<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 851 to 865.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/blog_indic-scripts-and-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/odia-wikipedia-meets-google-developer-group"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/train-the-trainer-running-effective-outreach-activities-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age">
    <title>Freedom of Expression in a Digital Age </title>
    <link>https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, the Observer Research Foundation, the Internet Policy Observatory, the Centre for Global Communication Studies and the Annenberg School for Communication, University of Pennsylvania organized this conference on April 21, 2015 in New Delhi.&lt;/b&gt;
        &lt;p&gt;This report was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Effective research, policy formulation, and the development of regulatory frameworks in South Asia&lt;/h2&gt;
&lt;h3&gt;Inside this Report&lt;/h3&gt;
&lt;p class="LO-normal"&gt;BACKGROUND TO THE CONFERENCE&lt;/p&gt;
&lt;p class="LO-normal"&gt;THE ORGANIZERS&lt;/p&gt;
&lt;p class="LO-normal"&gt;CONFERENCE PROGRAMME&lt;/p&gt;
&lt;p class="LO-normal"&gt;WELCOME ADDRESS&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 1: LEARNINGS FROM THE PAST &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Smarika Kumar, &lt;i&gt;Alternative Law Forum&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Bhairav Acharya, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 2: CURRENT REALITIES &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Cherian George, &lt;i&gt;Associate Professor, Hong Kong Baptist University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Zakir Khan, &lt;i&gt;Article 19, Bangladesh&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Chinmayi Arun, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Raman Jit Singh Chima, &lt;i&gt;Asia Consultant, Access Now&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 3: LOOKING AHEAD &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Sutirtho Patranobis, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Karuna Nundy, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Geeta Seshu, &lt;i&gt;The Hoot&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;Conclusion&lt;/p&gt;
&lt;h2&gt;Background to the Conference&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As the Internet expands and provides greater access and enables critical rights such as freedom of expression and privacy, it also places censorship and 	surveillance capabilities in the hands of states and corporations. It is therefore crucial that there exist strong protections for the right to freedom of 	expression that balance state powers and citizen rights. While the Internet has thrown up its own set of challenges such as extremist/hate speech, the 	verbal online abuse of women, and the use of the Internet to spread rumours of violence, the regulation of cont ent is a question that is far from being 	settled and needs urgent attention. These are compounded by contextual challenges. What role can and should the law play? When is it justified for the 	government to intervene? What can be expected from intermediaries, such as social networks and Internet Service Providers (ISPs)? And what can users do to 	protect the right to free speech - their own and that of others?&lt;/p&gt;
&lt;p&gt;Balancing freedom of expression with other rights is further complicated by the challenges of fast paced and changing technologies and the need for 	adaptable and evolving regulatory frameworks. By highlighting these challenges and questioning the application of existing frameworks we aim to contribute 	to further promoting and strengthening the right to freedom of expression across South Asia.&lt;/p&gt;
&lt;h2&gt;The Organizers&lt;/h2&gt;
&lt;h3&gt;Centre for Internet &amp;amp; Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Established in 2008, the Centre for Internet and Society (CIS) is a non-profit research organization that works on policy issues relating to freedom of 	expression, privacy, accessibility for persons with disabilities, access to knowledge and intellectual property rights, and openness (including open 	standards and open government data). CIS also engages in scholarly research on the budding disciplines of digital natives and digital humanities. CIS has 	offices in Bangalore and New Delhi.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Observer Research Foundation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ORF, established in 1990, is India's premier independent public policy think tank and is engaged in developing and discussing policy alternatives on a wide 	range of issues of national and international significance. The fundamental objective of ORF is to influence the formulation of policies for building a strong and prosperous India in a globalised world. It hosts India's largest annual cyber conference -	&lt;i&gt;CyFy: the India Conference on Cyber Security and Internet Governance&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;The Annenberg School for Communication, The Centre for Global Communication Studies &amp;amp; the Internet Policy Observatory (U. Penn.)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The Annenberg School of Communication (ASC) at the University of Pennsylvania produces research that advances the understanding of public and private 	communications. The Center for Global Communication Studies (CGCS) is a focused academic center at ASC and a leader in international education and training 	in comparative media law and policy. It affords students, academics, lawyers, regulators, civil society representatives and others the opportunity to 	evaluate and discuss international communications issues. The Internet Policy Observatory (IPO) was started by CGCS to research the dynamic technological 	and political contexts in which Internet governance debates take place. The IPO serves as a platform for informing relevant communities of activists, 	academics, and policy makers, displaying collected data and analysis.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conference Programme&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;'Freedom of Expression in a Digital Age' &lt;/b&gt;&lt;b&gt;Effective Research, Policy Formation &amp;amp; the Development of Regulatory Frameworks in South Asia&lt;br /&gt;April 21&lt;sup&gt;st&lt;/sup&gt;, 2015 - 11 a.m. to 6 p.m.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;at&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The &lt;/b&gt; &lt;b&gt;Observer Research Foundation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20, Rouse Avenue Institutional Area&lt;/p&gt;
&lt;p&gt;New Delhi - 110 002, INDIA&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;About the Conference&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will be a discussion highlighting the challenges in promoting and strengthening online freedom of expression and evaluating the application of existing regulatory frameworks in South Asia&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agenda&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Learnings from the past&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Current Realities&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Looking ahead &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 1:00&lt;/td&gt;
&lt;td&gt;1:00 - 2:00&lt;/td&gt;
&lt;td&gt;2:00 - 4:00&lt;/td&gt;
&lt;td&gt;4:00- 4:15&lt;/td&gt;
&lt;td&gt;4:15 - 6:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Overview of online FoEx policy and regulatory models across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enabling FOEX in South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Challenges associated with formulating regulation for online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Definitions of FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Ways in which FoEx is, or may be, curtailed online&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Ways forward to bridge existing gaps between policy formation and policy implementation with respect to FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Impact of technology and markets on FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Balancing FoEx and other digital rights &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Exploring emerging regulatory questions for FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Challenges to FoEx online across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;The impact of jurisdiction, multi-national platforms, and domestic regulation on FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Impacting and influencing the development and implementation of Internet regulation through research &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Effective research techniques and online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Role and responsibility of intermediaries in regulating online speech  across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Exploration of the future role and interplay of technology and policy in enabling FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Ms. Mahima Kaul, &lt;i&gt;Head (Cyber &amp;amp; Media Initiative), Observer Research Foundation (ORF)&lt;/i&gt;, introduced the conference and its context and format, as 	well as the organisers. In three sessions, the Conference aimed to explore historical lessons, current realities and future strategies with regard to 	freedom of expression on the Internet in India and South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Manoj Joshi, &lt;i&gt;Distinguished Fellow, ORF&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;provided the welcome address. Mr. Joshi highlighted the complexities and distinctions between 	print and electronic media, drawing on examples from history. He stated that freedom of expression is most often conceived as a positive right in the 	context of print media, as restrictions to the right are strictly within the bounds of the Constitution. For instance, during the riots in Punjab in the 	1980s, when hate speech was prevalent, constitutionally protected restrictions were placed on the print media. When efforts were made to crack down on 	journalists with the introduction of the Defamation Bill in the 1980s, journalists were lucky that the Bill also included proprietors as those liable for 	defamation. This created solidarity between journalists and proprietors of newspapers to fight the Bill, and it was shelved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression is necessary in a democratic society, Mr. Joshi stated, but it is necessary that this freedom be balanced with other rights such as 	privacy of individuals and the protection against hate speech. In the absence of such balance, speech becomes one-sided, leaving no recourse to those 	affected by violative speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the digital age, however, things become complex, Mr. Joshi said. The freedom available to speech is enhanced, but so is the misuse of that freedom. The 	digital space has been used to foment riots, commit cybercrime, etc. Online, in India the restrictions placed on freedom of speech have become draconian. 	Section 66A and the incidents of arrests under it are an example of this. It is, therefore, important to consider the kind of restrictions that should be 	placed on free speech online. There is also the question of self-regulation by online content-creators, but this is rendered complex by the fact that no 	one owns the Internet. This conference, Mr. Joshi said, will help develop an understanding of what works and what frameworks we will need going forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Pranesh Prakash, &lt;i&gt;Policy Director&lt;/i&gt;, &lt;i&gt;Centre for Internet &amp;amp; Society&lt;/i&gt; &lt;i&gt;(CIS)&lt;/i&gt;, introduced the speakers for the first session. 	Mr. Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance, Jamia Millia Islamia University&lt;/i&gt;, would first share his views and experience regarding the various ways of curtailing freedom of expression by the State, markets and civil society. Ms. Smarika Kumar of the&lt;i&gt;Alternative Law Forum &lt;/i&gt;(ALF) would then expand on structural violations of freedom of expression. Mr. Bhairav Acharya,	&lt;i&gt;Advocate with the Delhi Bar and Consultant for CIS&lt;/i&gt;, would throw light on the development of free speech jurisprudence and policy in India from the 	colonial era, while Prof. Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;, was to speak about his arrest and charges under Section 	66A of the Information Technology Act, 2000 (am. 2008), providing insight into the way Section 66A was misused by police and the West Bengal government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Vibodh Parthasarathi&lt;/b&gt;&lt;i&gt;, Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi began his talk with an anecdote, narrating an incident when he received a call from a print journalist, who said	&lt;i&gt;"TV people can get away with anything, but we can't, and we need to do something about it." &lt;/i&gt;The notion of news institutions getting away with 	non-kosher actions is not new - and has been a perception since the 19&lt;sup&gt;th&lt;/sup&gt; century. He stressed that there have always been tensions between 	Freedom of Expression, access, and other rights. Curtailment happens not just by the state, but by private parties as well - market and civil society. 	Indeed, a large number of non-state actors are involved in curtailing FoE. Subsequently a tension between individual FoE and commercial speech freedom is 	emerging. This is not a new phenomenon. Jurisprudence relating to free speech makes a distinction between the persons in whom the right inheres: 	individuals on the one hand (including journalists and bloggers), and proprietors and commercial entities on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, freedom of speech cases - from 1947 - relate primarily to the rights of proprietors. These cases form the legal and constitutional basis for 	issues of access, transmission and distribution, but are not necessarily favourable to the rights of individual journalists or newsreaders. At the 	individual level, the freedom to &lt;i&gt;receive &lt;/i&gt;information is equally important, and needs to be explored further. For entities, it is crucial to 	consider the impact of curtailment of speech (or threats of curtailment) on entities of &lt;i&gt;different sizes&lt;/i&gt; and &lt;i&gt;kinds&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi further explained that online, freedom of expression depends on similar structural conditions and stressed that scholarship must study 	these as well. For example, intermediaries in the TV industry and online intermediaries will soon come together to provide services, but scholarship does 	not link them yet. The law is similarly disjointed. For instance, 'broadcasting' falls in the Union List under Schedule VII of the Constitution, and is 	centrally regulated. However, distribution is geographically bounded, and States regulate distribution. In order to have a cohesive broadcast regulation, 	he raised the point that the placement of 'broadcasting' in the Union List may need to be re-thought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Parthasarathi, the underlying conceptual basis - for the interlinked scholarship and regulation of intermediaries (online and broadcast), 	of commercial speech and individual access to information, and censorship (State and private, direct and structural) - lies in Article 19(1)(a). He noted 	that there is a need to rethink the nature of this freedom. For whom do we protect freedom of speech? For individuals alone, or also for all private 	entities? From what are we protecting this freedom? For Mr. Parthasarathi, freedom of speech needs to be protected from the State, the market, civil 	society and those with entrenched political interests. Additionally, Mr. Parthasarathi raised the question of whether or not in the online context freedom 	of the enterprise becomes antithetical to universal access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi also highlighted that it is important to remember that freedom of expression is not an end in itself; it is a facilitator - the 'road'- 	to achieve crucial goals such as diversity of speech. But if diversity is what freedom of expression &lt;i&gt;should&lt;/i&gt; enable, it is important to ask whether 	institutional exercise of freedom has led to enhanced diversity of speech. Do media freedom and media diversity go together? For Mr. Parthasarathi, media 	freedom and media diversity do not always go together. The most vivid example of this is the broadcast environment in India, following the deregulation of 	broadcast media beginning from the mid 1990s - much of which was done through executive orders on an ad hoc basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This led to infrastructural censorship, in addition to the ex-post curtailment of content. Increasingly the conditions on which content is produced are 	mediated i.e. which entities are eligible to obtain licenses, what type of capital is encouraged or discouraged, how is market dominance measured, 	accumulation of interests across content and carriage, or various carriage platforms? Mediating the conditions of producing speech, or infra censorship, is 	primarily operationalised through regulatory silences, as illustrated in the absence of any coherent or systematic anti-competitive measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts are champions in protecting the freedom of expression of 'outlets' - of proprietors and entities. But this has not led to diversity of speech 	and media. Perhaps there is a need to rethink and reformulate ideas of freedom. He pointed out that it is not enough merely to look at &lt;i&gt;ex post&lt;/i&gt; curtailment of speech (i.e., the traditional idea of censorship). Instead &lt;i&gt;the conditions&lt;/i&gt; in which speech is made and censored need to be explored; 	only then can our understanding expand. Mr Parthasarathi ended his talk by stressing that a proactive understanding of freedom of expression can highlight 	architectural curtailment of speech through the grant of licenses, competition and antitrust laws, media ownership and concentration across carriage and 	content, etc. This is essential in a digital age, where intermediaries play a crucial, growing role in facilitating freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smarika Kumar&lt;/b&gt;&lt;i&gt;, Alternative Law Forum&lt;/i&gt;&lt;br /&gt;Beginning where Mr. Parthasarathi left off, the focus of Ms. Kumar's presentation was the curtailment of speech and the conditions under which speech is 	produced. At the outset, she sought from the audience a sense of the persons for whom freedom of speech is protected: for government-controlled media, the 	markets and commercial entities, or for civil society and citizens? Ms. Kumar aimed to derive ideas and conceptual bases to understand freedom of speech in 	the digital space by studying judicial interpretations of Article 19(1)(a) and its limitations. Towards this end, she highlighted some Indian cases that 	clarify the above issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar began with &lt;b&gt;&lt;i&gt;Sakal Papers&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1962 SC 305]&lt;/b&gt;. In &lt;i&gt;Sakal Papers&lt;/i&gt;, the issue concerned the 	State's regulation of speech by regulation of the number of permitted pages in a newspaper. This regulation was challenged as being in violation of Article 	19(1)(a) of the Constitution. The rationale for such regulation, the State argued, was that newsprint, being imported, was a scarce commodity, and 	therefore needed to be equitably distributed amongst different newspapers - big or small. Further, the State defended the regulation citing its necessity 	for ensuring equal diversity and freedom of expression amongst all newspapers. The petitioners in the case argued that such a regulation would negatively 	impact the newspapers' right to circulation by reducing the space for advertisements, and thus forcing the newspaper to increase selling prices. Readers of 	the newspaper additionally argued that such increase in prices would affect their right to access newspapers by making them less affordable, and hence such 	regulation was against the readers' interests. Ultimately, the Supreme Court struck down the regulation. The Constitution Bench noted that if the number of 	pages of a newspaper were to be limited and regulated, the space available for advertisements would reduce. Were advertisements to reduce, the cost of 	newspapers would increase, affecting affordability and access to information for the citizens. Ultimately, newspaper circulation would suffer; i.e., the 	State's regulation affected the newspapers' right of circulation which would amount to a violation of freedom of expression as the right extends to the 	matter of speech as well as the ability to circulate such speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the number of pages, the Indian government has sought to regulate newsprint in the past. In	&lt;b&gt;&lt;i&gt;Bennett Coleman and Co. &amp;amp; Ors.&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1973 SC 106]&lt;/b&gt;, a Constitution Bench of the Supreme Court 	considered whether regulation of the number of pages permitted in a newspaper constituted an unreasonable restriction on freedom of expression. Towards 	this, the Government of India set forth a Newsprint Policy in 1972, under the terms of which the number of pages of all papers were to be limited to ten; 	where there were small newspapers that did not achieve the ten-page limit, a 20% increase was permitted; and finally, new newspapers could not be started 	by common ownership units. The Newsprint Order aimed to regulate a scarce resource (newsprint), while the Newsprint Policy sought to promote small 	newspapers, encourage equal diversity among newspapers and prevent monopolies. The Supreme Court upheld the Newsprint Order, stating that newsprint was 	indeed a scarce resource, and that the matter of import and distribution of newsprint was a matter of government policy. The Court would not interfere 	unless there was evidence of &lt;i&gt;mala fides&lt;/i&gt;. However, the Court struck down the Newsprint Policy for reasons similar to &lt;i&gt;Sakal&lt;/i&gt; &lt;i&gt;Papers&lt;/i&gt; ; that the rights afforded to newspapers under Article 19(1)(a) - including circulation - could not be abridged for reasons of protecting against 	monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his dissenting opinion, Justice Mathew stated that in conceiving freedom of expression, it is important to also consider the hearer (the reader). For 	Justice Mathew, Meiklejohn's view the "&lt;i&gt;what is essential is not that everyone shall speak, but that everything worth saying shall be said&lt;/i&gt;" cannot be affected if, because of concentration of media ownership, media are not available for most speakers. In such a situation, "	&lt;i&gt;the hearers [cannot] be reached effectively&lt;/i&gt;". However, the imperative is to maximise diversity of speech. For this, we need to balance the rights 	of citizens against those of the press; i.e., the rights of the &lt;i&gt;reader&lt;/i&gt; against those of the &lt;i&gt;speaker&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar pointed out that this was the first case to consider the right of readers to access a diversity of speech. Justice Mathew distinguished 	curtailment of speech by the state, and by the market - and that this is crucial in the digital age, where information is predominantly accessible through 	and because of intermediaries. Ms. Kumar further stressed that especially in an age where 'walled gardens' are a real possibility (in the absence of net 	neutrality regulation, for instance), Justice Mathew's insistence on the rights of readers and listeners to a diversity of speech is extremely important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar went on to explain that though judges in the Supreme Court recognised the rights of readers/listeners (us, the citizens) for the purposes of news and print media, a similar right is denied to us in the case of TV. In	&lt;b&gt;&lt;i&gt;Secretary, Ministry of Broadcasting&lt;/i&gt; v. &lt;i&gt;Cricket Association of Bengal&lt;/i&gt; [AIR 1995 SC 1236]&lt;/b&gt;, the issue surrounded private operators' right to use airwaves to broadcast. The Supreme Court considered whether government agencies and Doordarshan, the government broadcaster, "	&lt;i&gt;have a monopoly of creating terrestrial signals and of telecasting them or refusing to telecast them&lt;/i&gt;", and whether Doordarshan could claim to be 	the single host broadcaster for all events, including those produced or organised by the company or by anybody else in the country or abroad. The Supreme 	Court held that the TV viewer has a right to a diversity of views and information under Article 19(1)(a), and also that the viewer must be protected 	against the market. The Court reasoned that " 	&lt;i&gt; airwaves being public property, it is the duty of the state to see that airwaves are so utilised as to advance the free speech right of the citizens, 		which is served by ensuring plurality and diversity of views, opinions and ideas &lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If every citizen were afforded the right to use airwaves at his own choosing, "&lt;i&gt;powerful economic, commercial and political interests&lt;/i&gt;" would 	dominate the media. Therefore, instead of affirming a distinct right of listeners, the Court conflated the interests of government-controlled media with 	those of the listeners, on the ground that government media fall under public and parliamentary scrutiny. According to Ms. Kumar this is a regressive 	position that formulates State interest as citizen interest. Ms. Kumar argued that in order to ensure freedom of speech there is a need to frame citizens' 	interests as distinct from those of the market and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;br /&gt;Mr. Acharya's presentation focused on the divergence between the &lt;i&gt;jurisprudence&lt;/i&gt; and &lt;i&gt;policy&lt;/i&gt; surrounding freedom of expression in India. 	According to him, the policies of successive governments in India - from the colonial period and thereafter - have developed at odds with case-law relating 	to freedom of expression. Indeed, it is possible to discern from the government's actions over the last two centuries a relatively consistent narrative of 	governance which seeks to bend the individual's right to speech to its will. The defining characteristics of this narrative - the government's free speech 	policy - emerge from a study of executive and legislative decisions chiefly in relation to the press, that continue to shape policy regarding the freedom 	of expression on the Internet. Thus, there has been consistent tension between the individual and the community, as well as the role of the government in 	enforcing the expectations of the community when thwarted by law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, free speech scholarship (including digital speech) fails to take into account this consistent divergence between jurisprudence and policy. Mr. 	Acharya pointed out that we think of digital speech issues as new, whereas there is an immense amount of insight to gain by studying the history of free 	speech and policy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards this, Mr. Acharya highlighted that to understand dichotomy between modern and native law and free speech policy, it is useful to go back to the 	early colonial period in India, when Governor-General Warren Hastings established a system of courts in Bengal's hinterland to begin the long process of 	displacing traditional law to create a modern legal system. J. Duncan M. Derrett notes that the colonial expropriation of Indian law was marked by a 	significant tension caused by the repeatedly-stated objective of preserving some fields of native law to create a dichotomous legal structure. These 	efforts were assisted by orientalist jurists such as Henry Thomas Colebrook whose interpretation of the dharmasastras heralded a new stage in the evolution 	of Hindu law. By the mid-nineteenth century, this dual system came under strain in the face of increasing colonial pressure to rationalise the legal system 	to ensure more effective governance, and native protest at the perceived insensitivity of the colonial government to local customs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya explained that this myopia in Indian policy research is similar &lt;i&gt;social censorship&lt;/i&gt; (i.e., social custom as creating limits to free 	speech). Law and society scholars have long studied the social censorship phenomenon, but policy research rejects this as a purely academic pursuit. But 	the truth is that free speech has been regulated by a dual policy of law and social custom in India since colonial times. The then-Chief Justice of the 	Calcutta High Court Elijah Impey required officers to respect local customs, and this extended to free speech as well. But as colonial courts did not 	interpret Hindu law correctly; interpretations of freedom of speech suffered as well. Mr. Acharya noted that the restrictions on freedom of speech 	introduced by the British continue to affect individuals in India today. Prior to British amendments, India had drawn laws from multiple sources - indeed 	customs and laws were tailored for communities and contexts, and not all were blessed with the consistency and precedent so familiar to common law. Since 	the British were unable to make sense of India's law and customs, they codified the principles of English customary law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Penal Code (IPC) saw the codification of English criminal law (the public offences of riots, affray, unlawful assembly, etc., and private 	offences such as criminal intimidation). In Macaulay's initial drafts, the IPC did not contain sedition and offences of hurting religious sentiments, etc. Sections 124A ("&lt;i&gt;Sedition&lt;/i&gt;") and 295A ("	&lt;i&gt;Deliberate and malicious acts intended to outrage religious feelings of any class by insulting its religion or religious beliefs&lt;/i&gt;") were added to 	the IPC in 1860, and changes were made to the Code of Criminal Procedure as well. Today, these sections are used to restrict and criminalise digital 	speech.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;The Right to Offend&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya then considered the history of the "right to offend", in light of the controversies surrounding Section 66A, IT Act. Before the insertion and strengthening of Section 295A, citizens in India had a right to offend others within the bounds of free speech. He clarified that in 1925 a pamphlet "	&lt;i&gt;Rangila Rasool&lt;/i&gt;" was published by Lahore-based Mahashe Rajpal (the name(s) of the author(s) were never revealed). The pamphlet concerned the 	marriages and sex life of the Prophet Mohammed, and created a public outcry. Though the publisher was acquitted of all charges and the pamphlet was upheld, 	the publisher was ambushed and stabbed when he walked out of jail. Under pressure from the Muslim community, the British enacted Section 295A, IPC. The 	government was seeking to placate and be sensitive to public feeling, entrenching the idea that the government may sacrifice free speech in the face of 	riots, etc. The death of India's "&lt;i&gt;right to offend&lt;/i&gt;" begins here, said Mr. Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;i&gt;prior restraint regime&lt;/i&gt; was created and strengthened in 1835, then in 1838, etc. At this time, the press in India was largely British. Following 	the growth of Indian press after the 1860s, the British made their first statutory attempt at censorship in 1867: a prior sanction was required for 	publication, and contravention attracted heavy penalties such as deportation and exile. Forfeiture of property, search and seizures and press-inspections 	were also permitted by the government under these draconian laws. Mr. Acharya noted that it is interesting that many leaders of India's national movement 	were jailed under the press laws.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Independence and After&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya further explained that the framers of the Constitution deliberately omitted "freedom of the press" from the text of Article 19(1)(a) and that 	Jawaharlal Nehru did not think the press ought to be afforded such a right. This is despite a report of the Law Commission of India, which recommended that 	corporations be provided an Article 19 right. But why distrust the press, though citizens are granted the freedom of speech and expression under Article 	19(1)(a)? In Mr. Acharya's opinion, this is evidence of the government's divergent approach towards free speech policy; and today, we experience this as a 	mistrust of the press, publications, and of online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya also explained that statutory restrictions on free speech grew at odds with judicial interpretation in the 1950s. Taking the examples of&lt;b&gt;&lt;i&gt;Romesh Thapar&lt;/i&gt; v. &lt;i&gt;the State of Madras&lt;/i&gt; [AIR 1950 SC 124]&lt;/b&gt; and	&lt;b&gt;&lt;i&gt;Brij Bhushan&lt;/i&gt; v. &lt;i&gt;the State of Delhi&lt;/i&gt; [(1950) Supp. SCR 245]&lt;/b&gt;, Mr. Acharya showed how the judiciary interpreted Article 19 favourably. Despite the government's arguments about a public order danger, the Supreme Court refused to strike down left wing or right wing speech (	&lt;i&gt;Romesh Thapar &lt;/i&gt;concerned a left wing publication; &lt;i&gt;Brij Bhushan&lt;/i&gt; concerned right wing views), as "public order" was not a ground for 	restricting speech in the Constitution. The government reacted to the Supreme Court's judgement by enacting the First Amendment to the Constitution: 	Article 19(2) was amended to insert "public order" as a ground to restrict free speech. Thus, it is possible to see the divergence between free speech 	jurisprudence and policy in India from the time of Independence. Nehru and Sardar Vallabhbhai Patel had supported the amendment, while B.R. Ambedkar 	supported Romesh Thapar and Brij Bhushan. On the other hand, then-President Rajendra Prasad sought Constitutional protection for the press.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Why Study Free Speech History?&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya noted how the changes in free speech policy continue to affect us, including in the case of content restrictions online. In the 1950s, 	then-Prime Minister Nehru appointed the First Press Commission, and the newspaper &lt;i&gt;National Herald &lt;/i&gt;was established to promote certain (left wing) 	developmental and social goals. Chalapati Rao was the editor of the National Herald, and a member of the First Press Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At that time, the Commission rejected vertical monopolies of the press. However, today, horizontal monopolies characterize India's press. The First Press 	Commission also opposed 'yellow journalism' (i.e., sensational journalism and the tabloid press), but this continues today. Decades later, Prime Minister 	Indira Gandhi called for a "committed bureaucracy, judiciary and press", taking decisive steps to ensure the first two. For instance, Justice Mathew (one 	of the judges in the &lt;i&gt;Bennett Coleman&lt;/i&gt; case) was an admirer of Indira Gandhi. As Kerala's Advocate General, he wanted the Press Registrar to have 	investigative powers similar to those given in colonial times; he also wanted the attacks on government personalities to be criminalized. The latter move 	was also supported by M.V. Gadgil, who introduced a Bill in Parliament that sought to criminalise attacks on public figures on the grounds of privacy. Mr. 	