<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 151 to 165.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/ijlt-cis-law-essay"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/a2kga-global-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/foss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/foss/FLOSS"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/alternative-jan-lokpal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites">
    <title>India blocks access to 857 porn sites</title>
    <link>https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites</link>
    <description>
        &lt;b&gt;India has blocked free access to 857 porn sites in what it says is a move to prevent children from accessing them. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The story was published by BBC on August 3, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Adults will still be able to access the  sites using virtual private networks (VPNs) or proxy servers. In July,  the Supreme Court expressed its unhappiness over the government's  inability to block sites, especially those featuring child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom companies have said they will not be able to enforce the "ban" immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We  have to block each site one by one and it will take a few days for all  service providers to block all the sites," an unnamed telecom company  executive told The Times of India newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  senior official, who preferred to remained unnamed, told the BBC Hindi  that India's department of telecommunications had "advised" telecom  operators and Internet service providers to "control free and open  access" to &lt;a class="story-body__link-external"&gt;857 porn sites&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There  is no total ban. This was done in the backdrop of Supreme Court's  observation on children having free access to porn sites. The idea is  also to protect India's cultural fabric. This will not prevent adults  from visiting porn sites," the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July, the top court had observed that it was not for the court to order a ban on porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It  is an issue for the government to deal with. Can we pass an interim  order directing blocking of all adult websites? And let us keep in mind  the possible contention of a person who could ask what crime have I  committed by browsing adult websites in private within the four walls of  my house. Could he not argue about his right to freedom to do something  within the four walls of his house without violating any law?," the  court said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a class="story-body__link-external" href="http://www.pornhub.com/insights/2014-year-in-review"&gt;statistics released&lt;/a&gt; by adult site Pornhub, India was its fourth largest source of traffic  in 2014, behind the US, UK and Canada. Pranesh Prakash of the Bangalore  based Centre for Internet and Society said the directive to block the  857 sites was "the largest single order of its kind" in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  government's reasoning that it is not a ban because adults can still  access the porn sites is ridiculous," he told the BBC. The move has  caused a great deal of comment on Indian social media networks, with  many prominent personalities coming forward to condemn it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular  author Chetan Bhagat, writer and commentator Nilanjana Roy, politician  Milind Deora and director Ram Gopal Varma have all added their voices to  the debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites'&gt;https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T01:31:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/ijlt-cis-law-essay">
    <title>IJLT-CIS Law Essay Competition</title>
    <link>https://cis-india.org/a2k/blogs/ijlt-cis-law-essay</link>
    <description>
        &lt;b&gt;The Indian Journal of Law and Technology and CIS are conducting a legal essay competition to encourage law students across India to think critically about the techno-legal issues facing us today.  Students can write on any of the four themes, with the top prize being Rs. 7500 and an internship at CIS.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.ijlt.in"&gt;Indian Journal of Law and Technology&lt;/a&gt; (IJLT) is an annual law journal published by the Law and Technology Committee of the National Law School of India University, Bangalore. IJLT aims to provide a platform for promoting discussion on issues relating to the interface between law and technology, particularly from the perspective of the developing world.&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a leading research organisation that engages with issues of digital pluralism, public accountability and pedagogic practices, in relation to the field of Internet and Society, with special emphasis towards South-South dialogue and exchange.&amp;nbsp; IJLT and CIS are proud to announce the 1st IJLT-CIS Annual Law Essay Competition 2009, which is a competition open to undergraduate law students across India. The competition seeks to encourage creative thinking and promote research and writing about crucial legal issues in the field of Information Technology and the Internet.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="center"&gt;&lt;a href="http://www.nls.ac.in/ijlt.pdf"&gt;&lt;img src="http://dl.dropbox.com/u/2350052/Essay%20competition%20header.jpg" alt="IJLT ESSAY COMPETITION" height="104" width="379" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Themes&lt;/h3&gt;
&lt;ol&gt;&lt;li&gt;Criminality and Second Life: Dr. Jekyll and Mr. Hyde&lt;/li&gt;&lt;li&gt;Trademark and the Internet: Cybersquatting and the Google Adwords-Consim Controversy -- Reasonable Limits to Trademark Protection&lt;/li&gt;&lt;li&gt;3G Services and Spectrum Allocation: Fair Competition, Welfare and Freedom of Speech and Commerce on the Airwaves&lt;/li&gt;&lt;li&gt;Easier to Be Criminals: Judicial and Legislative Responses to Cyber Crime in India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Judging&lt;/h3&gt;
&lt;p&gt;The winning law essays shall be determined through a blind review by a panel of eminent academicians in the field of law and technology.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Prizes&lt;/h3&gt;
&lt;p&gt;Ist Prize: Rs. 7500 and an internship at CIS&lt;/p&gt;
&lt;p&gt;2nd Prize: Rs. 5000&lt;/p&gt;
&lt;p&gt;3rd Prize: Rs. 4000&lt;/p&gt;
&lt;p&gt;Please note that the terms of the above internship shall be decided by CIS on its own initiative, and as such shall not be negotiable. The winning law essay shall be considered for publication in the next issue of IJLT in accordance with the Editorial Policy of IJLT.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Eligibility&lt;/h3&gt;
&lt;p&gt;The competition is open to all undergraduate law students in any college/law school in India.&lt;/p&gt;
&lt;h3&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;Submission Guidelines&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;The entries must be between 5000-7500 words inclusive of all footnotes. The entries that fall short of or exceed the above word limit shall be penalised.&lt;/li&gt;&lt;li&gt;Substantive footnoting is not permitted and shall be penalised. The use of endnotes or other citation methods is not permitted.&lt;/li&gt;&lt;li&gt;The entries should be accompanied by a 150-word abstract. The abstract is not counted towards the word limit.&lt;/li&gt;&lt;li&gt;All entries should be in Times New Roman, size 12, 1.5 line spacing. The footnotes used should be in Times New Roman, size 10, single line spacing.&lt;/li&gt;&lt;li&gt;The footnotes used should follow a uniform and complete system of citation. However, the use of the Harvard Blue Book (18th edition) system of citation is encouraged.&lt;/li&gt;&lt;li&gt;The entries must be submitted in the Microsoft Word format and with all identifying information removed from the text of the entries and the file properties. The covering e-mail should contain the name, e-mail address, postal address, institution, course and year of study of the author.&lt;/li&gt;&lt;li&gt;The entries must be submitted via e-mail to essay@ijlt.in.&lt;/li&gt;&lt;li&gt;The deadline for entries is 11:59 P.M., 23rd January, 2010.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For any clarifications, please send an e-mail to editorialboard@ijlt.in.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/ijlt-cis-law-essay'&gt;https://cis-india.org/a2k/blogs/ijlt-cis-law-essay&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    

   <dc:date>2011-08-04T04:35:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy">
    <title>How to make EVMs hack-proof, and elections more trustworthy</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy</link>
    <description>
        &lt;b&gt;Free and fair elections are the expression of democratic emancipation. India has always led by example: the Nehru Committee sought universal adult franchise in 1928, at a time when France didnât let women vote, and laws in the USA allowed disqualification of poor, illiterate, and African-American voters. But how reliable are our voting systems, particularly in terms of security?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/how-to-make-evms-hack-proof-and-elections-more-trustworthy/articleshow/67004651.cms"&gt;Times of India&lt;/a&gt; on December 9, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Electronic voting machines (EVM) have been in use for general elections in India since 1999 having been first introduced in 1982 for a by-election in Kerala. The EVMs we use are indigenous, having been designed jointly by two public-sector organisations: the Electronics Corporation of India Ltd. and Bharat Electronics Ltd. In 1999, the Karnataka High Court upheld their use, as did the Madras High Court in 2001.&lt;br /&gt;&lt;br /&gt;Since then a number of other challenges have been levelled at EVMs, but the only one that was successful was the petition filed by Subramanian Swamy before the Supreme Court in 2013. But before we get to Swamy's case and its importance, we should understand what EVMs are and how they are used.&lt;br /&gt;&lt;br /&gt;The EVM used in India are standardised and extremely simple machines. From a security standpoint this makes them far better than the myriad different, and some notoriously insecure machines used in elections in the USA. Are they 'hack-proof' and 'infallible' as has been claimed by the ECI? Not at all.&lt;br /&gt;&lt;br /&gt;Similarly simple voting machines in the Netherlands and Germany were found to have vulnerabilities, leading both those countries to go back to paper ballots.&lt;br /&gt;&lt;br /&gt;Because the ECI doesn't provide security researchers free and unfettered access to the EVMs, there had been no independent scrutiny until 2010. That year, an anonymous source provided a Hyderabad-based technologist an original EVM. That technologist, Hari Prasad, and his team worked with some of the world's foremost voting security experts from the Netherlands and the US, and demonstrated several actual live hacks of the EVM itself and several theoretical hacks of the election process, and recommended going back to paper ballots. Further, EVMs have often malfunctioned, as news reports tell us. Instead of working on fixing these flaws, the ECI arrested Prasad (for being in possession of a stolen EVM) and denied Princeton Prof Alex Halderman entry into India when he flew to Delhi to publicly discuss their research. Even in 2017, when the ECI challenged political parties to âhackâ EVMs, it did not provide unfettered access to the machines.&lt;br /&gt;&lt;br /&gt;While paper ballots may work well in countries like Germany, they hadn't in India, where in some parts ballot-stuffing and booth-capturing were rampant. The solution as recognised by international experts, and as the ECI eventually realised, was to have the best of both worlds and to add a printer to the EVMs.&lt;br /&gt;&lt;br /&gt;These would print out a small slip of paper containing the serial number and name of the candidate, and the symbol of the political party, so that the sighted voter could verify that her vote has been cast correctly. This paper would then be deposited in a sealed box, which would provide a paper trail that could be used to audit the correctness of the EVM. They called this VVPAT: voter-verifiable paper audit trail. Swamy, in his PIL, asked for VVPAT to be introduced. The Supreme Court noted that the ECI had already done trials with VVPAT, and made them mandatory.