<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 766 to 780.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/policy-officer-ig"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cy-fy-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2017-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-shaikh-zoaib-saleem-september-20-2017-should-you-worry-about-identity-theft"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake">
    <title>Majority of top politicians' Twitter followers fake: audit</title>
    <link>https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake</link>
    <description>
        &lt;b&gt;A majority of Twitter users following top Indian politicians, including prime minister Narendra Modi, are fake, according to an audit site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Furquan Moharkan was published in &lt;a class="external-link" href="http://www.deccanherald.com/content/639075/bots-following-modi-rahul-kejriwal.html"&gt;Deccan Herald&lt;/a&gt; on October 24, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Leaders cutting across party lines generate popularity on social media  using bots, or automated software, according to the data-analytics  website TwitterAudit.&lt;br /&gt;&lt;br /&gt;Delhi chief minister Arvind Kejriwal, Modi,  and Congress vice president Rahul Gandhi have a combined Twitter  credibility of just 35%. In other words, 65 out of 100 followers are  fake.&lt;br /&gt;&lt;br /&gt;Kejriwal, with 1.24 crore followers, has a low credibility  of 22.9% on Twitter, according to TwitterAudit. A good 96.34 lakh of  Kejriwal’s followers are bots.&lt;br /&gt;&lt;br /&gt;Modi, who has two personal Twitter  handles (@narendramodi and @narendramodi_in), has a combined  credibility of just 37.4%. On the handle @narendramodi, of 3.5 crore  followers, just 1.3 crore followers are said to be authentic. The  remaining 2.2 crore are marked as bots by TwitterAudit.&lt;br /&gt;&lt;br /&gt;The handle @narendramodi_in has 5.99 lakh authentic followers, and 8.01 lakh are again marked as bots.&lt;br /&gt;&lt;br /&gt;Congress  heir apparent Rahul Gandhi, relatively new to social media, has seen  much traction of late. His credibility score is 51.6% on Twitter.&lt;br /&gt;&lt;br /&gt;While 19.73 lakh of his followers are authentic, 18.51 lakh are said to be fake.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;Rahul’s story&lt;/b&gt;&lt;br /&gt;Rahul  Gandhi’s handle ‘OfficeofRG’ has been in the news, with a spike in  retweets being cited by rivals in the BJP as evidence of bots at work.&lt;br /&gt;&lt;br /&gt;The  handle got 2,784 retweets in September, as compared to 2,506 for Modi  and and 1,722 for Kejriwal. In October, he’s scoring even better, with  3,812 retweets.&lt;br /&gt;&lt;br /&gt;Sites like TwitterAudit are helpful, but their  results are guesses based on various assumptions about ‘bot-like’  qualities, according to an expert.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, Policy  Director at Centre for Internet and Society, told DH some users were  also out on ‘false flag operations,’ besmirching opponents by ‘exposing’  their usage of bots. “The idea that social media bots can shape popular  discourse, as is often supposed to be the case with Brexit, is not  backed by research,” he said. “A study by Enders Analysis shows the  opposite to be the case.”&lt;br /&gt;&lt;br /&gt;The score by TwitterAudit is based on the number of tweets, date of the last tweet, and ratio of followers to friends.&lt;br /&gt;&lt;br /&gt;A  news agency alleged the traction came from ‘bots’ with Russian, Kazakh  or Indonesian handles routinely retweeting Rahul’s posts.&lt;br /&gt;&lt;br /&gt;Infact, Prime Minister Office handle (@PMOIndia) also has a low credibility of 39.6%, according to twitter audit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake'&gt;https://cis-india.org/internet-governance/news/deccan-herald-furquan-moharkan-october-24-2017-majority-of-top-politicians-twitter-followers-fake&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T01:10:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy">
    <title>ICANN’s Problems with Accountability and the .WEB Controversy</title>
    <link>https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy</link>
    <description>
        &lt;b&gt;The Post-Transition IANA promised enhanced transparency and accountability to the global multistakeholder community.  The  series of events surrounding the .WEB auction earlier this year has stirred up issues relating to the lack of transparency and accountability of ICANN.  This post examines the .WEB auction as a case study to better understand exact gaps in accountability.&lt;/b&gt;
        &lt;h2&gt;Chronological Background of the .WEB Auction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In June 2012, ICANN launched a new phase for the creation and operation of Generic Top-Level Domains (gTLDs). After confirming the eligibility of seven applicants for the rights of the .WEB domain name, ICANN placed them in a string contention set (a group of applications with similar or identical applied for gTLDs).&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;[&lt;i&gt;Quick Note&lt;/i&gt;: ICANN procedure encourages the resolving of this contention set by voluntary settlement amongst the contending applicants (also referred to as a private auction), wherein individual participation fees of US $185,000 go to ICANN and the auction proceeds are distributed among the bidders. If a private auction fails, the provision for a last resort auction conducted by ICANN is invoked - here the total auction proceeds go to ICANN along with the participation fees.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In June 2016, NuDotCo LLC, a bidder that had previously participated in nine private auctions without any objection, withdrew its consent to the voluntary settlement. Ruby Glen LLC, another bidder, contacted NDC to ask if it would reconsider its withdrawal, and was made aware of changes in NDC’s Board membership, financial position, management and a potential change in ownership, by NDC’s Chief Financial Officer.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Concerned about the transparency of the auction process, Ruby Glen requested ICANN to postpone the auction on June 22, in order to investigate the discrepancies between NDC’s official application and its representation to Ruby Glen.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The Vice President of ICANN’s gTLD Operations and the independent ICANN Ombudsman led separate investigations, both of which were limited to few e-mails seeking NDC’s confirmation of status quo. On the basis of NDC’s denial of any material changes, ICANN announced that the auction would proceed as planned, as no grounds had been found for its postponement.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On July 27, NDC’s winning bid – USD 135 million – beat the previous record by $90 million, &lt;i&gt;doubling ICANN’s total net proceeds&lt;/i&gt; from the past fifteen auctions it had conducted.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Soon after NDC’s win, Verisign, Inc., the market giant that owns the .com and .net domain names, issued a public statement that it had used NDC as a front for the auction, and that it had been involved in its funding from the very beginning. Verisign agreed to transfer USD 130 million to NDC, allowing the latter to retain a $5 million stake in .WEB.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Ruby Glen LLC filed for an injunction against the transfer of .WEB rights to NDC, and sought expedited discovery&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; against ICANN and NDC in order to gather evidentiary support for the temporary restraining order.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Donuts Inc., the parent company of Ruby Glen, simultaneously filed for recovery of economic loss due to negligence, fraud and breach of bylaws among other grounds, and Affilias, the second highest bidder, demanded that the .WEB rights be handed over by ICANN.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Furthermore, at ICANN57, Affilias publicly brought up the issue in front of ICANN’s Board, and Verisign followed with a rebuttal. However, ICANN’s Board refused to comment on the issue at that point as the matter was still engaged in ongoing litigation.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Issues Regarding ICANN’s Assurance of Accountability&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Post-Transition IANA promised enhanced transparency and accountability to the global multistakeholder community.  The  series of events surrounding the .WEB auction has stirred up issues relating to the lack of transparency and accountability of ICANN.  ICANN’s arbitrary enforcement of policies that should have been mandatory, with regard to internal accountability mechanisms, fiduciary responsibilities and the promotion of competition, has violated Bylaws that obligate it to operate ‘consistently, neutrally, objectively, and fairly, without singling out any particular party for discriminatory treatment’.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the US court ruled in favour of ICANN, the discrepancies that were made visible with regard to ICANN’s differing emphasis on procedural and substantive compliance with its rules and regulations, have forced the community to acknowledge that corporate strategies, latent interests and financial advantages undermine ICANN’s commitment to accountability. The approval of NDC’s ridiculously high bid with minimal investigation or hesitation, even after Verisign’s takeover, signifies pressing concerns that stand in the way of a convincing commitment to accountability, such as:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;The Lack of Substantive Fairness and Accountability at ICANN (A Superficial Investigation)&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;ICANN’s Sketchy Tryst with Legal Conformity&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;The Financial Accountability of ICANN’s Auction Proceeds&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The Lack of Substantive Fairness and Accountability in its Screening Processes: &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Ruby Glen’s claim that ICANN conducted a cursory investigation of NDC’s misleading and unethical behaviour brought to light the ease and arbitrariness with which applications are deemed valid and eligible. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Disclosure of Significant Details Unique to Applicant Profiles:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt; &lt;span&gt;In the initial stage, applications for the gTLD auctions require disclosure of background information such as proof of legal establishment, financial statements, primary and secondary contacts to represent the company, officers, directors, partners, major shareholders, etc. At this stage, TAS User Registration IDs, which require VAT/tax/business IDs, principal business address, phone, fax, etc. of the applicants, are created to build unique profiles for different parties in an auction.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Any important change in an applicant’s details would thus significantly alter the unique profile, leading to uncertainty regarding the parties involved and the validity of transactions undertaken. NDC’s application clearly didn’t meet the requirements here, as its financial statements, secondary contact, board members and ownership all changed at some point before the auction took place (either prior to or post submission of the application).&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Mandatory Declaration of Third Party Funding:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; Applications presupposing a future joint venture or any organisational unpredictability are not deemed eligible by ICANN, and if any third party is involved in the funding of the applicant, the latter is to provide evidence of such commitment to funding at the time of submission of its financial documents.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Verisign’s public announcement that it was involved in NDC’s funding from the very beginning (well before the auction) and its management later, proves that NDC’s failure to notify ICANN made its application ineligible, or irregular at the very least.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Vague Consequences of Failure to Notify ICANN of Changes:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; If in any situation, certain material changes occur in the composition of the management, ownership or financial position of the applicant, ICANN is liable to be notified of the changes by the submission of updated documents. Here, however, the applicant may be subjected to re-evaluation if a &lt;i&gt;material change&lt;/i&gt; is concerned, &lt;i&gt;at ICANN’s will&lt;/i&gt; (there is no mention of what a material change might be). In the event of failure to notify ICANN of changes that would lead the previous information submitted to be false or misleading, ICANN &lt;i&gt;may&lt;/i&gt; reject or deny the application concerned.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; NDC’s absolute and repeated denial of any changes, during the extremely brief e-mail ‘investigation’ conducted by ICANN and the Ombudsman, show that at no point was NDC planning on revealing its intimacy with Verisign. No extended evaluation was conducted by ICANN at any point.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Note: The arbitrary power allowed here and the vague use of the term ‘material’ obstruct any real accountability on ICANN’s part to ensure that checks are carried out to discourage dishonest behaviour, at all stages.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Arbitrary Enforcement of Background Checks:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; In order to confirm the eligibility of all applicants, ICANN conducts background screening during its initial evaluation process to verify the information disclosed, at the individual and entity levels.