<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2871 to 2885.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/network-of-chains"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/a-net-of-hatred"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india">
    <title>A Public Discussion on Criminal Defamation in India</title>
    <link>https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS); the Network of Women in Media, India; and Media Watch, Bengaluru, are hosting a public discussion on criminal defamation in India. The discussion will start at 5.30 pm on Wednesday, 29 July 2015, at the CIS office in Domlur, Bengaluru. &lt;/b&gt;
        &lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Flyer.png" alt="Flyer of the event" class="image-inline" title="Flyer of the event" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pictured above: A poster of the event.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Decriminalising Defamation in India: A Brief Statement of Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Subramanian Swamy’s petition to decriminalise defamation has been joined in the Supreme Court by concurring petitions from Rahul Gandhi and Arvind Kejriwal. Defamation is criminalised by sections 499 and 500 of the Indian Penal Code, 1860 (IPC). Swamy and his unlikely cohorts want the Supreme Court to declare that these criminal defamation provisions interfere with the right to free speech and strike them down.&lt;/p&gt;
&lt;div class="kssattr-macro-text-field-view kssattr-templateId-blogentry_view.pt kssattr-atfieldname-text plain" id="parent-fieldname-text"&gt;
&lt;p style="text-align: justify; "&gt;Although news coverage of  the case has focused on the motivations and arguments of the three  politicians, defamation should not be the sole province of celebrities  and the powerful. Unfortunately, criminal defamation has emerged as a  new system of censorship to silence journalists, writers, and activists.  SLAPP suits (Strategic Lawsuits against Public Participation) are being  increasingly used by large corporations to frighten and overwhelm  critics and opponents. SLAPP suits are not designed to succeed –  although they often do, they are intended to intimidate, harass, and  outspend journalists and activists into submission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law of defamation rests on  uncertain foundations. In medieval Europe defamation was dually  prosecuted by the Church as a sin equal to sexual immorality, and by  secular courts for the threat of violence that accompanied defamatory  speech. These distinct concerns yielded a peculiar defence which fused  two elements: truth, which shielded the speaker from the sin of lying;  and, the public good, which protected the speaker from the charge of  disrupting the public peace. This dual formulation – truth and the  public good – remains the primary defence to defamation today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not have a strong ‘fair  comment’ defence to protect speech that is neither true nor  intrinsically socially useful. This bolsters the law’s reflexive  censorship of speech that falls outside the bounds of social utility and  morality such as parody, caricature, outrageous opinion,  sensationalism, and rumour. This failure affects cartoonists and tabloid  sensationalism alike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Defamation law is also open to  procedural misuse to maximise its harrassive effect. Since speech that  is published on the Internet or mass-printed and distributed can be read  almost anywhere, the venue of criminal defamation proceedings can be  chosen to inconvenience and exhaust a speaker into surrender. This  motivation explains the peculiarly remote location of several defamation  proceedings in India against journalists and magazine editors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offence of defamation commoditises  reputation. While defamation remains a crime, the state must prosecute  it as it does other crimes such as murder and rape. This merits the  question: should the state expend public resources to defend the  individual reputations of its citizens? Such a system notionally  guarantees parity because if the state were to retreat from this role  leaving private persons to fight for their own reputations, the market  would favour the reputations of the rich and powerful at the expense of  others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These and other issues demand an  informed and rigorous public discussion about the continued  criminalisation of defamation in India.&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/events/decriminalising-defamation-in-india.pdf" class="external-link"&gt;&lt;b&gt;Download the concept note prepared by Bhairav Acharya&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india'&gt;https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Defamation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-27T14:44:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton">
    <title>A provisional definition for the Cultural Last Mile</title>
    <link>https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton</link>
    <description>
        &lt;b&gt;In the first of his entries, Ashish Rajadhyaksha gives his own spin on the 'Last Mile' problem that has been at the crux of all public technologies. Shifting the terms of debate away from broadcast problems of distance and access, he re-purposes the 'last mile' which is a communications problem, to make a cultural argument about the role and imagination of technology in India, and the specific ways in which this problem features in talking about Internet Technologies in contemporary India.&lt;/b&gt;
        
&lt;div class="main"&gt;
&lt;div class="snap_preview"&gt;
&lt;p&gt;In its classical
form, the ‘last mile’ is a communications term defining the final stage
of providing connectivity from a communications provider to a customer,
and has been used as such most commonly by telecommunications and cable
television industries. There has however been a a specific Indian
variant, seen in its most classical avatar in scientist Vikram
Sarabhai’s contention that overcoming the last mile could solve the two
major challenges India has faced, of &lt;strong&gt;linguistic diversity &lt;/strong&gt;and &lt;strong&gt;geographical distance&lt;/strong&gt;,
and mounted as the primary argument for terrestrial television in the
early 1980s. (I will try and attach the Sarabhai paper a little later
to this posting).&lt;/p&gt;
&lt;p&gt;This specifically Indian variation, where technology was mapped onto
developmentalist-democratic priorities, has been the dominant
characteristic of communications technology since at least the
invention of the radio in the 1940s. For at least 50 years now, that
means, the last mile has become a mode of a techno-democracy, where
connectivity has been directly translated into democratic citizenship.
It has continuously provided the major rationale for successive
technological developments, from the 1960s wave of portable
transistors, the terrestrial transponders of the first televisual
revolution it the early 1980s (the Special Plan for the Expansion of
Television), the capacity of satellite since SITE and the INSAT series,
and from the 1990s the arrival of wired networks (LANs, Cable,
fibre-optic) followed by wireless (WLAN, WiMAX, W-CDMA). At each point
the assumption has been consistently made that the final frontier was
just around the corner; that the next technology in the chain would
breach a major barrier, once and for all.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What I hope to do is to provide a historical account to
argue that the theory of the ‘last mile’ has been founded on
fundamental (mis)apprehensions around just what this bridge
constitutes. &lt;/strong&gt;Further, that these apprehensions may have been
derived from a misconstruction of democractic theory, to assume, first,
an evolutionary rather than distributive model for connectivity, and
second, to introduce a major bias for broadcast (or one-to-many) modes
as against many-to-many peer-to-peer formats. The book, whenever I
succeed in writing it, will hope to argue the following:&lt;/p&gt;
&lt;p&gt;1. It has been difficult to include &lt;strong&gt;human resource&lt;/strong&gt;
as an integral component to the last mile. Contrary to the relentlessly
technologized definition of the last mile, it may perhaps be best seen
historically as &lt;em&gt;also&lt;/em&gt;, and even perhaps &lt;em&gt;primarily&lt;/em&gt;, a
human resource issue. This is not a new realization, but it is one that
keeps reproducing itself with every new technological generation&lt;a href="http://culturallastmile.wordpress.com/#_ftn1"&gt;[1]&lt;/a&gt;,
with ever newer difficulties. The endemic assumption, derived from the
broadcasting origins of the definition is that it is primarily the &lt;em&gt;sender&lt;/em&gt;’s responsibility to bridge the divide, that &lt;em&gt;technology &lt;/em&gt;can
aid him to do so on its own, and that such technology can negate the
need to define connectivity as a multiple-way partnership as it reduces
the recipient into no more than an intelligent recipient of what is
sent (the citizen model). On the other hand, it is possible to show how
previous successful experiments bridging the last mile have been ones
where &lt;em&gt;recipients have been successfully integrated into the communications model &lt;/em&gt;both as peers and, even more significantly, as &lt;em&gt;originators &lt;/em&gt;as well as &lt;em&gt;enhancers &lt;/em&gt;of
data. Importantly, this paper will show, this has been evidenced even
in one-way ‘broadcast’ modes such as film, television and radio (in the
movie fan, community radio and the television citizen-journalist).&lt;/p&gt;
&lt;p&gt;2. The one-way broadcast versus peer-to-peer versus two/multiple-way
debate needs to he historically revisited. The need to redefine the
beneficiary of a connectivity cycle as a full-fledged partner tends to
come up against a bias written into standard communications models –
and therefore several standard revenue models – that consistently tend
to underplay what this paper will call the &lt;em&gt;significant sender/recipient&lt;/em&gt;.