&lt;br /&gt;&lt;br /&gt;However, VVPATs are of no use unless they are actually counted to ensure that the EVM tally and the paper tally do match. The most advanced and efficient way of doing this has been proposed by Lindeman &amp;amp; Stark, through a methodology called (RLAs), in which you keep auditing until either you've done a full hand count or you have strong evidence that continuing is pointless. The ECI could request the Indian Statistical Institute for its recommendations in implementing RLAs. Also, it must be remembered, current VVPAT technology are inaccessible for persons with visual impairments.&lt;br /&gt;&lt;br /&gt;While in some cases, the ECI has conducted audits of the printed paper slips, in 2017 it officially noted that only the High Court can order an audit and that the ECI doesn't have the power to do so under election law. Rule 93 of the Conduct of Election Rules needs to be amended to make audits mandatory.&lt;br /&gt;&lt;br /&gt;The ECI should also create separate security procedures for handling of VVPATs and EVMs, since there are now reports of EVMs being replaced 'after' voting has ended. Having separate handling of EVMs and VVPATs would ensure that two different safe-houses would need to be broken into to change the results of the vote. Implementing these two changes, changing election law to make risk-limiting audits mandatory, and improving physical security practices would make Indian elections much more trustworthy than they are now, while far more needs to be done to make them inclusive and accessible to all.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-december-9-2018-pranesh-prakash-how-to-make-evms-hack-proof-and-elections-more-trustworthy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-01-14T15:34:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india">
    <title>How Surveillance Works in India</title>
    <link>https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india</link>
    <description>
        &lt;b&gt;When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Pranesh Prakash was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;published in the New York Times&lt;/a&gt; on July 10, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After a colleague at the Centre for Internet and Society wrote about the program and it was &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;lambasted&lt;/a&gt; by Human Rights Watch, more reporters started covering it as a privacy  issue. But it was ultimately the revelations by Edward J. Snowden about  American surveillance that prompted Indians to ask questions about its  own government’s surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, we have a strange mix of great amounts of transparency and  very little accountability when it comes to surveillance and  intelligence agencies. Many senior officials are happy to anonymously  brief reporters about the state of surveillance, but there is very  little that is officially made public, and still less is debated in the  national press and in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This lack of accountability is seen both in the way the Big-Brother  acronyms (C.M.S., Natgrid, T.C.I.S., C.C.T.N.S., etc.) have been rolled  out, as well as the murky status of the intelligence agencies.&lt;span id="more-66746"&gt; &lt;/span&gt; No intelligence agency in India has been created under an act of Parliament with &lt;a href="http://articles.timesofindia.indiatimes.com/2013-02-02/india/36703357_1_intelligence-agencies-ntro-intelligence-bureau"&gt;clearly established roles and limitations on powers&lt;/a&gt;, and hence &lt;a href="http://articles.timesofindia.indiatimes.com/2012-03-26/chennai/31239894_1_ib-intelligence-bureau-officer-r-n-kulkarni"&gt;there is no public accountability whatsoever&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of accountability has meant that the government has &lt;a href="http://articles.economictimes.indiatimes.com/2006-02-04/news/27434344_1_illegal-phone-indian-telegraph-act-security-agencies"&gt;since 2006&lt;/a&gt; &lt;a href="http://articles.timesofindia.indiatimes.com/2011-05-12/india/29535755_1_security-agencies-cms-intercept"&gt;been working on the C.M.S.&lt;/a&gt;, which will integrate with the &lt;a href="http://mha.nic.in/writereaddata/13040930061_Tr-ITJ-290411.pdf"&gt;Telephone&lt;/a&gt; &lt;a href="http://www.coraltele.com/support/GetPresentations.ashx?id=33"&gt;Call&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/story/government-plans-to-tighten-phone-tapping-norms/1/137251.html"&gt;Interception System&lt;/a&gt; that is also being rolled out. The cost: around 8 billion rupees ($132  million) — more than four times the initial estimate of 1.7 billion —  and even more important, our privacy and personal liberty. Under their  licensing terms, all Internet service providers and telecom providers  are required to provide the government direct access to all  communications passing through them. However, this currently happens in a  decentralized fashion, and the government in most cases has to ask the  telecoms for metadata, like call detail records, visited Web sites, IP  address assignments, or to carry out the interception and provide the  recordings to the government. Apart from this, the government uses  equipment to gain access to &lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;vast quantities of raw data traversing the Internet across multiple cities&lt;/a&gt;, including the data going through the undersea cables that land in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the C.M.S., the government will get &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;centralized access to all communications metadata and content&lt;/a&gt; traversing through all telecom networks in India. This means that the  government can listen to all your calls, track a mobile phone and its  user’s location, read all your text messages, personal e-mails and chat  conversations. It can also see all your Google searches, Web site  visits, usernames and passwords if your communications aren’t encrypted.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Surveillance.png" alt="Internet Surfing" class="image-inline" title="Internet Surfing" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="caption"&gt;A man surfing a Facebook page at an internet cafe in Guwahati, Assam, on Dec. 6, 2011. &lt;br /&gt;Image Credit: &lt;/span&gt;&lt;span class="credit"&gt;Anupam Nath/Associated Press&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;You might ask: Why is this a problem when the government already had  the same access, albeit in a decentralized fashion? To answer that  question, one has to first examine the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are no laws that allow for &lt;i&gt;mass&lt;/i&gt; surveillance in India.  The two laws covering interception are the Indian Telegraph Act of 1885  and the Information Technology Act of 2000, as amended in 2008, and they  restrict lawful interception to time-limited and targeted  interception.The targeted interception both these laws allow ordinarily  requires case-by-case authorization by either the home secretary or the  secretary of the department of information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the colonial government framed better privacy  safeguards into communications interception than did the  post-independence democratic Indian state. The Telegraph Act mandates  that interception of communications can only be done on account of a  public emergency or for public safety.  If either of those two  preconditions is satisfied, then the government may cite any of the  following five reasons: “the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states, or public  order, or for preventing incitement to the commission of an offense.”  In 2008, the Information Technology Act copied much of the interception  provision of the Telegraph Act but removed the preconditions of public  emergency or public safety, and expands the power of the government to  order interception for “investigation of any offense.” The IT Act thus  very substantially lowers the bar for wiretapping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from these two provisions, which apply to interception, there  are many laws that cover recorded metadata, all of which have far lower  standards. Under the Code of Criminal Procedure, no court order is  required unless the entity is seen to be a “postal or telegraph  authority” — and generally e-mail providers and social networking sites  are not seen as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized access to communications data is not punishable per se, which is why a private detective who gained access to &lt;a href="http://articles.timesofindia.indiatimes.com/2013-04-17/india/38615115_1_anurag-singh-arvind-dabas-naushad-ahmad-khan"&gt;the cellphone records of Arun Jaitley&lt;/a&gt;,  a Bharatiya Janata Party leader, has been charged under the weak  provision on fraud, rather than invasion of privacy. While there is a  provision in the Telegraph Act to punish unlawful interception, it  carries a far lesser penalty (up to three years of imprisonment) than  for a citizen’s failure to assist an agency that wishes to intercept or  monitor or decrypt (up to seven years of imprisonment).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To put the ridiculousness of the penalty in &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009/"&gt;Sections 69&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;69&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;B&lt;/a&gt; of the IT Act provision in perspective, an Intelligence Bureau officer who spills national secrets &lt;a href="http://www.vakilno1.com/bareacts/laws/the-intelligence-organisations-restriction-of-rights-act-1985.html"&gt;may be imprisoned up to three years. &lt;/a&gt;And  under the Indian Penal Code, failing to provide a document one is  legally bound to provide to a public servant, the punishment can be &lt;a href="http://indiankanoon.org/doc/54229/"&gt;up to one month’s imprisonment&lt;/a&gt;.  Further, a citizen who refuses to assist an authority in decryption, as  one is required to under Section 69, may simply be exercising her &lt;a href="http://lawcommissionofindia.nic.in/reports/180rpt.pdf"&gt;constitutional right against self-incrimination&lt;/a&gt;. For these reasons and more, these provisions of the IT Act are arguably unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As bad as the IT Act is, legally the government has done far worse.  In the licenses that the Department of Telecommunications grants  Internet service providers, cellular providers and telecoms, there are  provisions that require them to provide direct access to all  communications data and content even without a warrant, which is not  permitted by the existing laws on interception. The licenses also force  cellular providers to have ‘bulk encryption’ of less than 40 bits.  (Since G.S.M. network encryption systems like A5/1, A5/2, and A5/3 have a  fixed encryption bit length of 64 bits, providers in India have been  known use A5/0, that is, no encryption, thus meaning any person — not  just the government — can use off-the-air interception techniques to  listen to your calls.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cybercafes (but not public phone operators) are required to maintain  detailed records of clients’ identity proofs, photographs and the Web  sites they have visited, for a minimum period of one year. Under the  rules designed as India’s data protection law (oh, the irony!),  sensitive personal data has to be shared with government agencies, if  required for “purpose of verification of identity, or for prevention,  detection, investigation including cyber incidents, prosecution, and  punishment of offenses.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along similar lines, in the rules meant to say when an Internet  intermediary may be held liable for a user’s actions, there is a  provision requiring the Internet company to “provide information or any  such assistance to government agencies legally authorized for  investigative, protective, cybersecurity activity.” (Incoherent, vague  and grammatically incorrect sentences are a consistent feature of laws  drafted by the Ministry of Communications and IT; one of the telecom  licenses states: “The licensee should make arrangement for monitoring  simultaneous calls by government security agencies,” when clearly they  meant “for simultaneous monitoring of calls.”)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a landmark 1996 judgment, the Indian Supreme Court  held that &lt;a href="http://indiankanoon.org/doc/87862/"&gt;telephone tapping is a serious invasion of an individual’s privacy&lt;/a&gt; and that the citizens’ right to privacy has to be protected from abuse  by the authorities. Given this, undoubtedly governments must have  explicit permission from their legislatures to engage in any kind of  broadening of electronic surveillance powers. Yet, without introducing  any new laws, the government has surreptitiously granted itself powers —  powers that Parliament hasn’t authorized it to exercise — by sneaking  such powers into provisions in contracts and in subordinate legislation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india'&gt;https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T10:20:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books">
