<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-politics-november-29-2012-surabhi-agarwal-govt-tweaks-enforcement-of-it-act-after-spate-of-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dot-blocks-domain-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-proposed-amendments-to-it-intermediary-guidelines-and-digital-media-ethics-code-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-the-it-rules-2021"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology">
    <title>Information &amp; Communication Technology in Making a Healthy Information Society with special reference to use of ICTS in Educational Technology</title>
    <link>https://cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology</link>
    <description>
        &lt;b&gt;The Department of Computer Science, Andhra Loyola College in collaboration with the Department of Computer Science, Krishna University will be organizing a UGC-sponsored National Seminar on August 11 and 12, 2014 at Andhra Loyola College in Vijayawada. &lt;/b&gt;
        &lt;p&gt;T. Vishnu Vardhan, Programme Director, Access to Knowledge from the Centre for Internet and Society will be giving a key note address at this event.&lt;/p&gt;
&lt;p&gt;See the invitation below:&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/AndhraLoyolaCollegeInvite.png/@@images/d9beb902-d34e-4f42-93fd-b75528cc9da8.png" alt="Andhra Loyola College Invite" class="image-inline" title="Andhra Loyola College Invite" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology'&gt;https://cis-india.org/news/information-communication-technology-in-making-a-healthy-information-society-with-special-reference-to-use-of-icts-in-educational-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-07-18T09:06:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes">
    <title>Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India by the Dialogue and FES</title>
    <link>https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes</link>
    <description>
        &lt;b&gt;On August 21, 2019, Aayush Rathi, attended a report launch event and focus group discussion on the "Impact of Industrial Revolution 4.0 - IT and Automotive Sector in India". Research conducted by the Dialogue in collaboration with the Friedrich-Ebert-Stiftung (FES) were being presented. &lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;At CIS, we have previously produced research on the future of work in these sectors. Aayush attended the event to understand how other researchers are approaching the subject of the future of work in terms of the methodological approach and the questions being asked and policy responses being proposed. In what may be treated as validation of our research design, FES and the Dialogue have addressed similar questions and adopted an empirical+desk based approach to do so as well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes'&gt;https://cis-india.org/internet-governance/news/impact-of-industrial-revolution-4-0-it-and-automotive-sector-in-india-by-the-dialogue-and-fes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Industry 4.0</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2019-08-27T00:13:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-politics-november-29-2012-surabhi-agarwal-govt-tweaks-enforcement-of-it-act-after-spate-of-arrests">
    <title>Govt tweaks enforcement of IT Act after spate of arrests</title>
    <link>https://cis-india.org/news/livemint-politics-november-29-2012-surabhi-agarwal-govt-tweaks-enforcement-of-it-act-after-spate-of-arrests</link>
    <description>
        &lt;b&gt;The government on Thursday tweaked the law to make it tougher for citizens to be arrested for online comments that are deemed offensive after recent arrests came in for heavy criticism by Internet activists, the media and other groups.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Surabhi Agarwal's article was &lt;a class="external-link" href="http://www.livemint.com/Politics/hJLTj0OG2oXS1W64jE20bL/Govt-tries-to-tighten-application-of-cyber-law.html"&gt;published in LiveMint&lt;/a&gt; on November 29, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This took place just before the Supreme Court was to hear a public interest litigation seeking an amendment to the Information Technology (IT) Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Complaints under the controversial Section 66A of the IT Act, which criminalizes “causing annoyance or inconvenience” online or electronically, can be registered only with the permission of an officer of or above the rank of deputy commissioner of police, and inspector general in metro cities, said a senior government official.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government, however, has not amended the terms in the section that are said to be vague and subject to interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The public interest litigation against Section 66A filed by student Shreya Singhal came up in chief justice &lt;a href="http://www.livemint.com/Search/Link/Keyword/Altamas%20Kabir"&gt;Altamas Kabir&lt;/a&gt;’s court on Thursday. The matter will be heard on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two girls near Mumbai were arrested last week for criticizing on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt; the shutdown in the city for Shiv Sena chief &lt;a href="http://www.livemint.com/Search/Link/Keyword/Bal%20Thackeray"&gt;Bal Thackeray&lt;/a&gt;’s funeral. Earlier in November, a businessman in Puducherry was arrested for comments made on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt; against finance minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/P.%20Chidambaram"&gt;P. Chidambaram&lt;/a&gt;’s son &lt;a href="http://www.livemint.com/Search/Link/Keyword/Karti%20Chidambaram"&gt;Karti Chidambaram&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to people present at the meeting of the cyber regulatory advisory committee on Thursday, the Union government will issue guidelines to states with respect to the compliance of the new enforcement rules soon. The people didn’t want to be named. An official said the move was not related to the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Pranesh%20Prakash"&gt;Pranesh Prakash&lt;/a&gt;, policy director at the Centre for Internet and Society think tank, said that while the change in the law is a step in the right direction and will eliminate a lot of frivolous complaints, more needs to be done to make the legislation specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief justice Kabir said the apex court was considering taking suo motu cognisance of recent incidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singhal contended in her plea that “the phraseology of section 66A of the IT Act, 2000, is so wide and vague and incapable of being judged on objective standards, that it is susceptible to wanton abuse and, hence, falls foul of Article 14, 19 (1)(a) and Article 21 of the Constitution.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She submitted that “unless there is judicial sanction as a prerequisite to the setting into motion the criminal law with respect to freedom of speech and expression, the law as it stands is highly susceptible to abuse and for muzzling free speech in the country.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PIL was argued by Mukul Rohatgi, who said in his opening remarks that Section 66A was vague. Terms such as “offensive” and “annoyance” should be clearly defined as the section is part of criminal law, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Harish Salve, who was also present during the hearing, said India guaranteed the right to “annoy” and there was no need to have a separate law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Salve, who is in the process of filing an intervention on behalf of some technology companies, added that the section needed to be narrowed to specifically cater to private messages sent electronically and not social media communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He said the existing law of defamation should suffice and could be extended to include electronic communications. According to a lawyer who is part of the team representing Singhal, the petition also demanded that the law be made non-cognisable so that the police can’t make an arrest without an order from a magistrate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There has been a lot of misuse and abuse of the law recently and we want it to be struck down absolutely and also the court to issue guidelines,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the incident at Palghar in Thane district involving the two girls, Singhal’s PIL referred to an April incident in which a professor of chemistry from Jadavpur University in West Bengal, &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ambikesh%20Mahapatra"&gt;Ambikesh Mahapatra&lt;/a&gt;, was arrested for posting a cartoon concerning chief minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/Mamata%20Banerjee"&gt;Mamata Banerjee&lt;/a&gt; on a social networking site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She also referred to the Puducherry case as well as the May arrests of two &lt;a href="http://www.livemint.com/Search/Link/Keyword/Air%20India"&gt;Air India&lt;/a&gt; Ltd employees, &lt;a href="http://www.livemint.com/Search/Link/Keyword/V.%20Jaganatharao"&gt;V. Jaganatharao&lt;/a&gt; and &lt;a href="http://www.livemint.com/Search/Link/Keyword/Mayank%20Sharma"&gt;Mayank Sharma&lt;/a&gt;, by the Mumbai Police under the IT Act for posting content on Facebook and &lt;a href="http://www.livemint.com/Search/Link/Keyword/Orkut"&gt;Orkut&lt;/a&gt; against a trade union leader and some politicians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singhal has sought guidelines from the apex court to “reconcile Section 41 and 156 (1) of the Criminal Procedure Code (CPC) with Article 19 (1)(a) of the Constitution” and that offences under the Indian Penal Code and any other legislation, if they involve the freedom of speech and expression, be treated as a non-cognizable offences for the purposes of Sections 41 and 156 (1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 41 of CPC empowers the police to arrest any person without an order from a magistrate and without a warrant in the event that the offence involved is a cognizable offence. Section 156 (1) empowers the investigation by the police into a cognizable offence without an order from a magistrate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government official present at the cyber regulatory advisory committee said the expressions used in Section 66A had been taken from different statutes around the world, including the UK and the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There has been a broad consensus that the parameters of the law concerned might be in order but from a procedural standpoint there might be difficulty,” the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash said that while some of the terms in the section may be taken from legislation overseas, the penalty imposed under the Indian law is far more stringent at three years of imprisonment than, for instance, six months under the UK law. “Criminal offences can’t be put at the same level as something which causes insult.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cyber regulatory advisory committee meeting was attended by minister for communications and information technolgy Kapil Sibal, and secretaries of the department of telecommunications and information technology, besides representatives of technology companies such as Google and Facebook, industry associations and civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The official also said that the situation will be reviewed every three to four months based on “ground realities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A government official said on condition of anonymity that the decision to revive the cyber regulatory advisory committee had been taken at a meeting in August. Section 66A was put on the agenda since it was the subject of much debate, he said. The meeting, however, was not a pre-emptive measure ahead of the PIL that was taken up in the Supreme Court. The official also said that the government will spell out its position in court in favour of the legislation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-politics-november-29-2012-surabhi-agarwal-govt-tweaks-enforcement-of-it-act-after-spate-of-arrests'&gt;https://cis-india.org/news/livemint-politics-november-29-2012-surabhi-agarwal-govt-tweaks-enforcement-of-it-act-after-spate-of-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T08:27:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws">
    <title>GNI and IAMAI Launch Interactive Slideshow Exploring Impact of India's Internet Laws </title>
    <link>https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws</link>
    <description>
        &lt;b&gt;The Global Network Initiative and the Internet and Mobile Association of India have come together to explain how India’s Internet and technology laws impact economic innovation and freedom of expression. &lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.globalnetworkinitiative.org/"&gt;Global Network Initiative (GNI)&lt;/a&gt;, and the &lt;a class="external-link" href="http://www.iamai.in/"&gt;Internet and Mobile Association of India (IAMAI)&lt;/a&gt; have launched an interactive slide show exploring the impact of existing Internet laws on users and businesses in India. The slide show created by Newsbound, and to which Centre for Internet and Society (CIS) has contributed its comments—explain the existing legislative mechanisms prevalent in India, map the challenges of the regulatory environment and highlight areas where such mechanisms can be strengthened.&lt;/p&gt;
&lt;p&gt;Foregrounding the difficulties of content regulation, the slides are aimed at informing users and the public of the constraints of current legal mechanisms in place, including safe harbour and take down and notice provisions. Highlighting Section 79(3) and the Intermediary Liability Rules issued in 2011, the slide show identifies some of the challenges faced by Internet platforms, such as the broad interpretation of the legislation by the executive branch.&lt;/p&gt;
&lt;p&gt;Challenges governing Internet platforms highlighted in the slide show include uniform Terms of Service that do not consider the type of service being provided by the platform, uncertain requirements for taking down content and compliance obligations related to information disclosure. Further the issues of over compliance and misuse of the legal notice and take down system introduced under Section 79 of the Information Technology (Intermediaries Guidelines) Rules 2011.&lt;/p&gt;
&lt;p&gt;The Rules were created with the purpose of providing guidelines for the ‘post-publication redressal mechanism expression as envisioned in the Constitution of India'. However, since their introduction, the Rules have been criticised extensively, by both the national and the international media on account of not conforming to principles of natural justice and freedom of expression. Critics have pointed out that by not recognising the different functions performed by the different intermediaries and by not providing safeguards against misuse of such mechanism for suppressing legitimate expression, the Rules have a chilling effect on freedom of expression.&lt;/p&gt;
&lt;p&gt;Under the current Rules, the third party provider/creator of information is not given a chance to be heard by the intermediary, nor is there a requirement to give a reasoned decision by the intermediary to the creator whose content has been taken down. The take down procedure also, does not have any provisions for restoring the removed information, such as providing a counter notice filing mechanism or appealing to a higher authority.  Further, the content criteria for removal of content includes terms like 'disparaging' and 'objectionable', which are not defined and prima facie seem to be beyond the reasonable restrictions envisioned by the Constitution of India. With uncertainty in content criteria and no safeguards to prevent abuse complainant may send frivolous complaints and suppress legitimate expressions without any fear of repercussions.&lt;/p&gt;
&lt;p&gt;Most importantly, the redressal mechanism under the Rules shifts the burden of censorship, previously, the exclusive domain of the judiciary or the executive, and makes it the responsibility of private intermediaries. Often, private intermediaries, do not have sufficient legal resources to subjectively determine the legitimacy of a legal claim, resulting in over compliance to limit liability. The slide show cites  the &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt;2011 CIS research carried out by Rishabh Dara&lt;/a&gt; to determine whether the Rules lead to a chilling effect on online free expression, towards highlighting the issue of over compliance and self censorship.&lt;/p&gt;
&lt;p&gt;The initiative is timely, given the change of guard in India, and stresses, not only the economic impact of fixing the Internet legal framework, but also the larger impact on users rights and freedom of expression. The initiative calls for a legal environment for the Internet that enables innovation, protects the rights of users, and provides clear rules and regulations for businesses large and small.&lt;/p&gt;
&lt;p&gt;See the slideshow here: &lt;a href="http://globalnetworkinitiative.org/india"&gt;How India’s Internet Laws Can Help Propel the Country Forward&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Other GNI reports and resources: &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;Closing the Gap: Indian Online Intermediaries and a Liability System Not Yet Fit for Purpose&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/Closing%20the%20Gap%20-%20Copenhagen%20Economics_March%202014_0.pdf"&gt;Strengthening Protections for Online Platforms Could Add Billions to India’s GDP&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws'&gt;https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2014-07-17T12:01:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india">
    <title>Future of Work: Report of the ‘Workshop on the IT/IT-eS Sector and the Future of Work in India’</title>
    <link>https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india</link>
    <description>
        &lt;b&gt;This report provides an overview of the proceedings and outcomes of the Workshop on the IT/IT-eS Sector and the Future of Work in India (hereinafter referred to as the “Workshop”), organised at Omidyar Networks’ office in Bangalore, on June 29, 2018.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This report was authored by Torsha Sarkar, Ambika Tandon and Aayush Rath. It was edited by Elonnai Hickok. Akash Sriram, Divya Kushwaha and Torsha Sarkar provided transcription and research assistance. A PDF of the report can be accessed &lt;a href="https://cis-india.org/internet-governance/pdf-it-sector-workshop" class="internal-link" title="PDF IT Sector Workshop"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Workshop was attended by a diverse group of stakeholders which included industry representatives, academicians and researchers, and civil society. The discussions went over various components of the transition in the sector to Industry 4.0, including the impact of Industry 4.0-related technological innovations on work broadly in India, and specifically in the IT/IT-eS sector (hereinafter referred to as the “&lt;strong&gt;Sector&lt;/strong&gt;”). The discussion focused on the reciprocal impact on socio-political dimensions, the structure of employment, and forms of work within workspaces. &lt;br /&gt; &lt;br /&gt; The Workshop was divided into three sessions. The first session was themed around the adoption and impact of Industry 4.0 technologies vis-a-vis the organisation of work. Within this the key questions were: the nature of the technologies being adopted, the causes that are driving the uptake of these technologies, and the ‘tasks’ constituting jobs in the Sector. &lt;br /&gt; &lt;br /&gt; The second session focussed on the role of skilling and re-skilling measures as mitigators to projected displacement of jobs. The issues dealt with included shifts in&amp;nbsp; company, educational, and social competency profiles as a result of Industry 4.0, transformations in the predominant pedagogy of education, vocational, and skill development programmes in India, and their success in creating employable workers and filling skill gaps in the industry. &lt;br /&gt; &lt;br /&gt; The third session looked at social welfare considerations and public policy interventions that may be necessitated in the wake of potential technological unemployment owing to Industry 4.0. The session was designed with a specific focus on the axes of gender and class, addressing questions of precarity, wages, and job security in the future of work for marginalized groups in the workforce.&lt;/p&gt;
