  that &lt;a href="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"&gt;those Rules are also unconstitutional&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Are there any egregious mistakes?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Yes, there are numerous such examples of egregious mistakes.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Most importantly, some even &lt;b&gt;people and posts      debunking rumours have been blocked&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some   of the Twitter accounts are of prominent      people who write for the   mainstream media, and who have written similar      content offline. If   their online content is being complained about, their      offline   content should be complained about too.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Quite  a  number of the links include articles      published and reports   broadcast in the mainstream media (including a Times      Now report, a   Telegraph picture gallery, etc.), and in print, making the      blocks   suspect. Only the online content seems to have been targeted for        censorship.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;There are numerous mistakes and inconsistencies that make blocking pointless and ineffectual.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Some of the items are not even web addresses      (e.g., a few HTML img tags were included).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some of the items they have tried to block do not      even exist (e.g., one of the Wikipedia URLs).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An entire domain was blocked on Sunday, and a      single post on that domain was blocked on Monday.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For   some Facebook pages, the secure version      (https://facebook.com/...)   is listed, for others the non-secure version        (http://facebook.com/...) is listed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For   some YouTube videos, the 'base' URL of      YouTube videos is blocked,   but for other the URL with various parameters      (like the   "&amp;amp;related=" parameter) is blocked. That means that      even   nominally 'blocked' videos will be freely accessible.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;All in all, it is clear that the list was not compiled with sufficient care.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite   a clear warning by the DIT that "above URLs only" should be blocked,   and not "the main websites like www.facebook.com, www.youtube.com,   www.twitter.com, etc.", it has been seen that some ISPs (like Airtel) &lt;a href="http://www.labnol.org/india/india-blocks-youtube/25028/"&gt;have gone overboard in their blocking&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why haven't you put up the whole list?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given   the sensitivity of the issue, we felt it would be premature to share  the  whole list. However, we strongly believe that transparency should  be an  integral part of all censorship. Hence, this analysis is an  attempt to  provide some much-needed transparency. We intend to make the  entire list  public soon, though. (Given how porous such information  is, it is  likely that someone else will procure the list, and release  it sooner  than us.)&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why can I still access many items that are supposed to be blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One   must keep in mind that fresh orders have been issued on a day-by-day   basis, that there are numerous mistakes in the list making it difficult   to apply (some of these mistakes have been mentioned above), and the   fact that that this order has to be implemented by hundreds of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Your   ISP probably has not have got around to enforcing the blocks yet. At the   time of this writing, most ISPs don't seem to be blocking yet. This   analysis is based on the orders sent around to ISPs, and not on the   basis of actual testing of how many of these have actually been blocked   by Airtel, BSNL, Tata, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally,   if you are using Twitter through a client (on your desktop, mobile,   etc.) instead of the web interface, you will not notice any of the   Twitter-related blocks.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So you are fine with censorship?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;No. I   believe that in some cases, the government has the legal authority to   censor. Yet, exercising that legal authority is usually not productive,   and in fact there are other, better ways of limiting the harms caused  by  speech and information than censorship. Limiting speech might even   prove harmful in situations like these, if it ends up restricting   people's ability to debunk false rumours. In a separate blog post (to be   put up soon), I am examining how all of the government's responses  have  been flawed both legally and from the perspective of achieving the   desired end.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So what should the government have done?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given   that the majority of the information it is targeting is on Facebook,   Youtube, and Twitter, the government could have chosen to fight &lt;i&gt;alongside&lt;/i&gt; those services to get content removed expeditiously, rather than fight &lt;i&gt;against&lt;/i&gt; them. (There are &lt;a href="http://www.firstpost.com/videos/govt-to-use-social-media-to-prevent-misuse-of-technology-sibal-426231.html"&gt;some indications&lt;/a&gt; that the government might be working with these services, but it certainly isn't doing enough.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For   instance, it could have asked all of them to expedite their complaints   mechanism for a few days, by ensuring that the complaints mechanism is   run 24x7 and that they respond quickly to any complaint submitted about   communal incitement, spreading of panic, etc. This does not need the   passing of an order under any law, but requires good public relations   skills and a desire not to treat internet services as enemies. The   government could have encouraged regular users to flag false rumours and   hate speech on these sites. On such occasions, social networking sites   should step up and provide all lawful assistance that the government  may  require. They should also be more communicative in terms of the  help  they are providing to the government to curtail panic-inducing  rumours  and hate speech. (Such measures should largely be reactive, not   proactive, to ensure legitimate speech doesn't get curtailed.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The   best antidote for the rumours that spread far and wide and caused a mass   movement of people from Bangalore to the North-Eastern states would   have been clear debunking of those rumours. Mass outreach to people in   the North-East (very often the worried parents) and in Bangalore using   SMSes and social media, debunking the very specific allegations and   rumours that were floating around, would have been welcome. However,   almost no government officials actually used social media platforms to   reach out to people to debunk false information and reassure them. Even a   Canadian interning in our organization got a reassuring SMS from the   Canadian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is indeed a pity that the government &lt;a href="https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies"&gt;notified a social media engagement policy today&lt;/a&gt;, when the need for it was so very apparent all of the past week.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;And what of all this talk of cybersecurity failure and cyber-wars?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Cybersecurity   is indeed a cause of concern for India, but only charlatans and the   ignorant would make any connection between India's cybersecurity and   recent events. The role of Pakistan deserves a few words. Not many   Pakistani websites / webpages have been blocked by the Indian   government. Two of the Pakistani webpages that have been blocked are   actually pages that debunk the fake images that have been doing the   rounds in Pakistan for at least the past month. Even Indian websites &lt;a href="http://kafila.org"&gt;like Kafila&lt;/a&gt; have noted these fake images long ago, and &lt;a href="http://kafila.org/2012/08/05/national-contestation-not-religion-responsible-for-the-plight-of-myanmars-rohingyas-ayesha-siddiqa/"&gt;Ayesha Siddiqa wrote about this on August 5, 2012&lt;/a&gt;, and &lt;a href="http://kafila.org/2012/08/13/how-to-start-a-riot-out-of-facebook-yousuf-saeed/"&gt;Yousuf Saeed wrote about it on August 13, 2012&lt;/a&gt;.   Even while material that may have been uploaded from Pakistan, it  seems  highly unlikely they were targeted at an Indian audience, rather  than a  Pakistani or global one.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Domain&lt;/th&gt;&lt;th&gt;Total Number of Entries&lt;/th&gt;&lt;th&gt;Tuesday, August 21, 2012&lt;/th&gt;&lt;th&gt;Monday, August 20, 2012&lt;/th&gt;&lt;th&gt;Sunday, August 19, 2012&lt;/th&gt;&lt;th&gt;Saturday, August 18, 2012&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ABC.net.au&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AlJazeera.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AllVoices.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;WN.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;AtjehCyber.net&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BDCBurma.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bhaskar.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blogspot.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blogspot.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;7&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Catholic.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CentreRight.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ColumnPK.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Defence.pk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;EthioMuslimsMedia.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Facebook.com (HTTP)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;75&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;36&lt;/td&gt;
&lt;td style="text-align: right; "&gt;7&lt;/td&gt;
