<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/online-video-environment-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/the-national-public-meeting-on-software-patents"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/2010-special-301"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/tpm-copyright-amendment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1">
    <title>The Online Video Environment in India: A Survey Report</title>
    <link>https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1</link>
    <description>
        &lt;b&gt;Report on online for the Open Video Alliance, Centre for Internet and Society, and iCommons by Siddharth Chadha, Ben Moskowitz and Pranesh Prakash. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1'&gt;https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-12-21T07:31:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/online-video-environment-in-india">
    <title>The Online Video Environment in India - A Survey Report</title>
    <link>https://cis-india.org/openness/online-video-environment-in-india</link>
    <description>
        &lt;b&gt;iCOMMONS, the OPEN VIDEO ALLIANCE, and the CENTRE FOR INTERNET AND SOCIETY have initiated a research project which seeks to survey the online video environment in India and the opportunities this new medium presents for creative expression and civic engagement. This report seeks to define key issues in the Indian context and begins to develop a short-term policy framework to address them.&lt;/b&gt;
        
&lt;p&gt;The basic assumption of this paper is that the online video medium should support creative and technical innovation, competition, and public participation, and that open source technology can help develop these traits. These assumptions are not elaborated upon here. Instead, this report looks at questions of “openness” that are not strictly technological; that are specific to video in India; and that provide points of entry to a simple policy framework.&lt;/p&gt;
&lt;p&gt;The paper is organized in the following parts:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The first chapter, &lt;strong&gt;THE NATIONAL CHARACTER OF INDIAN VIDEO&lt;/strong&gt;, provides a brief historical timeline of events from the first screening of the Lumiere Brothers films in India in 1896, through the beginning of the twenty-first century. This chapter traces the traditional channels of dissemination of video content in India, and establishes the close and unique bond that the visual medium has formed with Indian society.&lt;/li&gt;&lt;li&gt;The second chapter, &lt;strong&gt;DIGITAL MEDIA AND NETWORK TRANSFORMATIONS&lt;/strong&gt;, looks at recent media transformations like the rise of the Internet and peer-to-peer networking, the proliferation of telecommunications, and other developments which form the backbone of the emerging online video medium. Peer-to-peer and associative networking provides a new means of content circulation throughout the country.&lt;/li&gt;&lt;li&gt;The third chapter, &lt;strong&gt;MAPPING CONTENT ON THE INTERNET&lt;/strong&gt;, traces the various types of visual content visible over these new networks, exploring case studies of videos circulating on the Internet which have raised new questions of censorship, freedom of speech, and the openness of the medium.&lt;/li&gt;&lt;li&gt;The fourth chapter, &lt;strong&gt;THE ‘OPEN VIDEO’ QUESTION&lt;/strong&gt;, creates a judgment-based framework to assess the openness of the medium. This chapter lays out a series of questions around the broad spectrum of openness, viewed from various perspectives of access, participation, open source technology, and availability, with the intent of mapping the circumstances under which online video operates in India. Moreover, the chapter focuses on the structural limitations to video which can be addressed by policy, or even an absence of policy.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Whereas the report consciously makes an effort to explore not only transitory web videos but also films, the terms ‘video’ and ‘film’, in many parts are treated interchangeably. Although films and videos represent different traditional mediums of recording, the interest of this report in examining the ‘online video’ content in India, consists of both types of material—accessed perhaps with little distinction&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The scope of this paper is extremely broad and touches upon a wide variety of issues in India, where each area has a peculiar specificity of its situation—urban or rural, geographic, and so on. Links and references have been provided in the footnotes for background readings of these issues.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/openness/publications/content-access/online-video-india-survey-v1" class="internal-link" title="The Online Video Environment in India: A Survey Report"&gt;Click here&lt;/a&gt; to download the report. [PDF, 1.22 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/online-video-environment-in-india'&gt;https://cis-india.org/openness/online-video-environment-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Content</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Open Video</dc:subject>
    

   <dc:date>2011-10-03T09:31:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/the-national-public-meeting-on-software-patents">
    <title>The National Public Meeting on Software Patents</title>
    <link>https://cis-india.org/openness/blog-old/the-national-public-meeting-on-software-patents</link>
    <description>
        &lt;b&gt;On Saturday, October 4, 2008, the Centre for Internet and Society, with the support of eighteen other organization, held a meeting on the National Public Meeting on Software Patents in the United Theological College campus. The aim of the event was to explore various issues surrounding software patents, especially from the perspective of the draft Patent Manual.&lt;/b&gt;
        
&lt;p&gt;After introductions by &lt;a href="https://cis-india.org/../../about-us/people/staff/staff#sunil-abraham" class="external-link"&gt;Sunil Abraham&lt;/a&gt; of CIS, the discussions were kicked off by &lt;a class="external-link" href="http://www.nls.ac.in/faculty_sudhir.html"&gt;Sudhir Krishnaswamy&lt;/a&gt; (an Assistant Professor at National Law School), who spoke about typology of laws; principle-based arguments for excluding software from patenting; policy-based arguments for the same; and lastly, strategies for combating the patent manual.&amp;nbsp; About the rationale behind excepting software ("computer programmes &lt;em&gt;per se&lt;/em&gt;") from patentability, he theorised that given the location of "computer programmes &lt;em&gt;per se&lt;/em&gt;" in section 3(k) of the Act, surrounded as it is by "mathematical or business method" and "algorithms", the exception seems to be a principle-based one and not a policy-based one.&amp;nbsp; He also talked about what he saw as the practical realities of the Patent Office, and questioned the role the Draft Manual would actually play in the decisions of Patent Examiners.&lt;br /&gt;&lt;br /&gt;He listed out economic arguments as:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Inapplicability of the incentive arguments.&amp;nbsp; The software industry does not need patents since copyright covers software, and even if incentives are required, that is incentive enough;&lt;/li&gt;&lt;li&gt;Return on investment.&amp;nbsp; Short shelf-life, and hence 17-year patent terms are irrelevant when the shelf-life is so small;&lt;/li&gt;&lt;li&gt;New intermediaries are created, who are neither producers nor consumers of software.&amp;nbsp; These intermediaries who help in price-discovery.&amp;nbsp; They discover value in patents which were previously thought neglected by the process known as patent trolling.&amp;nbsp; &lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;br /&gt;Apart from these, he also briefly talked of the legal arguments around software patents, and argued that the question is not only about copyright vs. patent, but also about property vs. contract.&amp;nbsp; He asked questions such as: "What role does copyright play in the software industry, or is contract more important?", and pointed out that while this might have been addressed around a decade ago, those questions need to be revisited given the current scenario.&amp;nbsp; Further, he proposed that the strategies should not revolve solely around the Patent Act and Draft Manual, but around pre- and post-grant oppositions as well.&lt;br /&gt;&lt;br /&gt;&lt;img class="image-right" src="../NMoSP%20005.jpg/image_mini" alt="Prabir Purkayastha" /&gt;Prabir Purkayastha of the Delhi Science Forum and Knowledge Commons spoke next, giving a quick run-through of the history, both legal and philosophical, surrounding software patents in India and in the U.S.&amp;nbsp; and Europe (pointing out that most of the wordings of Draft Manual on this point are borrowed from a similar document in the U.K.).&amp;nbsp;&amp;nbsp;He asked the question of why people are opposing software patents.&amp;nbsp; Is it because it is damaging to 'public interest', because it bad for Indian domestic software industry, or because it is an abstract idea which is sought to be patented in the guise of something else?&amp;nbsp; He concluded that ultimately it is not the manual that groups are opposing, but the notion of software patents themselves.&amp;nbsp; Thus, he focussed on how the phrase &lt;em&gt;"per se&lt;/em&gt;" used in the Act ought to be interpreted by the Patent Office so as to give credence to the Indian Parliament's rejection (in 2005) of the 2004 patent ordinance (in which section 3(k) read: "a computer programme &lt;em&gt;per se&lt;/em&gt; other than its technical application to industry or a combination with hardware").&amp;nbsp; Lastly, he talked about the various strategies to be employed in the fight against software patents, including pre- and post-grant oppositions.&lt;br /&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.gnu.org.in/about-fsf-india/whos-who"&gt;Dr. Nagarjuna G.&lt;/a&gt; of the Free Software Foundation of India focussed on what he termed "the absurdity of software patents".&amp;nbsp; He emphasised how software requires an interpreter or hardware, and hence talk of "software &lt;em&gt;per se&lt;/em&gt;" often becomes meaningless.&amp;nbsp; Further, he underlined how embedding software in hardware was not innovation in itself, and stressed ont he changing notions of software and hardware as we evolve technologically.&amp;nbsp; His equation of software with abstract ideas gives us a glimpse into the foundation of his objection to software patents.&lt;br /&gt;&lt;br /&gt;&lt;img class="image-left" src="../PrashantIyengar.jpg/image_mini" alt="Prashant Iyengar" /&gt;First up in the second session (which was more focussed on the manual, and the law in India) was &lt;a class="external-link" href="http://www.altlawforum.org/OUR_TEAM/profile"&gt;Prashant Iyengar&lt;/a&gt; of the Bangalore-based Alternative Law Forum.&amp;nbsp; He first listed out the different kinds of objections to software patents, including the point that there are only limited ways of thinking about programming, as Donald Knuth's &lt;em&gt;&lt;a class="external-link" href="http://www-cs-faculty.stanford.edu/~knuth/taocp.html"&gt;The Art of Computer Programming&lt;/a&gt; &lt;/em&gt;shows.&amp;nbsp; Then he went on to go through the history of software patents in India, from the first software patent, granted in 1996, through the 2002 Amendment, the 2004 Ordinance, the 2005 Amendment, and the 2005 and 2008 Draft Manuals.&amp;nbsp; He looked at the vocabulary surrounding software patents, including the words "&lt;em&gt;per se&lt;/em&gt;" and "as such", and the cases and legislations from which the language used in the Draft Manual might have been borrowed.&amp;nbsp; He also started a fruitful debate on the different ways to attack the implicit inclusion of that which is not "computer programmes &lt;em&gt;per se&lt;/em&gt;" within the scope of patentable subject matter.&lt;br /&gt;&lt;br /&gt;After Prashant was Venkatesh Hariharan of Red Hat.&amp;nbsp; He spoke on the practical benefits and harms of software patents, and spoke at length about the difference between legal protection of software in the form of patents and via copyright.&amp;nbsp; He pointed to data showing that lawyers are the ones who benefit most from software patents, and that software developers were the ones who suffered most.&amp;nbsp; Pointing to such practical issues such as how does one go about coding a simple e-commerce transaction when more than 4000 patents have already been granted in that area, he brought down the level of discussion from abstract notions of laws and legalities to practical experiences of software programmers.&lt;br /&gt;&lt;br /&gt;Next, Pranesh Prakash of the Centre for Internet and Society made a presentation on a small sample of software patents that have been applied for in India, and pointed out the infirmities in both the patents that have been applied for, as well as the problems in uncovering these patents because of various errors on the Indian Patent Office website.&amp;nbsp; Going through a few of the patent applications, he showed how a great number applications have very badly worded abstracts, filled with weasel words, whose sole purpose is obfuscating the fact that what is being applied for is a software patent.&amp;nbsp; This, he pointed out, made it difficult to both determine the scope of the applications (subject matter) as well as the innovations contained in the invention (novelty and non-obviousness), and thus difficult to examine from the perspective of pre-grant oppositions.&lt;br /&gt;&lt;br /&gt;After these presentations, the meeting continued with the Open House session which had many people making presentations, including Abhas Abhinav of &lt;a class="external-link" href="http://www.deeproot.co.in/"&gt;DeepRoot Linux&lt;/a&gt;, Arun M. of &lt;a class="external-link" href="http://www.gnu.org.in"&gt;FSF India&lt;/a&gt;, and Joseph C. Matthew, who is the IT Adviser to the Chief Minister, Kerala.&amp;nbsp; With the wrapping up of this session, the proceedings for the day came to a close.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Coverage in the press&lt;br /&gt;&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/openness/world-day-against-software-patents" class="internal-link" title="World Day Against Software Patents"&gt;The Hindu (September 25, 2008) - World Day Against Software Patents&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/openness/time-out-bengaluru-software-patenting" class="internal-link" title="Time Out Bengaluru - Software Patenting"&gt;Time Out Bengaluru (October 3, 2008) - Software Patenting&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/openness/software-patenting-will-harm-industry-consumer" class="internal-link" title="Software patenting will harm industry, consumer"&gt;The Hindu (October 5, 2008) - Software patenting will harm industry, consumer&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;Audio Recordings and Slides&lt;br /&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;The Principles of Patent Law and Introduction to Software Patents&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;Sudhir Krishnaswamy (National Law School) | &lt;a href="https://cis-india.org/openness/blog-old/uploads/02.%20Sudhir%20Krishnaswamy.mp3" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/02.%20Sudhir%20Krishnaswamy.ogg" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Prabir Purkayastha(Delhi Sience Forum) (Knowledge Commons) |&lt;a href="https://cis-india.org/openness/blog-old/uploads/03.%20Prabir%20Purkayastha.mp3" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;mp3&lt;/a&gt;&amp;nbsp;| &lt;a href="https://cis-india.org/openness/blog-old/uploads/03.%20Prabir%20Purkayastha.ogg" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Nagarjuna G.(Free Software Foundation of India) |&amp;nbsp;&lt;a href="https://cis-india.org/openness/blog-old/uploads/04.%20Nagarjuna%20G..mp3" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/04.%20Nagarjuna%20G..ogg" class="internal-link" title="The Principles of Patent Law and Introduction to Software Patents"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;li&gt;Software Patents in India: The Indian Patent Act and the Draft Patent Manual&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;Prashant Iyengar(Alternative Law Forum) | &lt;a href="https://cis-india.org/openness/blog-old/uploads/05.%20Prashant%20Iyengar.mp3" class="internal-link" title="Software Patents in India - The Indian Patent Act and the Draft Patent Manual"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/05.%20Prashant%20Iyengar.ogg" class="internal-link" title="Software Patents in India - The Indian Patent Act and the Draft Patent Manual"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;li style="text-align: left;"&gt;Venkatesh Hariharan(Red Hat) &amp;nbsp;| &lt;a href="https://cis-india.org/openness/blog-old/uploads/06.%20Venkatesh%20Hariharan.mp3" class="internal-link" title="Software Patents in India - The Indian Patent Act and the Draft Patent Manual"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/06.%20Venkatesh%20Hariharan.ogg" class="internal-link" title="Software Patents in India - The Indian Patent Act and the Draft Patent Manual"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;li&gt;Software Patent Applications in India&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;Pranesh Prakash (Centre for Internet and Society) |&amp;nbsp;&lt;a href="https://cis-india.org/openness/blog-old/uploads/07.%20Pranesh%20Prakash.mp3" class="internal-link" title="Presentation on Software Patents Applied for in India"&gt;mp3&lt;/a&gt;&amp;nbsp;| &lt;a href="https://cis-india.org/openness/blog-old/uploads/07.%20Pranesh%20Prakash.ogg" class="internal-link" title="Presentation on Software Patents Applied for in India"&gt;ogg&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/pranesh-software-patents-draft.ppt" class="internal-link" title="software patent draft pranesh"&gt;ppt&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;li&gt;Open House &lt;br /&gt;&lt;/li&gt;
&lt;ul&gt;&lt;li&gt;Abhas Abhinav (DeepRoot Linux) &amp;nbsp;|&amp;nbsp;&lt;a href="https://cis-india.org/openness/blog-old/uploads/08.%20Abhas%20Abhinav.mp3" class="internal-link" title="Open House"&gt;mp3&lt;/a&gt; |&amp;nbsp;&lt;a href="https://cis-india.org/openness/blog-old/uploads/09.%20Arun%20M..mp3" class="internal-link" title="Open House"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Arun M.(Free Software Foundation of India)|&amp;nbsp;&lt;a href="https://cis-india.org/openness/blog-old/uploads/09.%20Arun%20M..mp3" class="internal-link" title="Open House"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/09.%20Arun%20M..ogg" class="internal-link" title="Open House"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Joseph Mathew (IT Adviser to the Chief Minister, Kerala)| &lt;a href="https://cis-india.org/openness/blog-old/uploads/10.%20Joseph%20Mathew.mp3" class="internal-link" title="Open House"&gt;mp3&lt;/a&gt; | &lt;a href="https://cis-india.org/openness/blog-old/uploads/10.%20Joseph%20Mathew.ogg" class="internal-link" title="Open House"&gt;ogg&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/the-national-public-meeting-on-software-patents'&gt;https://cis-india.org/openness/blog-old/the-national-public-meeting-on-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Campaign</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Meeting</dc:subject>
    

   <dc:date>2011-08-23T03:02:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/2010-special-301">
    <title>The 2010 Special 301 Report Is More of the Same, Slightly Less Shrill</title>
    <link>https://cis-india.org/a2k/blogs/2010-special-301</link>
    <description>
