<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2921 to 2935.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-dissent"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/best-practices-meet-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/five-nations-one-future"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-business-incubators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality">
    <title>Regulatory Perspectives on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality</link>
    <description>
        &lt;b&gt;In this paper Pranesh Prakash gives an overview on why India needs to put in place net neutrality regulations, and the form that those regulations must take to avoid being over-regulation.&lt;/b&gt;
        &lt;p&gt;With assistance by Vidushi Marda (Programme Officer, Centre for Internet and Society)     and Tarun Krishnakumar (Research Volunteer, Centre for Internet and Society). &lt;i&gt;I would like to specially thank Vishal Misra, Steve Song, Rudolf van  der Berg, Helani Galpaya, A.B. Beliappa, Amba Kak, and Sunil Abraham for  extended discussions, helpful suggestions and criticisms.  However,  this paper is not representative of their views, which are varied.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Today, we no longer live in a world of "roti, kapda, makaan", but in the world of "roti, kapda, makaan aur broadband".    &lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is recognized by the National Telecom Policy IV.1.2, which states the need to "recognise telecom, including broadband connectivity as a basic necessity like education and health and work towards 'Right to Broadband'."&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; According to the IAMAI, as of October 2014, India had 278 million internet users.    &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Of these, the majority access Internet through their mobile phones, and the WEF     estimates only 3 in 100 have broadband on their mobiles.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, the bulk of our     population is without broadband. Telecom regulation and net neutrality has a very important role in enabling this vision of Internet as a basic human need     that we should aim to fulfil.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.49zh04wwxm9l"&gt;&lt;/a&gt; &lt;b&gt;1. Why should we regulate the telecom sector? &lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;All ICT regulation should be aimed at achieving five goals: achieving universal, affordable access;    &lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; ensuring and sustaining effective competition in an efficient market and avoiding     market failures; protecting against consumer harms; ensuring maximum utility of the network by ensuring interconnection; and addressing state needs     (taxation, security, etc.). Generally, all these goals go hand in hand, however some tensions may arise. For instance, universal access may not be provided     by the market because the costs of doing so in certain rural or remote areas may outweigh the immediate monetary benefits private corporations could     receive in terms of profits from those customers. In such cases, to further the goal of universal access, schemes such as universal service obligation     funds are put in place, while ensuring that such schemes either do not impact competition or very minimally impact it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that to maximise societal benefit, effective regulation of the ICT sector is a requirement, which otherwise, due to the ability of dominant     players to abuse network effect to their advantage, is inherently prone towards monopolies. For instance, in the absence of regulation, a dominant player     would charge far less for intra-network calls than inter-network calls, making customers shift to the dominant network. This kind of harm to competition     should be regulated by the ICT regulator. However, it is equally true that over-regulation is as undesirable as under-regulation, since over-regulation     harms innovation - whether in the form of innovative technologies or innovative business models. The huge spurt of growth globally of the telecom sector     since the 1980s has resulted not merely from advancements in technology, but in large part from the de-monopolisation and deregulation of the telecom     sector.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, the Internet has largely flourished under very limited     technology-specific regulation. For instance, while interconnection between different telecom networks is heavily regulated in the domestic telecom sector,     interconnection between the different autonomous systems (ASes) that make up the Internet is completely unregulated, thereby allowing for non-transparent     pricing and opaque transactions. Given this context, we must ensure we do not over-regulate, lest we kill innovation.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="h.psqblglrgt68"&gt;&lt;/a&gt; &lt;b&gt;2. Why should we regulate Net Neutrality? And whom should we regulate?&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;We wouldn't need to regulate Net Neutrality if ISPs were not "&lt;b&gt;gatekeepers&lt;/b&gt;" for last-mile access. "Gatekeeping" occurs when a single     company establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for     Internet services to reach the customers of the telecom network without passing through the telecom network. The situation is very different in the     middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in "transit     agreements", a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and     is thus inefficient in a way). However, this multiplicity of routes is not possible in the last mile.&lt;/p&gt;
&lt;p&gt;This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications,     while harming consumer choice. This is why we believe that promoting the five goals mentioned above would require regulation of last-mile telecom operators     to prevent unjust discrimination against end-users and content providers.&lt;/p&gt;
&lt;p&gt;Thus,     &lt;b&gt; net neutrality is the principle that we should regulate gatekeepers to ensure they do not use their power to unjustly discriminate between similarly         situated persons, content or traffic. &lt;/b&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.79auvw7dxb9s"&gt;&lt;/a&gt; &lt;b&gt;3. How should we regulate Net Neutrality?&lt;/b&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;a name="h.288fq19cym4p"&gt;&lt;/a&gt; 3.1. What concerns does Net Neutrality raise? What harms does it entail?&lt;/h2&gt;
&lt;p&gt;Discriminatory practices at the level of access to the Internet raises the following set of concerns:&lt;/p&gt;
&lt;p&gt;1. Freedom of speech and expression, freedom of association, freedom of assembly, and privacy.&lt;/p&gt;
&lt;p&gt;2. Harm to effective competition&lt;/p&gt;
&lt;p&gt;a. This includes competition amongst ISPs as well as competition amongst content providers.&lt;/p&gt;
&lt;p&gt;b. Under-regulation here may cause harm to innovation at the content provider level, including through erecting barriers to entry.&lt;/p&gt;
&lt;p&gt;c. Over-regulation here may cause harm to innovation in terms of ISP business models.&lt;/p&gt;
&lt;p&gt;3. Harm to consumers&lt;/p&gt;
&lt;p&gt;a. Under-regulation here may harm consumer choice and the right to freedom of speech, expression, and communication.&lt;/p&gt;
&lt;p&gt;b. Over-regulation on this ground may cause harm to innovation at the level of networking technologies and be detrimental to consumers in the long run.&lt;/p&gt;
&lt;p&gt;4. Harm to "openness" and interconnectedness of the Internet, including diversity (of access, of content, etc.)&lt;/p&gt;
&lt;p&gt;a. Exceptions for specialized services should be limited to preserve the open and interconnectedness of the Internet and of the World Wide Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It might help to think about Net Neutrality as primarily being about two overlapping sets of regulatory issues: preferential treatment of particular     Internet-based services (in essence: content- or source-/destination-based discrimination, i.e., discrimination on basis of 'whose traffic it is'), or     discriminatory treatment of applications or protocols (which would include examples like throttling of BitTorrent traffic, high overage fees upon breaching     Internet data caps on mobile phones, etc., i.e., discrimination on the basis of 'what kind of traffic it is').&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Situations where the negative or positive discrimination happens on the basis of particular content or address should be regulated through the use of         competition principles, while negative or positive discrimination at the level of specific class of content, protocols, associated ports, and other         such sender-/receiver-agnostic features, should be regulated through regulation of network management techniques &lt;/b&gt; . The former deals with instances where the question of "in whose favour is there discrimination" may be asked, while the latter deals with the question     "in favour of what is there discrimination".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to do this, a regulator like TRAI can use both hard regulation - price ceilings, data cap floors, transparency mandates, preventing specific     anti-competitive practices, etc. - as well as soft regulation - incentives and disincentives.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.y84hsu73ibky"&gt;&lt;/a&gt; 3.1.1 Net Neutrality and human rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any discussion on the need for net neutrality impugns the human rights of a number of different stakeholders. Users, subscribers, telecom operators and     ISPs all possess distinct and overlapping rights that are to be weighed against each other before the scope, nature and form of regulatory intervention are     finalised. The freedom of speech, right to privacy and right to carry on trade raise some of the most pertinent questions in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, to properly consider issues surrounding the practice of paid content-specific zero-rating from a human rights point of view, one must seek to     balance the rights of content providers to widely disseminate their 'speech' to the largest audiences against the rights of consumers to have access to a     diverse variety of different, conflicting and contrasting ideas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to a veritable marketplace or free-market of ideas has formed the touchstone of freedom of speech law in jurisdictions across the world as well as finding mention in pronouncements of the Indian Supreme Court. Particular reference is to be made to the dissent of Mathew, J. in&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and of the majority    &lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which rejected the approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the practice of deep-packet inspection, which is sometimes used in the process of network management, raises privacy concerns as it seeks to go beyond what is "public" information in the header of an IP packet, necessary for routing, to analysing non-public information.    &lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.yjyiwnikxizu"&gt;&lt;/a&gt; 3.2 What conditions and factors may change these concerns and the regulatory model we should adopt?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the principles relating to Net Neutrality remain the same in all countries (i.e., trying to prevent gatekeepers from unjustly exploiting their     position), the severity of the problem varies depending on competition in the market, on the technologies, and on many other factors. One way to measure     fair or stable allocation of the surplus created by a network - or a network-of-networks like the Internet - is by treating it as a convex cooperation game     and thereupon calculating that game's Shapley value:&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the case of the Internet,     this would be a game involving content ISPs, transit ISPs, and eyeball (i.e., last-mile) ISPs. The Shapley value changes depending on the number of     competitors there are in the market: thus, the fair/stable allocation when there's vibrant competition in the market is different from the fair/stable     allocation in a market without such competition. That goes to show that a desirable approach when an ISP tries to unjustly enrich itself by charging other     network-participants may well be to increase competition, rather than directly regulating the last-mile ISP. Further, it shows that in a market with     vibrant last-mile competition, the capacity of the last-mile ISP to unjustly are far diminished.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In countries which are remote and have little international bandwidth, the need to conserve that bandwidth is high. ISPs can regulate that by either     increasing prices of Internet connections for all, or by imposing usage restrictions (such as throttling) on either heavy users or bandwidth-hogging     protocols. If the amount of international bandwidth is higher, the need and desire on part of ISPs to indulge in such usage restrictions decreases. Thus,     the need to regulate is far higher in the latter case, than in the former case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above paragraphs show that both the need for regulation and also the form that the regulation should take depend on a variety of conditions that aren't     immediately apparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the framework that the regulator sets out to tackle issues relating to Net Neutrality are most important, whereas the specific rules may need to     change depending on changes in conditions. These conditions include:&lt;/p&gt;
&lt;p&gt;● last-mile market&lt;/p&gt;
&lt;p&gt;○ switching costs between equivalent service providers&lt;/p&gt;
&lt;p&gt;○ availability of an open-access last-mile&lt;/p&gt;
&lt;p&gt;○ availability of a "public option" neutral ISP&lt;/p&gt;
&lt;p&gt;○ increase or decrease in the competition, both in wired and mobile ISPs.&lt;/p&gt;
&lt;p&gt;● interconnection market&lt;/p&gt;
&lt;p&gt;○ availability of well-functioning peering exchanges&lt;/p&gt;
&lt;p&gt;○ availability of low-cost transit&lt;/p&gt;
&lt;p&gt;● technology and available bandwidth&lt;/p&gt;
&lt;p&gt;○ spectrum efficiency&lt;/p&gt;
&lt;p&gt;○ total amount of international bandwidth and local network bandwidth&lt;/p&gt;
&lt;p&gt;● conflicting interests of ISPs&lt;/p&gt;
&lt;p&gt;○ do the ISPs have other business interests other than providing Internet connectivity? (telephony, entertainment, etc.)&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.1yozvmhaur7z"&gt;&lt;/a&gt; 3.3 How should we deal with anti-competitive practices?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Anti-competitive practices in the telecom sector can take many forms: Abuse of dominance, exclusion of access to specific services, customer lock-in,     predatory pricing, tying of services, cross-subsidization, etc., are a few of them. In some cases the anti-competitive practice targets other telecom     providers, while in others it targets content providers. In the both cases, it is important to ensure that ensure that telecom subscribers have a     competitive choice between effectively substitutable telecom providers and an ability to seamlessly switch between providers.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.smm9g46xsi3q"&gt;&lt;/a&gt; 3.3.1 Lowering Switching Costs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;TRAI has tackled many of these issues head on, especially in the mobile telephony space, while competitive market pressures have helped too:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Contractual or transactional lock-in&lt;/b&gt;. The easiest way to prevent shifting from one network to another is by contractually     mandating a lock-in period, or by requiring special equipment (interoperability) to connect to one's network. In India, this is not practised in the     telecom sector, with the exception of competing technologies like CDMA and GSM. Non-contractual lock-ins, for instance by offering discounts for purchasing     longer-term packages, are not inherently anti-competitive unless that results in predatory pricing or constitutes an abuse of market dominance. In India,     switching from one mobile provider to another, though initiated 15 years into the telecom revolution, is in most cases now almost as easy as buying a new     SIM card.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; TRAI may consider proactive regulation against contractual lock-in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number of competitors&lt;/b&gt;. Even if switching from one network to another is easy, it is not useful unless there are other equivalent     options to switch to. In the telecom market, coverage is a very important factor in judging equivalence. Given that last mile connectivity is extremely     expensive to provide, the coverage of different networks are very different, and this is even more true when one considers wired connectivity, which is     difficult to lay in densely-populated urban and semi-urban areas and unprofitable in sparsely-populated areas. The best way to increase the number of     competitors is to make it easier for competitors to exist. Some ways of doing this would be through enabling spectrum-sharing, lowering right-of-way rents,     allowing post-auction spectrum trading, and promoting open-access last-mile fibre carriers and to thereby encourage competition on the basis of price and     service and not exclusive access to infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Interconnection and mandatory carriage&lt;/b&gt;. The biggest advantage a dominant telecom player has is exclusive access to its customer     base. Since in the telecom market, no telco wants to not connect to customers of another telco, they do not outright ban other networks. However, dominant     players can charge high prices from other networks, thereby discriminating against smaller networks. In the early 2000s, Airtel-to-Airtel calls were much     cheaper than Airtel-to-Spice calls. However, things have significantly changed since then. TRAI has, since the 2000s, heavily regulated interconnection and     imposed price controls on interconnection ("termination") charges.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, now,     generally, inter-network calls are priced similarly to intra-network calls. And if you want cheaper Airtel-to-Airtel calls, you can buy a special     (unbundled) pack that enables an Airtel customer to take advantage of the fact that her friends are also on the same network, and benefits Airtel since     they do not in such cases have to pay termination charges. Recently, TRAI has even made the interconnection rates zero in three cases:     landline-to-landline, landline-to-cellular, and cellular-to-landline, in a bid to decrease landline call rates, and incentivise them, allowing a very low per call interconnection charges of 14 paise for cellular-to-cellular connections.    &lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ With regard to Net Neutrality, we must have a rule that     &lt;b&gt; no termination charges or carriage charges may be levied by any ISP upon any Internet service. No Internet service may be discriminated against with         regard to carriage conditions or speeds or any other quality of service metric. In essence &lt;i&gt;all&lt;/i&gt; negative discrimination should be prohibited. &lt;/b&gt; This means that Airtel cannot forcibly charge WhatsApp or any other OTT (which essentially form a different "layer") money for the "privilege" of being     able to reach Airtel customers, nor may Airtel slow down WhatsApp traffic and thus try to force WhatsApp to pay. There is a duty on telecom providers to     carry any legitimate traffic ("common carriage"), not a privilege. It is important to note that consumer-facing TSPs get paid by other interconnecting     Internet networks in the form of &lt;i&gt;transit charges&lt;/i&gt; (or the TSP's costs are defrayed through peering). There shouldn't be any separate charge on the     basis of content (different layer from the carriage) rather than network (same layer as the carriage). This principle is especially important for startups,     and which are often at the receiving end of such discriminatory practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number Portability&lt;/b&gt;. One other factor that prevents users from shifting between one network and another is the fact that they have     to change an important aspect of their identity: their phone number (this doesn't apply to Internet over DSL, cable, etc.). At least in the mobile space, TRAI has for several years tried to mandate seamless mobile number portability. The same is being tried by the European Commission in the EU.    &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While intra-circle mobile number portability exists in India - and TRAI is     pushing for inter-circle mobile number portability as well&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - this is nowhere as     seamless as it should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Multi-SIM phones&lt;/b&gt;. The Indian market is filled with phones that can accommodate multiple SIM cards, enabling customers to shift     seamlessly between multiple networks. This is true not just in India, but most developing countries with extremely price-sensitive customers. Theoretically, switching costs would approach zero if in a market with full coverage by &lt;i&gt;n&lt;/i&gt; telecom players every subscriber had a phone with    &lt;i&gt;n &lt;/i&gt;SIM slots with low-cost SIM cards being available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation in the telecom sector with respect to the above provides a stark contrast to the situation in the USA, and to the situation in the DTH     market. In the USA, phones get sold at discounts with multi-month or multi-year contracts, and contractual lock-ins are a large problem. Keeping each of     the above factors in mind, the Indian mobile telecom space is far more competitive than the US mobile telecom space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in the Indian DTH market, given that there is transactional lock-in (set-top boxes aren't interoperable in practice, though are mandated to be so     by law&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;), there are fewer choices in the market; further, the equivalent of     multi-SIM phones don't exist with respect to set-top boxes. Further, while there are must-carry rules with respect to carriage, they can be of three types:     1) must mandatorily provide access to particular channels&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (positive obligation,     usually for government channels); 2) prevented from not providing particular channels (negative obligation, to prevent anti-competitive behaviour and political censorship); and 3) must mandatorily offer access to at least a set number of channels (positive obligation for ensuring market diversity).    &lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Currently, only (1) is in force, since despite attempts by TRAI to ensure (3) as     well.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the shifting costs are low and transparency in terms of network practice is reported in a standard manner and well-publicised, then that significantly     weakens the "&lt;b&gt;gatekeeper effect&lt;/b&gt;", which as we saw earlier, is the reason why we wish to introduce Net Neutrality regulation. This     consequently means, as explained above in section 3.2, that     &lt;b&gt; &lt;i&gt; despite the same Net Neutrality principles applying in all markets and countries, the precise form that the Net Neutrality regulations take in a             telecom market with low switching costs would be different from the form that such regulations would take in a market with high switching costs. &lt;/i&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.glaa2bev2dhk"&gt;&lt;/a&gt; 3.3.2 Anti-competitive Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some potential anti-competitive practices, which are closely linked, are cross-subsidization, tying (anti-competitive bundling) of multiple services, and     vertical price squeeze. All three of these are especial concerns now, with the increased diversification of traditional telecom companies, and with the entry into telecom (like with DTH) of companies that create content. Hence, if Airtel cross-subsidizes the Hike chat application that it recently acquired,    &lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or if Reliance Infocomm requires customers to buy a subscription to an offering     from Reliance Big Entertainment, or if Reliance Infocomm meters traffic from another Reliance Big Entertainment differently from that from Saavn, all those     would be violative of the &lt;b&gt;principle of non-discrimination by gatekeepers&lt;/b&gt;. This same analysis can be applied to all unpaid deals and     non-commercial deals, including schemes such as Internet.org and Wikipedia Zero, which will be covered later in the section on zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we have general rules such as sections 3 and 4 of the Competition Act,     &lt;b&gt; we do not currently have specific rules prohibiting these or other anti-competitive practices, and we need Net Neutrality regulation that clearly         prohibit such anti-competitive practices so that the telecom regulator can take action for non-compliance &lt;/b&gt; . We cannot leave these specific policy prescriptions unstated, even if they are provided for in    &lt;a href="http://indiankanoon.org/doc/1153878/"&gt;section 3 of the Competition Act&lt;/a&gt;. These concerns are especial concerns in the telecom sector, and the     telecom regulator or arbitrator should have the power to directly deal with these, instead of each case going to the Competition Commission of India. This     should not affect the jurisdiction of the CCI to investigate and adjudicate such matters, but should ensure that TRAI both has suo motu powers, and that     the mechanism to complain is made simple (unlike the current scenario, where some individual complainants may fall in the cracks between TRAI and TDSAT).&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.yd0ptbr561l8"&gt;&lt;/a&gt; 3.3.3 Zero-rating&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since a large part of the net neutrality debate in India involves zero-rating practices, we deal with that in some length. Zero-rating is the practice of     not counting (aka "zero-rating") certain traffic towards a subscriber's regular Internet usage. The     &lt;b&gt; zero-rated traffic could be zero-priced or fixed-price; capped or uncapped; subscriber-paid, Internet service-paid, paid for by both, or unpaid;         content- or source/destination-based, or agnostic to content or source/destination; automatically provided by the ISP or chosen by the customer &lt;/b&gt; . The motivations for zero-rating may also be varied, as we shall see below. Further, depending on the circumstances, zero-rating could be competitive or     anti-competitive. All forms of zero-rating result in some form of discrimination, but not all zero-rating is harmful, nor does all zero-rating need to be     prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While, as explained in the section on interconnection and carriage above, negative discrimination at the network level should be prohibited, that leaves     open the question of positive discrimination. It follows from section 3.1 that the right frame of analysis of this question is harm to competition, since     the main harm zero-rating is, as we shall see below, about discriminating between different content providers, and not discrimination at the level of     protocols, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether one should allow for any form of positive discrimination at the network level or not depends on whether positive discrimination of (X) has an     automatic and unfair negative impact on all (~X). That, in turn, depends on whether (~X) is being subject to unfair competition. As Wikipedia notes,     "unfair competition means that the gains of some participants are conditional on the losses of others, when the gains are made in ways which are     illegitimate or unjust."     &lt;b&gt; Thus, positive discrimination that has a negative impact on effective competition shall not be permitted, since in such cases it is equivalent to         negative discrimination ("zero-sum game") &lt;/b&gt; .     &lt;b&gt; Positive discrimination that does not have a negative impact on effective competition may be permitted, especially since it results in increased access         and increases consumer benefit, as long as the harm to openness and diversity is minimized &lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While considering this, one should keep in mind the fact that startups were, 10-15 years ago, at a huge disadvantage with regard to wholesale data     purchase. The marketplaces for data centres and for content delivery networks (which speed up delivery of content by being located closer, in network     terms, to multiple last-mile ISPs) were nowhere near as mature as they are today, and the prices were high. There was a much higher barrier to startup     entry than there is today, due to the prices and due to larger companies being able to rely on economies of scale to get cheaper rates. Was that unfair?     No. There is no evidence of anti-competitive practices, nor of startups complaining about such practices. Therefore, that was fair competition, despite     specific input costs that were arguably needed (though not essential) for startups to compete being priced far beyond their capacity to pay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the marketplace is very different, with a variety of offerings. CDNs such as Cloudflare, which were once the preserve of rich companies, even have     free offerings, thus substantially lowering barriers for startups that want faster access to customers across the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is a CDN an essential cost for a startup? No. But in an environment where speed matters and customers use or don't use a service depending on speed; and     where the startup's larger competitors are all using CDNs, a startup more or less has to. Thankfully, given the cheap access to CDNs these days, that cost     is not too high for a startup to bear. If the CDN market was not competitive enough, would a hypothetical global regulator have been justified in outright     banning the use of CDNs to 'level' the playing field? No, because the hypothetical global regulator instead had the option to (and would have been     justified in) regulating the market to ensure greater competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; A regulator should not prohibit an act that does not negatively impact access, competition, consumer benefit, nor openness (including diversity), since         that would be over-regulation and would harm innovation. &lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.3j3bch9mpwr2"&gt;&lt;/a&gt; 3.3.3.1 Motivations for Zero-Rating&lt;/h4&gt;