&lt;td style="text-align: right; "&gt;18&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Facebook.com (HTTPS)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;27&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Farazahmed.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;5&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Firstpost.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HaindavaKerelam.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HiddenHarmonies.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;HinduJagruti.org&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hotklix.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HumanRights-Iran.ir&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Intichat.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Irrawady.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IslamabadTimesOnline.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Issuu.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;JafriaNews.com&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;JihadWatch.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;KavkazCenter&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MwmJawan.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;My.Opera.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Njuice.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OnIslam.net&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PakAlertPress.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Plus.Google.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reddit.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rina.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SandeepWeb.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SEAYouthSaySo.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sheikyermami.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;StormFront.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Telegraph.co.uk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheDailyNewsEgypt.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheFaultLines.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ThePetitionSite.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;TheUnity.org&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TimesofIndia.Indiatimes.com    &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TimesOfUmmah.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tribune.com.pk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter.com (HTTP)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter.com (HTTPS)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;11&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter account&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;18&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;16&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TwoCircles.net&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Typepad.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vidiov.info&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wikipedia.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;3&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Wordpress.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;8&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;YouTube.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;85&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;18&lt;/td&gt;
&lt;td style="text-align: right; "&gt;39&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;YouTu.be&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Totals&lt;/th&gt;&lt;th style="text-align: right; "&gt;309&lt;/th&gt;&lt;th style="text-align: right; "&gt;65&lt;/th&gt;&lt;th style="text-align: right; "&gt;88&lt;/th&gt;&lt;th style="text-align: right; "&gt;80&lt;/th&gt;&lt;th style="text-align: right; "&gt;75&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The analysis has been cross-posted/quoted in the following places:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.livemint.com/2012/09/04231942/Need-a-standard-strategy-to-de.html"&gt;LiveMint&lt;/a&gt; (September 4, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-the-hindu-aug-26-v-sridhar-regulating-the-internet-by-fiat" class="external-link"&gt;The Hindu&lt;/a&gt; (August 26, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/08/25/opinion-indias-clumsy-twitter-gamble/"&gt;Wall Street Journal&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/tech2-in-com-som-isps-block-wordpress-domain-across-india" class="external-link"&gt;tech 2&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors" class="external-link"&gt;China Post&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/article3812819.ece"&gt;The Hindu&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.livemint.com/2012/08/23210529/How-ISPs-block-websites-and-wh.html?atype=tp"&gt;LiveMint&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://globalvoicesonline.org/2012/08/24/india-strong-reactions-to-social-media-censorship/"&gt;Global Voices&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/in-reuters-com-david-lalmalsawma-aug-24-2012-indias-social-media-crackdown-reveals-clumsy-govt-machinery" class="external-link"&gt;Reuters&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/PZN75N"&gt;Outlook&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/epic-fail-how-india-compiled-its-banned-list-of-websites-427522.html"&gt;FirstPost.India&lt;/a&gt; (August 23, 2012) &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://ibnlive.in.com/news/haphazard-censorship-leaked-list-of-blocked-sites/284592-11.html"&gt;IBN Live&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://newsclick.in/india/analysing-latest-list-blocked-sites-communalism-rioting-edition"&gt;News Click&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.medianama.com/2012/08/223-india-internet-blocks/"&gt;Medianama&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://kafila.org/2012/08/23/an-analysis-of-the-latest-round-of-internet-censorship-in-india-communalism-and-rioting-edition-pranesh-prakash/"&gt;KAFILA&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites" class="external-link"&gt;CIOL&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism'&gt;https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-06T11:52:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy">
    <title>An Urgent Need for the Right to Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy</link>
    <description>
        &lt;b&gt;Along with a group of individuals and organisations from academia and civil society, we have drafted and are signatories to an open letter addressed to the Union government and urging the same to "urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations." Here we publish the text of the open letter. Please follow the link below to support it by joining the signatories.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a href="http://goo.gl/forms/hw4huFcc4b" target="_blank"&gt;Read and sign the open letter.&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Text of the Open Letter&lt;/h2&gt;
&lt;p&gt;As our everyday lives are conducted increasingly through electronic communications the necessity for privacy protections has also increased. While several countries across the globe have recognised this by furthering the right to privacy of their citizens the Union Government has adopted a regressive attitude towards this core civil liberty. We urge the Union Government to take urgent measures to safeguard the right to privacy in India.&lt;/p&gt;
&lt;p&gt;Our concerns are based on a continuing pattern of disregard for the right to privacy by several governments in the past. This trend has increased as can be plainly viewed from the following developments.&lt;/p&gt;
&lt;p&gt;In 2015, the Attorney General in the case of *K.S. Puttaswamy v. Union of India*, argued before the Hon’ble Supreme Court that there is no right to privacy under the Constitution of India. The Hon'ble Court was persuaded to re-examine the basis of the right to privacy upsetting 45 years of judicial precedent. This has thrown the constitutional right to privacy in doubt and the several judgements that have been given under it. This includes the 1997 PUCL Telephone Tapping judgement as well. We urge the Union Government to take whatever steps are necessary and urge the Supreme Court to hold that a right to privacy exists under the Constitution of India.&lt;/p&gt;
&lt;p&gt;Recently Mr. Arun Jaitley, Minister for Finance introduced the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. This bill was passed on March 11, 2016 in the middle of budget discussion on a short notice as a money bill in the Lok Sabha when only 73 of 545 members were present. Its timing and introduction as a money bill prevents necessary scrutiny given the large privacy risks that arise under it. This version of the bill was never put up for public consultation and is being rushed through without adequate discussion. Even substantively it fails to give accountable privacy safeguards while making Aadhaar mandatory for availing any government subsidy, benefit, or service.&lt;/p&gt;
&lt;p&gt;We urge the Union Government to urgently take steps to uphold the constitutional basis to the right to privacy and fulfil it’s constitutional and international obligations. We encourage the Government to have extensive public discussions on the Aadhaar Bill before notifying it. We further call upon them to constitute a drafting committee with members of civil society to draft a comprehensive statute as suggested by the Justice A.P. Shah Committee Report of 2012.&lt;/p&gt;
&lt;p&gt;Signatories:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Amber Sinha, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Japreet Grewal, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Joshita Pai, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Raman Jit Singh Chima, Access Now&lt;/li&gt;
&lt;li&gt;Sarvjeet Singh, Centre for Communication Governance, National Law University&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Sunil Abraham, the Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, the Centre for Internet and Society&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/an-urgent-need-for-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-17T07:40:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/dna-overview">
    <title>An Overview of DNA Labs in India</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/dna-overview</link>
    <description>
        &lt;b&gt;DNA fingerprinting has become the most precise and technologically advanced method for identifying crimes such as murder, kidnapping, robbery and rape. Police and judicial authorities and in some cases even private parties retain this in their records, writes Shilpa in this blog post.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;At present, India does not have a national law that empowers the government to collect and store DNA profiles of convicts but if the Parliament of India passes the DNA Profiling Bill,[&lt;a href="#1"&gt;1&lt;/a&gt;] &lt;span class="Apple-style-span"&gt;2007, India will soon join countries such as the US and UK in creating a national DNA database.[&lt;a href="#2"&gt;2&lt;/a&gt;] &lt;/span&gt;&lt;span class="Apple-style-span"&gt;Government, CBI and organizations connected with the investigation process argue that data retention is necessary to combat terrorism and crime. According to &lt;/span&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202472346375"&gt;Google Transparency Report&lt;/a&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;[&lt;a href="#3"&gt;3&lt;/a&gt;] for the first half of 2010, India had 1,430 data requests, which made it one of the top nations in generating government inquiries for information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this blog I am citing my interviews with DNA labs, Issues regarding lab samples and data, and DNA Profiling Bill 2007 on lab practices. I am thankful to Anthony Jackson and Dr. Helen Wallace, Executive Director from Gene watch UK who helped me with the questionnaire for survey interview.&lt;/p&gt;