        &lt;b&gt;Pranesh Prakash examines the numerous flaws in the Special 301 from the Indian perspective, to come to the conclusion that the Indian government should openly refuse to acknowledge such a flawed report.  He notes that the Consumers International survey, to which CIS contributed the India report, serves as an effective counter to the Special 301 report.&lt;/b&gt;
        &lt;h1&gt;Special 301 Report: Unbalanced Hypocrisy&lt;/h1&gt;
&lt;p&gt;The United States Trade Representative has put yet another edition of the Special 301 report which details the copyright law and policy wrongdoings of the US's trading partners.  Jeremy Malcolm of Consumers International notes that the report this year claims to be "well-balanced assessment of intellectual property protection and enforcement ... taking into account diverse factors", but:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;[I]n fact, the report largely continues to be very one-sided.  As in previous editions, it lambasts developing countries for failing to meet unrealistically stringent standards of IP protection that exceed their obligations under international law.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;More the report changes, &lt;a href="http://cis-india.org/advocacy/ipr/blog/consumers-international-ip-watch-list-2009"&gt;the more it stays the same&lt;/a&gt;. &lt;a href="http://www.michaelgeist.ca/content/view/4684/195/"&gt;Despite having wider consultations&lt;/a&gt; than just the International Intellectual Property Alliance (IIPA, consisting of US-based IP-maximalist lobbyists like the Motion Picture Association of America, Recording Industry Association of America, National Music Publishers Association, Association of American Publishers, and Business Software Alliance) and the Pharmaceutical Research and Manufacturers of America (PhRMA, consisting of US-based pharma multinationals), things haven't really changed much in terms of the shoddiness of the Special 301 report.&lt;/p&gt;
&lt;h1&gt;India and the 2010 Special 301 Report&lt;/h1&gt;
&lt;p&gt;The Special 301 report for 2010 contains the following assessment of India:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;India will remain on the Priority Watch List in 2010. India continues to make gradual progress on efforts to improve its legislative, administrative, and enforcement infrastructure for IPR. India has made incremental improvements on enforcement, and its IP offices continued to pursue promising modernization efforts. Among other steps, the United States is encouraged by the Indian government’s consideration of possible trademark law amendments that would facilitate India’s accession to the Madrid Protocol. The United States encourages the continuation of efforts to reduce patent application backlogs and streamline patent opposition proceedings. Some industries report improved engagement and commitment from enforcement officials on key enforcement challenges such as optical disc and book piracy. However, concerns remain over India’s inadequate legal framework and ineffective enforcement. Piracy and counterfeiting, including the counterfeiting of medicines, remains widespread and India’s enforcement regime remains ineffective at addressing this problem. Amendments are needed to bring India’s copyright law in line with international standards, including by implementing the provisions of the WIPO Internet Treaties. Additionally, a law designed to address the unauthorized manufacture and distribution of optical discs remains in draft form and should be enacted in the near term. The United States continues to urge India to improve its IPR regime by providing stronger protection for patents. One concern in this regard is a provision in India’s Patent Law that prohibits patents on certain chemical forms absent a showing of increased efficacy. While the full import of this provision remains unclear, it appears to limit the patentability of potentially beneficial innovations, such as temperature-stable forms of a drug or new means of drug delivery. The United States also encourages India to provide protection against unfair commercial use, as well as unauthorized disclosure, of undisclosed test or other data generated to obtain marketing approval for pharmaceutical and agricultural chemical products. The United States encourages India to improve its criminal enforcement regime by providing for expeditious judicial disposition of IPR infringement cases as well as deterrent sentences, and to change the perception that IPR offenses are low priority crimes. The United States urges India to strengthen its IPR regime and will continue to work with India on these issues in the coming year. &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This short dismissal of the Indian IPR regime, and subsequent classification of India as a "Priority Watch List" country reveals the great many problems with the Special 301.&lt;/p&gt;
&lt;h2&gt;On Copyrights&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;The report notes that there are "concerns over India's inadequate legal framework and ineffective enforcement".  However, nowhere does it bother to point out precisely &lt;em&gt;how&lt;/em&gt; India's legal framework is inadequate, and how this is negatively affecting authors and creators, consumers, or even the industry groups (MPAA, RIAA, BSA, etc.) that give input to the USTR via the IPAA.  Nor does it acknowledge the well-publicised fact that the statistics put out by these bodies have time and again &lt;a href="http://www.cis-india.org/a2k/blog/fallacies-lies-and-video-pirates"&gt;proven to be wrong&lt;/a&gt;:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Apart from this bald allegation which has not backing, there is a bald statement about India needing to bring its copyright law "in line with international standards" including "the WIPO Internet Treaties".  The WIPO Internet Treaties given that more than half the countries of the world are not signatories to either of the WIPO Internet Treaties (namely the WIPO Copyright Treaty and the WIPO Performance and Phonograms Treaty), calling them 'international standards' is suspect.  That apart, both those treaties are TRIPS-plus treaties (requiring protections greater than the already-high standards of the TRIPS Agreement).  India has not signed either of them.  It should not be obligated to do so. Indeed, Ruth Okediji, a noted copyright scholar, &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1433848"&gt;states&lt;/a&gt;:&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote&gt;
&lt;p&gt;Consistent with their predecessors, the WIPO Internet Treaties marginalize collaborative forms of creative engagement with which citizens in the global South have long identified and continue in the tradition of assuming that copyright’s most enduring cannons are culturally neutral. [...] The Treaties do not provide a meaningful basis for a harmonized approach to encourage new creative forms in much the same way the Berne Convention fell short of embracing diversity in patterns and modes of authorial expression.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Some of the of the 'problems' noted in the report are actually seen as being beneficial by many researchers and scholars such as Lawrence Liang, Achal Prabhala, Perihan Abou Zeid &lt;a href="https://sites.google.com/site/iipenforcement/bibliography"&gt;and others&lt;/a&gt;, who argue that &lt;a href="http://www.altlawforum.org/intellectual-property/publications/articles-on-the-social-life-of-media-piracy/reconsidering-the-pirate-nation"&gt;lax enforcement has enabled access to knowledge and promotion of innovation&lt;/a&gt;.  In a panel on 'Access to Knowledge' at the Internet Governance Forum, &lt;a href="http://a2knetwork.org/access-knowledge-internet-governance-forum"&gt;Lea Shaver, Jeremy Malcolm and others&lt;/a&gt; who have been involved in that Access to Knowledge movement noted that lack of strict enforcement played a positive role in many developing countries.  However, they also noted, with a fair bit of trepidation, that this was sought to be changed at the international level through treaties such as the Anti-Counterfeiting Treaty Agreement (ACTA).&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The scope of an optical disc law are quite different from copyright law.  The report condemns "unauthorized manufacture and distribution of optical discs", however it does not make it clear that what it is talking about is not just unlicensed copying of films (which is already prohibited under the Copyright Act) but the manufacture and distribution of blank CDs and DVDs as well.  The need for such a law is assumed, but never demonstrated.  It is onerous for CD and DVD manufacturers (such as the Indian company Moserbaer), and is an overbearing means of attacking piracy.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The report calls for "improve[ment] [of India's] criminal enforcement regime" and for "deterrent" sentences and expeditious judicial disposition of IPR infringement cases.  While we agree with the last suggestion, the first two are most unacceptable.  Increased criminal enforcement of a what is essentially a private monopoly right is undesirable.  Copyright infringment on non-commercial scales should not be criminal offences at all.  What would deter people from infringing copyright laws are not "deterrent sentences" but more convenient and affordable access to the copyright work being infringed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;On Patents&lt;/h2&gt;
&lt;p&gt;Thankfully, this year the Special 301 report does not criticise the Indian Patent Act for providing for post-grant opposition to patent filings, as it has in previous years.  However, it still criticises section 3(d) of the Patent Act which ensures that 'evergreening' of drug patents is not allowed by requiring for new forms of known substances to be patented only if "the enhancement of the known efficacy of [the known] substance" is shown.  Thus, the US wishes India to change its domestic law to enable large pharma companies to patent new forms of known substances that aren't even better ("enhancement of the known efficacy").  For instance, "new means of drug delivery" will not, contrary to the assertions of the Special 301 report and the worries of PhRMA, be deemed unpatentable.&lt;/p&gt;
&lt;p&gt;The United States has been going through much turmoil over its patent system.  Reform of the patent system is currently underway in the US through administrative means, judicial means, as well as legislative means.  One of the main reasons for this crumbling of the patent system has been the low bar for patentability (most notably the 'obviousness' test) in the United States and the subsequent over-patenting.  An &lt;a href="http://supreme.justia.com/us/447/303/case.html"&gt;American judgment&lt;/a&gt; even noted that "anything under the sun that is made by man" is patentable subject matter. It is well-nigh impossible to take American concerns regarding our high patent standards seriously, given this context.&lt;/p&gt;
&lt;h2&gt;Miscellanea&lt;/h2&gt;
&lt;p&gt;The harms of counterfeit medicine, as &lt;a href="http://www.cis-india.org/a2k/blog/fallacies-lies-and-video-pirates"&gt;we have noted earlier&lt;/a&gt;, are separate issues that are best dealt under health safety regulations and consumer laws, rather than trademark law.&lt;/p&gt;
&lt;p&gt;Data exclusivity has been noted to be harmful to the progress of generics, and seeks to extend proprietary rights over government-mandated test data.  It is [clear from the TRIPS Agreement][de-trips] that data exclusivity is not mandatory.  There are clear rationale against it, and the Indian pharmaceutical industry [is dead-set against it][de-india].  Still, the United States Trade Representative persists in acting as a corporate shill, calling on countries such as India to implement such detrimental laws.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Michael Geist, professor at University of Ottowa &lt;a href="http://www.michaelgeist.ca/content/view/4997/125"&gt;astutely notes&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Looking beyond just Canada, the list [of countries condemned by the Special 301 report] is so large, that it is rendered meaningless.  According to the report, approximately 4.3 billion people live in countries without effective intellectual property protection.  Since the report does not include any African countries outside of North Africa, the U.S. is effectively saying that only a small percentage of the world meet its standard for IP protection.  Canada is not outlier, it's in good company with the fastest growing economies in the world (the BRIC countries are there) and European countries like Norway, Italy, and Spain. 
In other words, the embarrassment is not Canadian law.  Rather, the embarrassment falls on the U.S. for promoting this bullying exercise and on the Canadian copyright lobby groups who seemingly welcome the chance to criticize their own country. &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;His comments apply equally well for India as well.&lt;/p&gt;
&lt;h1&gt;IIPA's Recommendation for the Special 301 Report&lt;/h1&gt;
&lt;p&gt;Thankfully, this year &lt;a href="http://www.iipa.com/rbc/2010/2010SPEC301INDIA.pdf"&gt;IIPA's recommendations&lt;/a&gt; have not been directly copied into the Special 301 report.  (They couldn't be incorporated, as seen below.)  For instance, the IIPA report notes:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The industry is also concerned about moves by the government to consider mandating the use of open source software and software of only domestic origin. Though such policies have not yet been implemented, IIPA and BSA urge that this area be carefully monitored.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Breaking that into two bit:&lt;/p&gt;
&lt;h2&gt;Open Source&lt;/h2&gt;
&lt;p&gt;Firstly, it is curious to see industry object to legal non-pirated software.  Secondly, many of BSA's members (if not most) use open source software, and a great many of them also produce open source software.  &lt;a href="http://hp.sourceforge.net/"&gt;HP&lt;/a&gt; and &lt;a href="http://www-03.ibm.com/linux/ossstds/"&gt;IBM&lt;/a&gt; have been huge supporters of open source software.  Even &lt;a href="http://www.microsoft.com/opensource/"&gt;Microsoft has an open source software division&lt;/a&gt;.  [Intel][intel], &lt;a href="http://www.sap.com/usa/about/newsroom/press.epx?pressid=11410"&gt;SAP&lt;/a&gt;, &lt;a href="http://www.cisco.com/web/about/doing_business/open_source/index.html"&gt;Cisco&lt;/a&gt;, &lt;a href="http://linux.dell.com/projects.shtml"&gt;Dell&lt;/a&gt;, &lt;a href="http://www.sybase.com/developer/opensource"&gt;Sybase&lt;/a&gt;, &lt;a href="http://www.entrust.com/news/index.php?s=43&amp;amp;item=702"&gt;Entrust&lt;/a&gt;, &lt;a href="http://about.intuit.com/about_intuit/press_room/press_release/articles/2009/IntuitPartnerPlatformAddsOpenSourceCommunity.html"&gt;Intuit&lt;/a&gt;, &lt;a href="http://www.synopsys.com/community/interoperability/pages/libertylibmodel.aspx"&gt;Synopsys&lt;/a&gt;, &lt;a href="http://www.apple.com/opensource/"&gt;Apple&lt;/a&gt;, &lt;a href="http://www.theregister.co.uk/2005/04/22/jbuilder_eclipse/"&gt;Borland&lt;/a&gt;, &lt;a href="http://w2.cadence.com/webforms/squeak/"&gt;Cadence&lt;/a&gt;, &lt;a href="http://usa.autodesk.com/adsk/servlet/item?siteID=123112&amp;amp;id=6153839"&gt;Autodesk&lt;/a&gt;, and &lt;a href="http://news.cnet.com/8301-13505_3-9967593-16.html"&gt;Siemens&lt;/a&gt; are all members of BSA which support open source software / produce at least some open source software.  And &lt;em&gt;all&lt;/em&gt; BSA members rely on open source software (as part of their core products, their web-server, their content management system, etc.) to a lesser or greater extent.  BSA's left hand doesn't seem to know what its right hand -- its members -- are doing.  Indeed, the IIPA does not seem to realise that the United States' government itself uses [open source software], and has been urged to &lt;a href="http://news.bbc.co.uk/2/hi/7841486.stm"&gt;look at FOSS very seriously&lt;/a&gt; and is doing so, especially under CIO Vivek Kundra.  And that may well be the reason why the USTR could not include this cautionary message in the Special 301 report.&lt;/p&gt;
&lt;h2&gt;Domestic Software&lt;/h2&gt;
&lt;p&gt;As &lt;a href="http://arstechnica.com/tech-policy/news/2010/04/indias-copyright-proposals-are-un-american-and-thats-bad.ars"&gt;this insightful article by Nate Anderson in Ars Technica&lt;/a&gt; notes:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Open source is bad enough, but a "buy Indian" law? That would be &lt;a href="http://www.canadainternational.gc.ca/sell2usgov-vendreaugouvusa/procurement-marches/buyamerica.aspx?lang=eng"&gt;an outrage&lt;/a&gt; and surely something the US government would not itself engage in &lt;a href="http://www.canadainternational.gc.ca/sell2usgov-vendreaugouvusa/procurement-marches/ARRA.aspx?lang=eng"&gt;as recently as last year&lt;/a&gt;. Err, right?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Furthermore, the IIPA submission do not provide any reference for their claim that "domestic origin" software is being thought of being made a mandatory requirement in governmental software procurement.&lt;br /&gt;
&lt;/p&gt;
&lt;h2&gt;WCT, WPPT, Camcording, and Statutory Damages&lt;/h2&gt;
&lt;p&gt;The IIPA submission also wish that India would:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Adopt a system of statutory damages in civil cases; allow compensation to be awarded in criminal cases;&lt;/li&gt;
&lt;li&gt;Adopt an optical disc law;&lt;/li&gt;
&lt;li&gt;Enact Copyright Law amendments consistent with the WCT and WPPT;&lt;/li&gt;
&lt;li&gt;Adopt an anti-camcording criminal provision.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Quick counters:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Statutory damages (that is, an amount based on statute rather than actual loss) would result in ridiculousness such as the $1.92 million damages that the jury (based on the statutory damages) slapped on Jammie Thomas.  The judge in that case &lt;a href="http://arstechnica.com/tech-policy/news/2010/01/judge-slashes-monstrous-jammie-thomas-p2p-award-by-35x.ars"&gt;called the damage award&lt;/a&gt; "monstrous and shocking" and said that veered into "the realm of gross injustice."&lt;/li&gt;
&lt;li&gt;The reasons against an optical disc law are given above.  Quick recap: it is a) unnecessary and b) harmful.&lt;/li&gt;
&lt;li&gt;India has not signed the WCT and the WPPT.  Indian law satisfies all our international obligations.  Thus enacting amendments consistent with the WCT and the WPPT is not required.&lt;/li&gt;
&lt;li&gt;Camcording of a film is in any case a violation of the Copyright Act, 1957, and one would be hard-pressed to find a single theatre that allows for / does not prohibit camcorders.  Given this, the reason for an additional law is, quite frankly, puzzling.  At any rate, IIPA in its submission does not go into such nuances.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Further conclusions&lt;/h2&gt;
&lt;p&gt;&lt;a href="http://spicyipindia.blogspot.com/2010/05/us-special-301-report-and-not-so.html"&gt;Shamnad Basheer&lt;/a&gt;, an IP professor at NUJS, offer the following as a response:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;"Dear USA,&lt;/p&gt;
&lt;p&gt;India encourages you to mind your own business. We respect your sovereignty to frame IP laws according to your national priorities and suggest that you show us the same courtesy. If your grouse is that we haven't complied with TRIPS, please feel free to take us to the WTO dispute panel. Our guess is that panel members familiar with the English language will ultimately inform you that section 3(d) is perfectly compatible with TRIPS. And that Article 39.3 does not mandate pharmaceutical data exclusivity, as you suggest!