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The applicants may be asked to produce any and all documents/evidence to help ICANN complete this successfully, and any relevant information received from ‘any source’ may be taken into account here. However, this screening is conducted only with regard to two criteria: general business diligence and criminal history, and any record of cybersquatting behaviour.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In this case, ICANN’s background screening was clearly not thorough, in light of Verisign’s confirmed involvement since the beginning, and at no point was NDC asked to submit any extra documents (apart from the exchange of e-mails between NDC and ICANN and its Ombudsman) to enable ICANN’s inquiry into its business diligence.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Further, ICANN also said that it was not &lt;i&gt;required&lt;/i&gt; to conduct background checks or a screening process, as the provisions only mention that ICANN is &lt;i&gt;allowed&lt;/i&gt; to do so, when it feels the need.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This ludicrous loophole hinders transparency efforts by giving ICANN the authority to ignore any questionable details in applications it desires to deem eligible, based on its own strategic leanings, advantageous circumstances or any other beneficial interests.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN’s deliberate avoidance of discussing or investigating the ‘allegations’ against NDC (that were eventually proved true), as well as a visible compromise in fairness and equity of the application process point to the conclusion it desired. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;ICANN’s Sketchy Tryst with Legal Conformity:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;ICANN’s lack of &lt;i&gt;substantive compliance&lt;/i&gt;, with California’s laws and its own rules and regulations, leave us with the realisation that efforts towards transparency, enforcement and compliance  (even with emphasis on the IANA Stewardship and Accountability Process) barely meet the procedural minimum. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Rejection of Request for Postponement of Auction:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN’s intent to ‘initiate the Auction process once the composition of the set is stabilised’ implies that there must be no pending accountability mechanisms with regard to any applicant.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; When ICANN itself determines the opening and closing of investigations or reviews concerning applicants, arbitrariness on ICANN’s part in deciding &lt;i&gt;on which date&lt;/i&gt; the mechanisms are to be deemed as &lt;i&gt;pending&lt;/i&gt;, may affect an applicant’s claim about procedural irregularity. In this case, ICANN had already scheduled the auction for July 27, 2016, before Ruby Glen sent in a request for postponement of the auction and inquiry into NDC’s eligibility on June 22, 2016.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Even though the ongoing accountability mechanisms had begun after initiation of the auction process, ICANN confirmed the continuance of the process without assurance about the stability of the contention set as required by procedure. Ruby Glen’s claim about this violation in auction rules was dismissed by ICANN on the basis that there must be no pending accountability mechanisms at the &lt;i&gt;time of scheduling&lt;/i&gt; of the auction.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This means that if any objection is raised or any dispute resolution or accountability mechanism is initiated with regard to an applicant, at any point after fixing the date of the auction, the auction process continues even though the contention set may not be stabilised. This line of defence made by ICANN is not in conformity with the purpose behind the wording of its auction procedure as discussed above.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Lack of Adequate Participation in the Discovery Planning Process:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; In order to gather evidentiary support and start the discovery process for the passing of the injunction, ICANN was required to engage with Ruby Glen in a conference, under Federal law. However, due to a disagreement as to the &lt;i&gt;extent&lt;/i&gt; of participation required from both parties involved in the process, ICANN recorded only a single appearance at court, after which it refused to engage with Ruby Glen.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN should have conducted a thorough investigation, based on both NDC’s and Verisign’s public statements, and engaged more cooperatively in the conference, to comply substantively with its internal procedure as well jurisdictional obligations. Under ICANN’s Bylaws, it is to ensure that an applicant &lt;i&gt;does not assign&lt;/i&gt; its rights or obligations in connection with the application to another party, as NDC did, in order to promote a competitive market and ensure certainty in transactions.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, due to its lack of substantive compliance with due procedure, such bylaws have been rendered weak.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Demand to Dismiss Ruby Glen’s Complaint:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN demanded the dismissal of Ruby Glen’s complaint on the basis that the complaint was vague and unsubstantiated.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; After the auction, Ruby Glen’s allegations and suspicions about NDC’s dishonest behaviour were confirmed publicly by Verisign, making the above demand for dismissal of the complaint ridiculous.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Inapplicability of ICANN’s Bylaws to its Contractual Relationships:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN maintained that its bylaws are not part of application documents or contracts with applicants (as it is a not-for-profit public benefit corporation), and that ICANN’s liability, with respect to a breach of ICANN’s foundational documents, extends only to officers, directors, members, etc.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In addition, it said that Ruby Glen had not included any facts that suggested a duty of care arose from the contractual relationship with Ruby Glen and Donuts Inc.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Its dismissal of and considerable disregard for fiduciary obligations like duty of care and duty of inquiry in contractual relationships, prove the contravention of promised commitments and core values (integral to its entire accountability process), which are to ‘apply in the broadest possible range of circumstances’.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;ICANN’s Legal Waiver and Public Policy:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; Ruby Glen had submitted that, under the California Civil Code 1668, a covenant not to sue was against policy, and that the legal waiver all applicants were made to sign in the application was unenforceable.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This waiver releases ICANN from ‘any claims arising out of, or related to, any action or failure to act’, and the complaint claimed that such an agreement ‘not to challenge ICANN in court, irrevocably waiving the right to sue on basis of any legal claim’ was unconscionable.&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, ICANN defended the enforceability of the legal waiver, saying that only a covenant not to sue that is &lt;i&gt;specifically designed&lt;/i&gt; to avoid responsibility for own fraud or willful injury is invalidated under the provisions of the California Civil Code.&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; A waiver, incorporating the availability of accountability mechanisms ‘&lt;i&gt;within ICANN’s bylaws&lt;/i&gt; to challenge any final decision of ICANN’s with respect to an application’, was argued as completely valid under California’s laws. It must be kept in mind that challenges to ICANN’s final decisions can make headway &lt;i&gt;only&lt;/i&gt; through its own accountability mechanisms (including the Reconsideration Requests Process, the Independent Review Panel and the Ombudsman), which are mostly conducted by, accountable to and applicable at the discretion of the Board.&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; This means that the only recourse for dissatisfied applicants is through processes managed by ICANN, leaving no scope for independence and impartiality in the review or inquiry concerned, as the .WEB case has shown.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Note&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;: ICANN has also previously argued that its waivers are not restricted by S. 1668 because the parties involved are sophisticated - without an element of oppression, and that these transactions don’t involve public interest as ICANN doesn’t provide necessary services such as health, transportation, etc.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Such line of argument shows its continuous refusal to acknowledge responsibility for ensuring access to an essential good, in a diverse community, justifying concerns about ICANN’s commitment to accessibility and human rights.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Required to remain accountable to the stakeholders of the community through &lt;i&gt;mechanisms listed in its Bylaws&lt;/i&gt;, ICANN’s repeated difficulty in ensuring these mechanisms adhere to the purpose behind jurisdictional regulations confirm hindrances to impartiality, independence and effectiveness.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;The Financial Accountability of ICANN’s Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The use and distribution of significant auction proceeds accruing to ICANN have been identified by the internet community as issues central to financial transparency, especially in a future of increasing instances of contention sets. &lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Private Inurement Prohibition and Legal Requirements of Tax-Exempted Organisations:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt; &lt;span&gt;Subject to California’s state laws as well as federal laws, tax exemptions and tax-deductible charitable donations (available to not-for-profit public benefit corporations) are dependent on the fulfillment of jurisdictional obligations by ICANN, including avoiding contracts that may result in excessive economic benefit to a party involved, or lead to any deviation from purely charitable and scientific purposes.&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN’s Articles require that it ‘&lt;i&gt;shall&lt;/i&gt; pursue the charitable and public purposes of lessening the burdens of government and promoting the global public interest in the operational stability of the Internet’.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Due to this, ICANN’s accumulation of around USD 60 million (the total net proceeds from over 14 contention sets) since 2014 has been treated with unease, making it impossible to ignore the exponential increase in the same after the .WEB controversy.&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; With its dedication to a bottom-up, multi-stakeholder policy development process, the use of a single and ambiguous footnote, in ICANN’s Guidebook, to tackle the complications involving significant funds that accrue from last resort auctions (without even mentioning the arbiters of their ‘appropriate’ use) is grossly insufficient.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Need for Careful and Inclusive Deliberation Over the Use of Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; At the end of the fiscal year 2016, ICANN’s balance sheet showed a total of USD 399.6 million. However, the .WEB sale amount was not included in this figure, as the auction happened after the last date (June 30, 2016).&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Around seven times the average winning bid, a USD 135 million hike in ICANN’s accounts shows the need for greater scrutiny on ICANN’s process of allocation and distribution of these auction proceeds.&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;span&gt;[42]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; While finding an ‘appropriate purpose’ for these funds, it is important that ICANN’s legal nature under US jurisdiction as well as its vision, mission and commitments be adhered to, in order to help increase public confidence and financial transparency.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;The CCWG Charter on New gTLD Auction Proceeds:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; ICANN has always maintained that it recognised the concern of ‘significant funds accruing as a result of several auctions’ at the outset.&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;span&gt;[43]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; In March 2015, the GNSO brought up issues relating to the distribution of auction proceeds at ICANN52, to address growing concerns of the community.&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;span&gt;[44]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; A Charter was then drafted, proposing the formation of a Cross-Community Working Group on New gTLD Auction Proceeds, to help ICANN’s Board in allocating these funds.&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;span&gt;[45]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; After being discussed in detail at ICANN56, the draft charter was forwarded to the various supporting organisations for comments.&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;span&gt;[46]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; The Charter received no objections from 2 organisations and was adopted by the ALAC, ASO, ccNSO and GNSO, following which members and co-chairs were identified from the organisations to constitute the CCWG.