&lt;h3&gt;Interviews with DNA labs&lt;/h3&gt;
&lt;p&gt;I interviewed few government as well as private labs to find out how DNA practices are being carried out. This was to highlight ways in which DNA testing raises privacy concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In public labs, DNA testing is used for the forensic purposes only. These labs are funded by the government whereas private labs deal with legal as well as private purposes. DNA Labs India (DLI), Truth Labs and Bio-Axis DNA Research Centre (P) Limited are some leading private firms involved in DNA testing.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Dr. Madhusudan Reddy Nandineni, who is the Scientist and In-charge of the Centre for DNA Fingerprinting and Diagnostics (CDFD) talked about the working of DNA practise and services provided by their laboratory. “CDFD located in Hyderabad is an autonomous institution supported by the Department of Biotechnology and Ministry of Science. CDFD provides services for DNA testing for establishment of parentage, identification of mutilated remains, establishment of biological relationships for immigration, organ transplantation, property inheritance cases, identification of missing children and child swapping in hospitals, identification of rapists in rape cases, and murderers in murder cases. CDFD assists police personnel, forensic scientists, lawyers and the judiciary”, says Dr. Madhusudan Nandineni over a telephonic interview.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;b&gt;The ND Tiwari Case (Published in the Deccan Herald, 24 July 2011)&lt;/b&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;Eighty-five-year-old leader ND Tiwari   was asked to undergo a DNA test in the paternity suit filed by Rohit   Shekhar who claims to be his biological son. The high court asked the   Centre for DNA Fingerprinting and Diagontics (CDFD) at Hyderabad to   conduct a DNA test on Tiwari.[&lt;a href="#4"&gt;4&lt;/a&gt;] Also   refusing to grant any relief to Tiwari, the court said that  considering  the age of the leader, it is necessary to have a DNA test  so that the  Rohit Shekhar is not left without any remedy if something  happens to  Tiwari. The court said that it is the right of a child to  know his or  her biological father.[&lt;a href="#5"&gt;5&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Dr. BK Mahapatra, Assistant Director, Biology &amp;amp; DNA Finger printing Unit at Central Forensic Science Laboratory, Delhi says “CFSL undertakes cases referred by CBI, Delhi police, judiciary, vigilance department of ministries, public undertakings and state/central government departments.  We don’t contract with private laboratory to do a DNA testing. We accept all type of DNA cases submissions like criminal, known, unknown, etc. CFSL saves DNA samples for re-testing, however, for this we do have a privacy policy followed by National Accreditation Board for Testing and Calibration Laboratories (NABL). It is an autonomous body under the aegis of the Department of Science and Technology, Government of India and is registered under the Societies Act”, he clarified. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In a telephonic interview with Ravi Kiran Reddy, DNA expert, DLI a, tells us about the services provided and security supervise by the laboratory. “DLI provides services for paternity testing, forensic testing, prenatal testing, and genetic testing. DLI contracted with a private laboratory to do DNA testing.  We accept all DNA cases like suicide attempts, cases from Indian Army, etc. DLI saves DNA samples for re-testing for six months and if necessary for life time and a database is also maintained. He further said that to protect and secure database, bar coding is being prepared and therefore, no identity is revealed. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Some of the labs refused to participate in the research exercise like the truth labs. Truth Labs is a private lab that provides legal services directly, without a court or police order.[&lt;a href="#6"&gt;6&lt;/a&gt;] Another private laboratory which provides DNA testing is Bio-Axis DNA Research Centre. It also provide various DNA Identification services for private purposes, legal purposes, peace of mind, confidential purposes, immigration purposes, crime investigation and human identification purposes.[&lt;a href="#7"&gt;7&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Issues Regarding Lab Samples and Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Readers may have heard of rapists being caught because of a match between a suspect's DNA and sperm left behind in a victim. Or, as often the case, an innocent person may be released because the DNA of that person does not match that found in a crime scene.[&lt;a href="#8"&gt;8&lt;/a&gt;]&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Possibility of Framing Innocents: Kshitij Urs, an Action Aid said, “There can be some problems if one were to rely too much on DNA databases in the criminal justice system as DNA evidence can be planted in a crime scene intentionally”, in an event organised by CIS. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Insecurity of Centralised Storage: With DNA tests, a patient's medical file will contain information they would prefer to be confidential. But the whole idea of general DNA testing will only be effective if the data is stored in a single electronic database, which makes the confidentiality problem extremely pressing. For example, the results of DNA testing might reveal that a person who is legally a child's father isn't really his biological father.[&lt;a href="#9"&gt;9&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Other Privacy Concerns: DNA contains information that raises a much broader privacy and other civil liberties concerns. It can tell investigators about ourselves, our family members, diseases we may have inherited our physical attributes and broad ancestry. Genetic information can be used in all sorts of discriminatory ways.[&lt;a href="#10"&gt;10&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What can be done?&lt;/b&gt;&lt;br /&gt;There should be a DNA retention policy to protect an individual. It will identify personal data which has to be maintained and contain guidelines for how long certain documents should be kept and how they should be destroyed.[&lt;a href="#11"&gt;11&lt;/a&gt;] In the situation of DNA collection and testing privacy cannot be protected simply through consent from an individual. Instead the law must permit specific thresholds to be established in order to cover the privacy needs of different situations. DNA profiling Bill 2007 will regulate the use of DNA profiles which is pending in the Parliament.&lt;/p&gt;
&lt;h3&gt;DNA Profiling Bill 2007 on Lab Practices&lt;/h3&gt;
&lt;p&gt;According to the DNA Profiling Bill there are certain rules for the DNA laboratories which are followed by &lt;a class="external-link" href="http://dbtindia.nic.in/DNA_Bill.pdf"&gt;these labs&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Prohibition for undertaking DNA procedures&lt;/b&gt;: It states that DNA laboratories have to take prior permission from the DNA Profiling Board to undertake any DNA procedures.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Security and minimize contamination&lt;/b&gt;: There should be proper facility of security and minimize contamination of DNA samples.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Confidentiality, Access to DNA Profiles, Samples and Records&lt;/b&gt;: DNA Profiling Bill states that all DNA profiles, samples and records forwarded to the DNA laboratory or any authority of the lab has to be kept confidential.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Use of DNA profiles, samples and records&lt;/b&gt;: All DNA profiles, samples and records should be used only for facilitating identification of the perpetrator(s) of a specified offence and also to identify victims of accidents, disasters or missing persons or for such other purposes.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Authorised Access&lt;/b&gt;: It also says that information stored on the DNA database system may be accessed by the authorized persons for the purposes of forensic comparison permitted under this Act, administering the DNA database system, accessing any information contained in it by law enforcement officers or any other persons, as may be prescribed, in accordance with provisions of any law for the time being in force, inquest or inquiry.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Restrictions on use of information on DNA profiles, samples and data identification records&lt;/b&gt;: Laboratory cannot use the information for any purpose other than the purpose for which the communication or access is permitted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Destruction, alterations, contamination, tampering with biological evidence&lt;/b&gt;: The Bill states that whoever knowingly or intentionally destroys alters, contaminates or tampers with biological evidence will be punishable with imprisonment for a term which  may  extend  to  five years, or with fine not exceeding twenty  thousand rupees, or with both.[&lt;a href="#12"&gt;12&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Currently the Bill allows for the complete storage of DNA of criminals, suspects, victims, offenders and volunteers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There are no standard practices for data retention across lab. Thereby there is an increased risk that data might fall in wrong hands and information may also be misused. Therefore, DNA databases should be restricted to be stored for not more than a limited time period. Such indefinite retention of the DNA profiles of innocent individuals is a disproportionate and unnecessary interference with an individual’s right to privacy.&lt;/li&gt;