    <title>How India Makes E-books Easier to Ban than Books (And How We Can Change That)</title>
    <link>https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books</link>
    <description>
        &lt;b&gt;Without getting into questions of what should and should not be unlawful speech, Pranesh Prakash chooses to take a look at how Indian law promotes arbitrary removal and blocking of websites, website content, and online services, and how it makes it much easier than getting offline printed speech removed.&lt;/b&gt;
        &lt;h2&gt;E-Books Are Easier To Ban Than Books, And Safer&lt;/h2&gt;
&lt;p&gt;Contrary to what Mr. Sibal's recent hand-wringing at objectionable online material might suggest, under Indian laws currently in force it is far easier to remove material from the Web, by many degrees of magnitude, than it is to ever get them removed from a bookstore or an art gallery.  To get something from a bookstore or an art gallery one needs to collect a mob, organize collective outrage and threats of violence, and finally convince either the government or a magistrate that the material is illegal, thereby allowing the police to seize the books or stop the painting from being displayed.  The fact of removal of the material will be noted in various records, whether in government records, court records, police records or in newspapers of record.    By contrast, to remove something from the Web, one needs to send an e-mail complaining about it to any of the string of 'intermediaries' that handle the content: the site itself, the web host for the site, the telecom companies that deliver the site to your computer/mobile, the web address (domain name) provider, the service used to share the link, etc.  Under the &lt;a href="https://cis-india.org/internet-governance/resources/intermediary-guidelines-rules"&gt;'Intermediary Guidelines Rules'&lt;/a&gt; that have been in operation since 11th April 2011, all such companies are required to 'disable access' to the complained-about content within thirty-six hours of the complaint.  It is really that simple.&lt;/p&gt;

&lt;p&gt;"That's ridiculous," you think, "surely he must be exaggerating."  Think again.  A researcher working with us at the Centre for Internet and Society tried it out, several times, with many different intermediaries and always with frivolous and flawed complaints, and was successful &lt;a class="external-link" href="http://www.cis-india.org/news/chilling-impact-of-indias-april-internet-rules"&gt; six out of seven times &lt;/a&gt;.  Thus it is easier to prevent Flipkart or Amazon from selling Rushdie's Midnight's Children than it is to prevent a physical bookstore from doing so: today Indira Gandhi wouldn't need to win a lawsuit in London against the publishers to remove a single line as she did then; she would merely have to send a complaint to online booksellers and get the book removed.  It is easier to block Vinay Rai's Akbari.in (just as CartoonsAgainstCorruption.com was recently blocked) than it is to prevent its print publication.  Best of all for complainants: there is no penalty for frivolous complaints such as those sent by us, nor are any records kept of who's removed what.  Such great powers of censorship without any penalties for their abuse are a sure-fire way of ensuring a race towards greater intolerance, with the Internet — that republic of opinions and expressions — being a casualty.&lt;/p&gt;

&lt;h2&gt;E-Book Bans Cannot Be Challenged&lt;/h2&gt;
&lt;p&gt;In response to some of the objections raised, the Cyberlaw Division of the Department of Information Technology, ever the dutiful guardian of free speech, noted that if you have a problem with access to your content being 'disabled', you could always &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=72066"&gt;approach a court&lt;/a&gt; and get that ban reversed.  Unfortunately, the Cyberlaw Division of the Department of Information Technology forgot to take into account that you can't contest a ban/block/removal if you don't know about it.  While they require all intermediaries to disable access to the content within thirty-six hours, they forgot to mandate the intermediary to tell you that the content is being removed.  Whoops.  They forgot to require the intermediary to give public notice that content has been removed following a complaint from person ABC or corporation XYZ on such-and-such grounds.  Whoops, again.&lt;/p&gt;

&lt;p&gt;So while records are kept, along with reasons, of book bans, there are no such records required to be kept of e-book bans.&lt;/p&gt;


&lt;h2&gt;E-Book Censors Are Faceless&lt;/h2&gt;
&lt;p&gt;Vinay Rai is a brave man.  He is being attacked by fellow journalists who believe he's disgracing the professional upholders of free-speech, and being courted by television channels who believe that he should be encouraged to discuss matters that are sub judice.  He is viewed by some as a man who's playing politics in courts on behalf of unnamed politicians and bureaucrats, while others view him as being bereft of common-sense for believing that companies should be legally liable for not having been clairvoyant and removing material he found objectionable, though he has never complained to them about it, and has only provided that material to the court in a sealed envelope.    I choose, instead, to view him as a scrupulous and brave man.  He has a face, and a name, and is willing to openly fight for what he believes in.  However, there are possibly thousands of unscrupulous Vinay Rais out there, who know the law better than he does, and who make use not of the court system but of the Intermediary Guidelines Rules, firmly assured by those Rules that their censorship activities will never be known, will never be challenged by Facebook and Google lawyers, and will never be traced back to them.&lt;/p&gt;
&lt;h2&gt;Challenging Invisible Censorship&lt;/h2&gt;
&lt;p&gt;Dear reader, you may have noticed that this is a bit like a trial involving Free Speech in which Free Speech is presumed guilty upon complaint, is not even told what the charges against it are, has not been given a chance to prove its innocence, and has no right to meet its accusers nor to question them.  Yet, the Cyberlaw Division of the Department of Information Technology continues to issue press releases defending these Rules as fair and just, instead of being simultaneously Orwellian and Kafkaesque.  These Rules are delegated legislation passed by the Department of Information Technology under &lt;a href="https://cis-india.org/internet-governance/resources/section-79-information-technology-act"&gt;s.79 of the Information Technology Act&lt;/a&gt;.  The Rules were laid before Parliament during the 2011 Monsoon session.  We at CIS believe that these Rules are *ultra vires* the IT Act as well as the Constitution of India, not only with respect to what is now (newly) proscribed online (which in itself is enough to make it unconstitutional), but how that which is purportedly unlawful is to be removed.  We have prepared an alternative that we believe is far more just and in accordance with our constitutional principles, taking on best practices from Canada, the EU, Chile, and Brazil, while still allowing for expeditious removal of unlawful material.  We hope that the DIT will consider adopting some of the ideas embodied in our draft proposal.&lt;/p&gt;

&lt;p&gt;As Parliament passed the IT Act in the midst of din, without any debate, it is easy to be skeptical and wonder whether Rules made under the IT Act will be debated.  However, I remain hopeful that Parliament will not only exercise its power wisely, but will perform its solemn duty — borne out of each MP's oath to uphold our Constitution — by rejecting these Rules.&lt;/p&gt;

&lt;p&gt;Photo credit: &lt;a href="https://secure.flickr.com/photos/grandgrrl/5240360344/"&gt;Lynn Gardner&lt;/a&gt;, under CC-BY-NC-SA 2.0 licence*&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?279712"&gt;This was reproduced in Outlook Magazine&lt;/a&gt; on 27 January 2012&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books'&gt;https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-02-21T11:50:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/a2kga-global-censorship">
    <title>Global Censorship: Shifting Modes, Persisting Paradigms</title>
    <link>https://cis-india.org/a2k/a2kga-global-censorship</link>
    <description>
        &lt;b&gt;'Global Censorship: Shifting Modes, Persisting Paradigms' is a book edited by Pranesh Prakash, Nagla Rizk, and Carlos Affonso Souza, and published by the Access to Knowledge Global Academy as part of its Access to Knowledge Research Series.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/a2kga-global-censorship'&gt;https://cis-india.org/a2k/a2kga-global-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-14T11:22:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle">
    <title>Freedom struggle 2.0</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle</link>
    <description>
        &lt;b&gt;In the face of the debate on net neutrality, here is a look at the consequences of not having a free, equal, and private internet.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindu.com/features/magazine/freedom-struggle-20/article7137585.ece"&gt;published in the Hindu&lt;/a&gt; on April 25, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;There has been so much noise surrounding net neutrality (generously helped along by &lt;a href="https://www.youtube.com/watch?t=55&amp;amp;v=mfY1NKrzqi0" target="_blank"&gt;All India Bakchod’s explanatory video&lt;/a&gt;) that by now even my technology-abhorring grandmother knows something is rotten in the state of Denmark.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, let us recap: net neutrality refers to a free and open Internet  that lets us utilise every channel of communication without bias or —  heaven forbid — having to pay extra dough. Paid sites and subscriptions  excluded of course; the owners have to send their kids to college, you  know. As to the Importance of net neutrality, it is “... a democratic  principle (in line with the right to equality in our Constitution) and  it is important for freedom of speech and expression,” says Pranesh  Prakash of the Centre for Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Evolving technologies cannot be regulated” was one of the opening lines of &lt;i&gt;Almost Human&lt;/i&gt;,  a science fiction/crime series that did not survive its debut season. A  profound statement, especially in the light of the blistering debate  over net neutrality. A debate that has the Twitterati frothing at the  mouth and primed to spew sarcasm at those against them in what is being  perceived as a battle of epic proportions. Sample these: @Roflindian:  What if this net neutrality debate was a clever ploy by telcos to  merrily push up rates? And we’ll be like — anything for net freedom!  @GabbbarSingh: Someone should launch a start-up just to announce its  support to #NetNeutrality “We at Random-Word-with-no-vowels support  #NetNeutrality”. @madversity: Net Neutrality has become so popular in  Delhi in just three days Aunties want to know where it is available so  they can wear it for Karva Chauth.