&lt;h3&gt;Preliminary Comments&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Workshop opened with a brief introduction on the research the Centre for Internet and Society (CIS) is undertaking on the Future of Work (hereinafter referred to as “&lt;strong&gt;FoW&lt;/strong&gt;”) vis-a-vis Industry 4.0. &amp;nbsp;The conception of Industry 4.0 that CIS is looking at is the technical integration of cyber-physical systems in production and logistics on one hand, and the use of internet of things (IoT) and the connection between everyday objects and services in the industrial processes on the other. The scope of the project, including the impact of automation on the organisation of employment and shifts in the nature and forms of work, including through the gig economy, and microwork, was detailed. The historical lens taken by the project, and the specific focus on questions of inequality across gender, class, language, and skill were highlighted.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was pointed out that CIS’ research, in this regard, comes from the necessity of localising and re-examining the global narratives around Industry 4.0. While new technologies will be developed and implemented globally, the impact of these technologies in the Indian context would be mediated through local, political and socio-economic structures. For instance, the Third Industrial Revolution, largely associated with the massification of computing, telecommunications and electronics, is still unfolding in India, while attempts are already being made to adapt to Industry 4.0. These issues provided a starting point to the discussion on the impact of Industry 4.0 in India.&lt;/p&gt;
&lt;h3&gt;Qualifying Technological Change&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Contexualising the narrative with historical perspectives&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The panel for the first session commenced with a discussion around a historical perspective on job loss being brought about due to mechanisation. The distinction between Industry 3.0 and 4.0, it was suggested, was largely arbitrary, inasmuch as technological innovation has been a continuous process and has been impacting lives and the way work is perceived. It was argued that the only factor differentiating Industry 4.0 from previous industrial revolutions is ‘intelligent’ technology that is automating routine cognitive tasks. The computer, programmatic logic control (PLC) and data (called the ‘new oil’) were also a part of Industry 3.0, but intelligent technologies are able to provide greater analytical power under Industry 4.0.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The discussion also went over the distinction between the terms ‘job’, ‘task’ and ‘work’. It was argued that the term ‘job’ might be treated as a subset of the term ‘work’, with the latter moving beyond livelihood to encompass questions of dignity and a sense of fulfilment in the worker. With relation to this distinction, it was mentioned that the jobs at the risk of automation would be those that fulfill only the basic level in Maslow’s hierarchy - implying largely routine manual tasks. Additionally, it was explained that although these jobs will continue to use labour through Industry 4.0, it is only the nature of technological enablement that would change to automate more dangerous and hazardous tasks.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Technology as a long-term enabler of job creation&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was argued that technology has historically been associated with job creation. Historical instances cited included that of popular anxiety due to anticipated job loss through the uptake of the spinning machine and the steam engine, whereas the actual reduction in the cost of production led to greater job creation, increased mobility and improved quality of life in the long-term. Such instances were used to further argue that technology has historically not resulted in long-term job reductions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The platform economy was posited as a model for creating jobs, through the efficient matching of supply and demand through digital platforms. It was indicated that rural to urban migration is aided by such platforms, as labourers voluntarily enrol in skilling initiatives given the certainty of employment through platformization. It was further argued that historically, Indian workers have been educated rather than skilled, and that platformization and automation, coupled with the elasticity of human needs, will provide greater incentives for technically skilled workers by creating desirable jobs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Factors leading to differential adoption of automation&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In relation to the adoption of the technologies Industry 4.0, it was argued that the mere existence of a technology does not necessitate its scalablity at an industrial level. Scalability would be possible only when the cost of labour is high relative to the costs entailed in technological adoption. This was supported by data from a McKinsey Report&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which indicated that countries like the US and Germany would be impacted in the short term by automation, because their cost of labour is higher. Conversely, since the cost of labour in India is relatively cheap, the reality of technological displacement is still far away and the impact would not be immediate.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, a distinction was also made to account for the differential impact of automation in various sectors. For instance, it was indicated that since the IT/IT-eS sector in India is based on exporting services and outsourcing of businesses. Accordingly, if Germany automates its automobile industry, that would impact India less than if it automates the IT/IT-eS sector, as the latter is more reliant on exporting its services to developed economies. The IT/IT-eS sector was further broken down into sub-sectors with the intention of highlighting the differential impact of automation and FoW in each of these sub-sectors. It was agreed that the BPO sub-sector would be more adversely impacted than core IT services, given its constitution of routine nature of tasks at a higher risk of automation.&lt;/p&gt;
&lt;h3&gt;Disaggregating India’s Skilling Approach&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The discussion around skilling measures was contextualised in the Indian context by alluding to data collected from the National Sample Survey Organisation (NSSO) surveys. The data revealed that around 36% of India’s total population is under the age of seventeen and approximately 13% are between 18 - 24. Additional statistics suggested that only around a quarter of the workforce aged 18-24 years had achieved secondary and higher secondary education and close to 13% of the workforce was illiterate. While these numbers included both male and female workers, it was pointed out that it was an incomplete dataset as it excluded transgender workers. It was suggested it should be this segment of the Indian demographic that is targeted for significant skilling pushes, which could be catalysed through specific vocational training centres. It was&amp;nbsp; also suggested that there was a need for to restructure the role of the National Skill Development Corporation (NSDC) in the Indian skilling framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A comprehensive picture was painted by conceptualising the skilling framework in India as 5 distinct pillars. This conceptualisation was used to debunk the narrative around NSDC being the sole entity pushing for skill development in the country. The NSDC’s function in the skilling framework was posited as providing funding to skilling initiatives with programmes lasting for a period of 3 months. These 3- month programmes were critiqued for being insufficient for effective training, especially given the low skill levels of workers going into the programmes. The NSDC’s placement rate of 12% as per their own records was used to support this argument. Further suggestions on making the NSDC more effective were made in a later discussion&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Related to this, the second pillar of vocational skilling was said to be the Industrial Training Institute (ITI). The third pillar was said to be the school system which was critiqued for does not offering vocational education at secondary and senior secondary levels. The fourth pillar comprised of the 16 ministries which governed the labour laws in India - none of whose courses were National Skills Qualifications Framework (NSQF) compliant.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The fifth pillar was construed as&amp;nbsp; the industry itself and the enterprise-based training it conducted. However, it was stated that India’s share of registered companies who did enterprise-based training was dismal. In 2009, the share of enterprise-based training was 16% which rose in 2014 to 36%. Further, most of these 36% were registered large firms as opposed to small and medium sized enterprises. Unregistered companies, it was suggested, were simply doing informal apprenticeships.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Joint public and private skilling initiatives &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In addition to government sponsored skilling initiatives, attention was directed to skill development partnerships that took the shape of public-private initiatives. As an example, it was said that that a big player in the ride-hailing economy had worked with NSDC and other skilling entities to ensure that soft skills were being imparted to their driver partners before they were on-boarded onto the platform.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was also brought forth that innovative forms of skilling and training were gaining traction in the education sector as well in the private sector. This was instantiated through instances of uptake of platforms which apply artificial intelligence, and within that machine learning based techniques, to generate and disseminate easier- to- consume video-based learning.&lt;/p&gt;
&lt;h3&gt;Driving Job Growth: Solving for Structural Eccentricities of the Indian Labour Market&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Catalysing manufacturing-led job growth&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The discussion began by discussing specific dynamics of the Indian labour markets in the context of the Indian economy. It was pointed out the productivity level of the services sector is not as high as the productivity level of manufacturing, which is problematic for job creation in a developing economy such as India witnessing capital-intensive growth in the manufacturing sector. The underlying argument was that the jobs of the future in the Indian context will have to be created in the manufacturing sector.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Several macroeconomic policy interventions were suggested to reverse the trend of capital-intensive growth in order to make manufacturing the frontier for enhanced job creation. The need for a trade policy in consonance with the industrial policy was stated as imperative. This was substantiated by highlighting the lack of an inverted duty structure governing the automobile sector that has led India to be amongst the biggest manufacturers of automobiles. The inverted duty structure entails finished products having a lower import tariff and a lower customs duty when compared to import of raw materials or intermediates. However, it was highlighted that a dissonant industrial policy failed to acknowledge that at least 50% of india’s manufacturing comes from Micro, Small &amp;amp; Medium Enterprises (MSMEs) and provided no assistance to MSMEs in obtaining credit, market access or technology upgradation. On the other hand, it was asserted that large corporates get 77% of the total bank credit.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another challenge that was highlighted was with the Government of India’s severely underfunded manufacturing cluster development programs under the aegis of the Ministry of Textiles and the Ministry of MSMEs. For sectors that contribute majorly towards India’s manufacturing output, it was asserted that these programmes were astonishingly bereft of any governing policy and suffer from several foundational issues. Moreover, it was observed that these clusters are located around the country in Tier 2, 3 and 4 cities where the quality of infrastructure is largely lacking. The Atal Mission for Rejuvenation and Urban Transformation (AMRUT) program devised for the development of these cities is also myopic as the the target cities are not the ones where these manufacturing clusters are located. The rationale behind such an approach was that building infrastructure at geographical sites of job creation would lead to an increase in productivity which would in turn attract greater investment.&amp;nbsp; This would have to necessarily be accompanied by hastening the setting up of industrial corridors - the lackadaisical approach to which was stated as a key component of India being outpaced by other developing economies in the South East Asian region.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;An additional policy intervention that was suggested was from the lens of setting up of skilling centres by NSDC in proximity to these manufacturing clusters where the job creation is being evidenced as opposed to larger metropolitan cities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Carving out space for a vocational training paradigm&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was asserted that the focus of skilling needs to be on the manufacturing rather than services sector, given the centrality of manufacturing to a developing economy undergoing an atypical structural transformation&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - as outlined above. Further compounding the problem of jobless growth, it was stated that 50% of the manufacturing workforce have 8 or less years of education and only 5% of the workforce including those that have technical education are vocationally trained, according to the NSS, 62nd Round on Employment and Unemployment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A gulf in primary and secondary education vis-a-vis vocational training was pointed as one of the most predominant causes behind the much touted ‘skills gap’ that the Indian workforce is said to be battling with. Using data to further cull out the argument, it was said that in 2007, the net enrollment in India for primary education had already reached 97% and that between 2010 - 2015, the secondary education enrollment rate went from 58% to 85%.&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It was hypothesised that the latter may have risen to 90% levels since. Furthermore, the higher education enrollment rate also commensurately went up from 11% in 2006 to 26-27% in 2017.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It was argued that this is impossible to achieve without gender parity in higher education. This gender parity in education was contrasted with the systematic decline in the women’s labour force participation that India has been witnessing in the last 30 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Consequently, the ‘massification’ of higher education in India over the past 10 years was critiqued as ineffectual in comparison to the Chinese model, as the latter focused on engaging students in vocational training, which the Indian education system had failed to do. The role of the gig economy in creating job opportunities despite this gap between educational and vocational training was regarded as important, especially given the lack of growth in the traditional job markets.&lt;/p&gt;
&lt;h3&gt;Accounting for the Margins&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;With relation to the profiles of workers within sectors, it was indicated that factors such as gender, class, skill, income, and race must be accounted for to determine the ‘winners’ and ‘losers’ of automation. Several points were discussed with relation to this disaggregation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Technology as an equaliser? Gender and skill-biased technological change&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;First, the idea of&amp;nbsp; technology and development as objective and neutral forces was questioned, with the assertion that human decision-makers, who more often than not tend to be male, allow inherent biases to creep into outputs, processes, and objectives of automation. Data from the Belong Survey in IT services&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; indicated that the proportion of women in core engineering was 26% of the workforce, while that in software testing was 33%. Coupled with the knowledge that automation and technology would automate software testing first, it was argued that jobs held by female workers were positioned at a higher immediate risk of automation than male workers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ‘Leaky Pipe Problem’ in STEM industries i.e. the observation that female workers tend to be concentrated in entry level jobs, while senior management is largely male dominated was also brought to the fore. This was used to bolster the argument that female workers in the Sector will lose out in the shorter term, when automation adversely impacts the lower level jobs.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A survey conducted by Aspiring Minds&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which tracked the employability of the engineering graduates was utilised to further flesh out skill biased technological change. As per the survey, 40% of the graduating students are employable in the BPO sector, while only 3% of the students are employable in the sector for software production. With the BPO sector likelier to be impacted more adversely than core IT services, it was emphasised that policy considerations should be very specific in their ambit.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social security and the platform economy&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The discussion around the platform economy commenced with a focus on how it had created economic opportunities in the formal sector by matching demand and supply on one hand, and by reducing inefficiency in the system through technology on the other. It was pointed out that these newer forms of work were creating millions of entrepreneurship opportunities that did not exist previously. These opportunities, it was suggested, were in themselves flexible and contributing the greater push towards enhancing the numbers of those that come within the ambit of India’s formal economy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This discussion was countered by suggesting that the shift of the workforce from the informal sector to the formal sector, which companies in the gig economy claimed they contributed to, have instead restricted the kind of lives gig workers have been living historically. As an instance, it was pointed out that a farmer who had been working with a completely different set of skills was now being asked to shift to a new set of skills which would be suited for a very specific role and not transposable across occupations. In other words, it would not be meaningful skilling. It was also pointed out that what distinguishes formal work from informal is whether the worker has social security net or not - mere access to banking services or filing of tax returns was not sufficient for characterising a workforce as being formal in nature.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Relatedly, the possibility of social security was discussed for the unorganised sector and microworkers. One of the possibilities discussed was to ensure state subsidised maternity, disability, and death security, and pensions for workers below the poverty line. The fiscal brunt borne by the government for such a scheme was anticipated to not be above 0.4% of the GDP. It was suggested that this would move forward the conversation on minimum wage and fair work, which would be of great importance in broader conversations around working conditions in the platform economy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt; &lt;/em&gt;The interplay of gender and platformisation&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was highlighted that trends in automation are going to change the occupational structure in the digital economy - the effect of which will especially be felt in cognitive routine jobs given their increased propensity to platformisation. A World Economic Forum report&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; was cited which indicated the disproportional risk of unemployment faced by women given their concentration in cognitive routine jobs was also brought up.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The discussion logically undertook a deeper look at the platformisation of work with a specific focus on freelance microwork and its impact on the female labour force and culled out certain positive mandates arising from such newer forms of work. It was suggested that industries are more likely to employ female workers in microwork due to lower rates of attrition, and flexible labour. It was reiterated that freelancing in India extends beyond data entry and other routine jobs, to include complex work - thereby also catering to skilled workers desirous of flexibility. Platforms designing systems to meet the demand for flexible work were also discussed, such as platforms geared towards female workers undertaking reskilling measures and counselling for females returning from maternity leave or sabbaticals. Additionally, the difficulty of defining freelancing under existing frameworks of employment, compounded by the lack of legal structures for such work, was outlined.&lt;/p&gt;