Acharya noted that though Indira Gandhi's moves and motives with regard to a "committed press" are unclear, the fact remains that India's regional and 	vernacular press was more active in criticizing the Emergency than national press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the importance of understanding a contexts history - both social and legislative, following the striking down of 66A in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt; (Supreme Court, March 24, 2015), elements in the government have stated 	their wish to introduce and enact a new Section 66A. Mr. Acharya explained that such moves from elements in the government shows that despite the striking 	down of 66A, it is still possible for the repressive and mistrustful history of press policy to carry forward in India. This possibility is supported by 	colonial and post-Independence press history and policy that has been developed by the government. When looking at how research can impact policy, greater 	awareness of history and context may allow for civil society, academia, and the public at large to predict and prepare for press policy changes.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Ambikesh Mahapatra&lt;/b&gt;, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Mahapatra introduced himself as a victim of the West Bengal administration and ruling party. He stated that though India's citizens have been granted 	the protection of fundamental rights after Independence, these rights are not fully protected; his experience with the West Bengal ruling party and its 	abuse of powers under the Information Technology Act, 2000 (am. 2008) ("IT Act") highlights this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On March 23, 2012, Prof. Mahapatra had forwarded a cartoon to his friends by email. The cartoon poked fun at West Bengal Chief Minister Mamata Banerjee and 	her ruling party. On the night of April 12, 2012, individuals not residing in the Professor's housing colony confronted him, dragging him to the colony 	building and assaulting him. These individuals forced Prof. Mahapatra to write a confession about his forwarding of the cartoon and his political 	affiliations. Though the police arrived at the scene, they did not interfere with the hooligans. Moreover, when the leader of the hooligans brought the 	Professor to the police and asked that he be arrested, they did so even though they did not have an arrest warrant. At the police station, the hooligans 	filed a complaint against him. The Professor was asked to sign a memo mentioning the charges against him (Sections 114 and 500, Indian Penal Code, 1860 	&amp;amp; Section 66A, IT Act). Prof. Mahapatra noted that the police complaint had been filed by an individual who was neither the receiver nor the sender of 	the email, but was a local committee member with the Trinamool Congress (the West Bengal ruling party).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arrest sparked a series of indignant responses across the country. The West Bengal Human Rights Commission took &lt;i&gt;suo motu &lt;/i&gt;cognizance of the 	arrest, and recommended action against the high-handedness of the police. Fifty six intellectuals appealed to the Prime Minister of India to withdraw the 	arrest; the former Supreme Court judge Markandey Katju was among those who appealed. Thirty cartoonists' organisations from across the world also appealed 	to the President and the Prime Minister to withdraw the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The West Bengal government paid no heed to the protests, and Chief Minister Mamata Banerjee publicly supported the actions of the police - making public 	statements against Justice Katju and A.K. Ganguly, former judge of the Supreme Court and head of the West Bengal Human Rights Commission respectively. A 	charge sheet was framed against Prof. Mahapatra and others, with Section 66A as one of the charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case has been going on for over two years. Recently, on March 10, 2015, the Calcutta High Court upheld the recommendations of the West Bengal Human 	Rights Commission, and directed the government to implement them. The West Bengal government has preferred an appeal before a division bench, and the case will continue. This is despite the fact that Section 66A has been struck down (by the Supreme Court in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though noting that he was not an expert, Prof. Mahapatra put forward that it seemed that the freedom of expression of the common man depends on the whims 	of the ruling parties and the State/Central governments. It is of utmost importance, according to him, to protect the common man's freedom of speech, for 	his recourse against the government and powerful entities is pitifully limited.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; A participant stated that the core trouble appears to lie in the power struggle of political parties. Political parties wish to retain power and gather 	support for their views. Despite progressive laws, it is the Executive that implements the laws. So perhaps what is truly required is police and procedural 	reforms rather than legislative changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel agreed that there is a need for more sensitivity and awareness amongst the law enforcement agencies and this might be long overdue 		and much needed step in protecting the rights of citizens. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant was interested in understanding how it might be possible to correct the dichotomy between FoE policy and doctrine? The participant also 	wanted the panel to comment on progressive policy making if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the&lt;b&gt; &lt;/b&gt;panel stated that there is no easy way of correcting this dichotomy between custom and law. Scholars have also argued 		that the relationship between custom and pernicious social censorship is ambiguous. Towards this, more studies are required to come to a conclusion. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant requested clarity on what rights can be created to ensure and support a robust right to freedom of expression, and how this might affect the 	debates surrounding net neutrality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel noted that the Internet allows citizens and corporations to regulate speech on their own (private censorship), and this is 		problematic. Members of the panel also responded that the existing free speech right does not enable diversity of speech. Social and local customs 		permit social censorship, and this network effect is clearly visible online; individuals experience a chilling effect. Finally, in the context of net 		neutrality, the interests of content-producers (OTTs, for instance) are different from those of users. They may benefit economically from walled 		gardens or from non-interference with traffic-routing, but users may not. Therefore, there is a need for greater clarity before coming to a conclusion 		about potential net neutrality regulation.&lt;/i&gt;&lt;/p&gt;
&lt;h2&gt;Session 2: Current Realities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Dr. Cherian George,&lt;/b&gt; &lt;i&gt;Associate Professor, Hong Kong Baptist University &lt;/i&gt;&lt;br /&gt;Dr. George began his talk by highlighting how there is no issue as contentious as offensive speech and how it should be dealt with. The debate around free 	speech is often framed as a battle between those who support democracy and those who oppose it. Yet, this is also a tension within democracy. Citizens 	should not be unjustly excluded from participating in democracy (companion rights in Article 19 and 20, ICCPR). Relevant UN institutions and Article 19 	have come up with reports and ideals that should be universally adopted - norms that apply to many areas including speech. These norms are different from 	traditional approaches. For example:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Human Rights Norms&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Traditional Approach&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Regulate incitement of violence (discrimination, hate, etc.)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects people's feelings from speech that offends&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Protect minorities as they are more vulnerable to exploitation and uprooting of their values&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law sides with the majority, to protect mainstream values over minority values&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Allow robust criticism of ideas, religions, and beliefs&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects religion, beliefs, and ideas from criticism&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Strive for balance between liberty and equality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Aims for order and maintenance of status quo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote harmony through the media&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Enforces harmony by the state&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the traditional approach, Dr. George noted that if the state protects feelings of offence against speech, it allows groups to use such 	protection as a political weapon: "hate spin", which is the giving or taking of offence as a political strategy. Hate spin is normally framed as a 	"visceral, spontaneous reaction" to a video, writing, or speech, etc. Yet, the spontaneous reaction of indignation to speech or content can consistently be 	revealed to result from conscious manipulation by middlemen for political purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asia is similar to West Asia - as the legal frameworks provide immunity for dangerous speech. In practice, this allows for the incitement of 	discrimination, hostility, and violence. At the same time, the legal frameworks allow for excessive sympathy for wounded feelings, and often the taking of 	offence turns into a political strategy. Power enters the equation here. The law allows the powerful to take offence and use hate speech against those not 	in powerful positions.&lt;/p&gt;
&lt;p&gt;Dr. George highlighted a number of legal quandaries surrounding freedom of expression including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Enforcement gaps:&lt;/b&gt; There is a lack of enforcement of existing laws against incitement.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Non-regulated zones:&lt;/b&gt; Socio-political research demonstrates that many problems cannot be regulated, and yet the law can only deal with what can be regulated. Hate speech is one 	of these as hate speech is not in the speech itself, but in the meaning that is produced in the mind of those saying/listening.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Verdict-proof opportunities: &lt;/b&gt; Political entrepreneurs can use legislative and judicial processes to mainstream hateful views, regardless of how legislature and courts ultimately act. 	The religious right, for instance, can always pit themselves morally against "secular" decisions of apex authorities (SC, etc.). For example, in the 	context of the US and Islamophobia - the State legislature in Alabama introduced an anti-Shariah law. Yet, the law is against a non-existent threat and 	appears to be a ploy to normalize anti-Muslim sentiments, including in political rhetoric. While focusing on winning battles in courts or legislature, the 	intolerant groups do not need to win a legal court case to introduce and entrench language of intolerance in public discourse and discussion. This 	demonstrates that there is a need to begin moving away from a purely legal analysis (interpretation or development) of the laws, and a need to begin 	studying these issues through a sociological lens.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Zakir Khan&lt;/b&gt;, &lt;i&gt;Article 19, Bangladesh &lt;/i&gt;&lt;br /&gt;Mr. Khan introduced Article 19 and its work in Bangladesh and the rest of South Asia. He noted that Article 19 is involved in documenting and analysing 	laws and regulations affecting freedom of expression, including in Bangladesh. Article 19 also campaigns for changes in law and policy, and responds from a 	policy perspective to particular instances of government overreach.&lt;/p&gt;
&lt;p&gt;Mr. Khan explained that India has the Information Technology Act, 2000 (am. 2008) ("IT Act"), and in Bangladesh, the equivalent legislation is the 	Information and Communication Technology Act, 2006 ("ICT Act"). The ICT Act was enacted to bring Bangladeshi law in conformity with international law; i.e. 	in accordance with the UNCITRAL model law on e-commerce and online transactions. The ICT Act deals with hacking, crimes committed with the use of a 	computer system, breach of data, breach of computer system, and hardware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like the IT Act in India, Bangladesh's ICT Act also criminalizes speech and expression online. For instance, Section 57, ICT Act, criminalizes the 	publication of "&lt;i&gt;fake, obscene or defaming information in electronic form&lt;/i&gt;". Similarly, bringing damage to "&lt;i&gt;the state's image&lt;/i&gt;" online is 	criminalized. In 2013, the Bangladesh Ministry of Law amended the ICT Act to increase penalties for online offences, and allow for the detention of 	suspected offenders, warrantless arrests and indefinite detention without bail. Bloggers and activists have been protesting these changes, and have been 	targeted for the same.&lt;/p&gt;
&lt;p&gt;Mr. Khan noted that Article 19 has developed a tool to report violations online. Individuals who have experienced violations of their rights online can 	post this information onto a forum, wherein Article 19 tracks and reports on them, as well as creating awareness about the violation. Any blogger or online 	activist can come and voice concerns and report their stories. Mr. Khan also highlighted that given the ICT Act and the current environment, online 	activists and bloggers are particularly threatened. Article 19 seeks to create a safe space for online bloggers and activists by creating anonymity tools, 	and by creating awareness about the distinctions between political agenda and personal ideology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Chinmayi Arun&lt;/b&gt;, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;br /&gt;Ms. Arun began by noting that usually conversations around freedom of expression look at the overlap between FoE and content i.e. the focus is on the 	speaker and the content. Yet, when one targets the mediator - it shifts the focus as it would be approaching the issue from the intermediary's perspective. 	When structural violation of free speech happens, it either places the middleman in the position of carrying through the violation, or creates a structure 	through which speech violations are incentivized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is the Bazee.com case. At the time of the case the law was structured in such a way that not only perpetrators of unlawful content were 	punished, but so were the bodies/persons that circulated illegal content. In regulatory terms this is known as "gatekeeper liability". In the Bazee.com 	case, a private party put obscene content up for sale and Bazee.com could and did not verify all of the content that was for sale. In the case, the Delhi 	HC held Avnish Bajaj, the CEO of Bazee.com, liable on the precedent of strict liability for circulation of obscene content. The standard of strict 	liability was established under Ranjit Udeshi case. The standard of strict liability is still the norm for non-online content, but after Bazee.com, a 	Parliament Standing Committee created a safe harbour for online intermediaries under Section 79 of the IT Act. As per the provision, if content has been 	published online, but an intermediary has not edited or directly created the content, it is possible for them to seek immunity from liability for the 	content. The Parliament Standing Committee then stated that intermediaries ought to exercise due diligence. Thus, the Indian legal regime provides online 	intermediaries with immunity only if content has not been published or edited by an intermediary and due diligence has been exercised as defined by Rules 	under the Act. While developing India's legal regime for intermediary liability the Parliamentary Standing Committee did not focus on the impact of such 	regulation on online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, present research and analysis of Freedom of Expression is focused on the autonomy of the speaker/individual. An alternative formulation 	and way of understanding the right, and one that has been offered by Robert Post through his theory of democratic self governance, is that Freedom of 	Expression is more about the value of the speech rather than the autonomy of the speaker. In such a theory the object of Freedom of Expression is to ensure 	diversity of speech in the public sphere. The question to ask then is: "Is curtailment affecting democratic dialogue?" The Supreme Court of India has 	recognized that people have a right to know/listen/receive information in a variety of cases. Ms. Arun explained that if one accepts this theory of speech, 	the liability of online intermediaries will be seen differently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Arun further explained that in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the notice-and-takedown regime under section 79 of the IT Act has been amended, but the 	blocking regime under section 69A has not. Thus, the government can still use intermediaries as proxies to take down legitimate content, and not provide 	individuals with the opportunity to to challenge blocking orders. This is because as per the Act, blocking orders must be confidential. Though the blocking 	regime has not been amended, the Supreme Court has created an additional safeguard by including the requirement that the generator of content has to be 	contacted (to the extent possible) before the government can pass and act upon a blocking order. Mr. Arun noted that hopefully, when implemented, this will 	provide a means of recourse for individuals and counter, to some extent, the mandated secrecy of content blocking orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Raman Jit Singh Chima&lt;/b&gt;, &lt;i&gt;Asia Consultant, Access Now &lt;/i&gt;&lt;br /&gt;Mr. Chima began his presentation by noting that the Internet is plagued by a few founding myths. Tim Goldsmith and Jack Wu (in	&lt;i&gt;Who Controls the Internet: Illusions of a Borderless World&lt;/i&gt;) name one: that no &lt;i&gt;laws&lt;/i&gt; apply to the Internet; that, because of the borderless 	nature of the Internet - data flows through cables without regard for State borders - and thus countries' laws do not affect the Internet. These 	cyber-anarchists, amongst whom John Perry Barlow of the Electronic Frontier Foundation (EFF) is inspiring, also argue that &lt;i&gt;regulation&lt;/i&gt; has no role 	for the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima countered these 'myths', arguing that the law affects the Internet in many ways. The US military and Science departments funded the invention of 	the Internet. So the government was instrumental in the founding of the Internet, and the US Department of Commerce has agreements with ICANN (Internet 	Corporation for Assigned Names and Numbers) to govern the Domain Names System. So the law, contracts and regulation already apply to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima further explained that today organisations like EFF and civil society in India argue for, and seek to influence, the creation of regulation for 	the protection of journalists against unfair and wrongful targeting by the government. This includes moves to protect whistleblowers, to ensure the 	openness of the Internet and its protection from illegitimate and violative acts against freedom of expression, access and other rights. Some governments, 	like India, also place conditions in the licenses granted to Internet Service Providers (ISPs) to ensure that they bring access to the rural, unconnected 	areas. Such law and regulation are not only common, but they are also &lt;i&gt;good&lt;/i&gt;; they help the population against virtual wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima pointed out that when States contemplate policy-making for the Internet, they look to a variety of sources. Governments draw upon existing laws 	and standards (like India with the virtual obscenity offence provision Section, 67 and 67A, IT Act, which is drawn from the real-world penal provision 	Section 292, IPC) and executive action (regulation, by-laws, changes to procedural law) to create law for the Internet. Additionally, if a government 	repeats a set of government actions consistently over time, such actions may take on the force of law. Mr. Chima also spoke of web-developers and 	standards-developers (the technical community), who operate by rules that have the force of law, such as the 'rough consensus and running code' of the IETF 	(Internet Engineering Task Force). Governments also prescribe conditions ("terms of use") that companies must maintain, permitting or proscribing certain 	kinds of content on websites and platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Mr. Chima highlighted international legal and policy standards that play a role in determining the Internet's law and regulation. ICANN, the 	administrator of the Internet Assigned Numbers Authority (IANA) functions and governing body for the Domain Names System, functions by a set of rules that 	operate as law, and in the creation of which, the international legal community (governments, companies, civil society and non-commercial users, and the 	technical community) play a role. The ITU (International Telecommunications Union) and organisations like INTERPOL also play a role.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima explained that when one wants to focus on issues concerning freedom of expression, multiple laws also apply. Different States set different standards. For instance, in the US, the main standards for the Internet came from issues relating to access to certain types of online content. In	&lt;i&gt;Reno &lt;/i&gt;v. &lt;i&gt;ACLU &lt;/i&gt;(1997), the US Supreme Court considered what standards should be created to access obscene and indecent content on the 	Internet. The judges held that the Internet, as a medium of unprecedented dynamism, deserved the higher protection from governmental overreach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Asia, the main legal standards for the Internet came from Internet commerce: the UNCITRAL model law, which prescribed provisions best suited to the 	smoother commercial utilization of a fast and growing medium, became the foundation for Internet-related law in Asian states. Predictably, this did not 	offer the strongest rights protections, but rather, focused on putting in place the most effective penalties. But when Asian states drew from the European 	UNCITRAL law, many forgot that European states are already bound by the European Convention for Human Rights, the interpretation of which has granted 	robust protections to Internet-related rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima provided the example of Pakistan's new Cybercrime Bill. The Bill has troubling provisions for freedom of expression, and minimal to no due 	process protections. While drafting the law, Pakistan has drawn largely from model cybercrime laws from the Council of Europe, which are based on the 	Budapest Convention. In Europe and the US, States have strong parallel protections for rights, but States in Asia and Africa do not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima concluded that when one talks of freedom of expression online, it is important to also remember the roles of intermediaries and companies. The 	ISPs can be made liable for content that flows through their wires, through legal mechanisms such as license provisions. ISPs can also be made to take 	further control over the networks, or to make some websites harder to access (like the Internet Watch Foundation's blacklist). When policy organisations 	consider this, it is critical that they ask whether industry bodies should be permitted to do this &lt;i&gt;without public discussion&lt;/i&gt;, on the basis of 	government pressure.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for panel members to talk about the context in which bloggers find themselves in danger in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members stated that the courts are not fair to bloggers as often they side with government. It was added that courts have labelled bloggers as 		atheist, and subsequently all bloggers are being associated with the label. Further, it was added that most people who are outraged, do not even know 		what blogging is, and people associate blogging with blasphemy and as opposing religious beliefs. It was also noted that in Bangladesh, while you see 		violations of FoE from the State, you see more violations of blogger rights from non-state actors. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked if there is anything specific about the Internet that alters how we should consider hate speech online and their affective/visceral 	impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt;Pa&lt;/i&gt; &lt;i&gt; nel members noted that they are still grappling with the question of what difference the Internet makes, but noted that it has indeed complicated an 		already complex issue as there is always the question about political entrepreneurs using convenient content to foment fires. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; Participants questioned panel members about how the right to offend is protected in jurisdictions across Asia where there is still tension between 	classical liberalism and communitarian ideologies, and where the individuated nature of rights is not clearly established or entrenched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded by stating that when one compares the US, Indonesia and India, the US seems to be able to strike a balance between free speech 		and other competing interests as they are committed to free speech and committed to religious tolerance and plurality of competing interests. Panel 		members also added that the fabric of civil society also has an impact. For example, Indonesian civil society is simultaneously religious and secular 		and pro-democracy. In India, there seems to be a tension between secular and religious groups. In Indonesia, people are moving to religion for comfort, 		while still seeking a world that is religious and secular. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for clarification on ways to approach regulation of hate speech given that hate speech is not just about a particular kind of 	threatening speech, but encompasses rumours and innuendos.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A&lt;/i&gt;&lt;/b&gt; &lt;i&gt; . Panel members acknowledged that more research needs to be done in this area and added that applying the socio-cultural lens on such issues would be 		beneficial. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q.&lt;/b&gt; Participants asked if panel members had a framework for a regulating the content practices of private actors, who are sometimes more powerful than the 	state and also enforcing censorship.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded that private censorship is an important issue that needs to be reflected upon in some depth, though a framework is far from 		being developed even as research is ongoing in the space. &lt;/i&gt;&lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h2&gt;Session 3: Looking Ahead&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third and final session of the conference aimed to find principles and methods to achieve beneficial and effective regulation of the Internet. One of 	the core aims was the search for the right balance between the dangers of the Internet (and its unprecedented powers of dissemination) and the citizens' 	interest in a robust right to freedom of expression. Mr. Sutirtho Patranobis, &lt;i&gt;Assistant Editor with the Hindustan Times &lt;/i&gt;(Sri Lanka desk, previously China correspondent), shared his experience with governmental regulation of online free speech in China and Sri Lanka. Ms. Karuna Nandy,&lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;, analysed the Indian Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(March 24, 2015), and sought to draw lessons for the current debate on net 	neutrality in India. Ms. Geeta Seshu, &lt;i&gt;founder and editor&lt;/i&gt; of the online magazine &lt;i&gt;The Hoot&lt;/i&gt;, offered an expanded definition of freedom of 	speech, focusing on universal access as the imperative. Finally, Mr. Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;, offered 	his views on net neutrality and the issue of zero-rating, as well as arguing for an increased, cooperative role of civil society in creating awareness on 	issues relating to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sutirtho Patranobis&lt;/b&gt;, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;br /&gt;During his career, Mr. Patranobis was the China correspondent for the &lt;i&gt;Hindustan Times&lt;/i&gt;. Mr. Patranobis began his presentation by sharing his 	experiences in China. In China, multiple online platforms have become sources of news for citizens. Chinese citizens, especially the urban young, spend 	increasing amounts of time on their mobile phones and the Internet, as these are the major sources of news and entertainment in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chinese government's attitude towards freedom of expression has been characterized by increasing control over these online platforms. The includes 	control over global companies like Google and Facebook, which have negotiated with the Chinese government to find mutually acceptable operating rules 	(acceptable to the government and the company, but in most cases unfavourable to the citizens) or have faced being blocked or filtered from the country. 	Mr. Patranobis noted that free speech regulation in China has evolved into a sophisticated mechanism for control and oppression, and the suppression of 	dissent. Not only China, but Sri Lanka has also adopted similar approaches to dealing with freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In China, free speech regulations have evolved with an aim to curtail collective action and dissent. China's censorship programmes work towards silencing 	expression that can represent, reinforce or spur social mobilisation. Mr. Patranobis explained that these programmes aim to put an end to all collective 	activities (current or future) that may be at odds with government policies. Therefore, any online activity that exposes government action as repressive, 	corrupted or draconian is meted out harsh treatment. Indeed it is possible to see that there are sharp increases in online censorship and crackdowns when 	the government implements controversial policies offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis went on to discuss the nature of objectionable content, and the manner in which different jurisdictions deal with the same. Social and 	cultural context, governmental ideologies, and political choices dictate the nature of objectionable content in States such as China and Sri Lanka. On the 	flipside, media literacy, which plays a big role in ensuring an informed and aware public, is extremely low in Sri Lanka, as well as in many other States 	in South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis raised the question of how the Internet can be regulated while retaining freedom of expression - noting that the way forward is uncertain. 	In Sri Lanka, for instance, research by UNESCO shows that the conflicting policy objectives are unresolved; these first need to be balanced before robust 	freedom of expression can be sustained. The Internet is a tool, after all; a tool that can connect people, that can facilitate the spread of knowledge and 	information, to lift people from the darkness of poverty. The Internet can also be a tool to spread hate and to divide societies and peoples. Finding the 	right balance, contextualised according to the needs of the citizens and the State, is key to good regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Karuna Nundy&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;br /&gt;Ms. Nandy focused her presentation on two issues currently raging in India's free speech debates: the Supreme Court's reasoning on Sections 66A and 69A, IT 	Act, in &lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(Supreme Court, March 24, 2015), and issues of access and 	innovation in the call for a net neutrality regulation. She stated that the doctrine of the "marketplace of ideas" endorsed by Justices Nariman and 	Chelameswar in &lt;i&gt;Shreya Singhal&lt;/i&gt; speaks to the net neutrality debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Nandy held that a law can be challenged as unconstitutional if it prohibits acts that are legitimate and constitutional. Such an argument refers to the 	impugned law's "overbroad impact". For instance, the Supreme Court struck down Section 66A, IT Act, on the ground (among others) that the impugned section leads to the prohibition and criminalisation of legitimate and protected speech. Cases such as&lt;b&gt;&lt;i&gt;Chintaman Rao&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh &lt;/i&gt;[(1950) SCR 759] &lt;/b&gt;and	&lt;b&gt;&lt;i&gt;Kameshwar Prasad&lt;/i&gt; v. &lt;i&gt;State of Bihar &lt;/i&gt;[1962 Supp. (3) SCR 369] &lt;/b&gt;speak to this principle. They expand the principle of 	overbreadth to include the notion of "chilling effect" - i.e., situations where overbroad blocking leads to the prohibition of legitimate constitutional 	speech. In such situations, citizens are unsure what constitutes protected speech and what does not, leading to a chilling effect and self-censorship for 	fear of reprisals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court also considered the "reasonable person" doctrine that has been developed under the law of obscenity. India 	had initially adopted the &lt;i&gt;Hicklin test&lt;/i&gt;, under which the test to determine what is obscene depended on whether prurient minds (minds that have a tendency to be corrupted) would find the impugned material lascivious and corrupting. This test, laid down in	&lt;b&gt;&lt;i&gt;Ranjit Udeshi&lt;/i&gt; v. &lt;i&gt;State of Maharashtra &lt;/i&gt;[AIR 1965 SC 881] &lt;/b&gt;and altered/refined by decades of jurisprudence, was put to rest 	in &lt;b&gt;&lt;i&gt;Aveek Sarkar&lt;/i&gt; v. &lt;i&gt;State of West Bengal &lt;/i&gt;[AIR 2014 SC 1495]&lt;/b&gt;. In &lt;i&gt;Aveek Sarkar&lt;/i&gt;, the Supreme Court adopted the 	"community standards" test to determine obscene content. According to Ms. Nandy, the "community standards" test rests on the doctrine of reasonable 	persons. Ms. Nandy noted that in effect there is a need for more police officers to protect those who produce legitimate content from hecklers.&lt;/p&gt;