More importantly, at that point, we might even think of hauling you up before the very same body for rampant violations, including your refusal to grant TRIPS mandated copyright protection to our record companies, despite a WTO ruling (Irish music case) against you.&lt;/p&gt;
&lt;p&gt;Yours sincerely,&lt;/p&gt;
&lt;p&gt;India."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Basheer's suggestion seems to be in line with that Michael Geist who believes that other countries should join Canada and Israel in openly refusing to acknowledge the validity of the Special 301 Reports because they lack ['reliable and objective analysis'][geist-reliable].  And that thought serves as a good coda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/2010-special-301'&gt;https://cis-india.org/a2k/blogs/2010-special-301&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-10-03T05:37:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder">
    <title>The 'Global Multistakholder Community' is Neither Global Nor Multistakeholder</title>
    <link>https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder</link>
    <description>
        &lt;b&gt;CIS research shows how Western, male, and industry-driven the IANA transition process actually is.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In March 2014, the &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced that they were going to end the contract they have with ICANN&lt;/a&gt; to run something called the Internet Assigned Numbers Authority (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Analysis of the process since then shows how flawed the “global multistakeholder community” that converges at ICANN has not actually represented the disparate interests and concerns of different stakeholders. CIS research has found that the discussions around IANA transition have not been driven by the “global multistakeholder community”, but mostly by males from industry in North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS analysed the five main mailing lists where the IANA transition plan was formulated: ICANN’s &lt;a href="http://mm.ianacg.org/pipermail/icg-forum_ianacg.org/"&gt;ICG&lt;/a&gt; &lt;a href="https://forum.icann.org/lists/icg-forum/"&gt;Stewardship&lt;/a&gt; and &lt;a href="https://mm.icann.org/pipermail/accountability-cross-community/"&gt;CCWG Accountability&lt;/a&gt; lists; IETF’s &lt;a href="https://mailarchive.ietf.org/arch/browse/ianaplan/"&gt;IANAPLAN&lt;/a&gt; list; and the NRO’s &lt;a href="https://www.nro.net/pipermail/ianaxfer/"&gt;IANAXFER&lt;/a&gt; list and &lt;a href="https://www.nro.net/pipermail/crisp/"&gt;CRISP&lt;/a&gt; lists. What we found was quite disheartening.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A total of &lt;em&gt;239 individuals&lt;/em&gt; participated cumulatively, across all five lists.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Only 98 substantively contributed to the final shape of the ICG proposal&lt;/em&gt;, if one takes a count of 20 mails (admittedly, an arbitrary cut-off) as a substantive contribution, with 12 of these 98 being ICANN staff some of whom were largely performing an administrative function.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We decided to look at the diversity within these substantive contributors using gender, stakeholder grouping, and region. We relied on public records, including &lt;a href="https://community.icann.org/display/gnsosoi/"&gt;GNSO SOI statements&lt;/a&gt;, and extensive searches on the Web. Given that, there may be inadvertent errors, but the findings are so stark that even a few errors wouldn’t affect them much.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2 in 5&lt;/strong&gt; (39 of 98, or 40%) were from a single country: the &lt;strong&gt;United States of America&lt;/strong&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were from countries which are part of the WEOG UN grouping (which includes &lt;em&gt;Western Europe, US, Canada, Israel, Australia, and New Zealand&lt;/em&gt;), which only has developed countries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;None&lt;/strong&gt; were from the EEC (Eastern European and Russia) group, and only &lt;strong&gt;5 of 98&lt;/strong&gt; from all of GRULAC (Latin American and Caribbean Group).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were &lt;em&gt;male&lt;/em&gt; and 21 were female.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (76 of 98) were from industry or the technical community, and only 4 (or 1 in 25​) were identifiable as primarily speaking on behalf of governments.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;This shows also that the process has utterly failed in achieving the recommendation of Paragraph 6 of the &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf&amp;gt;NETMundial outcome document&amp;lt;/a&amp;gt;, which states:
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders &amp;lt;b&amp;gt;extending beyond the ICANN community&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;Beyond the IANA transition, one notes that even the communities within ICANN are not very diverse. For instance:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li style="&gt;&lt;strong&gt;3 in 5 registrars are from the United States of America&lt;/strong&gt; (624 out of 1010, as of March 2014, according to ICANN's &lt;/a&gt;&lt;a href="https://www.icann.org/registrar-reports/accreditation-qualified-list.html"&gt;accredited registrars list&lt;/a&gt;), with only 0.6% being from the 54 countries in Africa (7 out of 1010).&lt;/p&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;45% of all the registries are from the United States of America&lt;/strong&gt;! (307 out of 672 registries listed in &lt;a href="https://www.icann.org/resources/pages/listing-2012-02-25-en"&gt;ICANN’s registry directory&lt;/a&gt; in August 2015.)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;66% (34 of 51) of &lt;a href="http://www.bizconst.org/members/"&gt;the Business Constituency&lt;/a&gt; at ICANN are from a single country: the United States of America&lt;/strong&gt;. (N.B.: This page doesn’t seem to be up-to-date.)&lt;/li&gt;
&lt;p style="text-align: justify;"&gt;This shows that businesses from the United States of America continues to dominate ICANN to a very significant degree, and this is also reflected in the nature of the dialogue within ICANN, including the fact that the proposal that came out of the ICANN ‘global multistakeholder community’ on IANA transition proposes a clause that requires the ‘IANA Functions Operator’ to be a US-based entity. For more on that issue, see this post on the jurisdiction issue at ICANN (or rather, on the lack of a jurisdiction issue at ICANN).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder'&gt;https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-03T10:42:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking">
    <title>Text of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;CIS had filed a request under the Right to Information Act with the government, asking a number of questions relating to blocking of content under the IT Act.  We have reproduced below the response we got from the government.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Government of India&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Ministry of Communications &amp;amp; Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;Department of Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Electronics Niketan, 6 CGO Complex,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;New Delhi-110003&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No: 14(12)/2011-ESD&lt;br /&gt;10.6.2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shri Pranesh Prakash,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Centre for Internet and Society,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;194, 2C Cross, Domlur Stage II,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Bangalore - 560071&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Subject: Request for information under RTI Act, 2005.&lt;/p&gt;
&lt;p&gt;Sir,&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Reference your request dated 13 May 2011, which was received in this office on 18.5.2011 on the above subject.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The information as received from the custodian of information is attached herewith (Annexure-I, II and III).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp;Yours faithfully,&lt;br /&gt;&amp;nbsp;&amp;nbsp; (A.K.Kaushik)&lt;br /&gt;&amp;nbsp; &amp;nbsp;Additional Director &amp;amp; CPIO&lt;br /&gt;&amp;nbsp; &amp;nbsp;Cyber Laws &amp;amp; E-Security Division&lt;br /&gt;&amp;nbsp; &amp;nbsp;Tel: 011-24364803&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Annexure I&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;strong&gt;Reply to Shri Pranesh Prakash&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;ol&gt;&lt;li&gt;How many orders have been issued for blocking of computer resources prior to the coming into force of the Information Technology (Amendment) Act, 2008 (i.e., before October 27, 2009) under the Information Technology Act, 2000, or any other law for the time being in force.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Five orders were issued for blocking access to web content.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the websites for which the DIT has issued blocking orders and the dates on which each website was blocked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The following websites have been blocked pursuant to court orders&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sl&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of issuing&amp;nbsp;direction by designated&amp;nbsp;officer&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.zone.h.org/"&gt;www.zone-h.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.03.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://donotdiall00.webs.com"&gt;http://donotdiall00.webs.com&amp;nbsp;&lt;/a&gt;&amp;nbsp;(IP 216.52.115.50)&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.08.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;www.bloggernews.net/124029&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;15.11.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;25.02.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.indvbav.org/"&gt;&amp;nbsp;&lt;/a&gt;&lt;a class="external-link" href="http://www.indybay.org/"&gt;www.indybay.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.arizona.indymedia.org/"&gt;www.arizona.indymedia.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Please provide a list of all the persons to whom such orders were issued.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The directions were issued to Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the requests for blocking of information that have been received by the Designated Officer under the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules").&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all persons/authorities from whom the Designated Officer under the Rules has received requests for blocking of information and the dates these requests were received.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 4 &amp;amp; 5&lt;/strong&gt; - The details are given in Annexure-II.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been rejected,&amp;nbsp;including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been&amp;nbsp;accepted, including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that are still being&amp;nbsp;processed (e.g. more information has been sought on the request), including file notings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 6,7 &amp;amp; 8&lt;/strong&gt; - Files are available in section and can be viewed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of the minutes of all meetings held by the Committee for&amp;nbsp;Examination of Requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide copies of all the recommendations of the Committee for Examination&amp;nbsp;of requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 9 &amp;amp; 10&lt;/strong&gt; - &amp;nbsp;Copy of the minutes/recommendation of the meeting of the Committee is&amp;nbsp;at Annexure III.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us the dates and copies of the minutes of all meetings held by the&amp;nbsp;Review Committee under Rule 14 of the Rules to periodically review the blocked&amp;nbsp;resources.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of all the findings of the Review Committee.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the Review Committee has not met, please provide us the reason for the meetings&amp;nbsp;not happenings as per the requirement of Rule 14 of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 11, 12 &amp;amp; 13&lt;/strong&gt; - This meeting is coordinated by Department of Telecommunications&amp;nbsp;and DIT is not in possession of details.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does "intermediary" in Rule 13 include intermediaries not located in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; -&amp;nbsp;Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Has any block ordered by the DIT ever been revoked by the DIT or any other&amp;nbsp;governmental authority?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such questions are not permitted under RTI Act as per DOPT OM No. 1 /7/2009&amp;nbsp;IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;On what basis does the DIT decide whether the appropriate intermediary is the person&amp;nbsp;who has put up content, the web host, or the different Internet service providers in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does Rule 16 of the Rules override the Right to Information Act?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the answer to the previous question is yes, please provide any correspondence with any legal officer who provided the DIT advice that it could override the Right to Information Act through delegated legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Annexure II&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Request received by Designated Officer&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of receipt of request &lt;/strong&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Request by&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/www.tamil.net.in" class="external-link"&gt;www.tamil.net.in&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;29.03.2010&lt;/td&gt;
&lt;td&gt;Secretary Public (Law &amp;amp; Order) Deptt.&lt;br /&gt;Secretariat, Chennai 600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;28.06.2010&lt;/td&gt;
&lt;td&gt;Sr. Inspector, Cyber Crime Cell, &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;http://www.youtube.com/ch?&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;wat&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;v=tHUNESaC0E4&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;05.07.2010&lt;/td&gt;
&lt;td&gt;Jt. Commissioner of Police (Crime), &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ulaginazhagiyamuthalpenn.blogspot.com"&gt;http://ulaginazhagiyamuthalpenn.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;21.07.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary, &lt;br /&gt;IT Department, &lt;br /&gt;Chennai–600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/en.wikipedia.org/Wiki/Sukhbir Singh Badal" class="external-link"&gt;en.wikipedia.org/Wiki/Sukhbir Singh Badal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;11.08.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary to Govt. of Punjab, &lt;br /&gt;Dept. of IT, &lt;br /&gt;Chandigarh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.exbii.com"&gt;http://www.exbii.com&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.topix.net/"&gt;http://www.topix.net&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;05.10.2010&lt;/td&gt;
&lt;td&gt;Commissioner, &lt;br /&gt;Maharashtra State, &lt;br /&gt;Colaba, Mumbai–400 001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20.08.2010&lt;/td&gt;
&lt;td&gt;Shri Haneef Ali, &lt;br /&gt;State President, &lt;br /&gt;Bharatiya Janata Minority Morcha, &lt;br /&gt;Andhra Pradesh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.angelsofindia.com/"&gt;http://www.angelsofindia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.adult-gals.com/"&gt;http://www.adult-gals.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianangels.net/"&gt;http://www.indianangels.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.arabexposed.com/"&gt;http://www.arabexposed.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiamafia.com/"&gt;http://indiamafia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianasfuckers.com/"&gt;http://www.indianasfuckers.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpronvideos.in/"&gt;http://www.indianpronvideos.in/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporntube.com/"&gt;http://www.peterporntube.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywood-sex.net/"&gt;http://www.bollywood-sex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianworldsex.com/"&gt;http://www.indianworldsex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianhomevideo.com/"&gt;http://indianhomevideo.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-pakistani-girls.com/"&gt;http://indian-pakistani-girls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianvidz.com/"&gt;http://indianvidz.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianparadise.net/"&gt;http://indianparadise.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodscandals.net/"&gt;http://bollywoodscandals.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpics.net/"&gt;http://indiansexpics.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-hardcore-movies.com/"&gt;http://www.indian-hardcore-movies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodnudesex.net/"&gt;http://www.bollywoodnudesex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bangmyindianwife.com/"&gt;http://www.bangmyindianwife.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-angel-teens.com/"&gt;http://www.indian-angel-teens.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://south-indian-sex.com/"&gt;http://south-indian-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianseduction.com/"&gt;http://www.indianseduction.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexuniversity.com/"&gt;http://www.indiansexuniversity.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpassion.com/"&gt;http://www.indianpassion.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://fuckmyindianass.com/"&gt;http://fuckmyindianass.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexwebcams.com/"&gt;http://indiansexwebcams.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://exoticpics4u.com/"&gt;http://exoticpics4u.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianfreesexmovies.com/"&gt;http://www.indianfreesexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindiansexmovies.com/"&gt;http://www.newsindiansexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporn.net/"&gt;http://www.peterporn.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindianmovies.com/"&gt;http://www.3xindianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.amateur-indian-girls.com/"&gt;http://www.amateur-indian-girls.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodhardcore.net/"&gt;http://www.bollywoodhardcore.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpost.com/"&gt;http://www. indiansexpost.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.desi-amateurs.com/"&gt;http://www.desi-amateurs.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xasianmovies.com/"&gt;http://www.3xasianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://allindiansex.com/"&gt;http://allindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiapornmovies.com/"&gt;http://www.indiapornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindiansex.com/"&gt;http://www.3xindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianxclips.com/"&gt;http://www.indianxclips.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexvideos.org/"&gt;http://indiansexvideos.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pureindianporn.com/"&gt;http://www.pureindianporn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-porn-sex.com/"&gt;http://indian-porn-sex.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindianpornmovies.com/"&gt;http://www.newsindianpornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://juicyindiangirls.com/"&gt;http://juicyindiangirls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www/hardcoreindiansex.net/"&gt;http://www/hardcoreindiansex.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodboobs.com/"&gt;http://bollywoodboobs.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianmovietgp.com/"&gt;http://indianmovietgp.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.365indian.com/"&gt;http://www.365indian.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-hoes.com/"&gt;http://www.indian-sex-hoes.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-photos.net/"&gt;http://www.indian-sex-photos.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-free-sex.com/"&gt;http://www.indian-free-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-movies.org/"&gt;http://www.indian-sex-movies.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://ww.tamil-sex-movies.net/"&gt;http://ww.tamil-sex-movies.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianteens.org/"&gt;http://www.indianteens.org/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://secredir.com/?sov=rook-sexyindianbooty.com"&gt;http://www.sexyindianbooty.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianposing.com/"&gt;http://www.indianposing.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pornhub.com/"&gt;http://www.pornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpornhub.com/"&gt;http://www.indianpornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.exvideos.com"&gt;http://www.exvideos.com&amp;nbsp;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;25.11.2010&lt;/td&gt;