&lt;h3&gt;Systemic challenges within the Indian labour law framework&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Static design of legal processes&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Labour law was, naturally, acknowledged as a key determinant in the conversation around both the uptake and impact of automative technologies encapsulated within Industry 4.0.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The archaic nature of India’s labour law framework was highlighted as a major impediment to ensuring both worker rights as well as the ease of conducting commerce. It was pointed out that organised labour continues to be under the ambit of the Industrial Disputes Act, which was made effective in 1947, has undergone minimal amendments since. This was critiqued on the basis that the framework for the law is embedded in its historical context, and while the industrial landscape in the country has transformed drastically since the implementation of the Industrial Disputes&amp;nbsp; Act, the legal framework has not evolved.&amp;nbsp; Similarly, the Karnataka Shops and Establishments Act, 1961 which regulates the Sector today was enacted much before the Sector even opened up in India in the 1990s.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Additionally, it was pointed out that the consolidation of the fragmented extant framework of labour laws in India was being consolidated into 4 labour codes without any wholesale modernisation push reforming the laws being consolidated. Consequently, it was argued that the government has to drive changes through policies alone as the legal framework remains static. Barriers to implementation of adequate policies were also discussed, such as the political impact of labour policies, lack of state initiative to deal with the impact of the future of work, apart from the historic inability of the law to keep up with the state of labour and economy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Labour law arbitrage &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the reasons behind the increasing contractualizing of labour in India was attributed to over-regulation. There was consensus that the labour law regime was not conducive to industry in India leading to greater opportunistic behaviours from industry participants. It was acknowledged that the political clout that a lot of contractors (of labourers) enjoy along with providing primary employers greater flexibility to hire and fire employees at will has led to a widespread utilisation of contract labour entities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It was further stated that industry behaviour has adopted several other tools of arbitrage to not consider labour law as a key impediment in the ease of scaling business. Empirical evidence of labour law arbitrage was cited to drive home the point - according to national surveys, 80-85% of enterprises employ less than 99 workers as the law mandates stricter compliance requirements for enterprises employing 100 or more workers&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. This was acknowledged a serious hurdle to scaling businesses.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Problems behind other apparently well-intentioned legislation from a public policy lens having counterproductive consequences was also highlighted. In the space of labour laws, the example of the recently enacted Maternity Benefit (Amendment) Act, 2017 was cited. By enhancing maternity benefits, without accounting for other provisioning such as a paternity benefit inclusion, it was anticipated that companies may entirely shy away from hiring women.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Policy Paralysis&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The discussion progressed towards a high-level discussion around the efficacy of law vis-a-vis state policy as a means to create a system of checks and balances in the context of Industry 4.0. It was highlighted that law, by design, would be outpaced by technological change. The common law system of law operating in India is premised on a time-tested emphasis on post-facto regulation. In other words, it is reactionary. While policy making in India suffers from a similar plague of playing catch-up, it is in large part due to a bureaucratic structure premised on generalism - a pressing need for domain expertise in policy making was emphasised upon. Having said that, it was stated that it is the institutional design of policy making institutions that needs rectification. What was acknowledged was the success, albeit scant, that individual states have had in policy making catering to specific yet diverse domains. A greater push towards clear and progressive evidence-based policy pushes was stressed upon with the anticipation that it would lead to self-regulation by the industry itself - be it in terms of the future of employment or of the economic direction that the industry will embark on.&lt;/p&gt;
&lt;h3&gt;Concluding Remarks&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The discussions during the course of the Workshop situated the discourse around Industry 4.0 within the contours of the Indian labour realities and the IT sector within that.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As a useful starting point, various broader perspectives around the impact of technological change on the quantum of jobs were brought forth. While the industry perspective was that of technology as an enabler of job creation in the long-run, it was sufficiently tempered by concerns around those impacted adversely in the short to medium-term time frames. These concerns coalesced towards understanding the potential impact of Industry 4.0 on the nature of work, as well as mitigation tools to ease the impact of technological disruption on labour.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Important facets of technological adoption within the Sector were highlighted, such as potential for scalability as well as the distinct eccentricities of the various sub-sectors the IT sector subsumed. The differential impact within the various sub-sectors was pegged to the differential composition of automatable tasks (routine, rule-based) within each sub-sector. However, questions regarding the exact contours of task composition were left unanswered signalling a potential area for further research. On the other hand, the primary challenge to technological adoption faced from the labour-supply side was skilling, or the lack thereof. This was contextualised in the larger scheme of structural issues plaguing the skilling machinery operating in the country, which lead to inadequate dispensation of technical and vocational education and training (TVET). In terms of additional structural issues that would potentially have an impact on how Industry 4.0 plays out in the Indian context, attention was directed towards overdue reform of the labour law framework which has already struggled with incorporating newer forms of working engagements such as platform and gig work, that are being evidenced as a part of Industry 4.0.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;An underlying theme that found mention across sessions was the need to devote attention to prevent further marginalisation as a consequence of technological disruption of the already marginalised. Evidence from government datasets as well as from literature around concepts such as skill biased technological change, the leaky pipe problem, and the U-shaped curve of female labour force participation were cited to explicate these issues. The merits of different policy measures to address these concerns, such as social security, living wages, and maternity benefits were also discussed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While the Workshop touched upon several facets of the discourse around Industry 4.0 in the Sector, it also sprung up areas that require further inquiry. Questions around where in the value chain use-cases for Industry 4.0 technologies were emerging needed a more comprehensive understanding. Moreover, the impact of Sector Skill Councils (SSCs), a central aspect of the skilling ecosystem in India, wasn’t touched upon. An additional path of inquiry that emerged pertained to evolving constructive reforms to legal and economic policy frameworks as top-down interventions within the Sector that could be anticipated to play a significant role in the uptake and impact of Industry 4.0 technologies.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; McKinsey Global Institute, &lt;em&gt;A future that works: Automation, employment, and productivity&lt;/em&gt;, https://www.mckinsey.com/~/media/mckinsey/featured%20insights/Digital%20Disruption/Harnessing%20automation%20for%20a%20future%20that%20works/MGI-A-future-that-works-Executive-summary.ashx, (accessed 10 August 2018).&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See discussion under ‘Catalysing manufacturing-led job growth‘.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; R. Verma, Structural Transformation and Jobless Growth in the Indian Economy, &lt;em&gt;The Oxford Handbook of the Indian Economy&lt;/em&gt;, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; S. Mehrotra, ‘The Indian Labour Market: A Fallacy, Two Looming Crises and a Tragedy’, &lt;em&gt;CSE Working Paper&lt;/em&gt;, April 2018.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; ibid.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mohita Nagpal, ‘Women in tech: There are 3 times more male engineers to females’, &lt;em&gt;belong.co&lt;/em&gt;, http://blog.belong.co/gender-diversity-indian-tech-companies, (accessed 10 August 2018).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aspiring Minds, &lt;em&gt;National Programming Skills Report - Engineers 2017&lt;/em&gt;, &lt;a href="https://www.aspiringminds.com/sites/default/files/National%20Programming%20Skills%20Report%20-%20Engineers%202017%20-%20Report%20Brief.pdf"&gt;https://www.aspiringminds.com/sites/default/files/National%20Programming%20Skills%20Report%20-%20Engineers%202017%20-%20Report%20Brief.pdf&lt;/a&gt;, (accessed 11 August 2018).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; World Economic Forum, &lt;em&gt;The Future of Jobs Employment, Skills and Workforce Strategy for the Fourth Industrial Revolution: Global Challenge Insight Report&lt;/em&gt;, January 2016.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ministry of Statistics and Programme Implementation, &lt;em&gt;All India Report of Sixth Economic Census&lt;/em&gt;, Government of India, 2014.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india'&gt;https://cis-india.org/internet-governance/blog/future-of-work-report-of-the-workshop-on-the-it-it-es-sector-and-the-future-of-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2020-03-05T19:03:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean">
    <title>Future of Work in the ASEAN</title>
    <link>https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean</link>
    <description>
        &lt;b&gt;A literature review of the future of work in automotive manufacturing and IT services in the ASEAN region, authored by Aayush Rathi, Vedika Pareek, Divij Joshi, and Pranav M B.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Read the research paper: &lt;a href="https://cis-india.org/internet-governance/pdf-asean-literature-review" class="internal-link" title="PDF ASEAN Literature Review"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;p&gt;Authored by Aayush Rathi, Vedika Pareek, Divij Joshi, and Pranav Bidare&lt;/p&gt;
&lt;p&gt;Research assistance by Sankalp Srivastava and Anjanaa Aravindan&lt;/p&gt;
&lt;p&gt;Edited by Elonnai Hickok and Ambika Tandon&lt;/p&gt;
&lt;p&gt;Supported by Tides Foundation&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The world of work, and its future, have attracted a lot of attention in recent times. The discussion has been provoked by the confluence of recent technological breakthroughs that portend to have wide-ranging implications on work and livelihoods. In what has been termed the “Fourth Industrial Revolution” or “Industry 4.0” , the discussion has engaged numerous stakeholders. However, no shared understanding of what this future of work will look like has materialised. Historical scholarship around technological change and its impact on the labour market was focussed in the context of high-income countries. Contemporaneously, however, research is being produced that outlines the possible futures of work in low and middle-income contexts. It is exigent to generate scholarship dedicated to low and middle-income contexts given that in addition to technological drivers, the future of work will be mediated through region and country specific factors such as socioeconomic,geopolitical and demographic change.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean'&gt;https://cis-india.org/internet-governance/blog/future-of-work-in-the-asean&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aayush</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Future of Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Automotive Manufacturing</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2020-03-05T19:22:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act">
    <title>Fixing India’s anarchic IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act</link>
    <description>
        &lt;b&gt;Section 66A of the Information Technology (IT) Act criminalizes “causing annoyance or inconvenience” online, among other things. A conviction for such an offence can attract a prison sentence of as many as three years. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's article was &lt;a class="external-link" href="http://www.livemint.com/Opinion/ji3XbzFoLYMnGQprNJvpQL/Fixing-Indias-anarchic-IT-Act.html"&gt;published in LiveMint&lt;/a&gt; on November 28, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;How could the ministry of communications and information technology draft such a loosely-worded provision that’s clearly unconstitutional? How could the ministry of law allow such shoddy drafting with such disproportionate penalties to pass through? Were any senior governmental legal officers—such as the attorney general—consulted? If so, what advice did they tender, and did they consider this restriction “reasonable”? These are some of the questions that arise, and they raise issues both of substance and of process. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;When the intermediary guidelines rules were passed last year, the government did not hold consultations in anything but name. Industry and non-governmental organizations (NGOs) sent in submissions warning against the rules, as can be seen from the submissions we retrieved under the Right to Information Act and posted on our website. However, almost none of our concerns, including the legality of the rules, were paid heed to. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, parliamentarians employed a little-used power to challenge the law passed by the government, leading communications minister Kapil Sibal to state that he would call a meeting with “all stakeholders”, and will revise the rules based on inputs. A meeting was called in August, where only select industry bodies and members of Parliament were present, and from which a promise emerged of larger public consultations. That promise hasn’t been fulfilled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, there is much that is rotten in the IT Act and the various rules passed under it, and a few illustrations—a longer analysis of which is available on the Centre for Internet and Society (CIS) website—should suffice to indicate the extent of the malaise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the secondary legislation (rules) cannot be passed under the section of the IT Act they claim as their authority. The intermediary guidelines violate all semblance of due process by not even requiring that a person whose content is removed is told about it and given a chance to defend herself. (Any content that is complained about under those rules is required to be removed within 36 hours, with no penalties for wilful abuse of the process. We even tested this by sending frivolous complaints, which resulted in removal.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The definition of “cyber terrorism” in section 66F(1)(B) of the IT Act includes wrongfully accessing restricted information that one believes can be used for defamation, and this is punishable by imprisonment for life. Phone-tapping requires the existence of a “public emergency” or threat to “public safety”, but thanks to the IT Act, online surveillance doesn’t. The telecom licence prohibits “bulk encryption” over 40 bits without key escrow, but these are violated by all, including the Reserve Bank of India, which requires that 128-bit encryption be used by banks. These are but a few of the myriad examples of careless drafting present in the IT Act, which lead directly to wrongful impingement of our civil and political liberties. While we agree with the minister for communications, that the mere fact of a law being misused cannot be reason for throwing it out, we believe that many provisions of the IT Act are prone to misuse because they are badly drafted, not to mention the fact that some of them display constitutional infirmities. That should be the reason they are amended, not merely misuse.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can be done? First, the IT Act and its rules need to be fixed. Either a court-appointed amicus curiae (who would be a respected senior lawyer) or a committee with adequate representation from senior lawyers, Internet policy organizations, government and industry must be constituted to review and suggest revisions to the IT Act. The IT Act (in section 88) has a provision for such a multi-stakeholder advisory committee, but it was filled with mainly government officials and became defunct soon after it was created, more than a decade ago. This ought to be reconstituted. Importantly, businesses cannot claim to represent ordinary users, since except when it comes to regulation of things such as e-commerce and copyright, industry has little to lose when its users’ rights to privacy and freedom of expression are curbed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, there must be informal processes and platforms created for  continual discussions and constructive dialogue among civil society,  industry and government (states and central) about Internet regulation  (even apart from the IT Act). The current antagonism does not benefit  anyone, and in this regard it is very heartening to see Sibal pushing  for greater openness and consultation with stakeholders. As he noted on  the sidelines of the Internet Governance Forum in Baku, different  stakeholders must work together to craft better policies and laws for  everything from cyber security to accountability of international  corporations to Indian laws. In his plenary note at the forum, he  stated: “Issues of public policy related to the Internet have to be  dealt with by adopting a multi-stakeholder, democratic and transparent  approach” which is “collaborative, consultative, inclusive and  consensual”. I could not have put it better myself. Now is the time to convert those most excellent intentions into action by engaging in an open reform of our laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Pranesh Prakash is policy director at the Centre for  Internet and Society.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act'&gt;https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:33:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns">