&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;span&gt;[47]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It was decided that while ICANN’s Board will have final responsibility in disbursement of the proceeds, the CCWG will be responsible for the submission of proposals regarding the mechanism for the allocation of funds, keeping ICANN’s fiduciary and legal obligations in mind.&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;span&gt;[48]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; While creating proposals, the CCWG must recommend how to avoid possible conflicts of interest, maintain ICANN’s tax-exempt status, and ensure diversity and inclusivity in the entire process.&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;span&gt;[49]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; It is important to note that the CCWG cannot make recommendations ‘regarding which organisations are to be funded or not’, but is to merely submit a &lt;i&gt;proposal&lt;/i&gt; for the &lt;i&gt;process&lt;/i&gt; by which allocation is undertaken.&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;span&gt;[50]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; ICANN’s Guidebook mentions possible uses for proceeds, such as ‘&lt;i&gt;&lt;span&gt;grants to support new gTLD applications or registry operators from communities’&lt;/span&gt;&lt;/i&gt;&lt;span&gt;, the creation of a fund for ‘&lt;i&gt;specific projects for the benefit of the Internet community’, &lt;/i&gt;the ‘&lt;i&gt;establishment of a security fund to expand use of secure protocols’&lt;/i&gt;, among others, to be decided by the Board.&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;span&gt;[51]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;A Slow Process and the Need for More Official Updates:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt; The lack of sufficient communication/updates about any allocation or the process behind such, in light of ICANN’s current total net auction proceeds of USD 233,455,563, speaks of an urgent need for a decision by the Board (based on a recommendation by CCWG), regarding a &lt;i&gt;timeframe&lt;/i&gt; for the allocation of such proceeds.&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;span&gt;[52]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; However, the entire process has been very slow, with the &lt;i&gt;first&lt;/i&gt; CCWG meeting on auction proceeds scheduled for 26 January 2016, and the lists of members and observers being made public only recently.&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;span&gt;[53]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; Here, even parties interested in applying for the same funds at a later stage are allowed to participate in meetings, as long as they include such information in a Statement of Interest and Declaration of Intention, to satisfy CCWG’s efforts towards transparency and accountability.&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;span&gt;[54]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The worrying consequences of ICANN’s lack of financial as well as legal accountability (especially in light of its controversies), reminds us of the need for constant reassessment of its commitment to substantive transparency, enforcement and compliance with its rules and regulations. Its current obsessive courtship with only &lt;i&gt;procedural&lt;/i&gt; regularity must not be mistaken for a greater commitment to accountability, as assured by the post-transition IANA.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 2. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.p&lt;/span&gt;&lt;/a&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;df&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 4-7. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; PLAINTIFF RUBY GLEN, LLC’S NOTICE OF MOTION AND MOTION FOR LEAVE TO TAKE THIRD PARTY DISCOVERY OR, IN THE ALTERNATIVE, MOTION FOR THE COURT TO ISSUE A SCHEDULING ORDER, 3.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-motion-court-issue-scheduling-order-26oct16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-motion-court-issue-scheduling-order-26oct16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz"&gt;&lt;span&gt;https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;An expedited discovery request can provide the required evidentiary support needed to meet the Plaintiff’s burden to obtain a preliminary injunction or temporary restraining order. (&lt;/span&gt;&lt;a href="http://apps.americanbar.org/litigation/committees/businesstorts/articles/winter2014-0227-using-expedited-discovery-with-preliminary-injunction-motions.html"&gt;&lt;span&gt;http://apps.americanbar.org/litigation/committees/businesstorts/articles/winter2014-0227-using-expedited-discovery-with-preliminary-injunction-motions.html&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 2. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="http://domainincite.com/20789-donuts-files-10-million-lawsuit-to-stop-web-auction"&gt;&lt;span&gt;http://domainincite.com/20789-donuts-files-10-million-lawsuit-to-stop-web-auction&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.thedomains.com/2016/08/15/afilias-asks-icann-to-disqualify-nu-dot-cos-135-million-winning-bid-for-web/"&gt;&lt;span&gt;https://www.thedomains.com/2016/08/15/afilias-asks-icann-to-disqualify-nu-dot-cos-135-million-winning-bid-for-web/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="http://www.domainmondo.com/2016/11/news-review-icann57-hyderabad-india.html"&gt;&lt;span&gt;http://www.domainmondo.com/2016/11/news-review-icann57-hyderabad-india.html&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;Art III, Bylaws of Public Technical Identifiers, ICANN. (&lt;/span&gt;&lt;a href="https://pti.icann.org/bylaws"&gt;&lt;span&gt;https://pti.icann.org/bylaws&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.4.1.1, gTLD Applicant Guidebook ICANN, 1-39.(&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.1; 1.2.2, gTLD Applicant Guidebook ICANN, 1-21. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz"&gt;&lt;span&gt;https://www.verisign.com/en_US/internet-technology-news/verisign-press-releases/articles/index.xhtml?artLink=aHR0cDovL3ZlcmlzaWduLm5ld3NocS5idXNpbmVzc3dpcmUuY29tL3ByZXNzLXJlbGVhc2UvdmVyaXNpZ24tc3RhdGVtZW50LXJlZ2FyZGluZy13ZWItYXVjdGlvbi1yZXN1bHRz&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.7, gTLD Applicant Guidebook ICANN, 1-30. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 4. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.1.2.5, gTLD Applicant Guidebook ICANN, 1-8. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.2.1, gTLD Applicant Guidebook ICANN, 1-21. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DECLARATION OF CHRISTINE WILLETT IN SUPPORT OF ICANN’S OPPOSITION TO PLAINTIFF’S &lt;i&gt;EX PARTE &lt;/i&gt;APPLICATION FOR TEMPORARY RESTRAINING ORDER, 7. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-declaration-willett-25jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;6.8; 6.11, gTLD Applicant Guidebook ICANN, 6-5 (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;);&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 10. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;1.1.2.10, gTLD Applicant Guidebook ICANN. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER; MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 15. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 8. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;26(f); 65, Federal Rules of Civil Procedure (&lt;/span&gt;&lt;a href="https://www.federalrulesofcivilprocedure.org/frcp/title-viii-provisional-and-final-remedies/rule-65-injunctions-and-restraining-orders/"&gt;&lt;span&gt;https://www.federalrulesofcivilprocedure.org/frcp/title-viii-provisional-and-final-remedies/rule-65-injunctions-and-restraining-orders/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.federalrulesofcivilprocedure.org/frcp/title-v-disclosures-and-discovery/rule-26-duty-to-disclose-general-provisions-governing-discovery/"&gt;&lt;span&gt;https://www.federalrulesofcivilprocedure.org/frcp/title-v-disclosures-and-discovery/rule-26-duty-to-disclose-general-provisions-governing-discovery/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;6.10, gTLD Applicant Guidebook ICANN, 6-6. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.icann.org/resources/reviews/specific-reviews/cct"&gt;&lt;span&gt;https://www.icann.org/resources/reviews/specific-reviews/cct&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 12(b)(6), Federal Rules of Civil Procedure; DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 6. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;) &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 8. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;PLAINTIFF RUBY GLEN, LLC’S OPPOSITION TO DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MOTION TO DISMISS FIRST AMENDED COMPLAINT; MEMORANDUM OF POINTS AND AUTHORITIES, 12.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-opposition-motion-dismiss-first-amended-complaint-07nov16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-opposition-motion-dismiss-first-amended-complaint-07nov16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://archive.icann.org/en/accountability/frameworks-principles/legal-corporate.htm"&gt;&lt;span&gt;https://archive.icann.org/en/accountability/frameworks-principles/legal-corporate.htm&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); Art. 1(c), Bylaws for ICANN. (&lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/governance/bylaws-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/governance/bylaws-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="http://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=CIV&amp;amp;sectionNum=1668"&gt;&lt;span&gt;http://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=CIV&amp;amp;sectionNum=1668&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); NOTICE OF AND EX PARTE APPLICATION FOR TEMPORARY RESTRAINING ORDER: MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT THEREOF, 24. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-ruby-glen-ex-parte-application-tro-memo-points-authorities-22jul16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 6.6, gTLD Applicant Guidebook ICANN, 6-4. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;DEFENDANT INTERNET CORPORATION FOR ASSIGNED NAMES AND NUMBERS’ MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF MOTION TO DISMISS FIRST AMENDED COMPLAINT, 18. (&lt;/span&gt;&lt;a href="http://domainnamewire.com/wp-content/icann-donuts-motion.pdf"&gt;&lt;span&gt;http://domainnamewire.com/wp-content/icann-donuts-motion.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/resources/pages/mechanisms-2014-03-20-en"&gt;&lt;span&gt;https://www.icann.org/resources/pages/mechanisms-2014-03-20-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;AMENDED REPLY MEMORANDUM IN SUPPORT OF ICANN’S MOTION TO DISMISS FIRST AMENDED COMPLAINT, 4. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/litigation-dca-reply-memo-support-icann-motion-dismiss-first-amended-complaint-14apr16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/litigation-dca-reply-memo-support-icann-motion-dismiss-first-amended-complaint-14apr16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 501(c)(3), Internal Revenue Code, USA. (&lt;/span&gt;&lt;a href="https://www.irs.gov/charities-non-profits/charitable-organizations/exemption-requirements-section-501-c-3-organizations"&gt;&lt;span&gt;https://www.irs.gov/charities-non-profits/charitable-organizations/exemption-requirements-section-501-c-3-organizations&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;Art. II, Public Technical Identifiers, Articles of Incorporation, ICANN. (&lt;/span&gt;&lt;a href="https://pti.icann.org/articles-of-incorporation"&gt;&lt;span&gt;https://pti.icann.org/articles-of-incorporation&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/alacpolicydev/At-Large+New+gTLD+Auction+Proceeds+Discussion+Paper+Workspace"&gt;&lt;span&gt;https://community.icann.org/display/alacpolicydev/At-Large+New+gTLD+Auction+Proceeds+Discussion+Paper+Workspace&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/policy"&gt;&lt;span&gt;https://www.icann.org/policy&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); 4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;5, Internet Corporation for ASsigned Names and Numbers, Fiscal Statements As of and for the Years Ended June 30, 2016 and 2015. (&lt;/span&gt;&lt;a href="https://www.icann.org/en/system/files/files/financial-report-fye-30jun16-en.pdf"&gt;&lt;span&gt;https://www.icann.org/en/system/files/files/financial-report-fye-30jun16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;);&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="http://domainincite.com/21204-icann-has-400m-in-the-bank?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+DomainIncite+%28DomainIncite.com%29"&gt;&lt;span&gt;http://domainincite.com/21204-icann-has-400m-in-the-bank?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+DomainIncite+%28DomainIncite.com%29&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;&lt;span&gt;[42]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="http://www.theregister.co.uk/2016/07/28/someone_paid_135m_for_dot_web"&gt;&lt;span&gt;http://www.theregister.co.uk/2016/07/28/someone_paid_135m_for_dot_web&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;&lt;span&gt;[43]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;&lt;sup&gt;&lt;span&gt;[44]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en"&gt;&lt;span&gt;https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;&lt;sup&gt;&lt;span&gt;[45]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;&lt;sup&gt;&lt;span&gt;[46]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;&lt;sup&gt;&lt;span&gt;[47]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/Cross-Community+Working+Group+on+new+gTLD+Auction+Proceeds+Home&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;&lt;sup&gt;&lt;span&gt;[48]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://ccnso.icann.org/workinggroups/ccwg-charter-07nov16-en.pdf"&gt;&lt;span&gt;https://ccnso.icann.org/workinggroups/ccwg-charter-07nov16-en.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;); (&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;&lt;sup&gt;&lt;span&gt;[49]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en"&gt;&lt;span&gt;https://www.icann.org/public-comments/new-gtld-auction-proceeds-2015-09-08-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;&lt;sup&gt;&lt;span&gt;[50]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://community.icann.org/display/CWGONGAP/CCWG+Charter"&gt;&lt;span&gt;https://community.icann.org/display/CWGONGAP/CCWG+Charter&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;&lt;sup&gt;&lt;span&gt;[51]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; 4.3, gTLD Applicant Guidebook ICANN, 4-19. (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/agb"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/agb&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;&lt;sup&gt;&lt;span&gt;[52]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://newgtlds.icann.org/en/applicants/auctions/proceeds"&gt;&lt;span&gt;https://newgtlds.icann.org/en/applicants/auctions/proceeds&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;&lt;sup&gt;&lt;span&gt;[53]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; (&lt;/span&gt;&lt;a href="https://community.icann.org/pages/viewpage.action?pageId=63150102"&gt;&lt;span&gt;https://community.icann.org/pages/viewpage.action?pageId=63150102&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;&lt;sup&gt;&lt;span&gt;[54]&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;(&lt;/span&gt;&lt;a href="https://www.icann.org/news/announcement-2-2016-12-13-en"&gt;&lt;span&gt;https://www.icann.org/news/announcement-2-2016-12-13-en&lt;/span&gt;&lt;/a&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy'&gt;https://cis-india.org/internet-governance/blog/icann2019s-problems-with-accountability-and-the-web-controversy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    