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The battle for net neutrality, in India at least, looks to have  exacerbated suddenly in the past few weeks. In truth, however, the issue  has been brewing for quite a while, fanned by the Federal  Communications Commission’s (FCC) penchant for preparing sheaves of  rules and regulations, sundry disputes and discourses by the Reddit  demigods and anyone who owns a blog or a YouTube channel, the Bitcoin  mafia’s complacent insistence on being the saviour of the web as we know  it, and the rumours and filtered nuggets of news surrounding Google’s  plans for a mobile virtual network operator (MVNO).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Here, then, are the main antagonists of our piece: telecom company  Airtel (post its announcement of the ostensibly unpopular Airtel Zero  plan, so much so that the CEO decided to grace Airtel’s users with an  e-mail to “clear the air”) and Telecom Regulatory Authority of India  (TRAI) that has taken to pitting Davids (consumers) against Goliaths  (telecom companies) by floating a paper (subject to discussion and a  cannonade of indignant e-mails) containing “some of the strangest and  some ridiculously biased statements”, as Nikhil Pahwa succinctly put it  in a &lt;a href="http://www.medianama.com/2015/04/223-trais-internet-licensing-and-net-neutrality-consultation-paper-simpler-shorter-version/" target="_blank"&gt;&lt;i&gt;MediaNama piece&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;According to Airtel’s CEO, their “vision is to have every Indian on the  Internet. There are millions of Indians who think that the Internet is  expensive and do not know what it can do for them… We know that if we  allow them to experience the joys of the Internet they will join the  digital revolution.” Noble thought, but the sentiment is marred by the  sordid matter of blunt. “Airtel Zero is a technology platform that  connects application providers to their customers for free. The platform  allows any content or application provider to enrol on it so their  customers can visit these sites for free. Instead of charging customers  we charge the providers who choose to get on to the platform.” In  effect, restricting the freedom of the consumer to choose what site  he/she wishes to use.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;And I wish telecoms would stop bandying about the word “free” like  confetti at a wedding. ‘100 free SMSes per day! Only at Rs. 50 a month!’  Well, I’m still losing Rs. 50, aren’t I? Why would you insult my  intelligence by telling me my 100 SMSes are free then? “Customers are  free to choose which website they want to visit, whether it is toll free  or not. If they visit a toll free site they are not charged for data.  If they visit any other site normal data charges apply.” Well, pray tell  us plebians, Mr. CEO, since companies like Flipkart, NDTV and others  have already abandoned the Airtel Zero ship, and a Google probably  mightn’t consider coming aboard, having bigger fish to fry (i.e. its  MVNO plans), does not your unequal treatment of these websites go  against the very backbone of net neutrality?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The debate on net neutrality has more far-reaching consequences,  however, than just having to shell out extra to exchange annoying  Whatsapp group messages all day long or Skyping with your significant  other. The absence of neutrality will result in a barrage of unregulated  technologies and the unprecedented growth of the deep web (the portion  of Internet content that is not or cannot be indexed by regular or  standard search engines — typically comprising around 90 per cent of  data presently available on the World Wide Web). Most of the deep web is  a fairly innocuous place, consisting of anything from library  catalogues to your private folder of dead baby jokes, but it is also a  lair of (mostly) undetectable criminal activity (case in point, the  recent shutdown of Silk Road, an online black market for your every  requirement, and I mean &lt;i&gt;every&lt;/i&gt; requirement).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The deep web, naturally, is the best illustration of “a free, equal, and  private Internet” (when its powers are harnessed for good, not evil)  and so is its most popular currency — Bitcoin. A Bitcoin is, in the  concise words of Danny Bradbury (in an informative &lt;a href="http://www.coindesk.com/eroding-net-neutrality-hurt-bitcoin/" target="_blank"&gt;CoinDesk piece&lt;/a&gt;),  “a payment mechanism designed to level the playing field, driving out  unnecessary costs and making it possible for even the lowest income  members of society to participate in the economy. But it relies on a  free and open Internet to do so.” And vice versa. Researchers have been  working on a way to make micropayments and encryption work together  without privacy or bandwidth compromise via mesh networks (faster  connections through nearby peers, thus leading to net neutrality, and  further to telecoms becoming skittish). However, steady price gains for  Bitcoin as well as altcoins (alternative cryptocurrencies to bitcoin)  are undeniable proof that telecoms may have to bow to the inevitable.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Also, in the absence of a free and open Internet, organisations like  Wikileaks and Anonymous would abound with alacrity. While some would  call that an excellent development, there are those who would want to  banish Internet altogether from our fair land, making the &lt;i&gt;aam junta &lt;/i&gt;cower, tremble and rage by turns at the usurping of its digital rights.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Another thing that seems to be troubling very few, especially in the  wake of the wave of acrimony against Airtel, is Google’s plans to expand  into the MVNO market. Google, so goes the news, is planning to go into  partnership with Sprint and T-Mobile to further its plans of becoming a  wireless carrier. While Google already provides free or subsidised  Internet with Project Loon and Google Fiber, the new move could easily  prove a challenge to net neutrality. Some see the move as harmless — in  fact, for the greater good. Evidenced by a senior software engineer of  my acquaintance who, since Google makes money by tracking user  information and behaviour online and doesn’t prioritise certain kinds of  traffic on the Internet access it provides currently, doesn’t see them  having any incentive to do so in the cellular space. In fact, he finds  the Google MVNO a fascinating move, especially since Sprint and T-Mobile  have far fewer subscribers than ATT or Verizon — meaning that the MVNO  provider is at the mercy of these MNOs and that, were Google to be  successful with this, it means the MNOs are losing selling power. An  interesting irony in the context of net neutrality. On the other hand, a  researcher at Centre for Internet and Society and former tech  journalist is of the opinion that Google may try to push its services  since that has always been the case with corporates, whether they  provide CSR freebies or diversify their business.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;After all, “Who decides what we consume? What if tomorrow the government  decides everyone watching YouTube is wasting their time, or [those]  watching cricket should be doing something better? That starts to tread  into censorship...” says Vijay Anand of The Startup Centre. I suppose  all we can do is keep hope animatedly existent as to the triumph of the  freedom in our webspace and spam TRAI’s inbox with as many e-mails as we  can.&lt;/p&gt;
&lt;h2 class="body" style="text-align: justify; "&gt;Net Neutrality&lt;/h2&gt;
&lt;p class="body" style="text-align: justify; "&gt;Net neutrality is a principle that says &lt;b&gt;Internet Service Providers (ISPs)&lt;/b&gt; should treat all traffic and content on their networks equally.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;How does net neutrality affect you?&lt;/b&gt;&lt;br /&gt;The internet is now a level-playing field. Anybody can start up a website, stream music or use social media with the same amount of data that they have purchased with a particular ISP. But in the absence of neutrality, your ISP might favour certain websites over others for which you might have to pay extra. Website A might load at a faster speed than Website B because your ISP has a deal with Website A that Website B cannot afford. It’s like your electricity company charging you extra for using the washing machine, television and microwave oven above and beyond what you are already paying.&lt;/p&gt;
&lt;div&gt;&lt;b&gt;Why Now? &lt;/b&gt;
&lt;p style="text-align: justify; "&gt;Late last month, Trai released a draft consultation paper seeking  views from the industry and the general public on the need for  regulations for over-the-top (OTT) players such as Whatsapp, Skype,  Viber etc, security concerns and net neutrality. The objective of this  consultation paper, the regulator said, was to analyse the implications  of the growth of OTTs and consider whether or not changes were required  in the current regulatory framework.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Key Players&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div class="thfact-file"&gt;
&lt;ul class="list-y"&gt;
&lt;li&gt;&lt;b&gt;Internet Service Providers&lt;/b&gt; like Airtel, Vodaphone, Reliance...&lt;/li&gt;
&lt;li&gt;&lt;b&gt;The Telecom Regulatory Authority of India&lt;/b&gt; which lays down the rules for telecom companies&lt;/li&gt;
&lt;li&gt;The &lt;b&gt;Internet companies&lt;/b&gt; like Facebook, Google, whatsapp and other smaller startups&lt;/li&gt;
&lt;li&gt;You, &lt;b&gt;the consumer&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is an OTT?&lt;/b&gt;&lt;br /&gt;OTT or over-the-top refers to applications and services which are  accessible over the internet and ride on operators' networks offering  internet access services. The best known examples of OTT are Skype,  Viber, WhatsApp, e-commerce sites, Ola, Facebook messenger. The OTTs are  not bound by any regulations. The Trai is of the view that the lack of  regulations poses a threat to security and there’s a need for  government’s intervention to ensure a level playing field in terms of  regulatory compliance.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle'&gt;https://cis-india.org/internet-governance/news/the-hindu-zara-khan-april-25-2015-freedom-struggle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-27T01:23:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/foss">
    <title>Free and Open Source Software</title>
    <link>https://cis-india.org/openness/publications/foss</link>
    <description>
        &lt;b&gt;Free and open source software (FOSS) is a good thing from both the perspective of programmer and user freedoms as well as from the perspective of better and more efficient software production.  Also, FOSS forms the backbone of the Internet (BIND/NSD for DNS servers, Apache for web servers, sendmail/postfix/qmail for mail servers, Asterisk for VoIP servers, etc.), and the Internet as we know it would not exist without FOSS.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/foss'&gt;https://cis-india.org/openness/publications/foss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-01-11T10:59:01Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/publications/foss/FLOSS">
    <title>Free and Open Source Software</title>
    <link>https://cis-india.org/openness/publications/foss/FLOSS</link>
    <description>
        &lt;b&gt;Free and open source software (FOSS) is a good thing from both the perspective of programmer and user freedoms as well as from the perspective of better and more efficient software production. Also, FOSS forms the backbone of the Internet (BIND/NSD for DNS servers, Apache for web servers, sendmail/postfix/qmail for mail servers, Asterisk for VoIP servers, etc.), and the Internet as we know it would not exist without FOSS.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/foss/FLOSS'&gt;https://cis-india.org/openness/publications/foss/FLOSS&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-01-11T10:57:14Z</dc:date>
   <dc:type>Collection (Old)</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/alternative-jan-lokpal">
    <title>Framing an Alternative Approach to the Jan Lokpal</title>
    <link>https://cis-india.org/events/alternative-jan-lokpal</link>
    <description>
        &lt;b&gt;The National Campaign for Peoples' Right to Information (NCPRI) and the Centre for Internet and Society (CIS) are organizing a public talk on "Framing an Alternative Approach to the Jan Lokpal" on Friday, August 5, 2011 at CIS, Bangalore.