&lt;p&gt;Quoting from the U.S. decision of &lt;b&gt;&lt;i&gt;Whitney&lt;/i&gt; v. &lt;i&gt;California&lt;/i&gt; [71 L. Ed. 1095]&lt;/b&gt;, Ms. Nandy submitted that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; It is the function of speech to free men from the bondage of irrational fears. To justify suppression of free speech there must be reasonable ground to 		fear that serious evil will result if free speech is practiced. There must be reasonable ground to believe that the danger apprehended is imminent. 		There must be reasonable ground to believe that the evil to be prevented is a serious one. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the issue of website blocking and the Supreme Court's reasoning on Section 69A, IT Act, in &lt;i&gt;Shreya Singhal&lt;/i&gt;, Ms. Nandy explained that the 	Additional Solicitor General had conceded a number of points during the oral arguments. She further explained that website blocking can be applied when the 	Central Government is satisfied that there is a necessity for it. However, reasons must be recorded in writing. Also, according to the Supreme Court's interpretation of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 ("	&lt;i&gt;Blocking Rules&lt;/i&gt;"), both the intermediary and the originator of the communication (the content-creator) have to be given a chance to be heard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 16 of the Blocking Rules, which mandates confidentiality of all blocking requests and orders, was also discussed in &lt;i&gt;Shreya Singhal&lt;/i&gt;. Though 	some confusion has arisen about the Rule's interpretation, Ms. Nandy submitted that Rule 16 has been read down. There is no longer a strict, 	all-encompassing requirement of confidentiality. While the identity of the complainant and the exact nature of the complaint must be kept confidential, the 	blocking order and the reasoning behind the order are no longer bound by Rule 16. This is because in §109 of the judgment, the Supreme Court accepts 	that writ petitions can lie on the basis of blocking orders. In order for writs to lie, affected parties must first be aware of the existence and content 	of the blocking order. Therefore, Ms. Nandy explained, the effect of the Supreme Court's reasoning is that the confidentiality requirement in Rule 16 has 	been read down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Ms. Nandy argued that zero-rating is an efficient solution to providing universal access to the Internet. Services like	&lt;i&gt;Internet.org&lt;/i&gt; are not strictly market-driven. This is because there is not a large demand for Facebook or specific over-the-top (OTT) service 	providers. In speaking about the marketplace for ideas in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court did not indirectly outlaw services seeking to balance 	access with diversity of speech. Ms. Nandy held that price discrimination in the provision of telecom, broadband and mobile Internet services already 	exists. In light of this, the focus should the provision of these services on the basis of consumer choice.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Geeta Seshu&lt;/b&gt;, &lt;i&gt;The Hoot&lt;/i&gt;&lt;br /&gt;Ms. Seshu began her presentation by noting that one's perspective on online censorship cannot be the same as that on traditional censorship. Traditional 	censorship cuts off an individual's access to the censored material, but on the Internet, material that is censored in traditional media finds free and 	wide distribution. One's conceptualisation of freedom of expression and curtailment of this right must include access to the medium as a crucial part. To 	this end, it is important to not forget that access to the Internet is controlled by a limited number of Internet service and content providers. Thus, a 	large section of the population in India cannot exercise their right to free speech because they do not have &lt;i&gt;access&lt;/i&gt; to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this context, it is important to understand the way in which the digital rollout is happening in India. Ms. Seshu explained that the rollout process 	lacks transparency, and noted the example of the 4G/LTE rollout plan in India. There is, of course, a diversity of content: those that have access to the 	Internet have the ability to exercise their right to free speech in diverse ways. However, introducing access into the free speech universe highlights many 	inequalities that exist in the right; for instance, Dalit groups in India have limited access to the Internet, and some kinds of content receive limited 	airtime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, Ms. Seshu argued that the government and other entities use technology to regulate content availability. Policymakers exploit the technology 	and architecture of the networks to monitor, surveil and censor content. For instance, one may see the UID scheme as an adaptation of technology to 	facilitate not only service-provision, but also as a move towards a Big Brother state. Civil society and citizens need to study and respond to the ways in 	which technology has been used against them. Unfortunately, the debates surrounding regulation do not afford space for Internet users to be part of the 	discussion. In order to turn this around, it is important that citizens' and users' rights are developed and introduced into the regulatory equation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt;, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;br /&gt;Taking up where Ms. Seshu left off, Mr. Prakash wished to explore whether the Internet was merely an enabler of discussion - allowing, for instance, a 	ruckus to be raised around the consultation paper of the Telecom Regulatory Authority in India (TRAI) on Over-The-Top (OTT) services and net neutrality - 	or whether the Internet positively adds value. The Internet is, of course, a great enabler. The discussions surrounding OTTs and net neutrality are an 	example: in response to the TRAI consultation, a campaign titled "Save the Internet" resulted in over 9.5 lakh comments being submitted to the TRAI. It is 	inconceivable that such a widespread public discussion on so complex a topic (net neutrality) could take place without the Internet's facilitation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, Mr. Prakash held, it is important to remember that the Internet is the tool, the platform, for such mobilisation. Campaigns and conversations such as 	those on net neutrality could not take place without the organisations and people involved in it. Civil society organisations have played prominent roles 	in this regard, creating awareness and well-informed discussions. For Mr. Prakash, civil society organisations play their role best when they create such 	public awareness, and it is important, to play to a stakeholders strengths. Some organisations are effective campaigners, while others (such as CIS) are 	competent at research, analysis and dissemination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Prakash, it is equally important to remember that successful discussions, campaigns or debates (such as the ongoing one on net neutrality) 	do not occur solely because of one organisation's strengths, or indeed because of civil society alone. Networks are especially critical in successful 	campaigns and policy changes. As researchers, we may not always know where our work is read, but sometimes they reach unexpected venues. For instance, one 	of Mr. Prakash's papers was used by the hacker collective Anonymous for a local campaign, and he was made aware of it only accidentally. Mr. Prakash noted 	that civil society has to also accept its failures, pointing to the controversy surrounding the Goondas Act in Karnataka. Where there are strong 	counter-stakeholders (such as the film lobby in south Indian states), civil society's efforts alone may not lead to success.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Mr. Prakash noted the example of a strategy employed by the &lt;i&gt;Times of India&lt;/i&gt; newspaper, when it undercut its competitors by 	slashing its own prices. Such moves are not unknown in the market, and they have their benefits. Consumers benefit from the lowered prices. For instance, 	were a Whatsapp or Facebook pack to be introduced by a telecom operator, the consumers may choose to buy this cheap, limited data pack. This is beneficial 	for consumers, and also works to expand access to the Internet. At the same time, diversity of speech and consumer choice is severely restricted, as these 	companies and telecom operators can create 'walled gardens' of information and services. Mr. Prakash put forth that if we can facilitate competitive 	zero-rating, and ensure that anti-competitive cross-subsidization does not occur, then perhaps zero-rated products can achieve access without forcing a 	trade off between diversity and choice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, on the issue of website blocking and takedowns under Sections 69A and 79, IT Act, Mr. Prakash noted that the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment does 	nothing to restrict the judiciary's powers to block websites. According to Mr. Prakash, at the moment, the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment relieves 	intermediaries of the responsibility to take down content if they receive private complaints about content. After the judgment, intermediaries will lose 	their immunity under Section 79, IT Act, only if they refuse to comply with takedown requests from government agencies or judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, as Mr. Prakash explained, the judiciary is itself a rogue website-blocker. In the past few years, the judiciary has periodically ordered the blocking 	of hundreds of websites. Such orders have resulted in the blocking of a large number of legitimate websites (including, at one point, Google Drive and 	Github). To ensure that our freedom of expression online is effectively protected, Mr. Prakash argued that ways to stop the judiciary from going on such a 	rampage must be devised.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;Questions &amp;amp; Comments&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A.&lt;/b&gt; Participants and panel members commented that researchers and commentators err by making analogies between the Internet and other media like newspapers, 	couriers, TV, satellite, cable, etc. The architecture of the Internet is very different even from cable. On the Internet, traffic flows both ways, whereas 	cable is not bi-directional. Moreover, pricing models for newspapers have nothing in common with those on the Internet. The comparisons in net neutrality 	debates stand the danger of incorrectness, and we must guard against that. Zero-rating and net neutrality issues in high-access countries are very 	different from the issues in low-access countries like India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B.&lt;/b&gt; Participants and panel members commented that access and availability must play a predominant role in thinking about freedom of expression. In India, we 	are technologically far behind other states, though we have potential. The real end-goal of this is the convergence of services and information, with the 	user at the centre of the ecosystem. Our technological capabilities include satellite and spectrum; the best spectrum bands are lying vacant and can be 	re-framed. For this, the government must be educated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;C.&lt;/b&gt; Participants and panel members commented that in high-access states, the net neutrality issues surround competition and innovation (since there is no or 	very little ISP competition and switching costs are not low), while in India and France, where there is already competition amongst providers, access plays 	a crucial role. On the Internet, the networking or engineering aspects can disrupt the content carried over the network, so that is also a concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;D. &lt;/b&gt; Participants and panel members commented that zero-rating is both a blessing and a curse. Zero-rating would not be detrimental in a market with perfect 	information and competition. But the reality is information asymmetry and imperfect competition. If today, we were to allow zero-rating, diversity would 	suffer and we would be left with 'walled gardens'.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference addressed a range of issues characteristic of debates surrounding freedom of expression in India and South Asia. Beginning with the 	conceptual understanding of freedom of expression, panellists advocated an expanded definition, where the right to free speech is teleological. The 	panellists considered freedom of speech as a tool to ensure diversity of speech, both horizontally and vertically. Towards this end, panellists gave 	several suggestions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt; , policymakers and scholars must understand freedom of speech as a right of &lt;i&gt;both&lt;/i&gt; the speaker and the listener/reader, and carve out a separate 	listeners' right. Panellists expanded upon this to show the implications for the debate on net neutrality, cross-media ownership and website-blocking, for 	instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt; , there is a need for scholars to examine the historical dichotomy between the &lt;i&gt;policy &lt;/i&gt;and &lt;i&gt;jurisprudence&lt;/i&gt; of free speech in India and other 	contexts across South Asia. Such an approach to scholarship and policy research would help predict future government policy (such as in the case of the Indian government's stance towards Section 66A following the Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;) and strategize for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt; , particularly with regard to the Internet, there is a need for policy advocates and policy makers to "bust" the founding myths of the Internet, and look 	to various domestic and international sources of law and regulation. Studies of regulation of freedom of speech on the Internet in different jurisdictions (Bangladesh, China, Sri Lanka) indicate differing government approaches, and provide examples to learn from. The interpretation and consequences of	&lt;i&gt;Shreya Singhal&lt;/i&gt; on website-blocking and intermediary liability in India provide another learning platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Fourth&lt;/i&gt; , panellists discussed the possibilities of cooperation and strategies among civil society and policy organisations in India. Taking the example of the	&lt;i&gt;Save the Internet&lt;/i&gt; campaign surrounding net neutrality in India, panellists speculated on the feasibility of using the Internet itself as a tool to 	campaign for governance and policy reform. Together with the audience, the panellists identified several areas that are ripe for research and advocacy, 	such as net neutrality and zero-rating, and citizens' free speech right as being separate from governmental and corporate interests.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age'&gt;https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetha Hariharan and Jyoti Panday</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-15T14:42:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage">
    <title>Net Neutrality and the Law of Common Carriage</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage</link>
    <description>
        &lt;b&gt;Net neutrality makes strange bedfellows. It links the truck operators that dominate India’s highways, such as those that carry vegetables from rural markets to cities, and Internet service providers which perform a more technologically advanced task.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/net-neutrality-law-of-common-carriage.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, the truckers have opposed the government’s attempts to impose the obligations of common carriage on them, this has resulted in strikes and temporary price rises; and, in the years ahead, there is likely to be a similar – yet, technologically very different – debate as net neutrality advocates call for an adapted version of common carriage to bind Internet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality demands a rigorous examination that is not attempted by this short note which, constrained by space, will only briefly trace the law and policy of net neutrality in the US and attempt a brief comparison with the principles of common carriage in India. Net neutrality defies definition. Very simply, the principle demands that Internet users have equal access to all content and applications on the Internet. This can only be achieved if Internet service providers: (i) do not block lawful content; (ii) do not throttle – deliberately slow down or speed up access to selected content; (iii) do not prioritise certain content over others for monetary gain; and, (iv) are transparent in their management of the networks by which data flows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost exactly a year ago, the District of Columbia Circuit Court of Appeals – a senior court below the US Supreme Court – struck down portions of the ‘Open Internet Order’ that was issued by the Federal Communications Commission (FCC) in 2010. Although sound in law, the Court’s verdict impeded net neutrality to raise crucial questions regarding common carriage, free speech, competition, and others. More recently, Airtel’s announcement of its decision to charge certain end-users for VoIP services – subsequently suspended pending a policy decision from the Telecom Regulatory Authority of India (TRAI) – has fuelled the net neutrality debate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because of its innovative technological history in relation to the Internet, the US has pioneered many legal attempts to regulate the Internet in respect of net neutrality. In 1980, when Internet data flowed through telephone lines, the FCC issued the ‘Computer II’ regime which distinguished basic services from enhanced services. The difference between the two turned on the nature of the transmission. Regular telephone calls involved a pure transmission of data and were hence classified as basic services. On the other hand, access to the Internet required the processing of user data through computers; these were classified as enhanced services. Importantly, because of their essential nature, the Computer II rules bound basic services providers to the obligations of common carriage whereas enhanced services providers were not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is common carriage? Common law countries share a unique heritage in respect of their law governing the transport of goods and people. Those that perform such transport are called carriers. The law makes a distinction between common carriers and other carriers. A carrier becomes a common carrier when it “holds itself out” to the public as willing to transport people or goods for compensation. The act of holding out is simply a public communication of an offer to transport, it may be fulfilled even by an advertisement. The four defining elements of a common carrier are (i) a holding out of a willingness (a public undertaking) (ii) to transport persons or property (iii) from place to place (iv) for compensation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common carriers discharge a public trust. By virtue of their unique position and essential function, they are required to serve their customers equally and without discrimination. The law of carriage of goods and people places four broad duties upon common carriers. Firstly, common carriers are bound to carry everyone’s goods or all people and cannot refuse such carriage unless certain strict conditions are met. Secondly, common carriers must perform their carriage safely without deviating from accepted routes unless in exceptional circumstances. Thirdly, common carriers must obey the timeliness of their schedules, they must be on time. And, lastly, common carriers must assume liabilities for the loss or damages of goods, or death or injuries to people, during carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Computer II regime was issued under a telecommunications law of 1934 which retained the classical markers and duties of common carriers. The law extended the principles of common carriage to telephone services providers. In 1980, when the regime was introduced, the FCC did not invest Internet services with the same degree of essence and public trust; hence, enhanced services escaped strict regulation. However, the FCC did require that basic services and enhanced services be offered through separate entities, and that basic services providers that operated the ‘last-mile’ wired transmission infrastructure to users offer these facilities to enhanced services providers on a common carrier basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1996, the new Telecommunications Act revisited US law after more than sixty years. The new dispensation maintained the broad structure of the Computer II regime: it recognised telecommunications carriers in place of basic services providers, and information-services providers in place of enhanced services. Carriers in the industry had already converged telephone and Internet communications as a single service. Hence, when a user engaged a carrier that provided telephone and broadband Internet services, the classification of the carrier would depend on the service being accessed. When a carrier provided broadband Internet access, it was an information-services provider (not a telecommunications carrier) and vice versa. Again, telecommunications carriers were subjected to stricter regulations and liability resembling common carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1998, the provision of broadband Internet over wired telephone lines through DSL technologies was determined to be a pure transmission and hence a telecommunications service warranting common carriage regulation. However, in 2002, the FCC issued the ‘Cable Broadband Order’ that treated the provision of cable broadband through last-mile wired telephone transmission networks as a single and integrated information service. This exempted most cable broadband from the duties of common carriage. This policy was challenged in the US Supreme Court in 2005 in the Brand X case and upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, the decision in the Brand X case was not made on technological merits. The case arose when a small ISP that had hitherto used regular telephone lines to transmit data wanted equal access to the coaxial cables of the broadcasting majors on the basis of common carriage. Instead of making a finding on the status of cable broadband providers based on the four elements of common carriage, the Court employed an administrative law principle of deferring to the decisions of an expert technical regulator – known as the Chevron deference principle – to rule against the small ISP. Thereafter wireless and mobile broadband were also declared to be information services and saved from the application of common carriage law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking advantage of this exemption from common carriage which released broadband providers from the duty of equal access and anti-discrimination, Comcast began from 2007 to degrade P2P data flows to its users. This throttling was reported to the FCC which responded with the 2008 ‘Comcast Order’ to demand equal and transparent transmission from Comcast. Instead, Comcast took the FCC to court. In 2010, the Comcast Order was struck down by the DC Circuit Court of Appeals. And, again, the decision in the Comcast case was made on an administrative law principle, not on technological merits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Comcast case, the Court said that as long as the FCC treated broadband Internet access as an information service it could not enforce an anti-discrimination order against Comcast. This is because the duty of anti-discrimination attached only to common carriers which the FCC applied to telecommunications carriers. Following the Comcast case, the FCC began to consider reclassifying broadband Internet providers as telecommunications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the 2010 ‘Open Internet Order’, the FCC attempted a different regulatory approach. Instead of a classification based on common carriage, the new rules recognised two types of Internet service providers: (i) fixed providers, which transmitted to homes, and, (ii) mobile providers, which were accessed by smartphones. The rules required both types of providers to ensure transparency in network management, disallowed blocking of lawful content, and re-imposed the anti-discrimination requirement to forbid prioritised access or throttling of certain content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before they were even brought into effect, Verizon challenged the Open Internet Order in the same court that delivered the Comcast judgement. The decision of the Court is pending. Meanwhile, in India, Airtel’s rollback of its announcement to charge its pre-paid mobile phone users more for VoIP services raises very similar questions. Like the common law world, India already extends the principles of common carriage to telecommunications. Indian jurisprudence also sustains the distinction between common carriage and private carriage, and applies an anti-discrimination requirement to telecommunications providers through a licensing regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI must decide if it wants to continue this distinction. No doubt, the provision of communications services through telephone and the Internet serves an eminent public good. It was on this basis that President Obama called on the FCC to reclassify broadband Internet providers as common carriers. Telecommunications carriers, such as Airtel, might argue that they have expended large sums of money on network infrastructure that is undermined by the use of high-bandwidth free VoIP applications, and that the law of common carriage must recognise this fact. And still others call for a new approach to net neutrality outside the dichotomy of common and private carriage. Whatever the solution, it must be reached by widespread engagement and participation, for Internet access – as the government’s Digital India project is aware – serves public interest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T11:09:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script">
    <title>Reading Devanagari script based sites like Konkani Wikipedia in Kannada Script</title>
    <link>https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script</link>
    <description>
        &lt;b&gt;This is a small hack to read websites with Devanagari script (used for Hindi, Marathi, Nepali, Maithili and a few more languages) based sites like Konkani Wikipedia in Kannada script.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-ff83ed1f-466f-a710-9ab0-9e891e7f5af6" style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://gom.wikipedia.org/"&gt;Konkani Wikipedia&lt;/a&gt; finally &lt;a href="http://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/"&gt;went live&lt;/a&gt; in this June after being in &lt;a href="https://incubator.wikimedia.org/wiki/Wp/gom"&gt;Incubator &lt;/a&gt;for nine years. &lt;a href="https://en.wikipedia.org/wiki/Konkani_language"&gt;Konkani language&lt;/a&gt; is written using five different scripts; Devanagari (official script for Konkani in Goa), Kannada, Latin, Malayalam and Persian. The current Konkani Wikipedia is available at &lt;a href="https://gom.wikipedia.org"&gt;https://gom.wikipedia.org&lt;/a&gt; where “gom” is for the Goan variation of Konkani.&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;img src="https://cis-india.org/home-images/Wikipedia.png" alt="null" class="image-inline" title="Wikipedia" /&gt;&lt;/p&gt;
&lt;p&gt;There is a significant Konkani population in coastal Karnataka and to a small extent in northern Kerala that use &lt;a href="https://en.wikipedia.org/wiki/Kannada_alphabet"&gt;Kannada script&lt;/a&gt; for writing Konkani. Many of these people might be facing issues with reading the Konkani articles in Devanagari script in the Goan Konkani Wikipedia which brings the need for making the Wikipedia available in Kannada and other scripts that Konkani uses.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There are various ways to go about it. Some of the Wikimedia projects like the &lt;a href="https://sr.wikipedia.org/"&gt;Serbian &lt;/a&gt; and &lt;a href="https://zh.wikipedia.org"&gt;Chinese Wikipedia&lt;/a&gt; already had this issue and had multi-script transliteration as a solution. Transliteration between Devanagari and Kannada scripts could be transliterated in multiple ways and below is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Noted typographer &lt;a href="https://kn.wikipedia.org/wiki/%E0%B2%95%E0%B3%86._%E0%B2%AA%E0%B2%BF._%E0%B2%B0%E0%B2%BE%E0%B2%B5%E0%B3%8D"&gt;K. P. Rao&lt;/a&gt; who is known for creating fonts for almost all the Indian scripts has recently come up with a solution for Devanagari⟷Kannada transliteration by creating a new font “Devama” that has Devanagari Unicode encodings with Kannada glyphs. The font has the rendering logic as per Kannada rules which means if we set this fonts for any text typed using Devanagari script, it will display it in Kannada script. This will help anyone who can read Kannada script to read something written in Devanagari. Mr. Rao has generously released “Devama” under Open Font License (OFL) ver. 1.1. The source file for the font is currently available at&lt;a href="https://github.com/pavanaja/DevamaNew"&gt; https://github.com/pavanaja/DevamaNew&lt;/a&gt; for anyone to use and modify with attribution.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How to use the font:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://github.com/pavanaja/DevamaNew/archive/master.zip"&gt;Download and install the font as a .zip file&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Unzip the file and find the “Devama.otf” file. Install it. (the installation will vary based on your operating system, check a &lt;a href="http://www.howtogeek.com/192980/how-to-install-remove-and-manage-fonts-on-windows-mac-and-linux/"&gt;how-to guide&lt;/a&gt; to learn).&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Now inorder to make the font working you need to change the browser settings. (check &lt;a href="http://www.howtogeek.com/208552/how-to-change-the-default-fonts-in-your-web-browser/"&gt;here&lt;/a&gt; for Firefox and Chrome browser settings). You need to set “Devama” as the display font for Devanagari script. &lt;br class="kix-line-break" /&gt;In Mozilla Firefox:&lt;/p&gt;
&lt;/li&gt;
&lt;ol&gt;
&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Select “Options” from Tools menu. It will open a new tab. Select the “Content” tab. Click on the button “Advanced...”. Select Devanagari from the drop-down list from “Fonts for” and set “Devama” as the font for all options. Click on “Ok” and close the dialog box. Now reload the Konkani Wikipedia to check if it is working or not.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/ol&gt;
&lt;p&gt;Not just Konkani Wikipedia, any other site in Devanagari script (used for Hindi, Marathi, Nepali, Maithili, Bihari and a few other Indian languages) could also be read in Kannada. This might be useful for those who could read in Kannada and have problems reading in Devanagari.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script'&gt;https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T18:14:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality">
    <title>Regulatory Perspectives on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality</link>
    <description>
        &lt;b&gt;In this paper Pranesh Prakash gives an overview on why India needs to put in place net neutrality regulations, and the form that those regulations must take to avoid being over-regulation.&lt;/b&gt;
        &lt;p&gt;With assistance by Vidushi Marda (Programme Officer, Centre for Internet and Society)     and Tarun Krishnakumar (Research Volunteer, Centre for Internet and Society). &lt;i&gt;I would like to specially thank Vishal Misra, Steve Song, Rudolf van  der Berg, Helani Galpaya, A.B. Beliappa, Amba Kak, and Sunil Abraham for  extended discussions, helpful suggestions and criticisms.  However,  this paper is not representative of their views, which are varied.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Today, we no longer live in a world of "roti, kapda, makaan", but in the world of "roti, kapda, makaan aur broadband".    &lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is recognized by the National Telecom Policy IV.1.2, which states the need to "recognise telecom, including broadband connectivity as a basic necessity like education and health and work towards 'Right to Broadband'."&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; According to the IAMAI, as of October 2014, India had 278 million internet users.    &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Of these, the majority access Internet through their mobile phones, and the WEF     estimates only 3 in 100 have broadband on their mobiles.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, the bulk of our     population is without broadband. Telecom regulation and net neutrality has a very important role in enabling this vision of Internet as a basic human need     that we should aim to fulfil.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.49zh04wwxm9l"&gt;&lt;/a&gt; &lt;b&gt;1. Why should we regulate the telecom sector? &lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;All ICT regulation should be aimed at achieving five goals: achieving universal, affordable access;    &lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; ensuring and sustaining effective competition in an efficient market and avoiding     market failures; protecting against consumer harms; ensuring maximum utility of the network by ensuring interconnection; and addressing state needs     (taxation, security, etc.). Generally, all these goals go hand in hand, however some tensions may arise. For instance, universal access may not be provided     by the market because the costs of doing so in certain rural or remote areas may outweigh the immediate monetary benefits private corporations could     receive in terms of profits from those customers. In such cases, to further the goal of universal access, schemes such as universal service obligation     funds are put in place, while ensuring that such schemes either do not impact competition or very minimally impact it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that to maximise societal benefit, effective regulation of the ICT sector is a requirement, which otherwise, due to the ability of dominant     players to abuse network effect to their advantage, is inherently prone towards monopolies. For instance, in the absence of regulation, a dominant player     would charge far less for intra-network calls than inter-network calls, making customers shift to the dominant network. This kind of harm to competition     should be regulated by the ICT regulator. However, it is equally true that over-regulation is as undesirable as under-regulation, since over-regulation     harms innovation - whether in the form of innovative technologies or innovative business models. The huge spurt of growth globally of the telecom sector     since the 1980s has resulted not merely from advancements in technology, but in large part from the de-monopolisation and deregulation of the telecom     sector.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, the Internet has largely flourished under very limited     technology-specific regulation. For instance, while interconnection between different telecom networks is heavily regulated in the domestic telecom sector,     interconnection between the different autonomous systems (ASes) that make up the Internet is completely unregulated, thereby allowing for non-transparent     pricing and opaque transactions. Given this context, we must ensure we do not over-regulate, lest we kill innovation.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="h.psqblglrgt68"&gt;&lt;/a&gt; &lt;b&gt;2. Why should we regulate Net Neutrality? And whom should we regulate?&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;We wouldn't need to regulate Net Neutrality if ISPs were not "&lt;b&gt;gatekeepers&lt;/b&gt;" for last-mile access. "Gatekeeping" occurs when a single     company establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for     Internet services to reach the customers of the telecom network without passing through the telecom network. The situation is very different in the     middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in "transit     agreements", a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and     is thus inefficient in a way). However, this multiplicity of routes is not possible in the last mile.&lt;/p&gt;
&lt;p&gt;This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications,     while harming consumer choice. This is why we believe that promoting the five goals mentioned above would require regulation of last-mile telecom operators     to prevent unjust discrimination against end-users and content providers.&lt;/p&gt;
&lt;p&gt;Thus,     &lt;b&gt; net neutrality is the principle that we should regulate gatekeepers to ensure they do not use their power to unjustly discriminate between similarly         situated persons, content or traffic. &lt;/b&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.79auvw7dxb9s"&gt;&lt;/a&gt; &lt;b&gt;3. How should we regulate Net Neutrality?&lt;/b&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;a name="h.288fq19cym4p"&gt;&lt;/a&gt; 3.1. What concerns does Net Neutrality raise? What harms does it entail?&lt;/h2&gt;
&lt;p&gt;Discriminatory practices at the level of access to the Internet raises the following set of concerns:&lt;/p&gt;