   <dc:date>2017-10-28T15:49:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis">
    <title>GDPR and India: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis</link>
    <description>
        &lt;b&gt;At present, companies world over are in the process of assessing the impact that EU General Data Protection Regulations (“GDPR”) will have on their businesses.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The post is written by Aditi Chaturvedi and edited by Amber Sinha&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;High administrative  fines in case of non-compliance with GDPR provisions are a driving force behind these concerns as they can lead to loss of business for various countries such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, future of business will depend on how well India responds to the changing regulatory  changes unfolding globally. India  will have to  assess her preparedness and make convincing changes to retain the status as a  dependable processing destination. This document gives a brief overview of data protection provisions of the Information Technology Act, 2000 followed by a comparative analysis of the key  provisions of GDPR and Information Technology  Act and the Rules notified under it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/gdpr-and-india"&gt;Download the full blog post&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis'&gt;https://cis-india.org/internet-governance/blog/gdpr-and-india-a-comparative-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-28T15:17:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/policy-officer-ig">
    <title>Policy Officer - Internet Governance</title>
    <link>https://cis-india.org/jobs/policy-officer-ig</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is seeking an individual with a background and interest in issues pertaining to internet governance including privacy, big data, freedom of expression, artificial intelligence etc. under its Internet Governance programme.&lt;/b&gt;
        &lt;p&gt;This position will include undertaking field research, developing policy briefs, organizing conferences, and writing research reports, engaging with key stakeholders, and collaborating with project partners in areas under our research.&lt;/p&gt;
&lt;p&gt;This position is for a duration of 1 year. There is currently one vacancy for this post. Selected candidate will work from CIS office in Bangalore.&lt;/p&gt;
&lt;h4&gt;&lt;b&gt;Required Skill Sets&lt;/b&gt;&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Previous work and an interest in issues pertaining to IG including privacy, big data, FoE, and AI.&lt;/li&gt;
&lt;li&gt;Strong writing and analytical skills.&lt;/li&gt;
&lt;li&gt;Experience in conducting research.&lt;/li&gt;
&lt;li&gt;Knowledge of Indian law and policy relevant to the digital sphere.&lt;/li&gt;
&lt;li&gt;Demonstrable research skills and ability to undertake research independently.&lt;/li&gt;
&lt;li&gt;Demonstrable writing and communication skills.&lt;/li&gt;
&lt;li&gt;Ability to work independently or with minimal supervision.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Compensation:&lt;/b&gt; Based on experience and education.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Application requirements:&lt;/b&gt; two writing samples and CV.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact:&lt;/b&gt; &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/policy-officer-ig'&gt;https://cis-india.org/jobs/policy-officer-ig&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-09-03T07:12:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data">
    <title>Ahead of data protection law roll out, experts caution that it shouldn't limit collection and use of data</title>
    <link>https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data</link>
    <description>
        &lt;b&gt;With India planning to roll out a new data protection regime following the landmark Supreme Court judgment upholding right to privacy as fundamental right, experts have cautioned that the new law should not limit collection and use of data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.firstpost.com/tech/news-analysis/ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data-4134753.html"&gt;published by First Post&lt;/a&gt; on October 12, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The new data protection law should have data-driven innovation at its core," said Kamlesh Bajaj, Founder-CEO, Data Security Council of India (DSCI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not limit data collection and use, but limit harm to citizens," Bajaj added at a seminar on "Data Protection and Privacy" organised by non-profit industry body Internet and Mobile Association of India (IAMAI).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a major boost to individual freedom, the Supreme Court in August declared that right to privacy was a fundamental right and protected as an intrinsic part of life and personal liberty and freedoms guaranteed by the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Supreme Court judgment calls for production of a new law," said Sunil Abraham, Executive Director of Bangaluru-based research organisation, Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The experts noted that the Supreme Court judgment remains meaningless for digital Indians without a proper data protection law in place as all other existing laws, such as the Information Technology Act, 2000, do not adequately address the question of right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising the importance of data protection and keeping personal data of citizens secure and protected, the Ministry of Electronics and Information Technology (MeitY) on 31 July, constituted a Committee of Experts under the chairmanship of its former judge Justice BN Srikrishna to study and identify key data protection issues and recommend methods for addressing them. The committee will also suggest a draft Data Protection Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the regulator should be given tools to make companies behave better, it should not start with harsh punitive actions," Abraham noted, adding that big fines could challenge the very logic of regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a question to whether a robust data protection regime should come in conflict with issue such as national security, he said that lawmakers should find a way to maximise both imperatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Surveillance is like salt in cooking. It is necessary, but in limited quantity," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participating in a chat with Google's Public Policy Director Chetan Krishnaswamy at the event, MP Rajeev Chandrasekhar, however, said that regulation should start with the process of data collection itself and consumers cannot be expected to demonstrate harm or inappropriate use of their data to enjoy the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It should not be a free run for companies to mine consumer data," the independent Rajya Sabha member said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He emphasised that the process of formulating a data protection law is as important as the law itself and all stakeholders should be able to openly put forward their views and apprehensions and it is only with such a consultative process that the opportunities for the technology space can be safeguarded.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data'&gt;https://cis-india.org/internet-governance/news/first-post-october-12-2017-ahead-of-data-protection-law-roll-out-experts-caution-that-it-shouldnt-limit-collection-and-use-of-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-02T15:20:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem">
    <title>Securing The Digital Payments Ecosystem</title>
    <link>https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem</link>
    <description>
        &lt;b&gt;Udbhav Tiwari attended a consultation organized by NITI Aayog and Observer Research Foundation on October 9, 2017 in NITI Aayog office in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;Since demonetisation, the Indian  government has taken several steps to enable digital payments adoption  across the country. With initiatives like the &lt;i&gt;Digidhan Mission&lt;/i&gt;,  setting a target of 25 billion digital transactions in 2017-18, the Modi  government is setting high benchmarks which necessitate appropriate  ecosystem support. Indeed, the &lt;i&gt;Digidhan Mission&lt;/i&gt;’s ‘Objectives and Functions’, recognise that securing India’s digital payments landscape is critical.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;In light of the exponential rise in  e-commerce and digital payments, this imperative could not have come any  sooner. India's digital transformation has not only highlighted the  need for increased financial inclusion but also the emergent cyber  security threats that it brings with it. This transformation, however,  also represents an opportunity - not only to modernize India's laws and  regulations to respond to global changes but also influence these  changes and set a trajectory of growth for other emerging markets.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Keeping in mind these realities, NITI  Aayog, in association with ORF, is preparing a cyber-security White  Paper that will highlight best practices for the Integrity of Payments  Systems and help enhance trust of the users in the payments ecosystem.  The White Paper, through consultations with relevant stakeholders, will  provide policy inputs to modernise standards for transaction security,  hardware security and information security.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;In this context a meeting was convened constituting experts and practitioners, who can help develop a comprehensive strategy to secure the digital payments ecosystem. The discussion was chaired by Dr. VK Saraswat, Hon’ble Member, NITI Aayog. &lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem'&gt;https://cis-india.org/internet-governance/news/securing-the-digital-payments-ecosystem&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-28T15:27:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web">
    <title>Sex, drugs and the dark web</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web</link>
    <description>
