<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 121 to 135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/letter-from-civil-society-organizations-to-cii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/lecture-by-eben-moglen-mishi-choudhary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/lecture-by-eben-moglen-and-mishi-choudhary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/killing-the-internet-oped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ipv6-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/india-eu-fta-ipr-july-2010"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/invisible-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/censorship-officials-contact-details"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/publications/it-act"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg">
    <title>Letter to ICANN on NCSG</title>
    <link>https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent the following mail to ICANN regarding their attempt to impose their own charter for a Noncommercial Stakeholder Group (NCSG), instead of accepting the one drafted by the Noncommercial Users Constituency (NCUC).&lt;/b&gt;
        
&lt;p&gt;Dear Sir or Madam,&lt;/p&gt;
&lt;p&gt;Greetings from the Centre for Internet and Society - Bangalore. We are a Bangalore based research and advocacy organisation promoting consumer and citizen rights on the Internet. We currently focus on IPR reform, IPR alternatives and electronic accessibility by the disabled. Please see our website &amp;lt;http://cis-india.org&amp;gt; for more information about us and our activities.&lt;/p&gt;
&lt;p&gt;It has come to our attention that ICANN is imposing the ICANN staff-drafted charter for a Noncommercial Stakeholder Group (NCSG) and ignoring the version drafted by civil society. As you know, the civil society version was drafted using a consensus process and more than 80 international noncommercial organizations, including mine, support it.&lt;/p&gt;
&lt;p&gt;This is an unacceptable situation since the governance structures contained within the NCSG charter determine how effectively noncommercial users can influence policy decisions at ICANN in years to come. On behalf of Internet users in India - I would strongly urge you to reject the staff drafted version of the charter and adopt the version drafted and endorsed by civil society.&lt;/p&gt;
&lt;p&gt;Best wishes,&lt;/p&gt;
&lt;p&gt;Sunil Abraham&lt;br /&gt;Executive Director&lt;br /&gt;Centre for Internet and Society&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg'&gt;https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Digital Pluralism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2011-08-02T07:41:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations">
    <title>Letter on South Africa's IPRs from Publicly Financed R&amp;D Regulations</title>
    <link>https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations</link>
    <description>
        &lt;b&gt;Being interested in legislations in developing nations styled after the United States' Bayh-Dole Act, CIS responded to the call issued by the South African Department of Science and Technology for comments to the Intellectual Property Rights from Publicly Financed Research and Development Regulations.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations'&gt;https://cis-india.org/a2k/blogs/letter-on-south-africas-iprs-from-publicly-financed-r-d-regulations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    

   <dc:date>2011-08-04T04:42:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/letter-from-civil-society-organizations-to-cii">
    <title>Letter from Civil Society Organizations to CII</title>
    <link>https://cis-india.org/news/letter-from-civil-society-organizations-to-cii</link>
    <description>
        &lt;b&gt;A total of 29 groups and individuals expressed their concern about the drive by CII to introduce TRIPS-plus enforcement standards in India.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.business-standard.com/india/news/govt-accepts-panel-report-against-narrowingindian-patent-law/367342/"&gt;Original report in Business Standard&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Govt accepts panel report against narrowing of Indian patent law&lt;/h2&gt;
&lt;p&gt;BS Reporter / New Delhi August 18, 2009, 1:14 IST&lt;/p&gt;
&lt;p&gt;The central government has accepted the recommendations of an expert committee headed by former Council of Scientific and Industrial Research (CSIR) chief R A Mashelkar on patent laws. The committee had concluded that limiting the grant of patents for pharmaceutical substances to new chemical entities will be a violation of the TRIPS agreement of the World Trade Organization (WTO).&lt;/p&gt;
&lt;p&gt;In effect, the committee endorsed the current position taken by India, in allowing patenting of known medicines if they have substantial new therapeutic uses.&lt;/p&gt;
&lt;p&gt;The Mashelkar committee was formed after the government got passed the Patent Bill in 2005. It was assigned to see if the demand for narrowing the patent laws would breach India’s obligations under the WTO agreement. Mashelkar had presented the committee report in 2007, only for it to be withdrawn due to complaints of “technical errors”. The revised copy, submitted to the government few months ago, was accepted recently.&lt;/p&gt;
&lt;p&gt;The move has come as a setback to many civic groups who were hoping to see a a constriction of Indian patent laws. The domestic lobby groups were heartened after a committee of Parliamentarians recently recommended changes in the existing rules to limit patenting of medicines to just “new chemical entities”.&lt;/p&gt;
&lt;p&gt;In a letter to commerce minister Anand Sharma, the National Working Group on Patent Laws asked for the “recommendations of the Parliamentary Committee to take precedence over those of the Mashelkar committee.” It wanted the Mashelkar committee recommendations to be disregarded and appropriate amendments introduced in the Patents Act, 1970.&lt;/p&gt;
&lt;p&gt;The civil society groups are stepping up protest against the “alleged” move to link “counterfeit” issues with intellectual property protection. In an open letter to Confederation of Indian Industry today, 21 groups have protested against the intellectual property enforcement initiatives of the CII.&lt;/p&gt;
&lt;p&gt;“It is disheartening to note that the CII, being an Indian industry organization, is hosting the Third International Conference on Counterfeiting and Piracy from 19-20th August 2009 in partnership with American Embassy and the Quality Brand Protection Committee (QBPC), China, a body that comprises over 80 multinational corporations”, Linu Mathew Phillip, acting director of the Delhi-based Centre for Trade and Development said. “It is of immense concern to all of us, since higher norms of intellectual property enforcement necessarily undermine various other rights of the people at large, including the right to access to medicines and access to knowledge,” he added.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/letter-from-civil-society-organizations-to-cii'&gt;https://cis-india.org/news/letter-from-civil-society-organizations-to-cii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T15:15:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/lecture-by-eben-moglen-mishi-choudhary">
    <title>Lecture by Eben Moglen and Mishi Choudhary</title>
    <link>https://cis-india.org/a2k/blogs/lecture-by-eben-moglen-mishi-choudhary</link>
    <description>
        &lt;b&gt;The Software Freedom Law Center, National Law School, and the Centre for Internet and Society organised a lecture by Mishi Choudhary and Eben Moglen for students of NLS on Saturday, December 13, 2008.&lt;/b&gt;
        
&lt;p&gt;Saturday, December 13, 2008 had Mishi Choudhary and Eben Moglen of the New York-based Software Freedom Law Center speaking to the students of the National Law School of India University in Nagarbhavi, Bangalore, in a talk organized by CIS.&lt;br /&gt;&lt;br /&gt;Mishi Choudhary, who will head the Software Freedom Law Center in New Delhi, spoke on "Globalising Public Interest Law: The SFLC Model".&amp;nbsp; She told the students about the importance of non-profit legal work as well as its viability as a career choice.&amp;nbsp; She also laid out the background to the work that SFLC does, and traced a brief history of software patent cases &lt;br /&gt;&lt;br /&gt;Eben Moglen chose to speak on "Who Killed Intellectual Property and Why We Did It?".&amp;nbsp; He started off by talking of the interconnections between law and societal change: how law can't keep pace with the changes we see around us, and how law actually sometimes changes in the reverse direction, while trying to maintain the status quo.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;This is not a new phenomenon, he noted, and that when law is responsive to anybody, it listens to the 'people of the past' more carefully than the 'people of the future'.&amp;nbsp; This, he says, is compounded by the fact that the primary mode of change in the law is not legislation (since there is nothing legislators hate more than legislating), and that the better lawyers usually represent only those who can afford to pay them, hence resulting in systemic injustice.&amp;nbsp; He emphasised that the clients of the SFLC, on the other hand, are people who create software worth billions of dollars, but who do not own it.&lt;br /&gt;&lt;br /&gt;On that point of creation for the purpose of sharing and not owning, a student raised the question of why proprietary rights shouldn't exist in creations of the intellect.&amp;nbsp; In response Mr. Moglen pointed out that while his personal opinions might be different, the Software Freedom Law Center does not seek to bring into dispute the concept of property rights in software, nor the fundamentals of patent law: it is merely concerned with the scope of patent law, and seeks a literal enforcement of patent law as it exists in most jurisdictions.&lt;br /&gt;&lt;br /&gt;Another question that cropped up was on the economics of software creation and the anti-competitive nature of free software.&amp;nbsp; To this, Mr. Moglen provided a brief summary of the tragedy of the anticommons by using land to be acquired for public works in the centre of a city as an example.&amp;nbsp; In software, this problem is only exacerbated, he pointed out.&amp;nbsp; Most physical creations over which patents are granted have something like 8 or 10 steps.&amp;nbsp; Software code is different because it contains thousands of instructions.