Shankar Singh, Nikhil Dey and Aruna Roy of MKSS and NCPRI will be speaking.&lt;/b&gt;
        
&lt;p&gt;The drafts of both the Lokpal as well as the Jan Lokpal bill have been 
criticised extensively on multiple grounds, including that of lack of 
accountability and concentration of power in a singular body.&amp;nbsp; This 
public talk seeks to provide a framework for an alternative conception 
of the Jan Lokpal that takes a multi-pronged approach to tackling 
corruption by moving towards concurrent anti-corruption and grievance 
redress measures.&lt;/p&gt;
&lt;h2&gt;Speakers&lt;/h2&gt;
&lt;p&gt;Shankar Singh, Aruna Roy and Nikhil Dey of the Mazdoor Kisan Shakti 
Sangathan (MKSS) and the National Campaign for Peoples' Right to 
Information (NCPRI)&lt;/p&gt;
&lt;h2&gt;Date and Time&lt;/h2&gt;
&lt;p&gt;Friday, August 5, 2011
&lt;br /&gt;18:00-19:30&lt;/p&gt;
&lt;h2&gt;Venue&lt;/h2&gt;
&lt;p&gt;Centre for Internet and Society
&lt;br /&gt;(next to Domlur Club and close to TERI)
&lt;br /&gt;194, 2-C Cross,
&lt;br /&gt;Domlur Stage II,
&lt;br /&gt;Bangalore
&lt;br /&gt;
&lt;br /&gt;Map: &lt;a class="moz-txt-link-freetext" href="http://goo.gl/2UV5J"&gt;http://goo.gl/2UV5J&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Background Reading&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;Nikhil Dey &amp;amp; Ruchi Gupta, &lt;a class="external-link" href="http://goo.gl/T5rxk"&gt;Putting the "Jan" in Lokpal Bill&lt;/a&gt; &lt;/li&gt;&lt;li&gt;Aruna Roy &amp;amp; Nikhil Dey, &lt;a class="external-link" href="http://goo.gl/IrR41"&gt;Make Sure the Cure Isn't Worse than the 
Disease&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Aruna Roy &amp;amp; Rakshita Swamy, &lt;a class="external-link" href="http://goo.gl/UJiKY"&gt;Lokpal Must Lead by 
Example&lt;/a&gt;&lt;/li&gt;&lt;li&gt;NCPRI, &lt;a class="external-link" href="http://goo.gl/HIlGZ"&gt;Draft Concept Notes from Public Consultations on Collective 
and Concurrent Lokpal Anti-Corruption and Grievance Redress Measures&lt;/a&gt;&lt;/li&gt;&lt;li&gt;NCPRI, &lt;a class="external-link" href="http://goo.gl/im8rA"&gt;Background Documents on Jan Lok Pal Bill&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;
&lt;br /&gt;== Contact ==
&lt;br /&gt;For more information, please contact:
&lt;br /&gt;Rakshita Swamy &amp;lt;rakshitaswamy at gmail dot com&amp;gt;, or
&lt;br /&gt;Pranesh Prakash &amp;lt;pranesh at cis-india dot org&amp;gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLX52EA.html" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLX52EA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/alternative-jan-lokpal'&gt;https://cis-india.org/events/alternative-jan-lokpal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    

   <dc:date>2011-10-11T11:42:00Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act">
    <title>Fixing India’s anarchic IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act</link>
    <description>
        &lt;b&gt;Section 66A of the Information Technology (IT) Act criminalizes “causing annoyance or inconvenience” online, among other things. A conviction for such an offence can attract a prison sentence of as many as three years. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's article was &lt;a class="external-link" href="http://www.livemint.com/Opinion/ji3XbzFoLYMnGQprNJvpQL/Fixing-Indias-anarchic-IT-Act.html"&gt;published in LiveMint&lt;/a&gt; on November 28, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;How could the ministry of communications and information technology draft such a loosely-worded provision that’s clearly unconstitutional? How could the ministry of law allow such shoddy drafting with such disproportionate penalties to pass through? Were any senior governmental legal officers—such as the attorney general—consulted? If so, what advice did they tender, and did they consider this restriction “reasonable”? These are some of the questions that arise, and they raise issues both of substance and of process. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;When the intermediary guidelines rules were passed last year, the government did not hold consultations in anything but name. Industry and non-governmental organizations (NGOs) sent in submissions warning against the rules, as can be seen from the submissions we retrieved under the Right to Information Act and posted on our website. However, almost none of our concerns, including the legality of the rules, were paid heed to. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, parliamentarians employed a little-used power to challenge the law passed by the government, leading communications minister Kapil Sibal to state that he would call a meeting with “all stakeholders”, and will revise the rules based on inputs. A meeting was called in August, where only select industry bodies and members of Parliament were present, and from which a promise emerged of larger public consultations. That promise hasn’t been fulfilled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, there is much that is rotten in the IT Act and the various rules passed under it, and a few illustrations—a longer analysis of which is available on the Centre for Internet and Society (CIS) website—should suffice to indicate the extent of the malaise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the secondary legislation (rules) cannot be passed under the section of the IT Act they claim as their authority. The intermediary guidelines violate all semblance of due process by not even requiring that a person whose content is removed is told about it and given a chance to defend herself. (Any content that is complained about under those rules is required to be removed within 36 hours, with no penalties for wilful abuse of the process. We even tested this by sending frivolous complaints, which resulted in removal.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The definition of “cyber terrorism” in section 66F(1)(B) of the IT Act includes wrongfully accessing restricted information that one believes can be used for defamation, and this is punishable by imprisonment for life. Phone-tapping requires the existence of a “public emergency” or threat to “public safety”, but thanks to the IT Act, online surveillance doesn’t. The telecom licence prohibits “bulk encryption” over 40 bits without key escrow, but these are violated by all, including the Reserve Bank of India, which requires that 128-bit encryption be used by banks. These are but a few of the myriad examples of careless drafting present in the IT Act, which lead directly to wrongful impingement of our civil and political liberties. While we agree with the minister for communications, that the mere fact of a law being misused cannot be reason for throwing it out, we believe that many provisions of the IT Act are prone to misuse because they are badly drafted, not to mention the fact that some of them display constitutional infirmities. That should be the reason they are amended, not merely misuse.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can be done? First, the IT Act and its rules need to be fixed. Either a court-appointed amicus curiae (who would be a respected senior lawyer) or a committee with adequate representation from senior lawyers, Internet policy organizations, government and industry must be constituted to review and suggest revisions to the IT Act. The IT Act (in section 88) has a provision for such a multi-stakeholder advisory committee, but it was filled with mainly government officials and became defunct soon after it was created, more than a decade ago. This ought to be reconstituted. Importantly, businesses cannot claim to represent ordinary users, since except when it comes to regulation of things such as e-commerce and copyright, industry has little to lose when its users’ rights to privacy and freedom of expression are curbed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, there must be informal processes and platforms created for  continual discussions and constructive dialogue among civil society,  industry and government (states and central) about Internet regulation  (even apart from the IT Act). The current antagonism does not benefit  anyone, and in this regard it is very heartening to see Sibal pushing  for greater openness and consultation with stakeholders. As he noted on  the sidelines of the Internet Governance Forum in Baku, different  stakeholders must work together to craft better policies and laws for  everything from cyber security to accountability of international  corporations to Indian laws. In his plenary note at the forum, he  stated: “Issues of public policy related to the Internet have to be  dealt with by adopting a multi-stakeholder, democratic and transparent  approach” which is “collaborative, consultative, inclusive and  consensual”. I could not have put it better myself. Now is the time to convert those most excellent intentions into action by engaging in an open reform of our laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Pranesh Prakash is policy director at the Centre for  Internet and Society.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act'&gt;https://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:33:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate">
    <title>Financial Express hosts #NetNeutralityDebate: ‘Price discrimination can be allowed, but not for the same packet of data’</title>
    <link>https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate</link>
    <description>
        &lt;b&gt;Trying to cut through the noise on Net Neutrality in India, FICCI in partnership with Financial Express is hosting a panel discussion titled ‘Decoding Net Neutrality’ in New Delhi on Wednesday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.financialexpress.com/article/tech/financial-express-to-host-netneutralitydebate/65828/"&gt;published in the Financial Express&lt;/a&gt; on April 24, 2015. Pranesh Prakash participated in the discussion.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moderated by Sunil Jain, the guests on the Net Neutrality debate  panel are Rajya Sabha MP Rajeev Chandrasekhar, Lok Sabha MP Baijayant  Jay Panda along with ICRIER chief executive Dr Rajat Kathuria, IAMAI  president Dr Subho Ray, Facebook’s head of public policy for South and  Central Asia Ankhi Das, COAI director general Rajan S Mathew, Com First  director Dr Mahesh Uppal and Policy Director of the Centre for Internet  and Society  Pranesh Prakash.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Highlights of the debate:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Starting off the discussion, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said that this issue is all about market abuse and market power and not  as utopian as it sounds. He said that this debate is nothing new as  regulators identified the problem long ago. Chandarasekhar added, “TRAI  had recognized in 2006 that there is an opportunity to abuse by access  providers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Joining the conversation, COAI director general &lt;b&gt;Rajan S Mathew&lt;/b&gt; said, “We have put the cart before the horse. What needs to be addressed first is online governance.”&lt;/p&gt;
&lt;p&gt;Looking forward, ICRIER chief executive &lt;b&gt;Rajat Kathuria&lt;/b&gt; said that we need to figure out the best way to use this privately funded public good. He added, “We still haven’t so far.”&lt;/p&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/-kTsnxtboSU" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;Com First director &lt;b&gt;Dr Mahesh Uppal&lt;/b&gt; tries to find a common ground and said, “Everyone is against ‘arbitrary commercial’ prioritisation or throttling.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Subho Ray&lt;/b&gt; agreed and said, “There should be no blocking, throttling and preferential treatment.”&lt;/p&gt;