&lt;li&gt;DNA labs in India have numerous constraints and operating in different level. Therefore, India has to be having even more carefully designed laws.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;List of Laboratories&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Central Forensic Science Laboratory, Delhi&lt;br /&gt;Dr. BK Mahapatra&lt;br /&gt;Associate Biology Division&lt;br /&gt;Ph: 9312523536, 24360095&lt;br /&gt;Mail: &lt;a class="external-link" href="mailto:ssofs_dfs@dfs.gov.in"&gt;ssofs_dfs@dfs.gov.in&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Centre For Fingerprinting and Diagnostics (CDFD), Hyderabad&lt;br /&gt;Dr. Madhusudan Nandineni&lt;br /&gt;Scientist and In-charge&lt;br /&gt;Ph: 24749331, 24749330&lt;br /&gt;Mail: &lt;a class="external-link" href="mailto:dsp@cdfd.org.in"&gt;dsp@cdfd.org.in&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;DNA Labs India, Hyderabad&lt;br /&gt;Ravi Kiran Reddy&lt;br /&gt;Ph: 9395142800&lt;br /&gt;Mail: &lt;a class="external-link" href="mailto:info@dnalabsindia.org"&gt;info@dnalabsindia.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Bio-Axis DNA Research Centre&lt;br /&gt;Ph: 9246338983&lt;br /&gt;Mail: &lt;a class="external-link" href="mailto:drc@dnares.in"&gt;drc@dnares.in&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Truth Labs, Hyderabad&lt;br /&gt;Ph: 9490690222, 04023390999&lt;br /&gt;Mail: &lt;a class="external-link" href="mailto:gandhi@truthlabs.org"&gt;gandhi@truthlabs.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;span class="Apple-style-span"&gt;Notes&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/DNA-Profiling-Bill" name="1"&gt;[1]http://timesofindia.indiatimes.com/topic/DNA-Profiling-Bill&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.gene-watch.org/blog/post/India-May-Soon-Have-a-National-DNA-Database.aspx" name="2"&gt;[2]http://www.gene-watch.org/blog/post/India-May-Soon-Have-a-National-DNA-Database.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202472346375" name="3"&gt;[3]Amy Miller, “Google’s new tool shows which countries are censoring the internet”  http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202472346375&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/paternity-case-no-relief-for-n-d-tiwari-as/762146/" name="4"&gt;[4]Paternity case: No relief for N D Tiwari as Supreme Court allows DNA test http://www.indianexpress.com/news/paternity-case-no-relief-for-n-d-tiwari-as/762146/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.deccanherald.com/content/165408/paternity-case-nd-tiwari-provide.html" name="5"&gt;[5]Paternity case: ND Tiwari to provide blood sample for DNA test  http://www.deccanherald.com/content/165408/paternity-case-nd-tiwari-provide.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.truthlabs.org/" name="6"&gt;[6]http://www.truthlabs.org/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.dnatestinginindia.ewebsite.com" name="7"&gt;[7]Bio-Axis Research Centre, http://www.dnatestinginindia.ewebsite.com&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.indiatogether.org/2009/sep/hrt-dnadb.htm" name="8"&gt;[8]Sujatha Byravan , A public, private database  http://www.indiatogether.org/2009/sep/hrt-dnadb.htm&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://www.legalserviceindia.com/article/l428-Data-Retention-Policies.html" name="9"&gt;[9]Vibhor Verdhan, Data Retention Policies- An Emerging Requirement &amp;amp; Various Compliances http://www.legalserviceindia.com/article/l428-Data-Retention-Policies.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://en.rian.ru/analysis/20090104/119294260.html" name="10"&gt;[10]Andrei Kislyakov , DNA testing: pros &amp;amp; cons http://en.rian.ru/analysis/20090104/119294260.html&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;[11]Vibhor Verdhan, Data Retention Policies- An Emerging Requirement &amp;amp; Various Compliances&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://dbtindia.nic.in/DNA_Bill.pdf" name="12"&gt;[12]DNA Profiling Bill http://dbtindia.nic.in/DNA_Bill.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/publications/dna-survey-questions.pdf/at_download/file" class="external-link"&gt;Click here for the Survey Questions&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="Apple-style-span"&gt;&lt;i&gt;Deoxyribonucleic acid (DNA) is the main constituent of the chromosomes of all organisms, and is found in the form of a double helix within the nucleus of every somatic cell. Consequently, a small sample of human body cells can be decoded to reveal a pattern that is shared only by a genetically identical twin. The DNA of each individual does not change during his lifetime. This technique is commonly used in police investigations and is termed ‘DNA fingerprinting. For more see the Wikipedia definition of DNA&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/dna-overview'&gt;https://cis-india.org/internet-governance/blog/privacy/dna-overview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shilpa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-02T13:11:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards">
    <title>An Open Digital Global South: Risks and Rewards</title>
    <link>https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards</link>
    <description>
        &lt;b&gt;Pranesh Prakash will be speaking at a conference to be organized by UC Davis Law School on May 25 and 26, 2017, in California, USA. &lt;/b&gt;
        &lt;p&gt;The event is open to the public. Please register &lt;a href="https://www.eventbrite.com/e/an-open-digital-south-risks-and-rewards-registration-33599812945"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference explores the promises and risks of openness in scholarship in relationship to the Global South. Scholars increasingly are under pressure to make their work “open” through sharing their research as reusable open data and open source software, and making their publications open access. Scholarly “openness”—for example, open data, open access, open source—is intended to facilitate the free flow of information, to address barriers to access, and to foster global intellectual conversations. Do attempts at promoting openness in scholarship create new forms of exclusion or hierarchy? How are Southern scholars and publishers’ experiences with open access and open data taken into account within conversations on developing standards and models for open access and open data in the Global North? What are the unanticipated risks created through the implementation of models for open data or open access?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more info &lt;a class="external-link" href="http://icis.ucdavis.edu/?tribe_events=openness-and-the-global-south-new-access-or-new-exclusions"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards'&gt;https://cis-india.org/internet-governance/news/an-open-digital-global-south-risks-and-rewards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-04-12T14:25:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/issues-in-internet-governance">
    <title>An Introduction to the Issues in Internet Governance</title>
    <link>https://cis-india.org/internet-governance/issues-in-internet-governance</link>
    <description>
        &lt;b&gt;That the internet cannot be governed was a central conviction of the early architects of the internet. In many ways it proved true when a majority of nation-States were kept off interference with the functioning of the internet. However with growing popularity of the internet, countries of the world are increasingly vying for control over it. This has become especially significant with the involvement of developing nations into the power struggle. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;With the proposal by India at the UNGA to form a &lt;a href="https://cis-india.org/internet-governance/the-web-of-our-strife"&gt;Committee for Internet-Related Policies&lt;/a&gt;, there has emerged &lt;a href="http://techland.time.com/2012/02/13/the-case-against-letting-the-united-nations-govern-the-internet/"&gt;the widespread fear of “UN overtake of the internet,”&lt;/a&gt; and internet governance has become a major focus for internet users in the third world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present blog post is a humble attempt to canvass the controversies in the arena of internet governance (IG). These controversies broadly focus around the institutional structures to govern the internet. Here, I first discuss the evolution of these models against the historical background of IG and then proceed to present criticisms of each of these models, with an emphasis on the interests of the regular internet user.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Where It All Started: The World Summit on Information Society&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions on IG took an international flavor with the convening of the World Summit on Information Society (WSIS) in Geneva in mid-2002. The Summit originally had an agenda to construct better telecommunications infrastructure in developing nations to erase the digital divide, as reflected in the self-declared purpose of WSIS as &lt;a href="http://www.itu.int/wsis/docs/background/resolutions/56_183_unga_2002.pdf"&gt;“ to harness the potential of knowledge and technology to promote the development Goals of the Millenium Declaration.”&lt;/a&gt; But this agenda was modified in two important ways as WSIS progressed. First, the focus was expanded from mere improvement of infrastructure to a variety of human rights issues involving communications, like freedom of speech and privacy, which came to be known as internet public policy issues. Second, a new dominant agenda of technical governance of the internet emerged.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;A New Mode of Governance: multi-stakeholderism on the Internet&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subsequent to the first WSIS phase in Geneva, the &lt;a href="http://www.wgig.org/docs/WGIGREPORT.pdf"&gt;Working Group on Internet Governance (WGIG) Report&lt;/a&gt; confirmed the larger policy issues concerning the internet rather than mere improvement of telecommunications infrastructure, as an aspect of IG by choosing a broad definition of IG, which included both creation of public policy and technical governance. &lt;a href="http://www.itu.int/wsis/docs/geneva/official/dop.html"&gt;The Geneva Declaration of 2003&lt;/a&gt;, which resulted from the 2002 WSIS process, held that internet governance “&lt;i&gt;should involve all stakeholders and relevant intergovernmental and international organizations.&lt;/i&gt;” This multi-stakeholder model for governance with involvement of nation-State participants was reflective of the largely networked management of the internet till the time, and hence pretty revolutionary. The Geneva Declaration however did tone down its revolutionary flavor by dividing the areas of governance concerns between the different multi-stakeholders such that the public policy role was assigned to the nation-States.  It said, at para 49:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;a. &lt;/i&gt;&lt;i&gt;“Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues;&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;b. &lt;/i&gt;&lt;i&gt;The private sector has had and should continue to have an important role in the development of the Internet, both in the technical and economic fields;&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;c. &lt;/i&gt;&lt;i&gt;Civil society has also played an important role on Internet matters, especially at community level, and should continue to play such a role;&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;d. &lt;/i&gt;&lt;i&gt;Intergovernmental organizations have had and should continue to have a facilitating role in the coordination of Internet-related public policy issues;&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;e. &lt;/i&gt;&lt;i&gt;International organizations have also had and should continue to have an important role in the development of Internet-related technical standards and relevant policies.”&lt;/i&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;reaffirmed in 2005 by the Tunis Agenda at para 35&lt;/a&gt;. Thus a sectorally-defined multi-stakeholderism for internet governance was agreed upon with traditional forms of State security being protected from large-scale erosion.