&amp;nbsp; Even big companies face the anticommons problem; but they manage to evade it by cross-licensing agreements which results in efficient transactions for them since it involves no exchange of money whatsoever.&amp;nbsp; Small companies are in a worse situation, since they don't have those kinds of patent portfolios to be able to enter into cross-licensing agreements, no matter how innovative they are.&amp;nbsp; Thus, in effect, the system is rigged against them.&amp;nbsp; This provides a partial answer to the antitrust question, he noted.&amp;nbsp; Competition law is actual in favour of free software.&amp;nbsp; The right to practise a trade or profession, and the right to speech get implicated in any case where a FLOSS-based company is hauled up before a court being accused of conspiring with other to take cost to zero.&lt;br /&gt;&lt;br /&gt;Mr. Moglen further explained that when it comes to software, the problem of patenting is very different.&amp;nbsp; A 20-year monopoly is more reasonable from the viewpoint of physical creations.&amp;nbsp; Patent law, however doesn't tailor the rights that are granted by a patent.&amp;nbsp; The problem starts right from the process of granting a patent.&amp;nbsp; The job of a patent office being to apply the tests of non-obviousness, novelty and utility, most patent offices can do a reasonable job in most fields of technological endeavour, since there is a large body of innovation with which the proposed patent can be compared.&amp;nbsp; Software, however, is a recent field with a large number of applications coming in all at once.&amp;nbsp; While the patents that are sought might include claims on ideas and applications that existed in software in 1956, those aren't easy for the patent offices to dig up, since the field of software patents and software itself have not existed for the same length of time.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/lecture-by-eben-moglen-mishi-choudhary'&gt;https://cis-india.org/a2k/blogs/lecture-by-eben-moglen-mishi-choudhary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-08-23T02:55:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/lecture-by-eben-moglen-and-mishi-choudhary">
    <title>Lecture by Eben Moglen and Mishi Choudhary</title>
    <link>https://cis-india.org/events/lecture-by-eben-moglen-and-mishi-choudhary</link>
    <description>
        &lt;b&gt;Software Freedom Law Center, National Law School of India University and Centre for Internet and Society jointly organize a lecture by Eben Moglen and Mishi Choudhary.&lt;/b&gt;
        
&lt;p&gt;The Software Freedom Law Center (SFLC), National Law School of India University (NLSIU), and the Centre for Internet and Society (CIS) are organizing a lecture by Prof. Eben Moglen of Columbia University and Ms. Mishi Choudhary, head of the New Delhi branch of SFLC.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;img class="image-inline" src="../upload/ebenmoglen.jpg/image_preview" alt="Eben Moglen" /&gt;&lt;/p&gt;
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Prof. Moglen will be speaking on "&lt;strong&gt;Who Killed Intellectual Property and Why We Did It&lt;/strong&gt;", and Ms. Choudhary will be speaking on "&lt;strong&gt;Globalising Public Interest Law: The SFLC Model&lt;/strong&gt;".&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Venue&lt;/strong&gt;:&lt;br /&gt;National Law School of India University,&lt;br /&gt;Gnana Bharathi Main Road,&lt;br /&gt;Nagarbhavi,&lt;br /&gt;Bangalore&lt;br /&gt;[map: http://bit.ly/nlsiu-map]&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Date and Time&lt;/strong&gt;:&lt;br /&gt;Saturday, December 13, 2008&lt;br /&gt;12:30-13:30&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/lecture-by-eben-moglen-and-mishi-choudhary'&gt;https://cis-india.org/events/lecture-by-eben-moglen-and-mishi-choudhary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-05T04:42:05Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/killing-the-internet-oped">
    <title>Killing the Internet Softly with Its Rules</title>
    <link>https://cis-india.org/internet-governance/blog/killing-the-internet-oped</link>
    <description>
        &lt;b&gt;While regulation of the Internet is a necessity, the Department of IT, through recent Rules under the IT Act, is guilty of over-regulation. This over-regulation is not only a bad idea, but is unconstitutional, and gravely endangers freedom of speech and privacy online.&lt;/b&gt;
        
&lt;div class="visualClear"&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;A slightly modified version of this blog entry was published as &lt;/span&gt;&lt;a class="external-link" href="http://www.indianexpress.com/story-print/787789/"&gt;an op-ed in the Indian Express on May 9, 2011&lt;/a&gt;&lt;span class="Apple-style-span"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h2&gt;Over-regulation of the Internet&lt;br /&gt;&lt;/h2&gt;
&lt;div class="visualClear"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Regulation of the Internet, as with
regulation of any medium of speech and commerce, is a balancing act.
Too little regulation and you ensure that criminal activities are
carried on with impunity; too much regulation and you curb the
utility of the medium.  This is especially so with the Internet, as
it has managed to be the impressively vibrant space it is due to a
careful choice in most countries of eschewing over-regulation. 
India, however, seems to be taking a different turn with a three sets
of new rules under the Information Technology Act.&lt;/p&gt;
&lt;p&gt;These rules deal with the liability of
intermediaries (i.e., a large, inclusive, group of entities and
individuals, that transmit and allow access to third-party content),
the safeguards that cybercafes need to follow if they are not to be
held liable for their users' activities, and the practices that
intermediaries need to follow to ensure security and privacy of
customer data.&lt;/p&gt;
&lt;h3&gt;Effect of not following the rules&lt;/h3&gt;
&lt;p&gt;By not observing any of the provisions
of these Rules, the intermediary opens itself up for liability for
actions of its users.  Thus, if a third-party defames someone, then
the intermediary can be held liable if he/she/it does not follow the
stringent requirements of the Rules.&lt;/p&gt;
&lt;p&gt;The problem, however is that, many of
the provisions of the Rules have no rational nexus with the due
diligence to be observed by the intermediary to absolve itself from
liability.&lt;/p&gt;
&lt;h3&gt;What does the Act require?&lt;/h3&gt;
&lt;p&gt;Section 79 of the IT Act states that
intermediaries are generally not liable for third party information,
data, or communication link made available or hosted.  It qualifies
that by stating that they are not liable if they follow certain
precautions (basically, to show that they are &lt;em&gt;real&lt;/em&gt;
intermediaries).  They observe 'due diligence' and don't exercise an
editorial role; they don't help or induce  commission of the unlawful
act; and upon receiving 'actual knowledge', or on being duly notified
by the appropriate authority, the intermediary takes steps towards
some kind of action.&lt;/p&gt;
&lt;p&gt;So, rules were needed to clarify what
'due diligence' involves (i.e., to state that no active monitoring is
required of ISPs), what 'actual knowledge' means, and to clarify what
happens in happens in case of conflicts between this provision and
other parts of IT Act and other Acts.&lt;/p&gt;
&lt;h3&gt;Impact on freedom of speech and privacy&lt;/h3&gt;
&lt;p&gt;However, that is not what the rules do.
 The rules instead propose standard terms of service to be notified
by all intermediaries.  This means everyone from Airtel to Hotmail to
Facebook to Rediff Blogs to Youtube to organizations and people that
allow others to post comments on their website.  What kinds of terms
of service?  It will require intermediaries to bar users from
engaging in speech that is disparaging', It doesn't cover only
intermediaries that are public-facing.  So this means that your
forwarding a joke via e-mail, which "belongs to another person
and to which the user does not have any right" will be deemed to
be in violation of the new rules.&amp;nbsp; While gambling (such as betting on
horses) isn’t banned in India and casino gambling is legal in Goa,
for example, under these Rules, all speech ‘promoting gambling’
is prohibited.&lt;/p&gt;
&lt;p&gt;The rules are very onerous on
intermediaries, since they require them to act within 36 hours to
disable access to any information that they receive a complaint
about.  Any 'affected person' can complain.  Intermediaries will now
play the role that judges have traditionally played. Any affected
person can bring forth a complaint about issues as diverse as
defamation, blasphemy, trademark infringement, threatening of
integrity of India, 'disparaging speech', or the blanket 'in
violation of any law'.  It is not made mandatory to give the actual
violator an opportunity to be heard, thus violating the cardinal
principle of natural justice of 'hearing the other party' before
denying them a fundamental right.  Many parts of the Internet are in
fact public spaces and constitute an online public sphere.  A law
requiring private parties to curb speech in such a public sphere is
unconstitutional insofar as it doesn't fall within Art.19(2) of the
Constitution.&lt;/p&gt;
&lt;p&gt;Since intermediaries would lose
protection from the law if they don't take down content, they have no
incentives to uphold freedom of speech of their users.  They instead
have been provided incentives to take down all content about which
they receive complaints without bothering to apply their minds and
coming to an actual conclusion that the content violates the rules.&lt;/p&gt;
&lt;h3&gt;Cybercafe rules&lt;/h3&gt;
&lt;p&gt;The cybercafe rules require all
cybercafe customers be identified with supporting documents, their
photographs taken, all their website visit history logged, and these
logs maintained for a year.  Compare this to the usage of public
pay-phones.  Anyone can use a pay-phone without their details being
logged.  Indeed, such logging allows for cybercafe owners to
blackmail their users if they find some embarrassing websites in the
history logs—which could be anything from medical diseases to
sexual orientation to the fact that you're a whistleblower.&lt;/p&gt;
&lt;p&gt;The cybercafe rules also require that
all of them install "commercially available safety or filtering
software" to prevent access to pornography.  In two cases along
these lines in the Madras High Court (&lt;em&gt;Karthikeyan R.&lt;/em&gt; v. &lt;em&gt;Union
of India&lt;/em&gt;) and the Bombay High Court (&lt;em&gt;Janhit Manch &lt;/em&gt;v.