    <title>Electoral Databases – Privacy and Security Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;In this blogpost, Snehashish Ghosh analyzes privacy and security concerns which have surfaced with the digitization, centralization and standardization of the electoral database and argues that even though the law provides the scope for protection of electoral databases, the State has not taken any steps to ensure its safety.&lt;/b&gt;
        &lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent move by the Election Commission of India (ECI) to tie-up with Google for providing electoral look-up services for citizens and electoral information services has faced heavy criticism on the grounds of data security and privacy.&lt;a href="#_edn1" name="_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; After due consideration, the ECI has decided to drop the plan.&lt;a href="#_edn2" name="_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plan to partner with Google has led to much apprehension regarding Google gaining access to the database of 790 million voters including, personal information such as age, place of birth and residence. It could have also gained access to cell phone numbers and email addresses had the voter chosen to enroll via the online portal on the ECI website.  Although, the plan has been cancelled, it does not necessarily mean that the largest database of citizens of India is safe from any kind of security breach or abuse. In fact, the personal information of each voter in a constituency can be accessed by anyone through the ECI website and the publication of electoral rolls is mandated by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Publication of Electoral Rolls&lt;/b&gt;&lt;br /&gt;The electoral roll essentially contains the name of the voter, name of the relationship (son of/wife of, etc.), age, sex, address and the photo identity card number. The main objective of creation and maintenance of electoral rolls and the issue of Electoral Photo Identity Card (EPIC) was to ensure a free and fair election where the voter would have been  able to cast his own vote as per his own choice. In other words, the main purpose of the exercise was to curtail bogus voting. This is achieved by cross referencing the EPIC with the electoral roll.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of creation and maintenance of electoral rolls is governed by the Registration of Electors Rules, 1960. Rule 22 requires the registration officer to publish the roll with list of amendments at his office for inspection and public information. Furthermore, ECI may direct the registration officer to send two copies of the electoral roll to every political party for which a symbol has exclusively been reserved by the ECI. It can be safely concluded that the electoral roll of a constituency is a public document&lt;a href="#_edn3" name="_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; given that the roll is published and can be circulated on the direction of the ECI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the computational turn, in 1998 the ECI took the decision to digitize the electoral databases. Furthermore, printed electoral rolls and compact discs containing the rolls are available for sale to general public.&lt;a href="#_edn4" name="_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In addition to that, the electoral rolls for the entire country are available on the ECI website.&lt;a href="#_edn5" name="_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the current database is not uniform and standardized, and entries in some constituencies are available only in the local language. The ECI has taken steps to make the database uniform, standardized and centralized.&lt;a href="#_edn6" name="_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Concerns&lt;/b&gt;&lt;br /&gt;The Registration of Electoral Rules, 1960 is an archaic piece of delegated legislation which is still in force and casts a statutory duty on the ECI to publish the electoral rolls. The publication of electoral rolls is not a threat to security when it is distributed in hard copies and the availability of electoral rolls is limited. The security risks emerge only after the digitization of electoral database, which allows for uniformity, standardization and centralization of the database which in turn makes it vulnerable and subject to abuse. The law has failed to evolve with the change in technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a recent article, Bill Davidow analyzes "the dark side of Moore’s Law" and argues that with the growth processing power there has been a growth in surveillance capabilities and on this note the article is titled, “&lt;i&gt;With Great Computing Power Comes Great Surveillance”&lt;/i&gt;&lt;a href="#_edn7" name="_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Drawing from Davidow’s argument, with the exponential growth in computing power, search has become convenient, faster and cheap. A uniform, standardized and centralized database bearing the personal information of 790 million voters can be searched and categorized in accordance with the search terms. The personal information of the voters can be used for good, but it can be equally abused if it falls into the wrong hands. Big data analysis or the computing power makes it easier to target voters, as bits and pieces of personal information give a bigger picture of an individual, a community, etc. This can be considered intrusive on individual’s privacy since the personal information of every voter is made available in the public domain&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, the availability of a centralized, searchable database of voters along with their age would allow the appropriate authorities to identify wards or constituencies, which has a high population of voters above the age of 65. This would help the authority to set up polling booths at closer location with special amenities. However, the same database can be used to search for density of members of a particular community in a ward or constituency based on the name, age, sex of the voters. This information can be used to disrupt elections, target vulnerable communities during an election and rig elections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current IT Laws does not mandate the protection of the electoral database&lt;/b&gt;&lt;br /&gt;A centralized electoral database of the entire country can be considered as a critical information infrastructure (CII) given the impact it may have on the election which is the cornerstone of any democracy. Under Section 70 of the Information Technology Act, 2000 (IT Act) CII means “the computer resource, incapacitation or destruction of which, shall have debilitating impact on national security, economy.”&lt;a href="#_edn8" name="_ednref8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the appropriate Government has not notified the electoral database as a protected system&lt;a href="#_edn9" name="_ednref9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. Therefore, information security practices and procedures for a protected system are not applicable to the electoral database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Rules (IT Rules) are also not applicable to electoral databases, &lt;i&gt;per se&lt;/i&gt;. Since, ECI is not a body corporate, the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information), Rules, 2011 (&lt;i&gt;hereinafter &lt;/i&gt;Reasonable Security Practices Rules) do not apply to electoral databases. Ignoring that Reasonable Security Practices Rules only apply to a body corporate, the electoral database does fall within the ambit of definition of “personal information”&lt;a href="#_edn10" name="_ednref10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and should arguably be made subject to the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intent of the ECI for hosting the entire country’s electoral database online &lt;i&gt;inter alia&lt;/i&gt; is to provide electronic service delivery to the citizens. It seeks to provide “electoral look up services for citizens ... for better electoral information services.”&lt;a href="#_edn11" name="_ednref11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; However, the Information Technology (Electronic Service Delivery) Rules, 2011 are not applicable to the electoral database given that it is not notified by the appropriate Government as a service to be delivered electronically. Hence, the encryption and security standards for electronic service delivery are not applicable to electoral rolls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act and the IT Rules provide a reasonable scope for the appropriate Government to include electoral databases within the ambit of protected system and electronic service delivery. However, the appropriate government has not taken any steps to notify electoral database as protected system or a mode of electronic service delivery under the existing laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;Publication of electoral rolls is a necessary part of an election process. It ensures free and fair election and promotes transparency and accountability. But unfettered access to electronic electoral databases may have an adverse effect and would endanger the very goal it seeks to achieve because the electronic database may pose threat to privacy of the voters and also lead to security breach.  It may be argued that the ECI is mandated by the law to publish the electoral database and hence, it is beyond the operation of the IT Act. But Section 81 of the IT Act has an overriding effect on any law inconsistent, therewith. The appropriate Government should take necessary steps under the IT Act and notify electoral databases as a protected system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is recommended that the Electors Registration Rules, 1960 should be amended, taking into account the advancement in technology. Therefore, the Rules should aim at restricting the unfettered electronic access to the electoral database and also introduce purposive limitation on the use of the electoral database. It should also be noted that more adequate and robust data protection and privacy laws should be put in place, which would regulate the collection, use, storage and processing of databases which are critical to national security.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref1" name="_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Pratap Vikram Singh, Post-uproar, EC’s Google tie-up plan may go for a toss, Governance Now, January 7, 2014 available at &lt;a class="external-link" href="http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss"&gt;http://www.governancenow.com/news/regular-story/post-uproar-ecs-google-tie-plan-may-go-toss&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref2" name="_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn3"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref3" name="_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 74, Indian Evidence Act, 1872&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn4"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref4" name="_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/the_function.aspx"&gt;eci.nic.in/eci_main1/the_function.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn5"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref5" name="_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; &lt;a class="external-link" href="http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx"&gt;http://eci.nic.in/eci_main1/Linkto_erollpdf.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn6"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref6" name="_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; “At present, in most States and UTs the Electoral Database is kept at the district level. In some cases it is kept even with the vendors. In most States/UTs it is maintained in MS Access, while in some cases it is on a primitive technology like FoxPro and in some other cases on advanced RDBMS like Oracle or Sql Server. The database is not kept in bilingual form in some of the States/UTs, despite instructions of the Commission. In most cases Unicode fonts are not used. The database structure not being uniform in the country, makes it almost impossible for the different databases to talk to each other” –  Election Commission of India, Revision of Electoral Rolls with reference to 01-01-2010 as the qualifying date – Integration and Standardization of the database- reg., No. 23/2009-ERS, January 6, 2010 available at e&lt;a class="external-link" href="http://eci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf"&gt;ci.nic.in/eci_main/eroll&amp;amp;epic/ins06012010.pdf&lt;/a&gt;&lt;span dir="RTL"&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn7"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a href="#_ednref7" name="_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;&lt;span&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;http://www.theatlantic.com/technology/archive/2014/01/with-great-computing-power-comes-great-surveillance/282933/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn8"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref8" name="_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Section 70, Information Technology Act, 2000&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn9"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref9" name="_edn9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Computer resource which directly or indirectly affects the facility of Critical Information Infrastructure&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn10"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref10" name="_edn10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Rule 2(1)(i), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn11"&gt;
&lt;p class="MsoEndnoteText" style="text-align: justify; "&gt;&lt;a href="#_ednref11" name="_edn11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Press Note No.ECI/PN/1/2014, Election Commission of India , January 9, 2014 available at &lt;a class="external-link" href="http://eci.nic.in/eci_main1/current/PN09012014.pdf"&gt;http://eci.nic.in/eci_main1/current/PN09012014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/blog/electoral-databases-2013-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>e-Governance</dc:subject>
    
    
        <dc:subject>Transparency, Politics</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2014-01-16T11:07:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dot-blocks-domain-sites">
    <title>DoT Blocks Domain Sites — But Reasons and Authority Unclear</title>
    <link>https://cis-india.org/internet-governance/blog/dot-blocks-domain-sites</link>
    <description>
        &lt;b&gt;Earlier this year, ISPs such as Airtel and MTNL blocked a number of domain sites including BuyDomains, Fabulous Domains and Sedo.co.uk. Whereas the Indian Government and courts have previously issued orders blocking websites, these actions have generally been attributed to issues such as posting of inflammatory content or piracy of copyrighted material. However, the reasoning behind blocking domain marketplaces such as the above mentioned sites is not clear.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;These websites offer users various tools to buy and sell domain names and simplify the purchasing process. Users on &lt;a href="http://broadbandforum.in/airtel-broadband/79130-websites-blocked-on-airtel-broadband-2.html#post644518"&gt;India Broad Band forum&lt;/a&gt; and websites like &lt;a href="http://www.medianama.com/2012/08/223-indiablocks-airtel-blocks-youtu-be-short-url-proxy-domain-marketplace-sites/"&gt;Medianama&lt;/a&gt; reported that these domain sites were not accessible and the following message was displayed instead — "&lt;i&gt;This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications&lt;/i&gt;".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;.In Registry’s Anti-Abuse Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If the issue at hand is one of abusive registrations, it would fall under the &lt;a href="http://www.inregistry.in/Policies/IN_Anti_Abuse_Policy"&gt;.IN Domain Anti-abuse Policy&lt;/a&gt; adopted by the National Internet Exchange of India (NIXI) and the .in registry. This policy states that NIXI will have the right to &lt;i&gt;"deny, cancel, or transfer any registration or transaction, or place any domain name(s) on registry lock, hold, or similar status"&lt;/i&gt; if necessary. This raises a question as to why the Department of Telecommunications (DoT) would issue directions to block these domain marketplaces instead of cancelling their registration or placing it on hold under the policies adopted by NIXI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second, more important question would be whether the DoT has the power to block websites or take action under NIXI’s anti-abuse policy. NIXI and the .in registry both work under the aegis of the Department of Electronics and Information Technology. In addition, the Information Technology Act, 2000 ("the IT Act") is the only legislation that provides the authority to block a website and this authority is bestowed upon the Secretary, Department of Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 69-A of the IT Act authorizes the central government to issue directions/orders to block public access to any information generated, transmitted, received, stored or hosted in any computer resource i.e., block websites. Such orders can be issued if the authorized officer finds that it is necessary to do so in the India’s sovereign and national interests or in the interest of public order. These interests include defence, security of the state, friendly relations with foreign neighbours and preventing incitement to the commission of an offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procedures and safeguards that are to be followed before issuing an order to block a website are detailed in the &lt;a href="https://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;Information Technology (Procedure and Safeguards for blocking for access of information by public) Rules, 2009&lt;/a&gt; ("the rules"). The rules provide that upon receiving a complaint, the concerned organization for the blocking of access to information shall examine the complaint to ensure that there is a need to take action under the reasons mentioned above. If such action is found necessary, a request if forwarded and a committee established as per the rules reviews any requests made to block access to any information. During this review, there is also provision for a notice and reply procedure. This allows for the person controlling the online publication of such information to appear before the committee and respond to the request or make any clarifications regarding the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recommendations of the committee are then sent to the Secretary of the Department of Information Technology who further directs an agency of the government or the intermediary to block the relevant content/website. The rules also provide procedures for blocking access in case of an emergency and in cases where court orders directing the blocking of information have been issued.&lt;/p&gt;
&lt;p&gt;Whereas the ideas of sovereign interest and public order are admittedly very broad, there is no clear explanation as to what actions of domain sites/marketplaces such as BuyDomain and sedo.co.uk would be considered to impinge upon either. Neither is there any information available regarding why the DoT considers this to be the case.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dot-blocks-domain-sites'&gt;https://cis-india.org/internet-governance/blog/dot-blocks-domain-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>smita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-21T10:03:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules">
    <title>Constitutional Analysis of the Information Technology (Intermediaries' Guidelines) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules</link>
    <description>
        &lt;b&gt;Ujwala Uppaluri provides a constitutional analysis of the Information Technology (Intermediaries' Guidelines) Rules notified in April 2011, and examines its compatibility with Articles 14, 19, 21 of the Constitution of India.&lt;/b&gt;