&lt;td&gt;Jt.Commissioner of Police (Crime), Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Annexure III&lt;/h2&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Minutes of the meeting held on 24-08-2010 for the request for blocking of website &lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;A meeting of "Committee for examination of request"&amp;nbsp;constituted under the provisions of Information Technology&amp;nbsp;(Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009&amp;nbsp;under section 69A of the Information Technology Act, 2000 was held on 24.08.2010 at&amp;nbsp;Electronics Niketan. New Delhi to examine the Request sent by Government of Maharashtra to block the website&amp;nbsp;&lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. The meeting was participated by the following members:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Dr. Gulshan Rai, Group Coordinator, Department of Information Technology&lt;/li&gt;&lt;li&gt;Shri Dharmendra Sharma, Joint Secretary, Ministry of Home Affairs&lt;/li&gt;&lt;li&gt;Shri Arvind Kumar, Joint Secretary, Ministry of Information &amp;amp; Broadcasting&lt;/li&gt;&lt;li&gt;Shri Ashok C. Prakash, Additional L.A., Department of Legal Affairs&lt;/li&gt;&lt;li&gt;Shri B.J. Srinath, Sr. Director, CERT-In&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The Committee discussed the case and observed that Govt. of Maharashtra has requested for blocking of website &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt; on the grounds of "public order". The Committee also noted the reply from Cyber Crime Cell, Mumbai that no case has been registered against &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. Further, no details suggesting the "impact" of the said site on public order has been made available by the State Government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Keeping in view the directions of the Hon'ble High Court to dispose the application strictly as per law, the Committee assessed that based on the data/facts/details provided by Government of Maharashtra and Cyber Crime Cell, Mumbai, violation of section 69A of the Information Technology Act, 2000 is not being established.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned version of the letter received from the DIT office &lt;a href="https://cis-india.org/internet-governance/request-for-website-blocking.pdf" class="internal-link" title="Request for Blocking of Websites"&gt;here&lt;/a&gt; &lt;/strong&gt;[PDF, 1.74 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-10-28T14:37:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/tpm-copyright-amendment">
    <title>Technological Protection Measures in the Copyright (Amendment) Bill, 2010</title>
    <link>https://cis-india.org/a2k/blogs/tpm-copyright-amendment</link>
    <description>
        &lt;b&gt;In this post Pranesh Prakash conducts a legal exegesis of section 65A of the Copyright (Amendment) Bill, 2010, which deals with the stuff that enables 'Digital Rights/Restrictions Management', i.e., Technological Protection Measures.  He notes that while the provision avoids some mistakes of the American law, it still poses grave problems to consumers, and that there are many uncertainties in it still.&lt;/b&gt;
        &lt;p&gt;&lt;a href="http://www.wipo.int/enforcement/en/faq/technological/faq03.html"&gt;Technological Protection Measures&lt;/a&gt; are sought to be introduced in India via the Copyright (Amendment) Bill, 2010.  This should be quite alarming for consumers for reasons that will be explained in a separate blog post on TPMs that will follow shortly.&lt;/p&gt;
&lt;p&gt;In this post, I will restrict myself to a legal exegesis of section 65A of the Bill, which talks of "protection of technological measures".  (Section 65B, which talks of Right Management Information will, similarly, be tackled in a later blog post.)&lt;/p&gt;
&lt;p&gt;First off, this provision is quite unnecessary.  There has been no public demand in India for TPMs to be introduced, and the pressure has come mostly from the United States in the form of the annual "Special 301" report prepared by the United States Trade Representative with input coming (often copied verbatim) from the International Intellectual Property Alliance.  India is not a signatory to the WIPO Copyright Treaty (WCT) which requires technological protection measures be safeguarded by law.  That provision, interestingly, was pushed for by the United States in 1996 when even it did not give legal sanctity to TPMs via its copyright law (which was amended in 2000 by citing the need to comply with the WCT).&lt;/p&gt;
&lt;p&gt;TPMs have been roundly criticised, have been shown to be harmful for consumers, creators, and publishers, and there is also evidence that TPMs do not really decrease copyright infringement (but instead, quite perversely through unintended consequences, end up increasing it).  Why then would India wish to introduce it?&lt;/p&gt;
&lt;p&gt;Leaving that question aside for now, what does the proposed law itself say?&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;65A. Protection of Technological Measures &lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(1) Any person who circumvents an effective technological measure applied for the purpose of protecting any of the rights conferred by this Act, with the intention of infringing such rights, shall be punishable with imprisonment which may extend to two years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(2) Nothing in sub-section (1) shall prevent any person from:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(a) doing anything referred to therein for a purpose not expressly prohibited by this Act:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Provided that any person facilitating circumvention by another person of a technological measure for such a purpose shall maintain a complete record of such other person including his name, address and all relevant particulars necessary to identify him and the purpose for which he has been facilitated; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(b) doing anything necessary to conduct encryption research using a lawfully obtained encrypted copy; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(c) conducting any lawful investigation; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(d) doing anything necessary for the purpose of testing the security of a computer system or a computer network with the authorisation of its owner; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(e) operator; or [&lt;em&gt;sic&lt;/em&gt;]&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(f) doing anything necessary to circumvent technological measures intended for identification or surveillance of a user; or&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;(g) taking measures necessary in the interest of national security.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h1&gt;Implications: The Good Part&lt;/h1&gt;
&lt;p&gt;This provision clearly takes care of two of the major problems with the way TPMs have been implemented by the Digital Millennium Copyright Act (DMCA) in the United States:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;In s.65A(1) it aligns the protection offered by TPMs to that offered by copyright law itself (since it has to be "applied for the purpose of protecting any of the rights conferred by this Act").  Thus, presumably, TPMs could not be used to restrict &lt;em&gt;access&lt;/em&gt;, only to restrict copying, communication to the public, and that gamut of rights.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In s.65A(1) and 65A(2) it aligns the exceptions granted by copyright law with the exceptions to the TPM provision.  Section 65A(1) states that the act of circumvention has to be done "with the intention of infringing ... rights", and s.52(1) clearly states that those exceptions cannot be regarded as infringement of copyright.  And s.65A(2)(a) states that circumventing for "a purpose not expressly prohibited by this Act" will be allowed.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A third important difference from the DMCA is that&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It does not criminalise the manufacture and distribution of circumvention tools (including code, devices, etc.).  (More on this below.)&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Implications: The Bad Part&lt;/h1&gt;
&lt;p&gt;This provision, despite the seeming fair-handed manner in which it has been drafted, still fails to maintain the balance that copyright seeks to promote:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;TPM-placers (presumably, just copyright holders, because of point 1. above) have been given the ability to restrict the activities of consumers, but they have not been given any corresponding duties.  Thus, copyright holders do not have to do anything to ensure that the Film &amp;amp; Telivision Institute of India professor who wishes to use a video clip from a Blu-Ray disc can actually do so.  Or that the blind student who wishes to circumvent TPMs because she has no other way of making it work with her screen reader is actually enabled to take advantage of the leeway the law seeks to provide her through s.52(1)(a) (s.52(1)(zb) is another matter!).  Thus, while there are many such exceptions that the law allows for, the technological locks themselves prevent the use of those exceptions.  Another way of putting that would be to say:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The Bill presumes that every one has access to all circumvention technology.  This is simply not true.  In fact, Spanish law (in &lt;a href="http://noticias.juridicas.com/base_datos/Admin/rdleg1-1996.l3t5.html"&gt;Article 161 of their law&lt;/a&gt;) expressly requires that copyright holders facilitate access to works protected by TPM to beneficiaries of limitations of copyright.   Thus, copyright holders who employ TPMs should be required to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;tell their customers how they can be contacted if the customer wishes to circumvent the TPM for a legitimate purpose&lt;/li&gt;
&lt;li&gt;upon being contacted, aid their customer in making use of their rights / the exceptions and limitations in copyright law&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How seriously can you take a Bill that has been introduced in Parliament that includes a provision that states: "Nothing in sub-section (1) shall prevent any person from operator; or" (as s.65A(2)(e), read in its entirety, does)?&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h1&gt;Uncertainties&lt;/h1&gt;
&lt;p&gt;As mentioned above, the provisions are not all that clear regarding manufacture and distribution of circumvention tools.  Thus, the proviso to s.65A(2)(a) deserves a closer reading.  What is clear is that there are no penalties mentioned for manufacture or dissemination of TPMs, and that only those who &lt;em&gt;circumvent&lt;/em&gt; are penalised in 65A(1), and not those who produce the circumvention devices.  However:&lt;/p&gt;
&lt;h2&gt;On "shall maintain" and penalties&lt;/h2&gt;
&lt;p&gt;In the proviso to s.65B(2)(a), there is an imperative ("shall maintain") requiring "any person facilitating circumvention" to keep records.  It
is unclear what the implications of not maintaining such records are.&lt;/p&gt;
&lt;p&gt;The obvious one is that the exemption contained in s.65(1)(a) will not apply if one were facilitated without the facilitator keeping records.  Thus, under this interpretation, there is no independent legal (albeit penalty-less) obligation on facilitators.  This interpretation runs into
the problem that if this was the intention, then the drafters would have written "Provided that any person facilitating circumvention ... for
such a purpose &lt;em&gt;maintain&lt;/em&gt;/&lt;em&gt;maintained&lt;/em&gt; a complete record ...".  Instead, &lt;em&gt;shall maintain&lt;/em&gt; is used, and an independent legal obligation seems,
thus, to be implied.  But can a proviso create an independent legal obligation?  And is there any way a penalty could &lt;em&gt;possibly&lt;/em&gt; be attached
to violation of this proviso despite it not coming within 65A(1)?&lt;/p&gt;
&lt;h2&gt;On "facilitating" and remoteness&lt;/h2&gt;
&lt;p&gt;The next question is who all can be said to "facilitate", and how remote can the connection be?  Is the coder who broke the circumvention a
facilitator?  The distributor/trafficker?  The website which provided you the software?  Or is it (as is more likely) a more direct "the friend who sat at your computer and installed the circumvention software" / "the technician who unlocked your DVD player for you while installing it in your house"?&lt;/p&gt;
&lt;p&gt;While such a record-keeping requirement is observable by people those who very directly help you (the last two examples above), it would be more difficult to do so the further up you get on the chain of remoteness.  Importantly, such record-keeping is absolutely not possible in decentralized distribution models (such as those employed by most free/open source software), and could seriously harm fair and legitimate circumvention.&lt;/p&gt;
&lt;h1&gt;More uncertainties&lt;/h1&gt;
&lt;p&gt;It is slightly unclear which exception the bypassing of Sony's dangerous "Rootkit" copy protection technology would fall under if I wish to get rid of it simply because it makes my computer vulnerable to malicious attacks (and not to exercise one of the exceptions under s.52(1)).  Will such circumvention come under s.65A(2)(a)?  Because it does not quite fall under any of the others, including s.65(2)(b) or (f).&lt;/p&gt;
&lt;h2&gt;On "purpose" as a criterion in 65A(2)(a)&lt;/h2&gt;
&lt;p&gt;A last point, which is somewhat of an aside is that 65A(2)(a) states:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Nothing in sub-section (1) shall prevent any person from doing anything referred to therein for a purpose not expressly prohibited by this Act.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;There's something curious about the wording, since the Copyright Act generally does not prohibit any acts based on purposes (i.e., the prohibitions by ss.14 r/w s.51 are not based on &lt;em&gt;why&lt;/em&gt; someone reproduces, etc., but on the act of reproduction).  In fact, it &lt;em&gt;allows&lt;/em&gt; acts based on purposes
(via s.52(1)).  The correct way of reading 65A(2)(a) might then be:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Nothing in sub-section (1) shall prevent any person from doing anything referred to therein for a purpose expressly allowed by this Act.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But that might make it slightly redundant as s.65A(1) covers that by having the requirement of the circumvention being done "with the intention of infringing such right" (since the s.52(1) exceptions are clearly stated as not being infringements of the rights granted under the Act).&lt;/p&gt;
&lt;h1&gt;Conclusion&lt;/h1&gt;
&lt;p&gt;It would be interesting to note how leading copyright lawyers understand this provision, and we will be tracking such opinions.  But it is clear that TPMs, as a private, non-human enforcement of copyright law, are harmful and that we should not introduce them in India.  And we should be especially wary of doing so without introducing additional safeguards, such as duties on copyright holder to aid access to TPM'ed works for legitimate purposes, and remove burdensome record-keeping provisions.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/tpm-copyright-amendment'&gt;https://cis-india.org/a2k/blogs/tpm-copyright-amendment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>FLOSS</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2012-05-17T16:51:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3">
    <title>Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court’s Wrong Turn</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3</link>
    <description>