&lt;p&gt;Facebook India’s&lt;b&gt; Ankhi Das&lt;/b&gt; said that Internet.org is  not for people who are already on the Internet. She explained, “Our  objective is that it should be free and non-exclusive.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: It’s free, no one has to pay to join the app, says Ankhi Das, Facebook India, on internet.org&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/3z70Q1-p7Xw" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash,&lt;/b&gt; Policy Director of the Centre  for Internet and Society intervened to add, “An universally affordable  model is important. We must ensure that the diversity that Internet  provides is not lost.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking the conversation further, &lt;b&gt;Rajeev Chandrasekhar&lt;/b&gt; said, “I don’t believe data packets can be discriminated except in terms of speed and bandwidth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; interjected, “We do not discriminate, we differentiate. And all businesses differentiate.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this point, &lt;b&gt;Rajat Kathuria&lt;/b&gt; said, “Price discrimination is something that should be allowed within boundaries of regulation.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Express New Media Editor &lt;b&gt;Nandagopal Rajan&lt;/b&gt; said that, “#NetNeutralityDebate panel agrees that price discrimination can be allowed, but not for the same packet of data.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Jay Panda&lt;/b&gt;, Lok Sabha MP now also joins the  discussion and says, “I have come out in favour of net neutrality  despite the fact that my family will be benefiting from the lack of it.  Whether fragmentation is desirable on the Internet or not, it needs to  be debated. I am not in favour of fragmented access to the Internet.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Watch video: There should be no prioritisation of one brand over another, says Baijayant Jay Panda on Net Neutrality&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/TIN0jiXtVPY" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlining his views, &lt;b&gt;Jay Panda&lt;/b&gt; reiterated, “Spectrum may be limited but access won’t be in the future. I am against prioritizing packets over others.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt; gave an overarching view and said,  “Everyone benefits from Internet. What we need to figure out is whether  everyone is getting paid enough.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; said, “It is possible for access providers to make money.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajan Mathews&lt;/b&gt; said, “I think it is not fair to say that telcos can influence the govt.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this &lt;b&gt;Jay Panda&lt;/b&gt; quipped, “The govt has to chip in its share to make the Internet accessible to all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jay Panda&lt;/b&gt; says govts have been behind the curve in #NetNeutralityDebate and telcos have benefitted from it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate'&gt;https://cis-india.org/internet-governance/news/financial-express-april-24-2015-net-neutrality-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-27T02:18:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012">
    <title>Feedback to Draft Copyright Rules, 2012</title>
    <link>https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted its written comments on the Draft Copyright Rules, 2012 to Mr. G.R. Raghavender, Registrar of Copyrights &amp; Director (BP&amp;CR), Ministry of Human Resource Development. &lt;/b&gt;
        &lt;p&gt;G.R. Raghavender&lt;br /&gt;Registrar of Copyrights &amp;amp; Director (BP&amp;amp;CR)&lt;br /&gt;Copyright Office&lt;br /&gt;Department of Higher Education&lt;br /&gt;Ministry of Human Resource Development&lt;br /&gt;4th floor, Jeevan Deep Building,&lt;br /&gt;Parliament Street&lt;br /&gt;New Delhi — 110001&lt;/p&gt;
&lt;p&gt;Dear Sir,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This submission contains comments from the Centre for Internet and Society on the Draft Copyright Rules, 2012.  I apologize for the slight delay in submitting these.&lt;/p&gt;
&lt;p&gt;Yours sincerely,&lt;br /&gt;Pranesh Prakash&lt;br /&gt;Policy Director&lt;br /&gt;Centre for Internet and Society&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Relinquishment of Copyright&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;The law in India allows anonymously and pseudonymously created works to be copyrighted as well, as is clear from section 23 of the Copyright Act. However, rule 8 as it currently is does not allow such authors to relinquish copyright. Relinquishment of copyright is a very different kind of act from registration of copyright, and hence it is not necessary to seek the same categories of information from both. Certain categories of information sought during registration of copyright ("class of work", "language of the work", "nationality of author") are required not because they help identify a work, but because they help in indexing the work ("class of work", "language of work") or in ensuring that the work is copyrightable in India ("nationality of author"). Such considerations do not matter when it comes to relinquishment of copyright, i.e., when a work is allowed to pass into the public domain. Further, technological progress has made it difficult to determine the answer to a question like "country of first publication", "nationality of the publisher", etc. If a work has been uploaded by an author on to his blog, is the publisher the author or the person hosting the blog? If an Indian author residing in India first publishes a work on the server located in Argentina, is the country of first publication India or Argentina? The answer to these questions does not make a difference to the issue of relinquishment of copyright. The only information that is required for relinquishment of rights is a) what work is being put in the public domain, b) by whom, c) from when.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the current requirements of rule 8 cannot easily be satisfied by using most of the popular means of relinquishing copyright (such as the CC0 — Creative Commons Zero — licence).&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Recommendations&lt;/h2&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;Rule 8 be modified to read: A public notice issued by an author relinquishing his or her rights as per subsection (1) of section 21 of the Copyright Act, shall include the following details: (a) Title of the work (b) Full name, or pseudonym, in case the work has not been created anonymously (c) Date of issuance of the notice (d) If copyright in the work is registered under section 45, the registration number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 9 be modified to read: Any one of the following shall constitute public notice of relinquishment of copyright: i. Mentioning of the notice on the work, or cover of the work, or in the metadata of the work if the work is electronic; or ii. Publication in a newspaper; or iii. Publication by the author on a publicly-accessible website&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 10 be modified to add the following sentence: The author shall forward a copy of the public notice to the Registrar of Copyright if copyright in the work has been registered under section 45 and on receiving such notice, the Registrar of Copyright shall post the same on the website of the Copyright Office.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Statutory Licence for Cover Versions&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p class="Firstparagraph"&gt;Rule 34(2) is redundant and does not contain any detail not already present in the existing proviso to section 31C(1) of the Copyright Act. Additionally, Rule 35 also does not contain any detail not already present in the existing parent provision, section 31C of the Copyright Act.&lt;/p&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p&gt;Rules 34(2) and 35 be deleted.&lt;br /&gt;Rule 37 should be modified to add a sub-rule requiring maintenance of records online.&lt;/p&gt;
&lt;h2&gt;Indexes&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;In rule 71(3), it requires that the indexes be maintained in the form of cards. These are presumably physical cards. It is unclear why the rule should not require the maintenance of these indexes online to facilitate search by the public. Further entries 13 and 14 of Schedule II are from a time when the transaction costs incurred by the Registrar of Copyright for providing extracts from an Index were non-negligible, and hence it would have been necessary to charge a person for such services. With the capabilities of electronic systems, such retrievals are almost costless, and can be done without the intervention of the Registrar of Copyright. Hence entries 13 and 14 should not be made applicable to online retrievals. If copyright societies can be required to provide information free of costs on their websites (as per rule 65), the Registrar of Copyright should be required to do so too.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;Modify sub-rule (3) of rule 71 to read: "Every Index shall be available online as a downloadable database, with an online search facility."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modify the second sentence in rule 72 to read: "The online search or inspection of the Register of Copyrights and Indexes can be utilised free of cost."&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Storage of Transient or Incidental Copies of a Work&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;It is not clear enough from the language of rule 74 that it applies only to s.52(1)(c) and not to s.52(1)(b). Since only s.52(1)(c) has a complaints mechanism, this should be made clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, to protect the interest of the public, the intermediaries should be asked to give public notice regarding the alleged infringing copy to ensure that the take-down mechanism is not abused, and secondly to ensure that the public can independently verify that intermediaries are following the requirement in rule 74(4) of restoring storage of the work if no court order is forthcoming within 21 days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, there is no clear precedent in India to treat a uniform resource identifier (URI) as 'place' for purposes of section 51(a)(ii) of the Copyright Act, 1957. Therefore it is necessary to further clarify the meaning of the term 'place' as used in current Rule 74(2)(d). This would be best served by using the correct technological term ("URI") instead of the word "place".&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;Modify sub-rule (1) of rule 74 to: "Any owner of copyright may give a written complaint as per clause (c) of subsection (1) of section 52 of the Copyright Act to a person who has facilitated..."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Add sub-rule (6) to rule 74: "The person responsible for storage shall put up a public notice thereby notifying all persons requesting access to the alleged infringing copy by stating reasons for restraining such access whether during the period of 21 days from the complaint from the copyright owner, or pursuant to an order from a competent court."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modify rule 74(2) to read: "Details of the specific uniform resource identifier (URI) where transient or incidental storage of the work may be taking place."&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Making or Adapting the Work by Organizations Working for the Benefit of Persons with Disabilities&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 75 requires organizations making use of the exception granted under s.52(1)(zb) to maintain records. This could not have been the intention of the legislature in passing s.52(1)(zb), since that provision does not require any maintenance of records. Indeed, none of the exceptions ennume-rated in s.52(1) require the maintenance of records. This is in contrast with s.31B, which is also applicable to organizations working for the benefit of persons with disabilities, but only those that are doing so as a for-profit venture. Rule 29(6) already requires the Registrar of Copyright to notify the grant of a licence under s.31B in the Official Gazette. That provision may be modified to add that the Registrar of Copyright maintains these records in a centralized database that can be queried online.&lt;/p&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p&gt;Delete rule 75, and modify rule 29(6) to include a centralized database.&lt;/p&gt;