&lt;h5&gt;&lt;a name="h.pxa0ovwqncfy"&gt;&lt;/a&gt; 3.3.3.1.1 Corporate Social Responsibility / Incentivizing Customers to Move Up Value Chain&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There exist multiple instances where there is no commercial transaction between the OTT involved and the telecom carrier, in which zero-priced zero-rating     of specific Internet content happens. We know that there is no commercial transaction either through written policy (Wikipedia Zero) or through public     statements (Internet.org, a bouquet of sites). In such cases, the telecom provider would either be providing such services out of a sense of public     interest, given the social value of those services, or would be providing such services out of self-interest, to showcase the value of particular Internet     set the same time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apprehended risk is that of such a scheme creating a "walled garden", where users would be exposed only to those services which are free since the    &lt;i&gt;search and discovery costs&lt;/i&gt; of non-free Internet (i.e., any site outside the "walled garden") would be rather high. This risk, while real, is     rather slim given the fact that the economic incentives for those customers who have the ability to pay for "Internet packs" but currently do not find a     compelling reason to do so, or out of both a sense of public interest and self-interest of the telecom providers works against this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gzz6numa7y24"&gt;&lt;/a&gt; In such non-commercial zero-priced zero-rating, a telecom provider would only make money if and only if subscribers start paying for sites outside of the     walled garden. If subscribers are happy in the walled garden, the telecom provider starts losing money, and hence has a strong motivation to stop that     scheme. If on the other hand, enough subscribers start becoming paying customers to offset the cost of providing the zero-priced zero-rated service(s) and     make it profitable, that shows that despite the availability of zero-priced options a number of customers will opt for paid access to the open Internet and     the open Web, and the overall harms of such zero-priced zero-rating would be minimal. Hence, the telecom providers have an incentive to keep the costs of     Internet data packs low, thus encouraging customers who otherwise wouldn't pay for the Internet to become paying customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is the potential of consumer harm when users seek to access a site outside of the walled garden, and find to their dismay that they have been charged     for the Internet at a hefty rate, and their prepaid balance has greatly decreased. This is an issue that TRAI is currently appraised of, and a suitable     solution would need to be found to protect consumers against such harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All in all, given that the commercial interests of the telecom providers align with the healthy practice of non-discrimination, this form of limited     positive discrimination is not harmful in the long run, particularly because it is not indefinitely sustainable for a large number of sites. Hence, it may     not be useful to ban this form of zero-priced zero-rating of services as long as they aren't exclusive, or otherwise anti-competitive (a vertical     price-squeeze, for instance), and the harm to consumers is prohibited and the harm to openness/diversity is minimized.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.2xvaoc7t0zmu"&gt;&lt;/a&gt; 3.3.3.1.2 Passing on ISP Savings / Incentivizing Customers to Lower ISP's Cost&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Suppose, for instance, an OTT uses a CDN located, in network distance terms, near an eyeball ISP. In this case, the ISP has to probably pay less than it     would have to had the same data been located in a data centre located further away, given that it would have fewer interconnection-related charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the monetary costs of providing access to different Web destinations are not equal for the ISP. This cost can be varied either by the OTT (by it     locating the data closer to the ISP - through a CDN, by co-locating where the ISP is also present, or by connecting to an Internet Exchange Point which the     ISP is also connected to - or by it directly "peering" with the ISP) or by the ISP (by engaging in "transparent proxying" in which case the ISP creates     caches at the ISP level of specific content (usually by caching non-encrypted data the ISP's customers request) and serves the cached content when a user     requests a site, rather than serving the actual site). None of the practices so far mentioned are discriminatory from the customer's perspective with     regard either to price or to prioritization, though all of them enable faster speeds to specific content. Hence none of the above-mentioned practices are considered even by the most ardent Net Neutrality advocates to be violations of that principle.    &lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, if an ISP zero-rates the content to either pass on its savings to the     customer&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or to incentivize the customer to access services that cost the ISP less     in terms of interconnection costs, that creates a form of price discrimination for the customer, despite it benefiting the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The essential economic problem is that the cost to the ISP is variable, but the cost to the customer is fixed. Importantly, this problem is exacerbated in India where web hosting prices are high, transit prices are high, peering levels are low, and Internet Exchange Points (IXPs) are not functioning well.    &lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These conditions create network inefficiencies in terms of hosting of content     further away from Indian networks in terms of network distance, and thus harms consumers as well as local ISPs. In order to set this right, zero-rating of     this sort may be permitted as it acts as an incentive towards fixing the market fundamentals. However, once the market fundamentals are fixed, such     zero-rating may be prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.fpfvyrxp6pif"&gt;&lt;/a&gt; This example shows that the desirability or otherwise of discriminatory practices depends fully on the conditions present in the market, including in terms     of interconnection costs.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.uc9je2dcrwpx"&gt;&lt;/a&gt; 3.3.3.1.3 Unbundling Internet into Services ("Special Packs")&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Since at least early 2014, mobile operators have been marketing special zero-rating "packs". These packs, if purchased by the customer, allow capped or in     some instances uncapped, zero-rating of a service such as WhatsApp or Facebook, meaning traffic to/from that service will not be counted against their     regular Internet usage.&lt;/p&gt;
&lt;p&gt;For a rational customer, purchasing such a pack only makes sense in one of two circumstances:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, but has not purchased an "Internet data pack" since she doesn't find the     Internet valuable. Instead, she has heard about "WhatsApp", has friends who are on it, and wishes to use that to reduce her SMS costs (and thereby eat into     the carriage provider's ability to charge separately for SMSes). She chooses to buy a WhatsApp pack for around ₹25 a month instead of paying     ₹95 for an all-inclusive Internet data pack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, and has purchased an "Internet data pack". However, that data pack is capped     and she has to decide between using WhatsApp and surfing web sites. She is on multiple WhatsApp groups and her WhatsApp traffic eats up 65% of her data     cap. She thus has to choose between the two, since she doesn't want to buy two Internet data packs (each costing around ₹95 for a month). She chooses     to buy a WhatsApp pack for ₹25 a month, paying a cumulative total of ₹120 instead of ₹190 which she would have had to had she bought two     Internet data packs. In this situation, "unbundling" is happening, and this benefits the consumer. Such unbundling harms the openness and integrity of the     Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If users did not find value in the "special" data packs, and there is no market demand for such products, they will cease to be offered. Thus, assuming a     telco's decision to offer such packs is purely customer-demand driven - and not due to deals it has struck with service providers - if Orkut is popular, telcos would be interested in offering Orkut packs and if Facebook is popular, they would be interested in offering a Facebook pack. Thus, clearly,    &lt;b&gt;there is nothing anti-competitive about such customer-paid zero-rating packs, whereas they clearly enhance consumer benefit&lt;/b&gt;. Would this     increase the popularity of Orkut or Facebook? Potentially yes. But to prohibit this would be like prohibiting a supermarket from selectively (and     non-collusively) offering discounts on popular products. Would that make already popular products even more popular? Potentially, yes. But that would not     be seen as a harm to competition but would be seen as fair competition. This contravenes the "openness" of the Internet (i.e., the integral interconnected     diversity that an open network like the Internet embodies) as an independent regulatory goal. The Internet, being a single gateway to a mind-boggling     variety of services, allows for a diverse "long tail", which would lose out if the Internet was seen solely as a gateway to popular apps, sites, and     content. However, given that this is a choice exercised freely by the consumer, such packs should not be prohibited, as that would be a case of     over-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The one exception to the above analysis of competition, needless to say, is if that these special packs aren't purely customer-demand driven and are the     product of special deals between an OTT and the telco. In that case, we need to ensure it isn't anti-competitive by following the prescriptions of the next     section.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.f0rfoerqprro"&gt;&lt;/a&gt; 3.3.3.1.4 Earning Additional Revenues from Content Providers&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;With offerings like Airtel Zero, we have a situation where OTT companies are offering to pay for wholesale data access used by their customers, and make     accessing their specific site or app free for the customer. From the customer's perspective, this is similar to a toll-free number or a pre-paid envelope     or free-to-air TV channel being offered on a particular network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, from the network perspective, these are very different. Even if a customer-company pays Airtel for the toll-free number, that number is accessible     and toll-free across all networks since the call terminates on Airtel networks and Airtel pays the connecting network back the termination charge from the     fee they are paid by the customer-company. This cannot happen in case of the Internet, since the "call" terminates outside of the reach of the ISP being     paid for zero-rating by the OTT company; hence unless specific measures are taken, zero-rating has to be network-specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The comparison to free-to-air channels is also instructive, since in 2010 TRAI made recommendations that consumers should have the choice of accessing     free-to-air channels à-la-carte, without being tied up to a bouquet.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This would, in essence, allow a subscriber to purchase a set-top box, and without paying a regular subscription fee watch free-to-air channels.    &lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, similar to toll-free numbers, these free-to-air channels are     free-to-air on all MSO's set-top boxes, unlike the proposed Airtel Zero scheme under which access to a site like Flipkart would be free for customers on     Airtel's network alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, these comparisons, while useful in helping think through the regulatory and competition issues, &lt;i&gt;should not&lt;/i&gt; be used as instructive exact     analogies, since they aren't fully comparable situations.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.pyn97x5b6nfq"&gt;&lt;/a&gt; 3.3.3.1.5 Market Options for OTT-Paid Zero-Rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;As noted above, a competitive marketplace already exists for wholesale data purchase at the level of "content ISPs" (including CDNs), which sell wholesale     data to content providers (OTTs). This market is at present completely unregulated. The deals that exist are treated as commercial secrets. It is almost     certain that large OTTs get better rates than small startups due to economies of scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, at the eyeball ISP level, it is a single-sided market with ISPs competing to gain customers in the form of end-users. With a scheme like "Airtel     Zero", this would get converted into a double-sided market, with a gatekeeper without whom neither side can reach the other being in the middle creating a     two-sided toll. This situation is ripe for market abuse: this situation allows the gatekeeper to hinder access to those OTTs that don't pay the requisite     toll or to provide preferential access to those who pay, apart from providing an ISP the opportunity to "double-dip".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way to fix this is to prevent ISPs from establishing a double-sided market. The other way would be to create a highly-regulated market where the     gatekeeping powers of the ISP are diminished, and the ISP's ability to leverage its exclusive access over its customers are curtailed. A comparison may be     drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to     them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being     even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus     even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP     innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot     discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other     telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would     enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure     that this doesn't lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs,     and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring     transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need     be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single     marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having     exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for     free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it     doesn't there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all forms of competitive Internet service-paid zero-priced zero-rating, even when they don't harm competition, innovation amongst content     providers, or consumers, will necessarily harm openness and diversity of the Internet. For instance, while richer companies with a strong presence in India     may pay to zero-rate traffic for their Indian customers, decentralized technologies such as XMPP and WebRTC, having no central company behind them, would     not, leading to customers preferring proprietary networks and solutions to such open technologies, which in turn, thanks to the network effect, leads to a     vicious cycle.     &lt;b&gt; These harms to openness and diversity have to be weighed against the benefit in terms of increase in access when deciding whether to allow for         competitive OTT-paid zero-priced zero-rating, as such competition doesn't exist in a truly level playing field &lt;/b&gt; . Further, it must be kept in mind that there are forms of zero-priced zero-rating that decrease the harm to openness / diversity, or completely remove     that harm altogether: that there are other options available must be acknowledged by the regulator when considering the benefit to access from competitive     OTT-paid zero-priced zero-rating.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.huy1gfie05he"&gt;&lt;/a&gt; 3.3.3.1.6 Other options for zero-rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There are other models of zero-priced zero-rating that either minimize the harm is that of ensuring free Internet access for every person. This can take     the form of:&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● A mandatorily "leaky" 'walled garden':&lt;/p&gt;
&lt;p&gt;○ The first-degree of all hyperlinks from the zero-rated OTT service are also free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers during specified     hours.&lt;/p&gt;
&lt;p&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers based on amount     on usage of the OTT service.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● Zero-rating of all Web traffic&lt;/p&gt;
&lt;p&gt;○ In exchange for viewing of advertisements&lt;/p&gt;
&lt;p&gt;○ In exchange for using a particular Web browser&lt;/p&gt;
&lt;p&gt;○ At low speeds on 3G, or on 2G.&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.ncpm1d9hru2b"&gt;&lt;/a&gt; 3.3.3.2. What kinds of zero-rating are good&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The majority of the forms of zero-rating covered in this section are content or source/destination-based zero-rating. Only some of the options covered in     the "other options for zero-rating" section cover content-agnostic zero-rating models. Content-agnostic zero-rating models are not harmful, while     content-based zero-rating models always harm, though to varying degrees, the openness of the Internet / diversity of OTTs, and to varying degrees increase     access to Internet-based services. Accordingly, here is an hierarchy of desirability of zero-priced zero-rating, from most desirable to most harmful:&lt;/p&gt;
&lt;p&gt;1. Content- &amp;amp; source/destination-agnostic zero-priced zero-rating.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. Content- &amp;amp; source/destination-based non-zero-priced zero-rating, without any commercial deals, chosen freely &amp;amp; paid for by users.    &lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. Content- &amp;amp; source/destination-based zero-priced zero-rating, without any commercial deals, with full transparency.    &lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of commercial deal with partial zero-priced access to all content, with     non-discriminatory access to the same deal by all with full transparency.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of a non-commercial deal, without any benefits monetary or otherwise, flowing directly or indirectly from the provider of the zero-rated content to the ISP, with full transparency.    &lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Content- &amp;amp; source-destination-based zero-priced zero-rating, across all telecom networks, with standard pricing, non-discriminatory access, and full     transparency.&lt;/p&gt;
&lt;p&gt;7. Content- &amp;amp; source-destination-based zero-priced zero-rating, with standard pricing, non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;8. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;9. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and transparency to the regulator.&lt;/p&gt;
&lt;p&gt;10. Content- &amp;amp; source-destination-based zero-priced zero-rating, without any regulatory framework in place.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.f8vwrsnhu1fj"&gt;&lt;/a&gt; 3.3.4 Cartels and Oligopoly&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While cartels and oligopolies may have an impact on Net Neutrality, they are not problems that any set of anti-discrimination rules imposed on gatekeepers     can fix. Further, cartels and oligopolies don't directly enhance the ability of gatekeepers to unjustly discriminate if there are firm rules against     negative discrimination and price ceilings and floors on data caps are present for data plans. Given this, TRAI should recommend that this issue be     investigated and the Competition Commission of India should take this issue up.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.1ckcvcwez55d"&gt;&lt;/a&gt; &lt;b&gt;3.4 Reasonable Network Management Principles&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Reasonable network management has to be allowed to enable the ISPs to manage performance and costs on their network. However, ISPs may not indulge in acts     that are harmful to consumers in the name of reasonable network management. Below are a set of guidelines for when discrimination against classes of     traffic in the name of network management are justified.&lt;/p&gt;
&lt;p&gt;● Discrimination between classes of traffic for the sake of network management should only be permissible if:&lt;/p&gt;
&lt;p&gt;○ there is an intelligible differentia between the classes which are to be treated differently, and&lt;/p&gt;
&lt;p&gt;○ there is a rational nexus between the differential treatment and the aim of such differentiation, and&lt;/p&gt;
&lt;p&gt;○ the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical     limitation outside the control of the ISP&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and&lt;/p&gt;
&lt;p&gt;○ the network management practice is the least harmful manner in which to achieve the aim.&lt;/p&gt;
&lt;p&gt;● Provision of specialized services (i.e., "fast lanes") is permitted if and only if it is shown that&lt;/p&gt;
&lt;p&gt;○ The service is available to the user only upon request, and not without their active choice, and&lt;/p&gt;
&lt;p&gt;○ The service cannot be reasonably provided with "best efforts" delivery guarantee that is available over the Internet, and hence requires     discriminatory treatment, or&lt;/p&gt;
&lt;p&gt;○ The discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are only applicable at the level of ISPs, and not on access gateways for institutions that may in some cases be run by ISPs (such as a     university network, free municipal WiFi, at a work place, etc.), which are not to be regulated as common carriers.&lt;/p&gt;
&lt;p&gt;These principles may be applied on a case-by-case basis by a regulator, either &lt;i&gt;suo motu&lt;/i&gt; or upon complaint by customers.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Report of the &lt;i&gt;Special Rapporteur on the Promotion and Protection of the right to freedom of opinion and expression, &lt;/i&gt;(19 May 2011),             http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at http://www.trai.gov.in/WriteReadData/userfiles/file/NTP%202012.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; IAMAI, &lt;i&gt;India to Cross 300 million internet users by Dec 14, &lt;/i&gt;(19 November, 2014),             http://www.iamai.in/PRelease_detail.aspx?nid=3498&amp;amp;NMonth=11&amp;amp;NYear=2014.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; World Economic Forum, &lt;i&gt;The Global Information Technology Report 2015, &lt;/i&gt;http://www3.weforum.org/docs/WEF_Global_IT_Report_2015.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ictregulationtoolkit.org/4.1#s4.1.1&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; R.U.S. Prasad, &lt;i&gt;The Impact of Policy and Regulatory Decisions on Telecom Growth in India&lt;/i&gt; (July 2008),             http://web.stanford.edu/group/siepr/cgi-bin/siepr/?q=system/files/shared/pubs/papers/pdf/SCID361.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1973 AIR 106&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1962 AIR 305&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "When ISPs go beyond their traditional use of IP headers to route packets, privacy risks begin to emerge." Alissa Cooper,            &lt;i&gt;How deep must DPI be to incur privacy risk? &lt;/i&gt;http://www.alissacooper.com/2010/01/25/how-deep-must-dpi-be-to-incur-privacy-risk/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Richard T.B. Ma &amp;amp; Vishal Misra, &lt;i&gt;The Public Option: A Non-Regulatory Alternative to Network Neutrality&lt;/i&gt;,             http://dna-pubs.cs.columbia.edu/citation/paperfile/200/netneutrality.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mobile number portability was launched in India on January 20, 2011 in the Haryana circle. See             &lt;a href="http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html"&gt; http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html &lt;/a&gt; . Accessed on April 24, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For a comprehensive list of all TRAI interconnection regulations &amp;amp; subsequent amendments, see             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Interconnection Usage Charges (Eleventh Amendment) Regulations, 2015 (1 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 30 of the Universal Service Directive, Directive 2002/22/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Mobile Number Portability (Sixth Amendment) Regulations, 2015 (3 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Seventh) (The Direct to Home Services) Tariff Order, 2015 (2 of 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8, Cable Television Networks Act, 1995.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;TRAI writes new rules for Cable TV, Channels, Consumers, &lt;/i&gt; REAL TIME NEWS, (August 11, 2014), http://rtn.asia/rtn/233/1220_trai-writes-new-rules-cable-tv-channels-consumers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; An initial requirement for all multi system operators to have a minimum capacity of 500 channels was revoked by the TDSAT in 2012. For more             details, see http://www.televisionpost.com/cable/msos-not-required-to-have-500-channel-headends-tdsat/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aparna Ghosh, &lt;i&gt;Bharti SoftBank Invests $14 million in Hike, &lt;/i&gt;LIVE MINT, (April 2, 2014),             http://www.livemint.com/Companies/nI38YwQL2eBgE6j93lRChM/Bharti-SoftBank-invests-14-million-in-mobile-messaging-app.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Masnick, &lt;i&gt;Can We Kill This Ridiculous Shill-Spread Myth That CDNs Violate Net Neutrality? They Don't&lt;/i&gt;,             https://www.techdirt.com/articles/20140812/04314528184/can-we-kill-this-ridiculous-shill-spread-myth-that-cdns-violate-net-neutrality-they-dont.shtml.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mathew Carley, What is Hayai's stance on "Net Neutrality"?, https://www.hayai.in/faq/hayais-stance-net-neutrality?c=mgc20150419&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helani Galpaya &amp;amp; Shazna Zuhyle, &lt;i&gt;South Asian Broadband Service Quality: Diagnosing the Bottlenecks&lt;/i&gt;,             http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1979928&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; DTH players told to offer pay channels on la carte basis, HINDU BUSINESS LINE (July 22, 2010),             http://www.thehindubusinessline.com/todays-paper/dth-players-told-to-offer-pay-channels-on-la-carte-basis/article999298.ece.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Fourth) (Addressable Systems) Tariff Order, 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These suggestions were provided by Helani Galpaya and Sunil Abraham, based in some cases on existing practices.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is what is being followed by the Jana Loyalty Program:             &lt;a href="http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/"&gt; http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: free Internet access at low speeds, with data caps.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: special "packs" for specific services like WhatsApp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: zero-rating of all locally-peered settlement-free traffic.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: "leaky" walled gardens, such as the Jana Loyalty Program that provide limited access to all of the Web alongside access to the zero-rated             content.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: Wikipedia Zero.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A CGNAT would be an instance of such a technology that poses network limitations.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2015-07-18T02:46:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age">