        &lt;b&gt;After its decision in Gobind, the Supreme Court's privacy floodgates opened; a series of claims involving private parties came before its docket, and the resulting jurisprudence ended up creating confusion between state-individual surveillance, and individual-individual surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gautam Bhatia's blog post was originally &lt;a class="external-link" href="http://indconlawphil.wordpress.com/2013/12/17/privacy-and-surveillance-in-india-iii-the-publicprivate-distinction-and-the-supreme-courts-wrong-turn/"&gt;published on Indian Constitutional Law and Philosophy Blog&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have seen that &lt;i&gt;Gobind &lt;/i&gt;essentially crystallized a constitutional right to privacy as an aspect of personal liberty, to be infringed only by a narrowly-tailored law that served a compelling state interest. After the landmark decision in &lt;i&gt;Gobind&lt;/i&gt;, &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/971635/"&gt;Malak Singh v State of P&amp;amp;H&lt;/a&gt; &lt;/i&gt;was the next targeted-surveillance history-sheeter case to come before the Supreme Court. In that case, Rule 23 of the Punjab Police Rules was at issue. Its vires was not disputed, so the question was a direct matter of constitutionality. An order of surveillance was challenged by two individuals, on the ground that there were no reasonable bases for suspecting them of being repeat criminals, and that their inclusion in the surveillance register was politically motivated.  After holding that entry into a surveillance sheet was a purely administrative measure, and thus required no prior hearing (&lt;i&gt;audi alteram partem&lt;/i&gt;), the Court then embarked upon a lengthy disquisition about the scope and limitations of surveillance, which deserves to be reproduced in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;But all this does not mean that the police have a licence to enter the names of whoever they like (dislike?) in the surveillance register; nor can the surveillance be such as to squeeze the fundamental freedoms guaranteed to all citizens or to obstruct the free exercise and enjoyment of those freedoms; nor can the surveillance so intrude as to &lt;/i&gt;&lt;i&gt;&lt;span&gt;offend the dignity of the individual&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Surveillance of persons who do not fall within the categories mentioned in Rule 23.4 or for reasons unconnected with the prevention of crime, or excessive surveillance falling beyond the limits prescribed by the rules, will entitle a citizen to the Court’s protection which the court will not hesitate to give. The very rules which prescribe the conditions for making entries in the surveillance register and the mode of surveillance appear to recognise the caution and care with which the police officers are required to proceed. The note following R. 23.4 is instructive. It enjoins a duty upon the police officer to construe the rule strictly and confine the entries in the surveillance register to the class of persons mentioned in the rule. Similarly R.23.7 demands that there should be no illegal interference in the guise of surveillance. Surveillance, therefore, has to be unobstrusive and within bounds. Ordinarily the names of persons with previous criminal record alone are entered in the surveillance register. &lt;/i&gt;&lt;i&gt;&lt;span&gt;They must be proclaimed offenders, previous convicts, or persons who have already been placed on security for good behaviour. In addition, names of persons who are reasonably believed to be habitual offenders or receivers of stolen property whether they have been convicted or not may be entered&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. It is only in the case of this category of persons that there may be occasion for abuse of the power of the police officer to make entries in the surveillance register. But, here, the entry can only be made by the order of the Superintendent of Police who is prohibited from delegating his authority under Rule 23.5. Further it is necessary that the Superintendent of Police must entertain &lt;/i&gt;&lt;i&gt;&lt;span&gt;a reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt; that persons whose names are to be entered in Part II are habitual offenders or receivers of stolen property. While it may not be necessary to supply the grounds of belief to the persons whose names are entered in the surveillance register it may become necessary in some cases to satisfy the Court when an entry is challenged &lt;/i&gt;&lt;i&gt;&lt;span&gt;that there are grounds to entertain such reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. In fact in the present case we sent for the relevant records and we have satisfied ourselves that there were sufficient grounds for the Superintendent of Police to entertain a reasonable belief. In the result we reject both the appeals subject to our observations regarding the mode of surveillance. There is no order as to costs.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three things emerge from this holding: &lt;i&gt;first&lt;/i&gt;, the Court follows &lt;i&gt;Gobind&lt;/i&gt; in locating the right to privacy within the philosophical concept of individual &lt;i&gt;dignity&lt;/i&gt;, found in Article 21’s guarantee of personal liberty. &lt;i&gt;Secondly&lt;/i&gt;, it follows &lt;i&gt;Kharak Singh, Malkani and Gobind&lt;/i&gt; in insisting that the surveillance be targeted, limited to fulfilling the government’s crime-prevention objectives, and be limited – not even to suspected criminals, but – repeat offenders or serious criminals. And &lt;i&gt;thirdly&lt;/i&gt;, it leaves open a role for the Court – that is, &lt;i&gt;judicial review&lt;/i&gt; – in examining the grounds of surveillance, if challenged in a particular case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After &lt;i&gt;Malak Singh, &lt;/i&gt;there is another period of quiet. &lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v Manubhai D Shah&lt;/i&gt;&lt;/a&gt;, in 1993, attributed – wrongly – to &lt;i&gt;Indian Express Newspapers &lt;/i&gt;the proposition that Article 19(1)(a)’s free expression right included privacy of communications (&lt;i&gt;Indian Express &lt;/i&gt;itself had cited a  UN Report without incorporating it into its holding).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon afterwards, &lt;i&gt;&lt;a href="http://www.indiankanoon.org/doc/501107/"&gt;R. Rajagopal v State of TN&lt;/a&gt; &lt;/i&gt;involved the question of the publication of a convicted criminal’s autobiography by a publishing house; Auto Shankar, the convict in question, had supposedly withdrawn his consent after agreeing to the book’s publication, but the publishing house was determined to go ahead with it. Technically, this wasn’t an Article 21 case: so much is made clear by the very manner in which the Court frames its issues: the question is whether a &lt;i&gt;&lt;span&gt;citizen&lt;/span&gt;&lt;/i&gt; of the country can prevent &lt;i&gt;&lt;span&gt;another person&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;from writing his biography, or life story. (Paragraph 8) The Court itself made things clear when it held that the right of privacy has two aspects: the &lt;i&gt;tortious &lt;/i&gt;aspect, which provides damages for a breach of individual privacy; and the &lt;i&gt;constitutional aspect&lt;/i&gt;, which protects privacy against &lt;span&gt;&lt;b&gt;unlawful governmental intrusion.&lt;/b&gt;&lt;/span&gt; (Paragraph 9) Having made this distinction, the Court went on to cite a number of American cases that were precisely about the right to privacy against governmental intrusion, and therefore – ideally – irrelevant to the present case (Paras 13 – 16); and then, without quite explaining how it was using these cases – or whether they were relevant at all, it switched to examining the law of defamation (Para 17 onwards). It would be safe to conclude, therefore, in light of the clear distinctions that it made, the Court was concerned in &lt;i&gt;R. Rajagopal &lt;/i&gt;about an action between private parties, and therefore, privacy in the context of tort law. It’s confusing observations, however, were to have rather unfortunate effects, as we shall see.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We now come to a series of curious cases involving privacy and medical law. In &lt;a href="http://indiankanoon.org/doc/382721/"&gt;&lt;i&gt;Mr X v Hospital Z&lt;/i&gt;&lt;/a&gt;, the question arose whether a Hospital that – in the context of a planned marriage – had disclosed the appellant’s HIV+ status, leading to his social ostracism – was in breach of his right to privacy. The Court cited &lt;i&gt;Rajagopal&lt;/i&gt;, but unfortunately failed to understand it, and turned the question into one of the &lt;i&gt;constitutional right to privacy, and not the private right. &lt;/i&gt;Why the Court turned an issue between two private parties – adequately covered by the tort of breach of confidentiality – into an Article 21 issue is anybody’s guess. &lt;i&gt;Surely&lt;/i&gt; Article 21 – the right to life and personal liberty – is not horizontally applicable, because if it was, we might as well scrap the entire Indian Penal Code, which deals with exactly these kinds of issues – individuals violating each others’ rights to life and personal liberty. Nonetheless, the Court cited &lt;i&gt;Kharak Singh, Gobind &lt;/i&gt;&lt;span&gt;&lt;b&gt;and&lt;/b&gt;&lt;/span&gt; Article 8 of the European Convention of Human Rights, further muddying the waters, because Article 8 – in contrast to American law – embodies a &lt;i&gt;proportionality test&lt;/i&gt; for determining whether there has been an impermissible infringement of privacy. The Court then came up with the following observation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;Where there is a clash of two Fundamental Rights, as in the instant case, namely, the appellant’s right to privacy as part of right to life and Ms. Akali’s right to lead a healthy life which is her Fundamental Right under Article 21, the RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court, for the reason that moral considerations cannot be kept at bay.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect, this is utterly bizarre. If there is a clash of two rights, then that clash must be resolved by referring to the &lt;i&gt;Constitution&lt;/i&gt;, and not to the Court’s opinion of what an amorphous, elastic, malleable, many-sizes-fit “public morality” says. The mischief caused by this decision, however, was replicated in &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1309207/"&gt;Sharda v Dharmpal&lt;/a&gt;, &lt;/i&gt;decided by the Court in 2003. In that case, the question was whether the Court could require a party who had been accused of unsoundness of mind (as a ground for divorce under the wonderfully progressive Hindu Marriage Act) to undergo a medical examination – and draw an adverse inference if she refused. Again, whether this was a case in which Article 21 ought to be invoked is doubtful; at least, it is arguable, since it was the Court making the order. Predictably, the Court cited from &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;extensively. It cited &lt;i&gt;Gobind&lt;/i&gt; (compelling State interest) &lt;i&gt;and&lt;/i&gt; the ECHR (proportionality). It cited a series of cases involving custody of children, where various Courts had used a “balancing test” to determine whether the best interests of the child overrode the privacy interest exemplified by the client-patient privilege. It applied this balancing test to the case at hand by balancing the “right” of the petitioner to obtain a divorce for the spouse’s unsoundness of mind under the HMA, vis-à-vis the Respondent’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above analysis, it is submitted that although the outcome in &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;and &lt;i&gt;Sharda v Dharmpal &lt;/i&gt;might well be correct, the Supreme Court has misread what &lt;i&gt;R. Rajagopal &lt;/i&gt;actually held, and its reasoning is deeply flawed. Neither of these cases are Article 21 cases: they are private tort cases between private parties, and ought to be analysed under private law, as &lt;i&gt;Rajagopal&lt;/i&gt; itself was careful to point out. In private law, also, the balancing test makes perfect sense: there are a series of interests at stake, as the Court rightly understood, such as certain rights arising out of marriage, all of a private nature. In any event, whatever one might make of these judgments, one thing is clear: they are both logically and legally irrelevant to the &lt;i&gt;Kharak Singh &lt;/i&gt;line of cases that we have been discussing, which are to do with the Article 21 right to privacy &lt;i&gt;against the State&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T23:02:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2">
    <title>Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2</link>
    <description>
        &lt;b&gt;Gautam Bhatia analyses the first case in which the Supreme Court recognized a constitutional right to privacy, Gobind v. State of Madhya Pradesh, and argues that the holding in that case adopted the three-pronged American test of strict scrutiny, compelling State interest, and narrow tailoring in its approach to privacy violations.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;After its judgment in Kharak Singh, the Court was not concerned with the privacy question for a while. The next case that dealt – peripherally – with the issue came eleven years later. In &lt;i&gt;R.M. Malkani v State of Maharashtra&lt;/i&gt;, the Court held that attaching a recording device to a person’s telephone did not violate S. 25 of the Telegraph Act, because&lt;/p&gt;
&lt;blockquote class="italized" style="text-align: justify; "&gt;"where a person talking on the telephone allows another person to record it or to hear it, it can-not be said that the other person who is allowed to do so is damaging, removing, tampering, touching machinery battery line or post for intercepting or acquainting himself with the contents of any message. There was no element of coercion or compulsion in attaching the tape recorder to the telephone."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Although this case was primarily about the admissibility of evidence, the Court also took time out to consider – and reject – a privacy-based Article 21 argument, holding that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Article 21 was invoked by submitting that the privacy of the appellant’s conversation was invaded. Article 21 contemplates procedure established by law with regard to deprivation of life or personal liberty. The telephonic conversation of an innocent citizen will be protected by Courts against wrongful or high handed interference by tapping the conversation. The protection is not for the guilty citizen against the efforts of the police to vindicate the law and prevent corruption of public servants. It must not be understood that the Courts will tolerate safeguards for the protection of the citizen to be imperiled by permitting the police to proceed by unlawful or irregular methods."&lt;br /&gt;&lt;br /&gt; Apart from the fact that it joined Kharak Singh in refusing to expressly find a privacy right within the contours of Article 21, there is something else that unites Kharak Singh and R.M. Malkani: they hypothetical in Kharak Singh became a reality in Malkani – what saved the telephone tapping precisely because it was directed at "… a guilty person", with the Court specifically holding that the laws were not for targeting innocent people. Once again, then, the targeted  and specific nature of interception became a crucial – and in this case, a decisive – factor. One year later, in another search and seizure case, Pooran Mal v Inspector, the Court cited M.P. Sharma and stuck to its guns, refusing to incorporate the Fourth Amendment into Indian Constitutional law.&lt;br /&gt;&lt;br /&gt;It is &lt;i&gt;Gobind v State of MP&lt;/i&gt;, decided in 1975, that marks the watershed moment for Indian privacy law in the Constitution. Like Kharak Singh, Gobind also involved domiciliary visits to the house of a history-sheeter. Unlike Kharak Singh, however, in Gobind the Court found that the Regulations did have statutory backing – S. 46(2)(c) of the Police Act, which allowed State Government to make notifications giving effect to the provisions of the Act, one of which was the prevention of commission of offences. The surveillance provisions in the impugned regulations, according to the Court, were indeed for the purpose of preventing offences, since they were specifically aimed at repeat offenders. To that extent, then, the Court found that there existed a valid “law” for the purposes of Articles 19 and 21.&lt;br /&gt;&lt;br /&gt;By this time, of course, American constitutional law had moved forward significantly from eleven years ago, when Kharak Singh had been decided. The Court was able to invoke &lt;i&gt;Griswold v Connecticut&lt;/i&gt; and &lt;i&gt;Roe v Wade&lt;/i&gt;, both of which had found a "privacy" as an "interstitial" or "penumbral" right in the American Constitution – that is, not reducible to any one provision, but implicit in a number of separate provisions taken together. The Court ran together a number of American authorities, referred to Locke and Kant, to dignity, to liberty and to autonomy, and ended by holding, somewhat confusingly:&lt;br /&gt;&lt;br /&gt;“the right to privacy must encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child rearing. This catalogue approach to the question is obviously not as instructive as it does not give analytical picture of that distinctive characteristics of the right of privacy. Perhaps, the only suggestion that can be offered as unifying principle underlying the concept has been the assertion that a claimed right must be a fundamental right implicit in the concept of ordered liberty… there are two possible theories for protecting privacy of home. The first is that activities in the home harm others only to the extent that they cause offence resulting from the mere thought that individuals might he engaging in such activities and that such ‘harm’ is not Constitutionally protective by the state. The second is that individuals need a place of sanctuary where they can be free from societal control. The importance of such a sanctuary is that individuals can drop the mask, desist for a while from projecting on the world the image they want to be accepted as themselves, an image that may reflect the values of their peers rather than the realities of their natures… the right to privacy in any event will necessarily have to go through a process of case-by-case development."&lt;br /&gt;&lt;br /&gt;But if no clear principle emerges out of the Court’s elucidation of the right, it was fairly unambiguous in stressing the importance of the right itself. Interestingly, it grounded the right within the context of the freedom struggle. "Our founding fathers," it observed, "were thoroughly opposed to a Police Raj even as our history of the struggle for freedom has borne eloquent testimony to it." (Para 30) The parallels to the American Fourth Amendment are striking here: in his historical analysis Akhil Amar tells us that the Fourth Amendment was meant precisely to avoid the various abuses of unreasonable searches and seizures that were common in England at the time.&lt;br /&gt;&lt;br /&gt;The parallels with the United States become even more pronounced, however, when the Court examined the grounds for limiting the right to privacy. "Assuming that the fundamental rights explicitly guaranteed to a citizen have penumbral zones and that the right to privacy is itself a fundamental right, that fundamental right must be subject to restriction on the basis of compelling public interest." "Compelling public interest" is an interesting phrase, for two reasons. First, “public interest” is a ground for fundamental rights restrictions under Article 19 (see, e.g., Article 19(6)), but the text of the Article 19 restrictions do not use – and the Court, in interpreting them, has not held – that the public interest must be “compelling”. This suggests a stricter standard of review for an Article 21 privacy right violation than Article 19 violations. This is buttressed by the fact that in the same paragraph, the Court ended by observing: “even if it be assumed that Article 19(5) [restrictions upon the freedom of movement] does not apply in terms, as the right to privacy of movement cannot be absolute, a law imposing reasonable restriction upon it for compelling interest of State must be upheld as valid.” The Court echoes the language of 19(5), and adds the word “compelling”. This surely cannot be an oversight.&lt;br /&gt;&lt;br /&gt;More importantly – the compelling State interest is an American test, used often in equal protection cases and cases of discrimination, where “suspect classes” (such as race) are at issue. Because of the importance of the right at issue, the compelling state interest test goes hand-in-hand with another test: narrow tailoring. Narrow tailoring places a burden upon the State to demonstrate that its restriction is tailored in a manner that infringes the right as narrowest manner that is possible to achieve its goals. The statement of the rule may be found in the American Supreme Court case of Grutter v Bollinger:&lt;br /&gt;&lt;br /&gt;"Even in the limited circumstance when drawing racial distinctions is permissible to further a compelling state interest, government is still constrained under equal protection clause in how it may pursue that end: the means chosen to accomplish the government’s asserted purpose must be specifically and narrowly framed to accomplish that purpose."&lt;br /&gt;&lt;br /&gt; To take an extremely trivial example that will illustrate the point: the State wants to ban hate speech against Dalits. It passes legislation that bans “all speech that disrespects Dalits.” This is not narrowly tailored, because while all hate speech against Dalits necessarily disrespects them, all speech that disrespects Dalits is not necessarily hate speech. It was possible for the government to pass legislation banning only hate speech against Dalits, one that would have infringed upon free speech more narrowly than the “disrespect law”, and still achieved its goals. The law is not narrowly tailored.&lt;br /&gt;&lt;br /&gt;Crucially, then, the Court in Gobind seemed to implicitly accept the narrow-tailoring flip side of the compelling state interest coin. On the constitutionality of the Police Regulations itself, it upheld their constitutionality by reading them narrowly. Here is what the Court said:&lt;br /&gt;&lt;br /&gt;“Regulation 855, in our view, empowers surveillance only of persons against whom reasonable materials exist to induce the opinion that they show a determination, to lead a life of crime – crime in this context being confined to such as involve public peace or security only and if they are dangerous security risks. Mere convictions in criminal cases where nothing gravely imperiling safety of society cannot be regarded as warranting surveillance under this Regulation. Similarly, domiciliary visits and picketing by the police should be reduced to the clearest cases of danger to community security and not routine follow-up at the end of a conviction or release from prison or at the whim of a police officer.”&lt;br /&gt;&lt;br /&gt; But Regulation 855 did not refer to the gravity of the crime at all. Thus, the Court was able to uphold its constitutionality only by narrowing its scope in a manner that the State’s objective of securing public safety was met in a way that minimally infringed the right to privacy.&lt;br /&gt;&lt;br /&gt;Therefore, whether the Gobind bench was aware of it or not, its holding incorporates into Indian constitutional law and the right to privacy, not just the compelling State interest test, but narrow tailoring as well. The implications for the CMS are obvious. Because with narrow tailoring, the State must demonstrate that bulk surveillance of all individuals, whether guilty or innocent, suspected of crimes or not suspected of crimes (whether reasonably or otherwise), possessing a past criminal record or not, speaking to each other of breaking up the government or breaking up a relationship – every bit of data must be collected to achieve the goal of maintaining public security, and that nothing narrower will suffice. Can the State demonstrate this? I do not think it can, but at the very least, it should be made to do so in open Court.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-27T18:03:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1">