&lt;em&gt;Union of India&lt;/em&gt;), the High Courts refused to direct the
government to take proactive steps to curb access to Internet
pornography stating that such matters require case-by-case analysis
to be constitutionally valid under Art.19(1)(a) [Right to freedom of
speech and expression].&lt;/p&gt;
&lt;p&gt;Such software tends to be very
ineffective—non-pornographic websites also get wrongly filtered,
and not all pornographic websites get filtered—and the High Courts
were right in being wary of any blanket ban. They preferred for
individual cases to be registered.  If the worry is that our children
are getting corrupted, it is up to parents to provide supervision,
and not for the government to insist that software do the parenting
instead.&lt;/p&gt;
&lt;p&gt;Given that all of these were pointed
out by both civil society organizations, news media, and industry
bodies, when the draft rules were released, it smacks of governmental
high-handedness that almost none of the changes suggested by the
public have been incorporated in the final rules.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/killing-the-internet-oped'&gt;https://cis-india.org/internet-governance/blog/killing-the-internet-oped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2011-08-20T12:51:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives">
    <title>Killing of Yameen Rasheed Reveals Worsening Human Rights Situation in the Maldives</title>
    <link>https://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives</link>
    <description>
        &lt;b&gt;A courageous liberal blogger in the Maldives was murdered for his words.  The international community needs to act.&lt;/b&gt;
        &lt;p&gt;The fight for freedom of expression is often abstract.  On Sunday, it became personal for me: Yameen Rasheed, a courageous human rights defender and blogger in the Maldives, &lt;a href="https://www.nytimes.com/2017/04/23/world/asia/yameen-rasheed-dead-maldives-blogger-dead.html?smid=tw-nytimesworld&amp;amp;smtyp=cur&amp;amp;_r=0"&gt;was brutally murdered just outside his apartment&lt;/a&gt;.  Yameen ran the popular blog &lt;a href="http://thedailypanic.com"&gt;The Daily Panic&lt;/a&gt; in which he sought to "cover and comment upon the news, satirize the frequently unsatirizable politics of Maldives, and also provide a platform to capture and highlight the diversity of Maldivian opinion".  In this blog he often ended up rubbing the powerful the wrong way, with politicians and religious bigots often finding themselves at the receiving end of his satire.&lt;/p&gt;
&lt;p&gt;Yameen wasn't the first human rights activist to be attacked.  He also led the campaign to force the police to conduct a proper investigation on the &lt;a href="http://findmoyameehaa.com/"&gt;forced disappearance in August 2014&lt;/a&gt; of journalist Ahmed Rilwan &lt;a href="https://twitter.com/moyameeha"&gt;@moyameehaa&lt;/a&gt;, whom he counted as his closest friend.  This campaign made him a target as well.&lt;/p&gt;
&lt;p&gt;When there was a crackdown on the largest pro-democracy rally in Malé on 1st May 2015, &lt;a href="http://thedailypanic.com/2015/06/dhoonidhoo-diaries-part-1-arrest-and-incarceration/"&gt;Yameen became a political prisoner&lt;/a&gt;: he was remanded in jail for 17 days, and then moved to house arrest.  Hundreds of others were also arrested then.  Some opposition leaders continue to remain in jail.  Sheikh Imran Abdulla, the leader of the [Adhaalath Party] who spoke at that rally, was convicted on charges of terrorism and &lt;a href="https://www.theguardian.com/world/2016/feb/17/maldives-court-jails-opposition-figure-sheikh-imran-abdulla-for-12-years"&gt;sentenced to 12 years' imprisonment&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As a result of his advocacy for freedom of religion and freedom of expression in the Maldives, Yameen &lt;a href="https://twitter.com/yaamyn/status/711796772985659392"&gt;received death threats&lt;/a&gt; on multiple occasions that he reported to the police, who refused to do anything about those complaints.&lt;/p&gt;
&lt;p&gt;Why, despite receiving death threats did Yameen continue to voice his opinions fearlessly?  When asked, "Do you have a death wish?", &lt;a href="https://twitter.com/yaamyn/status/630344675958718464"&gt;he replied&lt;/a&gt;: "No. I have a dignified life wish."&lt;/p&gt;
&lt;p&gt;Amnesty International has called upon the Maldivian authorities to conduct a full investigation into this killing.  I, however, believe that there is no hope for justice from the very police that refused to protect Yameen, and whom he held to be complicit in the disappearance of Rilwan.  As Yameen said in 2015, &lt;a href="https://twitter.com/yaamyn/status/569766158926131200"&gt;it is time for the international community to act&lt;/a&gt;.  I hope each of you reading this contacts your external affairs ministry and asks them to apply pressure on the Maldivian authorities, and push for an international investigation into the breakdown of human rights in the Maldives.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives'&gt;https://cis-india.org/internet-governance/blog/yameen-rasheed-human-rights-maldives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Maldives</dc:subject>
    

   <dc:date>2017-04-25T10:12:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann">
    <title>Jurisdiction: The Taboo Topic at ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann</link>
    <description>
        &lt;b&gt;The "IANA Transition" that is currently underway is a sham since it doesn't address the most important question: that of jurisdiction.  This article explores why the issue of jurisdiction is the most important question, and why it remains unaddressed.&lt;/b&gt;
        &lt;br /&gt;
&lt;p&gt;In March 2014, the &lt;a href="https://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced&lt;/a&gt; that they were going to end the contract they have with ICANN to run the &lt;a href="https://www.iana.org/"&gt;Internet Assigned Numbers Authority&lt;/a&gt; (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;h2 id="why-is-the-u.s.-government-removing-the-ntia-contract"&gt;Why is the U.S. government removing the NTIA contract?&lt;/h2&gt;
&lt;p&gt;The main reason for the U.S. government's action is that it will get rid of a political thorn in the U.S. government's side: keeping the contract allows them to be called out as having a special role in Internet governance (with the Affirmation of Commitments between the U.S. Department of Commerce and ICANN, the IANA contract, and the cooperative agreement with Verisign), and engaging in unilateralism with regard to the operation of the root servers of the Internet naming system, while repeatedly declaring that they support a multistakeholder model of Internet governance.&lt;/p&gt;
&lt;p&gt;This contradiction is what they are hoping to address. Doing away with the NTIA contract will also increase — ever so marginally — ICANN’s global legitimacy: this is something that world governments, civil society organizations, and some American academics have been asking for nearly since ICANN’s inception in 1998. For instance, here are some demands made &lt;a href="https://www.itu.int/net/wsis/docs2/pc3/contributions/sca/hbf-29.doc"&gt;in a declaration by the Civil Society Internet Governance Caucus at WSIS, in 2005&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“ICANN will negotiate an appropriate host country agreement to replace its California Incorporation, being careful to retain those aspects of its California Incorporation that enhance its accountability to the global Internet user community. &amp;quot;ICANN's decisions, and any host country agreement, must be required to comply with public policy requirements negotiated through international treaties in regard to, inter alia, human rights treaties, privacy rights, gender agreements and trade rules. … &amp;quot;It is also expected that the multi-stakeholder community will observe and comment on the progress made in this process through the proposed [Internet Governance] Forum.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In short: the objective of the transition is political, &lt;a href="https://cis-india.org/internet-governance/blog/"&gt;not technical&lt;/a&gt;. In an ideal world, we &lt;em&gt;should&lt;/em&gt; aim at reducing U.S. state control over the core of the Internet's domain name system.&lt;a href="#fn1" class="footnoteRef" id="fnref1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It is our contention that &lt;strong&gt;U.S. state control over the core of the Internet's domain name system is &lt;em&gt;not&lt;/em&gt; being removed&lt;/strong&gt; by the transition that is currently underway.&lt;/p&gt;
&lt;h2 id="why-is-the-transition-happening-now"&gt;Why is the Transition Happening Now?&lt;/h2&gt;
&lt;p&gt;Despite the U.S. government having given commitments in the past that were going to finish the IANA transition by &amp;quot;September 30, 2000&amp;quot;, (the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; states: &amp;quot;The U.S. Government would prefer that this transition be complete before the year 2000. To the extent that the new corporation is established and operationally stable, September 30, 2000 is intended to be, and remains, an 'outside' date.&amp;quot;) and later by &amp;quot;fall of 2006&amp;quot;,&lt;a href="#fn2" class="footnoteRef" id="fnref2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt; those turned out to be empty promises. However, this time, the transition seems to be going through, unless the U.S. Congress manages to halt it.&lt;/p&gt;
&lt;p&gt;However, in order to answer the question of &amp;quot;why now?&amp;quot; fully, one has to look a bit at the past.&lt;/p&gt;
&lt;p&gt;In 1998, through the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; the U.S. government &lt;a href="http://www.icannwatch.org/archive/mueller_icann_and_internet_governance.pdf"&gt;asserted it’s control over the root&lt;/a&gt;, and asserted — some would say arrogated to itself — the power to put out contracts for both the IANA functions as well as the 'A' Root (i.e., the Root Zone Maintainer function that Network Solutions Inc. then performed, and continues to perform to date in its current avatar as Verisign). The IANA functions contract — a periodically renewable contract — was awarded to ICANN, a California-based non-profit corporation that was set up exclusively for this purpose, but which evolved around the existing IANA (to placate the Internet Society).&lt;/p&gt;