    <title>Freedom of Expression in a Digital Age </title>
    <link>https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, the Observer Research Foundation, the Internet Policy Observatory, the Centre for Global Communication Studies and the Annenberg School for Communication, University of Pennsylvania organized this conference on April 21, 2015 in New Delhi.&lt;/b&gt;
        &lt;p&gt;This report was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Effective research, policy formulation, and the development of regulatory frameworks in South Asia&lt;/h2&gt;
&lt;h3&gt;Inside this Report&lt;/h3&gt;
&lt;p class="LO-normal"&gt;BACKGROUND TO THE CONFERENCE&lt;/p&gt;
&lt;p class="LO-normal"&gt;THE ORGANIZERS&lt;/p&gt;
&lt;p class="LO-normal"&gt;CONFERENCE PROGRAMME&lt;/p&gt;
&lt;p class="LO-normal"&gt;WELCOME ADDRESS&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 1: LEARNINGS FROM THE PAST &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Smarika Kumar, &lt;i&gt;Alternative Law Forum&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Bhairav Acharya, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 2: CURRENT REALITIES &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Cherian George, &lt;i&gt;Associate Professor, Hong Kong Baptist University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Zakir Khan, &lt;i&gt;Article 19, Bangladesh&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Chinmayi Arun, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Raman Jit Singh Chima, &lt;i&gt;Asia Consultant, Access Now&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 3: LOOKING AHEAD &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Sutirtho Patranobis, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Karuna Nundy, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Geeta Seshu, &lt;i&gt;The Hoot&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;Conclusion&lt;/p&gt;
&lt;h2&gt;Background to the Conference&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As the Internet expands and provides greater access and enables critical rights such as freedom of expression and privacy, it also places censorship and 	surveillance capabilities in the hands of states and corporations. It is therefore crucial that there exist strong protections for the right to freedom of 	expression that balance state powers and citizen rights. While the Internet has thrown up its own set of challenges such as extremist/hate speech, the 	verbal online abuse of women, and the use of the Internet to spread rumours of violence, the regulation of cont ent is a question that is far from being 	settled and needs urgent attention. These are compounded by contextual challenges. What role can and should the law play? When is it justified for the 	government to intervene? What can be expected from intermediaries, such as social networks and Internet Service Providers (ISPs)? And what can users do to 	protect the right to free speech - their own and that of others?&lt;/p&gt;
&lt;p&gt;Balancing freedom of expression with other rights is further complicated by the challenges of fast paced and changing technologies and the need for 	adaptable and evolving regulatory frameworks. By highlighting these challenges and questioning the application of existing frameworks we aim to contribute 	to further promoting and strengthening the right to freedom of expression across South Asia.&lt;/p&gt;
&lt;h2&gt;The Organizers&lt;/h2&gt;
&lt;h3&gt;Centre for Internet &amp;amp; Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Established in 2008, the Centre for Internet and Society (CIS) is a non-profit research organization that works on policy issues relating to freedom of 	expression, privacy, accessibility for persons with disabilities, access to knowledge and intellectual property rights, and openness (including open 	standards and open government data). CIS also engages in scholarly research on the budding disciplines of digital natives and digital humanities. CIS has 	offices in Bangalore and New Delhi.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Observer Research Foundation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ORF, established in 1990, is India's premier independent public policy think tank and is engaged in developing and discussing policy alternatives on a wide 	range of issues of national and international significance. The fundamental objective of ORF is to influence the formulation of policies for building a strong and prosperous India in a globalised world. It hosts India's largest annual cyber conference -	&lt;i&gt;CyFy: the India Conference on Cyber Security and Internet Governance&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;The Annenberg School for Communication, The Centre for Global Communication Studies &amp;amp; the Internet Policy Observatory (U. Penn.)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The Annenberg School of Communication (ASC) at the University of Pennsylvania produces research that advances the understanding of public and private 	communications. The Center for Global Communication Studies (CGCS) is a focused academic center at ASC and a leader in international education and training 	in comparative media law and policy. It affords students, academics, lawyers, regulators, civil society representatives and others the opportunity to 	evaluate and discuss international communications issues. The Internet Policy Observatory (IPO) was started by CGCS to research the dynamic technological 	and political contexts in which Internet governance debates take place. The IPO serves as a platform for informing relevant communities of activists, 	academics, and policy makers, displaying collected data and analysis.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conference Programme&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;'Freedom of Expression in a Digital Age' &lt;/b&gt;&lt;b&gt;Effective Research, Policy Formation &amp;amp; the Development of Regulatory Frameworks in South Asia&lt;br /&gt;April 21&lt;sup&gt;st&lt;/sup&gt;, 2015 - 11 a.m. to 6 p.m.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;at&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The &lt;/b&gt; &lt;b&gt;Observer Research Foundation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20, Rouse Avenue Institutional Area&lt;/p&gt;
&lt;p&gt;New Delhi - 110 002, INDIA&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;About the Conference&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will be a discussion highlighting the challenges in promoting and strengthening online freedom of expression and evaluating the application of existing regulatory frameworks in South Asia&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agenda&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Learnings from the past&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Current Realities&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Looking ahead &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 1:00&lt;/td&gt;
&lt;td&gt;1:00 - 2:00&lt;/td&gt;
&lt;td&gt;2:00 - 4:00&lt;/td&gt;
&lt;td&gt;4:00- 4:15&lt;/td&gt;
&lt;td&gt;4:15 - 6:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Overview of online FoEx policy and regulatory models across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enabling FOEX in South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Challenges associated with formulating regulation for online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Definitions of FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Ways in which FoEx is, or may be, curtailed online&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Ways forward to bridge existing gaps between policy formation and policy implementation with respect to FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Impact of technology and markets on FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Balancing FoEx and other digital rights &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Exploring emerging regulatory questions for FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Challenges to FoEx online across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;The impact of jurisdiction, multi-national platforms, and domestic regulation on FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Impacting and influencing the development and implementation of Internet regulation through research &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Effective research techniques and online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Role and responsibility of intermediaries in regulating online speech  across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Exploration of the future role and interplay of technology and policy in enabling FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Ms. Mahima Kaul, &lt;i&gt;Head (Cyber &amp;amp; Media Initiative), Observer Research Foundation (ORF)&lt;/i&gt;, introduced the conference and its context and format, as 	well as the organisers. In three sessions, the Conference aimed to explore historical lessons, current realities and future strategies with regard to 	freedom of expression on the Internet in India and South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Manoj Joshi, &lt;i&gt;Distinguished Fellow, ORF&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;provided the welcome address. Mr. Joshi highlighted the complexities and distinctions between 	print and electronic media, drawing on examples from history. He stated that freedom of expression is most often conceived as a positive right in the 	context of print media, as restrictions to the right are strictly within the bounds of the Constitution. For instance, during the riots in Punjab in the 	1980s, when hate speech was prevalent, constitutionally protected restrictions were placed on the print media. When efforts were made to crack down on 	journalists with the introduction of the Defamation Bill in the 1980s, journalists were lucky that the Bill also included proprietors as those liable for 	defamation. This created solidarity between journalists and proprietors of newspapers to fight the Bill, and it was shelved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression is necessary in a democratic society, Mr. Joshi stated, but it is necessary that this freedom be balanced with other rights such as 	privacy of individuals and the protection against hate speech. In the absence of such balance, speech becomes one-sided, leaving no recourse to those 	affected by violative speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the digital age, however, things become complex, Mr. Joshi said. The freedom available to speech is enhanced, but so is the misuse of that freedom. The 	digital space has been used to foment riots, commit cybercrime, etc. Online, in India the restrictions placed on freedom of speech have become draconian. 	Section 66A and the incidents of arrests under it are an example of this. It is, therefore, important to consider the kind of restrictions that should be 	placed on free speech online. There is also the question of self-regulation by online content-creators, but this is rendered complex by the fact that no 	one owns the Internet. This conference, Mr. Joshi said, will help develop an understanding of what works and what frameworks we will need going forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Pranesh Prakash, &lt;i&gt;Policy Director&lt;/i&gt;, &lt;i&gt;Centre for Internet &amp;amp; Society&lt;/i&gt; &lt;i&gt;(CIS)&lt;/i&gt;, introduced the speakers for the first session. 	Mr. Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance, Jamia Millia Islamia University&lt;/i&gt;, would first share his views and experience regarding the various ways of curtailing freedom of expression by the State, markets and civil society. Ms. Smarika Kumar of the&lt;i&gt;Alternative Law Forum &lt;/i&gt;(ALF) would then expand on structural violations of freedom of expression. Mr. Bhairav Acharya,	&lt;i&gt;Advocate with the Delhi Bar and Consultant for CIS&lt;/i&gt;, would throw light on the development of free speech jurisprudence and policy in India from the 	colonial era, while Prof. Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;, was to speak about his arrest and charges under Section 	66A of the Information Technology Act, 2000 (am. 2008), providing insight into the way Section 66A was misused by police and the West Bengal government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Vibodh Parthasarathi&lt;/b&gt;&lt;i&gt;, Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi began his talk with an anecdote, narrating an incident when he received a call from a print journalist, who said	&lt;i&gt;"TV people can get away with anything, but we can't, and we need to do something about it." &lt;/i&gt;The notion of news institutions getting away with 	non-kosher actions is not new - and has been a perception since the 19&lt;sup&gt;th&lt;/sup&gt; century. He stressed that there have always been tensions between 	Freedom of Expression, access, and other rights. Curtailment happens not just by the state, but by private parties as well - market and civil society. 	Indeed, a large number of non-state actors are involved in curtailing FoE. Subsequently a tension between individual FoE and commercial speech freedom is 	emerging. This is not a new phenomenon. Jurisprudence relating to free speech makes a distinction between the persons in whom the right inheres: 	individuals on the one hand (including journalists and bloggers), and proprietors and commercial entities on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, freedom of speech cases - from 1947 - relate primarily to the rights of proprietors. These cases form the legal and constitutional basis for 	issues of access, transmission and distribution, but are not necessarily favourable to the rights of individual journalists or newsreaders. At the 	individual level, the freedom to &lt;i&gt;receive &lt;/i&gt;information is equally important, and needs to be explored further. For entities, it is crucial to 	consider the impact of curtailment of speech (or threats of curtailment) on entities of &lt;i&gt;different sizes&lt;/i&gt; and &lt;i&gt;kinds&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi further explained that online, freedom of expression depends on similar structural conditions and stressed that scholarship must study 	these as well. For example, intermediaries in the TV industry and online intermediaries will soon come together to provide services, but scholarship does 	not link them yet. The law is similarly disjointed. For instance, 'broadcasting' falls in the Union List under Schedule VII of the Constitution, and is 	centrally regulated. However, distribution is geographically bounded, and States regulate distribution. In order to have a cohesive broadcast regulation, 	he raised the point that the placement of 'broadcasting' in the Union List may need to be re-thought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Parthasarathi, the underlying conceptual basis - for the interlinked scholarship and regulation of intermediaries (online and broadcast), 	of commercial speech and individual access to information, and censorship (State and private, direct and structural) - lies in Article 19(1)(a). He noted 	that there is a need to rethink the nature of this freedom. For whom do we protect freedom of speech? For individuals alone, or also for all private 	entities? From what are we protecting this freedom? For Mr. Parthasarathi, freedom of speech needs to be protected from the State, the market, civil 	society and those with entrenched political interests. Additionally, Mr. Parthasarathi raised the question of whether or not in the online context freedom 	of the enterprise becomes antithetical to universal access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi also highlighted that it is important to remember that freedom of expression is not an end in itself; it is a facilitator - the 'road'- 	to achieve crucial goals such as diversity of speech. But if diversity is what freedom of expression &lt;i&gt;should&lt;/i&gt; enable, it is important to ask whether 	institutional exercise of freedom has led to enhanced diversity of speech. Do media freedom and media diversity go together? For Mr. Parthasarathi, media 	freedom and media diversity do not always go together. The most vivid example of this is the broadcast environment in India, following the deregulation of 	broadcast media beginning from the mid 1990s - much of which was done through executive orders on an ad hoc basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This led to infrastructural censorship, in addition to the ex-post curtailment of content. Increasingly the conditions on which content is produced are 	mediated i.e. which entities are eligible to obtain licenses, what type of capital is encouraged or discouraged, how is market dominance measured, 	accumulation of interests across content and carriage, or various carriage platforms? Mediating the conditions of producing speech, or infra censorship, is 	primarily operationalised through regulatory silences, as illustrated in the absence of any coherent or systematic anti-competitive measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts are champions in protecting the freedom of expression of 'outlets' - of proprietors and entities. But this has not led to diversity of speech 	and media. Perhaps there is a need to rethink and reformulate ideas of freedom. He pointed out that it is not enough merely to look at &lt;i&gt;ex post&lt;/i&gt; curtailment of speech (i.e., the traditional idea of censorship). Instead &lt;i&gt;the conditions&lt;/i&gt; in which speech is made and censored need to be explored; 	only then can our understanding expand. Mr Parthasarathi ended his talk by stressing that a proactive understanding of freedom of expression can highlight 	architectural curtailment of speech through the grant of licenses, competition and antitrust laws, media ownership and concentration across carriage and 	content, etc. This is essential in a digital age, where intermediaries play a crucial, growing role in facilitating freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smarika Kumar&lt;/b&gt;&lt;i&gt;, Alternative Law Forum&lt;/i&gt;&lt;br /&gt;Beginning where Mr. Parthasarathi left off, the focus of Ms. Kumar's presentation was the curtailment of speech and the conditions under which speech is 	produced. At the outset, she sought from the audience a sense of the persons for whom freedom of speech is protected: for government-controlled media, the 	markets and commercial entities, or for civil society and citizens? Ms. Kumar aimed to derive ideas and conceptual bases to understand freedom of speech in 	the digital space by studying judicial interpretations of Article 19(1)(a) and its limitations. Towards this end, she highlighted some Indian cases that 	clarify the above issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar began with &lt;b&gt;&lt;i&gt;Sakal Papers&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1962 SC 305]&lt;/b&gt;. In &lt;i&gt;Sakal Papers&lt;/i&gt;, the issue concerned the 	State's regulation of speech by regulation of the number of permitted pages in a newspaper. This regulation was challenged as being in violation of Article 	19(1)(a) of the Constitution. The rationale for such regulation, the State argued, was that newsprint, being imported, was a scarce commodity, and 	therefore needed to be equitably distributed amongst different newspapers - big or small. Further, the State defended the regulation citing its necessity 	for ensuring equal diversity and freedom of expression amongst all newspapers. The petitioners in the case argued that such a regulation would negatively 	impact the newspapers' right to circulation by reducing the space for advertisements, and thus forcing the newspaper to increase selling prices. Readers of 	the newspaper additionally argued that such increase in prices would affect their right to access newspapers by making them less affordable, and hence such 	regulation was against the readers' interests. Ultimately, the Supreme Court struck down the regulation. The Constitution Bench noted that if the number of 	pages of a newspaper were to be limited and regulated, the space available for advertisements would reduce. Were advertisements to reduce, the cost of 	newspapers would increase, affecting affordability and access to information for the citizens. Ultimately, newspaper circulation would suffer; i.e., the 	State's regulation affected the newspapers' right of circulation which would amount to a violation of freedom of expression as the right extends to the 	matter of speech as well as the ability to circulate such speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the number of pages, the Indian government has sought to regulate newsprint in the past. In	&lt;b&gt;&lt;i&gt;Bennett Coleman and Co. &amp;amp; Ors.&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1973 SC 106]&lt;/b&gt;, a Constitution Bench of the Supreme Court 	considered whether regulation of the number of pages permitted in a newspaper constituted an unreasonable restriction on freedom of expression. Towards 	this, the Government of India set forth a Newsprint Policy in 1972, under the terms of which the number of pages of all papers were to be limited to ten; 	where there were small newspapers that did not achieve the ten-page limit, a 20% increase was permitted; and finally, new newspapers could not be started 	by common ownership units. The Newsprint Order aimed to regulate a scarce resource (newsprint), while the Newsprint Policy sought to promote small 	newspapers, encourage equal diversity among newspapers and prevent monopolies. The Supreme Court upheld the Newsprint Order, stating that newsprint was 	indeed a scarce resource, and that the matter of import and distribution of newsprint was a matter of government policy. The Court would not interfere 	unless there was evidence of &lt;i&gt;mala fides&lt;/i&gt;. However, the Court struck down the Newsprint Policy for reasons similar to &lt;i&gt;Sakal&lt;/i&gt; &lt;i&gt;Papers&lt;/i&gt; ; that the rights afforded to newspapers under Article 19(1)(a) - including circulation - could not be abridged for reasons of protecting against 	monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his dissenting opinion, Justice Mathew stated that in conceiving freedom of expression, it is important to also consider the hearer (the reader). For 	Justice Mathew, Meiklejohn's view the "&lt;i&gt;what is essential is not that everyone shall speak, but that everything worth saying shall be said&lt;/i&gt;" cannot be affected if, because of concentration of media ownership, media are not available for most speakers. In such a situation, "	&lt;i&gt;the hearers [cannot] be reached effectively&lt;/i&gt;". However, the imperative is to maximise diversity of speech. For this, we need to balance the rights 	of citizens against those of the press; i.e., the rights of the &lt;i&gt;reader&lt;/i&gt; against those of the &lt;i&gt;speaker&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar pointed out that this was the first case to consider the right of readers to access a diversity of speech. Justice Mathew distinguished 	curtailment of speech by the state, and by the market - and that this is crucial in the digital age, where information is predominantly accessible through 	and because of intermediaries. Ms. Kumar further stressed that especially in an age where 'walled gardens' are a real possibility (in the absence of net 	neutrality regulation, for instance), Justice Mathew's insistence on the rights of readers and listeners to a diversity of speech is extremely important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar went on to explain that though judges in the Supreme Court recognised the rights of readers/listeners (us, the citizens) for the purposes of news and print media, a similar right is denied to us in the case of TV. In	&lt;b&gt;&lt;i&gt;Secretary, Ministry of Broadcasting&lt;/i&gt; v. &lt;i&gt;Cricket Association of Bengal&lt;/i&gt; [AIR 1995 SC 1236]&lt;/b&gt;, the issue surrounded private operators' right to use airwaves to broadcast. The Supreme Court considered whether government agencies and Doordarshan, the government broadcaster, "	&lt;i&gt;have a monopoly of creating terrestrial signals and of telecasting them or refusing to telecast them&lt;/i&gt;", and whether Doordarshan could claim to be 	the single host broadcaster for all events, including those produced or organised by the company or by anybody else in the country or abroad. The Supreme 	Court held that the TV viewer has a right to a diversity of views and information under Article 19(1)(a), and also that the viewer must be protected 	against the market. The Court reasoned that " 	&lt;i&gt; airwaves being public property, it is the duty of the state to see that airwaves are so utilised as to advance the free speech right of the citizens, 		which is served by ensuring plurality and diversity of views, opinions and ideas &lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If every citizen were afforded the right to use airwaves at his own choosing, "&lt;i&gt;powerful economic, commercial and political interests&lt;/i&gt;" would 	dominate the media. Therefore, instead of affirming a distinct right of listeners, the Court conflated the interests of government-controlled media with 	those of the listeners, on the ground that government media fall under public and parliamentary scrutiny. According to Ms. Kumar this is a regressive 	position that formulates State interest as citizen interest. Ms. Kumar argued that in order to ensure freedom of speech there is a need to frame citizens' 	interests as distinct from those of the market and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;br /&gt;Mr. Acharya's presentation focused on the divergence between the &lt;i&gt;jurisprudence&lt;/i&gt; and &lt;i&gt;policy&lt;/i&gt; surrounding freedom of expression in India. 	According to him, the policies of successive governments in India - from the colonial period and thereafter - have developed at odds with case-law relating 	to freedom of expression. Indeed, it is possible to discern from the government's actions over the last two centuries a relatively consistent narrative of 	governance which seeks to bend the individual's right to speech to its will. The defining characteristics of this narrative - the government's free speech 	policy - emerge from a study of executive and legislative decisions chiefly in relation to the press, that continue to shape policy regarding the freedom 	of expression on the Internet. Thus, there has been consistent tension between the individual and the community, as well as the role of the government in 	enforcing the expectations of the community when thwarted by law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, free speech scholarship (including digital speech) fails to take into account this consistent divergence between jurisprudence and policy. Mr. 	Acharya pointed out that we think of digital speech issues as new, whereas there is an immense amount of insight to gain by studying the history of free 	speech and policy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards this, Mr. Acharya highlighted that to understand dichotomy between modern and native law and free speech policy, it is useful to go back to the 	early colonial period in India, when Governor-General Warren Hastings established a system of courts in Bengal's hinterland to begin the long process of 	displacing traditional law to create a modern legal system. J. Duncan M. Derrett notes that the colonial expropriation of Indian law was marked by a 	significant tension caused by the repeatedly-stated objective of preserving some fields of native law to create a dichotomous legal structure. These 	efforts were assisted by orientalist jurists such as Henry Thomas Colebrook whose interpretation of the dharmasastras heralded a new stage in the evolution 	of Hindu law. By the mid-nineteenth century, this dual system came under strain in the face of increasing colonial pressure to rationalise the legal system 	to ensure more effective governance, and native protest at the perceived insensitivity of the colonial government to local customs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya explained that this myopia in Indian policy research is similar &lt;i&gt;social censorship&lt;/i&gt; (i.e., social custom as creating limits to free 	speech). Law and society scholars have long studied the social censorship phenomenon, but policy research rejects this as a purely academic pursuit. But 	the truth is that free speech has been regulated by a dual policy of law and social custom in India since colonial times. The then-Chief Justice of the 	Calcutta High Court Elijah Impey required officers to respect local customs, and this extended to free speech as well. But as colonial courts did not 	interpret Hindu law correctly; interpretations of freedom of speech suffered as well. Mr. Acharya noted that the restrictions on freedom of speech 	introduced by the British continue to affect individuals in India today. Prior to British amendments, India had drawn laws from multiple sources - indeed 	customs and laws were tailored for communities and contexts, and not all were blessed with the consistency and precedent so familiar to common law. Since 	the British were unable to make sense of India's law and customs, they codified the principles of English customary law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Penal Code (IPC) saw the codification of English criminal law (the public offences of riots, affray, unlawful assembly, etc., and private 	offences such as criminal intimidation). In Macaulay's initial drafts, the IPC did not contain sedition and offences of hurting religious sentiments, etc. Sections 124A ("&lt;i&gt;Sedition&lt;/i&gt;") and 295A ("	&lt;i&gt;Deliberate and malicious acts intended to outrage religious feelings of any class by insulting its religion or religious beliefs&lt;/i&gt;") were added to 	the IPC in 1860, and changes were made to the Code of Criminal Procedure as well. Today, these sections are used to restrict and criminalise digital 	speech.