    <title>Surveillance and the Indian Constitution - Part 1: Foundations</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1</link>
    <description>
        &lt;b&gt;In this insightful seven-part series, Gautam Bhatia looks at surveillance and the right to privacy in India from a constitutional perspective, tracing its genealogy through Supreme Court case law and compares it with the law in the USA.&lt;/b&gt;
        &lt;p&gt;Note: This was originally posted on the &lt;a href="http://indconlawphil.wordpress.com/2013/12/15/surveillance-and-privacy-in-india-i-foundations/"&gt;Indian Constitutional Law and Philosophy blog&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On previous occasions, we &lt;a href="http://indconlawphil.wordpress.com/2013/11/23/surveillance-privacy-association-and-the-constitution-i-oral-arguments-in-aclu-v-clapper/"&gt;have&lt;/a&gt; &lt;a href="http://indconlawphil.wordpress.com/2013/11/24/oral-arguments-in-aclu-v-clapper-ii-how-surveillance-affects-free-speech-and-the-freedom-of-association/"&gt;discussed&lt;/a&gt; the ongoing litigation in &lt;i&gt;ACLU v. Clapper &lt;/i&gt;in the United States, a challenge to the constitutionality of the National Security Agency’s (NSA) bulk surveillance program. Recall that a short while after the initial Edward Snowden disclosures, The Hindu revealed the extent of domestic surveillance in India, under the aegis of the Central Monitoring System (CMS). The CMS (and what it does) is excellently summarized &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_r=0"&gt;here&lt;/a&gt;. To put thing starkly and briefly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“With the C.M.S., the government will get &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;centralized access to all communications metadata and content&lt;/a&gt; traversing through all telecom networks in India. This means that the government can listen to all your calls, track a mobile phone and its user’s location, read all your text messages, personal e-mails and chat conversations. It can also see all your Google searches, Web site visits, usernames and passwords if your communications aren’t encrypted.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is not sanctioned by parliamentary legislation. It also raises serious privacy concerns. In order to understand the constitutional implications, therefore, we need to investigate Indian privacy jurisprudence. In a series of posts, we plan to discuss that.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is not mentioned in the Constitution. It plays no part in the Constituent Assembly Debates. The place of the right – if it exists – must therefore be located within the structure of the Constitution, as fleshed out by judicial decisions. The first case to address the issue was &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1306519/"&gt;M. P. Sharma v. Satish Chandra&lt;/a&gt;, &lt;/i&gt;in 1954. In that case, the Court upheld search and seizure in the following terms:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"A power of search and seizure is in any system of jurisprudence an overriding power of the State for the protection of social security and that power is &lt;span&gt;necessarily regulated&lt;/span&gt; by law. When the Constitution makers have thought fit not to subject such regulation to Constitutional limitations by recognition of &lt;span&gt;a &lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;&lt;span&gt;fundamental right to privacy, analogous to the American Fourth Amendment&lt;/span&gt;&lt;/i&gt;&lt;i&gt;, we have no justification to import it, into a totally different fundamental right. by some process of strained construction."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;The right in question was 19(1)(f) – the right to property. Notice here that the Court did not reject a right to privacy altogether – it only rejected it in the context of searches and seizures for documents, the specific prohibition of the American &lt;a href="http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution"&gt;Fourth Amendment&lt;/a&gt; (that has no analogue in India). This specific position, however, would not last too long, and was undermined by the very next case to consider this question, &lt;i&gt;Kharak Singh&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://indiankanoon.org/doc/619152/"&gt;&lt;i&gt;Kharak Singh v. State of UP&lt;/i&gt;&lt;/a&gt;, the UP Police Regulations conferred surveillance power upon certain “history sheeters” – that is, those charged (though not necessarily convicted) of a crime. These surveillance powers included secret picketing of the suspect’s house, domiciliary visits at night, enquiries into his habits and associations, and reporting and verifying his movements. These were challenged on Article 19(1)(d) (freedom of movement) and Article 21 (personal liberty) grounds. It is the second ground that particularly concerns us.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a preliminary matter, we may observe that the Regulations in question were administrative – that is, they did not constitute a “law”, passed by the legislature. This &lt;i&gt;automatically &lt;/i&gt;ruled out a 19(2) – 19(6) defence, and a 21 “procedure established by law” defence – which were only applicable when the State made a &lt;i&gt;law&lt;/i&gt;. The reason for this is obvious: fundamental rights are extremely important. If one is to limit them, then that judgment must be made by a competent &lt;i&gt;legislature&lt;/i&gt;, acting through the proper, deliberative channels of lawmaking – and not by mere administrative or executive action. Consequently – and this is quite apart from the question of administrative/executive &lt;i&gt;competence &lt;/i&gt; - if the Police Regulations were found to violate Article 19 or Article 21, that made them &lt;i&gt;ipso facto &lt;/i&gt;void, without the exceptions kicking in. (Paragraph 5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is also important to note one other thing: as a defence, it was &lt;i&gt;expressly &lt;/i&gt;argued by the State that the police action was reasonable and in the interests of maintaining public order precisely because it was &lt;i&gt;“directed only against those who were on proper grounds suspected to be of proved anti-social habits and tendencies and on whom it was necessary to impose some restraints for the protection of society.” &lt;/i&gt;The Court agreed, observing that this would have &lt;i&gt;“an overwhelming and even decisive weight in establishing that the classification was rational and that the restrictions were reasonable and designed to preserve public order by suitable preventive action” &lt;/i&gt;– &lt;span&gt;if&lt;/span&gt; there had been a law in the first place, which there wasn’t. Thus, this issue itself was hypothetical, but what is crucial to note is that the State argued – and the Court endorsed – the basic idea that what makes surveillance reasonable under Article 19 is the very fact that it is &lt;i&gt;targeted – &lt;/i&gt;targeted at individuals who are specifically suspected of being a threat to society because of a history of criminality.&lt;/p&gt;
&lt;p&gt;Let us now move to the merits. The Court upheld secret picketing on the ground that it could not affect the petitioner’s freedom of movement since it was, well &lt;i&gt;secret&lt;/i&gt; – and what you don’t know, apparently, cannot hurt you. What the Court found fault with was the intrusion into the petitioner’s dwelling, and knocking at his door late at night to wake him up. The finding required the Court to interpret the meaning of the term “&lt;i&gt;personal liberty&lt;/i&gt;” in Article 21. By contrasting the very specific rights listed in Article 21, the Court held that:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;Is then the word “personal liberty” to be construed as excluding from its purview an invasion on the part of the police of the sanctity of a man’s home &lt;span&gt;and an intrusion into his personal security&lt;/span&gt; and &lt;span&gt;his right to sleep which is the normal comfort and a dire necessity for human existence even as an animal&lt;/span&gt;? It might not be inappropriate to refer here to the words of the preamble to the Constitution that it is designed to “&lt;span&gt;assure the dignity of the individual&lt;/span&gt;” and therefore of those cherished human value as the means of ensuring his full development and evolution. We are referring to these objectives of the framers merely to draw attention to the concepts underlying the constitution which would point to such vital words as “personal liberty” having to be construed in a reasonable manner and to be attributed that these which would promote and achieve those objectives and by no means to stretch the meaning of the phrase to square with any preconceived notions or doctrinaire constitutional theories.”&lt;/i&gt; (Paragraph 16)&lt;/p&gt;
&lt;p&gt;A few important observations need to be made about this paragraph. The first is that it immediately follows the Court’s examination of the American &lt;a href="http://en.wikipedia.org/wiki/Fifth_Amendment_to_the_United_States_Constitution"&gt;Fifth&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/Fourteenth_Amendment_to_the_United_States_Constitution"&gt;Fourteenth Amendments&lt;/a&gt;, with their guarantees of “life, liberty and property…” and is, in turn, followed by the Court’s examination of the American &lt;a href="http://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution"&gt;&lt;i&gt;Fourth&lt;/i&gt; Amendment&lt;/a&gt;, which guarantees the protection of a person’s houses, papers, effects etc from unreasonable searches and seizures. The Court’s engagement with the Fourth Amendment is ambiguous. It admits that “&lt;i&gt;our Constitution contains no like guarantee…&lt;/i&gt;”, but holds that &lt;i&gt;nonetheless &lt;/i&gt;“&lt;i&gt;these extracts &lt;/i&gt;[from the 1949 case, &lt;a href="http://en.wikipedia.org/wiki/Wolf_v._Colorado"&gt;&lt;i&gt;Wolf v Colorado&lt;/i&gt;&lt;/a&gt;]&lt;i&gt; would show that an unauthorised intrusion into a person’s home and the disturbance caused to him thereby, is as it were the violation of a common law right of a man – an ultimate essential of ordered liberty”&lt;/i&gt;, thus tying its own holding in some way to the American Fourth Amendment jurisprudence. But here’s the crucial thing: &lt;i&gt;at this point&lt;/i&gt;, American Fourth Amendment jurisprudence was &lt;i&gt;propertarian based &lt;/i&gt;– that is, the Fourth Amendment was understood to codify – with added protection – the common law of trespass, whereby a man’s property was held sacrosanct, and not open to be trespassed against. Four years later, in 1967, in &lt;a href="http://en.wikipedia.org/wiki/Katz_v._United_States"&gt;&lt;i&gt;Katz&lt;/i&gt;&lt;/a&gt;, the Supreme Court would shift its own jurisprudence, to holding that the Fourth Amendment protected zones where persons had a “&lt;i&gt;reasonable&lt;/i&gt;&lt;i&gt; expectation of privacy&lt;/i&gt;”, as opposed to simply protecting listed items of property (homes, papers, effects etc). &lt;i&gt;Kharak Singh&lt;/i&gt; was handed down before &lt;i&gt;Katz. &lt;/i&gt;Yet the quoted paragraph expressly shows that the Court anticipated &lt;i&gt;Katz&lt;/i&gt;, and in expressly grounding the Article 21 personal liberty right within the meaning of &lt;i&gt;dignity&lt;/i&gt;, utterly rejected the propertarian-tresspass foundations that it might have had. To use a phrase invoked by later Courts – in this proto-privacy case, the Court already set the tone by holding it to attach to &lt;i&gt;persons&lt;/i&gt;, not &lt;i&gt;places.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;While effectively finding a right to privacy in the Constitution, the Court expressly declined to frame it that way. In examining police action which involved tracking a person’s location, association and movements, the Court upheld it, holding that &lt;i&gt;“the right of privacy is not a guaranteed right under our Constitution &lt;span&gt;and therefore&lt;/span&gt; the attempt to ascertain the movements of an individual which &lt;span&gt;is merely a manner in which privacy&lt;/span&gt; is invaded is not an infringement of a fundamental right guaranteed by Part III.”&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; The “therefore” is crucial. Although not expressly, the Court virtually holds, in terms, that tracking location, association and movements &lt;span&gt;does violate privacy&lt;/span&gt;, and only finds that constitutional because &lt;i&gt;there is no guaranteed right to privacy within the Constitution. &lt;/i&gt;Yet.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In his partly concurring and partly dissenting opinion, Subba Rao J. went one further, by holding that the idea of privacy was, in fact, contained within the meaning of Article 21: &lt;i&gt;“it is true our Constitution does not expressly declare a right to privacy as a fundamental right, but the said right is an essential ingredient of personal liberty.” &lt;/i&gt; Privacy he defined as the right to “&lt;i&gt;be free from restrictions or encroachments on his person, whether those restrictions or encroachments are directly imposed or indirectly brought about by calculated measures.” &lt;/i&gt;On this ground, he held all the surveillance measures unconstitutional.&lt;/p&gt;
&lt;p&gt;Justice Subba Rao’s opinion also explored a proto-version of the &lt;a href="http://en.wikipedia.org/wiki/Chilling_effect"&gt;chilling effect&lt;/a&gt;. Placing specific attention upon the word “&lt;i&gt;freely&lt;/i&gt;” contained within 19(1)(d)’s guarantee of free movment, Justice Subba Rao went specifically against the majority, and observed:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;“The freedom of movement in clause (d) therefore must be a movement in a free country, i.e., in a country where he can do whatever he likes, speak to whomsoever he wants, meet people of his own choice without any apprehension, subject of course to the law of social control. The petitioner under the shadow of surveillance is certainly deprived of this freedom. &lt;span&gt;He can move physically, but he cannot do so freely, for all his activities are watched and noted. The shroud of surveillance cast upon him perforce engender inhibitions in him and he cannot act freely as he would like to do. &lt;/span&gt;We would, therefore, hold that the entire Regulation 236 offends also Art. &lt;/i&gt;&lt;i&gt;19(1)(d) of the Constitution.”&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;This early case, therefore, has all the aspects that plague the CMS today. What to do with administrative action that does not have the sanction of law? What role does targeting play in reasonableness – assuming there is a law? What is the philosophical basis for the implicit right to privacy within the meaning of Article 21’s guarantee of personal liberty? And is the chilling effect a valid constitutional concern?&lt;/p&gt;
&lt;p&gt;We shall continue with the development of the jurisprudence in the next post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;You can follow Gautam Bhatia &lt;a href="https://twitter.com/gautambhatia88"&gt;on Twitter&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-23T15:12:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018">
    <title>Submission to TRAI Consultation on "Inputs for Formulation of National Telecom Policy - 2018"</title>
    <link>https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS) made a submission to TRAI Consultation on inputs to the National Telecom Policy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We welcome the TRAI consultation on the National Telecom Policy 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We believe these should be among the objectives of the next NTP.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;To enable inclusion through the provision of telecommunications infrastructure and services that are accessible to all, especially for the most marginalized.&lt;/li&gt;
&lt;li&gt;To maximize the utility of telecom networks by increasing their capacity and throughput.&lt;/li&gt;
&lt;li&gt;To maximize the socio-economic utility of of spectrum and rationalize the regulatory regime.&lt;/li&gt;