&lt;p&gt;Meanwhile, of course, there were criticisms of ICANN from multiple foreign governments and civil society organizations. Further, despite it being a California-based non-profit on contract with the government, domestically within the U.S., there was pushback from constituencies that felt that more direct U.S. control of the DNS was important.&lt;/p&gt;
&lt;p&gt;As Goldsmith and Wu summarize:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;Milton Mueller and others have shown that ICANN’s spirit of “self-regulation” was an appealing label for a process that could be more accurately described as the U.S. government brokering a behind-the-scenes deal that best suited its policy preferences ... the United States wanted to ensure the stability of the Internet, to fend off the regulatory efforts of foreign governments and international organizations, and to maintain ultimate control. The easiest way to do that was to maintain formal control while turning over day-to-day control of the root to ICANN and the Internet Society, which had close ties to the regulation-shy American technology industry.&amp;quot; [footnotes omitted]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;And that brings us to the first reason that the NTIA announced the transition in 2014, rather than earlier.&lt;/p&gt;
&lt;h3 id="icann-adjudged-mature-enough"&gt;ICANN Adjudged Mature Enough&lt;/h3&gt;
&lt;p&gt;The NTIA now sees ICANN as being mature enough: the final transition was announced 16 years after ICANN's creation, and complaints about ICANN and its legitimacy had largely died down in the international arena in that while. Nowadays, governments across the world send their representatives to ICANN, thus legitimizing ICANN. States have largely been satisfied by participating in the Government Advisory Council, which, as its name suggests, only has advisory powers. Further, unlike in the early days, there is &lt;a href="http://www.internetgovernance.org/2012/05/24/threat-analysis-of-itus-wcit-part-1-historical-context/"&gt;no serious push for states assuming control of ICANN&lt;/a&gt;. Of course they grumble about the ICANN Board not following their advice, but no government, as far as I am aware, has walked out or refused to participate.&lt;/p&gt;
&lt;h3 id="laffaire-snowden"&gt;L'affaire Snowden&lt;/h3&gt;
&lt;p&gt;Many within the United States, and some without, believe that the United States not only plays an exceptional role to play in the running of the Internet — by dint of historical development and dominance of American companies — but that &lt;em&gt;it ought to&lt;/em&gt; have an exceptional role because it is the best country to exercise 'oversight' over 'the Internet' (often coming from &lt;a href="http://www.wsj.com/articles/SB10001424052702303563304579447362610955656"&gt;clueless commentators&lt;/a&gt;), and from dinosaurs of the Internet era, like &lt;a href="http://www.circleid.com/posts/20140316_if_the_stakeholders_already_control_the_internet_netmundial_iana/"&gt;American IP lawyers&lt;/a&gt; and &lt;a href="http://www.lawfareblog.com/2014/03/who-controls-the-internet-address-book-icann-ntia-and-iana/"&gt;American 'homeland' security hawks&lt;/a&gt;, Jones Day, who are ICANN's lawyers, and other &lt;a href="http://homepages.wmich.edu/~cooneys/poems/cummings.nextto.html"&gt;jingoists&lt;/a&gt; and those policymakers who are controlled by these narrow-minded interests.&lt;/p&gt;
&lt;p&gt;The Snowden revelations were, in that way, a godsend for the NTIA, as it allowed them a fig-leaf of &lt;a href="http://www.ft.com/cms/s/0/4529516c-c713-11e3-889e-00144feabdc0.html"&gt;international&lt;/a&gt; &lt;a href="https://www.rt.com/usa/nsa-fallout-relinquish-internet-oversight-002/"&gt;criticism&lt;/a&gt; &lt;a href="https://twitter.com/carolinegreer/status/454253411576598528"&gt;with which&lt;/a&gt; to counter these domestic critics and carry on with a transition that they have been seeking to put into motion for a while. The Snowden revelations led Dilma Rousseff, President of Brazil, to state in September 2013, at the 68th U.N. General Assembly, that Brazil would &amp;quot;present proposals for the establishment of a &lt;a href="https://gadebate.un.org/sites/default/files/gastatements/68/BR_en.pdf"&gt;civilian multilateral framework for the governance and use of the Internet&lt;/a&gt;&amp;quot;, and as &lt;a href="https://icannwiki.com/Diego_Canabarro"&gt;Diego Canabarro&lt;/a&gt; points out this catalysed the U.S. government and the technical community into taking action.&lt;/p&gt;
&lt;p&gt;Given this context, a few months after the Snowden revelations, the so-called &lt;a href="https://www.apnic.net/community/ecosystem/i*orgs"&gt;I* organizations&lt;/a&gt; met — seemingly with the blessing of the U.S. government&lt;a href="#fn3" class="footnoteRef" id="fnref3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt; — in Montevideo, and put out a &lt;a href="https://www.apnic.net/publications/news/2013/montevideo-statement-on-future-of-internet-cooperation"&gt;'Statement on the Future of Internet Governance'&lt;/a&gt; that sought to link the Snowden revelations on pervasive surveillance with the need to urgently transition the IANA stewardship role away from the U.S. government. Of course, the signatories to that statement knew fully well, as did most of the readers of that statement, that there is no linkage between the Snowden revelations about pervasive surveillance and the operations of the DNS root, but still they, and others, linked them together. Specifically, the I* organizations called for &amp;quot;accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.&amp;quot;&lt;/p&gt;
&lt;p&gt;One could posit the existence of two other contributing factors as well.&lt;/p&gt;
&lt;p&gt;Given political realities in the United States, a transition of this sort is probably best done before an ultra-jingoistic President steps into office.&lt;/p&gt;
&lt;p&gt;Lastly, the ten-yearly review of the World Summit on Information Society was currently underway. At the original WSIS (as seen from the civil society quoted above) the issue of US control over the root was a major issue of contention. At that point (and during where the 2006 date for globalization of ICANN was emphasized by the US government).&lt;/p&gt;
&lt;h2 id="why-jurisdiction-is-important"&gt;Why Jurisdiction is Important&lt;/h2&gt;
&lt;p&gt;Jurisdiction has a great many aspects. &lt;em&gt;Inter alia&lt;/em&gt;, these are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal sanctions applicable to changes in the root zone (for instance, what happens if a country under US sanctions requests a change to the root zone file?)&lt;/li&gt;
&lt;li&gt;Law applicable to resolution of contractual disputes with registries, registrars, etc.&lt;/li&gt;
&lt;li&gt;Law applicable to labour disputes.&lt;/li&gt;
&lt;li&gt;Law applicable to competition / antitrust law that applies to ICANN policies and regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to disputes regarding ICANN decisions, such as allocation of gTLDs, or non-renewal of a contract.&lt;/li&gt;
&lt;li&gt;Law applicable to consumer protection concerns.&lt;/li&gt;
&lt;li&gt;Law applicable to financial transparency of the organization.&lt;/li&gt;
&lt;li&gt;Law applicable to corporate condition of the organization, including membership rights.&lt;/li&gt;
&lt;li&gt;Law applicable to data protection-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to trademark and other speech-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to legal sanctions imposed by a country against another.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some of these, but not all, depend on where bodies like ICANN [the policy-making body], the IANA functions operator [the proposed &amp;quot;Post-Transition IANA&amp;quot;], and the root zone maintainer are incorporated or maintain their primary office, while others depend on the location of the office [for instance, Turkish labour law applies for the ICANN office in Istanbul], while yet others depend on what's decided by ICANN in contracts (for instance, the resolution of contractual disputes with ICANN, filing of suits with regard to disputes over new generic TLDs, etc.).&lt;/p&gt;
&lt;p&gt;However, an issue like sanctions, for instance, depends on where ICANN/PTI/RMZ are incorporated and maintain their primary office.&lt;/p&gt;
&lt;p&gt;As &lt;a href="http://content.netmundial.br/contribution/roadmap-for-globalizing-iana-four-principles-and-a-proposal-for-reform-a-submission-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/96"&gt;Milton Mueller notes&lt;/a&gt;, the current IANA contract &amp;quot;requires ICANN to be incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;He further notes that:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;While it is common to assert that the U.S. has never abused its authority and has always taken the role of a neutral steward, this is not quite true. During the controversy over the .xxx domain, the Bush administration caved in to domestic political pressure and threatened to block entry of the domain into the root if ICANN approved it (Declaration of the Independent Review Panel, 2010). It took five years, an independent review challenge and the threat of litigation from a businessman willing to spend millions to get the .xxx domain into the root.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus it is clear that even if the NTIA's role in the IANA contract goes away, jurisdiction remains an important issue.&lt;/p&gt;
&lt;h2 id="u.s.-doublespeak-on-jurisdiction"&gt;U.S. Doublespeak on Jurisdiction&lt;/h2&gt;
&lt;p&gt;In March 2014, when NTIA finally announced that they would hand over the reins to “the global multistakeholder community”. They’ve laid down two procedural condition: that it be developed by stakeholders across the global Internet community and have broad community consensus, and they have proposed 5 substantive conditions that any proposal must meet:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and,&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;li&gt;Must not replace the NTIA role with a solution that is government-led or an inter-governmental organization.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In that announcement there is no explicit restriction on the jurisdiction of ICANN (whether it relate to its incorporation, the resolution of contractual disputes, resolution of labour disputes, antitrust/competition law, tort law, consumer protection law, privacy law, or speech law, and more, all of which impact ICANN and many, but not all, of which are predicated on the jurisdiction of ICANN’s incorporation), the jurisdiction(s) of the IANA Functions Operator(s) (i.e., which executive, court, or legislature’s orders would it need to obey), and the jurisdiction of the Root Zone Maintainer (i.e., which executive, court, or legislature’s orders would it need to obey).&lt;/p&gt;