While both terrestrial and satellite systems require some level of
peer-to-peer transmission systems to facilitate last-mile
communications, it has been a common problem that unless &lt;em&gt;either&lt;/em&gt; a clear focus exists on geographic areas &lt;em&gt;or&lt;/em&gt;
significant peer-to-peer participation exists, broadcast models
inevitably find themselves delivering large amounts of S/N at low
frequencies without sufficient spectrum to support large information
capacity. While it is technically possible to ‘flood’ a region in
broadcasting terms, this inevitably leads to extremely high wastage as
much of the radiated ICE never reaches any user at all. As information
requirements increase, broadcast ‘wireless mesh’ systems small enough
to provide adequate information distribution to and from a relatively
small number of local users, require a prohibitively large number of
broadcast locations along with a large amount of excess capacity to
make up for the wasted energy.&lt;/p&gt;
&lt;p&gt;This problem, importantly, springs as much from a built-in &lt;em&gt;ideological &lt;/em&gt;commitment
to one-way broadcasting formats, as from technological limitations. The
technology itself poses further problems given the bias of different
systems to different kinds of connectivity, and with it different types
of peer-to-peer possibilities. Rather than attempting a
one-size-fits-all model for all models to follow, we need to work out
different &lt;em&gt;synergies &lt;/em&gt;between broadcast-dependent and peer-to-peer-enabled platforms.&lt;/p&gt;
&lt;p&gt;This book will eventually hope to study the history of peer-to-peer
and multiple-way structures as systems where sending has become a
component part of receiving. Key technological precedents to the
present definition of the sender-communication ‘partner’ would be &lt;strong&gt;community radio&lt;/strong&gt;, &lt;strong&gt;low-power transmission-reception systems &lt;/strong&gt;(most famously the Pij experiment in Gujarat conducted by ISRO), and various &lt;strong&gt;internet-based networking models&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;3. The need to revisit the technological community is therefore
critical. The key question is one of how technological communities have
been produced, and how they may be sustained. In January 2007, the
attack by V.S. Ailawadi, former Chairman, Haryana Electricty Regulatory
Commission, on India’s public sector telecom giants BSNL and MTNL for
keeping their ‘huge infrastructure’ of ‘copper wire and optic fibre’ to
themselves, when these could be used by private operators as cheaper
alternatives to WiMAX, W-CDMA and broadband over power lines, shows the
uneasy relationship between new players and state agencies. Mr.
Ailawadi’s contention that the ‘unbundling’ of the last mile would
bring in competition for various types of wireless applications and
broadband services not just for 45 million landlines but also for 135
million mobile users of various service providers, also therefore needs
to be revisited from the perspective of community formation. How would
the new 135 million mobile users be effectively tapped for their
capacity to become what we are calling significant senders?&lt;/p&gt;
&lt;p&gt;In defining the last mile as to do with the recipient-as-sender, and thus the &lt;strong&gt;community&lt;/strong&gt;, this paper will focus on a history of community action along specific models of connectivity. These are: cinema’s &lt;strong&gt;movie fan&lt;/strong&gt;, internet’s &lt;strong&gt;blogger&lt;/strong&gt; and &lt;strong&gt;networker&lt;/strong&gt;, solar energy’s &lt;strong&gt;barefoot engineer&lt;/strong&gt;, software’s &lt;strong&gt;media pusher&lt;/strong&gt; and television’s &lt;strong&gt;citizen-journalist. &lt;/strong&gt;A specific focus for study will be the models of &lt;strong&gt;participatory learning&lt;/strong&gt; in the classroom, using &lt;strong&gt;film&lt;/strong&gt;, the &lt;strong&gt;vinyl disc&lt;/strong&gt;, the &lt;strong&gt;audio cassette&lt;/strong&gt;, the &lt;strong&gt;radio&lt;/strong&gt;, the &lt;strong&gt;television&lt;/strong&gt;, the &lt;strong&gt;web &lt;/strong&gt;and now the &lt;strong&gt;mobile phone&lt;/strong&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton'&gt;https://cis-india.org/raw/histories-of-the-internet/blogs/the-last-cultural-mile/definiton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights>A copy of this post is also available on the author's personal blog at http://culturallastmile.wordpress.com/2009/10/25/1-what-is-the-cultural-last-mile/</dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    

   <dc:date>2011-08-02T08:57:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table">
    <title>A Privacy Round Table in Delhi</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the FICCI Federation House in Tansen Marg, New Delhi on April 13, 2013, from 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable.pdf" class="internal-link"&gt;Click to download the invite&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the “Report of the Group of Experts on Privacy” by the Justice AP Shah Committee, and the text of the Citizens’ Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30  &lt;br /&gt;11.30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview of Justice AP Shah report: Purpose, principles, and framework&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;12.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.00 &lt;br /&gt;13.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion on the Citizens’ Privacy Protection Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;13.00 &lt;br /&gt;14.00&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.00  &lt;br /&gt;16.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth explanation and discussions regarding the Citizens’ Privacy Protection Bill 2013 (time for review and comments)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00&lt;br /&gt;16.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the first New Delhi Roundtable on &lt;b&gt;April 13, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Friday &lt;b&gt;April 5, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees submit a brief introduction about themselves and their interest in the topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table'&gt;https://cis-india.org/internet-governance/events/privacy-round-table&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-12T09:33:46Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-chennai">
    <title>A Privacy Round Table in Chennai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the Residency Towers in Chennai on Saturday, May 18, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt;Click for the invite&lt;/a&gt;&lt;/li&gt;
&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt; 
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To discuss the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the "Citizens' Privacy (Protection) Bill 2013", drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Roundtable Discussion&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 p.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confirmations and RSVP&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Chennai Privacy Roundtable on &lt;b&gt;May 18th, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday&lt;b&gt; May 13, 2013&lt;/b&gt;.  As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-chennai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-05-06T10:01:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore">
    <title>A Privacy Round Table in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India  and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at Jayamahal Palace in Jayamahal Road, Bangalore on Saturday, April 20, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable-bangalore" class="internal-link"&gt;Invitation for the Privacy Roundtable&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the Citizens' Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society, and the paper "Strengthening Privacy Protection through Co-Regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published  into a compilation, and presented at the Internet Governance meeting  planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;12.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Citizens (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.15  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth discussions: The Citizens’ Privacy (Protection) Bill 2013 &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Bangalore Privacy Roundtable on &lt;b&gt;April 20, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday &lt;b&gt;April 15, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-17T06:55:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi">
    <title>A Privacy Meeting with the Federal Trade Commission in New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi</link>
    <description>
        &lt;b&gt;On September 20, the Centre for Internet and Society held a roundtable meeting with Betsy Broder, Counsel for International Consumer Protection, and Sarah Schroeder, Attorney, Bureau of Consumer Protection, Federal Trade Commission (FTC), United States. The meeting took place at the Imperial, Janpath, New Delhi and discussed both the U.S framework to privacy and potential frameworks and challenges to privacy in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As a note, thoughts shared during the meeting represented personal perspectives, and did not constitute the official position of the Federal Trade Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When explaining the U.S regulatory framework for privacy the FTC attorneys highlighted that the United States does not have comprehensive privacy legislation, like in Europe,  but instead has  sectoral laws that address different aspects of privacy. For example, the Fair Credit Reporting Act maintains confidentiality of consumer credit report information, the Gramm Leach Bliley Act imposes privacy and security requirements for financial institutions, HIPAA applies to patient health information,  and the Children’s Online Privacy Protection Act prevents the collection and posting of personal information from minors.  It was discussed that the sectoral model followed by the United States allows for a nuanced balance to be struck between privacy protection and the market.  It was noted, however, that some have critiqued the U.S. regulatory framework for lacking clear principles that apply to the commercial world and lay out strong privacy protections for the individual. In light of this, the White House is developing a Privacy Bill of Rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Federal Trade Commission is an independent agency in the United States Government with responsibility for enforcing both consumer protection and competition laws. It is composed of five commissioners, and a staff of roughly 1,000, which includes attorneys and economists. The FTC is primarily a law enforcement agency, but also undertakes policy development through workshops and reports, Consumer education is another key function of the agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the consumer protection side, Congress has directed the FTC to enforce the Federal Trade Commission Act, as well as some more specific statutes, such as those that protect consumers from unwanted telemarketing laws, and the protection of children on line.  Its main objectives are to protect consumer interests, and prevent fraud and unfair and deceptive business practices. The FTC carries out its privacy work through its consumer protection mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When understanding the FTC’s role in relation to privacy, it is important to understand that the FTC’s jurisdiction applies only to certain industries as defined by Congress. Thus, for example, the FTC does not have jurisdiction over banks or telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most critical part of the FTC’s activities is its law enforcement function.  