&lt;p&gt;1. Freedom of speech and expression, freedom of association, freedom of assembly, and privacy.&lt;/p&gt;
&lt;p&gt;2. Harm to effective competition&lt;/p&gt;
&lt;p&gt;a. This includes competition amongst ISPs as well as competition amongst content providers.&lt;/p&gt;
&lt;p&gt;b. Under-regulation here may cause harm to innovation at the content provider level, including through erecting barriers to entry.&lt;/p&gt;
&lt;p&gt;c. Over-regulation here may cause harm to innovation in terms of ISP business models.&lt;/p&gt;
&lt;p&gt;3. Harm to consumers&lt;/p&gt;
&lt;p&gt;a. Under-regulation here may harm consumer choice and the right to freedom of speech, expression, and communication.&lt;/p&gt;
&lt;p&gt;b. Over-regulation on this ground may cause harm to innovation at the level of networking technologies and be detrimental to consumers in the long run.&lt;/p&gt;
&lt;p&gt;4. Harm to "openness" and interconnectedness of the Internet, including diversity (of access, of content, etc.)&lt;/p&gt;
&lt;p&gt;a. Exceptions for specialized services should be limited to preserve the open and interconnectedness of the Internet and of the World Wide Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It might help to think about Net Neutrality as primarily being about two overlapping sets of regulatory issues: preferential treatment of particular     Internet-based services (in essence: content- or source-/destination-based discrimination, i.e., discrimination on basis of 'whose traffic it is'), or     discriminatory treatment of applications or protocols (which would include examples like throttling of BitTorrent traffic, high overage fees upon breaching     Internet data caps on mobile phones, etc., i.e., discrimination on the basis of 'what kind of traffic it is').&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Situations where the negative or positive discrimination happens on the basis of particular content or address should be regulated through the use of         competition principles, while negative or positive discrimination at the level of specific class of content, protocols, associated ports, and other         such sender-/receiver-agnostic features, should be regulated through regulation of network management techniques &lt;/b&gt; . The former deals with instances where the question of "in whose favour is there discrimination" may be asked, while the latter deals with the question     "in favour of what is there discrimination".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to do this, a regulator like TRAI can use both hard regulation - price ceilings, data cap floors, transparency mandates, preventing specific     anti-competitive practices, etc. - as well as soft regulation - incentives and disincentives.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.y84hsu73ibky"&gt;&lt;/a&gt; 3.1.1 Net Neutrality and human rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any discussion on the need for net neutrality impugns the human rights of a number of different stakeholders. Users, subscribers, telecom operators and     ISPs all possess distinct and overlapping rights that are to be weighed against each other before the scope, nature and form of regulatory intervention are     finalised. The freedom of speech, right to privacy and right to carry on trade raise some of the most pertinent questions in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, to properly consider issues surrounding the practice of paid content-specific zero-rating from a human rights point of view, one must seek to     balance the rights of content providers to widely disseminate their 'speech' to the largest audiences against the rights of consumers to have access to a     diverse variety of different, conflicting and contrasting ideas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to a veritable marketplace or free-market of ideas has formed the touchstone of freedom of speech law in jurisdictions across the world as well as finding mention in pronouncements of the Indian Supreme Court. Particular reference is to be made to the dissent of Mathew, J. in&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and of the majority    &lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which rejected the approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the practice of deep-packet inspection, which is sometimes used in the process of network management, raises privacy concerns as it seeks to go beyond what is "public" information in the header of an IP packet, necessary for routing, to analysing non-public information.    &lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.yjyiwnikxizu"&gt;&lt;/a&gt; 3.2 What conditions and factors may change these concerns and the regulatory model we should adopt?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the principles relating to Net Neutrality remain the same in all countries (i.e., trying to prevent gatekeepers from unjustly exploiting their     position), the severity of the problem varies depending on competition in the market, on the technologies, and on many other factors. One way to measure     fair or stable allocation of the surplus created by a network - or a network-of-networks like the Internet - is by treating it as a convex cooperation game     and thereupon calculating that game's Shapley value:&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the case of the Internet,     this would be a game involving content ISPs, transit ISPs, and eyeball (i.e., last-mile) ISPs. The Shapley value changes depending on the number of     competitors there are in the market: thus, the fair/stable allocation when there's vibrant competition in the market is different from the fair/stable     allocation in a market without such competition. That goes to show that a desirable approach when an ISP tries to unjustly enrich itself by charging other     network-participants may well be to increase competition, rather than directly regulating the last-mile ISP. Further, it shows that in a market with     vibrant last-mile competition, the capacity of the last-mile ISP to unjustly are far diminished.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In countries which are remote and have little international bandwidth, the need to conserve that bandwidth is high. ISPs can regulate that by either     increasing prices of Internet connections for all, or by imposing usage restrictions (such as throttling) on either heavy users or bandwidth-hogging     protocols. If the amount of international bandwidth is higher, the need and desire on part of ISPs to indulge in such usage restrictions decreases. Thus,     the need to regulate is far higher in the latter case, than in the former case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above paragraphs show that both the need for regulation and also the form that the regulation should take depend on a variety of conditions that aren't     immediately apparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the framework that the regulator sets out to tackle issues relating to Net Neutrality are most important, whereas the specific rules may need to     change depending on changes in conditions. These conditions include:&lt;/p&gt;
&lt;p&gt;● last-mile market&lt;/p&gt;
&lt;p&gt;○ switching costs between equivalent service providers&lt;/p&gt;
&lt;p&gt;○ availability of an open-access last-mile&lt;/p&gt;
&lt;p&gt;○ availability of a "public option" neutral ISP&lt;/p&gt;
&lt;p&gt;○ increase or decrease in the competition, both in wired and mobile ISPs.&lt;/p&gt;
&lt;p&gt;● interconnection market&lt;/p&gt;
&lt;p&gt;○ availability of well-functioning peering exchanges&lt;/p&gt;
&lt;p&gt;○ availability of low-cost transit&lt;/p&gt;
&lt;p&gt;● technology and available bandwidth&lt;/p&gt;
&lt;p&gt;○ spectrum efficiency&lt;/p&gt;
&lt;p&gt;○ total amount of international bandwidth and local network bandwidth&lt;/p&gt;
&lt;p&gt;● conflicting interests of ISPs&lt;/p&gt;
&lt;p&gt;○ do the ISPs have other business interests other than providing Internet connectivity? (telephony, entertainment, etc.)&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.1yozvmhaur7z"&gt;&lt;/a&gt; 3.3 How should we deal with anti-competitive practices?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Anti-competitive practices in the telecom sector can take many forms: Abuse of dominance, exclusion of access to specific services, customer lock-in,     predatory pricing, tying of services, cross-subsidization, etc., are a few of them. In some cases the anti-competitive practice targets other telecom     providers, while in others it targets content providers. In the both cases, it is important to ensure that ensure that telecom subscribers have a     competitive choice between effectively substitutable telecom providers and an ability to seamlessly switch between providers.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.smm9g46xsi3q"&gt;&lt;/a&gt; 3.3.1 Lowering Switching Costs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;TRAI has tackled many of these issues head on, especially in the mobile telephony space, while competitive market pressures have helped too:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Contractual or transactional lock-in&lt;/b&gt;. The easiest way to prevent shifting from one network to another is by contractually     mandating a lock-in period, or by requiring special equipment (interoperability) to connect to one's network. In India, this is not practised in the     telecom sector, with the exception of competing technologies like CDMA and GSM. Non-contractual lock-ins, for instance by offering discounts for purchasing     longer-term packages, are not inherently anti-competitive unless that results in predatory pricing or constitutes an abuse of market dominance. In India,     switching from one mobile provider to another, though initiated 15 years into the telecom revolution, is in most cases now almost as easy as buying a new     SIM card.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; TRAI may consider proactive regulation against contractual lock-in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number of competitors&lt;/b&gt;. Even if switching from one network to another is easy, it is not useful unless there are other equivalent     options to switch to. In the telecom market, coverage is a very important factor in judging equivalence. Given that last mile connectivity is extremely     expensive to provide, the coverage of different networks are very different, and this is even more true when one considers wired connectivity, which is     difficult to lay in densely-populated urban and semi-urban areas and unprofitable in sparsely-populated areas. The best way to increase the number of     competitors is to make it easier for competitors to exist. Some ways of doing this would be through enabling spectrum-sharing, lowering right-of-way rents,     allowing post-auction spectrum trading, and promoting open-access last-mile fibre carriers and to thereby encourage competition on the basis of price and     service and not exclusive access to infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Interconnection and mandatory carriage&lt;/b&gt;. The biggest advantage a dominant telecom player has is exclusive access to its customer     base. Since in the telecom market, no telco wants to not connect to customers of another telco, they do not outright ban other networks. However, dominant     players can charge high prices from other networks, thereby discriminating against smaller networks. In the early 2000s, Airtel-to-Airtel calls were much     cheaper than Airtel-to-Spice calls. However, things have significantly changed since then. TRAI has, since the 2000s, heavily regulated interconnection and     imposed price controls on interconnection ("termination") charges.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, now,     generally, inter-network calls are priced similarly to intra-network calls. And if you want cheaper Airtel-to-Airtel calls, you can buy a special     (unbundled) pack that enables an Airtel customer to take advantage of the fact that her friends are also on the same network, and benefits Airtel since     they do not in such cases have to pay termination charges. Recently, TRAI has even made the interconnection rates zero in three cases:     landline-to-landline, landline-to-cellular, and cellular-to-landline, in a bid to decrease landline call rates, and incentivise them, allowing a very low per call interconnection charges of 14 paise for cellular-to-cellular connections.    &lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ With regard to Net Neutrality, we must have a rule that     &lt;b&gt; no termination charges or carriage charges may be levied by any ISP upon any Internet service. No Internet service may be discriminated against with         regard to carriage conditions or speeds or any other quality of service metric. In essence &lt;i&gt;all&lt;/i&gt; negative discrimination should be prohibited. &lt;/b&gt; This means that Airtel cannot forcibly charge WhatsApp or any other OTT (which essentially form a different "layer") money for the "privilege" of being     able to reach Airtel customers, nor may Airtel slow down WhatsApp traffic and thus try to force WhatsApp to pay. There is a duty on telecom providers to     carry any legitimate traffic ("common carriage"), not a privilege. It is important to note that consumer-facing TSPs get paid by other interconnecting     Internet networks in the form of &lt;i&gt;transit charges&lt;/i&gt; (or the TSP's costs are defrayed through peering). There shouldn't be any separate charge on the     basis of content (different layer from the carriage) rather than network (same layer as the carriage). This principle is especially important for startups,     and which are often at the receiving end of such discriminatory practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number Portability&lt;/b&gt;. One other factor that prevents users from shifting between one network and another is the fact that they have     to change an important aspect of their identity: their phone number (this doesn't apply to Internet over DSL, cable, etc.). At least in the mobile space, TRAI has for several years tried to mandate seamless mobile number portability. The same is being tried by the European Commission in the EU.    &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While intra-circle mobile number portability exists in India - and TRAI is     pushing for inter-circle mobile number portability as well&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - this is nowhere as     seamless as it should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Multi-SIM phones&lt;/b&gt;. The Indian market is filled with phones that can accommodate multiple SIM cards, enabling customers to shift     seamlessly between multiple networks. This is true not just in India, but most developing countries with extremely price-sensitive customers. Theoretically, switching costs would approach zero if in a market with full coverage by &lt;i&gt;n&lt;/i&gt; telecom players every subscriber had a phone with    &lt;i&gt;n &lt;/i&gt;SIM slots with low-cost SIM cards being available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation in the telecom sector with respect to the above provides a stark contrast to the situation in the USA, and to the situation in the DTH     market. In the USA, phones get sold at discounts with multi-month or multi-year contracts, and contractual lock-ins are a large problem. Keeping each of     the above factors in mind, the Indian mobile telecom space is far more competitive than the US mobile telecom space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in the Indian DTH market, given that there is transactional lock-in (set-top boxes aren't interoperable in practice, though are mandated to be so     by law&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;), there are fewer choices in the market; further, the equivalent of     multi-SIM phones don't exist with respect to set-top boxes. Further, while there are must-carry rules with respect to carriage, they can be of three types:     1) must mandatorily provide access to particular channels&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (positive obligation,     usually for government channels); 2) prevented from not providing particular channels (negative obligation, to prevent anti-competitive behaviour and political censorship); and 3) must mandatorily offer access to at least a set number of channels (positive obligation for ensuring market diversity).    &lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Currently, only (1) is in force, since despite attempts by TRAI to ensure (3) as     well.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the shifting costs are low and transparency in terms of network practice is reported in a standard manner and well-publicised, then that significantly     weakens the "&lt;b&gt;gatekeeper effect&lt;/b&gt;", which as we saw earlier, is the reason why we wish to introduce Net Neutrality regulation. This     consequently means, as explained above in section 3.2, that     &lt;b&gt; &lt;i&gt; despite the same Net Neutrality principles applying in all markets and countries, the precise form that the Net Neutrality regulations take in a             telecom market with low switching costs would be different from the form that such regulations would take in a market with high switching costs. &lt;/i&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.glaa2bev2dhk"&gt;&lt;/a&gt; 3.3.2 Anti-competitive Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some potential anti-competitive practices, which are closely linked, are cross-subsidization, tying (anti-competitive bundling) of multiple services, and     vertical price squeeze. All three of these are especial concerns now, with the increased diversification of traditional telecom companies, and with the entry into telecom (like with DTH) of companies that create content. Hence, if Airtel cross-subsidizes the Hike chat application that it recently acquired,    &lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or if Reliance Infocomm requires customers to buy a subscription to an offering     from Reliance Big Entertainment, or if Reliance Infocomm meters traffic from another Reliance Big Entertainment differently from that from Saavn, all those     would be violative of the &lt;b&gt;principle of non-discrimination by gatekeepers&lt;/b&gt;. This same analysis can be applied to all unpaid deals and     non-commercial deals, including schemes such as Internet.org and Wikipedia Zero, which will be covered later in the section on zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we have general rules such as sections 3 and 4 of the Competition Act,     &lt;b&gt; we do not currently have specific rules prohibiting these or other anti-competitive practices, and we need Net Neutrality regulation that clearly         prohibit such anti-competitive practices so that the telecom regulator can take action for non-compliance &lt;/b&gt; . We cannot leave these specific policy prescriptions unstated, even if they are provided for in    &lt;a href="http://indiankanoon.org/doc/1153878/"&gt;section 3 of the Competition Act&lt;/a&gt;. These concerns are especial concerns in the telecom sector, and the     telecom regulator or arbitrator should have the power to directly deal with these, instead of each case going to the Competition Commission of India. This     should not affect the jurisdiction of the CCI to investigate and adjudicate such matters, but should ensure that TRAI both has suo motu powers, and that     the mechanism to complain is made simple (unlike the current scenario, where some individual complainants may fall in the cracks between TRAI and TDSAT).&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.yd0ptbr561l8"&gt;&lt;/a&gt; 3.3.3 Zero-rating&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since a large part of the net neutrality debate in India involves zero-rating practices, we deal with that in some length. Zero-rating is the practice of     not counting (aka "zero-rating") certain traffic towards a subscriber's regular Internet usage. The     &lt;b&gt; zero-rated traffic could be zero-priced or fixed-price; capped or uncapped; subscriber-paid, Internet service-paid, paid for by both, or unpaid;         content- or source/destination-based, or agnostic to content or source/destination; automatically provided by the ISP or chosen by the customer &lt;/b&gt; . The motivations for zero-rating may also be varied, as we shall see below. Further, depending on the circumstances, zero-rating could be competitive or     anti-competitive. All forms of zero-rating result in some form of discrimination, but not all zero-rating is harmful, nor does all zero-rating need to be     prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While, as explained in the section on interconnection and carriage above, negative discrimination at the network level should be prohibited, that leaves     open the question of positive discrimination. It follows from section 3.1 that the right frame of analysis of this question is harm to competition, since     the main harm zero-rating is, as we shall see below, about discriminating between different content providers, and not discrimination at the level of     protocols, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether one should allow for any form of positive discrimination at the network level or not depends on whether positive discrimination of (X) has an     automatic and unfair negative impact on all (~X). That, in turn, depends on whether (~X) is being subject to unfair competition. As Wikipedia notes,     "unfair competition means that the gains of some participants are conditional on the losses of others, when the gains are made in ways which are     illegitimate or unjust."     &lt;b&gt; Thus, positive discrimination that has a negative impact on effective competition shall not be permitted, since in such cases it is equivalent to         negative discrimination ("zero-sum game") &lt;/b&gt; .     &lt;b&gt; Positive discrimination that does not have a negative impact on effective competition may be permitted, especially since it results in increased access         and increases consumer benefit, as long as the harm to openness and diversity is minimized &lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While considering this, one should keep in mind the fact that startups were, 10-15 years ago, at a huge disadvantage with regard to wholesale data     purchase. The marketplaces for data centres and for content delivery networks (which speed up delivery of content by being located closer, in network     terms, to multiple last-mile ISPs) were nowhere near as mature as they are today, and the prices were high. There was a much higher barrier to startup     entry than there is today, due to the prices and due to larger companies being able to rely on economies of scale to get cheaper rates. Was that unfair?     No. There is no evidence of anti-competitive practices, nor of startups complaining about such practices. Therefore, that was fair competition, despite     specific input costs that were arguably needed (though not essential) for startups to compete being priced far beyond their capacity to pay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the marketplace is very different, with a variety of offerings. CDNs such as Cloudflare, which were once the preserve of rich companies, even have     free offerings, thus substantially lowering barriers for startups that want faster access to customers across the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is a CDN an essential cost for a startup? No. But in an environment where speed matters and customers use or don't use a service depending on speed; and     where the startup's larger competitors are all using CDNs, a startup more or less has to. Thankfully, given the cheap access to CDNs these days, that cost     is not too high for a startup to bear. If the CDN market was not competitive enough, would a hypothetical global regulator have been justified in outright     banning the use of CDNs to 'level' the playing field? No, because the hypothetical global regulator instead had the option to (and would have been     justified in) regulating the market to ensure greater competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; A regulator should not prohibit an act that does not negatively impact access, competition, consumer benefit, nor openness (including diversity), since         that would be over-regulation and would harm innovation. &lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.3j3bch9mpwr2"&gt;&lt;/a&gt; 3.3.3.1 Motivations for Zero-Rating&lt;/h4&gt;
&lt;h5&gt;&lt;a name="h.pxa0ovwqncfy"&gt;&lt;/a&gt; 3.3.3.1.1 Corporate Social Responsibility / Incentivizing Customers to Move Up Value Chain&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There exist multiple instances where there is no commercial transaction between the OTT involved and the telecom carrier, in which zero-priced zero-rating     of specific Internet content happens. We know that there is no commercial transaction either through written policy (Wikipedia Zero) or through public     statements (Internet.org, a bouquet of sites). In such cases, the telecom provider would either be providing such services out of a sense of public     interest, given the social value of those services, or would be providing such services out of self-interest, to showcase the value of particular Internet     set the same time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apprehended risk is that of such a scheme creating a "walled garden", where users would be exposed only to those services which are free since the    &lt;i&gt;search and discovery costs&lt;/i&gt; of non-free Internet (i.e., any site outside the "walled garden") would be rather high. This risk, while real, is     rather slim given the fact that the economic incentives for those customers who have the ability to pay for "Internet packs" but currently do not find a     compelling reason to do so, or out of both a sense of public interest and self-interest of the telecom providers works against this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gzz6numa7y24"&gt;&lt;/a&gt; In such non-commercial zero-priced zero-rating, a telecom provider would only make money if and only if subscribers start paying for sites outside of the     walled garden. If subscribers are happy in the walled garden, the telecom provider starts losing money, and hence has a strong motivation to stop that     scheme. If on the other hand, enough subscribers start becoming paying customers to offset the cost of providing the zero-priced zero-rated service(s) and     make it profitable, that shows that despite the availability of zero-priced options a number of customers will opt for paid access to the open Internet and     the open Web, and the overall harms of such zero-priced zero-rating would be minimal. Hence, the telecom providers have an incentive to keep the costs of     Internet data packs low, thus encouraging customers who otherwise wouldn't pay for the Internet to become paying customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is the potential of consumer harm when users seek to access a site outside of the walled garden, and find to their dismay that they have been charged     for the Internet at a hefty rate, and their prepaid balance has greatly decreased. This is an issue that TRAI is currently appraised of, and a suitable     solution would need to be found to protect consumers against such harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All in all, given that the commercial interests of the telecom providers align with the healthy practice of non-discrimination, this form of limited     positive discrimination is not harmful in the long run, particularly because it is not indefinitely sustainable for a large number of sites. Hence, it may     not be useful to ban this form of zero-priced zero-rating of services as long as they aren't exclusive, or otherwise anti-competitive (a vertical     price-squeeze, for instance), and the harm to consumers is prohibited and the harm to openness/diversity is minimized.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.2xvaoc7t0zmu"&gt;&lt;/a&gt; 3.3.3.1.2 Passing on ISP Savings / Incentivizing Customers to Lower ISP's Cost&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Suppose, for instance, an OTT uses a CDN located, in network distance terms, near an eyeball ISP. In this case, the ISP has to probably pay less than it     would have to had the same data been located in a data centre located further away, given that it would have fewer interconnection-related charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the monetary costs of providing access to different Web destinations are not equal for the ISP. This cost can be varied either by the OTT (by it     locating the data closer to the ISP - through a CDN, by co-locating where the ISP is also present, or by connecting to an Internet Exchange Point which the     ISP is also connected to - or by it directly "peering" with the ISP) or by the ISP (by engaging in "transparent proxying" in which case the ISP creates     caches at the ISP level of specific content (usually by caching non-encrypted data the ISP's customers request) and serves the cached content when a user     requests a site, rather than serving the actual site). None of the practices so far mentioned are discriminatory from the customer's perspective with     regard either to price or to prioritization, though all of them enable faster speeds to specific content. Hence none of the above-mentioned practices are considered even by the most ardent Net Neutrality advocates to be violations of that principle.    &lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, if an ISP zero-rates the content to either pass on its savings to the     customer&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or to incentivize the customer to access services that cost the ISP less     in terms of interconnection costs, that creates a form of price discrimination for the customer, despite it benefiting the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The essential economic problem is that the cost to the ISP is variable, but the cost to the customer is fixed. Importantly, this problem is exacerbated in India where web hosting prices are high, transit prices are high, peering levels are low, and Internet Exchange Points (IXPs) are not functioning well.    &lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These conditions create network inefficiencies in terms of hosting of content     further away from Indian networks in terms of network distance, and thus harms consumers as well as local ISPs. In order to set this right, zero-rating of     this sort may be permitted as it acts as an incentive towards fixing the market fundamentals. However, once the market fundamentals are fixed, such     zero-rating may be prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.fpfvyrxp6pif"&gt;&lt;/a&gt; This example shows that the desirability or otherwise of discriminatory practices depends fully on the conditions present in the market, including in terms     of interconnection costs.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.uc9je2dcrwpx"&gt;&lt;/a&gt; 3.3.3.1.3 Unbundling Internet into Services ("Special Packs")&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Since at least early 2014, mobile operators have been marketing special zero-rating "packs". These packs, if purchased by the customer, allow capped or in     some instances uncapped, zero-rating of a service such as WhatsApp or Facebook, meaning traffic to/from that service will not be counted against their     regular Internet usage.&lt;/p&gt;