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Enhanced Co-operation to Govern the Internet&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tunis Agenda further called for a process called “enhanced co-operation” to enable governments frame international public policy issues related to the internet, but not in the day-to-day technical and operational matters, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;69. We further recognize&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;the need for enhanced cooperation in the future, to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of enhanced co-operation however, was not strictly limited to framing of public policy issues of socio-cultural nature, like privacy and freedom of expression on the internet. The Tunis Agenda, in fact, recognizes that enhanced co-operation should include framing of principles on public policy issues related to the CIRs. Such principles are proposed to be global in scope:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“&lt;b&gt;70.&lt;/b&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Using relevant international organizations, such cooperation should include the development of globally-applicable principles on public policy issues associated with the coordination and management of critical Internet resources. In this regard, &lt;b&gt;we call upon&lt;/b&gt; the organizations responsible for essential tasks associated with the Internet to contribute to creating an environment that facilitates this development of public policy principles.”&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;What about the ICANN? : The Problem of US Oversight&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned earlier, during the WSIS process technical governance emerged as an important part of internet governance. And a major feature of technical governance comprised of the control of the organization which administers significant technical aspects of the internet, which was the ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN is the body largely understood to manage what later came to be known as Critical Internet Resources (CIRs); in other words the basic internet infrastructure. ICANN is a non-profit corporation with a multi-stakeholder model, incorporated under Californian laws in 1998 upon the directive of the US Department of Commerce. Its main functions include the allocation of address blocks to the Regional Internet Registries, coordinating assignment of unique protocol numbers, the management of DNS root zone file.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These functions however are performed under US political oversight under &lt;a href="http://www.icann.org/en/about/agreements/iana/iana-contract-21mar01-en.htm"&gt;the IANA contract&lt;/a&gt; which ICANN has with the U.S. Government. Consequently all edits made to the root zone file must be audited and approved by the U.S. Department of Commerce (DoC). This means that any addition or removal of a top-level domain (TLD) must have the approval of DoC. It includes the addition or removal of country-code top level domains (ccTLDs) like .in or .uk. Next there is &lt;a href="http://ntia.doc.gov/ntiahome/domianname/nsi.htm"&gt;the DoC contract with Verisign&lt;/a&gt;, the US- based corporation which owns the master root server and owns the .com and .net TLDs. This contract requires Verisign to implement all the technical coordination decisions made through ICANN and follow the US Executive directives regarding the root zone file.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem is that this political oversight by the US government is not taken very well by the other countries. Why should a single State exercise unilateral power over such important resources which seemingly have the potential to blackout the internet in any part of the world? We all want a share in control over the CIRs, the other States argue. US unilaterism makes functioning of ICANN too arbitrary and it is in US State interests to keep ICANN least accountable, others argue. Add to it the &lt;a href="http://en.wikipedia.org/wiki/.xxx"&gt;empirical evidence of abuse of its oversight function by the US government&lt;/a&gt;, and the legitimacy of the argument is enhanced enormously. However resolving the question of how ICANN should be managed, is a matter of great controversy and none too easy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nonetheless it is very important to note that it would be rather naïve to equate the problem of internet governance to the issue of ICANN oversight. Internet governance comprises of both issues: of freedom, privacy, access to knowledge and other aspects of the internet affecting human rights- what is known as internet public policy, as well as technical governance, one of whose aspects is the management of CIRs, and of which ICANN oversight is an important part.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;The Oversight-Policy Connection: He Who Manages the CIRs Controls Policy on the Internet&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is fine to say that States will make public policy while sticking to a form of multi-stakeholder model, but none of it holds much ground unless models for implementation of such policy are secured. This is where the issues of technical governance, like ICANN oversight and the framing of public policy on the internet get linked. A procedure to allocate address blocks or separation of registries or registrars raises questions of competition policy. Editing of root zone files can have impact on national economies over the world and be tied with problems of digital divide like multilingualism on the internet. Issue of new TLDs brings forth considerations about trademark law and policy.  New DNS securitization regimes have the potential to hamper national security! In the words of &lt;a href="http://www.internetgovernance.org/people/milton-mueller/"&gt;Milton Mueller&lt;/a&gt;, “To enforce public policy upon the Internet is to regulate technical and operational matters (and vice-versa).”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such a scenario, every step to further enhanced co-operation ultimately gets focused upon the ICANN oversight issue, as the latter, with its authority over the management of CIRs, lies at the core of any attempt to frame public policy for the internet.  And so in the subsequent post the focus will be on the various models proposed for ICANN oversight and their respective criticisms. Not least because all of the models proposed for ICANN oversight tie up with one or the other model proposed to further enhanced co-operation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;“Democratise the Internet”: Involve All Nation-States and Only Nation-States&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the last post, I discussed how enhanced co-operation to achieve a mechanism for internet governance under the Tunis Agenda can be classified into two broad portions: development of public policy and a mechanism for technical governance; and how ICANN oversight constitutes an important part of technical governance. I further discussed the relationship between internet public policy and technical governance and how it is impossible to frame or implement relevant public policy without an understanding and control over technical aspects constituting the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the present post, I embark upon an analysis of the various governance models which are suggested for the management of ICANN. Even though ICANN management is only a small segment of enhanced co-operation, I think there exist a number of parallels between models suggested for the accountability of ICANN and models for furthering the broader process of enhanced co-operation. Therefore an understanding of governance models for ICANN can also significantly enhance one’s understanding of models for enhanced co-operation, and it is to this end that the following exercise is undertaken. Here, I have also tried to link broader models for enhanced co-operation to models for ICANN oversight to aid this understanding; however yet again I do strongly warn against equating enhanced co-operation to the administration of ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though multiplicity of proposed governance mechanisms abound, four broad models are popularly debated with regard to oversight upon ICANN. The basic idea behind each of these models is to remove the arbitrariness associated with the ICANN (currently in the form of US unilateral oversight), which as discussed earlier is the central problem with it. Consequently each model offers some rationale about how it can reduce power sans accountability of the ICANN over the CIRs. However none of these models seems to offer the common ground for negotiations for all the stakeholders involved in IG due to various issues with each of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I discuss the first model along with its pros and cons in the present post.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Model I: Oversight by an Intergovernmental Organisation &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Parallel Enhanced Co-operation Model: International Telecommunications Union (ITU)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This model proposes that the oversight function over ICANN by the US Government be replaced by an organization composed of the nation-State representatives from countries all around the world.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The following arguments are usually advanced in favour of such a model.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Democratising the oversight mechanism&lt;/span&gt;: It is argued that such a model would be helpful in making the oversight function democratic, as all the governments of the world would now be represented in the oversight regime. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Giving nation-States power to enforce public policy:&lt;/span&gt; It is argued that by having an intergovernmental oversight mechanism, the governments of the world would be adequately able to exercise their sovereign right as per the Geneva Declaration, i.e. making public policy for the internet. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Curtailing the power of non-State actors to make policy decisions:&lt;/span&gt; It is argued that by having an intergovernmental oversight mechanism, non-State actors would be prevented from making public policy decisions via technical governance, which private interests and unelected representatives should not have the power to do.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Making use of international law to produce accountability:&lt;/span&gt; The current ICANN regime functions in US and is subject to US laws, which those outside the US, deem to be not a great situation. It is obvious that such dissatisfaction arises from the fact that US laws are subject to change by the US Congress, which non-US nationals have no representation in. The argument therefore is to use international law, which is global in scope in order to govern ICANN, rather than a country-specific law.