        &lt;b&gt;Blend anonymity and bitcoins for a ‘guaranteed safe’ cocktail of terrifying potential.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/technology/internet/sex-drugs-and-the-dark-web/article19818872.ece"&gt;Hindu&lt;/a&gt; on October 7, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It’s hardly a secret that marijuana’s quite easy to get nowadays. Cigarette shop owners, paanwaalas, and otherwise innocuous dealers of innocuous goods hide their stash just out of sight of the unaware. Rustom Juneja is just another marijuana-smoking adult in one of India’s biggest cities. He used to get his ‘stuff’ from local dealers. Till he “got bored of Indian produce,” as he says. So, in 2015, he decided to go to the dark web.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I brought strains of marijuana from the U.S. and Canada, from a marketplace on the dark web,” Juneja says. The packages were shipped from their respective countries, they traversed borders, bypassed stringent security and checks, crossed continents, and landed at Juneja’s doorstep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is the dark web for you. Completely unpoliced, willing users can find anything, from the aforementioned marijuana, to “hard” drugs, to military grade-weaponry and even sex workers. All delivered to your doorstep just like books or designer watches from Amazon, Flipkart, or Snapdeal. And yes, some even offer cash-on-delivery. Returns might not be as simple, though.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, a group of students were arrested in Hyderabad on charges of purchasing LSD (also called ‘acid’) on the dark web. But they weren’t arrested because they had made the transaction on the dark web; they were arrested because the purchase and/ or use of LSD is illegal under Indian law (Narcotic Drugs and Psychotropic Substances Act, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, transactions on the dark web belong to a legal grey area. More importantly, the transactions here are mostly untraceable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So, just what is the dark web?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Shadow world&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The world wide web is a Brobdingnagian mass of data, parts of which are ‘indexed’ so that they may be found by users through search engines (Google, Bing, etc). The parts of the web that aren’t indexed, and therefore available for public access, are known as the ‘deep web’. This was the part initially known as the dark web, with the ‘dark’ being more an allusion to being kept away from the light of regular access than its now more nefarious association. While it’s near impossible to put a number to it, unofficial estimates mostly concur that the vast majority of the web is unindexed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, in the early 2000s, programmers began developing techniques that would be able to offer anonymous access to these hidden bits of the web. In 2002, the U.S. Naval Laboratory released one of the earliest versions of The Onion Router (TOR), a software that would allow anonymous communication between American intelligence agents and operatives on foreign soil.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This didn’t go quite according to plan, though. Tor was soon appropriated by cyberpunks, who began using the protocol to give access to websites that would host, share, and trade illicit goods. Today, the dark web is a sub-section of the deep web, accessed using specialised software like Tor that ensures absolute anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;The onion protocol&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“If you want to track anything on the &lt;a href="http://www.thehindu.com/tag/541-428/internet/?utm=bodytag"&gt;&lt;span&gt;Internet, &lt;/span&gt;&lt;/a&gt;it can happen at three levels — the level of the person who sends a request, at the level of the person responding to this request, or it can happen in between these two ends,” says Udbhav Tiwari, Policy Officer at the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Because of this structure, it is easy to track actions and resources across the Internet, using the same terminology that makes it so easy to index and search. So, people began thinking this might become a problem.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of us have heard of the Hyper Text Transfer Protocol Secure or HTTPS, a protocol that ensures that information is encrypted and secure the moment it leaves a computer till the time it reaches a destination computer. But this protocol only protects one of the three levels on which information might be tracked. The dark web is built to ensure that the remaining levels are also protected and kept anonymous.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The reason it’s called the ‘onion’ protocol is because there are bits of information that are encrypted over and over again. So, when something leaves one computer, it is encrypted with a layer, then it hits another computer and is encrypted with another layer, and it hits another computer, where it is encrypted yet again. When this information returns, each layer is peeled off, so that you get the information you requested, with none of the encryption,” Tiwari says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This kind of encryption makes it borderline impossible to figure out who is communicating with who and what they are talking about, unless the physical machines at either end are compromised, or a vulnerability on these machines is exploited by setting up a fake website on the Internet — a technique the FBI uses to track child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And what does it all mean? A level of guaranteed secrecy with terrifying potential. A 2015 study found that light drugs were the most traded commodity on the dark web, and that as much as 26% of its content could be classified as ‘child exploitation’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2016 study found that almost 57% of live websites on the dark web hosted illicit material. The ease of access and the minimal chances of being caught has meant a steady rise in the use of the dark web and the murk it peddles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s a market where both buyer and vendor are rated, like Uber. This establishes trust, and authenticates the veracity of a potential transaction. Thus, for instance, buyers are obviously more inclined to buy an assault rifle from a highly-rated seller. And you will be sold grenades only if your ratings assure the vendor you’ll fulfil your end of the transaction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once a transaction is finalised, the payment is held ‘in escrow’ — a third party arbitration system which ensures the buyer is paid only after they have met their end of the bargain. The third parties also arbitrate in the event of a dispute.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;As easy as pie&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Juneja bought marijuana three times, all from the same vendor, but only two shipments reached him. The third time, the parcel never landed, but the arbiters decided in favour of the vendor because he had a much better rating and Juneja lost his money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With no proper method to find out whether the vendor has shipped a product or the buyer has received it, this adjudication is seen as the best stop-gap arrangement. For Juneja, as for many others, the loss was a deal breaker, and he didn’t go back to the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the first two shipments did arrive though, they came with absolute swagger and nonchalance. “The product was sealed and flattened out, as if it were a magazine or postcard.” It does say something of international security that it can’t differentiate between a shipment of &lt;em&gt;The New Yorker&lt;/em&gt; and marijuana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dark web transactions were initially carried out using legal state-issued currencies. However, the simplicity of tracking online transactions made with property monitored by the government led to the rise of cryptocurrencies — digital or virtual currency that uses cryptographic techniques for security and which would be beyond state control. Besides the need to go underground, there was a political angle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These people see money as a state incursion into private affairs,” says Jyotirmoy Bhattacharya, economics professor at Delhi’s Ambedkar University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first, and still most popular, cryptocurrency was released in 2009 — bitcoin. Created by an unknown person or group of people, going only by the pseudonym Satashi Nakamoto, bitcoin was intended as a ‘peer-to-peer electronic cash system’, which would be completely decentralised, with no central server or state authority. This meant that the value and proliferation of bitcoin would be determined by its creators and users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The idea of a virtual currency has been around since before Nakamoto, but a large problem was in limiting creation and supply. Bitcoin was the first to solve this problem. “Bitcoin uses a technique known as the ‘proof-of-work’ (POW). So, to create a new set of this currency, you have to spend some amount of computational resources. This limits how much currency you can generate, thus ensuring that the currency has a value,” says Bhattacharya.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;What is bitcoin?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“A bitcoin is simply a solution to a puzzle. If there are a set of puzzles that are a part of the bitcoin protocol, one bitcoin is simply one of the solved puzzles of that set, along with a digital signature of who solved the puzzle,” says Bhattacharya. A public ledger tracks the ownership of bitcoins, which ensures that the same one is not used again by the same person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Since there is no central authority, your transaction has to match the globally agreed ledger.” To ensure that ownership of bitcoin is legitimate, every transaction is published in the ledger, thus creating a ‘chain of transactions’ known as a blockchain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the past few years, the value of bitcoin has skyrocketed, so much so that people have begun investing in it, as an asset. When bitcoin was first used as tender in early 2010, it was valued at around $0.003. For a brief while in August, one bitcoin was valued at $4,500, a record high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the everyday world of eggs and bread, though, bitcoin has limited use. It is still unrecognised by several nations, and deemed illegal in many others. It’s in the dark web that it finds its most votaries. While it would be flippant to suggest that bitcoin is used on the dark web solely for illicit uses, it is difficult to deny its origins for that purpose, and its continuing use there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bedavyasa Mohanty, an Associate Fellow at Observer Research Foundation Cyber Initiative, says that there are Indian users transacting on the dark web using bitcoin and claims that this number is only likely to increase as accessibility increases. “Bitcoin cannot be tracked,” says Mohanty. “With the ledger and the blockchain, you can trace the trail of a certain bitcoin, but it is anonymised. You can’t point out who owns that bitcoin.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, in effect, means an entirely anonymous transaction may be made on the dark web for any number of illegal goods or services using a currency that leaves a trail which goes nowhere and leaves no fingerprints. This, in a nutshell, is the danger when bitcoin combines with the dark web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several users I spoke to either claimed that fears about the dark web were mostly unfounded, or that the freedom it offered was an essential facet of the Internet. But it can’t be denied that the sheer possibility that somebody can deal in child porn or hard drugs or deadly weapons right under the nose of the law is a terrifying one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the perspective of Indian law enforcement, given the technical knowhow they have to track down owners and users of bitcoins, the chances of discovery are minimal, says Mohanty. The currency uses a system of public and private ‘keys’, ensuring that an intercepted bitcoin transmission is useless without those keys. To top it, India does not have any clear laws to regulate cryptocurrencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“For India to regulate cryptocurrencies, it would need to legally recognise their existence,” says Mohanty. “And if you do recognise them, what do you treat them as? As a security? Or as a currency that can be traded openly, and so on. That’s part of the reason why the Reserve Bank hasn’t formally recognised cryptocurrencies.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Flagging illegal trades&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bitcoin exchanges in India insist that they follow strict guidelines and e-KYC (Know Your Customer) rules, ensuring that the identity of every customer on the exchange is verified. “If somebody tries to use a bitcoin from Zebpay or any other recognised exchange, they will definitely be tracked down,” says Saurabh Agrawal, co-founder of Zebpay, one of India’s largest bitcoin exchanges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We use strong software; if any of our users use bitcoins for illegal purposes, we close their accounts. We’ve done this in the past and will do so in future as well.” He claims their software maintains a list of web addresses deemed ‘red alert’ sites, and the moment a bitcoin is sent to such a site, the transaction is flagged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others are less positive. “While we can track whether a transaction is made through illegal routes, to some extent it’s true that we cannot track all transactions in real time as this takes a large amount of data,” says Sathvik Vishwanath, CEO, Unocoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But if someone is trying to buy or sell from illegal marketplaces, we have a mechanism where we can — and do — stop it.” Given that customers are KYC-verified, “they don’t try to indulge in malicious activities,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pan to Rustom Juneja. Juneja made three transactions in 2015, using bitcoins purchased entirely legally from an exchange. “You have to create an account on any of the markets online, and transfer your bitcoins to that account,” Juneja informs me. His account too was KYC-verified, and they had all his details — PAN number, Aadhar, and so on. He had no clue then that the exchanges had tracking methods. “Look, if these actually worked, there’s no way we wouldn’t have been caught,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Part of the problem, of course, is that Indian law does not recognise the dark web as a separate entity from the ‘surface’ web; there are no special laws for it. Yet, even if laws were put in place, there are few ways in which states can monitor or block the use of the dark web owing to a host of technical and legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A sense of urgency [regarding the dark web], especially relating to the use of bitcoin for illicit activities, hasn’t been instilled in the government yet,” says Mohanty. “What they are worried about is terrorism, and the use of anonymous technologies and chatrooms for radicalisation, terror planning, or buying and selling weapons.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Juneja is one of a few thousand active Indian users on the dark web. Nothing stops them from buying a strain of marijuana from Canada. But nothing stops them from buying a Kalashnikov either.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Sunny side up&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The dark web isn’t necessarily only a marketplace for all of the world’s nefarious practices. The very anonymity and shrouds that the dark web offers can be used for general practices by users looking merely for privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aritra Ghosh, a Ph.D student of Computational Astrophysics at Yale University says, “(The dark web is) possibly the only way to do something in “secret” away from any kind of surveillance. Onion routing still hasn’t been broken. So, it can play a substantial role in movements against companies, governments and so on.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And this is a quality that many frequenters of the dark web swear by. Even the ability to use anonymous messenger service with a near-complete guarantee of not being ‘watched’ drives a lot of people here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akarsh Pandit, 24, says unrestricted access to many resources including books and documents is an area of huge potential. “Another significant pro is the avoidance of national firewalls that exist in some countries. Moreover, you gain access to unindexed search results,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web'&gt;https://cis-india.org/internet-governance/news/the-hindu-saurya-sengupta-sex-drugs-and-the-dark-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-01-02T16:13:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cy-fy-2017">