        &lt;h2&gt;Summary of Salient Provisions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;Information Technology (Intermediaries’ Guidelines) Rules, 2011&lt;/b&gt; (‘&lt;b&gt;the Intermediary Guidelines&lt;/b&gt;’)&lt;b&gt; &lt;/b&gt; were notified in April, 2011 as rules enacted in exercise of powers conferred under section 87(2)(zg) read with Section 79 of the Information Technology Act, 2000 (as amended) (‘&lt;b&gt;the IT Act&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 2 of the Intermediary Guidelines imports definitions for key terms from the IT Act. Notably, this includes an importation of Section 2 (w) by &lt;b&gt;Rule 2 (i)&lt;/b&gt;, which defines “intermediary” broadly in the following terms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt; “intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes;&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 whose margin note indicates that it is limited to due diligence measures to be adhered to by intermediaries nevertheless also raises other liabilities by creating a regime to censor content, pre-publication as well as once content has been made publically available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (2) of Rule 3&lt;/b&gt; inventories the classes of content which are deemed actionable, with only clause (i), clause (c), clause (e) and, arguably clause (h), of that rule addressing the national interest, public order and security restrictions cognizable under Article 19(2) of the Constitution. The remainder of grounds includes private claims such as content which “belongs to another person”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, or otherwise infringes proprietary rights&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;, or is “defamatory”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;. Still others are terminologically indeterminate and purely subjective, with the terms “grossly harmful”, “harassing” and “disparaging” being examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule also includes a number of redundancies. While there is reference to libelous as well as defamatory content in clause (b), it is well established that Indian law does not admit of the former concept, instead dissolving the common law distinction between the two to treat them alike.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; There is also clause (e), which prohibits content which is all ready illegal for violating the provisions of an existing statute and the residuary phrasing of the clause (b)’s reference to content which is “otherwise unlawful in any manner whatever”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-rules immediately following the list in Rule 3(2) address the consequences of users publishing content listed in that rule:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (3) of rule 3&lt;/b&gt; provides that intermediaries will not knowingly deal in any manner whatsoever, whether by hosting, publication, transmission or otherwise, with any content of the types that are listed in the previous clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (4) of rule 3&lt;/b&gt; creates a complaints mechanism in respect of content incompatible with Rule 3 (2) by requiring intermediaries to disable access to offending content within 36 hours of obtaining knowledge themselves or on being brought to “actual knowledge” by an “affected person”. The Intermediaries Guidelines do nothing to clarify what would amount to “actual knowledge”, to indicate in unambiguous terms, which parties would have sufficient &lt;i&gt;locus&lt;/i&gt; to bring complaints in order to be deemed an “affected person” for the purposes of these provisions or to suggest that there is a procedure or timeline for action by the intermediary, such that requirements such notice to the author of the content and time for the preparation of a defence by the author and/or the intermediary are accounted for.  Rule 3 (4) also requires that all information which is taken down be preserved, along with “associated records” for a duration of atleast ninety days for investigative purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (5) of rule 3 &lt;/b&gt;mandates that intermediaries inform users that non-compliance with the Intermediary Guidelines, &lt;i&gt;inter alia&lt;/i&gt;, is a ground for the exercise of their right to terminate access or usage rights and remove non-compliant content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, &lt;b&gt;sub-rule (11) of rule 3 &lt;/b&gt;requires intermediaries to name Grievance Officers to receive complaints on any matters relating to the computer resources made available by the intermediary, including for non-compliance or harm in terms of Rule 3 (2). This officer is bound to respond to the complaint within one month from the date of receipt of the complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the Intermediary Guidelines create a two-track system by which private censorship is legitimized online. In the first place, intermediaries can take down content on their own motion where they are of the opinion that the content falls under any of the grounds enumerated in Rule 3 (2) or, alternatively, do so in response to a complaint, in terms of Rule 3 (4).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the provisions relating to censorship, the Intermediary Guidelines also provide for information to be given over to government agencies making a request with lawful authority and in writing under &lt;b&gt;sub-rule (7) of rule 3&lt;/b&gt;, for data protection measures in accordance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Information) Rules, 2011 notified under Section 43A of the IT Act to be adhered to (&lt;b&gt;sub-rule (8) of rule 3&lt;/b&gt;) and for intermediaries to report and share information realting to cyber security with CERT-In (&lt;b&gt;sub-rule (9) of rule 3&lt;/b&gt;).&lt;/p&gt;
&lt;h2&gt;Areas of Infirmity&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is doubtful whether the Intermediary Guidelines could pass constitutional muster, on several grounds:&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 19 (1) (a) and (2)&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;(a) Applicability of Article 19 (2) to Rule 3 (2) Grounds&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Romesh Thappar v. State of Madras&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; the Supreme Court held that the freedom of speech and expression under Article 19(1)(a) includes the freedom to propogate and disseminate ideas. It also held that very narrow and stringent limits govern the permissibility of legislative abridgment of the right of free speech. Ordinarily, any abridgement of free speech by means of censorship must be compatible with one or more of the grounds provided for under Article 19 (2), and the Supreme Court held in &lt;i&gt;Express Newspapers (Private) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;that limitations on the exercise of the Article 19(1)(a) right which do not fall within Article 19(2) cannot be upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the right to free speech applies across all media, and the internet is no exception. In &lt;i&gt;Secretary, Ministry of Information and Broadcasting v. Cricket Association of Bengal&lt;/i&gt;&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;, the Supreme Court reflected the understanding that where media are different, such that the treatment accorded to them must be different in accordance with that indicia of difference, it will treat them as such in order to uphold fundamental rights. More specifically, in &lt;i&gt;Ajay Goswami v. Union of India&lt;/i&gt;&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, the Supreme Court opined (in &lt;i&gt;obiter&lt;/i&gt;) that the internet, as a unique medium of expression, deserved a different standard of protection than other mediums that have preceded it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 (2) of the Intermediary Guidelines, which lists the grounds for censorship, is not complaint with Article 19 (2) for two reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, many of the grounds mentioned have no constitutional basis whatsoever. Rule 3 (2) prohibits, &lt;i&gt;inter alia&lt;/i&gt;, content which “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”, in addition to content which is simply illegal, and should be actionable &lt;i&gt;ex post&lt;/i&gt; rather than prohibited &lt;i&gt;ex ante &lt;/i&gt;(content infringing intellectual property under Rule 3 (2) (d), for example). Most of the terms employed are not legal standards, but merely subjective indicators of personal sensitivities, while still others though legal do not figure in Article 19 (2). Since the whole scheme of the Intermediary Guidelines is premised on these extra-constitutional grounds, they are, as a whole, subject to being to being struck down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the restriction is unreasonable because instead of preserving rights online in accordance with &lt;i&gt;Ajay Goswami&lt;/i&gt;, the Intermediary Guidelines unjustifiably abridge the right to speak and receive information on the internet. The Intermediary Guidelines overreach in their scope, by including as actionable content which is not itself punishable when communicated via any other medium. For example, disparaging speech, as long as it is not defamatory, is not criminalised in India, and cannot be because the Constitution does not allow for it. Similarly, content about gambling in print is not unlawful, but now all Internet intermediaries are required to remove any content that promotes gambling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) Nature of Censorship: Directness of Censorship and Legitimacy of Private and Prior Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In judging whether a statute is constitutional, the effect that the statute will have on the fundamental rights of citizens must be examined. The Supreme Court held in &lt;i&gt;Bennett Coleman &amp;amp; Co. v. Union of India&lt;/i&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; that the test was to examine whether the &lt;i&gt;effect&lt;/i&gt; of an impugned action was to abridge a fundamental right, notwithstanding its object.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, while it is true in light of the Supreme Court’s holdings in &lt;i&gt;Prakash Jha Productions v. Union of India&lt;/i&gt;&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;that pre-censorship is permissible within the Indian constitutional scheme, this permissibility is qualified. Prior censorship may be undertaken only within closely regulated circumstances, such as under the grounds in the Cinematograph Act, 1952, and even then, only by an appropriately empowered governmental entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines create mechanisms for the abridgement of the freedom of speech which amount to indirect and unjustifiable prior censorship, contrary to Article 19 (2):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Firstly&lt;/i&gt;, while the state does not itself censor under these rules, it has empowered private, commercial entities to do so &lt;i&gt;vide &lt;/i&gt;the Intermediary Guidelines. These rules thus transfer the executive power of censorship to private intermediaries. This amounts to an indirect form of censorship for the purposes of the &lt;i&gt;Bennett Coleman &lt;/i&gt;test and has the result of increased censorship on the Internet because the state granted legislative sanction to such a system, although it does not censor by itself or through a state agency. The Intermediary Guidelines, and specifically Rule 3 (4) read with Rule 3 (2), place a burden on intermediaries to decide on the lawfulness of content as a pre-condition for their statutory exemption from liability. An intermediary, on receiving a complaint, to ensure that it continues to receive the protection offered by Section 79 of the IT Act, will be forced to disable access to the content posted by a user. Thus, the direct effect of the rules will be strict censoring of content posted on-line by users. The rules will have a direct effect on the fundamental right of freedom of speech and expression guaranteed under Article 19(1) of the Constitution unreasonable restrictions on fundamental rights, that are imposed by a statute or executive orders are liable to be struck down as unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Secondly&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;while prior censorship is permissible only in a strictly limited range of cases, the Intermediary Guidelines allow for an unrestrained and unlimited degree of prior and arguably invisible censorship. Rule 3 of the Intermediary Guidelines clearly envisages such a system of prior censorship. Whereas the consequences for passively displaying content incompatible with Rule 3(2) would be a complete waiver and dissolution of the Section 79 immunity that would ordinary accrue to neutral intermediaries, intermediaries or complainants have no obligation in respect of ensuring the tenability of complaints and the grounds cited in them. The Intermediary Guidelines do not draw a distinction between arbitrary actions of an intermediary and take-downs subsequent to a request. Further, the inclusion of a residuary clause in Rule 3 (2) (b) allowing pre-censorship of content which is “unlawful in any manner whatever”, also indicates that the Intermediary Guidelines allow the use of the exceptional instrument of not only allows private censorship, but that they actively encourage it as the default rule rather than the exception without any justification whatsoever.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c)&lt;/i&gt;&lt;i&gt; Vagueness and Overbreadth: Possibility for Over-Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vagueness in the terms of a restriction to free speech is grounds for it to be struck down, even where the ground is apparently broadly constitutional. The Supreme Court held in &lt;i&gt;Sakal Papers (P) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; that the Constitution must be interpreted in order to enable citizens to enjoy their rights to fullest measure, subject to limited permissible restrictions. In &lt;i&gt;Romesh Thapar&lt;/i&gt;&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;the Supreme Court also held that a legislation authorizing the imposition of restrictions on free speech in language wide enough to cover restrictions which are permissible as well as extra-constitutional will be held to be wholly unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds listed in Rule 3 (2) of the Intermediary Guidelines are highly subjective, private interest grounds which are not defined either in the Intermediary Guidelines or in the IT Act itself. These include terms such as “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”. Consequently, the Intermediary Guidelines constitute unreasonable restrictions on freedom of speech, with Rule 3 (2) containing vague terms which, in addition to falling beyond the purview of Article 19(2), cover only private and subjective grounds, incapable of objective definition or application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Intermediary Guidelines do no precisely define the term “affected person” employed in Rule 3 (4). Thus, complaints from &lt;i&gt;any&lt;/i&gt; party, including those uninvolved or unaffected by content must all be complied with, without qualification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the vagueness of the grounds in Rule 3 (2) and the diffuse terminology of “affected person” leaves Rule 3 (2) grounds serving as placeholders for whatever claim a complainant, having no &lt;i&gt;locus&lt;/i&gt; whatsoever, chooses to bring, without regard for whether it is constitutional or even legal. Online content is thus treated as presumptively illegal and take down of content as the presumptive course of action. Additionally, there is a further consequence to the vagueness and overbreadth of the terms in Rule 3 (2): because of the indeterminacy in the grounds listed thereunder, intermediaries tasked with enforcing the law will tend to err on the side of caution and censor, rather than keep speech accessible online. There is empirical evidence to show that cautious intermediaries will over-censor and over comply with complaints in order to avoid liability under Section 79 of the IT Act.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) Contravention of International Human Rights Norms &amp;amp; Horizontal Application&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The censorship regime constructed by the Intermediary Guidelines is non-compliant not only with domestic requirements under the Constitution, but also with India’s obligations under international human rights law under Articles 19 of the Universal Declaration of Human Rights (‘&lt;b&gt;UDHR&lt;/b&gt;’) and the International Covenant on Civil and Political Rights (‘&lt;b&gt;ICCPR&lt;/b&gt;’), under the UN Human Rights Council’s  Report of the Special Rapporteur Frank La Rue on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011)&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;(‘&lt;b&gt;Special Rapporteur’s Report&lt;/b&gt;’) and the UN Human Rights Council Resolution on Internet Freedom (2012)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; (‘&lt;b&gt;UN Internet Freedom Resolution&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ICCPR as well as the UDHR guarantee a right to free speech “through any…media of…choice” in their respective Articles 19, the Special Rapporteur’s Report and the UN Internet Freedom Resolution recognize the need for special efforts to be undertaken by states to preserve free speech on the internet. The former document justifies censorship only in the most limited circumstances and makes specific mention of the commercial interests that may be implicated in delivering free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the Intermediary Guidelines,  the Indian state creates a system by which the right to free speech can be systematically violated by private and undisclosed entities and even empowers them to do so, without imposing any constitutional safeguards whatsoever. Thus, egregious violations of the right to free speech and expression are a direct and inevitable consequence of the Intermediary Guidelines. To the degree that the Indian Supreme Court has enagaged with free speech online, it appears from &lt;i&gt;Ajay Goswami &lt;/i&gt;that it would apply standards consistent with international law obligations to rectify the Intermediary Guidelines to meet them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Supreme Court has held, where necessary for their true enjoyement, that fundamental rights may involve a degree of horizontality in their application. In other words, private action could be guided by fundamental rights, such as in &lt;i&gt;Vishaka v. State of Rajasthan&lt;/i&gt;&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; which evidences the Supreme Court’s willingness to hold that private entities could be held to constitutional and international human rights law standards where that is necessary for the real rather than illusory enjoyment of fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, the Intermediary Guidelines are also liable to be struck down for their failure to recognize and account for the role of private interests while empowering them with the right to curtail fundamental rights.&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 21&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (a) Adverse Impact on Privacy (and consequently on Free Speech)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A constitutional right to privacy has been read into Article 21’s guarantee of life and personal liberty in several instances by the Supreme Court. The State is consequently under an obligation to refrain from interfering, whether by itself or through any of its agencies, with private lives and spaces. By the same coin, laws which encourage unwarranted state or societal intrusions into private life will contravene the victim’s Article 21 right. In &lt;i&gt;People’s Union for Civil Liberties v. Union of India&lt;/i&gt;,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; the Supreme Court held that Article 21 privacy protected individuals against the interception and monitoring of private communications by the state in the absence of sufficient safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, an individual’s privacy interests in information relating to him are not dissolved merely because information is not confidential or because another entity has some property interest in that information. In &lt;i&gt;District Registrar and Collector, Hyderabad v. Canara Bank&lt;/i&gt;&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;, the Supreme Court recognized that even where the search of private documents was concerned, Article 21 protected “persons not places”, &lt;i&gt;i.e.