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The ITU is an enhanced co-operation model in this regard, as it provides the intergovernmental mechanism which the above model for ICANN oversight envisions. It is supported by the more countries like China and Russia, which lay store by Statist institutions. Though no formal takeover of the ICANN by the ITU has been agreed to, or even the use of ITU as such, to make public policy for the internet, in pursuance of enhanced co-operation, the &lt;a href="http://www.internetgovernance.org/wordpress/wp-content/uploads/T09-CWG.WCIT12-120620-TD-PLEN-0064MSW-E.pdf"&gt;Temporary Document-64&lt;/a&gt;, containing proposals for the amendment of ITRs to expand ITU’s scope to the internet at the upcoming World Congress on Information Technology in November 2012, seems to advocate for such a mechanism. Although it is to be noted that there are no comments regarding ITU’s role social policy issues on the web, like censorship.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The intergovernmental oversight/enhanced co-operation model is however criticized on the following grounds.&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Erosion of bottom-up processes:&lt;/span&gt; It is argued that the intergovernmental model of oversight is a stark degradation of the bottom-up processes on which the internet has been built and flourished. In other words, intergovernmental oversight is likely to hamper democratic management of CIRs, as on the international arena, States represent their interest as States (interests like national security and defence concerns) and not the interests of their citizens. Add to this the fact that not all States of the world are democratically elected, and one begins to see a major anti-democracy stance in this model. In such a scenario it is likely that the CIR management process would be used to further geopolitical rivalries between nation-States rather than promote public interest.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;International law is not carved in citizens’ interests: &lt;/span&gt;This is an extension of the previous argument as it says that international law has been structured to serve the interests of sovereign powers and not that of individual citizens, a.k.a. internet users. Institutions under international law for protecting human rights are not strong and the relevant processes are slow and ineffective. Additionally, it is argued that in case ICANN is internationalized, it will be subject purely to the whims of the governments of the world and will have even less accountability.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Intergovernmental oversight will slow down technical processes: &lt;/span&gt;From the viewpoint of the technical community, intergovernmental oversight will slow down technical functioning and decision-making by miring it in layers of bureaucracy. Such a structure would be in stark contrast with the very architectural rationale of the internet: a free and fast medium of communication realised by the &lt;a href="http://en.wikipedia.org/wiki/End-to-end_principle"&gt;end-to-end principle&lt;/a&gt;. It will also slow down the growth of the internet and is likely to overturn decades of hard work by the technical community with the use of Veto powers in every stage of decision-making by the oversight committee and limited understanding of the internet architecture.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Promotion of traditional communications industry at behest of internet industry: &lt;/span&gt; It is also largely perceived that the most nation-States in the world, with strong lobbies for traditional communications industry will use their power in ICANN oversight to retard the growth of internet communications. A recent example is the case of &lt;a href="http://www.itweb.co.za/index.php?option=com_content&amp;amp;view=article&amp;amp;id=55941"&gt;Ethiopia where use of VOIP services can be punished with upto 15 years in prison&lt;/a&gt;, in order to preserve the State-owned telephone monopoly. With ITU as the parallel enhanced-co-operation model this threat becomes even more severe as ITU is dominated by giant telecom companies which will push to no end to restrict competition from the internet sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Fragmentation of global internet into national internets: &lt;/span&gt;This is a worst-case scenario envisioned by the critics who believe that this model has the potential to fragment the one global internet into a multitude of nationally regulated internets, because of the high level of power given to nation-States, who would try to strengthen their sovereignty claims over the internet. Some &lt;a href="http://tools.ietf.org/html/draft-diao-aip-dns-00"&gt;steps in this direction have already been set in motion by the Chinese government&lt;/a&gt;, underlining that the threat of such a worst-case scenario may be very real.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The next post analyses another model for ICANN governance: a hierarchical multi-stakeholder model, and which by analogy can be extended to a model for enhanced co-operation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Call for Multi-stakeholder Governance (With The Appropriate Regulation)&lt;/h2&gt;
&lt;p&gt;In the last post I discussed the pros and cons of an intergovernmental model for ensuring accountability of the ICANN.  In this post, I analyse the second broad model of oversight of ICANN by a hierarchical multi-stakeholder organization. By analogy, a parallel model for enhanced co-operation would be the Committee On Internet Related Policies proposed by India at the UN.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Model II: Oversight by a Hierarchical &lt;/b&gt;multi-stakeholder&lt;b&gt; Organisation&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Parallel Enhanced Co-operation Model: Committee on Internet Related Policies (CIRP)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This model was developed to temper the unlimited power of nation-States in the intergovernmental oversight model. The simple idea here is add more stakeholders into the oversight mechanism process so that the national governments are held accountable to the other stakeholders and vice-versa. Although a major departure from previous governance models by allowing for the participation of all stakeholders in the governance process, this model still predicates itself upon the nation-State hegemony. This it does by assigning decision-making privileges only to the States, while the other stakeholders are relegated to a position where they can participate only in policy discussion processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp"&gt;UN Committee on Internet-Related Policies (CIRP) proposed by the Indian government&lt;/a&gt; is a model which embodies the above structure of functioning in matters of enhanced co-operation. It proposes the formation of four advisory bodies involving the stakeholders identified by the Tunis Agenda i.e. the Civil Society, the Private Sector, Inter-Governmental and International Organisations&lt;b&gt;,&lt;/b&gt; and the Technical and Academic Community. These four advisory bodies would discuss policy issues and inputs from each of these bodies would then be submitted to the CIRP which would be composed of representatives of 50 nation-States, chosen or elected on the basis of equitable geographical representation. The CIRP would report annually to the UN General Assembly to present its recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many aspects of the CIRP proposal still remain unclear: for example- the budgetary structure, its relationship with the ICANN and the questionable need for an advisory body composed of international and intergovernmental organisations for a committee already composed of nation-States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However taking into account that a CIRP-like model embodying the hierarchical multi-stakeholder structure does have the potential to discharge the ICANN oversight function, a broad analysis can be made regarding its pros and cons, without going into the fine details of the CIRP proposal specifically.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In support of the hierarchical multi-stakeholder model, certain additional arguments are made apart from the arguments already made in favour of an intergovernmental model for ICANN oversight. These are as following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Strengthening bottom-up processes: &lt;/span&gt;It is argued that such a model takes into account and preserves the multi-stakeholder structure upon which the internet has been built and thrived. Involvement of all stakeholders in internet governance is further deemed to be important to understand various aspects of the internet in terms of technical functioning and community impact, and to preserve the free flow of information—areas which might not be fully understood by nation-States. Hence, being informed by the relevant stakeholders in this regard would be crucial to good policy-making processes by consolidating bottom-up processes in internet governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Control on unlimited power of nation-States: &lt;/span&gt;It is argued that such a multi-stakeholder model is also important to curtail the power of nation-States to dominate the internet as has been the case with other traditional media. The potential of the internet lies in the low-cost tools of communication to a global audience that it provides an individual user. This potential however is always under the threat of erosion by Statist interests, which would typically like to control the information flowing into their jurisdiction by putting forth the argument of sovereignty. A multi-stakeholder model in such a scenario, can act as a check upon the furtherance of the interests of nation-States, which cannot always be equated to public interest, especially with concerns like &lt;a href="http://www.prisonplanet.com/death-of-the-internet-unprecedented-censorship-bill-passes-in-uk.html"&gt;freedom of expression&lt;/a&gt; and &lt;a href="http://indiatoday.intoday.in/story/govt-to-tap-blackberry-messenger-security-privacy/1/183403.html"&gt;privacy&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Optimum model for internet governance:&lt;/span&gt; A pragmatist argument in favour of the present model is that it is perhaps the only model which in the present scenario, nation-States around the world would perhaps agree to, and which at the same time would optimize benefits for other stakeholders by involving them in an unprecedented international governance model. &lt;a href="http://igfwatch.org/discussion-board/indias-proposal-for-a-un-committee-for-internet-related-policies-cirp"&gt;The alternative to this model in the current political scenario, it is opined, can only be strict regulations by a intergovernmental organization or the continuance of US unilateralism&lt;/a&gt;, both of which are undesirable options compared to the present model. The basic drift of the argument being that something is better than nothing.