&lt;p&gt;However, Mr. Larry Strickling, the head of the NTIA, in his &lt;a href="https://www.youtube.com/watch?v=8v-yWye5I0w&amp;amp;feature=youtu.be"&gt;testimony before the U.S. House Subcommittee on Communications and Technology&lt;/a&gt;, made it clear that,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“Frankly, if [shifting ICANN or IANA jurisdiction] were being proposed, I don't think that such a proposal would satisfy our criteria, specifically the one that requires that security and stability be maintained.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Possibly, that argument made sense in 1998, due to the significant concentration of DNS expertise in the United States. However, in 2015, that argument is hardly convincing, and is frankly laughable.&lt;a href="#fn4" class="footnoteRef" id="fnref4"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Targetting that remark, in ICANN 54 at Dublin, we asked Mr. Strickling:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;So as we understand it, the technical stability of the DNS doesn't necessarily depend on ICANN's jurisdiction being in the United States. So I wanted to ask would the US Congress support a multistakeholder and continuing in the event that it's shifting jurisdiction.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Mr. Strickling's response was:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;No. I think Congress has made it very clear and at every hearing they have extracted from Fadi a commitment that ICANN will remain incorporated in the United States. Now the jurisdictional question though, as I understand it having been raised from some other countries, is not so much jurisdiction in terms of where ICANN is located. It's much more jurisdiction over the resolution of disputes.&lt;/p&gt;
&lt;p&gt;&amp;quot;And that I think is an open issue, and that's an appropriate one to be discussed. And it's one I think where ICANN has made some movement over time anyway.&lt;/p&gt;
&lt;p&gt;&amp;quot;So I think you have to ... when people use the word jurisdiction, we need to be very precise about over what issues because where disputes are resolved and under what law they're resolved, those are separate questions from where the corporation may have a physical headquarters.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As we have shown above, jurisdiction is not only about the jurisdiction of &amp;quot;resolution of disputes&amp;quot;, but also, as Mueller reminds us, about the requirement that ICANN (and now, the PTI) be &amp;quot;incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;In essence, the U.S. government has essentially said that they would veto the transition if the jurisdiction of ICANN or PTI's incorporation were to move out of the U.S., and they can prevent that from happening &lt;em&gt;after&lt;/em&gt; the transition, since as things stand ICANN and PTI will still come within the U.S. Congress's jurisdiction.&lt;/p&gt;
&lt;h2 id="why-has-the-icg-failed-to-consider-jurisdiction"&gt;Why Has the ICG Failed to Consider Jurisdiction?&lt;/h2&gt;
&lt;p&gt;Will the ICG proposal or the proposed new ICANN by-laws reduce existing U.S. control? No, they won't. (In fact, as we will argue below, the proposed new ICANN by-laws make this problem even worse.) The proposal by the names community (&amp;quot;the CWG proposal&amp;quot;) still has a requirement (in Annex S) that the Post-Transition IANA (PTI) be incorporated in the United States, and a similar suggestion hidden away as a footnote. Further, the proposed by-laws for ICANN include the requirement that PTI be a California corporation. There was no discussion specifically on this issue, nor any documented community agreement on the specific issue of jurisdiction of PTI's incorporation.&lt;/p&gt;
&lt;p&gt;Why wasn't there greater discussion and consideration of this issue? Because of two reasons: First, there were many that argued that the transition would be vetoed by the U.S. government and the U.S. Congress if ICANN and PTI were not to remain in the U.S. Secondly, the ICANN-formed ICG saw the US government’s actions very narrowly, as though the government were acting in isolation, ignoring the rich dialogue and debate that’s gone on earlier about the transition since the incorporation of ICANN itself.&lt;/p&gt;
&lt;p&gt;While it would be no one’s case that political considerations should be given greater weightage than technical considerations such as security, stability, and resilience of the domain name system, it is shocking that political considerations have been completely absent in the discussions in the number and protocol parameters communities, and have been extremely limited in the discussions in the names community. This is even more shocking considering that the main reason for this transition is, as has been argued above, political.&lt;/p&gt;
&lt;p&gt;It can be also argued that the certain IANA functions such as Root Zone Management function have a considerable political implication. It is imperative that the political nature of the function is duly acknowledged and dealt with, in accordance with the wishes of the global community. In the current process the political aspects of the IANA function has been completely overlooked and sidelined. It is important to note that this transition has not been a necessitated by any technical considerations. It is primarily motivated by political and legal considerations. However, the questions that the ICG asked the customer communities to consider were solely technical. Indeed, the communities could have chosen to overlook that, but they did not choose to do so. For instance, while the IANA customer community proposals reflected on existing jurisdictional arrangements, they did not reflect on how the jurisdictional arrangements should be post-transition , while this is one of the questions at the heart of the entire transition. There were no discussions and decisions as to the jurisdiction of the Post-Transition IANA: the Accountability CCWG's lawyers, Sidley Austin, recommended that the PTI ought to be a California non-profit corporation, and this finds mention in a footnote without even having been debated by the &amp;quot;global multistakeholder community&amp;quot;, and subsequently in the proposed new by-laws for ICANN.&lt;/p&gt;
&lt;h2 id="why-the-by-laws-make-things-worse-why-work-stream-2-cant-address-most-jurisdiction-issues"&gt;Why the By-Laws Make Things Worse &amp;amp; Why &amp;quot;Work Stream 2&amp;quot; Can't Address Most Jurisdiction Issues&lt;/h2&gt;
&lt;p&gt;The by-laws could have chosen to simply stayed silent on the matter of what law PTI would be incorporated under, but instead the by-law make the requirement of PTI being a California non-profit public benefit corporation part of the &lt;em&gt;fundamental by-laws&lt;/em&gt;, which are close to impossible to amend.&lt;/p&gt;
&lt;p&gt;While &amp;quot;Work Stream 2&amp;quot; (the post-transition work related to improving ICANN's accountability) has jurisdiction as a topic of consideration, the scope of that must necessarily discount any consideration of shifting the jurisdiction of incorporation of ICANN, since all of the work done as part of CCWG Accountability's &amp;quot;Work Stream 1&amp;quot;, which are now reflected in the proposed new by-laws, assume Californian jurisdiction (including the legal model of the &amp;quot;Empowered Community&amp;quot;). Is ICANN prepared to re-do all the work done in WS1 in WS2 as well? If the answer is yes, then the issue of jurisdiction can actually be addressed in WS2. If the answer is no ­— and realistically it is — then, the issue of jurisdiction can only be very partially addressed in WS2.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we recommended specific changes in the by-laws, all of which were rejected by CCWG's lawyers.&lt;/p&gt;
&lt;h2 id="the-transition-plan-fails-the-netmundial-statement"&gt;The Transition Plan Fails the NETmundial Statement&lt;/h2&gt;
&lt;p&gt;The &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial Multistakeholder Document&lt;/a&gt;, which was an outcome of the NETmundial process, states:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders extending beyond the ICANN community&lt;/p&gt;
&lt;p&gt;[...]&lt;/p&gt;
&lt;p&gt;It is expected that the process of globalization of ICANN speeds up leading to a truly international and global organization serving the public interest with clearly implementable and verifiable accountability and transparency mechanisms that satisfy requirements from both internal stakeholders and the global community.&lt;/p&gt;
&lt;p&gt;The active representation from all stakeholders in the ICANN structure from all regions is a key issue in the process of a successful globalization.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As our past analysis has shown, the IANA transition process and the discussions on the mailing lists that shaped it &lt;a href="https://cis-india.org/internet-governance/blog/cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"&gt;were neither global nor multistakeholder&lt;/a&gt;. The DNS industry represented in ICANN is largely US-based. 3 in 5 registrars are from the United States of America, whereas less than 1% of ICANN-registered registrars are from Africa. Two-thirds of the Business Constituency in ICANN is from the USA. While ICANN-the-corporation has sought to become more global, the ICANN community has remained insular, and this will not change until the commercial interests involved in ICANN can become more diverse, reflecting the diversity of users of the Internet, and a TLD like .COM can be owned by a non-American corporation and the PTI can be a non-American entity.&lt;/p&gt;
&lt;h2 id="what-we-need-jurisdictional-resilience"&gt;What We Need: Jurisdictional Resilience&lt;/h2&gt;