&lt;h2&gt;Technological Protection Measures&lt;/h2&gt;
&lt;h3&gt;Analysis&lt;/h3&gt;
&lt;p class="Firstparagraph" style="text-align: justify; "&gt;Most experts seem to hold that s.65A of the Indian Copyright Act does not affect circumvention tools, as it only deals with the act of unauthorized circumvention and not with the tools, in sharp contrast with s.1201(a)(2) of the Digital Millennium Copyright Act in the US, which criminalises the "manufacture, import, offer to the public, provision, or otherwise trafficking in any [circumvention] technology, product, service, device, component, or part thereof". The Indian law has conciously chosen not to emulate the DMCA in this respect, as the WIPO Copyright Treaty does not require it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broad understanding of "facilitation" contained the Copyright Rules unfortunately seem to undermine this clear distinction. If facilitation is understood to include offer to the public, provision, or distribution, as seems to be the case in Rule 79(3) and 79(4), then law becomes unworkable with each and every website that allows for the downloading of any software that can be used to play DVDs, etc., must specifically keep a register of downloaders from India. This is unnecessary, and goes beyond the intent of s.65A, which is to cover those who actively facilitate circumvention and not those who make available the tools to circumvent. This distinction should not be blurred.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Delete sub-rules (3) and (4) of rule 79.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012'&gt;https://cis-india.org/a2k/feedback-to-draft-copyright-rules-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-10-04T04:53:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates">
    <title>Fallacies, Lies, and Video Pirates</title>
    <link>https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates</link>
    <description>
        &lt;b&gt;At a recent conference on counterfeiting and piracy, industry representatives variously pushed for stiffer laws for IP violation, more stringent enforcement of existing IP laws, and championed IP as the most important thing for businesses today.  This blog post tries to show how their arguments are flawed.&lt;/b&gt;
        
&lt;p&gt;The &lt;a class="external-link" href="http://www.cii.in"&gt;Confederation of Indian Industry&lt;/a&gt; (CII) organized its third annual conference on counterfeiting and piracy, with support from the United States Embassy and the Quality Brands Protection Committee of China (&lt;a class="external-link" href="http://www.apcoworldwide.com/Content/client_success/client_success.aspx?pid=0&amp;amp;csid=67a9334f-184b-4866-8ddc-975ca6ff485d"&gt;a body comprising more than 80 multinational companies&lt;/a&gt;).&amp;nbsp; Last week we &lt;a href="https://cis-india.org/../news/letter-from-civil-society-organizations-to-cii" class="internal-link" title="Letter from Civil Society Organizations to CII"&gt;criticised the conference in an open letter&lt;/a&gt;.&amp;nbsp; This week, we examine a few of the recurring themes that came up at the conference.&lt;/p&gt;
&lt;h3&gt;Something being substandard is not the same as something being counterfeit.&lt;/h3&gt;
&lt;p&gt;This was a mistake made by many whenever they invoked 'counterfeit' in the sense of something that is violative of one's patent and trademark rights.&amp;nbsp; The Indian Drugs and Cosmetics Act itself distinguishes between 'misbranded', 'adulterated', and 'spurious' drugs, thus recognizing that something that is made without proper authorization from rights owners isn't necessarily of a bad quality.&amp;nbsp; Indeed, this was substantiated by an audience member, a lawyer from Dr. Reddy's Lab.&amp;nbsp; She spoke of a &lt;em&gt;mandi&lt;/em&gt; in Agra where they seized medicines being sold under the Dr. Reddy's name, but produced by local manufacturers.&amp;nbsp; Upon lab testing, it turned out, much to their surprise, that the medicines were of the highest quality and were not substandard.&amp;nbsp; Similarly, many large companies including trusted FMCG companies like Hindustan Unilever and ITC are upbraided by authorities for violations of the Drugs and Cosmetics Act (for the cosmetics they produce) as well as the Prevention of Food Adulteration Act.&amp;nbsp; Thus, even legitimate businesses can produce substandard products.&amp;nbsp; Thus, a product can be unauthorized but not substandard, just as a product can be substandard but not counterfeit.&lt;/p&gt;
&lt;p&gt;This distinction becomes very important when we talk about patents, and especially drug patents.&amp;nbsp; A generic drug is &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Generic_drug"&gt;by definition&lt;/a&gt; identical or within an acceptable bio-equivalent range to the brand name counterpart with respect to pharmacokinetic and pharmacodynamic properties.&amp;nbsp; Thus, this entire category of high-quality drugs is often sought to be made illegal or counterfeit by large pharma companies.&amp;nbsp; Some countries like Kenya have capitulated.&amp;nbsp; But so far the World Health Assembly has been forced by developing countries to keep the issue of substandard medicines separate from patent-bypassing medicines.&lt;/p&gt;
&lt;p&gt;The industry, for all their talk about "out of the box" thinking on the issue, still only consider metrics such the number of piracy raids conducted as measures of success.&amp;nbsp; A question was put forth by Manisha Shridhar of the Intellectual Property &amp;amp; Trade Unit of the World Health Organization upon learning of the quality of the drugs seized at the Agra &lt;em&gt;mandi&lt;/em&gt;: Why not cut a licensing deal with those manufacturers, who obviously have excellent production facilities?&amp;nbsp; That kind of thinking, which helped HMV in India in the 1980s, and copying innovative features from video pirates and pricing their products competitively has helped an Indian company, Moserbaer, do extremely well.&lt;/p&gt;
&lt;h3&gt;Counterfeiters and pirates are not always seeking to fool consumers.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Only lawyers hired by the industry would think that a consumer aspiring towards a Rolex watch would actually think that the one he purchased off the streets for one-hundredth the original's price was in fact original.&amp;nbsp; Street-side DVD hawkers are not thought by the general public to be selling original wares.&amp;nbsp; Still, despite knowing the difference between the original and the fake, consumers many times opt for the latter.&lt;/p&gt;
&lt;p&gt;Having said that, counterfeiting, by using someone else's trademark and trying to pass off fake goods as real ones, is quite obviously wrong.&amp;nbsp; It harms customers, and it harms the manufacturers.&amp;nbsp; Thus, a distinction deserves to be made here between the counterfeiters who try to deceive consumers (for instance by copying authenticity marks, like holograms, etc.) and those who are just providing them with highly cheaper alternatives (pirated DVDs, etc.).&amp;nbsp; In this light, it is also important here to distinguish between counterfeiting, traditionally taken to be trademark violation, and piracy, traditionally taken to be a violation of international law, but now generally meaning a large-scale violation of copyright law.&amp;nbsp; While the former can lead to consumer confusion, the latter scarcely ever does.&amp;nbsp; This is ignored by industry people who evoke the image of the consumer quite often, but only when it helps them, and not in any meaningful manner.&amp;nbsp; They negate consumer choice when it comes to consciously purchasing pirated goods, and &lt;a class="external-link" href="http://a2knetwork.org"&gt;consumer freedoms when it comes to usage of copyrighted materials&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;While commercial film piracy funds terrorists, so does pretty much every business activity.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;A favourite of the MPAA (and by association, the MPA) is the RAND report on &lt;a href="http://www.rand.org/pubs/monographs/2009/RAND_MG742.pdf" target="_blank"&gt;Film Piracy and its Connection to Organized Crime and Terrorism&lt;/a&gt;.&amp;nbsp; This report, which was funded by the MPAA, predictably concludes that film piracy funds organized crime and terrorism.&amp;nbsp; Even if we are to believe its findings wholesale, it leaves us wondering whether all business activities from which terrorists derive funds should be banned.&lt;/p&gt;
&lt;p&gt;In India, there is a substantiated link between organized crime and film and music production, and terrorists have been said to make money off the stock market.&amp;nbsp; If the MPA's arguments are taken to their logical conclusions, then film production and equity trading should also be prosecuted.&amp;nbsp; Furthermore, while the mafia and terrorists are the ostensible targets, the laws that are brought about to tackle it affect poor roadside vendors and non-commercial online file sharers.&amp;nbsp; To tackle the funding of terrorists, roadside piracy shouldn't become the target just as film production &lt;em&gt;per se&lt;/em&gt; shouldn't.&amp;nbsp; The invocation of the RAND report is thus only meant for rhetorical effect, as it is hard to find logic in there.&lt;/p&gt;
&lt;h3&gt;"To copy without authorization is to steal", the death penalty, and drug peddling.&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;At the conference, Dominic Keating of the US Embassy pointed out that "to copy without authorization is to steal" and David Brener of US Customs and Border Protection kept emphasising, on at least two occasions, that "drug peddling merits an automatic death sentence in many countries".&amp;nbsp; There are numerous arguments one can make to show the lack of thought in the former.&amp;nbsp; One could point out that 'stealing' and 'theft' are things that happen to tangible property, and that not only is copyright not tangible, but it is barely property.&amp;nbsp; Copying without authorization creates one more of what existed, without depriving the authorizer (usually a corporation) of its original.&amp;nbsp; This goes against our notion of 'stealing'.&amp;nbsp; If the argument is to be shifted to the terrain of control over one's property/copyright, Mark Lemley in an &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=582602"&gt;illuminative article&lt;/a&gt; shows how the economic theories behind externalities in property and copyright are vastly different, and that complete control over either has never been, nor should it ever be, an aim of the law.&amp;nbsp; Simply put, someone free riding on your property leaves you worse off than earlier, while someone free riding on your copyright &lt;em&gt;usually&lt;/em&gt; doesn't.&lt;/p&gt;