The FTC can investigate an organization if the staff believes that the entity may be involved in conduct that contravenes the FTC Act’s prohibition on unfair or deceptive practices, or another specific privacy law. The FTC has brought a number of privacy-related cases against major companies including Facebook, Google, ChoicePoint, and Twitter.  Many of these cases address new challenges brought about by rapidly changing technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast majority of the FTC’s actions have been settled with consent judgments.  When the statute that the FTC enforces allows for the imposition of a civil penalty, the FTC sets the penalty at a level that ensures that it is fair and provides a deterrent, but will not impose a hardship on the company.  As a civil enforcement agency, the FTC cannot seek criminal sanctions. While enforcement is the cornerstone of the FTC’s approach to privacy, the agency also supports self-regulation, where appropriate.  In this system the FTC does not pre-approve an organization’s practices or define principles that all companies should abide by as it is felt that every organization is unique and has different needs and abilities, and assigning specific technical standards may stifle innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the meeting it was also discussed how US privacy laws may apply to overseas companies where they are providing services for US consumers or working on behalf of US companies.  For example, under the Gramm Leach Bliley Act the FTC has created the Safeguards Rule, which speaks to how financial data by financial institutions must be handled and protected.  This Rule applies to companies overseas if the company is performing work for US companies or US consumers.  In other words, a US company cannot avoid compliance by outsourcing its work to an off shore organization.    Discussions during the meeting also focused on consent and the key role that context, accessibility, and timing play in ensuring individuals have the ability to provide informed consent.  Some of the attendees suggested that this  practice  could be greatly improved in India. For example, currently in India there are companies that only provide consumers access to the company privacy policy after an individual has consented and signed up to the service.  When asked about the challenges to privacy that exist in India, many shared that, culturally, there is a different understanding of privacy in India than in many western countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other thoughts included that the Indian government is currently imagining privacy regulation as being either fluid and purely self regulatory or being enforced through strict legal provisions.  Instead, the government needs to begin to expand the possibilities for a regulatory framework for privacy in India in such a way that allows for strong legal enforcement, and flexible standards.  The right to be forgotten was also discussed and it was mentioned that California has proposed a law that will allow individuals to request deletion of information.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi'&gt;https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-03T10:25:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid">
    <title>A note of dissent on cash transfers and UID</title>
    <link>https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid</link>
    <description>
        &lt;b&gt;The following is the text of a note released by 208 scholars, activists and concerned citizens on the United Progressive Alliance government’s plan to introduce cash transfers linked to the Aadhaar (UID) numbers of beneficiaries:&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;This Op-ed was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/a-note-of-dissent-on-cash-transfers-and-uid/article4256351.ece"&gt;published in the Hindu&lt;/a&gt; on December 31, 2012. Sunil Abraham was one of the signatories.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;We support cash transfers such as old age pensions, widow pensions, maternity entitlements and scholarships. However, we oppose the government’s plan for accelerated mass conversion of welfare schemes to UID-driven cash transfers. This plan could cause havoc and massive social exclusion. We demand the following:&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;i&gt;No replacement of food with cash under the Public Distribution System (PDS).&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The PDS is a vital source of economic security and nutrition support for millions of people. It should be expanded and consolidated, not dismantled.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt;&lt;i&gt;Immediate enactment of a comprehensive National Food Security Act, including universal PDS.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Instead of diverting the public’s attention with promises of mass cash transfers before the 2014 elections, the government should redeem its promise to enact a National Food Security Act (NFSA).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;i&gt;Cash transfers should not be a substitute for public services.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;While some cash transfer schemes are useful, they should complement, not be a substitute for the provision of public services such as health care, school education, water supply, basic amenities, and the PDS. These services remain grossly underfunded.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;i&gt;Expand and improve appropriate cash transfers without waiting for UID.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There is no need to wait for UID to expand and improve positive cash transfer schemes such as pensions, scholarships and maternity entitlements. For instance, social security pensions should be increased and universalised.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;5.&lt;/b&gt; &lt;i&gt;No UID enrolment without a legal framework.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Millions of people are being enrolled for UID without any legal safeguards. The UIDAI’s draft bill has been rejected by a parliamentary standing committee. UID enrolment should be halted until a sound legal framework is in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;6.&lt;/b&gt; &lt;i&gt;All UID applications should be voluntary, not compulsory.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;UID should never be a condition for anyone to access any entitlements or public services. A convenient alternative should always be available.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;i&gt;UID should be kept out of the PDS, NREGA and other essential entitlement programmes for the time being.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Essential services are not a suitable field of experimentation for a highly centralised and uncertain technology. Other applications (e.g. to tax evasion) should be tried first.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;List of signatories: &lt;/b&gt;Sunil Abraham, Centre for Internet and Society; Amiya Kumar Bagchi, Vice-Chancellor, Tripura University; Kiran Bhatty, Senior Fellow, Centre for Policy Research; Nikhil Dey, Mazdoor Kisan Shakti Sangathan; Jean Drèze, Visiting Professor, Allahabad University; S.S. Gill, Director General, CRRID, Chandigarh; Reetika Khera, Assistant Professor, Indian Institute of Technology, Delhi; A.K. Shiva Kumar, Economist; Lawrence Liang, Alternative Law Forum; Nivedita Menon, Professor, Jawaharlal Nehru University; R. Nagaraj, Professor, Indira Gandhi Institute of Development Research; Farah Naqvi, Writer and Activist; Dr. K. Srinath Reddy; Shantha Sinha, National Commission for the Protection of Child Rights; M.S. Swaminathan, Member of Parliament, Rajya Sabha; Sharmila Tagore; Vamsi Vakulabharanam, Reader, University of Hyderabad; Bezwada Wilson, Safai Karamchari Andolan and 190 others.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid'&gt;https://cis-india.org/news/the-hindu-december-31-2012-op-ed-a-note-of-dissent-on-cash-transfers-and-uid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-31T03:15:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/network-of-chains">
    <title>A Network of Chains</title>
    <link>https://cis-india.org/news/network-of-chains</link>
    <description>
        &lt;b&gt;New infotech rules infringe on freedom of expression, make net use near-impossible, writes Arindam Mukherjee. The article was published in the latest issue (May 30, 2011) of Outlook Magazine.&lt;/b&gt;
        
&lt;p&gt;If all goes according to plan, internet users may not be able to put up a strong message or comment about, say, the Congress on the BJP’s website. A simple complaint from a Congress worker or, for that matter, any Indian citizen, can get the comment removed—it could even lead to the website being blocked by the host. Similarly, forceful comments on networking sites like Twitter and Facebook about individuals and on issues of national interest could soon also be history. If anyone wants, a simple complaint can get the comments—or even a user—removed from that network without informing him or her about it.&lt;/p&gt;
&lt;p&gt;The new set of rules gives any citizen the right to complain against any content on any website that they consider objectionable. The new guidelines redefine the rules of the game for online intermediaries—Internet Service Providers, a website, a blog or a blog host, or the online edition of a media company with space for letters to the editor. These intermediaries, who are protected by the government against harmful content generated by third parties, stand to lose their protection if they do not comply and take off the objectionable comments within 36 hours.&lt;/p&gt;
&lt;p&gt;As expected, there is a huge outcry in the online community and in civil society on the implications. Pranesh Prakash, programme manager, Centre for Internet and Society, says, "We are concerned about the overreach of the IT Act. These rules are unconstitutional and violative of Article 19(1)(a) of the Constitution. It is harmful to freedom of speech and does not go by the basic principles of natural justice because only the complainant is heard and not the user."&lt;/p&gt;
&lt;p align="right"&gt;&lt;img src="https://cis-india.org/home-images/pranesh_prakash_thumb.jpg/image_preview" alt="Pranesh" class="image-inline image-inline" title="Pranesh" /&gt;&lt;/p&gt;
&lt;div align="left" class="pullquote"&gt;"These rules violate the Constitution, harm freedom of speech, go against the principles of natural justice."&lt;br /&gt;Pranesh Prakash&lt;br /&gt;Manager, CIS&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new rules provide that anyone can complain against any online content if he thinks it is objectionable and breaches any of the keywords provided under the rules (see graphic). Chakshu Roy of prs Legislative Research, an independent group, says, "The keywords provided under the rules are rather too open to interpretation. This might lead to potential legal complications for internet companies who derive value by allowing people to interact online."&lt;/p&gt;
&lt;p&gt;The tricky part is that the government has said that all disputes over interpretation of the keywords can only be adjudicated by a court of law and that the government or its agencies cannot interpret it. So if your website or content is blocked, the only recourse before you is to knock at the court’s doors. In sum, under the new rules, it would be absolutely impossible for any online entity to carry any comment without getting into some infringement under the new rules. "If internet platforms are held liable for third-party content, it would lead to self-censorship and reduce the free flow of information," says a spokesperson for Google.&lt;/p&gt;