&lt;p&gt;It is no one's case that the United States is less fit than any other country as a base for ICANN, PTI, or the Root Zone Maintainer, or even as the headquarters for 9 of the world's 12 root zone operators (Verisign runs both the A and J root servers). However, just as having multiplicity of root servers is important for ensuring technical resilience of the DNS system (and this is shown in the uptake of Anycast by root server operators), it is equally important to have immunity of core DNS functioning from political pressures of the country or countries where core DNS infrastructure is legally situated and to ensure that we have diversity in terms of legal jurisdiction.&lt;/p&gt;
&lt;p&gt;Towards this end, we at CIS have pushed for the concept of &amp;quot;jurisdictional resilience&amp;quot;, encompassing three crucial points:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal immunity for core technical operators of Internet functions (as opposed to policymaking venues) from legal sanctions or orders from the state in which they are legally situated.&lt;/li&gt;
&lt;li&gt;Division of core Internet operators among multiple jurisdictions&lt;/li&gt;
&lt;li&gt;Jurisdictional division of policymaking functions from technical implementation functions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Of these, the most important is the limited legal immunity (akin to a greatly limited form of the immunity that UN organizations get from the laws of their host countries). This kind of immunity could be provided through a variety of different means: a host-country agreement; a law passed by the legislature; a U.N. General Assembly Resolution; a U.N.-backed treaty; and other such options exist. We are currently investigating which of these options would be the best option.&lt;/p&gt;
&lt;p&gt;And apart from limited legal immunity, distribution of jurisdictional control is also valuable. As we noted in our submission to the ICG in September 2015:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Following the above precepts would, for instance, mean that the entity that performs the role of the Root Zone Maintainer should not be situated in the same legal jurisdiction as the entity that functions as the policymaking venue. This would in turn mean that either the Root Zone Maintainer function be taken up Netnod (Sweden-headquartered) or the WIDE Project (Japan-headquartered) [or RIPE-NCC, headquartered in the Netherlands], or that if the IANA Functions Operator(s) is to be merged with the RZM, then the IFO be relocated to a jurisdiction other than those of ISOC and ICANN. This, as has been stated earlier, has been a demand of the Civil Society Internet Governance Caucus. Further, it would also mean that root zone servers operators be spread across multiple jurisdictions (which the creation of mirror servers in multiple jurisdictions will not address).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;However, the issue of jurisdiction seems to be dead-on-arrival, having been killed by the United States government.&lt;/p&gt;
&lt;p&gt;Unfortunately, despite the primary motivation for demands for the IANA transition being those of removing the power the U.S. government exercises over the core of the Internet's operations in the form of the DNS, what has ended up happening through the IANA transition is that these powers have not only not been removed, but in some ways they have been entrenched further! While earlier, the U.S. had to specify that the IANA functions operator had to be located in the U.S., now ICANN's by-laws themselves will state that the post-transition IANA will be a California corporation. Notably, while the Montevideo Declaration speaks of &amp;quot;globalization&amp;quot; of ICANN and of the IANA functions, as does the NETmundial statement, the NTIA announcement on their acceptance of the transition proposals speaks of &amp;quot;privatization&amp;quot; of ICANN, and not &amp;quot;globalization&amp;quot;.&lt;/p&gt;
&lt;p&gt;All in all, the &amp;quot;independence&amp;quot; that IANA is gaining from the U.S. is akin to the &amp;quot;independence&amp;quot; that Brazil gained from Portugal in 1822. Dom Pedro of Brazil was then ruling Brazil as the Prince Regent since his father Dom João VI, the King of United Kingdom of Portugal, Brazil and the Algarves had returned to Portugal. In 1822, Brazil declared independence from Portugal (which was formally recognized through a treaty in 1825). Even after this &amp;quot;independence&amp;quot;, Dom Pedro continued to rule Portugal just as he had before indepedence, and Dom João VI was provided the title of &amp;quot;Emperor of Brazil&amp;quot;, aside from being King of the United Kingdom of Portugal and the Algarves. The &amp;quot;indepedence&amp;quot; didn't make a whit of a difference to the self-sufficiency of Brazil: Portugal continued to be its largest trading partner. The &amp;quot;independence&amp;quot; didn't change anything for the nearly 1 million slaves in Brazil, or to the lot of the indigenous peoples of Brazil, none of whom were recognized as &amp;quot;free&amp;quot;. It had very little consequence not just in terms of ground conditions of day-to-day living, but even in political terms.&lt;/p&gt;
&lt;p&gt;Such is the case with the IANA Transition: U.S. power over the core functioning of the Domain Name System do not stand diminished after the transition, and they can even arguably be said to have become even more entrenched. Meet the new boss: same as the old boss.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;&lt;p&gt;It is an allied but logically distinct issue that U.S. businesses — registries and registrars — dominate the global DNS industry, and as a result hold the reins at ICANN.&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn2"&gt;&lt;p&gt;As Goldsmith &amp;amp; Wu note in their book &lt;em&gt;Who Controls the Internet&lt;/em&gt;: &amp;quot;Back in 1998 the U.S. Department of Commerce promised to relinquish root authority by the fall of 2006, but in June 2005, the United States reversed course. “The United States Government intends to preserve the security and stability of the Internet’s Domain Name and Addressing System (DNS),” announced Michael D. Gallagher, a Department of Commerce official. “The United States” he announced, will “maintain its historic role in authorizing changes or modifications to the authoritative root zone file.”&lt;a href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn3"&gt;&lt;p&gt;Mr. Fadi Chehadé revealed in an interaction with Indian participants at ICANN 54 that he had a meeting &amp;quot;at the White House&amp;quot; about the U.S. plans for transition of the IANA contract before he spoke about that when &lt;a href="http://articles.economictimes.indiatimes.com/2013-10-22/news/43288531_1_icann-internet-corporation-us-centric-internet"&gt;he visited India in October 2013&lt;/a&gt; making the timing of his White House visit around the time of the Montevideo Statement.&lt;a href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn4"&gt;&lt;p&gt;As an example, &lt;a href="https://www.nlnetlabs.nl/projects/nsd/"&gt;NSD&lt;/a&gt;, software that is used on multiple root servers, is funded by a Dutch foundation and a Dutch corporation, and written mostly by European coders.&lt;a href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann'&gt;https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2016-06-29T07:51:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ipv6-in-india">
    <title>IPv6 in India: The promises and challenges</title>
    <link>https://cis-india.org/internet-governance/blog/ipv6-in-india</link>
    <description>
        &lt;b&gt;Newspapers have been reporting that IPv4 addresses will get over soon, and that we will have to shift to IPv6.  In this short piece, Pranesh Prakash gives a layperson's introduction to the IPv6 Internet we will be entering into soon, and what that means for you.&lt;/b&gt;
        
&lt;p&gt;Reports suggest that the global pool of IPv4 addresses &lt;a class="external-link" href="http://arstechnica.com/web/news/2009/09/2010-could-be-the-last-year-for-ipv4-as-we-know-it.ars"&gt;will run dry by 2011&lt;/a&gt;, and thus the shift to IPv6 is imminent.&amp;nbsp; But what does that mean?&amp;nbsp; There are &lt;a class="external-link" href="http://arstechnica.com/hardware/news/2007/03/IPv6.ars"&gt;excellent resources&lt;/a&gt; that explain this in technical language.&amp;nbsp; Below I shall try to do so in non-technical language.&lt;/p&gt;
&lt;h2&gt;What is IPv6?&lt;/h2&gt;
&lt;p&gt;Internet Protocol version 4 (IPv4) is a standard defined in 1981, which
is central to the Internet, allowing vastly different computers on
vastly different kinds of networks to communicate with each other.&amp;nbsp;
(Think of how diplomatic protocols enables diplomats from vastly
different cultures to communicate effectively by agreement on certain
common minimums (such as a handshake, etc.).)&amp;nbsp; IPv4 was defined when
there were relatively few computers, and even fewer connected to
networks.&amp;nbsp; Many things have changed since then, with one of the most
important change being the burgeoning of the Internet and the World
Wide Web.&amp;nbsp; Each computer on the Internet has something known as an IP
address.&amp;nbsp; Each 'packet' of data transmitted over the Internet must have
associated from and to IP addresses (which can sometimes be ranges of
addresses).&amp;nbsp; IPv4 can accommodate 4,294,967,296 (2^32) unique IP
addresses, whereas IPv6 can handle 340 undecillion (2^128) unique
addresses.&amp;nbsp; When you consider that every device with Internet
connectivity has an IP address (from laptops to Blackberries to even
alarm clocks), a lot of IP addresses are required.&amp;nbsp; Since the early
1990s, people have been talking about some of the limitations of IPv4,
the primary one being the lack of expandability of IPv4.&lt;/p&gt;
&lt;h2&gt;
  Benefits of IPv6&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
Greater number of computers on the Internet, as it uses more&lt;/li&gt;&lt;li&gt;
Better reliability and security, as IPSec, a protocol for
authenticating and securing all IP data, is built into IPv6 as a
default.&lt;/li&gt;&lt;li&gt;
More efficient and thus faster than IPv4.&amp;nbsp; Despite carrying much
more data, IPv6 packets are simpler to route (just as addresses with
pincodes are easier for post offices to handle).&lt;/li&gt;&lt;li&gt;
More features can be added more easily.&amp;nbsp; If at a later point of time
more features are required, those can be added without a whole new