&lt;li&gt;To re-energize the telecom sector, and to bring about a shift to a revenue-sharing model of revenue-generation for the exchequer.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NTP-12 does not include any policy mandate for providing accessibility for person with disabilities. The Policy should mandate implementation of systems that would enable better a&lt;span&gt;ccessibility for persons with disabilities. This could have included formulation of a Code of good practice for manufactures and service providers, conduct surveys and gather statistics on &lt;/span&gt;&lt;span&gt;use of telecommunication services by persons with disabilities, etc. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Resource and infrastructure sharing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Resource- and infrastructure-sharing among telecommunications companies and applications is crucial to ensure both eiciency of usage of a limited resource (whether it is cabling in &lt;span&gt;underground ducts, or spectrum, or telecom towers), as well as to lower telecommunications costs (especially capital expenditure cost) and lowering barriers to entry, reducing &lt;/span&gt;environmental costs, and to maximize the beneits for consumers.&lt;a href="#ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Eforts must be taken to enable greater sharing of resources and infrastructure, without there being a negative impact on competition.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a telecom scholar points out, “[O]perators will sometimes share the cost of digging or deploying passive infrastructure, but will lay their own iber lines, which allows &lt;span&gt;them to engage in full, facility-based competition. In these cases, there is no risk of coordination, as networks based on multiple iber lines ensure that access seekers can obtain &lt;/span&gt;&lt;span&gt;full control over them. Under such conditions, co-investment agreements are more likely to lead to timelier and more intense competition on the downstream market.”&lt;/span&gt;&lt;a href="#ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For this, the separation between infrastructure and service must be maintained, with focus of competition at the service end with infrastructure being largely common. This is managed differently in &lt;span&gt;different countries.&lt;/span&gt;&lt;a href="#ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Keeping all this in mind, we suggest that Strategies E(b) and F(c) be reworded to say, "By promoting both passive and active sharing of telecom infrastructure and &lt;span&gt;resources among telecom service providers, while ensuring that doesn’t lead to a decrease in competition, and where appropriate making certain forms of infrastructure sharing &lt;/span&gt;&lt;span&gt;mandatory."&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the resources that require sharing is spectrum. In 2015, DoT guidelines allowed liberalised spectrum to be shared among operators.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Modernizing spectrum management&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are happy to note that the strategy of “ensuring adequate availability of contiguous, broader and globally harmonised spectrum” is listed under Strategy D(u). There are many &lt;span&gt;opportunities for harmonisation of spectrum usage in India vis-a-vis global usage. For instance, currently in India, only 50 MHz of spectrum has been earmarked for unlicenced use &lt;/span&gt;&lt;span&gt;outdoors in the 5 GHz band (5.825 GHz to 5.875 GHz). There is no rationale for this distinction between indoor and outdoor use, and this limits the usage of Wi-Fi outdoors. The US has &lt;/span&gt;&lt;span&gt;delicensed 580 MHz in the 5GHz band which allows for the IEEE 802.11ac standard to be used on it, whereas India has only delicensed 300 MHz, whereas 1280 MHz is what is dictated by &lt;/span&gt;&lt;span&gt;needs.&lt;/span&gt;&lt;a href="#ftn5"&gt;[5]&lt;/a&gt; &lt;span&gt;At a minimum 580 MHz (3x160 MHz) ought to be made available for unlicensed used. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, delicensing the 60 GHz band would bring us in line with global regimes,&lt;a href="#ftn6"&gt;[6]&lt;/a&gt; &lt;span&gt;where at least &lt;/span&gt; 19 countries have delicensed the 60 Ghz band for both access as well as backhaul purposes.&lt;a href="#ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 60GHz band is ideal for delicensing since it there is virtually no interference since due to oxygen absorption and narrow antenna beam width the transmission distances&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;are short. We also need to liberalize the 70 and 80 GHz bands to enabling lower cost access for these frequencies to extend ibre connectivity where necessary by using other means, including &lt;span&gt;through aerial systems.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While under Strategy D(v), TRAI proposes the “earmarking [of] unlicensed frequency bands periodically for operation of low power devices for public use”, it should instead be &lt;span&gt;“earmarking unused, underused, and unlicensed frequency bands periodically for public use, with licence-exemption and light-licensing where possible, with safeguards to prevent &lt;/span&gt;&lt;span&gt;interference”. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even bands that have been allocated under the NFAP and licensed may lie unused or underused as well. According to a study by IIT-Hyderabad, unused TV spectrum in &lt;span&gt;India amounts to between 85%-95% of the total TV spectrum. A large swath of 115 MHz — from 470 to 585 MHz — lies unused, and is available for alternative uses. Waiting for an &lt;/span&gt;&lt;span&gt;ecosystem to develop around the 470- 698 MHz band,&lt;a href="#ftn8"&gt;[8]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;is harming the government’s vision of Digital India and an urgent course correction is needed. As we have argued in the past, &lt;/span&gt;&lt;span&gt;“[w]hereas Digital India needs low-cost wireless broadband, especially for long-distance links in rural India, because of the high cost and diiculty of building and maintaining ibre or wired &lt;/span&gt;&lt;span&gt;networks in diicult terrain, and/or in sparsely populated areas. Therefore, access to TVWS needs to be bundled with BharatNet, and other shared backbone networks like ERNET.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Policies should permit diferent network design scenarios including transmission power and purpose. Point-to-point links are needed over long distances in place of ibre or microwave, &lt;span&gt;and broad coverage is needed for contiguous areas like industrial developments, campuses, commercial complexes, or rural communities … TVWS does need tight radio ilters (unlike &lt;/span&gt;&lt;span&gt;Wi-Fi) to minimise interference, the underlying consideration that drives spectrum management. There's also need for varying power speciications depending on the network &lt;/span&gt;&lt;span&gt;design and purpose as described above, and policies for unlicensed sharing using geolocation databases, as deined by the US FCC."&lt;a href="#ftn9"&gt;[9]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, following the lead of the FCC in the USA, and Ofcom in the UK, we in India should exempt low-power usage across all spectrum bands. The approach followed by Ofcom (which &lt;span&gt;allows for powers between -90 dBm/MHz to -41 dBm/MHz (and on a sloping gradient from 10.6 GHz onwards), may be recommended. To reflect this, a strategy statement to “explore greater &lt;/span&gt;&lt;span&gt;exemptions from licensing requirements where possible, including for low-power spectrum usage”, would be helpful.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTP should also lead the way in encouraging the government and the regulator to look to new ways of managing licence-exempt use of spectrum, as has been done, for example, in the &lt;span&gt;UK.&lt;a href="#ftn10"&gt;[10]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This allows for a movement away from power-oriented regulations to regulation on the basis of interference. For instance, shared spectrum databases may allow for coordinated usage &lt;span&gt;of higher power but without interference. Further, this allows for bands to be categorized not by usage, but by transmit powers and duty cycles.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Accessibility&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the lacunae in the NTP-12 is its lack of any policy mandate for providing accessibility for person with disabilities.&lt;a href="#ftn11"&gt;[11]&lt;/a&gt; &lt;span&gt;NTP-18 should not make the same mistake. The NTP should &lt;/span&gt;&lt;span&gt;mandate implementation of systems that would enable better accessibility for persons with disabilities. This should include formulation of a code of good practice for manufactures and &lt;/span&gt;&lt;span&gt;service providers, conducting surveys and gathering statistics on use of telecommunication services by persons with disabilities, etc.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Revenue maximization&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe that Strategy D(r) (“reviewing the objectives of spectrum management to maximise socio-economic gains”) should explicitly mention that revenue maximization should not itself &lt;span&gt;be a goal, since that may harm the socio-economic gains to be had from optimal usage of spectrum. We believe that it should be made explict that “ensuring revenue maximization for &lt;/span&gt;&lt;span&gt;the exchequer will not be the main aim of spectrum management policy”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Auctions, which ind mention in TRAI’s recommendations, ne — to favour a model of revenue sharing&lt;a href="#ftn12"&gt;[12]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;— and at the least they need to be structured in such a manner as to avoid the “winner’s curse”.&lt;a href="#ftn13"&gt;[13]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;Revenue-sharing, which was followed after NTP-99, allows for a more sustainable form of revenue generation for the government, while having transparent allocation systems or &lt;/span&gt;&lt;span&gt;auctions designed in a manner not oriented towards maximizing the generation of auction proceeds for the government.&lt;a href="#ftn14"&gt;[14]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;Just as increasing the USO fund by itself cannot be a goal — ensuring universal service is the goal — similarly, the generation of tax revenue by itself &lt;/span&gt;&lt;span&gt;cannot be a goal.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Patents pools, local manufacturing, and cost of devices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under “Strategies to become net positive in international trade of telecommunication systems and services”, the consultation paper proposes inancial incentives for development of SEPs, as &lt;span&gt;well as “incentivising local manufacturing of network equipment and devices” as strategies. One concrete strategy to incentivise local manufacturing of telecommunications equipment &lt;/span&gt;&lt;span&gt;and devices is to create government-controlled patent pools,&lt;a href="#ftn15"&gt;[15]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;which can be used to ensure that patent-holders are paid a royalty on SEPs while also lowering the transaction costs and legal &lt;/span&gt;&lt;span&gt;uncertainty for local device manufacturers, and ultimately lowering the price of devices for customers.&lt;a href="#ftn16"&gt;[16]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Private patent pools do not suiciently take care of the legal risks created to manufacturers. If government intervention is not done, then Indian manufacturers will end &lt;span&gt;up embroiled in legal battles as we have seen with Micromax, and others. CIS has provided a very detailed submission on TRAI’s Consultation Paper on Promoting Local Telecom &lt;/span&gt;&lt;span&gt;Equipment Manufacturing.&lt;a href="#ftn17"&gt;[17]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Internet connection and data centres&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While under “Strategies to establish India as a global hub for data communication systems and services”, the problem of Internet interconnection is brought up, but the strategies don’t &lt;span&gt;mention what needs to be done. One of the problems facing India currently is a low level of peering interconnection agreements and a high cost of transit interconnection agreements. &lt;/span&gt;&lt;span&gt;This results in a higher cost of Internet for everyone. This needn’t be so. The NTP could establish that there should be no licensing required for running an interconnection point. &lt;/span&gt;&lt;span&gt;Currently, there is a lack of clarity on the matter, with contrary suggestions having been provided by Trai in the past. Further, the NTP and that existing interconnection exchanges &lt;/span&gt;&lt;span&gt;like NIXI should not discriminate between licensed telecom operators and unlicensed content &lt;/span&gt;providers, since it is crucial that the latter also be present at interconnection exchanges, and interconnection exchanges will not lourish unless the hurdles put in place, which favour &lt;span&gt;incumbents, are reduced.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worrying that TRAI has suggested establishing a “licensing and regulatory framework for cloud service providers” (Strategy H(a)). While cloud service providers are subject to the &lt;span&gt;regulations provided in the IT Act, and other legislations in India, they currently are not subject to any licensing requirements. No rationale has been provided by TRAI for this &lt;/span&gt;&lt;span&gt;suggestion, and it would kill innovation in the sector, and would inhibit the emergence of India as a global hub for data communications systems and services. Similarly, while an &lt;/span&gt;&lt;span&gt;overarching data protection and security legislation needs to be in place, the suggestion of a “licensing and regulatory framework for IoT/ M2M service providers” (Strategy G(a)) is &lt;/span&gt;&lt;span&gt;worrying, and there is no suitable rationale for having licensing in this space, which will only serve to curb innovation without any corresponding or suitable benefit accruing to the public.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that telecommunications isn’t an end in itself, but is a means to an end, one of the missions of the NTP could be:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;To enable inclusion through the provision of telecommunications infrastructure and services that is accessible for all, especially for the most marginalized, including those &lt;span&gt;who are disabled, those who live in remote areas, those who are illiterate, scheduled castes and scheduled tribes, women, and transgender communities.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Once again, we are grateful to TRAI for having provided this opportunity to comment.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;].  GSMA, “Mobile Infrastructure Sharing,” 2008, https://www.gsma.com/publicpolicy/wpcontent/uploads/2012/09/Mobile-Infrastructure-sharing.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn2"&gt;&lt;/a&gt;].  José Carlos Laguna de Paz, “How Cooperation Between Telecom Firms Can Improve Efficiency,” The Regulatory Review, June 25, 2015, https://www.theregreview.org/2015/06/25/laguna-telecoms-cooperation/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn3"&gt;&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn4"&gt;&lt;/a&gt;]. Jan Markendahl, Amirhossein Ghanbari, and Bengt G. Mölleryd, “Network Cooperation between Mobile Operators : Why and How Competitors Cooperate?,” in DIVA, 2013, http://urn.kb.se/resolve? urn=urn:nbn:se:kth:diva-134358.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn5"&gt;&lt;/a&gt;]. Parag Kar, “Response to TRAI’s Consultation Paper on Proliferation of Broadband through Public Wi-Fi Networks” (Qualcomm, August 10, 2016), http://www.trai.gov.in/sites/default/files/201609011022542916621Qualcomm_india_pvt_ltd.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn6"&gt;&lt;/a&gt;]. See ITU-R Report “ITU-R M.2227 (11/2011)” and ITU-R Recommendation “ITU-R M.2003-1 (01/2015)” on “Multiple Gigabit Wireless Systems in frequencies around 60 GHz”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn7"&gt;&lt;/a&gt;]. Broadband India Forum, “V Band - 60 GHz: The Key to Affordable Broadband in India” (Broadband India Forum, 2016), http://www.broadbandindiaforum.com/img/White%20Paper%20on%20V-BAND%20Revised%20Final.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn8"&gt;&lt;/a&gt;]. Varun Aggarwal, “DoT Says No to Releasing TV White Space Spectrum, Clarifies It Is for Experiments,” The Hindu Business Line, June 16, 2016, http://www.thehindubusinessline.com/info-tech/dot-says-no-to-releasing-tvwhite-space-spectrum-clarifies-it-is-for-experiments/article8737575.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn9"&gt;&lt;/a&gt;].  Shyam Ponappa, “The Buzz around TV White Space,” Business Standard, November 4, 2015, http://www.businessstandard.com/article/opinion/shyam-ponappa-the-buzz-around-tv-white-space-115110401618_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn10"&gt;&lt;/a&gt;]. “Better Managing Licence-Exempt Usage,” Ofcom, October 7, 2016, https://www.ofcom.org.uk/research-anddata/technology/radio-spectrum/exempt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn11"&gt;&lt;/a&gt;]. Snehashish Ghosh, “National Telecom Policy 2012 — Issues and Concerns,” The Centre for Internet and Society, June 30, 2012, https://cis-india.org/telecom/national-telecom-policy-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn12"&gt;&lt;/a&gt;]. David E. M. Sappington and Dennis L. Weisman, “Revenue Sharing in Incentive Regulation Plans,” Information Economics and Policy 8, no. 3 (September 1, 1996): 229–48, https://doi.org/10.1016/0167-6245(96)00010-8.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn13"&gt;&lt;/a&gt;]. Shyam Ponappa, “Richard Thaler’s Views on Auctions,” Business Standard, November 1, 2017, http://www.business-standard.com/article/opinion/richard-thaler-s-views-on-auctions-117110101558_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn14"&gt;&lt;/a&gt;]. Shyam Ponappa, “Breakthroughs Needed for Digital India,” Business Standard, April 6, 2016, http://www.businessstandard.com/article/opinion/shyam-ponappa-breakthroughs-needed-for-digital-india-116040601241_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn15"&gt;&lt;/a&gt;]. Sunil Abraham, “Letter for Establishment of Patent Pool for Low-Cost Access Devices through Compulsory Licenses,” The Centre for Internet and Society, accessed January 19, 2018, https://cis-india.org/a2k/blogs/letter-forestablishment-of-patent-pool-for-low-cost-access-devices&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn16"&gt;&lt;/a&gt;]. Nehaa Chaudhari, “Pervasive Technologies: Patent Pools,” The Centre for Internet and Society, accessed January 19, 2018, https://cis-india.org/a2k/blogs/patent-pools&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn17"&gt;&lt;/a&gt;].  Anubha Sinha, “Comments on TRAI’s Consultation Paper on Promoting Local Telecom Equipment Manufacturing” (Centre for Internet and Society, November 13, 2017), http://www.trai.gov.in/sites/default/files/CentreInternetSocietyIndia_CP_PLTEM.pdf.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018'&gt;https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2018-01-25T14:46:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs">
    <title>Submission on India's Draft Comments on Proposed Changes to the ITU's ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs</link>
    <description>