&lt;/i&gt;, that the privacy interest did not vest in property or communications but, rather, in the rightsholder himself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines include no limits whatsoever on the scope of disclosures that government agencies can demand or expect to retain, in contravention of Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, Rule 3 (4), which requires data retention for a statutory minimum of ninety days of content taken down as well as “associated records”, violates users’ rights to privacy. In addition to the financial and technical burden (in storing and securing data) imposed by the Intermediary Guidelines in requiring potentially unlimited data retention by intermediaries, there is no clarity as to what or how much information precisely must be held in the form of “associated records”. Instead of subjecting data to limited and closely qualified retention by private intermediaries, and thus limiting the impairment of the fundamental right to privacy to the minimum possible degree necessary, Rule 3 (4) imposes blanket data retention requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 3 (7), which makes any information held by an intermediary subject to being disclosed to the government upon request is also inconsistent with the requirement that the right to life and personal liberty be violated only in accordance with fair, just and reasonable procedures. Notwithstanding that Rule 3 (7) is consistent with Section 67C of the IT Act and specific rules framed in regard to the surveillance of communications, it is also unconstitutional because it fails to include any safeguards whatsoever in the process of surveillance. These would include, as minimum obligatory conditions in light of &lt;i&gt;PUCL&lt;/i&gt;, the requirement that the surveilled be informed of the surveillance and be allowed to challenge its propriety &lt;i&gt;ex ante &lt;/i&gt;or its procedural regularity &lt;i&gt;ex post&lt;/i&gt;, or atleast administrative or judicial review &lt;i&gt;ex parte&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b)  Non-compliance with Due Process and Natural Justice Requirements&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 explicitly includes a due process guarantee. This means that the right to life and personal liberty, and its constituent rights, can be interfered with only through constitutionally consistent procedures. A cornerstone of fair procedure, compliant with the rule of law, is the notion of natural justice. Consequently, Article 21 contemplates that the procedure by which fundamental rights are curtailed will satisfy natural justice principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Maneka Gandhi v. Union of India&lt;/i&gt;,&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; the Supreme Court held that natural justice was not a rigid or mechanical term, but one that referred to those practices and principles that would ensure&lt;i&gt; &lt;/i&gt;“fair play in action”&lt;i&gt;.&lt;/i&gt; In addition the Court held that all deviations&lt;i&gt; &lt;/i&gt;from natural justice requirements must be supported by a sufficiently justificatory “compelling state interest”. Specifically, in &lt;i&gt;Union&lt;/i&gt; &lt;i&gt;of&lt;/i&gt; &lt;i&gt;India&lt;/i&gt; &lt;i&gt;v.&lt;/i&gt; &lt;i&gt;Tulsiram&lt;/i&gt; &lt;i&gt;Patel&lt;/i&gt;&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;, the Supreme Court held that the principle of natural justice required the satisfaction of the &lt;i&gt;audi alteram partem&lt;/i&gt; rule, which consisted of several requirements, including the requirement that a person against whose detriment an action is taken be informed of the case against him and be afforded a full and fair opportunity to respond.  Finally, in &lt;i&gt;M.C. Mehta v. Union of India&lt;/i&gt;&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; the Supreme Court held that the absence of due notice and a reasonable opportunity to respond would vitiate any holding to the rightsholder’s detriment. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines fail to satisfy the requirement of natural justice, and particularly the rights to prior notice as well as that of the affected party to a hearing:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By requiring that content be taken down swiftly (within 36 hours of complaint, under Rule 3 (4)) and by failing to require the author of the content to be informed of the complaint and its contents, the Intermediary Guidelines violate the author’s right to notice and consequently affect his/her right to prepare and present a defence at all. In practice, authors of content which is the subject of a complaint may never know of the complaint or even of the fact of the take down, given the absence of any mechanism under the rules by which they could have been informed. In a scheme for silent, invisible censorship, authors are never afforded an opportunity to challenge the take down, just as they have no opportunity to rebut the initial complaint. In addition, at any event, it is the intermediary, a biased private entity whose immunity under Section 79 of the IT Act could be called into question based on the outcome, who must make the determination as to the legality of the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is nothing to prohibit intermediaries from informing authors on the receipt of a complaint, the limited time within which action must be taken means that such intermediaries would risk liability for non-compliance with the compliant and a waiver of their Section 79 immunity, where the content is not taken down, whether because communication does not occur within the 36 hour timeframe or because an author elects to resist takedown. By creating a system in which takedowns necessarily occur in response to complaints, irrespective of their legitimacy, the Intermediary Guidelines presume and rule in favour of the complainants and in favour of (private) censorship instead of presuming in favour of the preservation of the fundamental right to free speech, or even maintaining neutrality between the two ends.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Compatibility with Article 14&lt;/h3&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The guarantee of “equal protection of laws” requires equality of treatment of persons who are similarly situated, without discrimination &lt;i&gt;inter se&lt;/i&gt;. It is a corollary that that persons differently situated cannot be treated alike. &lt;i&gt;In&lt;/i&gt;&lt;i&gt; E.&lt;/i&gt;&lt;i&gt; P.&lt;/i&gt;&lt;i&gt; Royappa&lt;/i&gt;&lt;i&gt; v. State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Tamil&lt;/i&gt;&lt;i&gt; Nadu&lt;/i&gt;&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;i&gt; the&lt;/i&gt;&lt;i&gt; Supreme&lt;/i&gt;&lt;i&gt; Court&lt;/i&gt;&lt;i&gt; held&lt;/i&gt;&lt;i&gt; that arbitrary or unfair actions necessarily run counter to Article 14. The Supreme Court explained in M/S&lt;/i&gt;&lt;i&gt; Sharma&lt;/i&gt;&lt;i&gt; Transport&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Government&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Andhra Pradesh&lt;/i&gt;&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;i&gt; that&lt;/i&gt; arbitrary actions are actions which are unreasonable, non-rational done capriciously or without adequate determining principle, reason or in accordance with due judgment. In addition, Article 14 also requires that state action be reasonable. I&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Mahesh&lt;/i&gt;&lt;i&gt; Chandra&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Regional&lt;/i&gt;&lt;i&gt; Manager,&lt;/i&gt;&lt;i&gt; U.P.&lt;/i&gt;&lt;i&gt; Financial&lt;/i&gt;&lt;i&gt; Corporation&lt;/i&gt;&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;i&gt; it was held that discretion must be exercised objectively, and that what is not fair or just will be unreasonable, and subject to being struck down as unconstitutional.&lt;/i&gt;Additionally, Article 14 also requires that the basis upon which classifications are undertaken for the purposes of same or differential treatment be reasoned and fair. The Supreme Court held in &lt;i&gt;Sube Singh v. State of Haryana&lt;/i&gt;&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; that the state’s failure to support a classification on the touchstone of reasonability, with the existence of intelligible differentia or the rational basis of achieving a stated object, will be ground for it to be held arbitrary and unreasonable. Finally, all state action having the potential to curtail Article 14 must be reasonable, justifiable, undertaken in &lt;i&gt;exercise of &lt;/i&gt;constitutional powers and be informed and guided by public interest. The Supreme Court held to this effect i&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Kasturi&lt;/i&gt;&lt;i&gt; Lal&lt;/i&gt;&lt;i&gt; Lakshmi&lt;/i&gt;&lt;i&gt; Reddy&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Jammu&lt;/i&gt;&lt;i&gt; and&lt;/i&gt;&lt;i&gt; Kashmir&lt;/i&gt;&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines contravene Article 14 on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, intermediaries who are not similarly situated are treated alike. Rule 2 (i) imports the IT Act’s omnibus definition of the term “intermediary”, such that all classes of intermediaries, ranging from intermediaries which control the architecture of the internet and the hardware  which enables it to run (such as ISPs and DNS providers) to intermediaries that enable content creation, sharing and communications online (such as email clients, content aggregators, social networking services and content hosts), are empowered to censor and are required to comply with complaints regarding content. Intermediaries, for the purposes of the IT Act and the Intermediary Guidelines, thus refer to a large and disparate group of providers of services enabling access to as well as use of the Internet. Reasoned state action must recognize that their liabilities must necessarily vary with the specific type of service that each provides. The Intermediary Guidelines fail to do so, and are consequently incompatible with Article 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Intermediary Guidelines treat the same or similar content across media differently, without apparent justification. More specifically, users of the internet are unfairly discriminated against. All of the Rule 3 (2) grounds which are not explicitly mentioned in Article 19 (2) in particular reflect this discriminatory, unreasoned treatment. To illustrate, the prohibition under Rule 3 (2) on the display of any content online when it relates to gambling treats speakers using the internet differently from speakers communicating this content via any other medium of communication. Given that nothing in the nature of the medium itself attaches a new or different character to the content, criminality or liability must attach to such content in a medium-neutral fashion. So, while content qualifying as seditious under law remains so across media, whether it be print, audio or video broadcast or online, the same as not the case for communications on the internet. In other words, while gambling itself may be prohibited under law, speech or expression involving it is nowhere prohibited under law. While such content is legal and protected across print and broadcasting media, the same content is liable to take down online. This would amount to discriminatory treatment of equal content &lt;i&gt;merely&lt;/i&gt; because speakers choose the internet, and the speech occurred online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Intermediary Guidelines accord unrestrained discretion in the curtailment of fundamental rights to &lt;i&gt;private &lt;/i&gt;functionaries, without any guidance whatsoever. This should have been the sole reserve of the state. In addition to the lack of guidance, the breadth of the grounds for censorship in Rule 3 (2), some of which are&lt;i&gt; themselves incapable of precise and non-subjective application&lt;/i&gt;, means that private censorship can occur to an arguably unlimited degree. Expecting compliance with such terms, and attaching liability (for intermediaries) or a curtailment of fundamental rights (for generators of content), without the provision of a right to challenge or even, more fundamentally, be informed is both unreasonable and arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Rules 3 (4) and 3 (5) empower intermediaries to take down content without providing any realistic opportunity of hearing to its author. Intermediaries are accorded an adjudicatory role to the intermediary in deciding questions whether or not authors can access their fundamental right to free speech in the process. This role is ordinarily reserved for competent courts or administrative authorities, which are subject to constitutional checks and balances and a general obligation to preserve and promote fundamental rights. Assigning such functions to a self-interested private entity without any accountability whatsoever is both unreasonable as well as arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, the Intermediary Guidelines fail to account for the public interest because they directly restrict the public’s freedom of speech and expression, without any justifiable reason, and privilege the personal and not necessarily constitutional sensitivities of private complainants instead. Rule 3(3) in effect vests an extraordinary power of censorship in intermediaries, entities which operate on the basis of private interest and outside the limits of administrative or even the most basic human rights control. Safeguards must apply to power-bearers to the degree and in the manner required in relation to the nature of the power, rather than its holder, if fundamental rights are to be legislatively preserved. While the Supreme Court in &lt;i&gt;A.K. Kraipak v. Union of India&lt;/i&gt;&lt;a href="#_ftn27"&gt;[27]&lt;/a&gt; extended the applicability of natural justice principles from judicial bodies alone and quasi-judicial bodies to administrative bodies as well, the applicability of such principles still remains limited to state entities. In other words, there is an acknowledged difficulty in applying public law standards to private, commercial entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines thus vest the right to abridge core fundamental rights (under Articles 14, 19 and 21) in private delegates operating outside public law controls that constrain the scope in which the power can be exercised and ensure that citizen interest can be preserved. In the alternative, they also failed to provide for other safeguards to prevent abuse to the detriment of fundamental rights private delegates of governmental power, even as they granted such powers in unlimited terms. As a result, the Intermediary Guidelines evidence thoughtless, arbitrary, unreasoned and unjust state action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vires vis á vis the Parent Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While it is permissible within the constitutional scheme for legislative functions of the Parliament to be delegated to a degree, they may be struck down on several grounds. In general, per &lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Express&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Newspapers&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;(Bombay)&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Pvt.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Union&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;India&lt;/i&gt;&lt;a href="#_ftn28"&gt;,[28]&lt;/a&gt; subordinate legislation can be challenged not only on any of grounds on which the parent legislation is vulnerable to challenge, but also on the grounds that it does not conform to parent statute, that it is contrary to other statutes or that it is unreasonable, in the sense that it is manifestly arbitrary. Notably, the Court also held here that subordinate legislation is liable to being struck down where it fails to conform to constitutional requirements, or, specifically that “it offends Article 14 or Article 19 (1) (a) of the Constitution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a well-accepted proposition that delegated legislation which travels outside the scope of its enabling law will not stand as valid. It was held in &lt;i&gt;Agricultural&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Market&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Committee&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Shalimar&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Chemical&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Works&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd &lt;/i&gt;&lt;a href="#_ftn29"&gt;[29]&lt;/a&gt; that a delegate cannot alter the scope of the act under which it has been it has been empowered to make rules, or even of a provision or principle included there under. In &lt;i&gt;State&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Karnataka&lt;/i&gt;&lt;i&gt; v&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ganesh&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Kamath&lt;/i&gt;&lt;a href="#_ftn30"&gt;[30]&lt;/a&gt; the Supreme Court held that “it is a well settled principle of interpretation of statutes that the conferment of rule-making power by an Act does not enable the rule-making authority to make a rule which travels beyond the scope of the enabling Act or which is inconsistent there with or repugnant thereto”. Similarly, in &lt;i&gt;KSEB&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Aluminium&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Company&lt;/i&gt;&lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;, it held that“subordinate legislation cannot be said to be valid unless it is within the scope of the rule making power provided in the statute”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines were enacted under Sections 79(2) and 87(2)(zg) of the Information Technology Act, 2000 (as amended). While the latter provision explicitly grants the Central Government rule-making powers by which it can lay out guidelines to be followed by intermediaries in order to comply with Section 79(2), it appears that the rules in their current form appear to have been drafted based on a misunderstanding of Section 79.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 79(2) itself merely clarifies the circumstances in which intermediaries can claim that intermediaries are not liable for content where they do not initiate the transmission of potentially actionable content or select its recipient, modify its contents and observe all necessary “due diligence” requirements under the IT Act and rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Intermediary Guidelines alter the intent and scope of section 79 (or other provisions of the IT Act, in some cases) clearly leaves them &lt;i&gt;ultra vires&lt;/i&gt; the parent statute. The specific instances of deviation by the Intermediary Guidelines from the IT Act are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, Rule 3 (3) is ultra vires section 79 of the IT Act. Where this rule expressly prohibits the hosting, publication or initiation of transmission of content described in Rule 3 (2), section 79 does not intend any prohibition. All that it does is to waive the immunity otherwise accorded to intermediaries where the conditions specified are not satisfied. In other words, the section is optional, rather than mandatory and punitive: whether or not an intermediary can claim immunity will depend on whether it chooses to comply with section 79 (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, Rule 3 (4) requires intermediaries to take steps to disable access to within 36 hours of receiving a complaint in relation thereto. This is inconsistent with section 69B of the IT Act, which lays down in detail, the procedure to be followed to disable access to information. Since section 69B is statutory law, Rule 3 (4), being mere delegated legislation, will have to yield in its favour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, Rule 3 (7) is &lt;i&gt;ultra&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;vires&lt;/i&gt; sections 69 and 69B, and falls outside the scope of section 79 (2). Rule 3 (7) provides that intermediaries must comply with requests for information or assistance when required to do so by appropriate authorities. This provision has no relation to the contents of section 79, which regulates intermediaries’ liability for content, and under which these rules were notified. In addition, rules have already been issued under the properly relevant sections, namely sections 69 and 69B, to provide a procedure to be followed by the government for the interception, monitoring, and decryption of information held by intermediaries. Rule 3 (7) is not consistent with the rules under sections 69 and 69B, as it removes all safeguards that those rules included. Under the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption) Rules 2009, for instance, permission must be obtained from the competent authority before an intermediary can be directed to provide access to its records and facilities while Rule 3 (7) makes intermediaries answerable to virtually any request from any government agency.&lt;/p&gt;