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hierarchical multi-stakeholder model of internet governance however comes under criticism upon the following grounds:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Problems in recognition of stakeholders: &lt;/span&gt; A recurring problem with regard to any multi-stakeholder model is how to define who constitutes “a stakeholder” in internet governance. This problem was encountered even during the IGF constitution process, where the proposal for election of multi-stakeholder representatives to the &lt;a href="http://www.intgovforum.org/cms/mag"&gt;MAG&lt;/a&gt; was swept off in favour of the nomination of the members.  In a multi-stakeholder model therefore, deciding who can participate in the policy process as a “stakeholder” remains a tough task. In this context, a civil society representative may end up participating in the policy process without having the support or recognition of the civil society. Another perspective may even ask if nation-States can be deemed as stakeholders in internet governance. The problem of who defines, legitimizes and authorizes “a stakeholder” to be one then comes increasingly to fore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Failure to provide a useful check upon Statist power:&lt;/span&gt; Though the present multi-stakeholder model claims to confine unlimited Statist power on the future of the internet, the question is does it really help in achieving the same? Because the ultimate policy decision making power in such a model lies with the nation-States themselves. Which implies that substantive power would still lie with nation-States who are likely to use it aggressively to further their interests. The multi-stakeholder structure then manages to be reduced to a mere symbol for bottom-up processes, but in fact fails to ensure the implementation of the same.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the subsequent post, I discuss the advantages and disadvantages of another model for ICANN governance: an equal-footing multi-stakeholder model, and which by analogy can be extended to a model for enhanced co-operation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Equality in Multi-stakeholderism: How Great Is That Idea?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;I have discussed previously the pros and cons of an intergovernmental model and a hierarchical multi-stakeholder model for the management of ICANN, and by analogy for the furtherance of enhanced co-operation. In this post, I analyse a third broad model of oversight of ICANN by an equal-footing multi-stakeholder organization.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Model III: Oversight by a Equal-Footing Multi-stakeholder Organisation &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Parallel Enhanced Co-operation Model: Internet Governance Forum (IGF)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Model III is a modification of Model II in that it allows for the participation of all stakeholders in not just policy deliberation but also policy decision. Apart from the argument that policy decisions should be confined to nation-States who are the representatives of their citizens, it cannot be denied that a political inertia prevails for the non-involvement of other stakeholders in decision-making processes as any such move would be unprecedented. At the December 2010 UNCSTD conference, it was argued by India that the involvement of stakeholders apart from the nation-State representatives in the finalization of policy would be in contradiction to UN procedural rules.  The question then arises why such a multi-stakeholder body cannot be relegated to an extra-UN forum. Pursuant to this, some critics of the hierarchical multi-stakeholder model have suggested the expansion of the mandate of the Internet Governance Forum (IGF) to decision-making processes. Though the IGF is convened by the CSTD, which is a part of the ECOSOC, it is not a body falling under UN umbrella and has flexible procedures which grant each stakeholder an equal footing in policy discussion. Private sector and civil society discuss policy with nation-State representatives on an equal status. The IGF however, is perceived to be a largely dying forum as it does not presently have the power to further enhanced co-operation, i.e. it cannot take decisions with respect to internet policy. This has heightened the sense of dissatisfaction with IGF especially among the newly developing countries, who have come to view the IGF as a mechanism to foster the status quo which is favourable to the developed nations, particularly the US. Expansion of IGF mandate to policy decision-making could however mean that an enhanced co-operation mechanism including an oversight body for ICANN is put into place within an equal-footing multi-stakeholder model.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Arguments in favour of such model build up as following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;True &lt;/span&gt;multi-stakeholder&lt;span style="text-decoration: underline;"&gt; participation: &lt;/span&gt;The present model seems to offer what the hierarchical multi-stakeholder model couldn’t—that is, the participation of all stakeholders at all levels of policy making.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Effective checks on nation-State power: &lt;/span&gt;By ensuring the participation of all stakeholders in policy discussion and decision processes, the equal-footing multi-stakeholder model effectively checks the power of each stakeholder in unilaterally advancing its own interests.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;But all is not pink and perfect even here. The criticisms of this model run as following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Use of unelected representatives in decision-making:&lt;/span&gt; The problem of recognition of stakeholder representatives has already been outlined earlier. The equal-footing multi-stakeholder model seems to compound this problem by additionally giving the stakeholders whose legitimacy is questionable, a say in the decision-making process. This has been criticized as undemocratic. The involvement of the private sector in decision-making further aggravates those who have seen liberalisation and globalization deepening the economic divide and enabling covert violations of human rights in the garb of “development.”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Allocation of votes: &lt;/span&gt;If all stakeholders are indeed involved in the decision-making process, it remains an issue whether each of them should be granted an equal vote. Should private interests be granted the same voting power as the civil society which purports to act in public benefit? Should both of these be granted equal voting power as nation-States, which traditionally have had exclusivity over governance at international settings? These questions remain unresolved.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Failure of consensual decision-making: &lt;/span&gt;An alternative to policy decision-making by voting in Model III can be policy decision-making by consensus. It is however argued that involvement of all stakeholders with largely polar interests in decision-making will never produce a consensus, and forestall decision-making altogether: The inability of the IGF, an equal footing multi-stakeholder body, to reach agreement on governance issues, which has led to reduced faith and participation in such a model is often cited in this regard. It is argued that in such instances the use of the nation-State as a mediator between these contradictory interests is essential—a suggestion which relegates one back to Model II. However it is important to note that such an argument naively assumes nation-States to be too benign entities with their agenda being public interest exclusively. It cannot be forgotten that many nation-States of the world have not even been born out of democratic processes like universal adult franchise; and even the most liberal of democratic States do &lt;a href="http://en.wikipedia.org/wiki/Patriot_Act"&gt;enact questionable laws repressive of basic human rights and freedoms&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A subsequent post analyses the last broad model for ICANN governance: the replacement of oversight function by participatory accountability mechanisms.&lt;/p&gt;
&lt;h2&gt;Governance by Participatory Accountability Mechanisms&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the last few posts, I have analysed the advantages and disadvantages of an intergovernmental model, a hierarchical multi-stakeholder model, and an equal-footing multi-stakeholder model for the management of ICANN. The last post in this series discusses the fourth and last model in this respect- a model which proposes the replacement of ICANN oversight by participatory accountability mechanisms. It is important to note that at present it cannot be said that a parallel enhanced co-operation model has been formally proposed for this model of ICANN accountability. Therefore this model remains specific only to ICANN oversight, and does not by extension cover enhanced co-operation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Model IV: Replacement of Oversight by Participatory Accountability Mechanisms&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Parallel Enhanced Co-operation Model: None&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Model IV envisions the complete removal of oversight function over ICANN by making it an independent body. The idea is to make ICANN self-regulating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are however, two variants of this model which are suggested in this regard. The first envisions slight modifications to the status quo by persuading the US government to release control over ICANN via the IANA contract and also eliminating the role of the &lt;a href="https://gacweb.icann.org/display/gacweb/Governmental+Advisory+Committee"&gt;Governmental Advisory Committee (GAC)&lt;/a&gt;. Moreover, the reviews system under the &lt;a href="http://www.icann.org/en/about/agreements/aoc"&gt;Affirmation of Commitments (AoCs)&lt;/a&gt; needs to be strengthened so that ICANN keeps respecting the basic principles on internet freedom while discharging its technical functions. This proposal supports the usage of the current RIR mechanism for addressing public policy issues in technical governance. RIR refers to a Regional Internet Registry, each of which has its own technical community which considers such issues. The difference here from regular policy-making is that public policy questions would be answered keeping in mind technical feasibility. This is an approach which seems to be working for the past decade, and has led to the conclusion of policies which suit regional concerns specifically. For example in the &lt;a href="http://en.wikipedia.org/wiki/American_Registry_for_Internet_Numbers"&gt;ARIN&lt;/a&gt; region, residential privacy concerns cause that information be redacted from the public &lt;a href="http://www.networksolutions.com/whois/index.jsp"&gt;WHOIS directory&lt;/a&gt; per community developed policy. It can further be noted that good policies tend to get adapted across all RIRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proponents of this first variant of Model IV exist especially within the internet technical community, which argues that the simplest solution to technical governance is to remove governmental interference in ICANN