    <title>CyFy 2017</title>
    <link>https://cis-india.org/internet-governance/news/cy-fy-2017</link>
    <description>
        &lt;b&gt;CyFy is a conference on internet governance and cyber security organised by the Observer Research Foundation (ORF) in New Delhi between 2 and 4 October 2017. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker on a panel titled "Security Through Identity?" on the 4 October  2017 and chaired an invite only session titled "Encryption: The End of  Surveillance?" on the 3rd of October, 2017. Saikat Dutta and Udbhav Tiwari also participated in the encryption session. Saikat was a speaker in a session titled "Digital Vulnerabilities: Capacity Building for Tackling Cyber Crime" on 3 October 2017. Udbhav Tiwari chaired a session titled "Dangerous Disclosures: Cyber Security Incident Reporting" on 4 October 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2017-agenda"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cy-fy-2017'&gt;https://cis-india.org/internet-governance/news/cy-fy-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-26T09:36:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case">
    <title>Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case</title>
    <link>https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case</link>
    <description>
        &lt;b&gt;Recent developments in the European Union (EU) regarding the antitrust case against Intel have brought back into focus two rules of competition law analysis- the per se rule and the rule of reason. In light of the decision by the Court of Justice of the European Union in the matter, this Note examines the application of the two rules to the case in detail. Additionally, it analyzes the statutory and judicial basis for the rules in the context of the EU and Indian competition law regimes, and concludes by identifying some areas in which these concepts would be relevant.&lt;/b&gt;
        &lt;p&gt;Click on the link below to read the full article:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/revisiting-per-se-vs-rule-of-reason-in-light-of-intel.pdf"&gt;Revisiting Per Se vs Rule of Reason in Light of the Intel Conditional Rebate Case &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case'&gt;https://cis-india.org/internet-governance/blog/revisiting-per-se-vs-rule-of-reason-in-light-of-the-intel-conditional-rebate-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruthi Anand</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    

   <dc:date>2017-10-04T13:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart">
    <title>Attempted data breach of UIDAI, RBI, ISRO and Flipkart is worrisome</title>
    <link>https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart</link>
    <description>
        &lt;b&gt;Perhaps, we got lucky this time, but the ongoing problem of massive cyber-security breaches wouldn't stop at one thwarted attempt to steal sensitive information from the biggest and most important databases. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was published by &lt;a class="external-link" href="https://www.dailyo.in/variety/uidai-rbi-isro-flipkart-hack-cyber-security-data-breach-dark-net/story/1/19893.html"&gt;DailyO&lt;/a&gt; on October 4, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;An&lt;/span&gt;&lt;span&gt; &lt;a href="http://www.moneycontrol.com/news/trends/current-affairs-trends/uidai-bse-among-6000-indian-organisations-reportedly-affected-by-data-breach-2404223.html/amp" rel="nofollow" target="_blank"&gt;alarming report &lt;/a&gt;&lt;/span&gt;&lt;span&gt;on a potential data breach impacting almost 6,000 Indian organisations — including the Unique Identification Authority of India (UIDAI) that hosts Aadhaar numbers, Reserve Bank of India, Bombay Stock Exchange and Flipkart — has surfaced and supposedly been contained.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A cyber security firm in Pune, Seqrite, had found in its Cyber Intelligence Labs that India's national internet registry, IRINN (Indian Registry for Internet Names and Numbers), which comes under NIXI (National Internet Exchange of India), was compromised, though the issue has reportedly been "addressed".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sequite tracked an advertisement on the "dark net" — the digital underworld — offering access to servers and database dump of more than 6,000 Indian businesses and public assets, including the big ones such as UIDAI, RBI, BSE and Flipkart.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report states that the "dealer could have had access to usernames, email ids, passwords, organisation name, invoices and billing documents, and few more important fields, and could have potentially shut down an entire organisation".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI has &lt;span&gt;&lt;a href="https://twitter.com/UIDAI/status/915528090230517761" rel="nofollow" target="_blank"&gt;denied&lt;/a&gt;&lt;/span&gt; the security breach of Aadhaar data in the IRINN attacks, in an expected move. "UIDAI reiterated that its existing security controls and protocols are robust and capable of countering any such attempts or malicious designs of data breach or hacking," said the report, which is basically a rebuttal from the powerful organisation at the heart of centralising all digital information of all Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the aggrieved parties have been notified, and the NCIIPC (National Critical Information Infrastructure Protection Centre) is looking at the issue, what this means is that digital information is a minefield susceptible to all kinds of threats from criminals as well as foreign adversaries, along with being commercially exploited by major conglomerates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Till August 2017 alone, around &lt;span&gt;&lt;a href="https://www.medianama.com/2017/08/223-ransomware-india-wannacry-petya/" rel="nofollow" target="_blank"&gt;37 incidents&lt;/a&gt;&lt;/span&gt; of ransomware attacks have been reported, including the notorious WannaCry attacks. But what makes the attacks very, very threatening is the government's insistence — illegal at that — to link Aadhaar with every service, and create a centralised nodal, superior network of all networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This "map of maps" has been rightly called out as a potential &lt;span&gt;&lt;a href="https://thewire.in/118541/national-security-case-aadhaar/" rel="nofollow" target="_blank"&gt;national security threat&lt;/a&gt;&lt;/span&gt;, as it makes a huge reservoir of data vulnerable to cyberthreats from mercenaries, the digital underworld and foreign adversaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="A widely circulated report prepared by the Centre for Internet and Society (CIS) underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats. Photo: Reuters" src="https://smedia2.intoday.in/dailyo//story/embed/201710/data-inside_100417083834.jpg" title="data-inside_100417083834.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;A widely circulated report prepared by the Centre for Internet and Society (CIS) underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats. Photo: Reuters&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That the data dump in the digital black market provides access to entire servers for a meagre sum of Rs 42 lakh, as mentioned in the report, is a sign of how insecure our personal information could be on the servers of the biggest government organisations and commercial/online retail giants. This includes the likes of Flipkart, which store our passwords, emails, phone numbers and other important information linked to our bank details and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst UIDAI was declared a &lt;span&gt;&lt;a href="http://meity.gov.in/writereaddata/files/UIDAI%20CII%20notification%20Dec15.pdf" rel="nofollow" target="_blank"&gt;"protected system"&lt;/a&gt;&lt;/span&gt; under Section 70 of the Information Technology Act, and a critical information infrastructure, in practice, there are way too many breaches and leaks of Aadhaar data to merit that tag.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because the current (officially thwarted) attempt to hack into these nodal databases involved the data of hundreds of millions of Indians, the matter has been dealt with the required seriousness. However, as the report states, "among the companies whose emails they found were Tata Consultancy Services, Wipro, Indian Space Research Organisation, Mastercard/Visa, Spectranet, Hathway, IDBI Bank and EY".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a laundry list of the biggest and most significant organisations, with massive digital footprints, which are sitting on enormous databanks. Hacking into ISRO, for example, could pose a formidable risk to India's space programmes as well as jeopardise information safety of crucial space projects that are jointly conducted with friendly countries such as Russia, China and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A widely circulated report prepared by the Centre for Internet and Society (CIS) on the Aadhaar Act and &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india" rel="nofollow" target="_blank"&gt;its non-compliance with data protection law&lt;/a&gt;&lt;/span&gt; in India underlined the major flaws in the 2016 Aadhaar Act, that makes it vulnerable to several digital threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, CIS also reported how government websites, especially "those run by National Social Assistance Programme under Ministry of Rural Development, National Rural Employment Guarantee Act (NREGA) run by Ministry of Rural Development, Daily Online Payment Reports under NREGA (Governemnt of Andhra Pradesh) and Chandranna Bima Scheme (also run by Government of Andhra Pradesh) combined were responsible for&lt;a href="http://m.thehindubusinessline.com/info-tech/aadhaar-data-leak-exposes-cyber-security-flaws/article9677360.ece" rel="nofollow" target="_blank"&gt;&lt;span&gt; publicly exposing&lt;/span&gt; &lt;/a&gt;personal and Aadhaar details of over 13 crore citizens".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been rather lackadaisical about the grave security threats posed by India's shaky digital infrastructure, saying it's robust when it's not: the UIDAI itself has been brushing the allegations of exclusion, data breach and leaking of data from various government and private operators' servers and there have been several documentations of the security threat as well as the human rights violations that the digital breaches pose for India's institutions and its citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted welfare economist Jean Dreze &lt;span&gt;&lt;a href="http://indianexpress.com/article/opinion/columns/dissent-and-aadhaar-4645231/" rel="nofollow" target="_blank"&gt;says&lt;/a&gt;&lt;/span&gt;, "With Aadhaar immensely reinforcing the government's power to reward loyalty and marginalise dissenters, the embers of democracy are likely to be further smothered."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even as India's jurisprudence held privacy and autonomy as supreme, Indians remain vulnerable to institutional failures and an abject lack of awareness on the gravity of digital destabilisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart'&gt;https://cis-india.org/internet-governance/news/daily-o-october-4-2017-attempted-data-breach-of-uidai-rbi-isro-and-flipkart&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-02T16:20:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things">
    <title>Emerging Issues in the Internet of Things</title>
    <link>https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things</link>
    <description>
        &lt;b&gt;Andrew Rens will give a talk about research that he is doing at the Internet Governance Lab on October 23, 2017 at the Centre for Internet &amp; Society in Bengaluru.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It seems almost anything can be connected to the Internet: 3D printers, cars, traffic lights and even toasters. This proliferation of Internet enabled devices, the Internet of Things (IoT), raises a cloud of complex problems, of ownership and control, privacy and surveillance, ubiquity and network fragility. IoT doesn't just promise efficiency; cheap sensors and printers might put scientific research and customized manufacturing in the hands of millions more people. The governance of the IoT, exhibits the same super complexity as Internet governance generally; with multiple sites of governance and actors operating across legal borders. Legal regulation, standards and the architecture of technology determine how the IoT is configured and how it will be reconfigured in response to these problems. Where is the technology governance of the IoT currently taking shape? What forces will likely bear on the governance of the IoT? What role will permissionless innovation play, and what its limits? How will intellectual property laws complicate the IoT?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event, overall, is expected to be a thought provoking one for discussion on things related to IoT.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things'&gt;https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-10-03T01:53:25Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope">