&lt;p&gt;Despite the government arguing otherwise, this is being construed as an indirect way to control the internet and online activity. The new laws will suppress public opinion at a time when the internet is developing into a primary medium to mould as well as express public opinion. Nikhil Pahwa, an avid blogger and editor of Medianama, says, "National security is one thing, but what about civil liberty? Isn’t that being violated here? This is a veiled move to block all public opinion."&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/page_55_20110530.jpg/image_preview" alt="pornographic" class="image-inline image-inline" title="pornographic" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;In recent times, 11 websites and search results have been blocked on the government’s order, apart from over 1,400 requests to Google for removal or blocking of content. Soon, many more websites and portals could be in the firing line and face a block, censure or even closure under the new set of rules.&lt;/p&gt;
&lt;p align="left"&gt;Online protagonists also feel that enough thinking has not gone into the framing of the rules. Subho Ray, president, Internet and Mobile Association of India (iamai), says, "The new rules are arbitrary as it is protecting the interest of one set of citizens while compromising upon that of others." Also, there is ambiguity in the rules on bulk sms carriers and telecom-based content, which should technically fall under user-generated content reaching the masses.&lt;/p&gt;
&lt;p align="left"&gt;Perhaps the most bizarre are the rules regarding cyber cafes, which seek to define not just how the cafes conduct their business but also how a cyber cafe should look and even arrange its furniture. The new guidelines mandate that cyber cafes keep a photo ID record of all users apart from maintaining usage data of individuals—including logs of all websites surfed by them—for one year. The rules even go on to define the physical layout of the cyber cafes.&lt;/p&gt;
&lt;p align="left"&gt;"Today a third of India’s internet usage comes from cyber cafes. If you are putting requirements of photo ID and maintenance of logs of usage of every user, the crowd going to these cafes will move away," says Ray. He also feels that cyber cafes, which are already subject to harassment by local authorities, may find it even more difficult to survive under the new rules. Also, there are serious online security concerns over the functioning of cyber cafes under the new rules. "If you require all cyber cafes to maintain history of all websites visited by a user, including bank accounts and credit card transactions, it will be naive to think that such information will not be misused," says Prakash.&lt;/p&gt;
&lt;p align="left"&gt;Significantly, the new rules also allow the government to access personal data and intercept any conversation or communication without judicial intervention. This, at a time when telephone intercepts by government agencies are being questioned, could lead to further complications. The government asserts that the new rules have been put in place looking at the “best practices" from across the world. But looking at the discontent—and the real danger of misuse—it needs to rethink these strategies.&lt;/p&gt;
&lt;p align="left"&gt;Read the original published in the Outlook &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?271894"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/network-of-chains'&gt;https://cis-india.org/news/network-of-chains&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-23T06:50:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/a-net-of-hatred">
    <title>A Net of Hatred</title>
    <link>https://cis-india.org/news/a-net-of-hatred</link>
    <description>
        &lt;b&gt;Citizens worlwide have been resisiting the threat of internet censorship that governments seek to impose — and justifiably so. But while we have seen democratic revolutions such as the Arab Spring emerge from the power of the net, it is increasingly becoming clear to even the most ardent defender 
&lt;/b&gt;
        &lt;p&gt;This article by Samar Khurshid was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/technology/SocialMedia-Updates/A-net-of-hatred/SP-Article1-889152.aspx"&gt;Hindustan Times&lt;/a&gt; on July 14, 2012. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;h3&gt;The Problem&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the internet, anyone can say anything and largely get away with it, making it a near-perfect means for fanatics. India, in particular, with its religious diversity and history of communal tension, constantly struggles with this issue. Earlier this week, the phrase ‘Internet Hindus’ was trending on popular social media website, Twitter, brought to the fore by a discussion about online religious fundamentalism on Al Jazeera, a news network based in Qatar. The panelists sought to put in context the largely vocal community of internet users who support right-wing Hindu ideology. These ‘Internet Hindus’ have become synonymous with an "abusive, vocal, uncouth group of people who subscribe to Hindu nationalism," said one panellist. The tribe of ‘Twitter jihadis’ is now responding with equal fervour with mostly anonymous fundamentalists who are vocal with their message.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The problem," says Pranesh Prakash, programme manager at the Bangalore-based Centre for Internet and Society (CIS), "is that internet conversations become extreme. Liberals don’t get embroiled in heated arguments while fundamentalists, dedicated to extreme ideologies, tend to win out." Web censorship, he adds, is in vain as the net is too vast to control.&lt;br /&gt;&lt;br /&gt;Online fanaticism is not limited to Hindus. For long, extremist Islamic groups have taken their jihad on to the world wide web. Of late, jihadist groups have mushroomed on social media to expand their base of support. The trend was observed by BBC Islamic Groups Analyst, Murad Batal al-Shishani, on Twitter. Even the recent arrest of Lashkar-e-Toiba’s handler of the 26/11 Mumbai terror attacks, Syed Zabiuddin Ansari alias Abu Jundal, was possible after he was tracked on Facebook trying to recruit young Muslims for 'the cause'. The Afghanistani Taliban, in fact, has its own news website with a running Twitter feed. The site offers the ‘voice of jihad’ with events propagandised from the Taliban perspective – American and Afghan soldiers are referred to as puppets, minions, cowards and even terrorists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic groups, however, are not a major cause of concern for India, according to Prasanto K Roy, a tech analyst and social media commentator. "Jihadist groups are a relatively small minority in India. But right wing Hindu groups have majority support."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The greatest issue, says CIS’s Prakash, is that these fundamentalists are increasingly well-organised and make great efforts to build a stronger extremist position. They are encouraged, he says, by the likes of Janata Party president Subramanian Swamy, who believes that minorities in India should only be given political rights after they acknowledge their Hindu ancestry; Francois Gautier, a French-Indian writer and journalist who supports the cause of Hindutva; and Zakir Naik, a Mumbai-born Islamic televangelist whose controversial opinions often attracts criticism. Prakash also says that on the net, "Many people are not only manufacturing opinion but also manufacturing facts as the basis of that opinion. These falsities are fuelling Right-wing anger."&lt;/p&gt;
&lt;h3&gt;The Solution&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are hard pressed to effectively censor and discourage otherwise reprehensible dialogue. The UPA attempted to tackle what they see as ‘objectionable content’. In December 2011, based on a petition, the government prosecuted internet giants like Yahoo, Google, Twitter and Facebook for hosting offensive material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legally, various sections of the Indian penal code, notably 153A – promoting enmity between communities – can be applied in cases of hate speech. But online speech falls short of being prosecutable, says sociologist Dipankar Gupta. "Something can only be (considered) hate speech if it directly incites people or results in violence, like statements made by Varun Gandhi in the 2009 Lok Sabha elections. Online fundamentalist speech does not cross the boundaries of the law. And we cannot prosecute someone for their opinion."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When a Twitter post asked the question whether certain people could be violating section 153A, the response was far from reasonable, or even civil. One person wrote, "We p*ss on you and your secular section." Another urged others to report the user to Twitter as spam and have him blocked. And of course all this comes with the barrage of by now infamous Twitter terms like 'sickular', 'pseudo secular' or 'Congress Dirty Tricks Department'. They have thousands of followers, even their own websites and are extremely organised.&lt;br /&gt;&lt;br /&gt;"The larger question is whether we should tackle this legally or develop other methods," says Siddharth Narayan, a lawyer with the Alternative Law Forum. "Hate-speech laws have been misused in the past. We don’t need a clampdown on internet freedom. We just need a more nuanced application of existing legislation," he says.&lt;br /&gt;&lt;br /&gt;When looking at net-speak, it is tough to distinguish between generic statements of hate and a genuine call to violence. The internet has no intermediaries; no editors to censure your posts. Then perhaps it bodes ill for India’s secular democracy, and for secularism in the world at large, that uncurbed dialogue, which seeks to crystallise hate between communities, is spreading like an epidemic. CIS’s Prakash says the government cannot cope with this. “But we as society should be strong enough to respond, even if we disagree."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/a-net-of-hatred'&gt;https://cis-india.org/news/a-net-of-hatred&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-20T06:09:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp">
    <title>A multistakeholder discussion on India’s Position in the UN for Internet Governance UN Committee for Internet Related Policies (UN-CIRP)</title>
    <link>https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp</link>
    <description>