        &lt;b&gt;Given below are the responses from the representatives of civil society in India (The Society for Knowledge Commons, Centre for Internet &amp; Society, The Delhi Science Forum, Free Software Movement of India, Internet Democracy Project and Media for Change) to the Government of India's proposals for the upcoming WCIT meeting, in December 2012, in Dubai.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our detailed comments on India's draft proposals can be &lt;a href="https://cis-india.org/internet-governance/blog/reaction-to-draft-proposal-from-india-on-final-draft-itr-document-of-itu" class="internal-link"&gt;found here&lt;/a&gt;. Also read the &lt;a href="https://cis-india.org/internet-governance/blog/indian-govts-submission-to-itu" class="internal-link"&gt;final version&lt;/a&gt; of Indian Government's submission to ITU on November 3, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe that, aspects of Internet governance that have been and are presently addressed by bodies other than ITU should not be brought under the mandate of the ITU through the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the proposed changes to the ITR's could have a significant negative impact on the openness of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the processes related to the WCIT lack openness and transparency: the WCIT / ITU excludes civil society, academia and other stakeholders from participation in and access to most dialogues and documents, contrary to established principles of Internet governance as laid down in the Tunis Agenda and as supported by the Indian government at several national and international fora. The WCIT process needs to be improved both at the domestic and global level. We urge the Indian government to support a more open process in the future, with respect to deliberations that will have a significant impact on the people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recognise that concerns regarding cyber-security, spam, fraud, etc. are real and that some of these concerns require to be addressed at the global level. However, we believe that as a number of parallel processes are working on these specific issues, these need not be brought under the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We therefore strongly recommend that the ITRs continue to be restricted to the infrastructure layer that has traditionally been the area of its focus and not the content or the application layer of the Internet. Any measure that impinges on these layers should be kept out of ITRs and taken up at other appropriate (multi-stakeholder) fora.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We note that the proposal ARB/7/24 defines an "operating agency" as "&lt;i&gt;any individual, company, corporation or governmental agency which operates a telecommunication installation intended for an international telecommunication service or capable of causing harmful interference with such a service&lt;/i&gt;" and believe that this definition is too broad in scope and ambit. Inclusion of such a term would broaden the mandate of the ITU to regulate numerous actors in the Internet sphere who do not fall under the infrastructure layer of the Internet. We call on the Indian government to ensure that the term "operating agency" is defined in a narrower or more restrictive manner and only used in exceptional cases. Normally, the obligations of member states should be with respect to "recognised operating agencies" and not omnibus all "operating agencies".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Follow-up&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We would like to note that we have never officially received this document directly from the Indian government. In view of the support the Indian government continually espouses for multi-stakeholder Internet governance, this is a matter of deep regret.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are aware that the official closing date for proposals is early November. However, we also know that several governments intend to submit proposals right upto the beginning of the WCIT meeting. In addition, several governments have included civil society representatives on their official delegation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;We therefore call upon the Department of Telecommunications to&lt;/i&gt; organise an open consultation with civil society representatives, to discuss both India's proposals and the comments of various civil society representatives on them, in greater depth, &lt;/b&gt;as part of DoT’s preparation for the WCIT meeting and in line with India's espoused commitment to multi-stakeholderism. We look forward to discussing our inputs with the Government to make the decision making process on governance more participatory and inclusive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs'&gt;https://cis-india.org/internet-governance/blog/submission-on-indias-draft-comments-on-proposed-changes-to-itus-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T04:15:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes">
    <title>Submission by Indian Civil Society Organisations on Proposals for the Future ITRs and Related Processes</title>
    <link>https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society was one of the signatories of this submission which was sent in November 2012, in response to the International Telecommunication Union's call for public comments in relation to the  revision of International Telecommunication Regulations that are to take place at the ITU's World Conference on International Telecommunications in Dubai from December 3 to 14, 2012.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We, the undersigned civil society organisations from India, respectfully acknowledge the important role that the ITU has played in the spread of telecommunications around the world. However, we are concerned about the lack of transparency and openness of the processes related to the WCIT: the WCIT/ITU excludes civil society, academia and other stakeholders from participation in and access to most dialogues and documents.  The documents that are publicly available show that some of the proposals might deal with Internet governance. According to established principles as laid down in the Tunis Agenda - which process the ITU helped to lead - Internet governance processes are required to be multistakeholder in nature. The WCIT and ITU processes require urgent improvement with regard to openness, inclusiveness and transparency. While we appreciate the current opportunity to share our comments, we would like to encourage the ITU and its Member States to adopt a genuine multistakeholder approach at the earliest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned, we do welcome the current opportunity to share our thoughts. Though this list is not exhaustive, some of our major concerns are as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We believe that, given the historical development of present methods of internet regulation, aspects of Internet governance that have been and are presently addressed by bodies other than ITU should not be brought under the mandate of the ITU through the ITRs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We therefore strongly recommend that the ITRs continue to be restricted to aspects of the physical layer that have traditionally been the areas of its focus. The ITRs scope should not be expanded to other layers, nor to content - any measure that impinges on these layers should be kept out of ITRs and taken up at other appropriate (multi-stakeholder) fora. In addition, it is crucial that “ICTs” and the term “processing” be excluded from the definition of telecommunication as this clearly opens up the possibility for Member States to regulate/attempt to regulate the “content/“application” layer on the internet at the ITU.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also recommend that provisions regarding international naming, numbering, addressing and identification resources will be restricted to telephony, as should provisions regarding transit rate, originating identification and end-to-end QoS. Provisions regarding the routing of Internet traffic should not find a place in the ITRs at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recognise that concerns regarding cyber security, spam, fraud, etc. are real and that some of these concerns require to be addressed at the global level. However, as these are being discussed in many other fora, we believe that the ITRs are not the best place to address these. Their inclusion here could inhibit the further evolution and expansion of the Internet. We also believe that any fora discussing cyber security should be multistakeholder, open and transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We note that the proposal ARB/7/24 defines an “operating agency” as “&lt;i&gt;any individual, company, corporation or governmental agency which operates a telecommunication installation intended for an international telecommunication service or capable of causing harmful interference with such a service&lt;/i&gt;” and believe that this definition is too broad in scope and ambit. Inclusion of such a term would broaden the mandate of the ITU to regulate numerous actors in the Internet sphere who do not fall under the infrastructure layer of the Internet. The term “operating agency” should be defined in a narrower or more restrictive manner and, irrespective of its exact definition, only be used in exceptional cases. Normally, the obligations of member states should be with respect to “recognised operating agencies” and not omnibus all “operating agencies”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Signed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Centre for Internet and Society&lt;/li&gt;
&lt;li&gt;Delhi Science Forum&lt;/li&gt;
&lt;li&gt;Free Software Movement India&lt;/li&gt;
&lt;li&gt;Internet Democracy Project&lt;/li&gt;
&lt;li&gt;Knowledge Commons (India)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes'&gt;https://cis-india.org/internet-governance/blog/submission-on-proposals-for-future-itrs-and-related-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-07T08:00:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules">
    <title>Statutory Motion Against Intermediary Guidelines Rules</title>
    <link>https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules</link>
    <description>
        &lt;b&gt;Rajya Sabha MP, Shri P. Rajeev has moved a motion that the much-criticised Intermediary Guidelines Rules be annulled. &lt;/b&gt;
        &lt;h2&gt;Motion to Annul Intermediary Guidelines Rules&lt;/h2&gt;
&lt;p&gt;A &lt;a href="http://164.100.47.5/newsite/bulletin2/Bull_No.aspx?number=49472"&gt;motion to annul&lt;/a&gt; the &lt;a href="http://cis-india.org/internet-governance/resources/intermediary-guidelines-rules"&gt;Intermediary Guidelines Rules&lt;/a&gt; was moved on March 23, 2012, by &lt;a href="http://india.gov.in/govt/rajyasabhampbiodata.php?mpcode=2106"&gt;Shri P. Rajeeve&lt;/a&gt;, CPI(M) MP in the Rajya Sabha from Thrissur, Kerala.&lt;/p&gt;
&lt;p&gt;The motion reads:&lt;/p&gt;
&lt;p&gt;"That this House resolves that the Information Technology (Intermediaries Guidelines) Rules, 2011 issued under clause (zg) of sub-section (2) of Section 87 read with sub-section (2) of Section 79 of the Information Technology Act, 2000 published in the Gazette of India dated the 13th April, 2011 vide Notification No. G.S.R 314(E) and laid on the Table of the House on the 12th August, 2011, be annuled; and&lt;/p&gt;
&lt;p&gt;That this House recommends to Lok Sabha that Lok Sabha do concur on this Motion."&lt;/p&gt;
&lt;p&gt;This isn't the first time that Mr. Rajeeve is raising his voice against the Intermediary Guidelines Rules.  Indeed, even when the Rules were just in draft stage, he along with the MPs Kumar Deepak Das, Rajeev Chandrashekar, and Mahendra Mohan drew Parliamentarians' &lt;a href="http://rajeev.in/pages/..%5CNews%5Ccensorship_Blogs%5CBloggers_Internet.html"&gt;attention to the rules&lt;/a&gt;.  Yet, the government did not heed the MPs' concern, nor the concern of all the civil society organizations that wrote in to them concerned about human rights implications of the new laws.  On September 6, 2011, Lok Sabha MP &lt;a href="https://cis-india.org/internet-governance/blog/164.100.47.132/debatestext/15/VIII/0609.pdf"&gt;Jayant Choudhary gave notice&lt;/a&gt; (under Rule 377 of the Lok Sabha Rules) that the Intermediary Guidelines Rules as well as the Reasonable Security Practices Rules need to be reviewed.  Yet, the government has not even addressed those concerns, and indeed has cracked down even harder on online freedom of speech since then.&lt;/p&gt;
&lt;h2&gt;Fundamental Problems with Intermediary Guidelines Rules&lt;/h2&gt;
&lt;p&gt;The fundamental problems with the Rules, which deal with objectionable material online:&lt;/p&gt;
&lt;h3&gt;Shifting blame.&lt;/h3&gt;
&lt;p&gt;It makes the 'intermediary', including ISPs like BSNL and Airtel responsible for objectionable content that their users have put up.&lt;/p&gt;
&lt;h3&gt;No chance to defend.&lt;/h3&gt;
&lt;p&gt;There is no need to inform users before this content is removed.  So, even material put up by a political party can be removed based on &lt;em&gt;anyone's&lt;/em&gt; complaint, without telling that party.  This was done against a site called *CartoonsAgainstCorruption.com". This goes against Article 19(1)(a).&lt;/p&gt;
&lt;h3&gt;Lack of transparency&lt;/h3&gt;
&lt;p&gt;No information is required to be provided that content has been removed. It's a black-box system, with no one, not even the government, knowing that content has been removed following a request.  So even the government does not know how many sites have been removed after these Rules have come into effect.&lt;/p&gt;
&lt;h3&gt;No differentiation between intermediaries.&lt;/h3&gt;
&lt;p&gt;A one-size-fits-all system is followed where an e-mail provider is equated with an online newspaper, which is equated with a video upload site, which is equated with a search engine.  This is like equating the post-office and a book publisher as being equivalent for, say, defamatory speech.  This is violative of Article 14 of the Constitution, which requires that unequals be treated unequally by the law.&lt;/p&gt;
&lt;h3&gt;No proportionality.&lt;/h3&gt;
&lt;p&gt;A DNS provider (i.e., the person who gives you your web address) is an intermediary who can be asked to 'disable access' to a website on the basis of a single page, even though the rest of the site has nothing objectionable.&lt;/p&gt;
&lt;h3&gt;Vague and unconstitutional requirements.&lt;/h3&gt;
&lt;p&gt;Disparaging speech, as long as it isn't defamatory, is not criminalised in India, and can't be because the Constitution does not allow for it.  Content about gambling in print is not unlawful, but now all Internet intermediaries are required to remove any content that promotes gambling.&lt;/p&gt;
&lt;h3&gt;Allows private censorship.&lt;/h3&gt;
&lt;p&gt;The Rules do not draw a distinction between arbitrary actions of an intermediary and take-downs subsequent to a request.&lt;/p&gt;
&lt;h3&gt;Presumption of illegality.&lt;/h3&gt;
&lt;p&gt;The Rules are based on the presumption that all complaints (and resultant mandatory taking down of the content) are correct, and that the incorrectness of the take-downs can be disputed in court (if they ever discover that it has been removed).  This is contrary to the presumption of validity of speech used by Indian courts, and is akin to prior restraint on speech.  Courts have held that for content such as defamation, prior restraints cannot be put on speech, and that civil and criminal action can only be taken post-speech.&lt;/p&gt;
&lt;h3&gt;Government censorship, not 'self-regulation'.&lt;/h3&gt;
&lt;p&gt;The government says these are industry best-practices in existing terms of service agreements.  But the Rules require all intermediaries to include the government-prescribed terms in an agreement, no matter what services they provide. It is one thing for a company to choose the terms of its terms of service agreement, and completely another for the government to dictate those terms of service.&lt;/p&gt;
&lt;h2&gt;Problems Noted Early&lt;/h2&gt;
&lt;p&gt;We have noted in the past the problems with the Rules, including when the Rules were still in draft form:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/internet-governance/blog/intermediary-due-diligence"&gt;CIS Para-wise Comments on Intermediary Due Diligence Rules, 2011&lt;/a&gt; &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.outlookindia.com/article.aspx?279712"&gt;E-Books Are Easier To Ban Than Books&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://kafila.org/2012/01/11/invisible-censorship-how-the-government-censors-without-being-seen-pranesh-prakash/"&gt;Invisible Censorship: How the Government Censors Without Being Seen&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://india.blogs.nytimes.com/2011/12/07/chilling-impact-of-indias-april-internet-rules/"&gt;'Chilling' Impact of India's April Internet Rules&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.tehelka.com/story_main51.asp?filename=Op280112proscons.asp"&gt;The Quixotic Fight To Clean Up The Web&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://cis-india.org/internet-governance/online-pre-censorship-harmful-impractical"&gt;Online Pre-censorship is Harmful and Impractical&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://www.indianexpress.com/story-print/787789/"&gt;Killing the Internet Softly With Its Rules&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Other organizations like the Software Freedom Law Centre also sent in &lt;a href="http://softwarefreedom.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=78&amp;amp;Itemid=79"&gt;scathing comments on the law&lt;/a&gt;, noting that they are unconstitutional.&lt;/p&gt;
&lt;p&gt;We are very glad that Shri Rajeeve has moved this motion, and we hope that it gets adopted in the Lok Sabha as well, and that the Rules get defeated.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules'&gt;https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Parliament</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-04-03T09:35:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin">
    <title>Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin</link>
    <description>
        &lt;b&gt;This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression that took place in Dhaka, Bangladesh, on January 14–15, 2013.&lt;/b&gt;
        &lt;p&gt;Bangladeshi blogger Asif Mohiuddin was brutally attacked in a stabbing last evening.  His condition is currently said to be critical.  Violent attacks on mediapersons have led to at least four deaths in the past year.  This trend is now extending to those writing online.&lt;/p&gt;
&lt;p&gt;It is the duty of societies at large to ensure that principles we universally consider sacrosanct, such as the right to life and liberty and of freedom of expression are in fact ideas, and of the government to actively protect the rights guaranteed under the Constitution of Bangladesh and to ensure they are not just words on paper.&lt;/p&gt;
&lt;p&gt;Article 39 of the Constitution of Bangladesh—and Article 19 of the Universal Declaration of Human Rights—guarantee both the freedom of thought and conscience, as well as the right of every citizen of freedom of speech and expression, and freedom of the press.&lt;/p&gt;
&lt;p&gt;Article 32 of the Constitution of Bangladesh—and Article 3 of the Universal Declaration of Human Rights—guarantee that no person shall be deprived of life or personal liberty except by law.&lt;/p&gt;
&lt;p&gt;The attack on Asif Mohiuddin constitutes a violation these fundamental principle by criminals, and we request the government to act decisively to show it will not tolerate such violations.&lt;/p&gt;
&lt;p&gt;Reporters Without Borders note that "the ability of those in the media to work freely has deteriorated alarmingly in Bangladesh, which is now ranked 129th of 179 countries in the 2011-2012 World Press Freedom Index".&lt;/p&gt;
&lt;p&gt;In general, the situation of those working as non-professional 'citizen journalists' is even worse.  In a 2010 report, the UN Special Rapporteur wrote:
&lt;blockquote&gt;"Citizen journalists are by nature more isolated, they are more vulnerable to attack than professional journalists. However, citizen journalists enjoy less protection than their counterparts in traditional media, as they do not have the support of media organizations and networks, in particular the organizational resources, including lawyers and financial resources, which can help shield them from harassment."&lt;/blockquote&gt;
This reality of greater vulnerability is equally applicable to those who do not self-identify as 'citizen journalists', but use social media to express unpopular opinions.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we call upon the government on Bangladesh to carry out swift investigations into this particular incident and bring the perpetrators to justice, and to grant greater legal support to citizen journalists and ensure better protections for all those who use the Internet as a means of expression.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin'&gt;https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Statement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T11:51:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