    <title>The​ ​Fundamental​ ​Right​ ​to​ ​Privacy:​ ​Part​ ​III SCOPE</title>
    <link>https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope</link>
    <description>
        &lt;b&gt;This is the third paper in a series on the recent judgment on the right to privacy by the nine judge constitution bench of the Supreme Court in a reference matter in Puttaswamy and others v. Union of India. The first two papers on the Sources and Structure of the constitutional right to privacy are available here, and here, respectively.  While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope'&gt;https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-02T04:14:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2017-newsletter">
    <title>September 2017 Newsletter</title>
    <link>https://cis-india.org/about/newsletters/september-2017-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Dear readers,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Previous issues of the newsletters can be &lt;a class="external-link" href="http://cis-india.org/about/newsletters"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Highlights&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;CIS filed a request under the Right to Information Act in March 2016 as part of research for the paper: Patent Working Requirements and Complex Products: An Empirical Assessment of India's Form 27 Practice and Compliance (July 2017). Rohini Lakshané has &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;captured the developments in a blog post&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy. Amber Sinha has dissected the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers on fundamental right to privacy can be &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;accessed here&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;With offline as the theme of the third Internet Researchers' Conference (IRC18), CIS has &lt;a class="external-link" href="https://cis-india.org/raw/posts"&gt;invited teams of two or more members to submit sessions proposals&lt;/a&gt; by Sunday, October 22, 2017. The conference is expected to be held in Himachal Pradesh during February 22-24, 2018. The venue and dates will be confirmed soon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Anonymity-based internet apps like Sarahah may not be as vicious for those surrounded by the comfort of social status. If your experience of Sarahah has been positive, it might be good to reflect on your own cultural and social capital, &lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;wrote Nishant Shah in an article in the Indian Express&lt;/a&gt;, dated September 10, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS in the news:&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/cnn-tech-august-29-2017-rishi-iyengar-privacy-is-now-a-right-in-india"&gt;Privacy is now a right in India. Here's what that means for the tech industry&lt;/a&gt; (Rishi Iyengar; CNN Tech; August 29, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/news/the-times-of-india-kim-arora-russian-social-network-vkontakte-temporarily-blocked-in-india-for-blue-whale-threat"&gt;Russian social network VKontakte temporarily blocked in India for Blue Whale threat&lt;/a&gt; (Kim Arora; The Times of India; September 12, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt;Our    Access to Knowledge programme currently consists of two projects. The    Pervasive Technologies project, conducted under a grant from the    International Development Research Centre (IDRC), aims to conduct    research on the complex interplay between low-cost pervasive    technologies and intellectual property, in order to encourage the    proliferation and development of such technologies as a social good. The    Wikipedia project, which is under a 	grant from the Wikimedia    Foundation, is for the growth of Indic language communities and projects    by designing community collaborations and partnerships 	that recruit    and cultivate new editors and explore innovative approaches to  building   projects.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;►Pervasive Technologies&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-march-2016"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), March 2016 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/a2k/blogs/rti-request-to-indian-patents-office-for-form-27-statement-of-working-of-patents-2015"&gt;RTI request to Indian Patents Office for Form 27&lt;/a&gt; (Statement of Working of patents), 2015 (Rohini Lakshané; September 9, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;►Openness&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;Our  work in the Openness programme   focuses on open data, especially open  government data, open access,  open  education resources, open knowledge  in Indic languages, open  media, and  open technologies and standards -  hardware and software. We  approach  openness as a cross-cutting  principle for knowledge  production and  distribution, and not as a  thing-in-itself.&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Participation in Event&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/openness/news/praja-enhancing-democracy-through-access-to-open-data-what-are-the-roles-of-government-and-civil-society-delhi-sep-08"&gt;Praja - Enhancing Democracy Through Access to Open Data: What Are the Roles of Government and Civil Society?&lt;/a&gt; (Organized by Praja; September 8, 2017; New Delhi). Sumandro Chattapadhyay was a speaker.&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; -----------------------------------&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As  part of its research on privacy and   free speech, CIS is engaged with  two different projects. The first  one  (under a grant from Privacy  International and IDRC) is on  surveillance  and freedom of expression  (SAFEGUARDS). The second one  (under a grant  from MacArthur Foundation)  is on restrictions that the  Indian government  has placed on freedom of  expression online.&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;►Privacy&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Blog Entries&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/rethinking-national-privacy-principles"&gt;Rethinking National Privacy Principles: Evaluating Principles for India's Proposed Data Protection Law&lt;/a&gt; (Amber Sinha; September 11, 2017).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;The Fundamental Right to Privacy: An Analysis&lt;/a&gt; (Amber Sinha; September 27, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p&gt;►Big Data&lt;/p&gt;
&lt;strong&gt;Upcoming Event&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/events/emerging-issues-in-the-internet-of-things"&gt;Emerging Issues in the Internet of Things&lt;/a&gt; (CIS, Bangalore; October 23, 2017). Andrew Rens will give a talk on the research that he is doing at the Internet Governance Lab. &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/strong&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; &lt;/strong&gt;CIS is involved in promoting access and accessibility to   telecommunications services and resources, and has provided inputs to   ongoing policy discussions 	and consultation papers published by TRAI.   It has prepared reports on unlicensed spectrum and accessibility of   mobile phones for persons with disabilities 	and also works with the   USOF to include funding projects for persons with disabilities in its   mandate:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/telecom/blog/business-standard-shyam-ponappa-september-8-2017-revamp-telecom-sector-and-revive-the-economy"&gt;Revamp Telecom Sector &amp;amp; Revive The Economy&lt;/a&gt; (Shyam Ponappa; Business Standard; September 7, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;-----------------------------------&lt;/strong&gt;&lt;br /&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary    research initiative driven by an emerging need to understand the    reconfigurations of 	social practices and structures through the    Internet and digital media technologies, and vice versa. It aims to    produce local and contextual 	accounts of interactions, negotiations,    and resolutions between the Internet, and socio-material and    geo-political processes:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Article&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/indian-express-nishant-shah-september-10-2017-digital-native-what-s-in-a-name-privilege"&gt;Digital native: What’s in a name? Privilege&lt;/a&gt; (Indian Express, September 10, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Announcement &lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/irc18-offline-call"&gt;Internet Researchers' Conference 2018&lt;/a&gt; (IRC18): Offline - Call for Session (P.P. Sneha; September 20, 2017). Teams of two or more members to submit sessions proposals by Sunday, October 22, 2017.&lt;/li&gt;&lt;/ul&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Blog Entry&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://cis-india.org/raw/the-digital-humanities-from-father-busa-to-edward-snowden"&gt;The Digital Humanities from Father Busa to Edward Snowden&lt;/a&gt; (P.P. Sneha; September 4, 2017).&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;----------------------------------- &lt;/strong&gt;&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt;&lt;strong&gt; ----------------------------------- &lt;/strong&gt;&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation    that undertakes interdisciplinary research on internet and digital    technologies from 	policy and academic perspectives. The areas of focus    include digital accessibility for persons with disabilities,  access   to knowledge, intellectual 	property rights, openness (including  open   data, free and open source software, open standards, open access,  open   educational resources, and open video), 	internet governance,    telecommunication reform, digital privacy, and cyber-security. The    academic research at CIS seeks to understand the reconfigurations 	of    social and cultural processes and structures as mediated through the    internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;► Follow us elsewhere&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt; Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Access to Knowledge: &lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Twitter - Information Policy: &lt;a href="https://twitter.com/CIS_InfoPolicy"&gt;https://twitter.com/CIS_InfoPolicy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Facebook - Access to Knowledge:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Access to Knowledge: &lt;a&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-Mail - Researchers at Work: &lt;a&gt;raw@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; List - Researchers at Work: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Support Us&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: justify;"&gt;Please  help us defend consumer and   citizen rights on the Internet! Write a  cheque in favour of 'The Centre   for Internet and Society' and mail it  to us at No. 	194, 2nd 'C'  Cross,  Domlur, 2nd Stage, Bengaluru - 5600  71.&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify;"&gt;► Request for Collaboration&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;p style="text-align: justify;"&gt;We  invite researchers, practitioners,   artists, and theoreticians, both  organisationally and as individuals,  to  engage with us on topics  related internet 	and society, and improve  our  collective understanding  of this field. To discuss such  possibilities,  please write to Sunil  Abraham, Executive Director, at 	  sunil@cis-india.org (for policy  research), or Sumandro Chattapadhyay,   Research Director, at  sumandro@cis-india.org (for academic research),   with an 	indication of  the form and the content of the collaboration  you  might be interested  in. To discuss collaborations on Indic  language  Wikipedia projects, 	 write to Tanveer Hasan, Programme  Officer, at &lt;a&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;&lt;em&gt;CIS  is grateful to its primary   donor the Kusuma Trust founded by Anurag  Dikshit and Soma Pujari,   philanthropists of Indian origin for its core  funding and 	support for   most of its projects. CIS is also grateful to  its other donors,   Wikimedia Foundation, Ford Foundation, Privacy  International, UK, Hans  	 Foundation, MacArthur Foundation, and IDRC for  funding its various   projects&lt;/em&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2017-newsletter'&gt;https://cis-india.org/about/newsletters/september-2017-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-11-21T15:19:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis">
    <title>The Fundamental Right to Privacy: An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis</link>
    <description>
        &lt;b&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy.​ ​In​ ​the​ ​course​ ​of​ ​a​ ​547​ ​page judgment,​ ​the​ ​bench​ ​affirmed​ ​the​ ​fundamental​ ​nature​ ​of​ ​the​ ​right​ ​to​ ​privacy reading​ ​it​ ​into​ ​the​ ​values​ ​of​ ​dignity​ ​and​ ​liberty.​ In the course of a few short papers, we will dissect the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers will focus on the sources, structure, scope, breadth, and future of privacy. Here are the first three papers, authored by Amber Sinha and edited by Elonnai Hickok.