&lt;p align="left"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Rule 3 (2) (a).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Rule 3 (2) (d).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Rule 3 (2) (b)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 499, Indian Penal Code, 1860 (“Defamation” is defined to include both written and spoken words).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. AIR 1950 SC 124.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. AIR 1958 SC 578.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. AIR 1995 SC 1236.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].(2007) 1 SCC 170.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. AIR 1973 SC 106.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. (2011) 8 SCC 372.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. AIR 1962 SC 305, ¶31.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Supra, &lt;/i&gt;n.5.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Centre for Internet &amp;amp; Society, &lt;i&gt;Intermediary Liability in India&lt;/i&gt;&lt;i&gt;: Chilling Effects on Free Expression on the Internet 2011&lt;/i&gt; &lt;i&gt;available at&lt;/i&gt; cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet/intermediary-liability-in-india.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. UN Document no. A/HRC/17/27.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. UN Document no. A/HRC/20/.13.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. AIR 1997 SC 3011.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. AIR 1997 SC 568.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. 1978 SCR (2) 621.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. AIR 1985 SC 1416.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. AIR 1999 SC 2583.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. AIR 1974 SC 555.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. AIR 2002 SC&lt;i&gt; &lt;/i&gt;322&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. AIR 1993 SC 935&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. (2001) 7 SCC 545, 548, ¶10.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].1980 AIR 1992.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. &lt;i&gt;AIR&lt;/i&gt; 1970 SC 150.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. AIR 1986 SC 515.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. AIR 1997 SC 2502.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. (1983) 2 SCC 40.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr35" name="fn31"&gt;31&lt;/a&gt;]. AIR 1976 SC 1031.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules'&gt;https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ujwala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-10-31T08:44:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system">
    <title>Conference on the Digitalization of the Indian Legal System</title>
    <link>https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system</link>
    <description>
        &lt;b&gt;On Legal Services Day, November 9, 2016, LegalDesk.com collaborated with iSPIRT to host a conference on the “Digitalization of the Indian Legal System”. The event invited prominent speakers to present their organizations’ work and to participate in a panel discussion followed by a Q&amp;A period for the audience.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The co-founder of DAKSH Society of India, Kishore Mandyam, opened the event with a thought-provoking presentation on the efficiency levels of the current legal system and the kinds of progress that can be brought about by technological reforms. Members of LegalDesk.com then presented their ideas and then introduced their newest white paper on Legal Digitalization, providing a brief overview of the study and summarizing the most relevant sections. The panel discussion then proceeded, moderated by Sanjay Khan Nagra, a policy expert at iSPIRT Foundation. He facilitated an insightful and conducive discussion around the advantages, disadvantages, risks and incentives of digitalizing the Indian legal system. On the discussion panel was Kishore Mandyam from DAKSH Society and Prabhuling K Navadgi, the Additional Solicitor General of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objectives to the conference, as per its website, were to: (1) examine the current legal framework and the possibility of amendments in laws to facilitate digitalization of the system, (2) asses the potential of India Stack in digitalizing the legal system, (3) to identify statutes which require amendment, (4) identify the hurdles and roadblocks in the path towards digital reform of the legal ecosystem, and (5) suggest amendments to the act and potential areas of improvement. With those objectives in mind, this blog post intends to provide a brief overview of the main narratives shared in the conference and to identify some of the loopholes and unanswered questions that I was left with by the end.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Improved efficiency is the dominant narrative used to advocate for the digitalization of the Indian legal system. According to LegalDesk.com, the current Indian legal system relies mostly on paperwork, resulting in thousands of courts and over a million advocates accumulating lackhs of ongoing cases and an enormous pile of pending cases, mostly due to insufficient information. It is stated that the traditional methods of legal documentation, paperwork and court work must change through awareness, technology and pursuance by the government, as it needs to be implemented throughout the country. The key idea here is that digital transactions are faster and simplify the process of storing information. The ultimate desired outcome here, then, is increased efficiency and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One must question, however, if this narrative may be overly generous with the credit it gives to technology. IT systems, like many other manmade structures, are always bound to glitch and crash. It would be useful, then, to question whether the legal system is a department that can afford the complications that inevitably accompany a digital transformation. If portals or servers fail at critical times (i.e. when a person needs to confirm their trial date, submit a document before a deadline, or any other pressing procedures), the consequences may in fact outweigh the convenience brought about by overall digitalization. This is not to imply that the legal system cannot or should not undergo a digital transformation. Rather, it is to pose the question of whether the government will dedicate sufficient funds and expertise towards developing a resilient and reliable IT system for the courts. The conference was strongly centered on the concept that &lt;i&gt;technology is always the way forward&lt;/i&gt;. This is a positive idea but one must pay special attention to the complications that may arise with the digitalization of a system that must function in a particularly time-sensitive manner – and to ensure that these complications can be managed efficiently and effectively should they arise. This then, requires more than a mere push for digitalization. Introducing new technological platforms is a positive step towards digitalization. However, there is a need for a detailed, government-authorized plan on how the judicial system will efficiently and smoothly undergo this digital transformation in a sustainable and resilient manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A presenter from LegalDesk.com mentioned Estonia’s model of complete digital governance as an example of successful digitalization: “If a small country like Estonia can do it, why can’t we?” While it is useful to draw examples and lessons from other countries, it is also crucial to recognize the contextual differences between countries. The presenter’s point was that Estonia is small in both size and population and has just recently gained independence in 1991—and has nonetheless been able to undergo technological reform and completely digitalize governance systems. India’s case is extremely different as one can logically argue that digital inclusion is more difficult to accomplish for large, spatially dispersed populations. Furthermore, the socioeconomic disparities in India, particularly in income and literacy, contribute to an immense digital divide that Estonia did not, to any comparable extent, face in order to digitalize governance over 1.3 million individuals. This is not to suggest that India cannot become a world leader in digital governance, or become comparable to Estonia. Rather, this is to highlight the importance of recognizing historical, political and sociocultural differences between countries when comparing governance models and digitalization processes. There is a need to indigenize digital reform strategies and platforms in India to cater to its unique context and vast diversity. This can be done by focusing on issues such as the language of digital governance, ensuring sufficient distribution of access to public digital platforms, and prioritizing the inclusion of all socioeconomic classes. I would argue that digitalization could come at a greater cost than benefit if it perpetuates the exclusion of the underprivileged members of society, especially from a system as critical as the judiciary. These topics were alarmingly overlooked in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The topic of privacy was also quite overlooked in the conference. As a step towards digital transformation, LegalDesk.com presented the new eNotary technology, which would be implemented by utilizing a combination of Adhaar based authentication, eSign, digilocker systems such as India Stack and video/audio recorded interviews. With the eNotary system, attestation, authentication and verification of legal instruments can be done remotely.  This is expected to make paperwork easier, faster and more secure, as individuals would log into digital platforms using their Adhaar numbers to perform their judiciary procedures. A member of the audience asked about privacy concerns associated with digitalizing the legal records or property ownership information of individuals. Kishore Mandyam, from DAKSH, answered confidently with a statement that privacy is not a pressing issue here. He asserted that privacy concerns are a western construct that we have adopted in urban parts of India but that is not a concern for the majority of locals. It is clear, however, from examples such as the United States’ predictive policing practices, that accumulating data regarding the legal affiliations of individuals can result in discriminatory practices if this data does not remain strictly confidential to protect the privacy rights of citizens. This is not to mention the other forms of discrimination that can arise from the accumulation of such data, such as the targeting of certain demographics by corporate marketing and credit scoring practices that rely on trends in big data. To keep citizens’ legal records and affairs out of these databases, a digital legal system must be securely encrypted and protected by rigid privacy policies. India may have a varying context that leads to different privacy concerns with regards to a digital legal system. In any case, special attention must be given to privacy and security rights of individuals as their Adhaar numbers become attached to all their online personal data, including their legal records and judicial affairs.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system'&gt;https://cis-india.org/internet-governance/blog/conference-on-the-digitalization-of-the-indian-legal-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-16T15:34:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-proposed-amendments-to-it-intermediary-guidelines-and-digital-media-ethics-code-rules">
    <title>Comments to the proposed amendments to The Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 </title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-proposed-amendments-to-it-intermediary-guidelines-and-digital-media-ethics-code-rules</link>
    <description>
        &lt;b&gt;This note presents comments by the Centre for Internet and Society (CIS), India, on the proposed amendments to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (“proposed amendments”). We thank Isha Suri for her review of this submission.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Preliminary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In these comments, we examine the  constitutional validity of the proposed amendments, as well as whether  the language of the amendments provide sufficient clarity for its  intended recipients. This commentary is in-line with CIS’ previous  engagement with other iterations of the Information Technology  (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;General Comments&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Ultra vires the parent act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 79(1) of the Information  Technology (IT) Act states that the intermediary will not be held liable  for any third-party information if the intermediary complies with the  conditions laid out in Section 79(2). One of these conditions is that  the intermediary observe “&lt;i&gt;due diligence while discharging his duties  under this Act and also observe such other guidelines as the Central  Government may prescribe in this behalf.&lt;/i&gt;” Further, Section 87(2)(zg) empowers the central government to prescribe “&lt;i&gt;guidelines to be observed by the intermediaries under sub-section (2) of section 79.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A combined reading of Section 79(2)  read with Section 89(2)(zg) makes it clear that the power of the Central  Government is limited to prescribing guidelines related to the due  diligence to be observed by the intermediaries while discharging its  duties under the IT Act. However, the proposed amendments extend the  original scope of the provisions within the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the IT Act does not  prescribe for any classification of intermediaries. Section 2(1) (w) of  the Act defines intermediaries as “&lt;i&gt;with respect to any particular  electronic records, means any person who on behalf of another person  receives, stores or transmits that record or provides any service with  respect to that record and includes telecom service providers, network  service providers, internet service providers, web-hosting service  providers, search engines, online payment sites, online-auction sites,  online-market places and cyber cafes&lt;/i&gt;”. Intermediaries are treated and regarded as a single monolithic entity with the same responsibilities and obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed amendments have now  established a new category of intermediaries, namely online gaming  intermediary. This classification comes with additional obligations,  codified within Rule 4A of the proposed amendments, including enabling  the verification of user-identity and setting up grievance redressal  mechanisms. The additional obligations placed on online gaming  intermediaries find no basis in the IT Act, which does not specify or  demarcate between different categories of intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2021 Rules have been prescribed  under Section 87(1) and Section 87(2)(z) and (zg) of the IT Act. These  provisions do not empower the Central Government to make any amendment  to Section 2(w) or create any classification of intermediaries. As has  been held by the Supreme Court in &lt;i&gt;State of Karnataka and Another v. Ganesh Kamath &amp;amp; Ors&lt;/i&gt; that: “&lt;i&gt;It  is a well settled principle of interpretation of statutes that  conferment of rule making power by an Act does not enable the rule  making authority to make a rule which travels beyond the scope of the  enabling Act or which is inconsistent therewith or repugnant thereto.&lt;/i&gt;”  In this light, we argue that the proposed amendment cannot go beyond  the parent act or prescribe policies in the absence of any  law/regulation authorising them to do so.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We recommend that a regulatory  intervention seeking to classify intermediaries and prescribe  regulations specific to the unique nature of specific intermediaries  should happen through an amendment to the parent act. The amendment  should prescribe additional responsibilities and obligations of online  gaming intermediaries.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A note on the following sections&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since the legality of classifying  intermediaries into further categories is under question, our subsequent  discussions on the language of the provisions related to online gaming  intermediary are recommended to be taken into account for formulating  any new legislations relating to these entities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Specific comments&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Fact checking amendment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Amendment to Rule 3(1)(b)(v) states that intermediaries are obligated to ask their users to not host any content that is, &lt;i&gt;inter alia, &lt;/i&gt;“&lt;i&gt;identified  as fake or false by the fact check unit at the Press Information Bureau  of the Ministry of Information and Broadcasting or other agency  authorised by the Central Government for fact checking&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Read together with Rule 3(1)(c), which  gives intermediaries the prerogative to terminate user access to their  resources on non-compliance with their rules and regulations, Rule  3(1)(b)(v) essentially affirms the intermediary’s right to remove  content that the Central government deems to be ‘fake’. However, in the  larger context of the intermediary liability framework of India, where  intermediaries found to be not complying with the legal framework of  section 79 lose their immunity, provisions such as Rule 3(1)(b)(v)  compel intermediaries to actively censor content, on the apprehension of  legal sanctions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this light, we argue that Rule  3(1)(b)(v) is constitutionally invalid, inasmuch that Article 19(2),  which prescribes grounds under which the government restrict the right  to free speech, does not permit restricting speech on the ground that it  is ostensibly “&lt;i&gt;fake or false&lt;/i&gt;”. In addition, the net effect of  this rule would be that the government would be the ultimate arbiter of  what is considered ‘truth’, and every contradictions to this narrative  would be deemed to be false. In a democratic system like India’s, this  cannot be a tenable position, and would go against a rich jurisprudence  of constitutional history on the need for plurality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, in &lt;i&gt;Indian Express Newspapers v Union of India,&lt;/i&gt; the Supreme Court had held that &lt;i&gt;‘the  freedom of the press rests on the assumption that the widest possible  dissemination of information from diverse and antagonistic sources is  essential to the welfare of the public.&lt;/i&gt;’ Applying this  interpretation to the present case, it could be said that the  government’s monopoly on directing what constitutes “&lt;i&gt;fake or false&lt;/i&gt;” in the online space would prevent citizens from accessing dissenting voices and counterpoints to government policies .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is problematic when one considers  that in the Indian context, freedom of speech and expression has always  been valued for its instrumental role in ensuring a healthy democracy,  and its power to influence public opinion. In the present case, the  government, far from facilitating any such condition, is instead  actively indulging in guardianship of the public mind (Sarkar et al,  2019).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other provisions in the IT Act which  permit for censorship of content, including section 69A, permit the  government to only do so when content is relatable to grounds enumerated  in Article 19(2) of the Constitution. In addition, in the case of &lt;i&gt;Shreya Singhal vs Union of India&lt;/i&gt;,  where, the constitutionality of section 69A was challenged, the Supreme  Court upheld the provision because of the legal safeguards inherent in  the provision, including offering a hearing to the originator of the  impugned content and reasons for censoring content to be recorded in  writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, a fact check by the Press  Information Bureau or by another authorised agency provides no such  safeguards, and does not relate to any constitutionally recognized  ground for restricting speech.