&lt;p&gt;For a rational customer, purchasing such a pack only makes sense in one of two circumstances:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, but has not purchased an "Internet data pack" since she doesn't find the     Internet valuable. Instead, she has heard about "WhatsApp", has friends who are on it, and wishes to use that to reduce her SMS costs (and thereby eat into     the carriage provider's ability to charge separately for SMSes). She chooses to buy a WhatsApp pack for around ₹25 a month instead of paying     ₹95 for an all-inclusive Internet data pack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, and has purchased an "Internet data pack". However, that data pack is capped     and she has to decide between using WhatsApp and surfing web sites. She is on multiple WhatsApp groups and her WhatsApp traffic eats up 65% of her data     cap. She thus has to choose between the two, since she doesn't want to buy two Internet data packs (each costing around ₹95 for a month). She chooses     to buy a WhatsApp pack for ₹25 a month, paying a cumulative total of ₹120 instead of ₹190 which she would have had to had she bought two     Internet data packs. In this situation, "unbundling" is happening, and this benefits the consumer. Such unbundling harms the openness and integrity of the     Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If users did not find value in the "special" data packs, and there is no market demand for such products, they will cease to be offered. Thus, assuming a     telco's decision to offer such packs is purely customer-demand driven - and not due to deals it has struck with service providers - if Orkut is popular, telcos would be interested in offering Orkut packs and if Facebook is popular, they would be interested in offering a Facebook pack. Thus, clearly,    &lt;b&gt;there is nothing anti-competitive about such customer-paid zero-rating packs, whereas they clearly enhance consumer benefit&lt;/b&gt;. Would this     increase the popularity of Orkut or Facebook? Potentially yes. But to prohibit this would be like prohibiting a supermarket from selectively (and     non-collusively) offering discounts on popular products. Would that make already popular products even more popular? Potentially, yes. But that would not     be seen as a harm to competition but would be seen as fair competition. This contravenes the "openness" of the Internet (i.e., the integral interconnected     diversity that an open network like the Internet embodies) as an independent regulatory goal. The Internet, being a single gateway to a mind-boggling     variety of services, allows for a diverse "long tail", which would lose out if the Internet was seen solely as a gateway to popular apps, sites, and     content. However, given that this is a choice exercised freely by the consumer, such packs should not be prohibited, as that would be a case of     over-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The one exception to the above analysis of competition, needless to say, is if that these special packs aren't purely customer-demand driven and are the     product of special deals between an OTT and the telco. In that case, we need to ensure it isn't anti-competitive by following the prescriptions of the next     section.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.f0rfoerqprro"&gt;&lt;/a&gt; 3.3.3.1.4 Earning Additional Revenues from Content Providers&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;With offerings like Airtel Zero, we have a situation where OTT companies are offering to pay for wholesale data access used by their customers, and make     accessing their specific site or app free for the customer. From the customer's perspective, this is similar to a toll-free number or a pre-paid envelope     or free-to-air TV channel being offered on a particular network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, from the network perspective, these are very different. Even if a customer-company pays Airtel for the toll-free number, that number is accessible     and toll-free across all networks since the call terminates on Airtel networks and Airtel pays the connecting network back the termination charge from the     fee they are paid by the customer-company. This cannot happen in case of the Internet, since the "call" terminates outside of the reach of the ISP being     paid for zero-rating by the OTT company; hence unless specific measures are taken, zero-rating has to be network-specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The comparison to free-to-air channels is also instructive, since in 2010 TRAI made recommendations that consumers should have the choice of accessing     free-to-air channels à-la-carte, without being tied up to a bouquet.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This would, in essence, allow a subscriber to purchase a set-top box, and without paying a regular subscription fee watch free-to-air channels.    &lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, similar to toll-free numbers, these free-to-air channels are     free-to-air on all MSO's set-top boxes, unlike the proposed Airtel Zero scheme under which access to a site like Flipkart would be free for customers on     Airtel's network alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, these comparisons, while useful in helping think through the regulatory and competition issues, &lt;i&gt;should not&lt;/i&gt; be used as instructive exact     analogies, since they aren't fully comparable situations.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.pyn97x5b6nfq"&gt;&lt;/a&gt; 3.3.3.1.5 Market Options for OTT-Paid Zero-Rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;As noted above, a competitive marketplace already exists for wholesale data purchase at the level of "content ISPs" (including CDNs), which sell wholesale     data to content providers (OTTs). This market is at present completely unregulated. The deals that exist are treated as commercial secrets. It is almost     certain that large OTTs get better rates than small startups due to economies of scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, at the eyeball ISP level, it is a single-sided market with ISPs competing to gain customers in the form of end-users. With a scheme like "Airtel     Zero", this would get converted into a double-sided market, with a gatekeeper without whom neither side can reach the other being in the middle creating a     two-sided toll. This situation is ripe for market abuse: this situation allows the gatekeeper to hinder access to those OTTs that don't pay the requisite     toll or to provide preferential access to those who pay, apart from providing an ISP the opportunity to "double-dip".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way to fix this is to prevent ISPs from establishing a double-sided market. The other way would be to create a highly-regulated market where the     gatekeeping powers of the ISP are diminished, and the ISP's ability to leverage its exclusive access over its customers are curtailed. A comparison may be     drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to     them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being     even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus     even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP     innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot     discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other     telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would     enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure     that this doesn't lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs,     and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring     transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need     be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single     marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having     exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for     free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it     doesn't there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all forms of competitive Internet service-paid zero-priced zero-rating, even when they don't harm competition, innovation amongst content     providers, or consumers, will necessarily harm openness and diversity of the Internet. For instance, while richer companies with a strong presence in India     may pay to zero-rate traffic for their Indian customers, decentralized technologies such as XMPP and WebRTC, having no central company behind them, would     not, leading to customers preferring proprietary networks and solutions to such open technologies, which in turn, thanks to the network effect, leads to a     vicious cycle.     &lt;b&gt; These harms to openness and diversity have to be weighed against the benefit in terms of increase in access when deciding whether to allow for         competitive OTT-paid zero-priced zero-rating, as such competition doesn't exist in a truly level playing field &lt;/b&gt; . Further, it must be kept in mind that there are forms of zero-priced zero-rating that decrease the harm to openness / diversity, or completely remove     that harm altogether: that there are other options available must be acknowledged by the regulator when considering the benefit to access from competitive     OTT-paid zero-priced zero-rating.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.huy1gfie05he"&gt;&lt;/a&gt; 3.3.3.1.6 Other options for zero-rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There are other models of zero-priced zero-rating that either minimize the harm is that of ensuring free Internet access for every person. This can take     the form of:&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● A mandatorily "leaky" 'walled garden':&lt;/p&gt;
&lt;p&gt;○ The first-degree of all hyperlinks from the zero-rated OTT service are also free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers during specified     hours.&lt;/p&gt;
&lt;p&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers based on amount     on usage of the OTT service.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● Zero-rating of all Web traffic&lt;/p&gt;
&lt;p&gt;○ In exchange for viewing of advertisements&lt;/p&gt;
&lt;p&gt;○ In exchange for using a particular Web browser&lt;/p&gt;
&lt;p&gt;○ At low speeds on 3G, or on 2G.&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.ncpm1d9hru2b"&gt;&lt;/a&gt; 3.3.3.2. What kinds of zero-rating are good&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The majority of the forms of zero-rating covered in this section are content or source/destination-based zero-rating. Only some of the options covered in     the "other options for zero-rating" section cover content-agnostic zero-rating models. Content-agnostic zero-rating models are not harmful, while     content-based zero-rating models always harm, though to varying degrees, the openness of the Internet / diversity of OTTs, and to varying degrees increase     access to Internet-based services. Accordingly, here is an hierarchy of desirability of zero-priced zero-rating, from most desirable to most harmful:&lt;/p&gt;
&lt;p&gt;1. Content- &amp;amp; source/destination-agnostic zero-priced zero-rating.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. Content- &amp;amp; source/destination-based non-zero-priced zero-rating, without any commercial deals, chosen freely &amp;amp; paid for by users.    &lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. Content- &amp;amp; source/destination-based zero-priced zero-rating, without any commercial deals, with full transparency.    &lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of commercial deal with partial zero-priced access to all content, with     non-discriminatory access to the same deal by all with full transparency.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of a non-commercial deal, without any benefits monetary or otherwise, flowing directly or indirectly from the provider of the zero-rated content to the ISP, with full transparency.    &lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Content- &amp;amp; source-destination-based zero-priced zero-rating, across all telecom networks, with standard pricing, non-discriminatory access, and full     transparency.&lt;/p&gt;
&lt;p&gt;7. Content- &amp;amp; source-destination-based zero-priced zero-rating, with standard pricing, non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;8. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;9. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and transparency to the regulator.&lt;/p&gt;
&lt;p&gt;10. Content- &amp;amp; source-destination-based zero-priced zero-rating, without any regulatory framework in place.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.f8vwrsnhu1fj"&gt;&lt;/a&gt; 3.3.4 Cartels and Oligopoly&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While cartels and oligopolies may have an impact on Net Neutrality, they are not problems that any set of anti-discrimination rules imposed on gatekeepers     can fix. Further, cartels and oligopolies don't directly enhance the ability of gatekeepers to unjustly discriminate if there are firm rules against     negative discrimination and price ceilings and floors on data caps are present for data plans. Given this, TRAI should recommend that this issue be     investigated and the Competition Commission of India should take this issue up.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.1ckcvcwez55d"&gt;&lt;/a&gt; &lt;b&gt;3.4 Reasonable Network Management Principles&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Reasonable network management has to be allowed to enable the ISPs to manage performance and costs on their network. However, ISPs may not indulge in acts     that are harmful to consumers in the name of reasonable network management. Below are a set of guidelines for when discrimination against classes of     traffic in the name of network management are justified.&lt;/p&gt;
&lt;p&gt;● Discrimination between classes of traffic for the sake of network management should only be permissible if:&lt;/p&gt;
&lt;p&gt;○ there is an intelligible differentia between the classes which are to be treated differently, and&lt;/p&gt;
&lt;p&gt;○ there is a rational nexus between the differential treatment and the aim of such differentiation, and&lt;/p&gt;
&lt;p&gt;○ the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical     limitation outside the control of the ISP&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and&lt;/p&gt;
&lt;p&gt;○ the network management practice is the least harmful manner in which to achieve the aim.&lt;/p&gt;
&lt;p&gt;● Provision of specialized services (i.e., "fast lanes") is permitted if and only if it is shown that&lt;/p&gt;
&lt;p&gt;○ The service is available to the user only upon request, and not without their active choice, and&lt;/p&gt;
&lt;p&gt;○ The service cannot be reasonably provided with "best efforts" delivery guarantee that is available over the Internet, and hence requires     discriminatory treatment, or&lt;/p&gt;
&lt;p&gt;○ The discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are only applicable at the level of ISPs, and not on access gateways for institutions that may in some cases be run by ISPs (such as a     university network, free municipal WiFi, at a work place, etc.), which are not to be regulated as common carriers.&lt;/p&gt;
&lt;p&gt;These principles may be applied on a case-by-case basis by a regulator, either &lt;i&gt;suo motu&lt;/i&gt; or upon complaint by customers.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Report of the &lt;i&gt;Special Rapporteur on the Promotion and Protection of the right to freedom of opinion and expression, &lt;/i&gt;(19 May 2011),             http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at http://www.trai.gov.in/WriteReadData/userfiles/file/NTP%202012.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; IAMAI, &lt;i&gt;India to Cross 300 million internet users by Dec 14, &lt;/i&gt;(19 November, 2014),             http://www.iamai.in/PRelease_detail.aspx?nid=3498&amp;amp;NMonth=11&amp;amp;NYear=2014.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; World Economic Forum, &lt;i&gt;The Global Information Technology Report 2015, &lt;/i&gt;http://www3.weforum.org/docs/WEF_Global_IT_Report_2015.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ictregulationtoolkit.org/4.1#s4.1.1&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; R.U.S. Prasad, &lt;i&gt;The Impact of Policy and Regulatory Decisions on Telecom Growth in India&lt;/i&gt; (July 2008),             http://web.stanford.edu/group/siepr/cgi-bin/siepr/?q=system/files/shared/pubs/papers/pdf/SCID361.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1973 AIR 106&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1962 AIR 305&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "When ISPs go beyond their traditional use of IP headers to route packets, privacy risks begin to emerge." Alissa Cooper,            &lt;i&gt;How deep must DPI be to incur privacy risk? &lt;/i&gt;http://www.alissacooper.com/2010/01/25/how-deep-must-dpi-be-to-incur-privacy-risk/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Richard T.B. Ma &amp;amp; Vishal Misra, &lt;i&gt;The Public Option: A Non-Regulatory Alternative to Network Neutrality&lt;/i&gt;,             http://dna-pubs.cs.columbia.edu/citation/paperfile/200/netneutrality.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mobile number portability was launched in India on January 20, 2011 in the Haryana circle. See             &lt;a href="http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html"&gt; http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html &lt;/a&gt; . Accessed on April 24, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For a comprehensive list of all TRAI interconnection regulations &amp;amp; subsequent amendments, see             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Interconnection Usage Charges (Eleventh Amendment) Regulations, 2015 (1 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 30 of the Universal Service Directive, Directive 2002/22/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Mobile Number Portability (Sixth Amendment) Regulations, 2015 (3 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Seventh) (The Direct to Home Services) Tariff Order, 2015 (2 of 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8, Cable Television Networks Act, 1995.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;TRAI writes new rules for Cable TV, Channels, Consumers, &lt;/i&gt; REAL TIME NEWS, (August 11, 2014), http://rtn.asia/rtn/233/1220_trai-writes-new-rules-cable-tv-channels-consumers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; An initial requirement for all multi system operators to have a minimum capacity of 500 channels was revoked by the TDSAT in 2012. For more             details, see http://www.televisionpost.com/cable/msos-not-required-to-have-500-channel-headends-tdsat/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aparna Ghosh, &lt;i&gt;Bharti SoftBank Invests $14 million in Hike, &lt;/i&gt;LIVE MINT, (April 2, 2014),             http://www.livemint.com/Companies/nI38YwQL2eBgE6j93lRChM/Bharti-SoftBank-invests-14-million-in-mobile-messaging-app.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Masnick, &lt;i&gt;Can We Kill This Ridiculous Shill-Spread Myth That CDNs Violate Net Neutrality? They Don't&lt;/i&gt;,             https://www.techdirt.com/articles/20140812/04314528184/can-we-kill-this-ridiculous-shill-spread-myth-that-cdns-violate-net-neutrality-they-dont.shtml.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mathew Carley, What is Hayai's stance on "Net Neutrality"?, https://www.hayai.in/faq/hayais-stance-net-neutrality?c=mgc20150419&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helani Galpaya &amp;amp; Shazna Zuhyle, &lt;i&gt;South Asian Broadband Service Quality: Diagnosing the Bottlenecks&lt;/i&gt;,             http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1979928&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; DTH players told to offer pay channels on la carte basis, HINDU BUSINESS LINE (July 22, 2010),             http://www.thehindubusinessline.com/todays-paper/dth-players-told-to-offer-pay-channels-on-la-carte-basis/article999298.ece.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Fourth) (Addressable Systems) Tariff Order, 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These suggestions were provided by Helani Galpaya and Sunil Abraham, based in some cases on existing practices.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is what is being followed by the Jana Loyalty Program:             &lt;a href="http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/"&gt; http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: free Internet access at low speeds, with data caps.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: special "packs" for specific services like WhatsApp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: zero-rating of all locally-peered settlement-free traffic.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: "leaky" walled gardens, such as the Jana Loyalty Program that provide limited access to all of the Web alongside access to the zero-rated             content.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: Wikipedia Zero.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A CGNAT would be an instance of such a technology that poses network limitations.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2015-07-18T02:46:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check">
    <title>India’s digital check</title>
    <link>https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check</link>
    <description>
        &lt;b&gt;All nine pillars of Digital India directly correlate with policy research conducted at the Centre for Internet and Society, where I have worked for the last seven years. This allows our research outputs to speak directly to the priorities of the government when it comes to digital transformation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.dnaindia.com/analysis/column-india-s-digital-check-2102575"&gt;published by DNA&lt;/a&gt; on July 8, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Broadband Highways and Universal Access to Mobile Connectivity: The  first two pillars have been combined in this paragraph because they both  require spectrum policy and governance fixes. Shyam Ponappa, a  distinguished fellow at our Centre calls for the leveraging of shared  spectrum and also shared backhaul infrastructure. Plurality in spectrum  management, for eg, unlicensed spectrum should be promoted for  accelerating backhaul or last mile connectivity, and also for community  or local government broadband efforts. Other ideas that have been  considered by Ponappa include getting state owned telcos to exit  completely from the last mile and only focus on running an open access  backhaul through Bharat Broadband Limited. Network neutrality  regulations are also required to mitigate free speech, diversity and  competition harms as ISPs and TSPs innovate with business models such as  zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public Internet Access Programme: Continuing investments into Common  Service Centres (CSCs) for almost a decade may be questionable and  therefore a citizen’s audit should be undertaken to determine how the  programme may be redesigned. The reinventing of post offices is very  welcome, however public libraries are also in need urgent reinventing.  CSCs, post offices and public libraries should all leverage long range  WiFi for Internet and intranet, empowering BYOD [Bring Your Own Device]  users. Applications will take time to develop and therefore immediate  emphasis should be on locally caching Indic language content. State &lt;a href="http://www.dnaindia.com/topic/public-library-acts"&gt;Public Library Acts&lt;/a&gt; need to be amended to allow for borrowing of digital content. Flat-fee  licensing regimes must be explored to increase access to knowledge and  culture. Commons-based peer production efforts like Wikipedia and  Wikisource need to be encouraged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Governance: Reforming Government through Technology: DeitY, under the  leadership of free software advocate Secretary RS Sharma, has  accelerated adoption and implementation of policies supporting  non-proprietary approaches to intellectual property in e-governance.  Policies exist and are being implemented for free and open source  software, open standards and electronic accessibility for the disabled.  The proprietary software lobby headed by Microsoft and industry  associations like &lt;a href="http://www.dnaindia.com/topic/nasscom"&gt;NASSCOM&lt;/a&gt; have tried to undermine these policies but have failed so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should continue to resist such pressures. Universal  adoption of electronic signatures within government so that there is a  proper audit trail for all communications and transactions should be  made an immediate priority. Adherence to globally accepted data  protection principles such as minimisation via “form simplification and  field reduction” for Digital India should be applauded. But on the other  hand the mandatory requirement of Aadhaar for DigiLocker and eSign  amounts to contempt of the Supreme Court order in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Kranti — Electronic Delivery of Services: The 41 mission mode projects  listed are within the top-down planning paradigm with a high risk of  failure — the funds reserved for these projects should instead be  converted into incentives for those public, private and public private  partnerships that accelerate adoption of e-governance. The dependency on  the National Informatics Centre (NIC) for implementation of &lt;a href="http://www.dnaindia.com/topic/e-governance"&gt;e-governance&lt;/a&gt; needs to be reduced, SMEs need to be able to participate in the  development of e-governance applications. The funds allocated for this  area to DeitY have also produced a draft bill for Electronic Services  Delivery. This bill was supposed to give RTI-like teeth to e-governance  service by requiring each government department and ministry to publish  service level agreements [SLAs] for each of their services and  prescribing punitive action for responsible institutions and individuals  when there was no compliance with the SLAs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information for All: The open data community and the Right to  Information movement in India are not happy with the rate of  implementation of National Data Sharing and Accessibility Policy  (NDSAP). Many of the datasets on the Open Data Portal are of low value  to citizens and cannot be leveraged commercially by enterprise.  Publication of high-value datasets needs to be expedited by amending the  proactive disclosure section of the Right to Information Act 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronics Manufacturing: Mobile patent wars have begun in India with  seven big ticket cases filed at the Delhi High Court. Our Centre has  written an open letter to the previous minister for HRD and the current  PM requesting them to establish a device level patent pool with a  compulsory license of 5%. Thereby replicating India’s success at  becoming the pharmacy of the developing world and becoming the lead  provider of generic medicines through enabling patent policy established  in the 1970s. In a forthcoming paper with Prof Jorge Contreras, my  colleague Rohini Lakshané will map around fifty thousand patents  associated with mobile technologies. We estimate around a billion USD  being collected in royalties for the rights-holders whilst eliminating  legal uncertainties for manufacturers of mobile technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT for Jobs: Centralised, top-down, government run human resource  development programmes are not useful. Instead the government needs to  focus on curriculum reform and restructuring of the education system.  Mandatory introduction of free and open source software will give Indian  students the opportunity to learn by reading world-class software. They  will then grow up to become computer scientists rather than computer  operators. All projects at academic institutions should be contributions  to existing free software projects — these projects could be global or  national, for eg, a local government’s e-governance application. The  budget allocated for this pillar should instead be used to incentivise  research by giving micro-grants and prizes to those students who make  key software contributions or publish in peer-reviewed academic journals  or participate in competitions. This would be a more systemic approach  to dealing with the skills and knowledge deficit amongst Indian software  professionals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early Harvest Programmes: Many of the ideas here are very important. For  example, secure email for government officials — if this was developed  and deployed in a decentralised manner it would prevent future  surveillance of the Indian government by the NSA. But a few of the other  low-hanging fruit identified here don’t really contribute to  governance. For example, biometric attendance for bureaucrats is just  glorified bean-counting — it does not really contribute to more  accountability, transparency or better governance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author works for the Centre for Internet and Society which  receives funds from Wikimedia Foundation that has zero-rating alliances  with telecom operators in many countries across the world&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check'&gt;https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2015-09-15T14:55:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions">
    <title>Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions</link>
    <description>
        &lt;b&gt;This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Note:- This analysis is a part of a larger attempt at formulating a model anti-spam law for India by analyzing the existing spam laws across the world.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;CAN-SPAM Act, 2003&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Act, 2003 (Australia)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Control Act, 2007 (Singapore)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Canada's Anti-Spam Legislation, 2014&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;The Privacy and Electronic Communications (EC Directive) Regulations, 2003&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;(United Kingdom)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The defendant must be either an inhabitant of the United States or have a physical place of business in the US.[1]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have an "Australian link" i.e.&lt;/p&gt;
&lt;p&gt;(a) the message originates in Australia; or&lt;/p&gt;
&lt;p&gt;(b) the individual or organisation who sent the message, or&lt;/p&gt;
&lt;p&gt;authorised the sending of the message, is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation whose central management and control&lt;/p&gt;
&lt;p&gt;is in Australia when the message is sent; or&lt;/p&gt;
&lt;p&gt;(c) the computer, server or device that is used to access the&lt;/p&gt;
&lt;p&gt;message is located in Australia; or&lt;/p&gt;
&lt;p&gt;(d) the relevant electronic account-holder is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is&lt;/p&gt;
&lt;p&gt;Spam Act, 2003, § 7&lt;/p&gt;
&lt;p&gt;Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p&gt;Canada's Anti-Spam Legislation, 2014, §accessed; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation that carries on business or activities in&lt;/p&gt;
&lt;p&gt;Australia when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address does not exist-assuming that the&lt;/p&gt;
&lt;p&gt;electronic address existed, it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, server&lt;/p&gt;
&lt;p&gt;or device located in Australia.[2]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have a "Singapore link"&lt;/p&gt;
&lt;p&gt;An electronic message has a Singapore link in the following circumstances:&lt;/p&gt;
&lt;p&gt;(a) the message originates in Singapore;&lt;/p&gt;
&lt;p&gt;(b) the sender of the message is -&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an entity whose central management and control is in Singapore when the message is sent;&lt;/p&gt;
&lt;p&gt;© the computer, mobile telephone, server or device that is used to access the message is located in Singapore;&lt;/p&gt;
&lt;p&gt;the recipient of the message is-&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(ii)an entity that carries on business or activities in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address has ceased to exist (assuming that the electronic address existed), it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, mobile telephone, server or device located in Singapore.[3]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Extends to cases where the mail originates in a foreign state but is accessed in Canada&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6 of the CASL prohibits the sending of unsolicited CEMs.[4]&lt;/p&gt;
&lt;p&gt;As per Section 12 of the CASL, A person contravenes section 6 only if a computer system located in Canada is used to send &lt;i&gt;or&lt;/i&gt; access the electronic message.&lt;/p&gt;
&lt;p&gt;CASL applies to CEMs sent from, or accessed in, Canada.[5]&lt;/p&gt;
&lt;p&gt;So, if a CEM is sent to Canadians from another jurisdiction, CASL will apply. Notably, there is an exception where the person sending the 					message "reasonably believes" that the message will be accessed in one of a list&lt;/p&gt;
&lt;p&gt;of prescribed jurisdictions with anti-spam laws thought to&lt;/p&gt;
&lt;p&gt;be 'substantially similar' to CASL and the message complies with the laws of that jurisdiction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;European Union&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;These regulations can be enforced against a person or a company anywhere in the European Union who violates the regulations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Definition Of Spam&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic mail"[6], where&lt;/p&gt;
&lt;p&gt;a commercial electronic mail is "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a 					commercial product or service"[7]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic messages" where electronic message means a message sent "using an internet carriage service or any other 					listed carriage service; and to an electronic address in connection with: an e-mail account; or an instant messaging account; or a 					telephone&lt;/p&gt;
&lt;p&gt;account; or a similar accounts."[8]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic message sent in bulk", where&lt;/p&gt;
&lt;p&gt;a CEM is &lt;i&gt;unsolicited&lt;/i&gt; if the recipient did not-&lt;/p&gt;
&lt;p&gt;i) request to receive the message; or&lt;/p&gt;
&lt;p&gt;ii)consent to the receipt of the message;[9] and&lt;/p&gt;
&lt;p&gt;CEMs shall be deemed to be sent in bulk if a person sends, causes to be sent or authorizes the sending of-&lt;/p&gt;
&lt;p&gt;a) more than 100 messages containing the same subject matter during a 24-hour period;&lt;/p&gt;
&lt;p&gt;b) more than 1,000 messages containing the same subject matter during a 30-day period;&lt;/p&gt;
&lt;p&gt;c) more than 10,000 messages containing the same subject matter during a one-year period.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic message"[10]&lt;/p&gt;
&lt;p&gt;where, an "electronic message" means a message sent by any means of telecommunication, including a text, sound, voice or image message.[11]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These rules apply to all unsolicited direct marketing communications by automatic call machines[12], fax[13], calls[14] or e-mail[15].&lt;/p&gt;
&lt;p&gt;Where, "direct marketing" is defined as "the communication (by whatever means) of any advertising or marketing material which is directed 					to particular individuals"[16]&lt;/p&gt;
&lt;p&gt;The UK used its discretion to include voice-to-voice telephone calls as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;&lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message provides-&lt;/p&gt;
&lt;p&gt;(i)clear and conspicuous identification that the message is an advertisement or solicitation;&lt;/p&gt;
&lt;p&gt;(ii)clear and conspicuous notice of the opportunity under paragraph (3) to decline to receive further commercial electronic mail messages 					from the sender; and&lt;/p&gt;
&lt;p&gt;(iii) a valid physical postal address of the sender.[17]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 16 prohibits the sending of unsolicited commercial electronic messages. However, where a recipient has consented to the sending of 					the message, the said prohibition does not apply.[18]&lt;/p&gt;
&lt;p&gt;Consent means:&lt;/p&gt;
&lt;p&gt;(a) express consent; or&lt;/p&gt;
&lt;p&gt;(b) consent that can reasonably be inferred from:&lt;/p&gt;
&lt;p&gt;(i) the conduct; and&lt;/p&gt;
&lt;p&gt;(ii) the business and other relationships;&lt;/p&gt;
&lt;p&gt;of the individual or organisation concerned.[19]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message contains-&lt;/p&gt;
&lt;p&gt;1 a) an electronic mail address, an Internet location address, a telephone number, a facsimile number or a postal address that the 					recipient may use to submit an unsubscribe request; and&lt;/p&gt;
&lt;p&gt;b) a statement the above information may be utilized to send an unsubscribe request.&lt;/p&gt;
&lt;p&gt;2. Where the unsolicited CEM is received by text or multimedia message sent to a mobile telephone number, the CEM must include a mobile 					telephone number to which the recipient may send an unsubscribe request. [20]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the CASL, it is prohibited to send or cause or permit to be sent to an electronic address a commercial electronic message unless,&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person to whom the message is sent has consented to receiving it, whether the consent is express or implied; &lt;i&gt;and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;)&lt;/p&gt;
&lt;p&gt;The message must-&lt;/p&gt;
&lt;p&gt;(i) set out prescribed information that identifies the person who sent the message and the person - if different - on whose behalf it is 					sent;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;ii&lt;/i&gt;) set out information enabling the person to whom the message is sent to readily contact one of the persons referred to in 					paragraph&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;i&lt;/i&gt;); and&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;iii)&lt;/i&gt; set out an unsubscribe mechanism in accordance with subsection 11(1) of CASL.[21]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Under Section 19&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, communications comprising recorded matter for direct marketing 					purposes by means of an automated calling system except in the circumstances where the called line is that of a subscriber who has 					previously notified the caller that &lt;i&gt;for the time being he consents to such communications&lt;/i&gt; being sent by, or at the instigation of, 					the caller on that line.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 20&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, unsolicited communications for direct marketing purposes by means of 					a facsimile machine where the called line is that of an individual or a company except in the circumstances where the individual subscriber 					has previously notified the caller that he consents for the time being to such communications being sent by, or at the instigation of, the 					caller.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 21,&lt;/b&gt; A person shall neither use, nor instigate the use of, a public electronic communications service for the purposes of making unsolicited calls for direct marketing purposes where the called line is that of a subscriber who has					&lt;i&gt;previously notified the caller that such calls should not for the time being be made on that line&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 22&lt;/b&gt; , a person shall neither transmit, nor instigate the transmission of, unsolicited communications for the purposes of direct marketing by means of electronic mail unless the recipient of the electronic mail has previously notified the sender that					&lt;i&gt;he consents for the time being to such communications being sent by, or at the instigation of, the sender.&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Labelling Requirements&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Warning Labels mandatory on e-mails containing pornographic content&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;No person may send to a protected computer, any commercial electronic mail message that includes sexually oriented material and-&lt;/p&gt;