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;The Right to Offend&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya then considered the history of the "right to offend", in light of the controversies surrounding Section 66A, IT Act. Before the insertion and strengthening of Section 295A, citizens in India had a right to offend others within the bounds of free speech. He clarified that in 1925 a pamphlet "	&lt;i&gt;Rangila Rasool&lt;/i&gt;" was published by Lahore-based Mahashe Rajpal (the name(s) of the author(s) were never revealed). The pamphlet concerned the 	marriages and sex life of the Prophet Mohammed, and created a public outcry. Though the publisher was acquitted of all charges and the pamphlet was upheld, 	the publisher was ambushed and stabbed when he walked out of jail. Under pressure from the Muslim community, the British enacted Section 295A, IPC. The 	government was seeking to placate and be sensitive to public feeling, entrenching the idea that the government may sacrifice free speech in the face of 	riots, etc. The death of India's "&lt;i&gt;right to offend&lt;/i&gt;" begins here, said Mr. Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;i&gt;prior restraint regime&lt;/i&gt; was created and strengthened in 1835, then in 1838, etc. At this time, the press in India was largely British. Following 	the growth of Indian press after the 1860s, the British made their first statutory attempt at censorship in 1867: a prior sanction was required for 	publication, and contravention attracted heavy penalties such as deportation and exile. Forfeiture of property, search and seizures and press-inspections 	were also permitted by the government under these draconian laws. Mr. Acharya noted that it is interesting that many leaders of India's national movement 	were jailed under the press laws.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Independence and After&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya further explained that the framers of the Constitution deliberately omitted "freedom of the press" from the text of Article 19(1)(a) and that 	Jawaharlal Nehru did not think the press ought to be afforded such a right. This is despite a report of the Law Commission of India, which recommended that 	corporations be provided an Article 19 right. But why distrust the press, though citizens are granted the freedom of speech and expression under Article 	19(1)(a)? In Mr. Acharya's opinion, this is evidence of the government's divergent approach towards free speech policy; and today, we experience this as a 	mistrust of the press, publications, and of online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya also explained that statutory restrictions on free speech grew at odds with judicial interpretation in the 1950s. Taking the examples of&lt;b&gt;&lt;i&gt;Romesh Thapar&lt;/i&gt; v. &lt;i&gt;the State of Madras&lt;/i&gt; [AIR 1950 SC 124]&lt;/b&gt; and	&lt;b&gt;&lt;i&gt;Brij Bhushan&lt;/i&gt; v. &lt;i&gt;the State of Delhi&lt;/i&gt; [(1950) Supp. SCR 245]&lt;/b&gt;, Mr. Acharya showed how the judiciary interpreted Article 19 favourably. Despite the government's arguments about a public order danger, the Supreme Court refused to strike down left wing or right wing speech (	&lt;i&gt;Romesh Thapar &lt;/i&gt;concerned a left wing publication; &lt;i&gt;Brij Bhushan&lt;/i&gt; concerned right wing views), as "public order" was not a ground for 	restricting speech in the Constitution. The government reacted to the Supreme Court's judgement by enacting the First Amendment to the Constitution: 	Article 19(2) was amended to insert "public order" as a ground to restrict free speech. Thus, it is possible to see the divergence between free speech 	jurisprudence and policy in India from the time of Independence. Nehru and Sardar Vallabhbhai Patel had supported the amendment, while B.R. Ambedkar 	supported Romesh Thapar and Brij Bhushan. On the other hand, then-President Rajendra Prasad sought Constitutional protection for the press.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Why Study Free Speech History?&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya noted how the changes in free speech policy continue to affect us, including in the case of content restrictions online. In the 1950s, 	then-Prime Minister Nehru appointed the First Press Commission, and the newspaper &lt;i&gt;National Herald &lt;/i&gt;was established to promote certain (left wing) 	developmental and social goals. Chalapati Rao was the editor of the National Herald, and a member of the First Press Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At that time, the Commission rejected vertical monopolies of the press. However, today, horizontal monopolies characterize India's press. The First Press 	Commission also opposed 'yellow journalism' (i.e., sensational journalism and the tabloid press), but this continues today. Decades later, Prime Minister 	Indira Gandhi called for a "committed bureaucracy, judiciary and press", taking decisive steps to ensure the first two. For instance, Justice Mathew (one 	of the judges in the &lt;i&gt;Bennett Coleman&lt;/i&gt; case) was an admirer of Indira Gandhi. As Kerala's Advocate General, he wanted the Press Registrar to have 	investigative powers similar to those given in colonial times; he also wanted the attacks on government personalities to be criminalized. The latter move 	was also supported by M.V. Gadgil, who introduced a Bill in Parliament that sought to criminalise attacks on public figures on the grounds of privacy. Mr. 	Acharya noted that though Indira Gandhi's moves and motives with regard to a "committed press" are unclear, the fact remains that India's regional and 	vernacular press was more active in criticizing the Emergency than national press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the importance of understanding a contexts history - both social and legislative, following the striking down of 66A in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt; (Supreme Court, March 24, 2015), elements in the government have stated 	their wish to introduce and enact a new Section 66A. Mr. Acharya explained that such moves from elements in the government shows that despite the striking 	down of 66A, it is still possible for the repressive and mistrustful history of press policy to carry forward in India. This possibility is supported by 	colonial and post-Independence press history and policy that has been developed by the government. When looking at how research can impact policy, greater 	awareness of history and context may allow for civil society, academia, and the public at large to predict and prepare for press policy changes.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Ambikesh Mahapatra&lt;/b&gt;, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Mahapatra introduced himself as a victim of the West Bengal administration and ruling party. He stated that though India's citizens have been granted 	the protection of fundamental rights after Independence, these rights are not fully protected; his experience with the West Bengal ruling party and its 	abuse of powers under the Information Technology Act, 2000 (am. 2008) ("IT Act") highlights this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On March 23, 2012, Prof. Mahapatra had forwarded a cartoon to his friends by email. The cartoon poked fun at West Bengal Chief Minister Mamata Banerjee and 	her ruling party. On the night of April 12, 2012, individuals not residing in the Professor's housing colony confronted him, dragging him to the colony 	building and assaulting him. These individuals forced Prof. Mahapatra to write a confession about his forwarding of the cartoon and his political 	affiliations. Though the police arrived at the scene, they did not interfere with the hooligans. Moreover, when the leader of the hooligans brought the 	Professor to the police and asked that he be arrested, they did so even though they did not have an arrest warrant. At the police station, the hooligans 	filed a complaint against him. The Professor was asked to sign a memo mentioning the charges against him (Sections 114 and 500, Indian Penal Code, 1860 	&amp;amp; Section 66A, IT Act). Prof. Mahapatra noted that the police complaint had been filed by an individual who was neither the receiver nor the sender of 	the email, but was a local committee member with the Trinamool Congress (the West Bengal ruling party).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arrest sparked a series of indignant responses across the country. The West Bengal Human Rights Commission took &lt;i&gt;suo motu &lt;/i&gt;cognizance of the 	arrest, and recommended action against the high-handedness of the police. Fifty six intellectuals appealed to the Prime Minister of India to withdraw the 	arrest; the former Supreme Court judge Markandey Katju was among those who appealed. Thirty cartoonists' organisations from across the world also appealed 	to the President and the Prime Minister to withdraw the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The West Bengal government paid no heed to the protests, and Chief Minister Mamata Banerjee publicly supported the actions of the police - making public 	statements against Justice Katju and A.K. Ganguly, former judge of the Supreme Court and head of the West Bengal Human Rights Commission respectively. A 	charge sheet was framed against Prof. Mahapatra and others, with Section 66A as one of the charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case has been going on for over two years. Recently, on March 10, 2015, the Calcutta High Court upheld the recommendations of the West Bengal Human 	Rights Commission, and directed the government to implement them. The West Bengal government has preferred an appeal before a division bench, and the case will continue. This is despite the fact that Section 66A has been struck down (by the Supreme Court in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though noting that he was not an expert, Prof. Mahapatra put forward that it seemed that the freedom of expression of the common man depends on the whims 	of the ruling parties and the State/Central governments. It is of utmost importance, according to him, to protect the common man's freedom of speech, for 	his recourse against the government and powerful entities is pitifully limited.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; A participant stated that the core trouble appears to lie in the power struggle of political parties. Political parties wish to retain power and gather 	support for their views. Despite progressive laws, it is the Executive that implements the laws. So perhaps what is truly required is police and procedural 	reforms rather than legislative changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel agreed that there is a need for more sensitivity and awareness amongst the law enforcement agencies and this might be long overdue 		and much needed step in protecting the rights of citizens. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant was interested in understanding how it might be possible to correct the dichotomy between FoE policy and doctrine? The participant also 	wanted the panel to comment on progressive policy making if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the&lt;b&gt; &lt;/b&gt;panel stated that there is no easy way of correcting this dichotomy between custom and law. Scholars have also argued 		that the relationship between custom and pernicious social censorship is ambiguous. Towards this, more studies are required to come to a conclusion. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant requested clarity on what rights can be created to ensure and support a robust right to freedom of expression, and how this might affect the 	debates surrounding net neutrality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel noted that the Internet allows citizens and corporations to regulate speech on their own (private censorship), and this is 		problematic. Members of the panel also responded that the existing free speech right does not enable diversity of speech. Social and local customs 		permit social censorship, and this network effect is clearly visible online; individuals experience a chilling effect. Finally, in the context of net 		neutrality, the interests of content-producers (OTTs, for instance) are different from those of users. They may benefit economically from walled 		gardens or from non-interference with traffic-routing, but users may not. Therefore, there is a need for greater clarity before coming to a conclusion 		about potential net neutrality regulation.&lt;/i&gt;&lt;/p&gt;
&lt;h2&gt;Session 2: Current Realities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Dr. Cherian George,&lt;/b&gt; &lt;i&gt;Associate Professor, Hong Kong Baptist University &lt;/i&gt;&lt;br /&gt;Dr. George began his talk by highlighting how there is no issue as contentious as offensive speech and how it should be dealt with. The debate around free 	speech is often framed as a battle between those who support democracy and those who oppose it. Yet, this is also a tension within democracy. Citizens 	should not be unjustly excluded from participating in democracy (companion rights in Article 19 and 20, ICCPR). Relevant UN institutions and Article 19 	have come up with reports and ideals that should be universally adopted - norms that apply to many areas including speech. These norms are different from 	traditional approaches. For example:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Human Rights Norms&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Traditional Approach&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Regulate incitement of violence (discrimination, hate, etc.)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects people's feelings from speech that offends&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Protect minorities as they are more vulnerable to exploitation and uprooting of their values&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law sides with the majority, to protect mainstream values over minority values&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Allow robust criticism of ideas, religions, and beliefs&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects religion, beliefs, and ideas from criticism&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Strive for balance between liberty and equality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Aims for order and maintenance of status quo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote harmony through the media&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Enforces harmony by the state&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the traditional approach, Dr. George noted that if the state protects feelings of offence against speech, it allows groups to use such 	protection as a political weapon: "hate spin", which is the giving or taking of offence as a political strategy. Hate spin is normally framed as a 	"visceral, spontaneous reaction" to a video, writing, or speech, etc. Yet, the spontaneous reaction of indignation to speech or content can consistently be 	revealed to result from conscious manipulation by middlemen for political purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asia is similar to West Asia - as the legal frameworks provide immunity for dangerous speech. In practice, this allows for the incitement of 	discrimination, hostility, and violence. At the same time, the legal frameworks allow for excessive sympathy for wounded feelings, and often the taking of 	offence turns into a political strategy. Power enters the equation here. The law allows the powerful to take offence and use hate speech against those not 	in powerful positions.&lt;/p&gt;
&lt;p&gt;Dr. George highlighted a number of legal quandaries surrounding freedom of expression including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Enforcement gaps:&lt;/b&gt; There is a lack of enforcement of existing laws against incitement.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Non-regulated zones:&lt;/b&gt; Socio-political research demonstrates that many problems cannot be regulated, and yet the law can only deal with what can be regulated. Hate speech is one 	of these as hate speech is not in the speech itself, but in the meaning that is produced in the mind of those saying/listening.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Verdict-proof opportunities: &lt;/b&gt; Political entrepreneurs can use legislative and judicial processes to mainstream hateful views, regardless of how legislature and courts ultimately act. 	The religious right, for instance, can always pit themselves morally against "secular" decisions of apex authorities (SC, etc.). For example, in the 	context of the US and Islamophobia - the State legislature in Alabama introduced an anti-Shariah law. Yet, the law is against a non-existent threat and 	appears to be a ploy to normalize anti-Muslim sentiments, including in political rhetoric. While focusing on winning battles in courts or legislature, the 	intolerant groups do not need to win a legal court case to introduce and entrench language of intolerance in public discourse and discussion. This 	demonstrates that there is a need to begin moving away from a purely legal analysis (interpretation or development) of the laws, and a need to begin 	studying these issues through a sociological lens.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Zakir Khan&lt;/b&gt;, &lt;i&gt;Article 19, Bangladesh &lt;/i&gt;&lt;br /&gt;Mr. Khan introduced Article 19 and its work in Bangladesh and the rest of South Asia. He noted that Article 19 is involved in documenting and analysing 	laws and regulations affecting freedom of expression, including in Bangladesh. Article 19 also campaigns for changes in law and policy, and responds from a 	policy perspective to particular instances of government overreach.&lt;/p&gt;
&lt;p&gt;Mr. Khan explained that India has the Information Technology Act, 2000 (am. 2008) ("IT Act"), and in Bangladesh, the equivalent legislation is the 	Information and Communication Technology Act, 2006 ("ICT Act"). The ICT Act was enacted to bring Bangladeshi law in conformity with international law; i.e. 	in accordance with the UNCITRAL model law on e-commerce and online transactions. The ICT Act deals with hacking, crimes committed with the use of a 	computer system, breach of data, breach of computer system, and hardware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like the IT Act in India, Bangladesh's ICT Act also criminalizes speech and expression online. For instance, Section 57, ICT Act, criminalizes the 	publication of "&lt;i&gt;fake, obscene or defaming information in electronic form&lt;/i&gt;". Similarly, bringing damage to "&lt;i&gt;the state's image&lt;/i&gt;" online is 	criminalized. In 2013, the Bangladesh Ministry of Law amended the ICT Act to increase penalties for online offences, and allow for the detention of 	suspected offenders, warrantless arrests and indefinite detention without bail. Bloggers and activists have been protesting these changes, and have been 	targeted for the same.&lt;/p&gt;
&lt;p&gt;Mr. Khan noted that Article 19 has developed a tool to report violations online. Individuals who have experienced violations of their rights online can 	post this information onto a forum, wherein Article 19 tracks and reports on them, as well as creating awareness about the violation. Any blogger or online 	activist can come and voice concerns and report their stories. Mr. Khan also highlighted that given the ICT Act and the current environment, online 	activists and bloggers are particularly threatened. Article 19 seeks to create a safe space for online bloggers and activists by creating anonymity tools, 	and by creating awareness about the distinctions between political agenda and personal ideology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Chinmayi Arun&lt;/b&gt;, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;br /&gt;Ms. Arun began by noting that usually conversations around freedom of expression look at the overlap between FoE and content i.e. the focus is on the 	speaker and the content. Yet, when one targets the mediator - it shifts the focus as it would be approaching the issue from the intermediary's perspective. 	When structural violation of free speech happens, it either places the middleman in the position of carrying through the violation, or creates a structure 	through which speech violations are incentivized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is the Bazee.com case. At the time of the case the law was structured in such a way that not only perpetrators of unlawful content were 	punished, but so were the bodies/persons that circulated illegal content. In regulatory terms this is known as "gatekeeper liability". In the Bazee.com 	case, a private party put obscene content up for sale and Bazee.com could and did not verify all of the content that was for sale. In the case, the Delhi 	HC held Avnish Bajaj, the CEO of Bazee.com, liable on the precedent of strict liability for circulation of obscene content. The standard of strict 	liability was established under Ranjit Udeshi case. The standard of strict liability is still the norm for non-online content, but after Bazee.com, a 	Parliament Standing Committee created a safe harbour for online intermediaries under Section 79 of the IT Act. As per the provision, if content has been 	published online, but an intermediary has not edited or directly created the content, it is possible for them to seek immunity from liability for the 	content. The Parliament Standing Committee then stated that intermediaries ought to exercise due diligence. Thus, the Indian legal regime provides online 	intermediaries with immunity only if content has not been published or edited by an intermediary and due diligence has been exercised as defined by Rules 	under the Act. While developing India's legal regime for intermediary liability the Parliamentary Standing Committee did not focus on the impact of such 	regulation on online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, present research and analysis of Freedom of Expression is focused on the autonomy of the speaker/individual. An alternative formulation 	and way of understanding the right, and one that has been offered by Robert Post through his theory of democratic self governance, is that Freedom of 	Expression is more about the value of the speech rather than the autonomy of the speaker. In such a theory the object of Freedom of Expression is to ensure 	diversity of speech in the public sphere. The question to ask then is: "Is curtailment affecting democratic dialogue?" The Supreme Court of India has 	recognized that people have a right to know/listen/receive information in a variety of cases. Ms. Arun explained that if one accepts this theory of speech, 	the liability of online intermediaries will be seen differently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Arun further explained that in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the notice-and-takedown regime under section 79 of the IT Act has been amended, but the 	blocking regime under section 69A has not. Thus, the government can still use intermediaries as proxies to take down legitimate content, and not provide 	individuals with the opportunity to to challenge blocking orders. This is because as per the Act, blocking orders must be confidential. Though the blocking 	regime has not been amended, the Supreme Court has created an additional safeguard by including the requirement that the generator of content has to be 	contacted (to the extent possible) before the government can pass and act upon a blocking order. Mr. Arun noted that hopefully, when implemented, this will 	provide a means of recourse for individuals and counter, to some extent, the mandated secrecy of content blocking orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Raman Jit Singh Chima&lt;/b&gt;, &lt;i&gt;Asia Consultant, Access Now &lt;/i&gt;&lt;br /&gt;Mr. Chima began his presentation by noting that the Internet is plagued by a few founding myths. Tim Goldsmith and Jack Wu (in	&lt;i&gt;Who Controls the Internet: Illusions of a Borderless World&lt;/i&gt;) name one: that no &lt;i&gt;laws&lt;/i&gt; apply to the Internet; that, because of the borderless 	nature of the Internet - data flows through cables without regard for State borders - and thus countries' laws do not affect the Internet. These 	cyber-anarchists, amongst whom John Perry Barlow of the Electronic Frontier Foundation (EFF) is inspiring, also argue that &lt;i&gt;regulation&lt;/i&gt; has no role 	for the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima countered these 'myths', arguing that the law affects the Internet in many ways. The US military and Science departments funded the invention of 	the Internet. So the government was instrumental in the founding of the Internet, and the US Department of Commerce has agreements with ICANN (Internet 	Corporation for Assigned Names and Numbers) to govern the Domain Names System. So the law, contracts and regulation already apply to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima further explained that today organisations like EFF and civil society in India argue for, and seek to influence, the creation of regulation for 	the protection of journalists against unfair and wrongful targeting by the government. This includes moves to protect whistleblowers, to ensure the 	openness of the Internet and its protection from illegitimate and violative acts against freedom of expression, access and other rights. Some governments, 	like India, also place conditions in the licenses granted to Internet Service Providers (ISPs) to ensure that they bring access to the rural, unconnected 	areas. Such law and regulation are not only common, but they are also &lt;i&gt;good&lt;/i&gt;; they help the population against virtual wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima pointed out that when States contemplate policy-making for the Internet, they look to a variety of sources. Governments draw upon existing laws 	and standards (like India with the virtual obscenity offence provision Section, 67 and 67A, IT Act, which is drawn from the real-world penal provision 	Section 292, IPC) and executive action (regulation, by-laws, changes to procedural law) to create law for the Internet. Additionally, if a government 	repeats a set of government actions consistently over time, such actions may take on the force of law. Mr. Chima also spoke of web-developers and 	standards-developers (the technical community), who operate by rules that have the force of law, such as the 'rough consensus and running code' of the IETF 	(Internet Engineering Task Force). Governments also prescribe conditions ("terms of use") that companies must maintain, permitting or proscribing certain 	kinds of content on websites and platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Mr. Chima highlighted international legal and policy standards that play a role in determining the Internet's law and regulation. ICANN, the 	administrator of the Internet Assigned Numbers Authority (IANA) functions and governing body for the Domain Names System, functions by a set of rules that 	operate as law, and in the creation of which, the international legal community (governments, companies, civil society and non-commercial users, and the 	technical community) play a role. The ITU (International Telecommunications Union) and organisations like INTERPOL also play a role.