protocol being designed.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;
  What all does IPv6 require?&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
IPv6-capable Internet Service Providers providing consumers IPv6 addresses&lt;/li&gt;&lt;li&gt;
IPv6-capable networking hardware (modems, routers)&lt;/li&gt;&lt;li&gt;
IPv6-capable operating systems on consumer devices (smartphones, computers, etc.)&lt;/li&gt;&lt;li&gt;
IPv6-capable websites, which depends on (1)&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;The shift to IPv6&lt;/h2&gt;
Apart from IPv6 &lt;em&gt;capability&lt;/em&gt;, at some point the &lt;em&gt;shift&lt;/em&gt;
to IPv6 must happen, since IPv4 and IPv6 are not compatible.&amp;nbsp;
Translators, which allow an IPv6 address to be understood by a computer
using IPv4, do exist, but they are quite expensive to deploy.&amp;nbsp;
Currently, it is estimated that around 1% of the world's Internet
traffic is conducted using IPv6.&amp;nbsp; The most successful example of IPv6
being used on a large scale was the 2008 Olympics where &lt;em&gt;all&lt;/em&gt;
network operations (from security camera transmissions to a special
IPv6 website).&amp;nbsp; So why haven't more ISPs shifted to IPv6?&amp;nbsp; Because of
network externalities.&amp;nbsp; While telephones make sense, being the only
person in the world with a telephone doesn't.&amp;nbsp; Similarly, while IPv6 is
the way for the future, it only makes economic sense for ISPs to shift
(or even prepare for the shift, by using translators) when there are
plenty of others using IPv6.&amp;nbsp; While some ISPs (like Sify) are already
prepared for the shift, others need to gear up.&amp;nbsp; Importantly, the
government step in to encourage (and, perhaps, at some point, mandate)
this transition. Following the governments of the US, EU, and China,
the Indian government too sees the immensity of this shift, and has
tasked the Telecommunication Engineering Centre (TEC) of the Department
of Telecommunications to take the lead in this.&amp;nbsp; The &lt;a id="ay-p" title="TEC has convened meetings with experts" href="http://www.tec.gov.in/seminar.html"&gt;TEC has convened meetings with experts&lt;/a&gt;, and thus India seems to be on the right track.
&lt;h2&gt;
What does all this mean for you?&lt;/h2&gt;
Perhaps a lot or not very much, depending on how you look at things.&amp;nbsp;
Most modern modems and routers (which are usually provided by your ISP) &lt;em&gt;support&lt;/em&gt; IPv6, but are, by default, configured for IPv4.&amp;nbsp; Many
smartphones don't work on IPv6, but generally phones have a shorter
shelf life and chances are that market forces will goad manufacturers
to support IPv6 by the time the IPv6 Internet becomes more popular.&amp;nbsp;
Thus, while IPv4 addresses might be find themselves near the end of
their natural life within one to three years, they will live on thanks
to various mechanisms that translate IPv4 to IPv6 (which won't work
well with certain applications such as peer-to-peer file-sharing).&amp;nbsp;
Eventually, even those translators will have to be abandoned if we are
to embrace a brave new Internet.
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ipv6-in-india'&gt;https://cis-india.org/internet-governance/blog/ipv6-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IETF</dc:subject>
    
    
        <dc:subject>Introduction</dc:subject>
    
    
        <dc:subject>IPv6</dc:subject>
    

   <dc:date>2011-08-02T07:16:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/india-eu-fta-ipr-july-2010">
    <title>IPR Chapter of India-EU FTA (July 2010)</title>
    <link>https://cis-india.org/a2k/publications/india-eu-fta-ipr-july-2010</link>
    <description>
        &lt;b&gt;IPR Chapter of India-EU FTA (July 2010)&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/india-eu-fta-ipr-july-2010'&gt;https://cis-india.org/a2k/publications/india-eu-fta-ipr-july-2010&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-01-12T08:17:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/invisible-censorship">
    <title>Invisible Censorship: How the Government Censors Without Being Seen</title>
    <link>https://cis-india.org/internet-governance/invisible-censorship</link>
    <description>
        &lt;b&gt;The Indian government wants to censor the Internet without being seen to be censoring the Internet.  This article by Pranesh Prakash shows how the government has been able to achieve this through the Information Technology Act and the Intermediary Guidelines Rules it passed in April 2011.  It now wants methods of censorship that leave even fewer traces, which is why Mr. Kapil Sibal, Union Minister for Communications and Information Technology talks of Internet 'self-regulation', and has brought about an amendment of the Copyright Act that requires instant removal of content.&lt;/b&gt;
        
&lt;h2&gt;Power of the Internet and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;The Internet, as anyone who has ever experienced the wonder of going online would know, is a very different communications platform from any that has existed before.&amp;nbsp; It is the one medium where anybody can directly share their thoughts with billions of other people in an instant.&amp;nbsp; People who would never have any chance of being published in a newspaper now have the opportunity to have a blog and provide their thoughts to the world.&amp;nbsp; This also means that thoughts that many newspapers would decide not to publish can be published online since the Web does not, and more importantly cannot, have any editors to filter content.&amp;nbsp; For many dictatorships, the right of people to freely express their thoughts is something that must be heavily regulated.&amp;nbsp; Unfortunately, we are now faced with the situation where some democratic countries are also trying to do so by censoring the Internet.&lt;/p&gt;
&lt;h2&gt;Intermediary Guidelines Rules&lt;/h2&gt;
&lt;p&gt;In India, the new &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;'Intermediary Guidelines' Rules&lt;/a&gt; and the &lt;a class="external-link" href="http://mit.gov.in/sites/upload_files/dit/files/GSR315E_10511%281%29.pdf"&gt;Cyber Cafe Rules&lt;/a&gt; that have been in effect since April 2011 give not only the government, but all citizens of India, great powers to censor the Internet.&amp;nbsp; These rules, which were made by the Department of Information Technology and not by the Parliament, require that all intermediaries remove content that is 'disparaging', 'relating to... gambling', 'harm minors in any way', to which the user 'does not have rights'.&amp;nbsp; When was the last time you checked wither you had 'rights' to a joke before forwarding it?&amp;nbsp; Did you share a Twitter message containing the term "#IdiotKapilSibal", as thousands of people did a few days ago?&amp;nbsp; Well, that is 'disparaging', and Twitter is required by the new law to block all such content.&amp;nbsp; The government of Sikkim can run advertisements for its PlayWin lottery in newspapers, but under the new law it cannot do so online.&amp;nbsp; As you can see, through these ridiculous examples, the Intermediary Guidelines are very badly thought-out and their drafting is even worse.&amp;nbsp; Worst of all, they are unconstitutional, as they put limits on freedom of speech that contravene &lt;a class="external-link" href="http://lawmin.nic.in/coi/coiason29july08.pdf"&gt;Article 19(1)(a) and 19(2) of the Constitution&lt;/a&gt;, and do so in a manner that lacks any semblance of due process and fairness.&lt;/p&gt;
&lt;h2&gt;Excessive Censoring by Internet Companies&lt;/h2&gt;
&lt;p&gt;We, at the Centre for Internet and Society in Bangalore, decided to test the censorship powers of the new rules by sending frivolous complaints to a number of intermediaries.&amp;nbsp; Six out of seven intermediaries removed content, including search results listings, on the basis of the most ridiculous complaints.&amp;nbsp; The people whose content was removed were not told, nor was the general public informed that the content was removed.&amp;nbsp; If we hadn't kept track, it would be as though that content never existed.&amp;nbsp; Such censorship existed during Stalin's rule in the Soviet Union.&amp;nbsp; Not even during the Emergency has such censorship ever existed in India.&amp;nbsp; Yet, not only was what the Internet companies did legal under the Intermediary Guideline Rules, but if they had not, they could have been punished for content put up by someone else.&amp;nbsp; That is like punishing the post office for the harmful letters that people may send over post.&lt;/p&gt;
&lt;h2&gt;Government Has Powers to Censor and Already Censors&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Currently, the government can either block content by using section 69A of the Information Technology Act (which can be revealed using RTI), or it has to send requests to the Internet companies to get content removed.&amp;nbsp; Google has released statistics of government request for content removal as part of its Transparency Report.&amp;nbsp; While Mr. Sibal uses the examples of communally sensitive material as a reason to force censorship of the Internet, out of the 358 items requested to be removed from January 2011 to June 2011 from Google service by the Indian government (including state governments), only 8 were for hate speech and only 1 was for national security.&amp;nbsp; Instead, 255 items (71 per cent of all requests) were asked to be removed for 'government criticism'.&amp;nbsp; Google, despite the government in India not having the powers to ban government criticism due to the Constitution, complied in 51 per cent of all requests. That means they removed many instances of government criticism as well.&lt;/p&gt;
&lt;h2&gt;'Self-Regulation': Undetectable Censorship&lt;/h2&gt;