        &lt;b&gt;The Federation of Indian Chambers of Commerce &amp; Industry (FICCI) is hosting this event in New Delhi on September 19, 2012 from 10.30 a.m. to 1.00 p.m. Sunil Abraham has been invited as a panelist. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Discussions and debate on the issue of internet governance has increased over the past few years. The entire issue of internet governance has become strikingly important for the internet users, government, Indian industry, mobile and internet service providers, internet companies, social media, civil society, academia as well as youth and women on account of the fact that internet subscriber base has already reached the 125 million mark, and is expected to increase dramatically under the targets established in NTP 2012. Unlike in telecommunications, issues related to internet and data penetration requires not just discussion between government and service providers but cooperation and dialogue amongst a host of other stakeholders – commonly known as Multistakeholder Groups.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;International discourse&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At a global level, after the declaration of the             2005 Tunis Agenda, there is a general agreement that             internet governance structure should be dispersed,             multistakeholder and bottom up rather than top down, and not             controlled by a single entity. There are a number of             proposals pending which seek to address internet governance             issues through a multistakeholder process including at the             UN, IGF and Council of Europe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our role as stakeholders in internet             development will ideally involve a domestic perspective as             well as a need for global engagement to shape the             international dialogue.  The decisions that are being made             over the next few months at international fora, will have a             deep and lasting impact on our businesses, operations,             architecture, revenue streams at one level and access,             diversity, cyber security, content regulation,             multilingualism and management of critical internet             resources at another. Government, in close collaboration             with other stakeholders, has a critical  role, especially             relating to policy making, cyber security, spam, crisis             management, digital piracy, and dispute resolution to name a             few.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;India’s proposal in UN for internet               governance&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In October 2011 the Government of India             submitted a proposal for establishment of a new             institutional mechanism for global internet governance by             way of the United Nations Committee on Internet Related             Policy (UN-CIRP).  The UN-CIRP’s mandate will include inter             alia tasks such as developing and establishing international             public policies relating to global issues of internet;             coordinating and overseeing bodies responsible for the             technical and operational functioning of the internet;             facilitating negotiation of treaties, conventions and             agreements on internet related public policy; address             developmental issues, promote and protect human rights,             including the right to development; undertake arbitrations             and dispute resolution where necessary and crisis management             (detailed statement attached for your ready reference.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIRP which finds its mandate in the Tunis             Agenda 2005 (copy attached) under the process of Enhanced             Cooperation will comprise of 50 member states chosen on             basis of equitable geographic representations, supported by             the regular budget of the United Nations, serviced by UNCTAD             secretariat, reporting directly to the UN General assembly.              It will ensure participation of all relevant stakeholders by             establishing four advisory groups - one each for civil             society, private sector, intergovernmental / international             organizations, and the technical/academic community. It will             also have its own research wing and keep close links with             the IGF – for policy consultations and inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other countries have taken views keeping in             mind their own best interest, including some who wish to             continue with the existing governance process, others who             seek an improvement in the existing process and those who             seek a greater involvement of UN ITU in issues related to             internet governance.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Multistakeholder Consultation&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To have a detailed             multistakeholder discussion FICCI has invited some of the             most influential and informed voices for a panel discussion             and interactive session with experts from 10:30 AM. to 01:00             PM. on Wednesday, 19&lt;sup&gt;th&lt;/sup&gt; September 2012, at FICCI,             Federation House, Tansen Marg, New Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel and audience, apart from being             experts will represent a multistakeholder group across             various functions of the government, private sector, telecom             and internet eco-system related companies, civil society,             academia, legal experts, media organisations, technical             community, and students and women.  An equal number of             experts will also intervene from the audience.  The session             is aimed at discussing in detail India’s proposal of UN-CIRP             and provide multistakeholder inputs which will help inform             and guide further dialogue at the upcoming international             fora such as the 67&lt;sup&gt;th&lt;/sup&gt; UN General Assembly from             September 26&lt;sup&gt;th&lt;/sup&gt; to 6&lt;sup&gt;th&lt;/sup&gt; October 2012, in             New York, IGF from 6&lt;sup&gt;th&lt;/sup&gt; to 9&lt;sup&gt;th&lt;/sup&gt; November             2012 in Baku, and WCIT from 3&lt;sup&gt;rd&lt;/sup&gt; to 14&lt;sup&gt;th&lt;/sup&gt; December 2012, in Dubai.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10.30 &lt;br /&gt;11.00&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Registration and Networking&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00   &lt;br /&gt;11.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Introduction and Agenda Setting - by &lt;br /&gt;Mr. Virat Bhatia, Chairman, FICCI Communication &amp;amp; Digital Economy Committee&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.15 &lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;Panel Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;br /&gt;12.45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Taking stock, next steps and wrap-up by Mr. Virat Bhatia, Chairman, FICCI Communication &amp;amp; Digital Economy Committee&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;Proposed Panelists&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;b&gt;Sl. No.&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Name / Title&lt;/b&gt;&lt;/th&gt;&lt;th&gt;&lt;b&gt;Representing&lt;/b&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;1.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Nitin Desai, Special Advisor to UN Secretary General on Internet Governance and Chairman of Multistakeholder Advisory Group for Internet Governance Forum (Formerly)&lt;/td&gt;
&lt;td&gt;Internet Governance  specialist&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;2.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Ambassador A Gopinathan, India’s Permanent Representative to UN in Geneva (Formerly) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Leading Diplomat Internet Governance&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;3.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Senior official from Department of Electronics &amp;amp; IT, Government of India *&lt;/td&gt;
&lt;td&gt;Government &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;4.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Paranjoy Guha Thakurta, President, Foundation for Media Professionals, India&lt;/td&gt;
&lt;td&gt;Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;5.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Parminder Jeet Singh, Executive Director, IT for Change&lt;/td&gt;
&lt;td&gt;Civil Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;6.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Sunil Abraham, Executive Director, Center for Internet and Society&lt;/td&gt;
&lt;td&gt;Civil Society&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;7.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Rajesh Chharia, President, Internet Service Providers Association of India (ISPAI)  &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;ISP&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;8.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Naresh Ajwani, Member, NRO NC-Asia Pacific Network Information Center (APNIC) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Industry&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;9.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Member of Parliament*&lt;/td&gt;
&lt;td&gt;Politics&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;10.&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;Mr. Rajan Mathews, Director General, Cellular Operators Association of India (COAI)  &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mobile Operators &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;* Invited. Confirmation awaited.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;See &lt;a href="https://cis-india.org/internet-governance/blog/india-statement-un-cirp" class="internal-link"&gt;India's Statement Proposing UN Committee for Internet-Related Policy&lt;/a&gt;&lt;br /&gt;See the &lt;a href="https://cis-india.org/internet-governance/tunis-agenda-for-the-information-society" class="internal-link"&gt;Tunis Agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp'&gt;https://cis-india.org/news/multi-stakeholder-discussion-on-indias-position-in-the-un-for-un-cirp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-17T09:49:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india">
    <title>A Methods Workshop for Researching Future of Work in India</title>
    <link>https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society and the Department of Management Studies, Indian Institute of Technology (IIT) Delhi is conducting a workshop in New Delhi on March 28, 2018.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Read the event report in pdf format &lt;a href="https://cis-india.org/internet-governance/pdf-methods-workshop-fow" class="internal-link" title="PDF Methods Workshop FOW"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Industry 4.0 is widely understood as the technical integration of cyber physical systems into production and logistics, and the use of IoTs and services in processes, which are designed to bring about significant changes in business models, downstream services and work organisations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Labour markets are complex and are impacted by wide variety of contextual factors such as policy, informal sectors, and immigration. Technological adoption is increasingly a key factor impacting labour markets. The impact and effect of technological adoption is also complex.Questions such as whether the technology is augmenting the job, automating the job/parts of the job, digitizing the job/part of the job, and if this is resulting in unemployment or a change and re-shuffling in tasks arise. In a similar vein, as pointed out in a 2017 McKinsey Report on labour markets in India, declining labourparticipation also does not necessarily equate to unemployment and could mean instead more people are staying in education etc. International studies have concluded that jobs in developing countries will be more at risk than those in developed countries because of a larger workforce employed in routine jobs, yetit is unclear if these studies have fully accounted for context and local labour market structures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With the goal of exploring research questions and methodologies and facilitating the exchange of ideas, prior to commencing research, CIS in collaboration withthe Department of Management at IITD, will organise a roundtable on the 28th of March 2018 from 10am - 4pm at Committee room, 4th floor, Vishwakarma Bhawan,Dept of Management Studies, IIT Delhi . The event will bring experts and relevant stakeholders together to discuss research questions, methodologies, and sources of data necessary for researching the impact of automation on labour markets in developing countries.&lt;/p&gt;