&lt;p&gt;(a) fail to include in subject heading for the electronic mail message the marks or notices prescribed by the law; or&lt;/p&gt;
&lt;p&gt;(B) fail to provide that the matter in the message&lt;/p&gt;
&lt;p&gt;that is initially viewable to the recipient, when the message is opened by any recipient and absent any further actions by the recipient, 					includes only-&lt;/p&gt;
&lt;p&gt;(i) material which the recipient has consented to;&lt;/p&gt;
&lt;p&gt;(ii) the identifier information required to be included in pursuance Section 5(5); and&lt;/p&gt;
&lt;p&gt;(iii) Instructions on how to access, or a mechanism to access, the sexually oriented material.[22]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;True e-mail title and clear identification of advertisements with "ADV" label&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Every unsolicited CEM must contain-&lt;/p&gt;
&lt;p&gt;a) where there is a subject field, a title which is not false or misleading as to the content of the message;&lt;/p&gt;
&lt;p&gt;b) the letters "&amp;lt;ADV&amp;gt;" with a space before the title in the subject field or if there is no subject field, in the words first 					appearing in the message to clearly identify that the message is an advertisement;&lt;/p&gt;
&lt;p&gt;c) header information that is not false or misleading; and&lt;/p&gt;
&lt;p&gt;d) an accurate and functional e-mail address or telephone number by which the sender can be readily contacted.[23]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Other Banned/Restricted Activities&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Illegal Access-&lt;/i&gt; &lt;i&gt;Prohibition Against Predatory and Abusive Commercial E-Mail-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"Whoever, in or affecting interstate or foreign&lt;/p&gt;
&lt;p&gt;commerce, knowingly-&lt;/p&gt;
&lt;p&gt;(1) accesses a protected computer without authorization, and intentionally initiates the transmission of multiple CEMs from or through such 					computer,&lt;/p&gt;
&lt;p&gt;(2) uses a protected computer to relay or retransmit multiple&lt;/p&gt;
&lt;p&gt;CEMs, with the intent to&lt;/p&gt;
&lt;p&gt;deceive or mislead recipients, or any Internet access service, as to the origin of such messages,&lt;/p&gt;
&lt;p&gt;(3) &lt;i&gt;materially falsifies header information&lt;/i&gt; in multiple commercial electronic mail messages and intentionally initiates&lt;/p&gt;
&lt;p&gt;the transmission of such messages,&lt;/p&gt;
&lt;p&gt;(4) registers, using information that materially &lt;i&gt;falsifies the identity of the actual registrant,&lt;/i&gt; for five or more electronic mail 					accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple&lt;/p&gt;
&lt;p&gt;commercial electronic mail messages from any combination of such accounts or domain names, or&lt;/p&gt;
&lt;p&gt;(5) falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet 					Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses, or 					conspires to do so, shall be punished as provided for in the Act.[24]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Supply of address harvesting software and harvested‑address lists &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"A person must not supply or offer to supply:&lt;/p&gt;
&lt;p&gt;(a) address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(b) a right to use address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(c) a harvested address list; or&lt;/p&gt;
&lt;p&gt;(d) a right to use a harvested‑address list;&lt;/p&gt;
&lt;p&gt;to another person if:&lt;/p&gt;
&lt;p&gt;(e) the supplier is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(f) the customer is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer."&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Dictionary Attacks and Address harvesting software&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"No person shall send, cause to be sent, or authorize the sending of, an electronic message to electronic addresses generated or obtained 					through the use of-&lt;/p&gt;
&lt;p&gt;a) a dictionary attack;&lt;/p&gt;
&lt;p&gt;b) address harvesting software.[25]&lt;/p&gt;
&lt;p&gt;Where,&lt;/p&gt;
&lt;p&gt;"dictionary attack" means the method which by which the electronic address of a recipient is obtained using an automated means that 					generates possible electronic addresses by combining names, letters, numbers, punctuation marks or symbols into numerous permutations.[26] 					And,&lt;/p&gt;
&lt;p&gt;"address harvesting software" means software that is specifically designed or marketed for use for-&lt;/p&gt;
&lt;p&gt;a)searching the Internet for electronic addresses; and,&lt;/p&gt;
&lt;p&gt;b) collecting, compiling, capturing or otherwise harvesting those electronic addresses."[27]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Altering Transmission Data&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"It is prohibited, in the course of a commercial activity, to alter or cause to be altered the transmission data in an electronic message 					so that the message is delivered to a destination other than or in addition to that specified by the sender, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the alteration is made with the express consent of the sender or the person to whom the message is sent, and the person 					altering or causing to be altered the data complies with subsection 11(4) of CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the alteration is made in accordance with a court order.[28]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Installation of Computer Program&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person must not, in the course of a commercial activity, install or cause to be installed a computer program on any other person's 					computer system or, having so installed or caused to be installed a computer program, cause an electronic message to be sent from that 					computer system, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person has obtained the express consent of the owner or an authorized user of the&lt;/p&gt;
&lt;p&gt;computer system and complies with subsection 11(5) of the CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the person is acting in accordance with a court order.&lt;/p&gt;
&lt;p&gt;(2) A person contravenes subsection (1) only if the computer system is located in Canada at the relevant time or if the person either is in 					Canada at the relevant time or is acting under the direction of a person who is in Canada at the time when they give the directions."[29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic mail for direct marketing purposes where the identity or address of the sender is concealed&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person shall neither transmit, nor instigate the transmission of, a communication for the purposes of direct marketing by means of 					electronic mail-&lt;/p&gt;
&lt;p&gt;(a) where the identity of the person on whose behalf the communication has been sent has been disguised or concealed; or&lt;/p&gt;
&lt;p&gt;(b)where a valid address to which the recipient of the communication may send a request that such communications cease has not been 					provided.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Types of Senders Covered&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;the term ''sender'', when used with respect to a commercial electronic mail message, means a person who initiates such a message and whose 					product, service, or Internet web site is advertised or promoted by the message."[30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person must not &lt;i&gt;send&lt;/i&gt;, or &lt;i&gt;cause to be sent&lt;/i&gt;, a commercial electronic message that:&lt;/p&gt;
&lt;p&gt;(a) has an Australian link; and&lt;/p&gt;
&lt;p&gt;(b) is not a designated commercial electronic message.[31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers,&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;beneficiaries, and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;providers of support&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;services&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"sender" means a person who sends a message, causes the message to be sent, or authorizes the sending of the message.[32]&lt;/p&gt;
&lt;p&gt;Further, persons aiding or abetting the offences under Section 9 or 11 are also punishable under the Act.[33]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Under Section 6, it is prohibited to &lt;i&gt;send&lt;/i&gt; or &lt;i&gt;cause or permit to be sent&lt;/i&gt; to an electronic address a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 7, It is prohibited, in the course of a commercial activity, to &lt;i&gt;alter or cause to be altered&lt;/i&gt; the transmission data 					in a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 8, A person must not, in the course of a commercial activity, &lt;i&gt;install or cause to be installed&lt;/i&gt; a computer program on 					any other person's computer system or, &lt;i&gt;having so installed or caused to be installed&lt;/i&gt; a computer program, cause an electronic 					message to be sent from&lt;/p&gt;
&lt;p&gt;that computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The texts of Sections 19, 20, 21 and 22 all prohibit the transmission as well as the instigation of the transmission of, communications for 					direct marketing purposes without the consent of the recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Who Can Sue&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;FTC[34], Attorney Generals[35], ISPs and IAPs[36] and most recently even companies/private entities[37]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Australian Communications and Media Agency (ACMA)[38]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[39]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[40]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who suffers damage by reason of any contravention of any of the requirements of these Regulations.[41]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Transactional or Relationship Messages&lt;/i&gt; [42]&lt;/p&gt;
&lt;p&gt;where,&lt;/p&gt;
&lt;p&gt;The term ''transactional or relationship&lt;/p&gt;
&lt;p&gt;message'' means an electronic mail message the primary purpose of which is-&lt;/p&gt;
&lt;p&gt;(i) to facilitate, complete, or confirm a commercial&lt;/p&gt;
&lt;p&gt;transaction;&lt;/p&gt;
&lt;p&gt;(ii) to provide warranty information, product recall information, etc. with respect to a commercial product or service used or purchased by 					the recipient;&lt;/p&gt;
&lt;p&gt;(iii) to provide notifications-&lt;/p&gt;
&lt;p&gt;(I) concerning a change in the terms or features of;&lt;/p&gt;
&lt;p&gt;(II) of a change in the recipient's standing or status with respect to; or&lt;/p&gt;
&lt;p&gt;(III) information with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship involving the&lt;/p&gt;
&lt;p&gt;ongoing purchase or use by the recipient of products or services offered by the sender;&lt;/p&gt;
&lt;p&gt;(iv) to provide information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, participating,&lt;/p&gt;
&lt;p&gt;or enrolled; or&lt;/p&gt;
&lt;p&gt;(v) to deliver goods or services, including product updates or upgrades, that the recipient is entitled to receive under the terms of a 					transaction that the recipient has previously agreed to enter into with the sender.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Designated Commercial Electronic Message&lt;/i&gt; (DCEM). A DCEM is a message containing &lt;i&gt;purely factual information&lt;/i&gt;, any related comments of non-commercial nature and some limited 					commercial information as to the identity of the sender company/individual.[43]&lt;/p&gt;
&lt;p&gt;A message is a DCEMs if-&lt;/p&gt;
&lt;p&gt;a) the sending of the message is authorized by any of the following bodies:&lt;/p&gt;
&lt;p&gt;(i) a government body;&lt;/p&gt;
&lt;p&gt;(ii) a registered political party;&lt;/p&gt;
&lt;p&gt;(iii) a religious organization;&lt;/p&gt;
&lt;p&gt;(iv) a charity or charitable institution; and&lt;/p&gt;
&lt;p&gt;(b) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(c) the body is the supplier, or prospective supplier, of the goods or services concerned.[44]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Messages from educational institutions:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;an electronic message is a &lt;b&gt;&lt;i&gt;DCEM &lt;/i&gt;&lt;/b&gt;if:&lt;/p&gt;
&lt;p&gt;(a) the sending of the message is authorised by an educational institution; and&lt;/p&gt;
&lt;p&gt;(b) either or both of the following subparagraphs applies:&lt;/p&gt;
&lt;p&gt;(i) the relevant electronic account‑holder is, or has been, enrolled as a student in that institution;&lt;/p&gt;
&lt;p&gt;(ii) a member or former member of the household of the relevant electronic account‑holder is, or has been, enrolled as a student in 					that institution; and&lt;/p&gt;
&lt;p&gt;(c) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(d) the institution is the supplier, or prospective supplier, of the goods or services concerned.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic Messages authorized by the Government&lt;b&gt;[45]&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on 					the occurrence of any public emergency, in the public interest or in the interests of public security or national defence.[46]&lt;/p&gt;
&lt;p&gt;A certificate signed by the Minister shall be conclusive evidence of existence of a public emergency and the other above stated 					matters.[47]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt;Family and Personal relationships, &lt;/i&gt; where &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;"Family relationship" is a relationship between two people related through marriage, a common law partnership, or any legal parent-child 					relationship who have had direct, voluntary two-way communications; and&lt;/p&gt;
&lt;p&gt;"personal relationship" means a relationship between two people who have had direct, voluntary two-way communications where it would be 					reasonable to conclude that the relationship is personal.[48]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt; Mails sent to an individual who practices a particular commercial activity with the mail containing solely an inquiry or 							application related to that activity&lt;b&gt;[49]&lt;/b&gt;. &lt;/i&gt; &lt;/li&gt;
&lt;li&gt; &lt;i&gt;A mail which&lt;/i&gt; - provides a quote or estimate for the supply of a product, goods, a service, etc. if requested by the recipient; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;· facilitates, completes or confirms a commercial transaction that the recipient previously agreed to enter into with the sender;&lt;/p&gt;
&lt;p&gt;· provides warranty information, product recall information etc. about a product, goods or a service that the recipient uses, has used 					or has purchased;&lt;/p&gt;
&lt;p&gt;· provides notification of factual information about-&lt;/p&gt;
&lt;p&gt;(i) the ongoing use or ongoing purchase by the recipient of a product, goods or a service offered under a subscription, membership, 					account, loan or similar relationship by the sender, or&lt;/p&gt;
&lt;p&gt;· provides information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, is currently participating or is currently enrolled;&lt;/p&gt;
&lt;p&gt;· delivers a product, goods or a service, including updates or upgrades, that the recipient is entitled to receive under the terms of 					a transaction that they have previously entered into with the sender.[50]&lt;/p&gt;
&lt;p&gt;· Telecommunications service provider merely because the service provider provides a telecommunications service that enables the 					transmission of the message.[51]&lt;/p&gt;
&lt;p&gt;· CEMs which are two-way voice communication between individuals sent by means of a facsimile or a voice recording sent to a telephone 					account.[52]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A person may send or instigate the sending of electronic mail for the purposes of direct marketing where&lt;/i&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the contact details of the recipient of that electronic mail in the course of the sale or negotiations for the sale of a product or 					service to that recipient;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the direct marketing is in respect of that person's similar products and services only; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the recipient has been given a simple means of refusing (free of charge except for the costs of the transmission of the refusal) the 					use of his contact details for the purposes of such direct marketing, at the time that the details were initially collected, and, where he 					did not initially refuse the use of the details, at the time of each subsequent communication.[53]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil and Criminal&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Statutory damages-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Amount calculated by multiplying the number of violations by up to $250. Total amount of damages may not exceed $2,000,000. [54]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Imprisonment- &lt;/b&gt; upto 5 years.[55]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Forfeiture from the offender, of-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;i) any property, real or personal, constituting or&lt;/p&gt;
&lt;p&gt;traceable to gross proceeds obtained from such offense;&lt;/p&gt;
&lt;p&gt;ii) any equipment, software, or other technology used or intended to be used to commit or to facilitate the commission of such offense.[56]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate with prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 500 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 250 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 10,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 5,000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 20 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 10 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 400 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 200 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person with prior record,&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1,000 penalty units in any other case.[57]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;i) &lt;b&gt;Injunction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Damages-&lt;/b&gt; calculated in terms of loss suffered as a direct or indirect result of the contravention of the Act.&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Statutory Damages&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;not exceeding $25 for each CEM; and not exceeding in the aggregate $1 million, unless the plaintiff proves that his actual loss from such 					CEMs exceeds $1 million.[58]&lt;/p&gt;
&lt;p&gt;iii)Costs of litigation to the plaintiff.[59]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Administrative Monetary Penalty&lt;/b&gt; , the purpose of which is to promote compliance with the Act and not to punish.[60]&lt;/p&gt;
&lt;p&gt;The maximum penalty for a violation is $1,000,000 in the case of an individual, and $10,000,000 in the case of any other person.[61]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil on private action; Criminal for non-compliance with IC's notice&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person who suffers damage by reason of any contravention of any of the requirements of these Regulations by any other person shall be 					entitled to bring proceedings &lt;i&gt;for compensation&lt;/i&gt; from that other person for that damage.[62]&lt;/p&gt;
&lt;p&gt;The enforcement authority for these regulations is Britain's Information Commissioner who oversees both the Act and the Regulations, and 					investigates complaints and makes findings in the form of various types of notices.[63]&lt;/p&gt;
&lt;p&gt;Failure to comply with any notice issued by the Information Commissioner is a criminal offence and is punishable with a fine of upto 					£5000 in England and Wales and £10,000 Scotland.[64]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;THE PROBLEM OF SPAM -WHY IT PERSISTS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per a study conducted by &lt;i&gt;Kaspersky Lab &lt;/i&gt;in 2014, 66.34% of all messages exchanged over the internet were spam.[65] Over the 2000s, several 	countries recognized the threats posed by spam and enacted specific legislations to tackle the same. The ones taken into consideration in this paper are 	the CAN-SPAM Act, 2003 of the United States, Canada's Anti-Spam Legislation, 2014, The Spam Act, 2003 of Australia, Singapore's Spam Control Act, 2007 and 	The Privacy and Electronic Communications (EC Directive) Regulations, 2003 (United Kingdom). As will be analyzed in the course of this paper, none of these 	laws have evolved to become comprehensive mechanisms for combating spam yet. Nevertheless, post the enactment of these laws, spam has reduced as a 	percentage of the net email traffic; however, the absolute quantity of spam has increased owing to the exponential growth of email traffic universally.[66]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who Benefits from Spam?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;Commercial establishments -&lt;/i&gt; Spamming is one of the most cost-effective means of promoting products and services to a large number of potential 	customers. Spams are not necessarily duplicitous and often contain legitimate information to which a fraction of the recipients respond positively. As per 	a recent study, for spam to be profitable, only 1 in 25,000 spam recipients needs to open the email, get enticed, and make a gray-market purchase.[67]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Non-commercial establishments benefitting from advertisements -&lt;/i&gt; Many seemingly non-profit messages benefit from revenue generated through 	advertisements when recipients visit their site. Advertisers pay these sites either per click or per impression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Spammers &lt;/i&gt;- The costs incurred by spammers largely include the cost of e-mail/phone number harvesting and the cost of paying botnet operators. 	As compared to the revenue generated as a percentage of profits earned by the merchant on whose behalf spam messages are sent, these costs are 	negligible.[68]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, spamming proves to be an activity that involves minimal investment and often yields some response from prospective clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The impact of spam is clearly widespread. Presently, India lacks a specific anti-spam legislation. In consideration of the swelling growth of spam across 	the globe and the increasing number of Indian users, it is of utmost urgency that a specific legislation is formulated to tackle the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OBSERVATIONS AND ANALYSIS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Definition of Spam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;'Spam' must be defined in a technologically neutral manner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legislations analyzed in this paper deal with either one or a cluster of modes of communication through which spam may be sent. However, it is 	essential that 'spam' is defined in a manner that is technologically neutral. Most commercial spam is aimed at promoting products and services to a large 	number of prospective customers. Thus, making only spam e-mails illegal, like the CAN-SPAM Act does, fails to address the issue wholly as companies would 	always retain the option of sending unsolicited messages through other communicative devices. It becomes an issue of merely switching modes of 	communication without there being any actual deterrence to spamming. Thus, a narrow understanding of spam, limiting it to one or few modes of 	communication, is problematic and for a model law, a broader definition that discourages unsolicited messages sent via any network is warranted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Non-commercial spam must also be addressed&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The five legislations examined in this paper address only the issue of unsolicited 'commercial' mails/messages. For instance, under the CAN-SPAM, a commercial mail means "	&lt;i&gt;any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service&lt;/i&gt;". 	Singapore's Spam Control Act defines a commercial message in a similar fashion but more elaborately. CASL, while limiting the scope of the law to 	commercial mail, additionally prescribes that such communication need not have a profit motive. Australia's Spam Act defines a commercial message as a 	message that has the purpose of offering, advertising or promoting goods or services or the supplier or prospective supplier of goods or services. Under 	the EC Directive, the term used is 'marketing communication'; however, in essence, it includes only commercial communications.[69] These definitions suffer 	from an obvious exclusion error. It is known from experience that not all unsolicited messages received are in pursuance of commercial interests. Often, 	unsolicited mails and messages are received with explicit sexual content as well as promoting political and religious agendas sent by party volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it would be in higher consonance with the greater aim of curbing spam to broaden the scope of these legislations to address both commercial as well 	as non-commercial messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Bulk requirement and its quantification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Singaporean law makes 'sent in bulk' a mandatory requirement for spam. However, deciding what quantity of a particular message qualifies it as bulk is 	difficult. If an objective threshold is set, say 100 messages in 24 hours, then anything short of that, say even 99 messages, go unaddressed simply because 	it does not meet the statutory requirement of being in bulk. This enables spammers to misuse the law by marginally falling short of the threshold and still 	continuing to spam. The issue here is comparable to the one faced in setting age as bar to criminal culpability. No matter what, any number arrived at is 	likely to be arbitrary and consequently subject of criticism. A possible way to tackle this would be to strengthen the unsubscribe mechanisms by virtue of 	which individuals are able to, at the very least, stop receiving unsolicited mails. For the determination of threshold for State action and its 	feasibility, a much more detailed study is merited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt- out Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Double Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Countries following the model&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States of America and Singapore&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Canada, Australia and the United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;None at present.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;When messages may be sent&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;At all times until recipient voluntarily opts out/unsubscribes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient voluntarily opts-in/subscribes to receive messages by submitting his/her contact details to be part of a 					particular mailing list.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient responds in the affirmative to the confirmation mail sent by the sender on receiving an opt-in request from the 					recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Specific requirements&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The mail/message must bear a clear identifier of its content. E.g. marked as 'ADVT' for advertisements;&lt;/p&gt;
&lt;p&gt;2. An 'unsubscribe' option must be provided in the message which may be utilized by the recipient to express his/her disinterest in the 					message; and&lt;/p&gt;
&lt;p&gt;3. The message must conspicuously bear a valid physical postal address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Promotes commercial speech rights-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Since the default position presumes the right to market, average collection rates are considerably higher as more emails can be sent to 					more people.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Reduction in unsolicited messages-&lt;/i&gt; Commercial messages are not sent until the recipient voluntarily consents to receiving such 					messages by submitting his/her contact information.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;Availability of unsubscribe option-&lt;/i&gt; Even after a recipient voluntarily opts in, he/she still has the right to withdraw from 					such messages by unsubscribing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Ensures people are entering their information correctly, which equals a cleaner list and lowers bounce rates.&lt;/p&gt;
&lt;p&gt;2. Reduces the probability of spam complaints because subscribers have had to take the extra step to confirm their consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disadvantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. This merely places the &lt;i&gt;burden of reduction of spam on the recipients&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;2. The &lt;i&gt;functionality of the 'unsubscribe' link is itself questionable.&lt;/i&gt; Very often these links themselves are fraudulent. In such a 					case, the recipient is further harmed before any opting-out can even take place.&lt;/p&gt;
&lt;p&gt;3. In the absence of any strict regulatory oversight, there exists &lt;i&gt;no&lt;/i&gt; &lt;i&gt;incentive&lt;/i&gt; for the senders to strictly address 					unsubscribe requests.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Consent may be obtained in fact but not in spirit&lt;/i&gt; through inconspicuous pre-ticked check boxes.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;E-mail addresses may be added to a list by spambots&lt;/i&gt;. Where, the person 'opted-in' may not actually be the person opting in.&lt;/p&gt;
&lt;p&gt;3. &lt;i&gt;Errors may be made when entering emails&lt;/i&gt;; a typo may result in someone submitting an address that is not theirs.&lt;/p&gt;
&lt;p&gt;4. Legitimate addresses may be added by someone who does not own the address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Genuine subscribers may not understand clearly the confirmation process and fail to click the verification link.&lt;/p&gt;
&lt;p&gt;2. Confirmation emails may get stuck in spam filters.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The comparison above highlights that the opt-out model as well as the opt-in model may leave loopholes. The opt-in model has been advocated for as the 	better model as compared to the opt-out model as it prohibits the sending of messages unless the recipient consents to receiving such messages. However, as 	pointed out above, in this model consent may be given by entities other than the owner of the contact details. In such a situation, a double opt-in model 	may be a viable option to contemplate as it is the only model where it can be ensured that only the addressee is enabled to successfully opt-in.[70]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the double opt-in model has not been adopted by any of the countries discussed in this paper. Nonetheless, it seems to have the potential to aid 	the fight against spam more effectively than the existing models. Its real efficacy however, shall be proven only on practical implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;Family and Personal Relationships&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the CASL, an exception is made for &lt;i&gt;'personal&lt;/i&gt; &lt;i&gt;relationships'&lt;/i&gt; and &lt;i&gt;'family relationship'&lt;/i&gt;. However, these terms are defined 	quite narrowly. For instance, family relationship is defined as 'a relationship between two people related through marriage, a common law partnership, or 	any legal parent-child relationship and those individuals have had direct, voluntary, two-way communication'.&lt;sup&gt;[71]&lt;/sup&gt; This implies that in a 	situation where an individual wants to send a message offering to sell something to an individual in his extended family, say his cousins, doing so without 	obtaining their consent first, would qualify his mail as spam under the CASL. This would become especially problematic in the Indian context where 	comparatively larger family structures prevail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the anti-spam legislations of the other four countries, no such exceptions are made. Quite obviously, these exceptions are of crucial significance and 	must be provided in any anti-spam legislation; however, it is important that they are defined in a manner such that their actual purpose i.e. of exclusion 	of familial and personal relationships from regulations applicable to spammers, is effectively achieved and the law does not become a creator for 	unnecessary litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Transactional Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term 'transactional messages' is used only under the CAN-SPAM Act of the USA. It basically covers messages sent when the recipient stands in an 	existing transactional relationship with the sender and the mail contains information specific to the recipient. It also includes employment relationships. 	In CASL, a similar exception is made under Section 6(6). The section is worded almost identically as the CAN-SPAM provision, though the term 'transactional 	messages' is not used. In the UK laws, messages for the purpose of direct marketing may be sent where the contact information of the recipient is received 	in the course of the sale or negotiations for the sale of a product or service to that recipient, thus implying an existing transactional relationship. One 	added proviso under the UK law is that the recipient must be clearly and distinctively given the opportunity to object, free of charge and in an easy 	manner, to the use of the e-mail address when collected and on the occasion of each message in case the customer has not initially refused such use.[72]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception for transactional messages is essential to ensure freedom of commercial speech rights even while effectively tackling spam. In the formulation 	of a model law, a combination of the American and the English laws may be workable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Governmental Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Spam Act, 2003 of Australia makes an exemption for &lt;i&gt;'designated commercial electronic message (DCEM)'&lt;/i&gt;. This exemption is to avoid any 	unintended restriction on communication between the government and the community.&lt;sup&gt;[73]&lt;/sup&gt; In order to be a DCEM, a message must-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Be authorized by the government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Contain purely factual information and any related comments of non-commercial nature; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Contain some information as to the identity of the sender company/individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DCEMs need not always be sent by government bodies and may also be sent by third parties authorized by the government.&lt;sup&gt;[74]&lt;/sup&gt; Such messages are 	exempt from the consent requirement as well as the unsubscribe option requirement but must comply with the identifier requirement. However, where 	government bodies are operating in a competitive environment, the provisions of the act would apply normally to them.