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima explained that when one wants to focus on issues concerning freedom of expression, multiple laws also apply. Different States set different standards. For instance, in the US, the main standards for the Internet came from issues relating to access to certain types of online content. In	&lt;i&gt;Reno &lt;/i&gt;v. &lt;i&gt;ACLU &lt;/i&gt;(1997), the US Supreme Court considered what standards should be created to access obscene and indecent content on the 	Internet. The judges held that the Internet, as a medium of unprecedented dynamism, deserved the higher protection from governmental overreach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Asia, the main legal standards for the Internet came from Internet commerce: the UNCITRAL model law, which prescribed provisions best suited to the 	smoother commercial utilization of a fast and growing medium, became the foundation for Internet-related law in Asian states. Predictably, this did not 	offer the strongest rights protections, but rather, focused on putting in place the most effective penalties. But when Asian states drew from the European 	UNCITRAL law, many forgot that European states are already bound by the European Convention for Human Rights, the interpretation of which has granted 	robust protections to Internet-related rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima provided the example of Pakistan's new Cybercrime Bill. The Bill has troubling provisions for freedom of expression, and minimal to no due 	process protections. While drafting the law, Pakistan has drawn largely from model cybercrime laws from the Council of Europe, which are based on the 	Budapest Convention. In Europe and the US, States have strong parallel protections for rights, but States in Asia and Africa do not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima concluded that when one talks of freedom of expression online, it is important to also remember the roles of intermediaries and companies. The 	ISPs can be made liable for content that flows through their wires, through legal mechanisms such as license provisions. ISPs can also be made to take 	further control over the networks, or to make some websites harder to access (like the Internet Watch Foundation's blacklist). When policy organisations 	consider this, it is critical that they ask whether industry bodies should be permitted to do this &lt;i&gt;without public discussion&lt;/i&gt;, on the basis of 	government pressure.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for panel members to talk about the context in which bloggers find themselves in danger in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members stated that the courts are not fair to bloggers as often they side with government. It was added that courts have labelled bloggers as 		atheist, and subsequently all bloggers are being associated with the label. Further, it was added that most people who are outraged, do not even know 		what blogging is, and people associate blogging with blasphemy and as opposing religious beliefs. It was also noted that in Bangladesh, while you see 		violations of FoE from the State, you see more violations of blogger rights from non-state actors. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked if there is anything specific about the Internet that alters how we should consider hate speech online and their affective/visceral 	impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt;Pa&lt;/i&gt; &lt;i&gt; nel members noted that they are still grappling with the question of what difference the Internet makes, but noted that it has indeed complicated an 		already complex issue as there is always the question about political entrepreneurs using convenient content to foment fires. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; Participants questioned panel members about how the right to offend is protected in jurisdictions across Asia where there is still tension between 	classical liberalism and communitarian ideologies, and where the individuated nature of rights is not clearly established or entrenched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded by stating that when one compares the US, Indonesia and India, the US seems to be able to strike a balance between free speech 		and other competing interests as they are committed to free speech and committed to religious tolerance and plurality of competing interests. Panel 		members also added that the fabric of civil society also has an impact. For example, Indonesian civil society is simultaneously religious and secular 		and pro-democracy. In India, there seems to be a tension between secular and religious groups. In Indonesia, people are moving to religion for comfort, 		while still seeking a world that is religious and secular. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for clarification on ways to approach regulation of hate speech given that hate speech is not just about a particular kind of 	threatening speech, but encompasses rumours and innuendos.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A&lt;/i&gt;&lt;/b&gt; &lt;i&gt; . Panel members acknowledged that more research needs to be done in this area and added that applying the socio-cultural lens on such issues would be 		beneficial. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q.&lt;/b&gt; Participants asked if panel members had a framework for a regulating the content practices of private actors, who are sometimes more powerful than the 	state and also enforcing censorship.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded that private censorship is an important issue that needs to be reflected upon in some depth, though a framework is far from 		being developed even as research is ongoing in the space. &lt;/i&gt;&lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h2&gt;Session 3: Looking Ahead&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third and final session of the conference aimed to find principles and methods to achieve beneficial and effective regulation of the Internet. One of 	the core aims was the search for the right balance between the dangers of the Internet (and its unprecedented powers of dissemination) and the citizens' 	interest in a robust right to freedom of expression. Mr. Sutirtho Patranobis, &lt;i&gt;Assistant Editor with the Hindustan Times &lt;/i&gt;(Sri Lanka desk, previously China correspondent), shared his experience with governmental regulation of online free speech in China and Sri Lanka. Ms. Karuna Nandy,&lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;, analysed the Indian Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(March 24, 2015), and sought to draw lessons for the current debate on net 	neutrality in India. Ms. Geeta Seshu, &lt;i&gt;founder and editor&lt;/i&gt; of the online magazine &lt;i&gt;The Hoot&lt;/i&gt;, offered an expanded definition of freedom of 	speech, focusing on universal access as the imperative. Finally, Mr. Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;, offered 	his views on net neutrality and the issue of zero-rating, as well as arguing for an increased, cooperative role of civil society in creating awareness on 	issues relating to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sutirtho Patranobis&lt;/b&gt;, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;br /&gt;During his career, Mr. Patranobis was the China correspondent for the &lt;i&gt;Hindustan Times&lt;/i&gt;. Mr. Patranobis began his presentation by sharing his 	experiences in China. In China, multiple online platforms have become sources of news for citizens. Chinese citizens, especially the urban young, spend 	increasing amounts of time on their mobile phones and the Internet, as these are the major sources of news and entertainment in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chinese government's attitude towards freedom of expression has been characterized by increasing control over these online platforms. The includes 	control over global companies like Google and Facebook, which have negotiated with the Chinese government to find mutually acceptable operating rules 	(acceptable to the government and the company, but in most cases unfavourable to the citizens) or have faced being blocked or filtered from the country. 	Mr. Patranobis noted that free speech regulation in China has evolved into a sophisticated mechanism for control and oppression, and the suppression of 	dissent. Not only China, but Sri Lanka has also adopted similar approaches to dealing with freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In China, free speech regulations have evolved with an aim to curtail collective action and dissent. China's censorship programmes work towards silencing 	expression that can represent, reinforce or spur social mobilisation. Mr. Patranobis explained that these programmes aim to put an end to all collective 	activities (current or future) that may be at odds with government policies. Therefore, any online activity that exposes government action as repressive, 	corrupted or draconian is meted out harsh treatment. Indeed it is possible to see that there are sharp increases in online censorship and crackdowns when 	the government implements controversial policies offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis went on to discuss the nature of objectionable content, and the manner in which different jurisdictions deal with the same. Social and 	cultural context, governmental ideologies, and political choices dictate the nature of objectionable content in States such as China and Sri Lanka. On the 	flipside, media literacy, which plays a big role in ensuring an informed and aware public, is extremely low in Sri Lanka, as well as in many other States 	in South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis raised the question of how the Internet can be regulated while retaining freedom of expression - noting that the way forward is uncertain. 	In Sri Lanka, for instance, research by UNESCO shows that the conflicting policy objectives are unresolved; these first need to be balanced before robust 	freedom of expression can be sustained. The Internet is a tool, after all; a tool that can connect people, that can facilitate the spread of knowledge and 	information, to lift people from the darkness of poverty. The Internet can also be a tool to spread hate and to divide societies and peoples. Finding the 	right balance, contextualised according to the needs of the citizens and the State, is key to good regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Karuna Nundy&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;br /&gt;Ms. Nandy focused her presentation on two issues currently raging in India's free speech debates: the Supreme Court's reasoning on Sections 66A and 69A, IT 	Act, in &lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(Supreme Court, March 24, 2015), and issues of access and 	innovation in the call for a net neutrality regulation. She stated that the doctrine of the "marketplace of ideas" endorsed by Justices Nariman and 	Chelameswar in &lt;i&gt;Shreya Singhal&lt;/i&gt; speaks to the net neutrality debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Nandy held that a law can be challenged as unconstitutional if it prohibits acts that are legitimate and constitutional. Such an argument refers to the 	impugned law's "overbroad impact". For instance, the Supreme Court struck down Section 66A, IT Act, on the ground (among others) that the impugned section leads to the prohibition and criminalisation of legitimate and protected speech. Cases such as&lt;b&gt;&lt;i&gt;Chintaman Rao&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh &lt;/i&gt;[(1950) SCR 759] &lt;/b&gt;and	&lt;b&gt;&lt;i&gt;Kameshwar Prasad&lt;/i&gt; v. &lt;i&gt;State of Bihar &lt;/i&gt;[1962 Supp. (3) SCR 369] &lt;/b&gt;speak to this principle. They expand the principle of 	overbreadth to include the notion of "chilling effect" - i.e., situations where overbroad blocking leads to the prohibition of legitimate constitutional 	speech. In such situations, citizens are unsure what constitutes protected speech and what does not, leading to a chilling effect and self-censorship for 	fear of reprisals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court also considered the "reasonable person" doctrine that has been developed under the law of obscenity. India 	had initially adopted the &lt;i&gt;Hicklin test&lt;/i&gt;, under which the test to determine what is obscene depended on whether prurient minds (minds that have a tendency to be corrupted) would find the impugned material lascivious and corrupting. This test, laid down in	&lt;b&gt;&lt;i&gt;Ranjit Udeshi&lt;/i&gt; v. &lt;i&gt;State of Maharashtra &lt;/i&gt;[AIR 1965 SC 881] &lt;/b&gt;and altered/refined by decades of jurisprudence, was put to rest 	in &lt;b&gt;&lt;i&gt;Aveek Sarkar&lt;/i&gt; v. &lt;i&gt;State of West Bengal &lt;/i&gt;[AIR 2014 SC 1495]&lt;/b&gt;. In &lt;i&gt;Aveek Sarkar&lt;/i&gt;, the Supreme Court adopted the 	"community standards" test to determine obscene content. According to Ms. Nandy, the "community standards" test rests on the doctrine of reasonable 	persons. Ms. Nandy noted that in effect there is a need for more police officers to protect those who produce legitimate content from hecklers.&lt;/p&gt;
&lt;p&gt;Quoting from the U.S. decision of &lt;b&gt;&lt;i&gt;Whitney&lt;/i&gt; v. &lt;i&gt;California&lt;/i&gt; [71 L. Ed. 1095]&lt;/b&gt;, Ms. Nandy submitted that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; It is the function of speech to free men from the bondage of irrational fears. To justify suppression of free speech there must be reasonable ground to 		fear that serious evil will result if free speech is practiced. There must be reasonable ground to believe that the danger apprehended is imminent. 		There must be reasonable ground to believe that the evil to be prevented is a serious one. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the issue of website blocking and the Supreme Court's reasoning on Section 69A, IT Act, in &lt;i&gt;Shreya Singhal&lt;/i&gt;, Ms. Nandy explained that the 	Additional Solicitor General had conceded a number of points during the oral arguments. She further explained that website blocking can be applied when the 	Central Government is satisfied that there is a necessity for it. However, reasons must be recorded in writing. Also, according to the Supreme Court's interpretation of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 ("	&lt;i&gt;Blocking Rules&lt;/i&gt;"), both the intermediary and the originator of the communication (the content-creator) have to be given a chance to be heard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 16 of the Blocking Rules, which mandates confidentiality of all blocking requests and orders, was also discussed in &lt;i&gt;Shreya Singhal&lt;/i&gt;. Though 	some confusion has arisen about the Rule's interpretation, Ms. Nandy submitted that Rule 16 has been read down. There is no longer a strict, 	all-encompassing requirement of confidentiality. While the identity of the complainant and the exact nature of the complaint must be kept confidential, the 	blocking order and the reasoning behind the order are no longer bound by Rule 16. This is because in §109 of the judgment, the Supreme Court accepts 	that writ petitions can lie on the basis of blocking orders. In order for writs to lie, affected parties must first be aware of the existence and content 	of the blocking order. Therefore, Ms. Nandy explained, the effect of the Supreme Court's reasoning is that the confidentiality requirement in Rule 16 has 	been read down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Ms. Nandy argued that zero-rating is an efficient solution to providing universal access to the Internet. Services like	&lt;i&gt;Internet.org&lt;/i&gt; are not strictly market-driven. This is because there is not a large demand for Facebook or specific over-the-top (OTT) service 	providers. In speaking about the marketplace for ideas in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court did not indirectly outlaw services seeking to balance 	access with diversity of speech. Ms. Nandy held that price discrimination in the provision of telecom, broadband and mobile Internet services already 	exists. In light of this, the focus should the provision of these services on the basis of consumer choice.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Geeta Seshu&lt;/b&gt;, &lt;i&gt;The Hoot&lt;/i&gt;&lt;br /&gt;Ms. Seshu began her presentation by noting that one's perspective on online censorship cannot be the same as that on traditional censorship. Traditional 	censorship cuts off an individual's access to the censored material, but on the Internet, material that is censored in traditional media finds free and 	wide distribution. One's conceptualisation of freedom of expression and curtailment of this right must include access to the medium as a crucial part. To 	this end, it is important to not forget that access to the Internet is controlled by a limited number of Internet service and content providers. Thus, a 	large section of the population in India cannot exercise their right to free speech because they do not have &lt;i&gt;access&lt;/i&gt; to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this context, it is important to understand the way in which the digital rollout is happening in India. Ms. Seshu explained that the rollout process 	lacks transparency, and noted the example of the 4G/LTE rollout plan in India. There is, of course, a diversity of content: those that have access to the 	Internet have the ability to exercise their right to free speech in diverse ways. However, introducing access into the free speech universe highlights many 	inequalities that exist in the right; for instance, Dalit groups in India have limited access to the Internet, and some kinds of content receive limited 	airtime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, Ms. Seshu argued that the government and other entities use technology to regulate content availability. Policymakers exploit the technology 	and architecture of the networks to monitor, surveil and censor content. For instance, one may see the UID scheme as an adaptation of technology to 	facilitate not only service-provision, but also as a move towards a Big Brother state. Civil society and citizens need to study and respond to the ways in 	which technology has been used against them. Unfortunately, the debates surrounding regulation do not afford space for Internet users to be part of the 	discussion. In order to turn this around, it is important that citizens' and users' rights are developed and introduced into the regulatory equation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt;, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;br /&gt;Taking up where Ms. Seshu left off, Mr. Prakash wished to explore whether the Internet was merely an enabler of discussion - allowing, for instance, a 	ruckus to be raised around the consultation paper of the Telecom Regulatory Authority in India (TRAI) on Over-The-Top (OTT) services and net neutrality - 	or whether the Internet positively adds value. The Internet is, of course, a great enabler. The discussions surrounding OTTs and net neutrality are an 	example: in response to the TRAI consultation, a campaign titled "Save the Internet" resulted in over 9.5 lakh comments being submitted to the TRAI. It is 	inconceivable that such a widespread public discussion on so complex a topic (net neutrality) could take place without the Internet's facilitation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, Mr. Prakash held, it is important to remember that the Internet is the tool, the platform, for such mobilisation. Campaigns and conversations such as 	those on net neutrality could not take place without the organisations and people involved in it. Civil society organisations have played prominent roles 	in this regard, creating awareness and well-informed discussions. For Mr. Prakash, civil society organisations play their role best when they create such 	public awareness, and it is important, to play to a stakeholders strengths. Some organisations are effective campaigners, while others (such as CIS) are 	competent at research, analysis and dissemination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Prakash, it is equally important to remember that successful discussions, campaigns or debates (such as the ongoing one on net neutrality) 	do not occur solely because of one organisation's strengths, or indeed because of civil society alone. Networks are especially critical in successful 	campaigns and policy changes. As researchers, we may not always know where our work is read, but sometimes they reach unexpected venues. For instance, one 	of Mr. Prakash's papers was used by the hacker collective Anonymous for a local campaign, and he was made aware of it only accidentally. Mr. Prakash noted 	that civil society has to also accept its failures, pointing to the controversy surrounding the Goondas Act in Karnataka. Where there are strong 	counter-stakeholders (such as the film lobby in south Indian states), civil society's efforts alone may not lead to success.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Mr. Prakash noted the example of a strategy employed by the &lt;i&gt;Times of India&lt;/i&gt; newspaper, when it undercut its competitors by 	slashing its own prices. Such moves are not unknown in the market, and they have their benefits. Consumers benefit from the lowered prices. For instance, 	were a Whatsapp or Facebook pack to be introduced by a telecom operator, the consumers may choose to buy this cheap, limited data pack. This is beneficial 	for consumers, and also works to expand access to the Internet. At the same time, diversity of speech and consumer choice is severely restricted, as these 	companies and telecom operators can create 'walled gardens' of information and services. Mr. Prakash put forth that if we can facilitate competitive 	zero-rating, and ensure that anti-competitive cross-subsidization does not occur, then perhaps zero-rated products can achieve access without forcing a 	trade off between diversity and choice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, on the issue of website blocking and takedowns under Sections 69A and 79, IT Act, Mr. Prakash noted that the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment does 	nothing to restrict the judiciary's powers to block websites. According to Mr. Prakash, at the moment, the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment relieves 	intermediaries of the responsibility to take down content if they receive private complaints about content. After the judgment, intermediaries will lose 	their immunity under Section 79, IT Act, only if they refuse to comply with takedown requests from government agencies or judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, as Mr. Prakash explained, the judiciary is itself a rogue website-blocker. In the past few years, the judiciary has periodically ordered the blocking 	of hundreds of websites. Such orders have resulted in the blocking of a large number of legitimate websites (including, at one point, Google Drive and 	Github). To ensure that our freedom of expression online is effectively protected, Mr. Prakash argued that ways to stop the judiciary from going on such a 	rampage must be devised.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;Questions &amp;amp; Comments&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A.&lt;/b&gt; Participants and panel members commented that researchers and commentators err by making analogies between the Internet and other media like newspapers, 	couriers, TV, satellite, cable, etc. The architecture of the Internet is very different even from cable. On the Internet, traffic flows both ways, whereas 	cable is not bi-directional. Moreover, pricing models for newspapers have nothing in common with those on the Internet. The comparisons in net neutrality 	debates stand the danger of incorrectness, and we must guard against that. Zero-rating and net neutrality issues in high-access countries are very 	different from the issues in low-access countries like India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B.&lt;/b&gt; Participants and panel members commented that access and availability must play a predominant role in thinking about freedom of expression. In India, we 	are technologically far behind other states, though we have potential. The real end-goal of this is the convergence of services and information, with the 	user at the centre of the ecosystem. Our technological capabilities include satellite and spectrum; the best spectrum bands are lying vacant and can be 	re-framed. For this, the government must be educated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;C.&lt;/b&gt; Participants and panel members commented that in high-access states, the net neutrality issues surround competition and innovation (since there is no or 	very little ISP competition and switching costs are not low), while in India and France, where there is already competition amongst providers, access plays 	a crucial role. On the Internet, the networking or engineering aspects can disrupt the content carried over the network, so that is also a concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;D. &lt;/b&gt; Participants and panel members commented that zero-rating is both a blessing and a curse. Zero-rating would not be detrimental in a market with perfect 	information and competition. But the reality is information asymmetry and imperfect competition. If today, we were to allow zero-rating, diversity would 	suffer and we would be left with 'walled gardens'.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference addressed a range of issues characteristic of debates surrounding freedom of expression in India and South Asia. Beginning with the 	conceptual understanding of freedom of expression, panellists advocated an expanded definition, where the right to free speech is teleological. The 	panellists considered freedom of speech as a tool to ensure diversity of speech, both horizontally and vertically. Towards this end, panellists gave 	several suggestions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt; , policymakers and scholars must understand freedom of speech as a right of &lt;i&gt;both&lt;/i&gt; the speaker and the listener/reader, and carve out a separate 	listeners' right. Panellists expanded upon this to show the implications for the debate on net neutrality, cross-media ownership and website-blocking, for 	instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt; , there is a need for scholars to examine the historical dichotomy between the &lt;i&gt;policy &lt;/i&gt;and &lt;i&gt;jurisprudence&lt;/i&gt; of free speech in India and other 	contexts across South Asia. Such an approach to scholarship and policy research would help predict future government policy (such as in the case of the Indian government's stance towards Section 66A following the Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;) and strategize for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt; , particularly with regard to the Internet, there is a need for policy advocates and policy makers to "bust" the founding myths of the Internet, and look 	to various domestic and international sources of law and regulation. Studies of regulation of freedom of speech on the Internet in different jurisdictions (Bangladesh, China, Sri Lanka) indicate differing government approaches, and provide examples to learn from. The interpretation and consequences of	&lt;i&gt;Shreya Singhal&lt;/i&gt; on website-blocking and intermediary liability in India provide another learning platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Fourth&lt;/i&gt; , panellists discussed the possibilities of cooperation and strategies among civil society and policy organisations in India. Taking the example of the	&lt;i&gt;Save the Internet&lt;/i&gt; campaign surrounding net neutrality in India, panellists speculated on the feasibility of using the Internet itself as a tool to 	campaign for governance and policy reform. Together with the audience, the panellists identified several areas that are ripe for research and advocacy, 	such as net neutrality and zero-rating, and citizens' free speech right as being separate from governmental and corporate interests.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age'&gt;https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetha Hariharan and Jyoti Panday</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-15T14:42:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh">
    <title>CIS Cybersecurity Series (Part 24) – Shantanu Ghosh</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</link>
    <description>
        &lt;b&gt;CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream">
    <title>Corporate push to Modi’s Rs.4.5-billion digital dream</title>
    <link>https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream</link>
    <description>