&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​I:​ ​Sources&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Much​ ​of​ ​the​ ​debate​ ​and​ ​discussion​ ​in​ ​the​ ​hearings​ ​before​ ​the​ ​constitutional​ ​bench was​ ​regarding​ ​where​ ​in​ ​the​ ​Constitution​ ​a​ ​right​ ​to​ ​privacy​ ​may​ ​be​ ​located.​ In​ ​this paper,​ ​we​ ​analyse​ ​the​ ​different​ ​provisions​ ​and​ ​tools​ ​of​ ​interpretations​ ​use​ ​by​ ​the bench​ ​to​ ​read​ ​a​ ​right​ ​to​ ​privacy​ ​in​ ​Part​ ​III​ ​of​ ​the​ ​Constitution.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-i-sources-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - ​Part​ ​II:​ Structure&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;​In​ ​the​ ​previous​ ​paper,​ ​we delved​ ​into​ ​the​ ​ ​sources​ ​in​ ​the​ ​Constitution​ ​and​ ​the​ ​interpretive​ ​tools​ ​used​ ​to​ ​locate 
the​ ​right​ ​to​ ​privacy​ ​as​ ​a​ ​constitutional​ ​right.​ ​This​ ​paper​ ​follows​ ​it​ ​up​ ​with​ ​an​ ​analysis of​ ​the​ ​structure​ ​of​ ​the​ ​right​ ​to​ ​privacy​ ​as​ ​articulated​ ​by​ ​the​ ​bench.​ ​We​ ​will​ ​look​ ​at​ ​the various​ ​facets​ ​of​ ​privacy​ ​which​ ​form​ ​a​ ​part​ ​of​ ​the​ ​fundamental​ ​right,​ ​the​ ​basis​ ​for such​ ​dimensions​ ​and​ ​what​ ​their​ ​implications​ ​may​ ​be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​III:​ Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope/at_download/file" class="external-link"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-04T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-shaikh-zoaib-saleem-september-20-2017-should-you-worry-about-identity-theft">
    <title>Should you worry about identity theft?</title>
    <link>https://cis-india.org/internet-governance/news/livemint-shaikh-zoaib-saleem-september-20-2017-should-you-worry-about-identity-theft</link>
    <description>
        &lt;b&gt;Laws in India regarding data protection may be weak, but following basic cyber hygiene rules can make your own defences stronger.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shaikh Zoaib Saleem was published in &lt;a class="external-link" href="http://www.livemint.com/Money/ABgusszVZhUExJmXOlMy9O/Should-you-worry-about-identity-theft.html"&gt;Livemint&lt;/a&gt; on September 20, 2017. Pranesh Prakash quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="A5l" style="text-align: justify; "&gt;Earlier  this month, US-based credit information company Equifax Inc. said its  systems had been struck by a cybersecurity incident that may have  affected about 143 million US consumers. A report by Bloomberg said the  incident could be ranked among one of the largest data breaches in  history. The intruders accessed names, social security numbers, birth  dates, addresses, driver’s licence numbers and also credit card numbers,  Equifax said in a statement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this reiterates what cyber  security professionals say, that nothing is hack proof, it does remind  us of the range of cyber crimes, which revolve around identity theft and  frauds. It gives us a chance to reflect upon how well prepared we are,  if a cyber attack strikes us, or if our personally identifiable data  gets leaked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the &lt;i&gt;Norton Cyber Security Insights Report 2016&lt;/i&gt;,  49% of India’s online population, or more than 115 million Indians, are  affected by cybercrime at some point with the country ranking second in  terms of highest number of victims. “No government or organisation  creates something that is designed to fail deliberately. People find the  gaps in that system and then try to misuse it,” said Ritesh Chopra,  country manager, consumer business unit, Symantec India, a cyber  security company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it can be debated as to who should take  the blame in different instances, one underlying theme is following  basic cyber hygiene. “There are several mobile apps that leak data.  While downloading and installing an app, you may give out access to  several other things in your device,” said Chopra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most cyber  crimes involve leak or breach of public information, which leads to  identity fraud. Let’s take a look at what an identity fraud could mean.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Identity theft and frauds &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Everything  that we do online is linked to a digital identity—an email ID, a phone  number or even an IP address of a device. Harshil Doshi, strategy  security consultant, Forcepoint India, a cyber security firm, said that  as long as the leaked information is limited to names, email addresses,  addresses and mobile numbers, there may not be a reason for worrying.  “There needs to be a distinction between what information is publicly  available and what can be used only privately. People also talk about  Aadhaar leaks. As long as it is not my fingerprint and retina scan,  there is no cause of concern, because information like name and address  are anyway public,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, not everyone agrees with  this point of view. Pranesh Prakash, policy director at advocacy group  Centre for Internet and Society, said email addresses, date of birth and  mobile phone number of an individual are not necessarily public  information. “Work-related email addresses may be publicly available  online but personal ones are not,” he said. Prakash, however, added that  our notion of public information keeps changing.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Identity fraud impact &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  concept of identity theft has become complicated as our digital lives  expand. “Everything about you as an individual is your identity,  including something personal like blood group and medical history. Your  social media profile, bank transactions, blogs or online comments are  also a part of this. From a fraud perspective, it is equally complex,”  said Chopra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Your identity can be impersonated in several  ways. “The most common methods of identity fraud all require collecting  publicly-available information about you,” said Prakash. For example,  celebrity leaks in the US (cloud storage was hacked) happened also  because there is more information about celebrities publicly available  than for an average individual, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another example could  be misuse of information regarding foreign exchange. “In India, there is  a limit of buying foreign exchange worth $30,000 for an individual in a  year. If information on how many times you exhaust that limit falls in  the wrong hands, it can be used for money laundering in your name. How  many people think about how PAN and passport copy that one shares to buy  foreign exchange, can be misused?” said Chopra.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, health  insurance can be fudged and somebody can use the benefit under your name  or buy restricted medicines misusing your medical prescription.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;What the law says &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  are provisions in the Indian Penal Code that deal with issues like  cheating by impersonation to some extent. “There isn’t anything that  adequately covers activities such as getting access to your personal  data, which leads to identity fraud, or sufficiently penalizes things  like data breaches or data leaks that facilitate identity fraud,” said  Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is working towards data protection laws. A  committee for data protection framework has been constituted under  Justice B.N. Srikrishna, former judge of Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But it  needs to be seen what comes out of these deliberations. “I am quite  apprehensive, yet hopeful, about what the committee will produce,  especially because they will need to deal with protection of biometric  data, leaks of which will be far worse than any other leaks because  biometrics is something that cannot be changed at will subsequent to a  leak, unlike one’s phone number, email address or password,” said  Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to cyber security professionals, prevention  seems the only way out. “We have forgotten the difference between the  real and virtual worlds. In the real world, if somebody knocks at your  door, you will check before opening the door ,” said Chopra. The problem  for individuals starts when we click on a malicious link or download a  file like a song or an image which could have a malware loaded on it.  Once it enters our system, it immediately starts stealing information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  the law may take some time to evolve and address the issues arising out  of larger data breaches from corporate entities or even from the  government, it is important to be vigilant, which includes having  complex passwords, not sharing passwords, being aware of suspicious  emails and messages and downloading files and software only from reputed  sources. While this alone may not guarantee you protection online, it  certainly minimises the risk.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-shaikh-zoaib-saleem-september-20-2017-should-you-worry-about-identity-theft'&gt;https://cis-india.org/internet-governance/news/livemint-shaikh-zoaib-saleem-september-20-2017-should-you-worry-about-identity-theft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-11-26T11:24:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