&lt;p&gt;Mr. Sibal's more recent efforts at forcing major Internet companies such as Indiatimes, Facebook, Google, Yahoo, and Microsoft, to 'self-regulate' reveals a desire to gain ever greater powers to bypass the IT Act when censoring Internet content that is 'objectionable' (to the government).&amp;nbsp;&amp;nbsp; Mr. Sibal also wants to avoid embarrassing statistics such as that revealed by Google's Transparency Report. He wants Internet companies to 'self-regulate' user-uploaded content, so that the government would never have to send these requests for removal in the first place, nor block sites officially using the IT Act.&amp;nbsp; If the government was indeed sincere about its motives, it would not be talking about 'transparency' and 'dialogue' only after it was exposed in the press that the Department of Information Technology was holding secret talks with Internet companies.&amp;nbsp; Given the clandestine manner in which it sought to bring about these new censorship measures, the motives of the government are suspect.&amp;nbsp; Yet, both Mr. Sibal and Mr. Sachin Pilot have been insisting that the government has no plans of Internet censorship, and Mr. Pilot has made that statement officially in the Lok Sabha.&amp;nbsp; This, thus seems to be an instance of censoring without censorship.&lt;/p&gt;
&lt;h2&gt;Backdoor Censorship through Copyright Act&lt;/h2&gt;
&lt;p&gt;Further, since the government cannot bring about censorship laws in a straightforward manner, they are trying to do so surreptitiously, through the back door.&amp;nbsp; Mr. Sibal's latest proposed amendment to the Copyright Act, which is before the Rajya Sabha right now, has a provision called section 52(1)(c) by which anyone can send a notice complaining about infringement of his copyright.&amp;nbsp; The Internet company will have to remove the content immediately without question, even if the notice is false or malicious.&amp;nbsp; The sender of false or malicious notices is not penalized. But the Internet company will be penalized if it doesn't remove the content that has been complained about.&amp;nbsp; The complaint need not even be shown to be true before the content is removed.&amp;nbsp; Indeed, anyone can complain about any content, without even having to show that they own the rights to that content.&amp;nbsp; The government seems to be keen to have the power to remove content from the Internet without following any 'due process' or fair procedure.&amp;nbsp; Indeed, it not only wants to give itself this power, but it is keen on giving all individuals this power.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;It's ultimate effect will be the death of the Internet as we know it.&amp;nbsp; Bid adieu to it while there is still time.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/invisible-censorship.pdf" class="internal-link" title="Invisible Censorship (Marathi version)"&gt;The article was translated to Marathi and featured in Lokmat&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/invisible-censorship'&gt;https://cis-india.org/internet-governance/invisible-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-04T08:59:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs">
    <title>Internet Rights and Wrongs</title>
    <link>https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs</link>
    <description>
        &lt;b&gt;With a rise in PIL's for unwarranted censorship, do we need to step back and inspect if it's about time unreasonable trends are checked?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in India Today on September 1, 2016. The original piece &lt;a class="external-link" href="http://indiatoday.intoday.in/story/internet-isp-websites-censorship/1/754038.html"&gt;can be read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last few weeks, there have been a number of cases of egregious censorship of websites in India. Many people started seeing notices that (incorrectly) gave an impression that they may end up in jail if they visited certain websites. However, these notices weren't an isolated phenomenon, nor one that is new. Worryingly, the higher judiciary has been drawn into these questionable moves to block websites as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2011, numerous torrent search engines and communities have been blocked by Indian internet service providers (ISPs). Torrent search engines provide the same functionality for torrents that Google provides for websites. Are copyright infringing materials indexed and made searchable by Google? Yes. Do we shut down Google for this reason? No. However, that is precisely what private entertainment companies have done over the past five years in India. Companies hired by the producers of Tamil movies Singham and 3 managed to get video-sharing websites like Vimeo, Dailymotion and numerous torrent search engines blocked even before the movies released, without showing even a single case of copyright infringement existed on any of them. During the FIFA World Cup, Sony even managed to get Google Docs blocked. In some cases, these entertainment companies have abused 'John Doe' orders (generic orders that allow copyright enforcement against unnamed persons) and have asked ISPs to block websites. The ISPs, instead of ignoring such requests as instances of private censorship, have also complied. In other cases (like Sony's FIFA World Cup case), courts have ordered ISPs to block hundreds of websites without any copyright infringement proven against them. High court judges haven't even developed a coherent theory on whether or how Indian law allows them to block websites for alleged copyright infringement. Still they have gone ahead and blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, hackers got into Reliance Communications servers and released a list of websites blocked by them. The list contained multiple links that sought to connect Satish Seth-a group MD in Reliance ADA Group-to the 2G scam: a clear case of secretive private censorship by RCom. Further, visiting some of the YouTube links which pertained to Satish Seth showed that they had been removed by YouTube due to dubious copyright infringement complaints filed by Reliance BIG Entertainment. Did the department of telecom, whose licences forbid ISPs from engaging in private censorship, take any action against RCom? No. Earlier this year, Tata Sky filed a complaint against YouTube in the Delhi High Court, noting that there were videos on it that taught people how to tweak their set-top boxes to get around the technological locks that Tata Sky had placed. The Delhi HC ordered YouTube "not to host content that violates any law for the time being in force", presuming that the videos in question did in fact violate Indian law. They cite two sections: Section 65A of the Copyright Act and Section 66 of the Information Technology Act. The first explicitly allows a user to break technological locks of the kind that Tata Sky has placed for dozens of reasons (and allows a person to teach others how to engage in such breaking), whereas the second requires finding of "dishonesty" or "fraud" along with "damage to a computer system, etc", and an intention to violate the law-none of which were found. The court effectively blocked videos on YouTube without any finding of illegality, thus once again siding with censorial corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, Indore-based lawyer Kamlesh Vaswani filed a PIL in the Supreme Court calling for the government to undertake proactive blocking of all online pornography. Normally, a PIL is only admittable under Article 32 of the Constitution, on the basis of a violation of a fundamental right (which are listed in Part III of our Constitution). Vaswani's petition-which I have had the misfortune of having read carefully-does not at any point complain that the state is violating a fundamental right by not blocking pornography. Yet the petition wants to curb the fundamental right to freedom of expression, since the government is by no means in a position to determine what constitutes illegal pornography and what doesn't.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger problem extends to the now-discredited censor board (headed by the notorious Pahlaj Nihalani), as also the self-censorship practised on TV by the private Indian Broadcasters Federation (which even bleeps out words and phrases like 'Jesus', 'period', 'breast cancer' and 'beef'). 'Swachh Bharat' should not mean sanitising all media to be unobjectionable to the person with the lowest outrage threshold. So who will file a PIL against excessive censorship?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs'&gt;https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-09-22T23:36:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/censorship-officials-contact-details">
    <title>Internet Censorship Officials' Contact Details</title>
    <link>https://cis-india.org/internet-governance/resources/censorship-officials-contact-details</link>
    <description>
        &lt;b&gt;Contact details of officials from the Ministry of Communications &amp; Information Technology&lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;Kapil Sibal&lt;/strong&gt;&lt;br /&gt;
Minister for Communications and Information Technology&lt;br /&gt;
Phone: 011-24369191&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Murli Deora&lt;/strong&gt;&lt;br /&gt;
Minister of State for Communications and Information Technology&lt;br /&gt;
Phone: 011-23372246/47&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sachin Pilot&lt;/strong&gt;&lt;br /&gt;
Minister of State for Communications and Information Technology&lt;br /&gt;
Phone: 011-24368757/58&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;J. Satyanarayana&lt;/strong&gt;&lt;br /&gt;
Secretary&lt;br /&gt;
Ministry for Communications and Information Technology&lt;br /&gt;
Phone: 011-24363097&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gulshan Rai&lt;/strong&gt;&lt;br /&gt;
Group Coordinator&lt;br /&gt;
Cyberlaw Group&lt;br /&gt;
Ministry for Communications and Information Technology&lt;br /&gt;
Phone: 011-24368544&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/censorship-officials-contact-details'&gt;https://cis-india.org/internet-governance/resources/censorship-officials-contact-details&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-04-17T10:00:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/publications/it-act">
    <title>Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/publications/it-act</link>
    <description>
        &lt;b&gt;The Information Technology Act, 2000 (amended in 2008) is the main statute that governs online behaviour in India, from e-commerce to cybercrimes, Internet surveillance, and intermediary liability.  Thus, understanding that statute is of paramount interest to all Indian 'netizens'.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/publications/it-act'&gt;https://cis-india.org/internet-governance/publications/it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-06-15T12:12:00Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>




</rdf:RDF>