        &lt;b&gt;Prime Minister Narendra Modi’s Rs. 4.5-billion digital dream seems to find favour with the corporate world, which calls it a “very progressive step” and “massive tech push”.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Rakesh Kumar was &lt;a class="external-link" href="http://www.thestatesman.com/news/business/corporate-push-to-modi-s-rs-4-5-billion-digital-dream/75451.html"&gt;published in the Statesman on July 13, 2015&lt;/a&gt;. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Modi shared his dreams at the recent Digital India Week in the capital and the event saw big names from the business world—Reliance Industries Ltd chairman Mukesh Ambani, Tata group chairman Cyrus Mistry, Wipro Ltd chairman Azim Premji, among others—supporting the initiative.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Showing its faith in Modi’s dream, Reliance Industries is all set to invest over Rs.2.5 lakh crore in the initiative that would focus on cloud computing and mobile applications, empowering every citizen with access to digital services, knowledge and information. &lt;br /&gt;&lt;br /&gt;The initiative could boost the IT sector, which according to NASSCOM  witnesses a robust growth in 2015, with the calculated revenue for FY 2015 at $147 billion, and a growth of 13 per cent from the corresponding period 2014.&lt;br /&gt;&lt;br /&gt;“From an IT perspective, this is a sincere approach to problem solving with growth, realism and long-term transformation at the core,” said Manish Sharma, president, Consumer Electronics and Appliances Manufacturers Association (CEAMA) and managing director, Panasonic India, in an exclusive interview to thestatesman.com.&lt;br /&gt;&lt;br /&gt;“Empowering citizens with the use of IT, we believe Digital India is a massive tech push to provide electronic governance and universal phone connectivity across the country,” he added.&lt;br /&gt;&lt;br /&gt;CEAMA and Panasonic are willing to contribute to Digital India through technological expertise and commitment.&lt;br /&gt;&lt;br /&gt;The Indian information Technology (IT) industry is reportedly pegged at $118-billion and DS Rawat, secretary general, ASSOCHAM, feels the Digital India initiative could be a “game-changer”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commenting on PM’s pledge to bring Internet connectivity to all Indians, Rawat told thestatesman.com: “The initiative is possible, provided the implementation of the schemes is done in a mission mode.”&lt;br /&gt;&lt;br /&gt;“The business and industry will be the major beneficiary in terms of quality of governance, which is possible through digital initiative. Besides, the industry itself has to prepare to deal with new emerging business models such as e-commerce,” he added.&lt;br /&gt;&lt;br /&gt;Modi, at the Digital India launch, said that “e-governance will be quickly changed into m-governance, and ‘M’ does not mean Modi governance, it means mobile governance.”&lt;br /&gt;&lt;br /&gt;Both, big corporate houses and small players hailed the PM’s remark. &lt;br /&gt;&lt;br /&gt;“It is good initiative for the railway sector in terms of passenger amenities, online procurement and technological up gradation,” said Amit Goel of Aggarwal Engineers in an interview to thestatesman.com.&lt;br /&gt;&lt;br /&gt;The company is active in the railway sector.&lt;br /&gt;&lt;br /&gt;When asked how Digital India initiative would help small companies, Goel said: “It will help us in many ways. By adopting e-governance, small companies can check and bid for the online procurement and will be able to interact with the concerned department through digital technology.”&lt;br /&gt;&lt;br /&gt;Anil Valluri of NetApp India said: “Digital India is one of the most significant transformations the country will witness by eventually connecting over a billion people of India, with technology as its focal point.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to IT transformation, cyber security emerges as a vital issue.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;Sumandro Chattapadhyay, Research Director, The Centre for Internet and Society (CIS), described the issue of digital security as the key to the “operationalisation and sustainability of the Digital India initiative”. “We expect the government not only to build administrative structures for ensuring cyber-security of the information systems, but also enable legal frameworks for protecting citizens from unlawful and unforeseen abuses of their digital identities as well as their digital assets.” Having said that, he praised the PM’s move, saying it will bring together various existing and new initiatives for building “network infrastructures for expanded public access, electronic governance systems for effective delivery of services, under the national policy umbrella of 'Digital India’”.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Rajiv Kapur, managing director, Broadcom India, pointed out another benefit of the ubiquitous broadband sector, which according to a report, faces certain challenges such as low rural penetration, stagnant data usage over the years and limited broadband services.&lt;br /&gt;&lt;br /&gt;“It will help bring parity between the rural and urban India,” he said and added: “Today, we need solutions that allow the majority of rural Indian population to continue to stay at their homes, and not migrate to cities.”&lt;br /&gt;&lt;br /&gt;In a knowledge economy, the biggest difference that will make an impact is education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Healthcare is another area where having connectivity can make big difference in quality of life," he said.&lt;br /&gt;&lt;br /&gt;“E-delivery of governance and services is important for the efficient use of government resources, and allows for collaborative, transparent and more efficient governance," the Broadcom managing director added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream'&gt;https://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-16T02:26:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-dissent">
    <title>A Dissent Note to the Expert Committee for DNA Profiling </title>
    <link>https://cis-india.org/internet-governance/blog/dna-dissent</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has participated in the Expert Committee for DNA Profiling constituted by the Department of Biotechnology in 2012 for the purpose of deliberating on and finalizing the draft Human DNA Profiling Bill and appreciates this opportunity. CIS respectively dissents from the January 2015 draft of the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Click for &lt;a href="https://cis-india.org/internet-governance/blog/dna-bill-functions.pdf" class="external-link"&gt;DNA Bill Functions&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf" class="external-link"&gt;DNA List of Offences&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/cis-note-on-dna-bill.pdf" class="external-link"&gt;CIS Note on DNA Bill&lt;/a&gt;. A modified version was published by &lt;a class="external-link" href="http://bangalore.citizenmatters.in/articles/dna-bill-problems-issues-inputs-from-bangalore"&gt;Citizen Matters Bangalore&lt;/a&gt; on July 28.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Based on the final draft of the Human DNA Profiling Bill that was circulated on the 13th of January 2015 by the committee, the Centre for Internet and Society is issuing this note of dissent on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has made a number of submissions to the committee regarding different aspects of the Bill including recommendations for the functions of the board, offences for which DNA can be collected, and a general note on the Bill. Though the Centre for Internet and Society recognizes that the present form of the Bill contains stronger language regarding human rights and privacy, we do not find these to be adequate and believe that the core concerns or recommendations submitted to the committee by CIS have not been incorporated into the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has foundational objections to the collection of DNA profiles for non-forensic purposes. In the current form the DNA Bill provides for collection of DNA for the following non forensic purposes:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Section 31(4) provides for the maintenance of indices in the DNA Bank and includes a missing person’s index, an unknown deceased person’s index, a volunteers’ index, and such other DNA indices as may be specified by regulation. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 38 defines the permitted uses of DNA profiles and DNA samples including: identifying victims of accidents or disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases listed in Part I of the Schedule or for other purposes as may be specified by regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 39 defines the permitted instances of when DNA profiles or DNA samples may be made available and include: for the creation and maintenance of a population statistics Data Bank that is to be used, as prescribed, for the purposes of identification research, protocol development or quality control provided that it does not contain any personally identifiable information and does not violate ethical norms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Part I of the schedule lists laws, disputes, and offences for which DNA profiles and DNA samples can be used. These include, among others, the Motor Vehicles Act, 1988, parental disputes, issues relating to pedigree, issues relating to assisted reproductive technologies, issues relating to transplantation of human organs, issues relating to immigration and emigration, issues relating to establishment of individual identity, any other civil matter as may be specified by the regulations, medical negligence, unidentified human remains, identification of abandoned or disputed children. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;While rejecting non-forensic use entirely, we have specific substantive and procedural objections to the provisions relating to forensic profiling in the present version of the Bill. These include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Over delegation of powers to the board&lt;/strong&gt;: The DNA Board currently has vast powers as delegated by Section 12&amp;nbsp; including:&lt;br /&gt;&lt;em&gt;“authorizing procedures for communication of DNA profiles for civil proceedings and for crime investigation by law enforcement and other agencies, establishing procedure for cooperation in criminal investigation between various investigation agencies within the country and with international agencies, specifying by regulations the list of applicable instances of human DNA profiling and the sources and manner of collection of samples in addition to the lists contained in the Schedule, undertaking any other activity which in the opinion of the Board advances the purposes of this Act.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Section 65 gives the Board the power to make regulations for a number purposes including: &lt;em&gt;“other purposes in addition to identification of victims of accidents, disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases lists in Part I of the Schedule for which records or samples may be used under section 38, other laws, if any, to be included under item (viii) of para B of Part I of the Schedule, other civil matters, if any, to be included under item (vii) of para C of Part I of the Schedule, and authorization of other persons, if any, for collection of non intimate body samples and for performance of non-intimate forensic procedures, under Part III of the Schedule.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Ideally these powers would lie with the legislative or judicial branch. Furthermore, the Bill establishes no mechanism for accountability or oversight over the functioning of the Board and section 68 specifically states that &lt;em&gt;“no civil court shall have jurisdiction to entertain any suit or proceeding in respect to any matter which the Board is empowered by or under this Act to determine.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;The above represents only a few instances of the overly broad powers that have been given to the Board. Indeed, the Bill gives the Board the power to make regulations for 37 different aspects relating to the collection, storage, use, sharing, analysis, and deletion of DNA samples and DNA profiles. As a result, the Bill establishes a Board that controls the entire ecosystem of DNA collection, analysis, and use in India without strong external oversight or accountability. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Key terms undefined&lt;/strong&gt;: Section 31 (5) states that the “indices maintained in every DNA Data Bank will include information of data based on DNA analysis prepared by a DNA laboratory duly approved by the Board under section 1 of the Act, and of records relating thereto, in accordance with the standards as may be specified by the regulations.”&lt;br /&gt;&lt;br /&gt;The term’ DNA analysis’ is not defined in the Act, yet it is a critical term as any information based on such an analysis and associated records can be included in the DNA Database. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Low standards for sharing of information&lt;/strong&gt;: Section 34 empowers the DNA Data Bank Manager to compare a received DNA profile with the profiles stored in the databank and for the purposes of any investigation or criminal prosecution, communicate the information regarding the received DNA profile to any court, tribunal, law enforcement agencies, or DNA laboratory which the DNA Data Bank Manager considers is concerned with it.&lt;br /&gt;&lt;br /&gt;The decision to share compared profiles and with whom should be made by an independent third party authority, rather than the DNA Bank Manager. Furthermore, this provision isvague and although the intention seems to be that the DNA profiles should be matched and the results communicated only in certain cases, the generic wording could take into its ambit every instance of receipt of a DNA profile. For eg. the regulations envisaged under section 31(4)(g) may prescribe for a DNA Data Bank for medical purposes, but section 34 as it is currently worded may include DNA profiles of patients to be compared and their information released to various agencies by the Data Bank Manager as an unintentional consequence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Missing privacy safeguards&lt;/strong&gt;: Though the Bill refers to security and privacy procedures that labs are to follow, these have been left to be developed and implemented by the DNA Board. Thus, except for bare minimum standards and penalties addressing the access, sharing, and use of data – the Bill contains no privacy safeguards. &lt;br /&gt;&lt;br /&gt;In our interactions with the committee we have asked that the Bill be brought in line with the nine national privacy principles established by the Report of the Group of Experts on Privacy submitted to the Planning Commission in 2012. This has not been done.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-dissent'&gt;https://cis-india.org/internet-governance/blog/dna-dissent&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:01:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/best-practices-meet-2015">
    <title>7th Best Practices Meet 2015</title>
    <link>https://cis-india.org/internet-governance/news/best-practices-meet-2015</link>
    <description>
        &lt;b&gt;Data Security Council of India (DSCI) organized the 7th edition of its Best Practices Meet (BPM) from July 9 - 10, 2015 at Hotel ITC Gardenia in Bengaluru. BPM2015 had “Architecting Security for Digital Transformation” as its theme. Sunil Abraham and Elonnai Hickok were speakers at this event. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The two-day deliberations, reflected on policy, endeavours at national and industry levels, proposed industry steps, market response, best practices, industry standards and technology designs and see how they play their roles in architecting of information systems and enterprise security within organizations. Sunil Abraham was a panelist in the session "Architecting Security for transformation to Digital India". Elonnai Hickok was a panelist in the session "Steering privacy in the age of extreme innovation technology &amp;amp; business models."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/best-practices-meet-2015.pdf" class="external-link"&gt;&lt;b&gt;See the Agenda&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/best-practices-meet-2015'&gt;https://cis-india.org/internet-governance/news/best-practices-meet-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-17T13:11:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/five-nations-one-future">
    <title>Five Nations, One Future?</title>
    <link>https://cis-india.org/internet-governance/news/five-nations-one-future</link>
    <description>
        &lt;b&gt;The Silicon Valley model for success - what Bangalore, Chile, London and Rwanda want to learn from California. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;When it comes to IT, Silicon Valley is viewed worldwide as the model for success. What can we learn from the drivers of innovation in California? We investigate in Bangalore, Chile, London and Rwanda. The article by Bjorn Ludtke, Ellen Lee, Jaideep Sen, Gwendolyn Ledger, David Nicholson, and Jesko Johannsen was published by Voestalpine. Sunil Abraham was quoted extensively. &lt;a href="https://cis-india.org/internet-governance/blog/five-nations-one-future.pdf" class="external-link"&gt;Read more about the article&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/five-nations-one-future'&gt;https://cis-india.org/internet-governance/news/five-nations-one-future&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-18T02:34:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-business-incubators">
    <title>First draft of Technology Business Incubators: An Indian Perspective and Implementation Guidance Report</title>
    <link>https://cis-india.org/internet-governance/blog/technology-business-incubators</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society presents the first draft of its analysis on technology business incubators("TBI") in India. The report prepared by Sunil Abraham, Vidushi Marda, Udbhav Tiwari and Anumeha Karnatak looks at operating procedures, success stories and lessons that can be learnt from TBIs in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A technology business incubator (TBI) is an organisational setup that nurtures technology based and knowledge driven companies by helping them survive during the startup period in the company’s history, which lasts around the initial two to three years. Incubators do this by providing an integrated package of work space, shared office services, access to specialized equipment along with value added services like fund raising, legal services, business planning, technical assistance and networking support. The main objective of the technology business incubators is to produce successful business ventures that create jobs and wealth in the region, along with encouraging an attitude of innovation in the country as a whole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The primary aspects that this report shall go into are the stages of a startup, the motivational factors behind establishing incubators by governments &amp;amp; private players, the process followed by them in selecting, nurturing talent as well as providing post incubation support. The report will also look at the role that incubators play in the general economy apart from their function of incubating companies, such as educational or public research roles. A series of case analysis of seven well established incubators from India shall follow which will look into their nurturing processes, success stories as well as lessons that can be learnt from their establishment. The final section shall look into challenges faced by incubators in developing economies and the measures taken by them to overcome these challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/technology-business-incubators.pdf" class="internal-link"&gt;&lt;b&gt;Download the full paper&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-business-incubators'&gt;https://cis-india.org/internet-governance/blog/technology-business-incubators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-25T16:14:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse">
    <title>Role of Intermediaries in Countering Online Abuse</title>
    <link>https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse</link>
    <description>
        &lt;b&gt;The Internet can be a hostile space and protecting users from abuse without curtailing freedom of expression requires a balancing act on the part of online intermediaries.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This got published as two blog entries in the NALSAR Law Tech Blog. Part 1 can be accessed &lt;a class="external-link" href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-i/"&gt;here&lt;/a&gt; and Part 2 &lt;a class="external-link" href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-ii/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As platforms and services coalesce around user-generated content (UGC) and entrench themselves in the digital publishing universe, they are increasingly taking on the duties and responsibilities of protecting  rights including taking reasonable measures to restrict unlawful speech. Arguments around the role of intermediaries tackling unlawful content usually center around the issue of regulation—when is it feasible to regulate speech and how best should this regulation be enforced?&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Recently, Twitter found itself at the periphery of such questions when an anonymous user of the platform, @LutyensInsider, began posting slanderous and sexually explicit comments about Swati Chaturvedi, a Delhi-based journalist. The online spat which began in February last year,  culminated into&lt;a href="http://www.dailyo.in/politics/twitter-trolls-swati-chaturvedi-lutyensinsider-presstitutes-bazaru-media-delhi-police/story/1/4300.html"&gt; Swati filing an FIR&lt;/a&gt; against the anonymous user, last week. Within hours of the FIR, the anonymous user deleted the tweets and went silent. Predictably, Twitter users &lt;a href="https://twitter.com/bainjal/status/609343547796426752"&gt;hailed this&lt;/a&gt; as a much needed deterrence to online harassment. Swati’s personal victory is worth celebrating, it is an encouragement for the many women bullied daily on the Internet, where harassment is rampant. However, while Swati might be well within her legal rights to counter slander, the rights and liabilities of private companies in such circumstances are often not as clear cut.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Should platforms like Twitter take on the mantle of deciding what speech is permissible or not? When and how should the limits on speech be drawn? Does this amount to private censorship?The answers are not easy and as the recent Grand Chamber of the European Court of Human Rights (ECtHR)&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt; &lt;/a&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt;judgment in the case of&lt;/a&gt; Delfi AS v. Estonia confirms, the role of UGC platforms in balancing the user rights, is an issue far from being settled. In its ruling, the  ECtHR reasoned that because of their role in facilitating expression, online platforms have a requirement “&lt;i&gt;to take effective measures to limit the dissemination of hate speech and speech inciting violence was not ‘private censorship”.&lt;/i&gt;&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;This is problematic because the decision moves the regime away from a framework that grants immunity from liability, as long as platforms meet certain criteria and procedures. In &lt;a href="http://www.jipitec.eu/issues/jipitec-5-3-2014/4091"&gt;other words&lt;/a&gt; the ruling establishes strict liability for intermediaries in relation to manifestly illegal content, even if they may have no knowledge. The 'obligation' placed on the intermediary does not grant them safe harbour and is not proportionate to the monitoring and blocking capacity thus necessitated. Consequently,  platforms might be incentivized to err on the side of caution and restrict comments or confine speech resulting in censorship. The ruling is especially worrying, as the standard of care placed on the intermediary does not recognize the different role played by intermediaries in detection and removal of unlawful content. Further, intermediary liability is its own legal regime and is at the same time, a subset of various legal issues that need an understanding of variation in scenarios, mediums and technology both globally and in India.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Law and Short of IT&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Earlier this year, in a&lt;a href="http://www.theverge.com/2015/2/4/7982099/twitter-ceo-sent-memo-taking-personal-responsibility-for-the"&gt; leaked memo&lt;/a&gt;, the Twitter CEO Dick Costolo took personal responsibility for his platform's chronic problem and failure to deal with harassment and abuse. In Swati's case, Twitter did not intervene or take steps to address  harrassment. If it had to, Twitter (India),  as all online intermediaries would be bound by the provisions established under Section 79 and accompanying Rules of the Information Technology Act. These legislations outline the obligations and conditions that intermediaries must fulfill to claim immunity from liability for third party content. Under the regime, upon receiving actual knowledge of unlawful information on their platform, the intermediary must comply with the notice and takedown (NTD) procedure for blocking and removal of content.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Private complainants could invoke the NTD procedure forcing intermediaries to act as adjudicators of an unlawful act—a role they are clearly ill-equipped to perform, especially when the content relates to political speech or alleged defamation or obscenity. The SC judgment in Shreya Singhal addressing this issue, read down the provision (Section 79 by holding that a takedown notice can only be effected if the complainant secures a court order to support her allegation. Further, it was held that the scope of restrictions under the mechanism is restricted to the specific categories identified under Article 19(2). Effectively, this means Twitter need not take down content in the absence of a court order.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Content Policy as Due Diligence&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Another provision, Rule 3(2) prescribes a content policy which, prior to the Shreya Singhal judgment was a criteria for administering takedown. This content policy includes an exhaustive list of types of restricted expressions, though worryingly, the terms included in it are  not clearly defined and go beyond the reasonable restrictions envisioned under Article 19(2). Terms such as “grossly harmful”, “objectionable”, “harassing”, “disparaging” and “hateful” are not defined anywhere in the Rules, are subjective and contestable as alternate interpretation and standard could be offered for the same term. Further, this content policy is not applicable to content created by the intermediary.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Prior to the SC verdict in Shreya Singhal, &lt;a href="http://cis-india.org/internet-governance/blog/sc-judgment-in-shreya-singhal-what-it-means-for-intermediary-liability"&gt;actual knowledge could have been interpreted&lt;/a&gt; to mean the intermediary is called upon its own judgement under sub-rule (4) to restrict impugned content in order to seek exemption from liability. While liability accrued from not complying with takedown requests under the content policy was clear, this is not the case anymore. By reading down of S. 79 (3) (b) the court has addressed the issue of intermediaries complying with places limits on the private censorship of intermediaries and the invisible censorship of opaque government takedown requests as they must and should adhere, to the boundaries set by Article 19(2). Following the SC judgment intermediaries do not have to administer takedowns without a court order thereby rendering this content policy redundant. As it stands, the content policy is an obligation that intermediaries must fulfill in order to be exempted from liability for UGC and this due diligence is limited to publishing rules and regulations, terms and conditions or user agreement informing users of the restrictions on content. The penalties for not publishing this content policy should be clarified.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Further, having been informed of what is permissible users are agreeing to comply with the policy outlined, by signing up to and using these platforms and services. The requirement of publishing content policy as due diligence is unnecessary given that mandating such ‘standard’ terms of use negates the difference between different types of intermediaries which accrue different kinds of liability. This also places an extraordinary power of censorship in the hands of the intermediary, which could easily stifle freedom of speech online. Such heavy handed regulation could make it impossible to publish critical views about anything without the risk of being summarily censored.&lt;/p&gt;
&lt;p class="Standard"&gt;Twitter may have complied with its duties by publishing the content policy, though the obligation does not seem to be an effective deterrence. Strong safe harbour provisions for intermediaries are a crucial element in the promotion and protection of the right to freedom of expression online. By absolving platforms of responsibility for UGC as long as they publish a content policy that is vague and subjective is the very reason why India’s IT Rules are in fact, in urgent need of improvement.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Size Matters&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;The standards for blocking, reporting and responding to abuse vary across different categories of platforms. For example, it may be easier to counter trolls and abuse on blogs or forums where the owner or an administrator is monitoring comments and UGC. Usually platforms outline monitoring and reporting policies and procedures including recourse available to victims and action to be taken against violators. However, these measures are not always effective in curbing abuse as it is possible for users to create new accounts under different usernames. For example, in Swati’s case the anonymous user behind @LutyensInsider account changed&lt;a href="http://www.hindustantimes.com/newdelhi/twitter-troll-lutyensinsider-changes-handle-after-delhi-journo-files-fir/article1-1357281.aspx"&gt; &lt;/a&gt;&lt;a href="http://www.hindustantimes.com/newdelhi/twitter-troll-lutyensinsider-changes-handle-after-delhi-journo-files-fir/article1-1357281.aspx"&gt;their handle&lt;/a&gt; to @gregoryzackim and @gzackim before deleting all tweets. In this case, perhaps the fear of criminal charges ahead was enough to silence the anonymous user, which may not always be the case.&lt;/p&gt;