processes by any nation-State anywhere in the world, thus leaving technical governance entirely to the technical community, who are people who understand and can provide solutions for the technical structure of the internet the best. It is thought among this group that the existing internal administrative processes of ICANN are sufficient to ensure good governance&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second variant suggests the removal of oversight function by replacing it with a membership-at-large structure for the ICANN. This would mean that any interested individual from anywhere in the world could apply to be a Board member in the ICANN and participate in the decisions which it makes. It calls for dissolution of the GAC and the participation of nation-State reps via the Supporting Organisations of the ICANN. It further mandates that an international agreement be undertaken whereby nation-States agree not to interfere in the functioning of ICANN or use it for censorship purposes. Though as a negotiating point for nation-States, it proposes that the control of ccTLDs be transferred to the national governments who should be allowed to exercise complete sovereignty over them. In short, this variant seems to propose two parallel running regimes for the internet: one embodying the global internet, another comprising of a bunch of nationally-controlled internets under the ccTLD domains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proponents of this second variant are largely skeptical for governmental and bureaucratic forces. At the same time, they are concerned about potential corruption rising within the ICANN due to unregulated market influences and call for reforms within the ICANN administration which would make it &lt;i&gt;directly accountable&lt;/i&gt; to people who use the internet all over the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both these variants of Model IV envision governmental involvement as supportive of a shared legal framework which upholds accountability in the ICANN, and provides non-State actors a legal basis for settling important disputes, at the same time leaving larger internet policy questions out of the framework and focusing on only the technical issues.&lt;/p&gt;
&lt;p&gt;Thus by limiting itself to technical policy issues is specific to the ICANN oversight problem, Model IV proposal does not extend to the larger internet public policy issues which come up in conjunction with enhanced co-operation. Hence there is no potential overall enhanced co-operation model parallel to it—an issue which Model IV suggests dealing with separately.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;To summarise, the following arguments are put forth in favour of Model IV.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;The Don’t Fix What is Not Broken Argument: &lt;/span&gt;This is the other pole to the purely intergovernmental oversight/enhanced co-operation model. The drift is that since the internet functions fine the way it is now without the involvement of governments, especially in the case of technical governance, why change to fix it. The problem with this argument being that it is not exactly true, and is perhaps too US-centric.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Hand-in-hand Technical and Policy Decision-making: &lt;/span&gt;The close involvement of the internet technical community in the policy-making process in this model would help to bring technical and public policy issues together. The problem with involvement of governments in technical policy-decision making process is that they tend to ignore the technical feasibility of their policy implications. The technical community on its part resents such political interference (that is not always internet-oriented) into technical matters which has the potential to nullify decades of hard work by the community. It is thus argued that removal of any patronizing oversight under Model IV would bring about smooth framing of technical policies by inclusion of the “technical” aspects.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Invocation of Participatory Democracy: &lt;/span&gt; Proponents of Model IV show little faith in the politics of representative democracy for the securitization of best interests of the citizens. This model therefore, prides itself in establishing a mechanism of participatory democracy via either the RIRs or the ICANN Board memberships-at-large variations, either of which it is believed, will help users of the internet participate directly in internet governance, while keeping in mind regional variations in concerns regarding governance issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Need for Principles over Redistribution of Power: &lt;/span&gt;Another argument which comes to the support of this model is that it intends to provide a set of principles to bring accountability to technical governance, rather than merely using multiple players to diffuse the power of the other. The argument here is that mere induction of a number of nation-States (like in Model I) or additional stakeholders (like in Models II and III) would not be of much consequence to contain unilateral power unless proper mechanisms for accountability are put into place. Rather, the addition of more stakeholders without guiding principles agreed upon by everyone is likely to make things worse for the abuse of power would then be possible by more actors.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Best Option in Absence of Globally Agreed Principles: &lt;/span&gt;This is a pragmatic argument for the first variation of Model IV.  It entails that in the absence of any globally-acceptable principles of technical governance, this proposal is the most acceptable. The technical community especially feels that without global consensus of principles for technical governance, any talk about changing the existing mechanisms, which seems to be working decently, is an unhelpful approach. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;But not everyone agrees with these arguments. The following criticisms are made with regard to Model IV.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Influence of jurisdiction of incorporation:&lt;/span&gt; The criticism here is that as long as ICANN is a private corporation incorporated in a particular jurisdiction, the laws and the executive policies of that jurisdiction would be enforced against ICANN, thus providing the relevant State a unilateral power to influence ICANN’s technical decisions. A counter-proposal in this regard however suggests that ICANN be protected from such jurisdictional interference via immunities under an international agreement.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Inadequacy of an Affirmation of Commitments structure: &lt;/span&gt;The AoCs structure particularly does not find much support with developing nations, because it seems to be a unilateral declaration without much force of law in the international scenario. It is demanded that something more than an agreement between the government of a particular country and a private corporation incorporated in that country be sought to protect the interests of internet users worldwide.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;Excessive power to the technical community: &lt;/span&gt;Some of the critics view the present model to be excessively favorable to the internet technical community, which has strong bonds with the private sector in the internet industry. They see the involvement of the technical community in policy decisions as unnecessary and as a leeway for potential abuse by monopolization of such functions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;The four models discussed above present a very broad view of the conflicts present in the entire project of internet governance. There are infinitesimal other details associated with the task of governance which have an impact on how we are able to use the internet, but which could not be presented here in all their detail. As an unprecedented transnational medium of communication, the internet challenges the very idea of modern governance, which is enmeshed in the hierarchical nation-State framework. How we rise to this challenge will be consequential in determining whether a new technology with the potential of completely free flow of information across any boundaries can be preserved, or whether traditional boundaries of regulation succeed in moulding the internet to its form. Or whether in the process, both the technology and our idea of governance will be transformed in ways hitherto unknown.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/issues-in-internet-governance'&gt;https://cis-india.org/internet-governance/issues-in-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>smarika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-22T02:47:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig">
    <title>An Introduction to Bitfilm and Bitcoin – A Discussion by Aaron Koenig</title>
    <link>https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Bangalore invites you to a talk by Aaron Koenig, Managing Director, Bitfilm Networks of Hamburg, Germany on January 23, 2013, from 7.00 p.m. to 9.00 p.m.&lt;/b&gt;
        &lt;h3&gt;The Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron Koenig will give a talk on the creation and use of Bitcoin, a  new digital currency and payment system designed for the voting process  of the Bitfilm Festival for Digital Film. Since the year 2000, the  Bitfilm Festival has been showcasing films that use digital technology  in a creative and innovative way. It takes place on the Internet. However,  physical screenings of the films will be held in Bangalore and in  Hamburg. Each of the 59 nominated digital animations has its own Bitcoin  account, and users worldwide may vote by donating Bitcoins to the films  they like anonymously and without any transfer costs. The donated money  will be divided among the most popular films (the films with the most  votes/Bitcoins).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aaron will also present an animated short about Bitcoin which he has  produced with an animation team based in Bangalore. Of course, the  animators were paid in Bitcoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More info on the Bitfilm Festival: &lt;a class="moz-txt-link-freetext" href="http://www.bitfilm.com/festival"&gt;http://www.bitfilm.com/festival&lt;/a&gt;&lt;br /&gt;More info on Bitcoin: &lt;a class="moz-txt-link-freetext" href="http://blink.li/current-issue"&gt;http://blink.li/current-issue&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;VIDEO&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/mOCBjDM6ZiQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aaron Koenig&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron is the Managing Director of Bitfilm. He has  run the organization since 1999. He is a vibrant member of art and film  societies and an Entrepreneur. Currently engaged with Bitfilm.com, Aaron  also publishes a political magazine called BLINK.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig'&gt;https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-05T10:14:54Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