&lt;sup&gt;[75]&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Singapore's Spam Control Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on the occurrence of any &lt;i&gt;public emergency&lt;/i&gt;, in &lt;i&gt;public interest&lt;/i&gt; or in the &lt;i&gt;interests of public security&lt;/i&gt; or	&lt;i&gt;national defence&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These exemptions are essential in order to enable free communication of important information between the government and the citizens. The Singaporean 	wording of the exception is rather broad and would give the government immense space for misusing the law. Such a wording might be more effective if 	supplemented with the Australian proviso wherein governmental communications operating in a competitive environment are excluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Penalties must be higher than benefit from spamming&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the penalty prescribed itself is too low, such that loss suffered from paying penalties is lower than net benefit from spamming, the spammer is not 	sufficiently deterred. Four out of the five countries analyzed in this paper prescribe only civil penalties in the form of fines for spamming. Recently, a 	Facebook spammer was found to have made a profit of $200 million in a year.[76] For instance, as noted above, the Australian law sets a limit for penalty 	at $1 million. Thus, such a penalty would constitute a small fraction of the profit from spamming and would not deter a spammer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. High penalty does not imply effective deterrence where probability of prosecution is low.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CAN-SPAM Act prescribes the harshest penalties including both civil as well as criminal penalties. However, it has been rather ineffective in reducing spam. This is for the reason that this Act is more about how to spam legally than anything else. It is more like- '	&lt;i&gt;you can spam but do not use false headers&lt;/i&gt;.'[77] As a consequence, unintentional spam from ignorant commercial establishments has reduced. However, 	due to easy compliance standards, the 'real' spammers still go undetected to a large extent.[78] Thus, even moderate penalties may serve as good deterrents 	where the probability of prosecution is high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. Effective enforcement is the key to effective deterrence.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cornerstone of an effective spam law is effective enforcement. Penalties must be enforced in a manner that the cost of punishment is always higher than 	the benefit from spamming and the probability of conviction is high. In order to implement legislative measures effectively, governments should also 	undertake an information campaign on spam issues targeting users, business communities, private sector groups and other stakeholders as the one primary 	reason for sustenance of spam is the response received from certain recipients. Such supplementary activities would also facilitate the preservation of 	commercial rights as excessive penalties could inhibit regular commercial activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The observations made in this paper are crucial to the formulation of a model anti-spam law for India. The most important part of any ant-spam legislation 	would be the definition of 'spam' which, as established above, must be technologically neutral in order to be able to address as much unsolicited 	communication as possible. On the question of consent, a double opt-in is what this paper would propose. This model has been contemplated and recommended 	by academic and policy researchers as a possibly more effective consent model for spam laws; however, it has not been codified as a legal regime till date. 	It could be a rather groundbreaking approach that India could adopt as this clearly is the only model where 'opting-in' is realized in fact and in spirit. 	Further, exceptions are necessary in order to prevent the abuse of laws making certain such exceptions do not suffer from inclusive or exclusion errors. A 	combination of the exceptions under the Australian and the American laws seems ideal at this stage of research. In terms of penalty, this paper observed 	that only prescribing harsh penalties is not sufficient to effectively deter spammers but efficient modes of enforcement have to be formulated to ensure 	actual deterrence. Lastly, while a well-drafted national anti-spam legislation is clearly the need of the hour for India; additional steps have to be taken 	towards sensitizing citizens to the fact that the problem of spam is real and a costly threat to the communications infrastructure of the country and 	combat has to begin at the individual level.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[1] CAN-SPAM Act, § 7706(f) (7).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2] Spam Act, 2003, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Canada's Anti-Spam Legislation, 2014, § 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Canada's Anti-Spam Legislation, 2014, § 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6] 15 U.S.C. § 7701 (2003).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] CAN-SPAM Act, Section 3 (2)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Spam Act, 2003, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Spam Control Act, 2007, § 5(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Canada's Anti-Spam Legislation, 2014, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Canada's Anti-Spam Legislation, 2014, § 1(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Regulation 19, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13] Regulation 20, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Regulation 21, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Regulation 22, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Section 11, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] CAN-SPAM Act, Section 5(5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Spam Act, 2003, § 16(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Spam Act, 2003, Schedule 2 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Spam Control Act, 2007 Section 11, Schedule 2(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Canada's Anti-Spam Legislation, 2014, Section 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] CAN-SPAM Act, 2003, Section 5(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Spam Control Act, 2007, Schedule 2, 3(1), Section 11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Chapter 47 of title 18, U.S.C., § 1037, inserted through an amendment by the CAN-SPAM Act, § 4(a) (1); '§ 5(A)(1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Spam Control Act, 2007, '§ 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Canada's Anti-Spam Legislation, 2014, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29] Canada's Anti-Spam Legislation, 2014, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30] CAN-SPAM Act, 2003, § 3(16)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Spam Act, 2003, Section 16(1), Section 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Spam Control Act, 2007, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Spam Control Act, 2007, § 12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] CAN-SPAM Act, 2003, § 7(a)(c)(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] CAN-SPAM Act, 2003, § 7(f)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] CAN-SPAM Act, 2003, § 7(g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] &lt;i&gt;MySpace, Inc. v. The Globe.com, Inc.&lt;/i&gt;, 2007 WL 1686966 (C.D. Cal., Feb. 27, 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Spam Act, 2003, § 26(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Spam Control Act, 2007, § 13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[40] Canada's Anti-Spam Legislation, § 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[41] Regulation 30(1), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[42] CAN-SPAM Act, 2003, § 3(2)(B)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[43] Spam Act, 2003, Schedule 1, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[44] Spam Act, 2003, Schedule 1, § 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[45] Spam Control Act, 2007, § 7(3)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[46] Spam Control Act, 2007, First Schedule Clause (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[47] Spam Control Act, 2007, First Schedule Clause (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[48] Canada's Anti-Spam Legislation, § 6(5a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[49] Canada's Anti-Spam Legislation, § 6(5b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[50] Canada's Anti-Spam Legislation, § 6(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[51] Canada's Anti-Spam Legislation, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[52] Canada's Anti-Spam Legislation, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[53]Section 22(3), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[54] CAN-SPAM Act, § 7 (f)(3)(A).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[55] CAN-SPAM Act, § 4 (b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[56] CAN-SPAM Act, § 4 (c)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[57] Spam Act, 2003, Sections 24, 25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[58] Spam Control Act, 2007, § 14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[59] Spam Control Act, 2007, § 15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[60] Canada's Anti-Spam Legislation, 2014, § 20(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[61] Canada's Anti-Spam Legislation, 2014, § 20(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[62] Regulation 30(1), EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[63] Regulations 31-32, EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[64] Section 47 and 60, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[65] Spam and Phishing Statistics Report Q1-2014, Kaspersky Lab&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q1-2014#.VVQxNndqN5I (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[66] Snow and Jayakar, Krishna, &lt;i&gt;Can We Can Spam? A Comparison of National Spam Regulations,&lt;/i&gt; August 15, 2013. TPRC 41: The 41st Research Conference 	on Communication, Information and Internet Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[67] Justin Rao and David Reiley, &lt;i&gt;The Economics of Spam, &lt;/i&gt;Vol.&lt;i&gt; &lt;/i&gt;26, No. 3 The Journal of Economic Perspectives (2012), p. 104.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[68] Supra n. 66; p. 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[69] Refer Table in Section 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[70] Dr. Ralph F. Wilson, &lt;i&gt;Spam, Spam Bots, and Double Opt-in E-mail Lists, &lt;/i&gt;April 21, 2010; available at 	http://webmarketingtoday.com/articles/wilson-double-optin/ (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[71] Section 2(a), Electronic Commerce Protection Regulations, http://fightspam.gc.ca/eic/site/030.nsf/eng/00273.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 	2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[72] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[73] &lt;i&gt;Spam Act 2003- A Practical Guide for Government, &lt;/i&gt;Australian Communications Authority, available at- 	http://www.acma.gov.au/webwr/consumer_info/spam/spam_act_pracguide_govt.pdf (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[74] &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[75] &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[76] Charles Arthur, &lt;i&gt;Facebook spammers make $200m just posting links, researchers say, &lt;/i&gt;The Guardian, 28&lt;sup&gt;th&lt;/sup&gt; August 2013, 	http://www.theguardian.com/technology/2013/aug/28/facebook-spam-202-million-italian-research (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[77] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[78] Carolyn Duffy Marsan, &lt;i&gt;CAN-SPAM: What went wrong?, &lt;/i&gt;6&lt;sup&gt;th&lt;/sup&gt; October 2008, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://www.networkworld.com/article/2276180/security/can-spam--what-went-wrong-.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions'&gt;https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rakshanda Deka</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-02T16:21:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2015-bulletin">
    <title>June 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2015-bulletin</link>
    <description>
        &lt;b&gt;Newsletter for the month of June.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the sixth issue of the Centre for Internet and Society (CIS) newsletter (June 2015). The past editions of the newsletter 	can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;------------------------------- 	&lt;br /&gt; Highlights 	&lt;br /&gt; -------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; As part of its project on mapping cyber security actors in South Asia and South East Asia, CIS conducted a series of interviews with cyber security 	actors. 	&lt;a href="http://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"&gt; The interviews were compiled and edited into one documentary &lt;/a&gt; . The film was produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin features Malavika Jayaram, Nitin Pai, Namita Malhotra, 	Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS conducted a 		&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt; training on eSpeak Tamil Computing with NVDA in Tirunelveli &lt;/a&gt; in the month of June. Sixteen delegates attended the event.&lt;/li&gt;
&lt;li&gt;The 30th Session of the World Intellectual Property Organization's ("WIPO") Standing Committee on Copyright and Related Rights ("SCCR") was held 	from June 30 to July 3, 2015. CIS was unable to attend the meeting. However, CIS had 	&lt;a href="http://cis-india.org/a2k/blogs/statement-by-the-centre-for-internet-and-society-india-on-the-broadcast-treaty-at-sccr-30"&gt; a statement to make on negotiations on the Proposed Treaty for Broadcasting Organizations &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;The Ministry of Information and Broadcasting, Government of India had called for comments on the technical background paper prepared by the WIPO Secretariat in relation to the Broadcast Treaty.	&lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-protection-of-broadcasting-organizations-technical-background-paper"&gt;CIS submitted its comments&lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Rohini Lakshané in a blog post &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt;analysed&lt;/a&gt; the commonalities in 	big-ticket patent infringement lawsuits pertaining to mobile devices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Sumandro Chattapadhyay 		&lt;a href="http://cis-india.org/openness/blog/open-data-intermediaries-in-developing-countries"&gt; co-authored a report on open data intermediaries in developing countries &lt;/a&gt; . The report concluded by saying that consideration needs to be given to the presence of multiple intermediaries in an open data ecosystem, each of whom may 		possess different forms of capital to enable the use and unlock the potential impact of open data.&lt;/li&gt;
&lt;li&gt;Odia language Wikipedia has grown to 800k page views in a month. The Odia Wikipedia community gathered in Bhubaneswar on June 3 to celebrate Odia 	Wikipedia's 13&lt;sup&gt;th&lt;/sup&gt; anniversary. Subhashish Panigrahi &lt;a class="external-link" href="http://cis-india.org/openness/blog/opensource-subhashish-panigrahi-may-31-2015-odia-language-wikipedia-page-grows-to-800k-page-views-a-month"&gt;wrote about this&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Sunil Abraham in an article titled 	&lt;a href="http://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"&gt; "The generation of e-Emergency" &lt;/a&gt; published by Livemint on June 22 argued that the next generation of censorship technology is expected to be 'real-time content manipulation' through 	ISPs and Internet companies.&lt;/li&gt;
&lt;li&gt;In two separate blog entries, Jyoti Panday provided insights into IANA Transition Stewardship &amp;amp; ICANN Accountability. The first part gives a 	&lt;a href="http://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1"&gt; background to the IANA transition and updates on the ensuing processes in an attempt to familiarise people with the issues &lt;/a&gt; at stake and the second part 	&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2"&gt; provides an overview of submitted proposals and highlights the areas of concern that will need attention moving forward &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Sumandro Chattapadhyay 		&lt;a href="http://cis-india.org/openness/blog-old/workshop-on-open-data-for-human-development-2015-06"&gt; co-designed and co-facilitated a workshop for government officials &lt;/a&gt; from Bhutan, Maldives, Meghalaya, Sikkim, and Tripura, on open data policy and implementation, organised by UNDP India. &lt;/li&gt;
&lt;li&gt; Shyam Ponappa in his 		&lt;a href="http://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-june-4-2015-unfettering-stranded-capacity"&gt; monthly column published in the Business Standard &lt;/a&gt; stated that government can't control market forces but can and must fix regulatory issues. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;---------------------------------------------- 	&lt;br /&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt; &lt;br /&gt; ----------------------------------------------&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Monthly Updates&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/nvda-e-speak-june-2015-report.pdf"&gt;June 2015 Report&lt;/a&gt; (Suman Dogra; June 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Language Testing Reports&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt; Report on eSpeak Tamil Computing with NVDA Training Workshop in Tirunelveli &lt;/a&gt; (Organized by NVDA team; Anne Jane Askwith Higher Secondary School for the Visually Impaired, Palayamkottai, Tirunelveli; June 3 - 7, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# White Paper&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/inclusive-financial-services-global-trends-in-accessibility-requirements"&gt; Inclusive Financial Services - Global Trends in Accessibility Requirements &lt;/a&gt; (Nirmita Narasimhan; May 3, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; ----------------------------------------------------------- 	&lt;br /&gt; As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Submission / Comments&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/comments-on-the-protection-of-broadcasting-organizations-technical-background-paper"&gt; Comments on the Protection of Broadcasting Organizations: Technical Background Paper Prepared by the WIPO Secretariat &lt;/a&gt; (Nehaa Chaudhari; June 28, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/statement-by-the-centre-for-internet-and-society-india-on-the-broadcast-treaty-at-sccr-30"&gt; Statement by the Centre for Internet and Society on the Broadcast Treaty at SCCR 30 &lt;/a&gt; (Nehaa Chaudhari; June 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt; Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation &lt;/a&gt; (Rohini Lakshané; June 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think"&gt; National IPR Policy Series: India's National IPR Policy - What Would WIPO Think? &lt;/a&gt; (Nehaa Chaudhari; June 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-follow-up-rti-to-dipp-on-ipr-think-tank"&gt; National IPR Policy Series: Follow-up RTI to DIPP on the IPR Think Tank &lt;/a&gt; (Nehaa Chaudhari; June 25, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights"&gt;The US 301 Report - A Myopic View of IP Rights&lt;/a&gt; (Varun Baliga and Nehaa Chaudhari; June 24, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave inputs for the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/news/the-times-of-india-april-10-2015-evelyn-fok-and-varun-aggarwal-one-reason-startups-are-moving-out-of-india"&gt; One reason startups are moving out of India &lt;/a&gt; (Evelyn Fok and Varun Aggarwal; The Times of India; April 10, 2015). This was also mirrored in 		&lt;a href="http://cis-india.org/a2k/news/economic-times-april-10-2015-evelyn-fok-varun-aggarwal-better-intellectual-property-values-luring-indian-startups-abroad"&gt; Economic Times &lt;/a&gt; . &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/a2k/news/iam-media-jack-ellis-april-28-2015-indian-businesses-crave-ip-certainty-but-better-patent-values-are-tempting-them-overseas"&gt; Indian businesses crave IP certainty, but better patent values are tempting them overseas &lt;/a&gt; (IAM Magazine; April 28, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/wikimedia-blog-subhashish-panigrahi-june-4-2015-odia-wikipedia-community-is-enriching-wikipedia-with-character-encoding-technology"&gt; How the Odia Wikimedia community is enriching Wikipedia with character encoding technology &lt;/a&gt; (Subhashish Panigrahi; June 14, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/odia-wikipedia-meets-google-developer-group"&gt;Odia Wikipedia meets Google Developer Group&lt;/a&gt; (Sailesh Patnaik; June 29, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Event Organized&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/events/odia-wikipedia-turning-thirteen"&gt;Odia Wikipedia Turning 13 this June 3&lt;/a&gt; (Organized by CIS-A2K and Odia Wikipedia Community; Institute of Physics, Sachivalaya Marg, Sainik School PO, Gajapati Nagar, Bhubaneswar, Odisha; June 		3, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Media Coverage&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs for the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/b2db41b2cb28b47b36b4db71b30b30b47-b13b21b3cb3fb06-b09b07b15b3fb2ab3fb21b3cb3fb06b30-b67b69-b24b2e-b1cb28b4db2eb24b3fb25b3f-b2ab3eb33b28-b68b66b67b6b-b1cb41b28-b69-b24b3eb30b3fb16"&gt; ଭୁବନେଶ୍ୱରରେ ଓଡ଼ିଆ 			ଉଇକିପିଡ଼ିଆର ୧୩ ତମ 			ଜନ୍ମତିଥି ପାଳନ, ୨୦୧୫ ଜୁନ ୩ 			ତାରିଖ &lt;/a&gt; (Odishan.com; June 2, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/orissa-dairy-june-2-2015-odia-wikipedia-celebrates-13-years-of-free-knowledge-contribution-at-bhubaneswar"&gt; Odia Wikipedia celebrates 13 years of free knowledge contribution at Bhubaneswar &lt;/a&gt; (Orissadairy.com; June 2, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/news/fullodisha-june-3-2015-odia-wikipedia-13-years-of-free-knowledge-contribution"&gt; Odia Wikipedia Celebrates 13 Years of Free Knowledge Contribution at Bhubaneswar &lt;/a&gt; (FullOdisha.com; June 3, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/foss-for-public-use-free-and-open-source-software-for-digital-india"&gt; FOSS for Public Use:Free and Open Source Software for Digital India &lt;/a&gt; (Anubha Sinha; June 1, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/workshop-on-open-data-for-human-development-2015-06"&gt;Workshop on Open Data for Human Development&lt;/a&gt; (Sumandro Chattapadhyay; June 2, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/openness/blog/open-data-intermediaries-in-developing-countries"&gt; Open Data Intermediaries in Developing Countries - A Synthesis Report &lt;/a&gt; (Sumandro Chattapadhyay; June 16, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;br /&gt; -----------------------------------------------&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and 	International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur 	Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech and Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Article&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"&gt; The generation of e-Emergency &lt;/a&gt; (Sunil Abraham; May 20, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entries&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1"&gt; IANA Transition Stewardship &amp;amp; ICANN Accountability (I) &lt;/a&gt; (Jyoti Panday; June 20, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-stewardship-and-icann-accountability-2"&gt; IANA Transition Stewardship &amp;amp; ICANN Accountability (II) &lt;/a&gt; (Jyoti Panday; June 21, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;# Participation in Event&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/panel-discussion-on-internet-intermediaries-law-and-innovation"&gt; Panel Discussion on Internet Intermediaries, Law and Innovation &lt;/a&gt; (Organized by Confederation of Indian Industries, Google and Centre For Communications Governance, NLU Delhi; New Delhi; June 2, 2015). Jyoti Panday 		attended the panel discussion. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Cyber Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Film&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/blog/desi-sec-cybersecurity-and-civil-society-in-india"&gt; DesiSec: Cybersecurity and Civil Society in India &lt;/a&gt; (produced by Purba Sarkar, edited by Aaron Joseph, and directed by Oxblood Ruffin). The film features Malavika Jayaram, Nitin Pai, Namita Malhotra, 		Saikat Datta, Nishant Shah, Lawrence Liang, Anja Kovacs, Sikyong Lobsang Sangay and, Ravi Sharada Prasad. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;br /&gt;&lt;/a&gt;-------------------------------- 	&lt;br /&gt; CIS is involved in promoting access and accessibility to  telecommunications services and resources and has provided inputs to  ongoing policy discussions 	and consultation papers published by TRAI.  It has prepared reports on unlicensed spectrum and accessibility of  mobile phones for persons with disabilities 	and also works with the  USOF to include funding projects for persons with disabilities in its  mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Op-ed&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-june-4-2015-unfettering-stranded-capacity"&gt; Unfettering Stranded Capacity &lt;/a&gt; (Shyam Ponappa; Business Standard; June 3, 2015 and Organizing India Blogspot; June 4, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt; &lt;br /&gt; -------------------------------- 	&lt;br /&gt; The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of 	social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual 	accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;# Blog Entry&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/raw/blog_indic-scripts-and-the-internet"&gt;Indic Scripts and the Internet&lt;/a&gt; (Dibyajyoti Ghosh; June 30, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt; ---------------------------------&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-siladitya-ray-june-4-can-uber-ola-apps-be-blocked"&gt; Can Uber, Ola apps be blocked? Govt fighting cyber odds &lt;/a&gt; (Siladitya Ray; Hindustan Times; June 4, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/economic-times-june-24-2015-neha-alawadhi-govts-stand-on-internet-governance-draws-applause-from-civil-society-organisations"&gt; Government's stand on internet governance draws applause from civil society organisations &lt;/a&gt; (Neha Alawadhi; Economic Times; June 24, 2015). &lt;/li&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/internet-governance/news/economic-times-june-24-2015-malavika-murali-and-payal-ganguly-most-emerging-firms-low-on-cyber-security-experts"&gt; Most emerging firms low on cyber security: Experts &lt;/a&gt; (Malavika Murali and Payal Ganguly; June 24, 2015). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;br /&gt; --------------------------------- 	&lt;br /&gt; The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfigurations of social and cultural processes and structures as mediated through the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter: &lt;span class="Object" id="OBJ_PREFIX_DWT348_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT349_com_zimbra_url"&gt;&lt;a href="http://twitter.com/cis_india" target="_blank"&gt;http://twitter.com/cis_india&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT348_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT349_com_zimbra_url"&gt;&lt;/span&gt;&lt;/span&gt;Twitter - Access to Knowledge: &lt;span class="Object" id="OBJ_PREFIX_DWT350_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT351_com_zimbra_url"&gt;&lt;a href="https://twitter.com/CISA2K" target="_blank"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT350_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT351_com_zimbra_url"&gt;&lt;/span&gt;&lt;/span&gt;Facebook - Access to Knowledge: &lt;span class="Object" id="OBJ_PREFIX_DWT352_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT353_com_zimbra_url"&gt;&lt;a href="https://www.facebook.com/cisa2k" target="_blank"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT352_com_zimbra_url"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT353_com_zimbra_url"&gt;&lt;/span&gt;&lt;/span&gt;E-Mail - Access to Knowledge: &lt;a class="mail-link" href="mailto:a2k@cis-india.org"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT354_ZmEmailObjectHandler"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT355_ZmEmailObjectHandler"&gt;a2k@cis-india.org&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT354_ZmEmailObjectHandler"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT355_ZmEmailObjectHandler"&gt;&lt;/span&gt;&lt;/span&gt;E-Mail - Researchers at Work: &lt;a class="mail-link" href="mailto:raw@cis-india.org"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT356_ZmEmailObjectHandler"&gt;&lt;span class="Object" id="OBJ_PREFIX_DWT357_ZmEmailObjectHandler"&gt;raw@cis-india.org&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, artists, and theoreticians, both organisationally and as individuals, to engage with us on topics related internet and society, and improve our collective understanding of this field. To discuss such possibilities, please write to Sunil Abraham, Executive Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; (for policy research), or Sumandro Chattapadhyay, Research Director, at &lt;a class="moz-txt-link-abbreviated" href="mailto:sumandro@cis-india.org"&gt;sumandro@cis-india.org&lt;/a&gt; (for academic research), with an indication of the form and the content of the collaboration you might be interested in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2015-bulletin'&gt;https://cis-india.org/about/newsletters/june-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2015-09-13T16:10:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/blog_indic-scripts-and-the-internet">
    <title>Indic Scripts and the Internet</title>
    <link>https://cis-india.org/raw/blog_indic-scripts-and-the-internet</link>
    <description>
        &lt;b&gt;This post by Dibyajyoti Ghosh is part of the 'Studying Internets in India' series. Dibyajyoti is a PhD student in the Department of English, Jadavpur University. He has four years of full-time work experience in projects which dealt with digital humanities and specially with digitisation of material in Indic scripts. In this essay, Dibyajyoti explores the effects the English language has on the Internet population of India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Internet Usage Statistics in India&lt;/h2&gt;
&lt;p&gt;According to the latest statistics [1], while the rural mobile tele-density in India is 47.78%, the urban tele-density for mobile phones is 143.08% (which means, more than one registered SIM card per person and this phenomenon is thus also reflected in the rural figures). On the other hand, roughly only 6.5% of the population has access to ‘broadband’ Internet (&amp;gt;= 512 kbps) through a phone or a dongle and only 1.23% has access to a wired-broadband connection. However, roughly 20% of India’s population is roughly connected to the Internet [2]. Thus, roughly 12% of the population has access to low-speed Internet. What these figures do not reveal is the quantum of consumption of data. It can be safely assumed given the comparatively high costs of mobile Internet usage and the difficult method of feeding large tracts of data through a mobile phone, that the quantum of consumption is significantly higher in the case of computer Internet users as opposed to mobile users. Though as these statistics reveal, the chances of India being connected to the Internet depends largely on mobile phones, rather than desktop/ laptop computers.&lt;/p&gt;
&lt;p&gt;Thus, the status of the Internet in India is still that of a niche medium. Other than the cost-factor of having access to a device which can access the Internet and paying for the Internet data package, some other factors also hinder the growth of the Internet in India. One of them is the issue of language. Whereas the 1990s saw an over-domination of English on the Internet given the linguistic communities which were developing the world of computers and the world of the Internet [3], by 2015, some of the disparity with offline linguistic patterns has been reduced [4]. However, for Indic scripts, much less development has taken place. If one is studying the Internet in India, chances are one is studying it in English.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Languages the Indian Internet User Encounters Both Online and Offline&lt;/h2&gt;
&lt;p&gt;What does this hold for the future of these Indic scripts? Given the multi-lingual skills of Indian school-goers and the increasing amount of daily reading time of those connected to the Internet (which is somewhere between 12% and 20% of the population) being devoted to reading on the Internet, chances are reading is increasingly in English.&lt;/p&gt;
&lt;p&gt;The importance of English-language skills in India, as indeed in the rest of the world, in 2015 is undeniable [5]. English is also a signifier of class in India. However, despite the three-language policy adopted by schools, schools which offer courses primarily in other Indian languages suffer from an inherent disadvantage that students face when these students enter colleges and universities where the medium of teaching is usually English, and later on take up jobs which require official reports to be written in English. Thus, Indian languages other than English offer much less incentive for parents and students to encourage their study. Whereas oral conversation among the Indian population is largely conducted in languages other than English, written conversation is increasingly being conducted in English. Language is not only a political issue but also a subject of social study, not to mention the issues of linguistics. The larger socio-political issues of language are perhaps too vast to be discussed in connection to Indic scripts and the Internet. Thus, apart from this basic point about the bias towards English, I am not delving into it further.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Indic Script Software and Data Entry&lt;/h2&gt;
&lt;p&gt;Let me start with discussing natively-digital material. In the digital domain, entering text in Indic scripts is a difficult task. Indic scripts are primarily abugida scripts, which are writing systems ‘in which consonant–vowel sequences are written as a unit: each unit is based on a consonant letter, and vowel notation is secondary’ [6]. This contrasts with the Latin script used to write English, in which vowels have status equal to consonants, and with abjad scripts such as the script used to write Arabic, in which vowel marking is absent or optional. Similar difficulty is also encountered in entering texts in other non-Latin scripts such as Chinese. Mandarin Chinese may be the world’s most-spoken language and China may be one of the software and hardware giants, but supposedly even Chinese is not particularly amenable to the Internet [7]. Entering Indic scripts on a computer is difficult because it usually involves the addition of new software or tweaking existing software which is slightly difficult for the novice/ casual user.&lt;/p&gt;
&lt;p&gt;ISIS, developed by Gautam Sengupta of the University of Hyderabad and sponsored by the Government of India, is an early example of Indic script input software [8]. It is available online for free. It is not fully phonetic. iLEAP, developed by the Centre for Development of Advanced Computing (CDAC), a Government of India funded agency, is now no longer extant but CDAC have produced other input software thereafter. Google too offers an Indic language input tool now [9]. For languages such as Bengali, there have been software such as Bijoy, which was made by Mustafa Jabbar of Ananda Computers, Dhaka, Bangladesh, and is sold commercially [10] and the free softwares BanglaWord and Avro. Avro was created in 2003 by Mehdi Hasan Khan of Mymensingh, Bangladesh, and subsequently developed by a team at Omicron Lab, Dhaka [11]. Such software exists for other individual Indic languages. Operating systems such as Windows [12] and Ubuntu [13] offer Indic script input as well, and make use of the InScript keyboard [14] too.&lt;/p&gt;