&lt;h3 class="Standard"&gt;Tackling the Trolls&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Most large intermediaries have privacy settings which restrict the audience for user posts as well as prevent strangers from contacting them as a general measure against online harassment. Platforms also publish&lt;a href="http://www.slate.com/articles/technology/bitwise/2015/04/twitter_s_new_abuse_policy_if_it_can_t_stop_it_hide_it.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/bitwise/2015/04/twitter_s_new_abuse_policy_if_it_can_t_stop_it_hide_it.html"&gt;monitoring policy&lt;/a&gt; outlining the procedure and mechanisms for users to&lt;a href="http://www.slate.com/articles/technology/users/2015/04/twitter_s_new_harassment_policy_not_transparent_not_engaged_with_users.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/04/twitter_s_new_harassment_policy_not_transparent_not_engaged_with_users.html"&gt;register their complaint&lt;/a&gt; or&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt; &lt;/a&gt;&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt;report abuse&lt;/a&gt;. Often reporting and blocking mechanisms&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt; &lt;/a&gt;&lt;a href="https://blog.twitter.com/2015/update-on-user-safety-features"&gt;rely on community standards&lt;/a&gt; and users reporting unlawful content. Last week Twitter&lt;a href="https://twittercommunity.com/t/removing-the-140-character-limit-from-direct-messages/41348"&gt; &lt;/a&gt;&lt;a href="https://twittercommunity.com/t/removing-the-140-character-limit-from-direct-messages/41348"&gt;announced a new feature&lt;/a&gt; allowing lists of blocked users to be shared between users. An improvement on existing mechanism for blocking, the feature is aimed at making the service safer for people facing similar issues and while an improvement on standard policies defining permissible limits on content, such efforts may have their limitations.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;The mechanisms follow a one-size-fits-all policy. First, such community driven efforts do not address concerns of differences in opinion and subjectivity. Swati in defending her actions stressed the “&lt;i&gt;coarse discourse”&lt;/i&gt; prevalent on social media, though as&lt;a href="http://www.opindia.com/2015/06/foul-mouthed-twitter-user-files-fir-against-loud-mouthed-slanderer/"&gt; &lt;/a&gt;&lt;a href="http://www.opindia.com/2015/06/foul-mouthed-twitter-user-files-fir-against-loud-mouthed-slanderer/"&gt;this article points out&lt;/a&gt; she might be assumed guilty of using offensive and abusive language. Subjectivity and many interpretations of the same opinion can pave the way for many taking offense online. Earlier this month, Nikhil Wagle’s tweets criticising Prime Minister Narendra Modi as a “pervert” was interpreted as “abusive”, “offensive” and “spreading religious disharmony”. While platforms are within their rights to establish policies for dealing with issues faced by users, there is a real danger of them doing so for&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt; &lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt;“&lt;/a&gt;&lt;a href="http://www.slate.com/articles/technology/users/2015/05/chuck_c_johnson_suspended_from_twitter_why.2.html"&gt;political reasons” and based on “popularity” measures&lt;/a&gt; which may chill free speech. When many get behind a particular interpretation of an opinion, lawful speech may also be stifled as Sreemoyee Kundu &lt;a href="http://www.dailyo.in/user/124/sreemoyeekundu"&gt;found out&lt;/a&gt;. A victim of online abuse her account was blocked by Facebook owing to multiple reports from a “&lt;i&gt;faceless fanatical mob”. &lt;/i&gt;Allowing the users to set standards of permissible speech is an improvement, though it runs the risk of mob justice and platforms need to be vigilant in applying such standards.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;While it may be in the interest of platforms to keep a hands off approach to community policies, certain kind of content may necessiate intervention by the intermediary. There has been an increase in private companies modifying their content policy to place reasonable restriction on certain hateful behaviour in order to protect vulnerable or marginalised voices. &lt;a href="http://www.theguardian.com/technology/2015/mar/12/twitter-bans-revenge-porn-in-user-policy-sharpening"&gt;Twitter&lt;/a&gt; and &lt;a href="http://www.redditblog.com/2015/05/promote-ideas-protect-people.html"&gt;Reddit's&lt;/a&gt; policy change in addressing revenge porn are reflective of a growing understanding amongst stakeholders that in order to promote free expression of ideas, recognition and protection of certain rights on the Internet may be necessary. However, any approach to regulate user content must assess the effect of policy decisions on user rights. Google's &lt;a href="http://www.theguardian.com/technology/2015/jun/22/revenge-porn-women-free-speech-abuse"&gt;stand on tackling revenge porn&lt;/a&gt; may be laudable, though the &lt;a href="https://www.techdirt.com/articles/20141109/06211929087/googles-efforts-to-push-down-piracy-sites-may-lead-more-people-to-malware.shtml"&gt;decision to push down&lt;/a&gt; 'piracy' sites in its search results could be seen to adversely impact the choice that users have. Terms of service implemented with subjectivity and lack of transparency can and does lead to private censorship.&lt;/p&gt;
&lt;h3 class="Standard"&gt;The Way Forward&lt;/h3&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Harassment is damaging, because of the feeling of powerlessness that it invokes in the victims and online intermediaries represent new forms of power through which users' negotiate and manage their online identity. Content restriction policies and practices must address this power imbalance by adopting baseline safeguards and best practices. It is only fair that based on principles of equality and justice, intermediaries be held responsible for the damage caused to users due to wrongdoings of other users or when they fail to carry out their operations and services as prescribed by the law. However, in its present state, the intermediary liability regime in India is not sufficient to deal with online harassment and needs to evolve into a more nuanced form of governance.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Any liability framework must evolve bearing in mind the slippery slope of overbroad regulation and differing standards of community responsibility. Therefore, a balanced framework would need to include elements of both targeted regulation and soft forms of governance as liability regimes need to balance fundamental human rights and the interests of private companies. Often, achieving this balance is problematic given that these companies are expected to be adjudicators and may also be the target of the breach of rights, as is the case in Delfi v Estonia. Global frameworks such as the Manila Principles can be a way forward in developing effective mechanisms. The determination of content restriction practices should  always adopt the least restrictive means of doing so, distinguishing between the classes of intermediary. They must evolve considering the proportionality of the harm, the nature of the content and the impact on affected users including the proximity of affected party to content uploader.&lt;/p&gt;
&lt;p class="Standard" style="text-align: justify; "&gt;Further, intermediaries and governments should communicate a clear mechanism for review and appeal of restriction decisions. Content restriction policies should incorporate an effective right to be heard. In exceptional circumstances when this is not possible, a post facto review of the restricton order and its implementation must take place as soon as practicable. Further, unlawful content restricted for a limited duration or within a specific geography, must not extend beyond these limits and a periodic review should take place to ensure the validity of the restriction. Regular, systematic review of rules and guidelines guiding intermediary liability will go a long way in ensuring that such frameworks are not overly burdensome and remain effective.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse'&gt;https://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Online Harassment</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Online Abuse</dc:subject>
    

   <dc:date>2015-08-02T16:38:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites">
    <title>India blocks access to 857 porn sites</title>
    <link>https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites</link>
    <description>
        &lt;b&gt;India has blocked free access to 857 porn sites in what it says is a move to prevent children from accessing them. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The story was published by BBC on August 3, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Adults will still be able to access the  sites using virtual private networks (VPNs) or proxy servers. In July,  the Supreme Court expressed its unhappiness over the government's  inability to block sites, especially those featuring child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom companies have said they will not be able to enforce the "ban" immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We  have to block each site one by one and it will take a few days for all  service providers to block all the sites," an unnamed telecom company  executive told The Times of India newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  senior official, who preferred to remained unnamed, told the BBC Hindi  that India's department of telecommunications had "advised" telecom  operators and Internet service providers to "control free and open  access" to &lt;a class="story-body__link-external"&gt;857 porn sites&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There  is no total ban. This was done in the backdrop of Supreme Court's  observation on children having free access to porn sites. The idea is  also to protect India's cultural fabric. This will not prevent adults  from visiting porn sites," the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July, the top court had observed that it was not for the court to order a ban on porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It  is an issue for the government to deal with. Can we pass an interim  order directing blocking of all adult websites? And let us keep in mind  the possible contention of a person who could ask what crime have I  committed by browsing adult websites in private within the four walls of  my house. Could he not argue about his right to freedom to do something  within the four walls of his house without violating any law?," the  court said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a class="story-body__link-external" href="http://www.pornhub.com/insights/2014-year-in-review"&gt;statistics released&lt;/a&gt; by adult site Pornhub, India was its fourth largest source of traffic  in 2014, behind the US, UK and Canada. Pranesh Prakash of the Bangalore  based Centre for Internet and Society said the directive to block the  857 sites was "the largest single order of its kind" in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  government's reasoning that it is not a ban because adults can still  access the porn sites is ridiculous," he told the BBC. The move has  caused a great deal of comment on Indian social media networks, with  many prominent personalities coming forward to condemn it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular  author Chetan Bhagat, writer and commentator Nilanjana Roy, politician  Milind Deora and director Ram Gopal Varma have all added their voices to  the debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites'&gt;https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T01:31:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban">
    <title>Porn ban: People will soon learn to circumvent ISPs and govt orders, expert says</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Karthikeyan Hemalatha  was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Porn-ban-People-will-soon-learn-to-circumvent-ISPs-and-govt-orders-expert-says/articleshow/48320914.cms"&gt;Times of India&lt;/a&gt; on August 2. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The government used other sections of the Act to circumvent this  provision. Sources in the Department of Telecommunication, which comes  under the ministry of communications and information technology, said a  notification had been issued under Section 79 (b) of IT Act under which  internet service providers could be penalized for not following  government orders. "Though the section protects an internet service  provider (ISP) from legal action for the content it may allow, it can be  penalized for not following government orders to ban them," said  Prakash.&lt;br /&gt; &lt;br /&gt; Last month, the  Supreme Court declined to pass an  interim order to block websites which have pornographic content. "Such  interim orders cannot be passed by this court. Somebody may come to the  court and say 'look I am above 18 and how can you stop me from watching  it within the four walls of my room?' It is a violation of Article 21  [right to personal liberty]," said  Chief Justice H L Dattu.&lt;br /&gt; &lt;br /&gt; The judge was reacting to a public interest litigation filed by advocate  Kamlesh Vashwani who was seeking to block porn websites in the country.  "The issue is definitely serious and some steps need to be taken. The  Centre is expected to take a stand. Let us see what stand the Centre  will take," the Chief Justice said and directed the Centre to reply  within four weeks. Over the weekend, the stance became clear.&lt;br /&gt; &lt;br /&gt; Sources also say that Section 19 (2) of the Constitution was used for  the ban. The section allows the government to impose "reasonable  restrictions in the interest of sovereignty and integrity of India,  security of the state, decency or morality or in relation to contempt of  court."&lt;br /&gt; &lt;br /&gt; For netizens, the government could actually be  providing crash courses on proxy sites. "This is the best way to teach  people on how to circumvent ISPs and government orders," said Prakash,  adding that real abusive porn sites might still be available.&lt;br /&gt; &lt;br /&gt; "There is no dynamic mechanism to block all sites with pornographic  content. The government has to individually pick URLs (uniform resource  locator) to ban websites. Right now, only popular websites have been  banned and the little known abusive sites like those that propagate  revenge porn or child porn," said Prakash. "No ban can be  comprehensive," he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-august-2-2015-karthikeyan-hemalatha-porn-ban&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T01:47:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage">
    <title>Porn block in India sparks outrage</title>
    <link>https://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage</link>
    <description>
        &lt;b&gt;
India’s government has triggered a storm of protest after blocking 857 alleged pornography websites, with privacy and internet freedom campaigners, as well as consumers, condemning the move as arbitrary and unlawful.


&lt;/b&gt;
        &lt;div&gt;
&lt;p style="text-align: justify; "&gt;The article by Amanda Hodge was published in the &lt;a class="external-link" href="http://www.theaustralian.com.au/news/world/porn-block-in-india-sparks-outrage/story-e6frg6so-1227470074078"&gt;Australian&lt;/a&gt; on August 5, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  order, enforced since Sunday by the country’s main internet service  providers, comes amid debate about the influence of pornography on sex  crime in India, and as the Supreme Court considers a petition by lawyer  Kamlesh Vaswani to ban pornographic websites that harm children.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government has been forced to defend the move, saying it was taken in  response to ­Supreme Court criticism at in­action against child  pornography websites, although the Supreme Court itself has refused to  impose any interim ban while it considers the petition. The websites — a  fraction of the world’s millions of internet pornography sites — will  remain blocked until the government figures out how to restrict access, a  spokesman said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics  have slammed the measure as unconstitutional and pointed out the list  includes adult humour sites that contain no pornographic content. Others  have suggested it is another intrusion into the private lives of  ordinary Indians by an administration intent on pushing a puritanical  Hindu agenda, citing the recent ban on beef in several states and an  alleged “Hindu-­isation” of school textbooks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That  prompted outrage from Telecom Minister Ravi Shankar Prasad. “I reject  with contempt the charge that it is a Talibani government. Our  government supports free media, respects communication on social media  and has respected freedom of communication always,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  India has no law preventing citizens accessing internet pornography,  regulations do restrict the publishing of “obscene information in  electronic form”. Centre for Internet and Society policy director  Pranesh Prakash told &lt;i&gt;The Australian &lt;/i&gt;yesterday that some elements  of that act were welcome — such as prohibition of child pornography and  the uploading of a person’s private parts without consent — but “the  provisions relating to ‘sexually explicit materials’ are far too broad,  with no exceptions made for art, architecture, education or literature”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr  Prakash said the pornography ban amounted to an “abdication of the  government’s duty”, given the list of sites blocked was provided on  request to the government by one of the Vaswani petitioners. “The  additional solicitor-­general essentially asked one of the petitioners  to provide a list of websites, which she passed on to the Department of  Information Technology, which in turn passed to Department of  Telecommunications asking for them to be blocked or disabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“That  is not acceptable in a democracy where it is not the government which  has actually found any of these websites to be unlawful.” Mr Prakash  also criticised the secrecy surrounding the order, which he said  contravened Indian law requiring a public declaration of any intended  ban so that it might be challenged. The bans were made under “Rule 12”  of India’s IT Act, which empowers the government to force ISPs to block  sites when it is “necessary or expedient”.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage'&gt;https://cis-india.org/internet-governance/news/the-australian-news-august-5-2015-amanda-hodge-porn-block-in-india-sparks-outrage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T02:10:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review">
    <title>CIS submission to the UNGA WSIS+10 Review</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) submitted its comments to the non-paper on the UNGA Overall Review of
the Implementation of the WSIS outcomes, evaluating the progress made and challenges ahead.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;To what extent has progress been made on the vision of the peoplecentred, inclusive and development oriented Information Society in the ten years since the WSIS?&lt;/b&gt;&lt;br /&gt;The World Summit on the Information Society (WSIS) in 2003 and 2005 played an important role in encapsulating the potential of knowledge and information and communication technologies (ICT) to contribute to economic and social development. Over the past ten years, most countries have sought to foster the use of information and knowledge by creating enabling environment for innovation and through efforts to increase access. There have been interventions to develop ICT for development both at an international and national level through private sector investment, bilateral treaties and national strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, much of the progress made in the past ten years in terms of getting people connected and reaping the benefits of ICT has not been sufficiently peoplecentred, nor have they been sufficiently inclusive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These developments have not been sufficiently peoplecentred, since governments across the world have been using the Internet as a monumental surveillance tool, invading people’s privacy without legitimate justifications, in an arbitrary manner without due care for reasonableness,  proportionality, or democratic accountability. These developments have not been sufficiently peoplecentred, since the largest and most profitable Internet businesses — businesses that have more users than most nationstates have citizens, yet have one-sided terms of service — have eschewed core principles like open standards and interoperability that helped create the Internet and the World Wide Web, and instead promote silos.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We still reside in a world where development has been very lopsided, and ICTs have contributed to reducing some of these gulfs, while exacerbating others. For instance, persons with visual impairment are largely yet to reap the benefits of the Information Society due to a lack of attention paid to universal, while sighted persons have benefited far more; the ability of persons who don’t speak a language like English to contribute to global Internet governance discussions is severely limited; the spread of academic knowledge largely remains behind prohibitive paywalls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As ICTs have grown both in sophistication and reach, much work remains to achieve the peoplecentred, inclusive and developmentoriented information society envisaged in WSIS. While the diffusion of ICTs has created new opportunities for development, even today less than half the world has access to broadband (with only eleven per cent of the world’s population having access to fixed broadband). See &lt;a class="external-link" href="http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2015.pdf"&gt;International Telecommunication Union, ICT Facts and Figures: The World in 2015&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ninety per cent of people connected come from the industrialized countries — North America (thirty per cent), Europe (thirty per cent) and the AsiaPacific (thirty per cent). Four billion people from developing countries remain offline, representing two-thirds of the population residing in developing countries. Of the nine hundred and forty million people residing in Least Developed Countries (LDCs), only eighty-nine million use the Internet and only seven per cent of households have Internet access, compared with the world average of forty-six per cent. See &lt;a class="external-link" href="http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2015.pdf"&gt;International Telecommunication Union, ICT Facts and Figures: The World in 2015&lt;/a&gt;. This digital divide is first and foremost a question of access to basic infrastructure (like electricity).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, there is a problem of affordability, all the more acute since in the South in comparison with countries of the North due to the high costs related to access to the connection. Further, linguistic, educational, cultural and content related barriers are also contributing to this digital divide. Growth of restrictive regimes around intellectual property, vision of the equal and connected society. Security of critical infrastructure with in light of ever growing vulnerabilities, the loss of trust following revelations around mass surveillance and a lack of consensus on how to tackle these concerns are proving to be a challenge to the vision of a connected information society. The WSIS+10 overall review is timely and a much needed intervention in assessing the progress made and planning for the challenges ahead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were two bodies as major outcomes of the WSIS process: the Internet Governance Forum and the Digital Solidarity Fund, with both of these largely failing to achieve their intended goals. The Internet Governance Forum, which is meant to be a leading example of “multi-stakeholder governance” is also a leading example of what the Multi-stakeholder Advisory Group (MAG) noted in 2010 as “‘black box’ approach”, with the entire process around the nomination and selection of the MAG being opaque. Indeed, when CIS requested the IGF Secretariat to share information on the nominators, we were told that this information will not be made private. Five years since the MAG lamented its own blackbox nature, things have scarcely improved. Further, analysis of MAG membership since 2006 shows that 26 persons have served for 6 years or more, with the majority of them being from government, industry, or the technical community. Unsurprisingly, 36 per cent of the MAG membership has come from the WEOG group, highlighting both deficiencies in the nomination/selection&lt;br /&gt;process as well as the need for capacity building in this most important area. The Digital Solidarity Fund failed for a variety of reason, which we have analysed in a &lt;a class="external-link" href="https://docs.google.com/document/d/1E0HKY06744b6i2slR5HMk9Qd6I7zPFWJlKSmhsneAs/ edit"&gt;separate document&lt;/a&gt; annexed to this response.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are the challenges to the implementation of WSIS outcomes?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the key areas that need attention going forward and need to be addressed include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Access to Infrastructure&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Developing policies aimed at promoting innovation and increasing affordable access to hardware and software, and curbing the ill effects of the currentlyexcessive patent and copyright regimes.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Focussing global energies on solutions to lastmile access to the Internet in a manner that is not decoupled from developmental ground realities.&lt;/li&gt;
&lt;li&gt;This would include policies on spectrum sharing, freeing up underutilized spectrum, and increasing unlicensed spectrum.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This would also include governmental policies on increasing competition among Internet providers at the last mile as well as at the backbone (both nationally and internationally), as well as commitments for investments in basic infrastructure such as an openaccess national fibreoptic backbone where the private sector investment is not sufficient.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Developing policies that encourage local Internet and communications infrastructure in the form of Internet exchange points, data centres, community broadcasting.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Access to Knowledges&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;As the Washington Declaration on IP and the Public Interest5 points out, the enclosure of the public domain and knowledge commons through expansive “intellectual property” laws and policies has only gotten worse with digital technologies, leading to an unjust allocation of information goods, and continuing royalty outflows from the global South to a handful of developing countries. This is not sustainable, and urgent action is needed to achieve more democratic IP laws, and prevent developments such as extra judicial enforcement mechanisms such as digital restrictions management systems from being incorporated within Web standards.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aggressive development of policies and adoption of best practices to ensure that persons with disabilities are not treated as secondgrade citizens, but are able to fully and equally participate in and benefit from the Information Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Despite the rise of video content on the Internet, much of that has been in parts of the world with already high literacy, and language and illiteracy continue to pose barriers to full usage of the Internet.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While the Tunis Agenda highlighted the need to address communities marginalized in Information Society discourse, including youth, older persons, women, indigenous peoples, people with disabilities, and remote and rural communities, but not much progress has been seen on this front.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Rights, Trust, and Governance&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ensuring effective and sustainable participation especially from developing countries and marginalised communities. Developing governance mechanisms that are accountable, transparent and provide checks against both unaccountable commercial interests as well as governments.&lt;/li&gt;
&lt;li&gt;Building citizen trust through legitimate, accountable and transparent governance mechanisms.&lt;/li&gt;