&lt;h3&gt;Questions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;What are the kinds of quantitative and qualitative changes in employment in response to technological adoption that need to be studied? What methods are needed to study these? What data is needed to study these?&lt;/li&gt;
&lt;li&gt;What are the policy processes that are most critical for the research to speak to? Will it be focussed on education? Re-skilling? Market control?&lt;/li&gt;
&lt;li&gt;Who are the key stakeholders needed to engage with to undertake this research with respect to the quantitative, qualitative, and policy oriented research.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Agenda (Tentative)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;10:00 a.m. Welcome and Tea&lt;/li&gt;
&lt;li&gt;10:30 a.m. to 11:30 a.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 1: Exploring Research Questions for the Study of Future of Work&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;11:30 a.m. to 12:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 2: Primary Data and the Future of Work: Challenges and Prospects&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12:30 p.m. to 1:30 p.m.Lunch&lt;/li&gt;
&lt;li&gt;1:30 p.m. to 2:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 3: Research Methodologies for the Future of Work&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2:30 p.m. to 3:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 4: Identifying Stakeholders for the studying Future of Work&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;3:30 p.m. to 4:00 p.m. Evening High Tea&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india'&gt;https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-03-05T18:59:11Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct">
    <title>A Megacorp’s Basic Instinct </title>
    <link>https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct</link>
    <description>
        &lt;b&gt;Bolstered by academia and civil society, TRAI stands its ground against FB’s Free Basics publicity blitz.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/article/a-megacorps-basic-instinct/296510"&gt;published in Outlook&lt;/a&gt; on February 8, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Hours before the January 31 deadline for telecom regulator TRAI to give its opinion on Facebook’s controversial and expensive Free Basics pitch—which seeks to give India’s poor “free” access to certain partner websites—the consensus seems to be building up against the soc­ial media giant. “If there is cannibalising of the internet through services like Free Basics, the internet will be split; it will parcel out and slice the internet. Its future is at stake,” says a senior government official on condition of anonymity.&lt;br /&gt;&lt;br /&gt;In a climate where the tech-savvy Modi government is seen to be close to the online trinity of Facebook, Google and Twitter, TRAI’s defiant stance in favour of net neut­rality stands out. There’s a lot at stake. India’s position becomes crucial as few countries in the world have clearly defined laws on net neutrality or have taken a stand on it. For Facebook, there’s a lot more at stake. India is its second-largest user base after the US (it is banned in China), so it is leaving no stone unturned. The massive Rs 300-crore electronic and print media campaign is an indication of that.&lt;br /&gt;&lt;br /&gt;TRAI sources say they are ready for any adverse onslaught and they are under no pressure from the PMO. The view gaining ground in government is that FB is trying to create a walled garden where it controls what people see and surf and what they can access online. While this will be offered to consumers for free—the technical term is differential pricing—the websites part of Free Basics will have to pay for being on the platform. Outlook’s queries to FB remained unanswered at the time of going to press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At an ‘open house’ meeting to discuss TRAI’s consultation paper on  differential pricing last week, regulator Ram Sevak Sharma stood firm  against the barrage of pro-Free Basics opinions that flowed from FB,  telecom operators and some members of the public. TRAI’s message was  clear: FB’s tactics of moulding public opinion by stealth will not be  acceptable in India. In the past few weeks, there have been bitter  exchan­ges between TRAI and FB over the latter’s responses to a  consultation paper on differential pricing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI’s defiant stand draws from an unp­recedented show of strength by civil society against Free Basics and FB’s intentions. Says former Aadhar man Nandan Nilekani, “Free Basics is certainly against net neutrality. How can a solution be neutral, if it disproportionately benefits a particular web­site or business on the internet? Today, 400 million Indians are online. They came online because of the inherent value the internet offers. How can a walled garden of 100-odd websites provide the same value?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What does Free Basics mean for PM Modi’s Digital India campa­ign? Being a walled garden, thousands of start-ups with­out adequate budgets to pay for such dedicated service will be forced to stay out of it. Similar questions are being raised about government services that are increa­singly coming online. The concern is that all government traffic will have to pass through FB servers. The senior government official quoted above agrees, “In such a scenario, the government will have to approach FB to make its websites accessible on the free service which is neither desirable nor safe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other fear is what happens to public data if it goes through a service like Free Basics. There is fear that a lot of government and public data will be put through Free Basics once government services start coming online. If Free Basics is for the poor who are also beneficiaries of government services, FB too can access this data. Says Prabir Purkayastha, chairman, Knowledge Commons, “FB says public service will be available through Free Bas­ics but can public service be given through a private initiative? Public data is valuable and can’t be handed over to a private company.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Few again are convinced by FB’s claim that Free Basics aims to make the internet accessible to the poor, with the many services offered through it. “The claim that the poor will get access to the internet is false,” warns Sunil Abraham, executive director, Centre for Internet and Society, Bangalore. “Free Basics gives access to less than 100 of the one billion plus websites on the world wide web. Those in the walled garden will be treated quite differently.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What gives TRAI a shot in the arm is that, for the first time, academia has put its weight behind Free Basics opponents. In a signed statement, several IIT and IISc Bangalore professors have said that Free Basics won’t serve the purpose FB is proposing and is not good for the country. “The problem is the inter­net being provided (via Free Basics) is a shrunken and sanitised version of the real thing. Free Basics is not a good proposal for the long-term development of a healthy and democratic internet setup in India,” says Amitabha Bagchi, IIT Delhi professor and one of the signatories to the memo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, many of the experts &lt;i&gt;Outlook&lt;/i&gt; spoke to say that the  government, and not FB, should be responsible for providing free  internet to the people. Says Parminder Jeet Singh, executive director,  IT for Cha­nge, “The government is sitting on Rs 40,000 crore of USO  funds. It can surely utilise that to provide a free basic data package  to people in India. Basic government services and emergency services  should essentially be free.” Nilekani is also in fav­our of the  gover­nment providing free internet to people. “The internet is a  powerful poverty alleviation tool.... Government can do a direct benefit  transfer for data, a more mar­ket-neutral way of achieving the goal of  getting everyone on the internet,” he told &lt;i&gt;Outlook&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legally, though, there may be issues in stopping FB from introducing its Free Bas­ics platform in India. Says Singh, “Techni­cally, the Indian government may not be able to stop FB from introducing Free Basics in India as it is just a platform. What the government has to do is to stop telcos from collaborating with it for free internet because Indian telcos, not FB, mediate access to the internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The demand for the government and TRAI to come clean on net neutrality has reached fever pitch. Experts like Nilekani feel that net neutrality, which does not allow zero rating and differential pricing based on telcos looking at the contents of the subscriber’s data packets, should be enshrined in law through an act of Par­liament, the way countries like the US have done. TRAI has also proposed two models where the internet is provided free initially and charged at a later stage and another where content providers and websites reim­burse the cost of browsing directly to consumers. Both these proposals have not found favour with experts who say that these are unworkable and only the government should disburse free internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In any case, all this is a matter of detail—important, no doubt. The key question is, what happens to Free Basics if TRAI rules in favour of net neutrality and goes against FB? “This is going to be a long-drawn-out battle as FB will certainly challenge this in court,” says the government official. After spending Rs 300 crore on publicity, there is no way it will roll over and die.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct'&gt;https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-04T13:53:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill">
    <title>A look at two problematic provisions of the draft Anti-trafficking bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill</link>
    <description>