&lt;p&gt;One could also point out that 'stealing' is endemic in activities involving human creativity.&amp;nbsp; &lt;a class="external-link" href="http://www.bartleby.com/200/sw11.html"&gt;T.S. Eliot notes&lt;/a&gt; that "Immature poets imitate; mature poets steal; bad poets deface what they take, and good poets make it into something better, or at least something different".&amp;nbsp; He does not even consider the possibility that artistic borrowing, whether by imitation or by 'stealing' does not happen.&amp;nbsp; Even Y.S. Rajan, Principal Adviser to CII recognized this when during the conference he noted that "imitation and innovation have an interesting and intertwining philosophical history".&amp;nbsp; If we are to take Mr. Keating's admonishment seriously, we would indeed have a very illustrious list of thieves on our hands, including the &lt;a class="external-link" href="http://www.kimbawlion.com/rant2.htm"&gt;Walt Disney Corporation&lt;/a&gt;, &lt;a class="external-link" href="http://www.theatlantic.com/doc/200204/posner"&gt;William Shakespeare&lt;/a&gt;, &lt;a class="external-link" href="http://www.guardian.co.uk/world/2004/apr/02/books.booksnews"&gt;Vladamir Nabokov&lt;/a&gt;, &lt;a class="external-link" href="http://www.alternet.org/story/18830/"&gt;Public Enemy&lt;/a&gt;, and pretty much every creative person who has ever lived.&amp;nbsp; Books can be written about this (and indeed, numerous books have been), so we shall not dwell on this issue.&lt;/p&gt;
&lt;p&gt;Mr. Brener's repeatedly spoke of how drug peddling attracts death penalty in many countries (though in neither the US nor in India has anyone ever received capital punishment for drug peddling), but he also clarified that he is not advocating for the death penalty for copyright violations.&amp;nbsp; That made one wonder why he was bringing up the death penalty at all.&amp;nbsp; He also made the dubious, non-substantiated claim (noting it as "true fact") that pirating movies is more profitable than selling heroin.&amp;nbsp; This claim &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;appears in an article about a report&lt;/a&gt; produced by the Australian Federation Against Counterfeit Theft (AFACT), but the original report is &lt;a class="external-link" href="http://www.google.com/search?q=heroin+site%3Aafact.com.au"&gt;nowhere to be found&lt;/a&gt;.&amp;nbsp; The &lt;a class="external-link" href="http://www.news.com.au/technology/story/0,25642,24236266-5014108,00.html"&gt;article about the AFACT report&lt;/a&gt; also claims that the pirates are using their illicit profits promote drug smuggling.&amp;nbsp; The seeming contradiction of film pirates investing in something that is riskier and less profitable doesn't seem to have caught the eye of the writers.&amp;nbsp; One version of the 'drugs are less profitable than pirated DVDs' claim (with marijuana taking heroin's place) was &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2009-August/003100.html"&gt;debunked on the Commons Law mailing list&lt;/a&gt;.&amp;nbsp; Pirated DVDs are sold for a fraction of the cost of the original.&amp;nbsp; It would be obvious to anyone that DVDs that are typically sold for Rs.30-50, where the cost of manufacture alone may be estimable to be around Rs. 10, cannot be more profitable than heroin peddling.&amp;nbsp; That apart, most online file sharing (deemed to be "piracy") is non-commercial.&amp;nbsp; Thus the question of profit does not really arise.&amp;nbsp; Still, for the industry, absence of a profit is equal to a loss.&lt;/p&gt;
&lt;p&gt;Thus, the rhetoric of crime, and that too heinous crime, is continually used, despite its being completely inapposite. Why does used to try to make IP enforcement a matter of state concern, rather than a matter of private, and civil, interest.&amp;nbsp; This way, illegitimate statistics and factoids are used to make &lt;a class="external-link" href="http://www.theregister.co.uk/2005/05/06/drinkordie_sentencing/"&gt;individual file-sharers who earn no money get lengthy prison sentences&lt;/a&gt;.&amp;nbsp; This and other ways in which IP enforcement has expanded are carefully documented in &lt;a class="external-link" href="http://www.twnside.org.sg/title2/intellectual_property/development.research/SusanSellfinalversion.pdf"&gt;this paper by Susan Sell&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Repeating false 'statistics' does not make them true.&lt;/h3&gt;
&lt;p&gt;Again, we were subjected to a number of dubious claims during the conference: If only counterfeiting and piracy were eliminated, India's fiscal deficit would disappear; the Indian entertainment industry loses 16000 crore (USD 4 billion) yearly to piracy; 820,000 direct jobs are lost due to film piracy; software piracy costs the industry USD 2.7 billion annually, etc.&amp;nbsp; These reports' methodologies have been thorougly discredited.&amp;nbsp; Even The Economist, a very conservative and pro-industry newspaper, believes that the &lt;a class="external-link" href="http://www.economist.com/displaystory.cfm?story_id=3993427"&gt;BSA-IDC annual reports on software piracy are utterly distorted&lt;/a&gt;.&amp;nbsp; Similarly, in the U.S., the figure of 750,000 jobs (around 8% of the U.S. unemployed in 2008) being lost due to piracy were touted by everyone from the Department of Commerce, the Chamber of Commerce, U.S. Border and Customs Protection, and the MPAA, RIAA, and BSA.&amp;nbsp; The amount of money lost each year in the U.S. due to IP infringement has been estimated to be between USD 200-250 billion (that's more
than the &lt;em&gt;combined&lt;/em&gt; 2005 gross domestic revenues of the movie, music, software, and video game industries).&amp;nbsp; In &lt;a class="external-link" href="http://arstechnica.com/tech-policy/news/2008/10/dodgy-digits-behind-the-war-on-piracy.ars"&gt;a lengthy piece in Ars Technica&lt;/a&gt;, Julian Sanchez traces back the history of both these figures, and shows how they are just large numbers used for lobbying, and are not based on actual studies.&amp;nbsp; The industry-commissioned &lt;a class="external-link" href="http://www.ey.com/IN/en/Industries/Media---Entertainment"&gt;Ernst &amp;amp; Young&amp;nbsp; report&lt;/a&gt; ("The Effects of Counterfeiting and Piracy on India's Entertainment Industry") was never made available to the public at large, thereby making it impossible to judge the methodological soundness of the survey and the veracity of the figures.&lt;/p&gt;
&lt;h3&gt;IP expansion and more stringent enforcement is counter-productive.&lt;/h3&gt;
&lt;p&gt;Chander Mohan Lall, copyright lawyer to various film studios (including Warner Bros.) in India, used a number of short film clips in presentation during the conference.&amp;nbsp; Upon being questioned about it, he admitted that he did not have permissions of the copyright holders, but claimed that his use fell under "the education exception" in Indian copyright law.&amp;nbsp; While I wish he were correct (because what he was doing was indeed educational use), as per the law he is wrong.&amp;nbsp; Section 52(1)(i) of the Copyright Act only exempts educational usage of cinematograph film recordings when "audience is limited to such staff and students [of an educational institution], the parents and guardians of the students and persons directly connected with the activities of the institution".&amp;nbsp; While there are other arguments he could seek to use to make his usage of the film clilps non-infringing, being excepted by the educational fair dealings clauses isn't one of them.&amp;nbsp; Thus, more stringent enforcement of IP rights actually engenders such unauthorized, but perfectly legitimate copying and communication to the public such as that done by Mr. Lall.&lt;/p&gt;
&lt;p&gt;Another way in which IP enforcement is being sought to be increased is by way of the so-called Goonda Acts.&amp;nbsp; These are generally statutes aimed at criminals and lumpen elements in society.&amp;nbsp; The Maharastra version, the &lt;a class="external-link" href="http://www.maharashtra.gov.in/english/homedept/pdf/act_1981.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders and Dangerous Persons Act, 1981&lt;/a&gt;, just became the &lt;a class="external-link" href="http://maharashtra.gov.in/data/gr/marathi/2009/07/15/20090717184706001.pdf"&gt;Maharashtra Prevention of Dangerous Activities of Slumlords, Bootleggers, Drug-Offenders, Dangerous Persons and Video Pirates Act&lt;/a&gt;.&amp;nbsp; The term "video pirate" is very widely defined, to include any copyright infringement-chargesheeter who is "engaged or is making preparations for engaging in any of his activities as a video pirates, which affect adversely or likely to affect adversely, the maintenance of public order". Public order is deemed to be disturbed by "producing and distributing pirated copies of music or film products, thereby resulting in a loss of confidence in administration".&amp;nbsp; Thus video pirates can possibly be interpreted to include individual sitting at home and using P2P networks to share films.&amp;nbsp; The only requirement is that they should have had a chargesheet lodged against them previously -- they needn't even have been convicted; being chargesheeted suffices.&amp;nbsp; Thus, non-commercial activities of file-sharing are equated to bootleggers and drug smugglers, and preventive detention (an anti-civil rights relic of India's colonial past) is applicable to them.&lt;/p&gt;
&lt;p&gt;IP expansion is happening without the ostensible justifications for IP being kept in mind. That Tirupathi ladoos are going to get GI (geographical indicator) protection was announced at the conference with great pride.&amp;nbsp; Geographical indicators are used to protect consumer interests, to ensure that no one outside a particular region (Champagne) can lay claim to be producing that product (Champagne) if the production of that product is intrinsically linked to special features found in that region (climate, etc.).&amp;nbsp; However, no devout person would want to purchase anything advertised as "Tirupathi ladoo" if it were produced outside the Venkateswara temple at Tirupathi, thus the question of consumer confusion does not arise.&amp;nbsp; What if someone malignantly advertises something as Tirupathi ladoo and claims it was made in Tirupathi (and not just that it tastes like the ladoo made there)?&amp;nbsp; Such a person can be taken to task for deceptive advertising, and there is no need for something to have IP protection to do so.&amp;nbsp; This represents a senseless expansionism of IP.&amp;nbsp; It is now IP for IP's sake.&lt;/p&gt;
&lt;p&gt;One of the speakers, Mr. V.N. Deshmukh, who though pro-stringent IP enforcement, astutely noted that, "When local demand is not met, they [consumers] turn to counterfeiters and pirates."&amp;nbsp; Local demand can be unsatisfied because of lack of supply, or because the supply is overpriced, or because the supply is not easy to access, or because what is supplied is inferior to what is demanded.&amp;nbsp; At the end of the day, as William Patry, Google's lead counsel, has noted, what companies sell to the public are products and services, and not IP.&amp;nbsp; It would thus be wise for businesses to be innovative and compete rather than trying to extend their monopolies and engaging in rent-seeking behaviour that is economical harmful to consumers.&amp;nbsp; They would also do well to remember that IP is not only a product but an input as well, so they are ultimately consumers themselves.&amp;nbsp; All the harsher laws and enforcement mechanisms that they push for right now will have unintended consequences, and come to affect them adversely.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates'&gt;https://cis-india.org/a2k/blogs/fallacies-lies-and-video-pirates&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-08-04T04:43:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