&lt;li&gt;Ensuring cooperation between states as security is influenced by global foreign policy, and is of principal importance to citizens and consumers, and an enabler of other rights.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;As the Manila Principles on Intermediary Liability show, uninformed intermediary liability policies, blunt and heavy handed regulatory measures, failing to meet the principles of necessity and proportionality, and a lack of consistency across these policies has resulted in censorship and other human rights abuses by governments and private parties, limiting individuals’ rights to free expression and creating an environment of uncertainty that also impedes innovation online. In developing, adopting, and reviewing legislation, policies and practices that govern the liability of intermediaries, interoperable and harmonized regimes that can promote innovation while respecting users’ rights in line with the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights and the United Nations Guiding Principles on Business and Human Rights are needed and should be encouraged.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An important challenge before the Information Society is that of the rise of “quantified society”, where enormous amounts of data are generated constantly, leading to great possibilities and grave concerns regarding privacy and data protection.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reducing tensions arising from the differences between cultural and digital nationalism including on issues such as data sovereignty, data localisation, unfair trade and the need to have open markets.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Currently, there is a lack of internationally recognized venues accessible to all stakeholders for not only discussing but also acting upon many of these issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What should be the priorities in seeking to achieve WSIS outcomes and progress towards the Information Society, taking into account emerging trends?&lt;/b&gt;&lt;br /&gt;All the challenges mentioned above should be a priority in achieving WSIS outcomes and ensuring innovation to lead social and economic progress in society. Digital literacy, multilingualism and addressing privacy and user data related issues need urgent attention in the global agenda. Enabling increased citizen participation thus accounting for the diverse voices that make the Internet a unique medium should also be treated as priority. Renewing the IGF mandate and giving it teeth by adopting indicators for development and progress, periodic review and working towards tangible outcomes would be beneficial to achieving the goal of a connected information society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What are general expectations from the WSIS + 10 High Level Meeting of the United Nations General Assembly?&lt;/b&gt;&lt;br /&gt;We would expect the WSIS+10 High Level Meeting to endorse an outcome document that seeks to d evelop a comprehensive policy framework addressing the challenges highlighted above . It would also be beneficial, if the outcome document could identify further steps to assess development made so far, and actions for overcoming the identified challenges. Importantly, this should not only be aimed at governments, but at all stakeholders. This would be useful as a future road map for regulation and would also allow us to understand the impact of Internet on society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What shape should the outcome document take?&lt;/b&gt;&lt;br /&gt;The outcome document should be a resolution of the UN General Assembly, with high level policy statements and adopted agreements to work towards identified indicators. It should stress the urgency of reforms needed for ICT governance that is democratic, respectful of human rights and social justice and promotes participatory policymaking. The language should promote the use of technologies and institutional architectures of governance that ensure users’ rights over data and information and recognize the need to restrict abusive use of technologies including those used for mass surveillance. Further, the outcome document should underscore the relevance of the Universal Declaration of Human Rights, including civil, political, social, economic, and cultural rights, in the Information Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The outcome document should also acknowledge that certain issues such as security, ensuring transnational rights, taxation, and other such cross jurisdictional issues may need greater international cooperation and should include concrete steps on how to proceed on these issues. The outcome document should acknowledge the limited progress made through outcome-less multi-stakeholder governance processes such as the Internet Governance Forum, which favour status quoism, and seek to enable the IGF to be more bold in achieving its original goals, which are still relevant. It should be frank in its acknowledgement of the lack of consensus on issues such as “enhanced cooperation” and the “respective roles” of stakeholders in multi-stakeholder processes, as brushing these difficulties under the carpet won’t help in magically building consensus. Further, the outcome document should recognize that there are varied approaches to multi-stakeholder governance.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review'&gt;https://cis-india.org/internet-governance/blog/cis-submission-to-unga-wsis-review&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-09T16:24:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011">
    <title>Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011</link>
    <description>
        &lt;b&gt;Experts and regulators across jurisdictions are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.This blog provides an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/b&gt;
        &lt;p&gt;Experts and regulators across the globe are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.&lt;/p&gt;
&lt;p&gt;Below is an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India currently does not have comprehensive privacy legislation - but the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011 formed under section 43A of the Information Technology Act 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; define a data protection framework for the processing of digital data by Body Corporate. Big Data practices will impact a number of the provisions found in the Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Rules: &lt;/b&gt;Currently the Rules apply to Body Corporate and digital data. As per the IT Act, Body Corporate is defined as &lt;i&gt;"Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present scope of the Rules excludes from its purview a number of actors that do or could have access to Big Data or use Big Data practices. The Rules would not apply to government bodies or individuals collecting and using Big Data. Yet, with technologies such as IoT and the rise of Smart Cities across India – a range of government, public, and private organizations and actors could have access to Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Definition of personal and sensitive personal data: &lt;/b&gt;Rule 2(i) defines personal information as &lt;i&gt;"information that relates to a natural person which either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Rule 3 defines sensitive personal information as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password,&lt;/li&gt;
&lt;li&gt;Financial information,&lt;/li&gt;
&lt;li&gt;Physical/physiological/mental health condition,&lt;/li&gt;
&lt;li&gt;Sexual orientation,&lt;/li&gt;
&lt;li&gt;Medical records and history,&lt;/li&gt;
&lt;li&gt;Biometric information&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The present definition of personal data hinges on the factor of identification (data that is capable of identifying a person). Yet this definition does not encompass information that is associated to an already identified individual - such as habits, location, or activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of personal data also addresses only the identification of 'such person' and does not address data that is related to a particular person but that also reveals identifying information about another person - either directly - or when combined with other data points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By listing specific categories of sensitive personal information, the Rules do not account for additional types of sensitive personal information that might be generated or correlated through the use of Big Data analytics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the definitions of sensitive personal information or personal information do not address how personal or sensitive personal information - when anonymized or aggregated – should be treated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent&lt;/b&gt;: Rule 5(1) requires that Body Corporate must, prior to collection, obtain consent in writing through letter or fax or email from the provider of sensitive personal data regarding the use of that data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a context where services are delivered with little or no human interaction, data is collected through sensors, data is collected on a real time and regular basis, and data is used and re-used for multiple and differing purposes - it is not practical, and often not possible, for consent to be obtained through writing, letter, fax, or email for each instance of data collection and for each use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice of Collection: &lt;/b&gt;Rule 5(3) requires Body Corporate to provide the individual with a notice during collection of information that details the fact that information is being collected, the purpose for which the information is being collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information. Furthermore body corporate should not retain information for longer than is required to meet lawful purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision acts as an important element of transparency, in the context of Big Data, communicating the purpose for which data is collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information could prove to be difficult to communicate as they are likely to encompass numerous agencies and change depending upon the analysis being done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and correction&lt;/b&gt;: Rule 5(6) provides individuals with the ability to access sensitive personal information held by the body corporate and correct any inaccurate information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision would be difficult to implement effectively in the context of Big Data as vast amounts of data are being generated and collected on an ongoing and real time basis and often without the knowledge of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Purpose Limitation:&lt;/b&gt; Rule 5(5) requires that body corporate should use information only of the purpose which it has been collected.&lt;/p&gt;
&lt;p&gt;In the context of Big Data this provision would overlook the re-use of data that is inherent in such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; Rule 8 states that any Body Corporate or person on its behalf will be understood to have complied with reasonable security practices and procedures if they have implemented such practices and have in place codes that address managerial, technical, operational and physical security control measures. These codes could follow the IS/ISO/IEC 27001 standard or another government approved and audited standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision importantly requires that data controllers collecting and processing data have in place strong security practices. In the context of Big Data – the security of devices that might be generating or collecting data and algorithms processing and analysing data is critical. Once generated, it might be challenging to ensure the data is being transferred to or being analysed by organisations that comply with such security practices as listed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Breach&lt;/b&gt; : Rule 8 requires that if a data breach occurs, Body Corporate would have to be able to demonstrate that they have implemented their documented information security codes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision holds a company accountable for the implementation of security practices, it does not address how a company should be held accountable for a large scale data breach as in the context of Big Data the scope and impact of a data breach is on a much larger scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Opt in and out and ability to withdraw consent&lt;/b&gt; : Rule 5(7) requires Body Corporate or any person on its behalf, prior to the collection of information - including sensitive personal information - must give the individual the option of not providing information and must give the individual the option of withdrawing consent. Such withdrawal must be sent in writing to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The feasibility of such a provision in the context of Big Data is unclear, especially in light of the fact that Big Data practices draw upon large amounts of data, generated often in real time, and from a variety of sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information&lt;/b&gt;: Rule 6 maintains that disclosure of sensitive personal data can only take place with permission from the provider of such information or as agreed to through a lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision addresses disclosure and does not take into account the “sharing” of information that is enabled through networked devices, as well as the increasing practice of companies to share anonymized or aggregated data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Policy&lt;/b&gt; : Rule 4 requires that body corporate have in place a privacy policy on their website that provides clear and accessible statements of its practices and policies, type of personal or sensitive personal information that is being collected, purpose of the collection, usage of the information, disclosure of the information, and the reasonable security practices and procedures that have been put in place to secure the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of Big Data where data from a variety of sources is being collected, used, and re-used it is important for policies to 'follow data' and appear in a contextualized manner. The current requirement of having Body Corporate post a single overarching privacy policy on its website could prove to be inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remedy&lt;/b&gt; : Section 43A of the Act holds that if a body corporate is negligent in implementing and maintain reasonable security practices and procedures which results in wrongful loss or wrongful gain to any person, the body corporate can be held liable to pay compensation to the affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision will provide limited remedy for an affected individual in the context of Big Data. Though important to help prevent data breaches resulting from negligent data practices, implementation of reasonable security practices and procedures cannot be the only hinging point for determining liability of a Body Corporate for violations and many of the harms possible through Big Data are not in the form of wrongful loss or wrongful gain to another person. Indeed many harms possible through Big Data are non-economic in nature – including physical invasion of privacy, and discriminatory practices that can arise from decisions based on Big Data analytics. Nor does the provision address the potential for future damage that can result from a 'Big Data data breach'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards noted in the above section are not the only legal provisions that speak to privacy in India. There are over fifty sectoral legislation that have provisions addressing privacy - for example provisions addressing confidentiality of health and banking information. The government of India is also in the process of drafting a privacy legislation. In 2012 the Report of the Group of Experts on Privacy provided recommendations for a privacy framework in India. The Report envisioned a framework of co-regulation - with sector level self regulatory organization developing privacy codes (that are not lower than the defined national privacy principles) and that are enforced by a privacy commissioner.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Perhaps this method would be optimal for the regulation of Big Data- allowing for the needed flexibility and specificity in standards and device development. Though the Report notes that individuals can seek remedy from the court and the Privacy Commissioner can issue fines for a violation, the development of privacy legislation in India has yet to clearly integrate the importance of due process and remedy. With the onset of Big Data - this will become more important than ever.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use and generation of Big Data in India is growing. Plans such as free wifi zones in cities&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;, city wide CCTV networks with facial recognition capabilities&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;, and the implementation of an identity/authentication platform for public and private services&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;, are indicators towards a move of data generation that is networked and centralized, and where the line between public and private is blurred through the vast amount of data that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such developments and innovations what is privacy and what role does privacy play? Is it the archaic inhibitor - limiting the sharing and use of data for new and innovative purposes? Will it be defined purely by legislative norms or through device/platform design as well? Is it a notion that makes consumers think twice about using a product or service or is it a practice that enables consumer and citizen uptake and trust and allows for the growth and adoption of these services?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How privacy will be regulated and how it will be perceived is still evolving across jurisdictions, technologies, and cultures - but it is clear that privacy is not being and cannot be overlooked. Governments across the world are reforming and considering current and future privacy regulation targeted towards life in a quantified society. As the Indian government begins to roll out initiatives that create a "Digital India" indeed a "quantified India", taking privacy into consideration could facilitate the uptake, expansion, and success of these practices and services. As the Indian government pursues the opportunities possible through Big Data it will be useful to review existing privacy protections and deliberate on if, and in what form, future protections for privacy and other rights will be needed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Group of Experts on Privacy. (2012). &lt;i&gt;Report of the Group of Experts on Privacy.&lt;/i&gt; New Delhi: Planning Commission, Government of India. Retrieved May 20, 2015, from http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; NDTV. “Free Public Wi-Fi Facility in Delhi to Have Daily Data Limit. NDTV, May 25&lt;sup&gt;th&lt;/sup&gt; 2015, Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857"&gt;http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;FindBiometrics Global Identity Management. “Surat Police Get NEC Facial Recognition CCTV System”. July 21&lt;sup&gt;st&lt;/sup&gt; 2015. Available at: http://findbiometrics.com/surat-police-nec-facial-recognition-27214/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;UIDAI Official Website. Available at: https://uidai.gov.in/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011'&gt;https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-11T07:01:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril">
    <title>Right to Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril</link>
    <description>
        &lt;b&gt;It seems to have become quite a fad, especially amongst journalists, to use this headline and claim that the right to privacy which we consider so inherent to our being, is under attack. However, when I use this heading in this piece I am not referring to the rampant illegal surveillance being done by the government, or the widely reported recent raids on consenting (unmarried) adults who were staying in hotel rooms in Mumbai. I am talking about the fact that the Supreme Court of India has deemed it fit to refer the question of the very existence of a fundamental right to privacy to a Constitution Bench to finally decide the matter, and define the contours of such right if it does exist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In an order dated August 11, 2015 the Supreme Court finally gave in to the arguments advanced by the Attorney General and admitted that there is some “unresolved contradiction” regarding the existence of a constitutional “right to privacy” under the Indian Constitution and requested that a Constitutional Bench of appropriate strength.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court was hearing a petition challenging the implementation of the Adhaar Card Scheme of the government, where one of the grounds to challenge the scheme was that it was violative of the right to privacy guaranteed to all citizens under the Constitution of India. However to counter this argument, the State (via the Attorney General) challenged the very concept that the Constitution of India guarantees a right to privacy by relying on an “unresolved contradiction” in judicial pronouncements on the issue, which so far had only been of academic interest. This “unresolved contradiction” arose because in the cases of &lt;b&gt;&lt;i&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/i&gt;&lt;/b&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of U.P. &amp;amp; Others,&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;b&gt;[2]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(decided by &lt;i&gt;Eight &lt;/i&gt;and &lt;i&gt;Six &lt;/i&gt;Judges respectively) the Supreme Court has categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However somehow the later case of &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of M.P. and another&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;i&gt;Kharak Singh&lt;/i&gt; to hold that a right to privacy does exist and is guaranteed as a fundamental right under the Constitution of India.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;b&gt;&lt;i&gt;R. Rajagopal &amp;amp; Another &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Tamil Nadu &amp;amp; Others,&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;b&gt;[5]&lt;/b&gt;&lt;/a&gt; &lt;/b&gt;&lt;/i&gt;(popularly known as &lt;i&gt;Auto Shanker’s &lt;/i&gt;case) and &lt;b&gt;&lt;i&gt;People’s Union for Civil Liberties (PUCL) &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11 order, all these judgments were decided by two or three Judges only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioners on the other hand made a number of arguments to counter those made by the Attorney General to the effect that the fundamental right to privacy is well established under Indian law and that there is no need to refer the matter to a Constitutional Bench. These arguments are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The observations made in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;regarding the absence of right to privacy are not part of the &lt;i&gt;ratio decidendi&lt;/i&gt; of that case and, therefore, do not bind the subsequent smaller Benches such as &lt;b&gt;&lt;i&gt;R. Rajagopal &lt;/i&gt;&lt;/b&gt;and &lt;b&gt;&lt;i&gt;PUCL&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Even in &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;it was held that the right of a person not to be disturbed at his residence by the State is recognized to be a part of a fundamental right guaranteed under Article 21. It was argued that this is nothing but an aspect of privacy. The observation in para 20 of the majority judgment (quoted in footnote 2 above) at best can be construed only to mean that there is no fundamental right of privacy against the State’s authority to keep surveillance on the activities of a person. However, they argued that such a conclusion cannot be good law any more in view of the express declaration made by a seven-Judge bench decision of this Court in &lt;b&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India &amp;amp; Another&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Both &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were decided on an interpretation of the Constitution based on the principles expounded in &lt;b&gt;&lt;i&gt;A.K. Gopalan &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;State of Madras&lt;/b&gt;&lt;/i&gt;,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; which have themselves been declared wrong by a larger Bench in &lt;b&gt;&lt;i&gt;Rustom Cavasjee Cooper &lt;/i&gt;&lt;/b&gt;&lt;i&gt;v. &lt;b&gt;Union of India&lt;/b&gt;&lt;/i&gt;.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other than the points above, it was also argued that world over in all the countries where Anglo-Saxon jurisprudence is followed, ‘privacy’ is recognized as an important aspect of the liberty of human beings. The petitioners also submitted that it was too late in the day for the Union of India to argue that the Constitution of India does not recognize privacy as an aspect of the liberty under Article 21 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However these arguments of the petitioners were not enough to convince the Supreme Court that there is no doubt regarding the existence and contours of the right to privacy in India. The Court, swayed by the arguments presented by the Attorney General, admitted that questions of far reaching importance for the Constitution were at issue and needed to be decided by a Constitutional Bench.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Giving some insight into its reasoning to refer this issue to a Constitutional Bench, the Court did seem to suggest that its decision to refer the matter to a larger bench was more an exercise in judicial propriety than an action driven by some genuine contradiction in the law. The Court said that if the observations in &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;were accepted as the law of the land, the fundamental rights guaranteed under the Constitution of India would get “denuded of vigour and vitality”. However the Court felt that institutional integrity and judicial discipline require that smaller benches of the Court follow the decisions of larger benches, unless they have very good reasons for not doing so, and since in this case it appears that the same was not done therefore the Court referred the matter to a larger bench to scrutinize the ratio of &lt;b&gt;&lt;i&gt;M.P. Sharma &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra) &lt;/i&gt;and &lt;b&gt;&lt;i&gt;Kharak Singh &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(supra)&lt;/i&gt; and decide the judicial correctness of subsequent two judge and three judge bench decisions which have asserted or referred to the right to privacy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: “A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not to subject such regulation to constitutional limitations &lt;i&gt;by recognition of a fundamental right to privacy&lt;/i&gt;, analogous to the American Fourth Amendment, &lt;i&gt;we have no justification to import it, into a totally different fundamental right, by some process of strained construction&lt;/i&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: “&lt;b&gt;… &lt;/b&gt;Nor do we consider that Art. 21 has any relevance in the context as was sought to be suggested by learned counsel for the petitioner. As already pointed out, &lt;i&gt;the right of privacy is not a guaranteed right under our Constitution&lt;/i&gt;and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; It is interesting to note that while the decisions in both &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; were given in the context of similar facts (challenging the power of the police to make frequent domiciliary visits both during the day and night at the house of the petitioner) while the majority in &lt;i&gt;Kharak Singh&lt;/i&gt; specifically denied the existence of a fundamental right to privacy, however they held the conduct of the police to be violative of the right to personal liberty guaranteed under Article 21, since the Regulations under which the police actions were undertaken were themselves held invalid. On the other hand, while &lt;i&gt;Gobind&lt;/i&gt; held that a fundamental right to privacy does exist in Indian law, it may be interfered with by the State through procedure established by law and therefore upheld the actions of the police since they were acting under validly issued Regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; (1978) 1 SCC 248.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; AIR 1950 SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; (1970) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/right-to-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-13T15:32:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