        &lt;b&gt;This post examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability. &lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;On 28 Feb 2018, the Union Cabinet approved                   ‘The Trafficking of Persons (Prevention, Protection                   and Rehabilitation) Bill, 2018’ (‘the bill’) for                   introduction to the Parliament. This comes after a                   series of consultations on an earlier 2016 draft bill,                   that had faced its fair share of &lt;a href="https://scroll.in/article/813268/six-counts-on-which-the-draft-anti-trafficking-bill-fails-short" target="_blank"&gt;criticism&lt;/a&gt;. As per the Press Information Bureau &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=176878" target="_blank"&gt;announcement&lt;/a&gt;, the Ministry of Women and Child                   Development met with various stakeholders including 60                   NGOs and have incorporated many of the suggestions put                   forth. They’ve also stated that ‘the new law will make                   India a leader among South Asian countries to combat                   trafficking.’&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;However, at first glance, there appear to be                   several issues with overbroad or vague language used                   in the drafting of the bill, that stretch it into                   potentially problematic areas. This current post will                   focus on two such provisions that could lead to a                   deleterious effect on the Freedom of Expression. As                   the bill is currently not publicly available, a                   stakeholder’s copy of the draft is being used to                   source these provisions. The relevant sections have                   been reproduced below for convenience. (Emphasis in                   bold is as provided by the author).&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section                     39: Buying or Selling of any person&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;39. (l) Whoever buys or sells any person                     for a consideration, shall be punished with rigorous                     imprisonment for a term which shall not be less than                     seven years but may extend to ten years, and shall                     also be liable to fine which shall not be less than                     one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever solicits or publicises                     electronically, taking or distributing obscene                     photographs or videos or providing materials or                     soliciting or guiding tourists or using agents or                     any other form &lt;strong&gt;which may lead                       to the trafficking of a person shall be punished&lt;/strong&gt; with rigorous imprisonment for a term which shall                     not be less than five years but may extend to ten                     years, and shall also be liable to fine which shall                     not be less than fifty thousand rupees but which may                     extend to one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The grammatical acrobatics of section 39(2)                   aside, this anti-solicitation provision is severely                   problematic in that it mandates punishment even for a                   vaguely defined action or actions that may not                   actually be connected to the trafficking of a person.                   In other words, the provision doesn’t require any of                   the actions to be connected to trafficking in their                   intent or even outcome, but only in &lt;em&gt;potential&lt;/em&gt; &lt;em&gt;connection&lt;/em&gt; to the outcome. At the same time, it says these                   ‘shall’ be punished!&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This vagary that ignores actual or even                   probabilistic causation flies in the face of standard                   criminal law which requires &lt;em&gt;mens rea&lt;/em&gt; along with &lt;em&gt;actus                     rea&lt;/em&gt;. The excessively wide scope of this badly                   drafted provision leaves it prone to abuse. For                   example, currently the provision allows the following                   interpretation to be included: ‘Whoever publicizes                   electronically, by providing materials in any form,                   which may lead to trafficking of a person shall be                   punished…’. Even the electronic publicizing of an                   academic study on trafficking could fall under the                   provision as it currently reads, if it is argued that                   publishing studies that show the prevalence of                   trafficking ‘may lead to the trafficking of a person’!                   It is not hard to imagine that an academic study that                   shows trafficking numbers at embarrassingly high rates                   could be threatened with this provision. Similarly,                   any of our vast number of self-appointed moral                   guardians could also pull within this provision any                   artistic work that they may personally find offensive                   or ‘obscene’. Simply put, without any burden of                   showing a causal connect, it could be argued that &lt;em&gt;anything&lt;/em&gt; ‘may                   lead’ to the trafficking of a person. Needless to say,                   this paves the way for a severe chilling effect on                   free speech, especially on critical speech around                   trafficking issues.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section 41: Offences related to media&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;41. (l) Whoever commits trafficking of a                     person with the aid of media, including, but not                     limited to print, internet, digital or electronic                     media, shall be punished with rigorous imprisonment                     for a term which shall not be less than seven years                     but may extend to ten years and shall also be liable                     to fine which shall not be less than one lakh                     rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever &lt;strong&gt;distributes,                       or sells or stores&lt;/strong&gt;, in any form in any                     electronic or printed form showing incidence of                     sexual exploitation, sexual assault, or rape for the                     purpose of exploitation or for coercion of the                     victim or his family members, or for unlawful gain &lt;strong&gt;shall be                       punished&lt;/strong&gt; with rigorous imprisonment for a term                     which shall not be less than three years but may                     extend to seven years and shall also be liable to                     fine which shall not be less than one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The drafters of this bill have perhaps                   overlooked the fact that unlike the physical world,                   the infrastructure of the electronic / digital world                   requires 3rd party intermediaries to handle                   information during most forms of electronic                   activities, whether it is transmission, storage or                   display. As it is not feasible, desirable or even                   practically possible for intermediaries to verify the                   legality of every bit of data that gets transferred or                   stored by the intermediary, ‘safe harbours’ are                   provided in law for intermediaries, protecting them                   from liability of the information being transmitted                   through them. These ensure that entities that act as                   architectural requirements and intermediary platforms                   are able to operate smoothly and without fear. If                   intermediaries are not granted this protection, it                   puts them in the unenviable position of having to                   monitor un-monitorable amounts of data, and face legal                   action for the slip-ups that are bound to happen                   regularly. Furthermore, there are several levels of                   free speech and privacy issues associated with having                   multiple gatekeepers on the expression of speech                   online. A charitable reading of the intent of a                   provision which does not recognise safe harbours for                   3rd party intermediaries, would be that the drafters                   of the bill have simply not realised that users who                   upload and initiate transfer of information online,                   are not the same parties who do the actual                   transmission of the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Distribution, selling or storing of                   information online would require the transmission of                   information over intermediaries, as well as the                   temporary storage of such information on intermediary                   platforms. In India, intermediaries engaging with                   transmission or temporary storage of information are                   provided safe harbour&lt;a href="imap://prasad@mail.cis-india.org:143/fetch%3EUID%3E/INBOX%3E176833#_ftn1"&gt;[1]&lt;/a&gt; by Section 79 of the Information Technology Act, 2000                   (‘IT Act’), so long as they:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(i) act as a mere ‘conduit’ and do not                   initiate the transmission, select the receiver of the                   transmission, or select or modify the information                   contained in the transmission.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(ii) exercise due diligence while                   discharging duties under this Act, and observes other                   guidelines that the Central Government may prescribe.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Information Technology (Intermediary                   Guidelines) Rules, 2011, list out the nature of the                   due diligence to be followed by intermediaries to                   claim exemption under Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Intermediaries will not be granted safe                   harbour if they have conspired, abetted, aided or                   induced commission of the unlawful act, or if they do                   not remove or disable access to information upon                   receiving actual knowledge, or notice from the                   Government, of the information that is transmitted or                   stored by the intermediary being used for unlawful                   purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Thus it can be seen that the IT Act already                   provides an in-depth regime for intermediary                   liability, and given its &lt;em&gt;non-obstante &lt;/em&gt;clause                   which states that Section 79 of the IT Act would apply                   “Notwithstanding anything contained in any law for the                   time being in force” ,&amp;nbsp;                   as well as the reiteration of the IT Act’s                   overriding effect via Section 81, which states that                   the provisions of the Act ‘shall have effect                   notwithstanding anything inconsistent therewith                   contained in any other law for the time being in                   force’ (barring the exercise of copyright or patent                   rights), it is generally considered the appropriate                   legal framework for this issue. However, it appears                   that the drafters of the 2018 Anti-trafficking bill                   have not considered this aspect at all, since they                   have not referenced the IT Act in this context in the                   bill, and have additionally added their own &lt;em&gt;non-obstante &lt;/em&gt;clause                   in Section 59 of the bill:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;59.&lt;em&gt; The provisions                     of this Act, shall be in addition to and not in                     derogation of the provisions of any other law for                     the time being in force and, in case of any                     inconsistency, the provisions of this Act shall have                     overriding effect on the provisions of any such law                     to the extent of the inconsistency.