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The proposed amendment to Rule 3(1)(b)(v) is unconstitutional, and should be removed from the final draft of the law.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Clarifications are needed for online games rules definitions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The definitions of an "online game" and "online gaming intermediary"  are currently extremely unclear and require further clarification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the proposed amendments stand, online games are characterised by the user's “&lt;i&gt;deposit with the expectation of earning winnings&lt;/i&gt;”. Both deposit and winnings can be “&lt;i&gt;cash&lt;/i&gt;” or “&lt;i&gt;in kind&lt;/i&gt;",  which does not adequately draw a boundary on the type of games this  amendment seeks to cover. Can the time invested by the player in playing  a game be answered under the “in kind” definition of deposit? If the  game provides a virtual in-game currency that can be exchanged for  internal power ups, even if there are no cash or gift cards used as  payout, is that considered to be an “in kind” winnings? The rules, as  currently drafted, are vague in their reference towards “in kind”  deposits and payouts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition of online games also  does not differentiate between single or multiplayer games, and  traditional games like chess which have found an audience online such as  Candy Crush (single player), Minecraft (multiplayer collaborative) or  chess (traditional). It is unclear whether these games were intended to  fall within the purview of these amendments to the rules, and if they  are all subjected to the same due diligence requirements as pay-to-play  games. This, in conjunction with the proposed rule 6A which allows the  Ministry to term any other game as an online game for the purposes of  the rules, also provides them with broad, unpredictable powers . This  ambiguity hinders clear comprehension of the expectations among the  target stakeholders, thus affecting the consistency and predictability  of the implementation of the rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, "online gaming intermediaries" are also defined very broadly as "&lt;i&gt;intermediary that offers one or more than one online game&lt;/i&gt;".  As defined, any intermediary that even hosts a link to a game is  classified as an online gaming intermediary since the game is now  "offered" through the intermediary. As drafted, there does not seem to  be a material distinction between an "intermediary" as defined by the  act and "online gaming intermediary" as specified by these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We recommend further clarification on  the definitions of these terms, especially for “in kind” and “offers”  which are currently extremely vague terms that provide overbroad powers  to the Ministry.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Intermediaries and Games&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"Online gaming intermediaries" are defined very broadly as "&lt;i&gt;intermediary that offers one or more than one online game&lt;/i&gt;". Intermediaries are defined in the Act as "&lt;i&gt;any  person who  on behalf of another person receives, stores or transmits  that message or provides any service with respect to that message&lt;/i&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the media coverage (Barik,  2023) around these amendments, it seems that there is an effort to  classify gaming companies as "online gaming intermediaries" but the  language of the drafted amendments do not support this. An  “intermediary” status is given to a company due to its functional role  in primarily offering third party content. It is not a classification  for different types of internet companies that exist and thus must not  be used to make rules for entities that do not perform this function.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not all gaming companies present a  collection of games for their users to play. According to the drafted  definition multiple platforms where games might be present like, an app  stores where multiple game developers can publish their games for access  by users, a website that lists links to online games, a social media  platform that acts as an intermediary between two users exchanging links  to games, as well as websites that host games for users to directly  access may all be classified as an "online gaming intermediary" since  they "offer" games to users. These are a rather broad range of companies  and functions to be singularly classified an "online gaming  intermediary".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We recommend a thoroughly researched  legislative solution to regulating gaming companies that operate online  rather than through amendments to intermediary rules. If some companies  are indeed to be classified as “online gaming intermediaries”, there is a  need for further reasoning on which type of gaming companies and their  functions are intermediary functions for the purposes of these Rules.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Comments can be &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/it-rules-amendment" class="internal-link"&gt;downloaded here&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-proposed-amendments-to-it-intermediary-guidelines-and-digital-media-ethics-code-rules'&gt;https://cis-india.org/internet-governance/blog/comments-to-proposed-amendments-to-it-intermediary-guidelines-and-digital-media-ethics-code-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Divyansha Sehgal and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    

   <dc:date>2023-02-07T15:21:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-the-it-rules-2021">
    <title>Comments to the draft amendments to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-the-it-rules-2021</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) presented its comments on the draft amendments to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (‘the rules’), which were released on 6 June, 2022 for public comments.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;These comments examine whether the proposed amendments are in adherence to established principles of constitutional law, intermediary liability and other relevant legal doctrines. We thank the Ministry of Electronics and Information Technology (MEITY) for allowing us this opportunity. Our comments are divided into two parts. In the first part, we reiterate some of our comments to the existing version of the rules, which we believe holds relevance for the proposed amendments as well. And in the second part, we provide issue-wise comments that we believe need to be addressed prior to finalising the amendments to the rules.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To access the full text of the Comments to the draft amendments to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, &lt;a href="https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-it-rules-2021.pdf" class="internal-link"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-the-it-rules-2021'&gt;https://cis-india.org/internet-governance/blog/comments-to-draft-amendments-to-the-it-rules-2021&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anamika Kundu, Digvijay Chaudhary, Divyansha Sehgal, Isha Suri and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2022-07-07T02:39:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017">
    <title>Comments on Information Technology (Security of Prepaid Payment Instruments) Rules, 2017</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The comments were prepared by Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;1. Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;1.1. This submission presents comments by the Centre for Internet and Society&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017 (“the Rules”).&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The Ministry of Electronics and Information Technology (MEIT) issued a consultation paper (pdf) which calls for developing a framework for security of digital wallets operating in the country on March 08, 2017. This proposed rules have been drafted under provisions of Information Technology Act, 2000, and comments have been invited from the general public and stakeholders before the enactment of these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the privacy and data security of citizens. CIS is thankful to the MEIT for this opportunity to provide feedback to the draft rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;3.1  General Comments&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Penalty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no penalty for not complying with these rules.  Even the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 doesn’t have penalties.  Under section 43A of the Information Technology Act (under which the 2011 Rules have been promulgated), a wrongful gain or a wrongful loss needs to be demonstrated.  This should not be a requirement for financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expansion to Contractual Parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A majority of these rules, in order to be effective and realistically protect consumer interest, should also be expanded to third parties, agents, contractual relationships and any other relevant relationship an e-PPI issuer may delegate as a part of their functioning.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 2: Definitions&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Certain key words relevant to the field of e-PPI based digital payments such as authorisation, metadata, etc. are not defined in the rules and should both be defined and accounted for in the rules to ensure modern developments such as big data and machine learning, digital surveillance, etc. do not violate human rights and consumer interest.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 7: Definition of personal information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 provides an exhaustive list of data that will be deemed to be personal information for the purposes of the Rules. While &lt;b&gt;information collected&lt;/b&gt; at the time of issuance of the pre-paid payment instrument and during its use is included within the scope of Rule 7, it makes no reference to metadata generated and collected by the e-PPI issuer.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.3 Rule 4: Inadequate privacy protections&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 4(2) specifies the details that the privacy policies of each e-PPI issuer must contain. However, these specifications are highly inadequate and fall well below the recommendations under the National Privacy Principles in Report of the Group of Experts on Privacy chaired by Justice A P Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: The Rules should include include clearly specified rights to access, correction and opt in/opt out, continuing obligations to seek consent in case of change in policy or purpose and deletion of data after purpose is achieved. Additionally, it must be required that a log of each version of past privacy policies be maintained along with the relevant period of applicability.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.4 Rule 10: Reasonable security practices&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Financial information (“such as bank account or credit card or debit card or other payment instrument details”) is already invoked in an inclusive manner in the definition of ‘personal information’ in Rule 7.  Given this there is no need to make the Reasonable Security Practices Rules applicable to financial data through this provisions: it already is, and it is best to avoid unnecessary redundancy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solution: This entire rule should be removed.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.5  Rule 12: Traceability&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: There is a requirement created under this rule that payment-related interactions with customers or other service providers be “appropriately trace[able]”.  But it is unclear what that would practically mean: would IP logging suffice? would IMEI need to be captured for mobile transactions? what is “appropriately” traceable? — none of those questions are answered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion: The NPCI’s practices and RBI regulations, for instance, seek to limit the amount of information that entities like e-PPI providers have.  These rules need to be brought in line with those practices and regulations.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.6 Rule 5: Risk Assessment&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 5 requires e-PPI issuers to carry out risk assessments associated with the security of the payments systems at least once a year and after any major security incident. However, there are no transparency requirements such as publications of details of such review, a summary of the analysis, any security vulnerabilities discovered etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Broaden the scope of this provision to include not just risk assessments but also security audits.&lt;/li&gt;
&lt;li&gt;Mandate publication of risk assessment and security audit reports.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.7 Rule 11: End-to-End Encryption&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The rule concerning end-to-end encryption (E2E) needs significantly greater detailing to be effective in ensuring the the protection of information at both storage and transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Elements such as Secure Element or a Secured Server and Trusted User Interface, both concepts to enable secure payments, can be detailed in the rule and a timeline can be established to require hardware, e-PPI practices and security standards to realistically account for such best practices to ensure modern, secure and industry accepted implementation of the rule.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.8 Rule 13: Retention of Information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 13 leaves the question of retention entirely unanswered by deferring the future rulemaking to the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Rule 13 should be expanded to include the various categories of information that can be stored, guidelines for the short-term (fast access) and long-term storage of the information retained under the rule and other relevant details. The rule should also include the security standards that should be followed in the storage of such information, require access logs be maintained for whenever this information is accessed by individuals, detail secure destruction practices at the end of the retention period  and finally mandate that end users be notified by the e-PPI issuer of when such retained information is accessed in all situations bar exceptional circumstances such as national security, compromising an ongoing criminal investigations, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.9 Rule 14: Reporting of Cyber Incidents&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 14 is an excellent opportunity to uphold transparency, accountability and consumer rights by mandating time- and information-bound notification of cyber incidents to customers, including intrusions, database breaches and any other compromise of the integrity of the financial system. While the requirement of reporting such incidents to CERT-In is already present in the Rule 12 of the CERT Rules, the rule retains the optional nature of notifying customers. The rule should include an exhaustive list of categories or kinds of cyber incidents that should be reported to affected end users without compromising the investigation of such breaches by private organisations and public authorities. Further, the rule should also include penalties for non-compliance of this requirement (both to CERT-In and the consumer) to serve as an incentive for e-PPI issuers to uphold consumer public interest. The rule should be expanded to include a detailed mechanism for such reporting, including when e-PPI issuers and the CERT-In can withhold information from consumers as well as requiring the withheld information be disclosed when the investigation has been completed. Finally, the rule should also require that such disclosures be public in nature and consumers not be required to not disseminate such information to enable informed choice by the end user community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) In Rule 14(3) “may” should be substituted by “shall”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Penalties of up to 5 lakh rupees may be imposed for each day that the e-PPI issuer fails to report any severe vulnerability that could likely result in harm to customers.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.10 Rule 15: Customer Awareness and Education&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 15 on Customer Awareness and Education by e-PPI issuers does not take into account the vast lingual diversity and varied socio-economic demographic that makes up the end users of e-PPI providers in India, by mandating the actions under the rule must account for these factors prior to be propagated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: The rule must ensure that e-PPI issuers track record in carrying out awareness is regularly held accountable by both the government and public disclosures on their websites. Further, the rule can be made more concrete and effective by including mobile operating systems in their scope (along with equipments), mandating awareness for best practices for inclusive technologies like USSD banking, specifying notifications to include SMS reports of financial transactions, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.11 Rule 16: Grievance Redressal&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 16 lays down the requirement of grievance redressal, without specifying appellate mechanisms (both within the organisation and at the regulatory level), accountability (via penalties) for non-compliance of the rule nor requiring a clear hierarchy of responsibility within the e-PPI organisation. These factors seriously compromise the efficacy of a grievance redressal framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Similar rules for grievance redressal that have been enacted by the Insurance Regulatory and Development Authority for the insurance sector and the Telecom Regulatory Authority of India for the telecom sector can and should serve as a reference point for this rule. Their effectiveness and real world operation should also be monitored by the relevant authorities while ensuring sufficient flexibility exists in the rule to uphold consumer rights and the public interest. Proper appellate mechanisms at the regulatory level are essential along with penalties for non-compliance.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.12 Rule 17: Security Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 17 empowers the Central Government to mandate security standards to be followed by e-PPI issuers operating in India. While appreciable in its overall outlook on ensuring a minimum standard of security, the Rule needs be improved upon to make it more effective. This can be in done by specifying certain minimum security standards to ensure all e-PPI issuers have a minimal level of security, instead of leaving them open to being intimated at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Standards that can either be made mandatory or be used as a reference point to create a new standard under Rule 17(2) are ISO/IEC 14443, IS 14202, ISO/IEC 7816, PCI DSS, etc. Further, the Rule should include penalties for non-compliance of these standards, to make them effectively enforceable by both the government and end users alike. Additional details like the maximum time period in which such security standards should be implemented post their notification, requiring regular third party audits to ensure continuing compliance and effectiveness and requiring updated standards be used upon their release will go a long way in ensuring e-PPI issuers fulfil their mandate under these Rules.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017'&gt;https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2017-03-23T01:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