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;So the regime as prescribed by the IT Act                   allows for safe harbours, whereas the regime as                   prescribed by the Anti-Trafficking bill does not allow                   for safe harbours, and both say that they would an                   overriding effect for any conflicting law. This                   legislative bumble could potentially be solved by                   using the settled principle that a special Act                   prevails over a general legislation. This is still a                   little tricky as they are technically both special                   Acts. It could be argued that given the context of the                   Anti-trafficking bill as focusing on trafficking, and                   the context of the IT Act focusing on the interface of                   law and technology, that for the purposes of Section                   41(2) of the Anti-trafficking bill, the IT Act is the                   special legislation. And thus Section 79 of the IT Act                   should make redundant the relevant portion of Section                   41(2) of the Anti-trafficking bill. This reading would                   require the bill to be modified so as to remove the                   redundancy and the conflicting portion of Section                   41(2).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[1] In 2016, a division bench of the Delhi High Court held in the case of Myspace Inc vs Super Cassettes Industries Ltd that a safe harbour immunity for intermediaries was necessary as it was not technically feasible to pre-screen content from third parties, and that tasking intermediaries with this responsibility could have a chilling effect on free speech, It held that their responsibility was limited to the extent of acting upon receiving ‘actual knowledge’. Earlier, in determining what ‘actual knowledge’ refers to, in 2015 the Supreme Court of India in the landmark case of Shreya Singhal vs Union of India, required this to be in the form of a notice via a court or government order. Thus under our current law, intermediaries are granted a safe harbour from liability so long as they act upon court or government orders which notify them of content that is required to be taken down.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Clarification (18th August, 2018): A letter sent to the Ministry of Women and Child Development mentioned the Centre for Internet &amp;amp; Society as instituionally endorsing a critique of the The Trafficking of Persons (Prevention, Protection and Rehabilitation) Bill, 2018. We seek to clarify that the Centre for Internet &amp;amp; Society did not endorse the letter to the Ministry.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill'&gt;https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-08-18T09:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">
    <title>A lifetime of five years on the internet</title>
    <link>https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet</link>
    <description>
        &lt;b&gt;Centre for Internet and Society observes its fifth anniversary on Sunday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Subir Ghosh was &lt;a class="external-link" href="http://www.dnaindia.com/bangalore/1836745/report-a-lifetime-of-five-years-on-the-internet"&gt;published in DNA on May 19, 2013&lt;/a&gt;. Sunil Abraham is quoted in this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Five years is a long time in the internet space. The past five years, certainly, has been. And so has it been for the Centre for Internet and Society that completes five years here.&lt;br /&gt;&lt;br /&gt;When a group of citizens got together to come under a platform called CIS five years ago, they had wanted to work on policy issues about the internet that had a bearing on society. They, in fact, still do; except that the new media space itself has undergone a metamorphosis. Five years ago social media was just starting off, few people had smart phones, and online speech was not a burning issue.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of city-based CIS, affirms this, and goes on to assert: “Five years ago, privacy was not a mainstream concern. Today, many different actors and stakeholders are interested in the configuration of the draft Privacy Bill. We first warned the public about the draconian measures in the IT Act during the 2008 amendment. Four years later, many more people are familiar with problematic sections and are adopting various strategies to amend the Act and it’s associated rules.”&lt;br /&gt;&lt;br /&gt;Likewise, five years ago, people dismissed “shared spectrum” as a pipe dream; today “shared spectrum” is mentioned in the National Telecom Policy. CIS usually thinks ahead, and works on a range of issues.&lt;br /&gt;&lt;br /&gt;“For internet adoption in India to grow dramatically from the dismal statistics today, we need to ensure continued access to cheap devices and affordable and ubiquitous broadband,” says Abraham.&lt;br /&gt;&lt;br /&gt;“With Ericsson suing Micromax for Rs100 crore, the mobile wars have come to India. If we have to protect innovation in sub-100 dollar devices, we need to configure our patent and copyright policy carefully.”&lt;br /&gt;&lt;br /&gt;But since CIS works primarily on policy issues, shouldn’t it have been based in Delhi rather than in Bangalore? “We do have a small office in Delhi. But we are headquartered in Bangalore because we need to keep learning from technologists and the technical community,” explains Abraham.&lt;br /&gt;&lt;br /&gt;When an organisation calling itself the Centre for Internet and Society (www.cis-india.org) observes its fifth anniversary, it shouldn’t surprise anyone that many of the activities related to the anniversary celebrations (May 20-23) have precious little to do with the internet, and is more about society itself. And yes, an entire evening is devoted to Kannada. There’s a talk by Chandrashekhara Kambara on ‘Kannada in the modern era,’ and another by UB Pavanaja titled ‘From Palm Leaf to Tablet – Journey of Kannada’.&lt;br /&gt;&lt;br /&gt;“We are looking at the complete eco-system. For instance, during the digitalisation of TV in India, what will happen to the internet? Do TV promoting policies undermine the growth of broadband? On the second day we look at the connection between another older technology - cinema and the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet'&gt;https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-20T09:04:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life">
    <title>A Large Byte of Your Life</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life</link>
    <description>
        &lt;b&gt;With the digital, memory becomes equated with storage. We commit to storage to free ourselves from remembering.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/a-large-byte-of-your-life/"&gt;published in Indian Express&lt;/a&gt; on April 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This is the story of a broken Kindle. A friend sent a message to a WhatsApp group that I belong to that she is mourning the loss of her second-generation Kindle, that she bought in 2012, and since then had been her regular companion. It is not the story of hardware malfunction or a device just giving up. Instead, it is a story of how quickly we forget the old technologies which were once new. The friend, on her Easter holiday, was visiting her sister, who has a six-year-old daughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This young one, a true digital native, living her life surrounded by smart screens, tablets, phones, and laptops, instinctively loves all digital devices and plays with them. In her wanderings through her aunt’s things, she came across the old Kindle — unsmart, without a touch interface, studded with keys, not connected to any WiFi, and rendered in greyscale. It was an unfamiliar device. But with all the assurance of somebody who can deal with digital devices, she took it in her hands to play with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much to her dismay, none of the regular modes of operation worked. The old Kindle did not have a touch screen operated lock. It wasn’t responding to scroll, swipe and pinch. It had no voice command functions. As she continued to cajole it to come to life, it only stared at her, a lock on the digital interface, refusing to budge to the learned demands and commands of the new user. After about 20 minutes of trying to wake the Kindle up, she became frustrated with it and banged it harshly on the table, where it cracked, the screen blanked out and that was the end of the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or rather, it is the beginning of one. As my friend registered the loss of her clunky, clumsy, heavy, non-intuitive Kindle, and messages of grief poured in, with the condolence that the new ones are so much better and the assurances that at least all her books are safe on the Amazon cloud, I see in this tale, the quest of newness that the digital always has to offer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If it has missed your attention, the digital is always new. Our phones get discarded every few seasons, even as phone companies release new models every few months. Our operating systems are constantly sending us notifications that they need to be updated. Our apps operate in stealth mode, continuingly adding updates where bugs are fixed and features are added. Most of us wouldn’t know what to do if we were faced with a computer that doesn’t “heal”, “backup” or “restore” itself. If our lives were to be transferred back to dumb phones, or if we had to deal with devices that do not strive to learn and read us, it might lead to some severe anxiety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The newness that the digital offers is also found in our socially mediated lives. Our digital memories are short-lived — relationships rise and fall in the span of days as location-based dating apps offer an infinite range of options to choose your customised partner; celebrities are made and unmade overnight as clicks lead to viral growth and then disappear to be replaced by the next new thing; communities find droves of subscribers, only to become a den of lurkers where nothing happens; must-have apps find themselves discarded as trends shift and new must-haves crop up overnight. Breathless, bountiful and boundless, the digital keeps us constantly running, just to be in the same place, always the same and yet, always new.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would be hard pressed to remember that magical moment when we first discovered a digital object. For millennials, the digital is such a natural part of their native learning environments that they do not even register the first encounter or the subsequent shifts as they navigate across the connected world. Increasingly, we tune ourselves to the temporality and the acceleration of the digital, tailoring our memories to what is important, what is now, and what is immediately of use, excluding everything else and dropping it into digital storage, assured in our godlike capacities to archive everything.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This affordance of short digital memories is enabled partly by the fact that we are subject to information overload, but partly also to the fact that our machines can now remember, more accurately and more robustly than the paltry human, prone to error and forgetfulness. With the digital, memory becomes equated with storage, and the more we commit to storage, the more we free ourselves from the task of remembering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broken Kindle is a testimony not only to the ways in which we discard old devices but also our older forms of individual and collective memory — quickly doing away with information that is not of the now, that is not urgent, and that does not have immediate use value. My friend’s Kindle got replaced in two days. All her books were re-loaded and she was set to go. However, as she told me in a chat, she is not going to throw away her old broken Kindle. Because she wants to remember it — remember the joy of reading her favourite books on it. She is scared that if she throws it away, she might forget.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life'&gt;https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T03:35:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