&lt;p&gt;When it comes to mobile phones, prior to the introduction of touchscreen smartphones, text messaging had little option to use the Indic script. With the introduction of multiple keyboards in touchscreen smartphones, there are a few options to use the Indic script. Both Android and iOS offer Indic script keyboards. Yet these are even less easy to use than computer keyboards as one needs to toggle between several sets of keyboards to access all the characters required for Indic script input. Google has recently started handwriting input which supports Indic scripts [15]. It remains to be seen how much the feature is used.&lt;/p&gt;
&lt;p&gt;In spite of this availability of input tools in recent years, the most common method of entering Indic language is through transliteration. Just like Pinyin for the Chinese script, Indic scripts too have official transliteration standards. &lt;em&gt;The Indian National Bibliography&lt;/em&gt; (Kolkata: Central Reference Library, 2004) maintains one such standard. However, such transliteration mechanisms require diacritical marks, which are again difficult to enter. Thus, more often than not, these transliteration standards are not followed except when one is maintaining strict academic standards.&lt;/p&gt;
&lt;p&gt;The point that I am trying to make is that despite the availability of tools for entering Indic scripts and even well-defined standards for transliterating Indic words in the Latin script, neither is universally followed. The reason is it involves extra labour, as opposed to simple transliteration without any standards. Thus, what often one ends up with in casual written communication (which outnumbers formal written communication by a wide margin) in the digital domain, be it in the form of SMSes, messages in Whatsapp or other instant messaging applications or emails, is Indic words in non-standard transliteration into the Latin alphabet. The introduction of SMS lingo and standards two decades back had already prepared the way for the wider acceptance of Indic words in non-standard transliteration into the Latin alphabet. When one comes to a semi-casual/ semi-formal medium, such as blogs and social networks, where the receiver of the message is usually more than one, the forms of expression are slightly different.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Mimetic Desires on Public Platforms&lt;/h2&gt;
&lt;p&gt;Digital, crowd-sourced public platforms, such as blogs and largely social networks, offer a different kind of discourse. On the one hand, private habits spill into the public realm. Thus, Indic words in non-standard transliteration into the Latin alphabet are a common practice. On the other hand, the public nature of such platforms offers a space for a kind of mimetic desire. Despite the availability of the user-interface of the most commonly accessed sites such as Gmail and Facebook in Indic languages, most prefer to retain their user-interface in the default English mode [16]. It is a different issue that enabling browsers to render Indic scripts correctly is often a difficult task and sometimes despite following every instruction in the manual, the problem remains unsolved. The overall English language and English script overdose on social networks such as Facebook generate a kind of desire to mingle in with the crowd. Thus, instead of typing Indic words in non-standard transliteration into the Latin alphabet, the data entered is actually more often than not in English. Often, other than formal job reports and letters, social networks are the only platform that a lot of Indians get where they can produce verbal communication in English. Thus, in addition to a mimetic desire to fit in with the English-writing crowd, social networks also offer a semi-public platform to write one’s thoughts in English, a platform which for a lot of Indians was perhaps last available to them when they had to write essays for their compulsory English-language paper in high school. Both of these desires further hamper the incentive to write on the Internet using Indic scripts.&lt;/p&gt;
&lt;p&gt;Blogs occupy a space somewhere in between formal websites and casual for-the-nonce social network posts. Both the structure of blogs (more structured than a social network but less structured than a website) and the status of blogs lie somewhere in between these two major platforms. Also, with the rise of social networks, the rate of growth of blogs has decreased. Thus, blogs are usually less popular than both websites as well as social networks. On blogs, the content is usually more formal, as is the presentation. Also, the mimetic desire generated by a social network is perhaps less heightened in the case of blogs. Blogs present a more one-to-many approach as opposed to a social network which largely presents a many-to-many structure.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Spelling Skills in Indic Languages&lt;/h2&gt;
&lt;p&gt;At the other hand of the social class in India, is the class which went to an English-medium school and writes predominantly in English. Oral communication is often carried out in other Indian languages but these languages are not often used for written communication. Even when casual written communication in the digital domain, such as SMSes and other instant messaging applications or emails, is carried out using Indic words, it is in non-standard transliteration into the Latin alphabet. For this class, the problem is the lack of exposure to reading and writing in Indian languages other than English. Thus, even this minimal writing in transliteration mode may further weaken their spelling skills in these Indian languages.&lt;/p&gt;
&lt;p&gt;There are of course other categories into which one can group Internet users in India. The equally strong multi-lingual Indian, the equally weak multi-lingual Indian and the Indian strong in one language are three such categories. Irrespective of which class the Indian Internet user belongs to, the Internet user’s exposure to material written in Indic scripts on the Internet is low. So far I have discussed natively-digital resources.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Digitisation of Pre-Digital Resources&lt;/h2&gt;
&lt;p&gt;Let me now turn to digitsation of pre-digital resources. Digitisation of such resources is a task involving a lot of money and labour. There are several organisations in India which are involved in such tasks. The Centre for Development of Advanced Computing (CDAC) is one such organisation. The School of Cultural Texts and Records at Jadavpur University, Kolkata is another such organisation [17]. The Centre for Studies in Social Sciences, Kolkata too is actively involved in digitisation of such material [18]. The West Bengal Public Library repository on Dspace [19] and the Digital Library of India [20] are also significant repositories, as is the portal of the National Archives of India, titled Abhilekh Patal [21]. There are some digital archives focussed on the output of a specific person, such as the MK Gandhi  portal [22]. There have been a few instances of making public searchable text files from such digitised material, such as those by the Society for Natural Language Technology Research [23] and Bichitra: Online Tagore Variorum [24]. Other digitisation programmes are in progress, such as the long-running National Mission for Manuscripts [25]. Yet, in spite of this, such efforts are miniscule compared to databases, albeit commercial and not open-access, such as Early English Books Online or Eighteenth Century Collections Online. The Internet, while it offers the opportunity for an equitable digitisation of pre-digital resources in English as well as Indic scripts, does not contain as many resources in Indic scripts as it does in the Latin script. The reasons are because whereas Indic script resources are primarily digitised by Indian organisations where the money needed for such tasks is not available in great amounts, resources in English are digitised from a number of economies with a high per capita GDP. Given the more basic needs of enhancing the reach and level of primary, secondary and tertiary education in the country, an economy with a low per capita GDP such as India does not have the financial means to digitise vast quantities of pre-digital resources, be they in the Latin script or in Indic scripts.&lt;/p&gt;
&lt;p&gt;When it comes to electronic books in Indic scripts, the refusal of major platforms such as Amazon Kindle Direct Publishing to list books in Indic scripts [26] is a major barrier for individuals to create e-books in Indic scripts. Whereas most major newspapers in Indic scripts have online editions, the case is not so for major book publishers. Unlike a newspaper which primarily relies on advertising for its revenue, book publishers depend on book sales. There is no infrastructure in place for selling electronic books in Indic scripts. The publishers perhaps also feel that the market for consumption of e-books in such languages is not of a significant scale, and thus do not feel incentivised enough to encourage the creation of e-books. Thus, the entire Kindle reading population in India (which is not very large in the first place [27]) is deprived of the chance of buying e-books in Indic scripts. If they read e-books in Indic scripts on Kindles and tablets, then such e-books are usually pirated scanned copies. There are some sites which make available pirated scanned copies of books printed in Indic scripts. However, such sites and the number of such books is so small, that they make no major dent to the revenues of the Indic-languages publishing industry.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Effects on the Indian Internet User&lt;/h2&gt;
&lt;p&gt;As a result, casual Indian Internet researchers and readers often depend on material written in English instead of material written in Indic languages. It is true that the serious researcher will of course make the effort of visiting physical libraries and archives to access books in Indic languages. But for casual reading and research, it is too much of a trouble. For such Internet users, not only are undigitised Indic verbal texts invisible, but the lack of engagement with such texts lead to the effacement of such texts from the public discourse and domain.&lt;/p&gt;
&lt;p&gt;For Indian school students studying in schools where the medium of instruction is not English, the absence of such texts from the Internet means that they engage less with the Internet for academic purposes. For them, the Internet becomes more of a resource meant for non-academic purposes if they have trouble reading texts in English. It is true that English is one of the three languages that school students learn yet as the state of education goes, it is not fully satisfactory [28]. On the other hand, given the English language and English script overdose on social networks, the mimetic desire forces students to generate texts in English, not only the script but also the language. As a result, what is generated is often English of a less than satisfactory standard. A political strain of thought treats the language that people generate as ‘the language’. Measuring such an output against other standards of English is considered politically incorrect. In fact, the regional acceptance of such local sub-groups of English has led to the wider acceptance of English and its growing presence across the world. Yet, as the notion of class in India based on the command over English shows, such sub-grouping also leads to the creation of separate classes.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Effects of the Internet on Indic Scripts&lt;/h2&gt;
&lt;p&gt;Does the Internet alleviate or exacerbate the problem caused by the hierarchy of English over other Indic languages? I guess that the answer is not a simple nod in either direction. On the other hand, I conclude that the Internet increases the mimetic desire to generate written communication in English. Failure to communicate in English according to certain standards of English further exacerbates the creation of the classes based on the command over English. While the Internet, to a certain extent, helps in improving English spelling skills owing to a greater exposure to English, at the same time, it leads to a greater deterioration in spelling skills in Indic languages. Owing to the lack of availability of pre-digital resources in Indic scripts in the digital domain, there is a slow effacement of such resources from the public discourse at large.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Possible Measures to Enhance the Status of Indic Scripts on the Internet&lt;/h2&gt;
&lt;p&gt;These are some of the effects that the Internet in India has had on Indic scripts. Given that the Internet is a niche medium and those shaping the general discourse are more likely to have access to the Internet in the first place, the low visibility of Indic scripts on the Internet is a cause for concern. However, it is true that with the growing accessibility of the Internet in India, the resources in Indic scripts are bound to increase. It is perhaps dependent primarily on those in power, such as the central and state governments to ensure that their websites and mobile phone applications are in Indic scripts as well and the Indic script versions of their digital resources do not lack any feature of the English-language version of such resources. The private sector, especially the publishing industry also needs to create a market for electronic publication in Indic scripts. Just like e-commerce in India did not come after the entire infrastructure was in place, but rather the infrastructure kept building up as e-commerce kept growing, similarly the publishing industry also needs to create a digital Indic-script market, and then keep building it up. E-commerce, which perhaps has the greatest incentive to build resources, can also significantly alter the scenario by offering e-commerce in Indic scripts. Snapdeal has very limited components of their website in two Indic scripts. Other major e-commerce companies have not followed suit and neither is Snapdeal’s inclusion particularly effective. Yet, as the Flipkart-owned apparel company Myntra’s recent decision to go app-only and completely do away with their website has shown, e-commerce has its ways of incentivising customers to change their habits in a drastic manner. It is with such hope that I would have liked to end this brief essay on studying the Internet in India. Yet, as the language of this essay shows, such hopes are not particularly strong, as most scholarly writing in India on the Internet continues to be in English. Scholarly journals and research platforms in Indic scripts on the Internet continue to be so limited in number that it is hard to find particularly high-impact publications from among them. If one is studying the Internet in India, chances are one is both studying and writing in English.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;[1] &lt;a href="http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-34-TSD-Mar-12052015.pdf"&gt;http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-34-TSD-Mar-12052015.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[2] &lt;a href="http://www.internetlivestats.com/internet-users-by-country"&gt;http://www.internetlivestats.com/internet-users-by-country&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[3] Daniel Pimienta, Daniel Prado and Álvaro Blanco, Twelve years of measuring linguistic diversity in the Internet: balance and perspectives, UNESCO publications for the World Summit on the Information Society (2009), &lt;a href="http://unesdoc.unesco.org/images/0018/001870/187016e.pdf"&gt;http://unesdoc.unesco.org/images/0018/001870/187016e.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[4] &lt;a href="http://en.wikipedia.org/wiki/Languages_used_on_the_Internet"&gt;http://en.wikipedia.org/wiki/Languages_used_on_the_Internet&lt;/a&gt; and &lt;a href="http://en.wikipedia.org/wiki/List_of_languages_by_total_number_of_speakers"&gt;http://en.wikipedia.org/wiki/List_of_languages_by_total_number_of_speakers&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[5] &lt;a href="https://hbr.org/2012/05/global-business-speaks-english"&gt;https://hbr.org/2012/05/global-business-speaks-english&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[6] &lt;a href="http://en.wikipedia.org/wiki/Abugida"&gt;http://en.wikipedia.org/wiki/Abugida&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[7] &lt;a href="http://www.newrepublic.com/article/117608/chinese-number-websites-secret-meaning-urls"&gt;http://www.newrepublic.com/article/117608/chinese-number-websites-secret-meaning-urls&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[8] &lt;a href="http://isis.keymankeyboards.com/"&gt;http://isis.keymankeyboards.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[9] &lt;a href="http://www.google.com/inputtools/"&gt;http://www.google.com/inputtools/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[10] &lt;a href="http://www.bijoyekushe.net/"&gt;http://www.bijoyekushe.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[11] &lt;a href="https://www.omicronlab.com/"&gt;https://www.omicronlab.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[12] &lt;a href="http://www.bhashaindia.com/ilit/"&gt;http://www.bhashaindia.com/ilit/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[13] &lt;a href="https://help.ubuntu.com/community/ibus"&gt;https://help.ubuntu.com/community/ibus&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[14] &lt;a href="https://en.wikipedia.org/wiki/InScript_keyboard"&gt;https://en.wikipedia.org/wiki/InScript_keyboard&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[15] &lt;a href="http://googleresearch.blogspot.in/2015/04/google-handwriting-input-in-82.html"&gt;http://googleresearch.blogspot.in/2015/04/google-handwriting-input-in-82.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[16] There is no open-access data for this from either Google or Facebook. Third-parties conduct such studies. A study can be found here: &lt;a href="http://www.oneskyapp.com/blog/top-10-languages-with-most-users-on-facebook/"&gt;http://www.oneskyapp.com/blog/top-10-languages-with-most-users-on-facebook/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[17] &lt;a href="http://www.jaduniv.edu.in/view_department.php?deptid=135"&gt;http://www.jaduniv.edu.in/view_department.php?deptid=135&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[18] &lt;a href="http://www.savifa.uni-hd.de/thematicportals/urban_history.html"&gt;http://www.savifa.uni-hd.de/thematicportals/urban_history.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[19] &lt;a href="http://dspace.wbpublibnet.gov.in:8080/jspui/"&gt;http://dspace.wbpublibnet.gov.in:8080/jspui/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[20] &lt;a href="http://www.dli.ernet.in/"&gt;http://www.dli.ernet.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[21] &lt;a href="http://www.abhilekh-patal.in/"&gt;http://www.abhilekh-patal.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[22] &lt;a href="https://www.gandhiheritageportal.org/"&gt;https://www.gandhiheritageportal.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[23] &lt;a href="http://www.nltr.org/"&gt;http://www.nltr.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[24] &lt;a href="http://bichitra.jdvu.ac.in/index.php"&gt;http://bichitra.jdvu.ac.in/index.php&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[25] &lt;a href="http://www.namami.org/index.htm"&gt;http://www.namami.org/index.htm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[26] &lt;a href="https://kdp.amazon.com/help?topicId=A9FDO0A3V0119"&gt;https://kdp.amazon.com/help?topicId=A9FDO0A3V0119&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[27] &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Ebook-readers-fail-to-kindle-sales-in-India/articleshow/45802786.cms"&gt;http://timesofindia.indiatimes.com/tech/tech-news/Ebook-readers-fail-to-kindle-sales-in-India/articleshow/45802786.cms&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[28] Annual Status of Education Report (Rural) 2014, facilitated by Pratham, pp. 81-82, 86, 88-89, &lt;a href="http://img.asercentre.org/docs/Publications/ASER%20Reports/ASER%202014/fullaser2014mainreport_1.pdf"&gt;http://img.asercentre.org/docs/Publications/ASER%20Reports/ASER%202014/fullaser2014mainreport_1.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The post is published under &lt;a href="https://creativecommons.org/licenses/by/4.0/" target="_blank"&gt;Creative Commons Attribution 4.0 International&lt;/a&gt; license, and copyright is retained by the author.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/blog_indic-scripts-and-the-internet'&gt;https://cis-india.org/raw/blog_indic-scripts-and-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Dibyajyoti Ghosh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Language</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Indic Computing</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Indic Scripts</dc:subject>
    

   <dc:date>2015-07-10T04:23:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/odia-wikipedia-meets-google-developer-group">
    <title>Odia Wikipedia meets Google Developer Group</title>
    <link>https://cis-india.org/openness/blog-old/odia-wikipedia-meets-google-developer-group</link>
    <description>
        &lt;b&gt;This is a guest post by Wikimedian Sailesh Patnaik who has been a ardent contributor in Odia-language Wikipedia and other Wikimedia projects and has led outreach and partnership building initiatives to grow the Wikimedia projects in Odia and other Indian languages. In this post Sailesh shares his personal experience from his interaction at the Google Extended I/O organised by Google Developer Group in Bhubaneswar, Odisha. All the views are author’s personal views.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On this June 14 Google Developer Group Bhubaneswar organised an extended I/O at Bhubaneswar. To my surprise I found that there were more than 60 participants attending the conference. Basanta Kumar Maharana. TELL WHO HE IS, was the speaker in the event. Basanta shared his memories from Google I/O 2015, San Francisco and demonstrated about the new launch and updates of Google. It was quite interesting for me to learn about various Google apps (?) kike Google cardboard, Android M, etc.&lt;/p&gt;
&lt;p&gt;In an informal interaction with the host Sanjib Parida, he proposed me to speak about Odia Wikipedia there who came to know about the project while attending &lt;a href="http://or.wikipedia.org/wiki/WP:ORWP13"&gt;Odia Wikipedia's 13th anniversary&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;I started my talk by asking four questions to the audience:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;How many of the audience know about Wikipedia? (Everyone raised hands.)&lt;/li&gt;
&lt;li&gt;Who have copied content from Wikipedia for assignments? (People giggled about it, 50-60% of the participants nodded saying yes!)&lt;/li&gt;
&lt;li&gt;Who knows that anyone can “edit” Wikipedia? (the count reduced to about 10-20%)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Who knows about Odia Wikipedia and contributes in creating and editing articles? (Only 4-5 people said yes, I found 2-3 of them being contributors to Odia Wikipedia)&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;I started my talk with a brief introduction to the history of Odia Wikipedia and how it was started in 2002 as one of the first four Indic language Wikipedia projects along with Assamese, Malayalam and Punjabi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Odia Wikipedia was in dormant for the next eight years which was intervened when Wikimedians like Subhashish Panigrahi, Ashutosh Kar, Anshuman Giri, Mrutyunjaya Kar and others started building a community to improve and increase the content of Odia Wikipedia. Now we have grown as a community consisting about 17 active editors and the project has more than 8800 articles. The monthly page view of Odia Wikipedia has grown to more than 800,000 from merely 200,000 in 2011. We have three active Odia-language Wikimedia projects; Odia Wikipedia, the largest Odia online encyclopedia, online library Odia Wikisource, and multilingual online dictionary Odia Wiktionary. Odia Wikipedia community has not limited their work only in editing articles, rather has expanded into many other aspects of Odia computing. On the day of Odia Wikipedia’s 13th anniversary it has launched a converter that can convert many non-Unicode encodings into Unicode. We have been supported by CIS-A2K for many activities to grow our community and the Odia Wikimedia projects. Like Odia Wikipedia we have 20 more Wikipedia projects in other Indic languages and in over 288 languages globally. Hindi Wikipedia among all the Indic Wikipedia projects has the highest number of articles whereas Malayalam Wikipedia has the highest number of quality articles.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_OdiaW1.png" alt="Odia Wiki1" class="image-inline" title="Odia Wiki1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pictured above: Participants at the conference organized by the Google Developer Group at Bhubaneswar&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Some of the state governments have been quite open and positive in bringing Wikipedia into academics. The Government of Kerala has introduced Wikipedia contribution in its curriculum for BA and MA students and The Government of Tamilnadu has introduced Tamil Wikipedia to participants at the International Tamil Conference which helped the Tamil Wikimedia community in expanding the community. Awareness and community building are two major challenges for us at this moment. I invited the participants there to take part in the Wikimedia movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I touched upon the Odia input for the audience. While it was quite difficult a few years back for Odia input it is no longer a challenge. With the help of the Android app “Indic Keyboard” we can also edit Odia Wikipedia from mobile phones. I myself have used it for editing Wikipedia, for tweeting and posting Facebook status in Odia. After the talk I was asked a few questions. There are two important ones I would like to share here. To the question “how can I contribute in Odia Wikipedia? Do I have to install any keyboard for it?” I elaborated how anyone can edit and expand articles or create new Wikipedia articles in Odia just by creating a new account and logging in to https://or.wikipedia.org, and how the Wikimedia projects like Wikipedia have an input tool called Universal Language Selector (ULS) enabled in them and one does not need to install any additional input method. I was asked by one from the here is no support from the government at this moment but we are constant effort to collaborate audience about the Government of Odisha helping to grow Odia Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many participants came and personally greeted me after the event was over. I was really excited to share the news about our (Odia Wikimedia community's plans for creating Bhubaneswar Wiki Group/WikiTungi with two active communities in engineering colleges like CET and KIIT. It was a wonderful experience at Google I/O and I hope to grow our Wikimedia community by collaborating with more like minded communities.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/odia-wikipedia-meets-google-developer-group'&gt;https://cis-india.org/openness/blog-old/odia-wikipedia-meets-google-developer-group&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sailesh Patnaik</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Odia Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-07-16T13:17:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/train-the-trainer-running-effective-outreach-activities-in-india">
    <title>Train the Trainer: Running effective outreach activities in India</title>
    <link>https://cis-india.org/openness/blog-old/train-the-trainer-running-effective-outreach-activities-in-india</link>
    <description>
        &lt;b&gt;It is heartening to report that many Wikimedia projects in Indian languages have sustained, and even experienced an upward trend in, editor engagement. However, in terms of content creation, the majority of these projects are still facing grave challenges that put their very existence at risk.&lt;/b&gt;
        &lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Wiki.png" alt="Wiki" class="image-inline" title="Wiki" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;&lt;small&gt;February’s Train the Trainer program—which aims to increase  the number of new editors and ‘ambassadors’ for the movement at  large—proved a rewarding experience for attendees. &lt;a href="https://commons.wikimedia.org/wiki/File:CIS-A2K_TTT_2015_167.jpg" title="commons:File:CIS-A2K TTT 2015 167.jpg"&gt;Photo&lt;/a&gt; by &lt;a href="https://commons.wikimedia.org/wiki/User:Pavanaja" title="commons:User:Pavanaja"&gt;U.B. Pavanaja&lt;/a&gt;, freely licensed under &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"&gt;CC-BY-SA 4.0&lt;/a&gt;.&lt;/small&gt;&lt;/i&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pageview statistics for Indian-language Wikipedias are pleasantly  surprising. Almost all exceed one million unique views every month—but  despite these positive readership figures, very few of these readers  become actively involved in the project’s communities. There is almost  no increase in the number of active and very active editors on a  month-to-month basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These statistics are alarming. They suggest a very real possibility  of volunteer burnout, a dearth of second-generation editors who might  continue established work, and, perhaps most importantly, the projects  losing their reputation as frequently-updated and reliable  encyclopedias.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most realistic way of dealing with this problem is to bring in  new volunteers who will be guided by more experienced users. They would,  eventually, fill the shoes of senior Wikimedians and continue to fight  for free and open knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge" title="India Access To Knowledge"&gt;The Centre for Internet and Society – Access to Knowledge&lt;/a&gt; (CIS-A2K)—a campaign to promote the fundamental principles of justice,  freedom, and economic development—realised as part of its  needs-assessment program that although outreach activities are being  conducted to attract more volunteers to Wikipedia, they had not been as  successful as expected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To address this problem, CIS-A2K came up with the ‘&lt;a href="https://meta.wikimedia.org/wiki/CIS-A2K/Events/Train_the_Trainer_Program" title="CIS-A2K/Events/Train the Trainer Program"&gt;Train the Trainer’ program&lt;/a&gt; (TTT). The program is designed to teach volunteers essential skills and  abilities to, in turn, train the general public on all things  Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These volunteers, or “trainers,” develop key competencies that will  allow them to conduct a successful outreach workshop, such as public  speaking, presentation skills, peer-to-peer learning, effective  communication, reporting, and followup strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To take part in the TTT program, it is imperative that participants  be active Wikipedians. CIS-A2K is angling TTT as both a skill-building  initiative amongst Indian-language Wikimedians, as well as a platform  where Indian-language Wikipedians can meet and greet each other  in-person. This allows participants to interact with Wikimedians from  many different communities, to understand their nature of engagement,  and share the challenges they have faced and overcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The contextual learning and exchange of ideas at these events, similar to &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Edit-a-thon" title="en:Wikipedia:Edit-a-thon"&gt;editathons&lt;/a&gt;,  are very special. They help participants feel like they are a part of  both their linguistic community and a greater Indian-language community,  opening up new opportunities of collaboration, project development, and  friendship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TTT intends to train Indian-language Wikimedians into effective  ambassadors of the movement—keen and able to spread the goals and  mission of the open knowledge movement. The program also strives to  combine best practices from all over the world, taking cues from various  chapters, user groups, and thematic organisations. It builds bridges  between communities in terms of communication, encouraging partnerships  and collaborations that can result in long term rewards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Link to the original entry on &lt;a class="external-link" href="https://blog.wikimedia.org/2015/06/24/outreach-activities-in-india/"&gt;&lt;b&gt;Wikimedia Blog&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/train-the-trainer-running-effective-outreach-activities-in-india'&gt;https://cis-india.org/openness/blog-old/train-the-trainer-running-effective-outreach-activities-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvir</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-07-30T15:20:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights">
    <title>The US 301 Report – A Myopic View of IP Rights</title>
    <link>https://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights</link>
    <description>
        &lt;b&gt;Varun Baliga and Nehaa Chaudhari discuss the 2015 US 301 Report, focussing on its narrow and convenient understanding of IP rights. A farrago of contradictions, it supports a rightsholder-centric view but not when the right, Geographical Indicator, is not to their liking. Similarly, the emphasis on the rights themselves gives short shrift to critical exceptions and limitations that also enhance and incentivize innovation, the ostensible purpose of IP.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The US Trade Representative ["USTR"] is the office in charge of the United States Special 301 Report ["301 Report"] - an annual report on the state of 	intellectual property rights in countries around the world. The Executive Summary of the 2015 Report states that it is conducted "pursuant to Section 182 of the Trade Act of 1974, as amended by the Omnibus Trade and Competitiveness Act of 1988 and the Uruguay Round Agreements Act (19 U.S.C. § 2242)".	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The relevant excerpt of the provision states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The Trade Representative shall, by not later than the date by which countries are identified under subsection (a) of this section, transmit to the 		Committee on Ways and Means of the House of Representatives and the Committee on Finance of the Senate, a report on actions taken under this section 		during the 12 months preceding such report, and the reasons for such actions, including a description of progress made in achieving improved 		intellectual property protection and market access for persons relying on intellectual property rights &lt;/i&gt; ."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2015 301 Report, much like its predecessors, prioritizes the existence of institutional mechanisms for the protection of intellectual property rights 	over the purported end goals of those rights, as argued by Shamnad Basheer.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; The purported link between 	intellectual property and innovation, a key element of the 	&lt;a href="http://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy"&gt; CIS comment on the National IPR Policy &lt;/a&gt; , is not studied by the Report but simply assumed as a truism. In the usual criticism of India's laws, the Report notes that "IPR protection and 	enforcement challenges continue, and there are serious questions regarding the future of the innovative climate in India", operating on the assumption that 	IPR is the sole driving force of innovation. Instead, the Report is guided by the 'business climate' in a country as facilitated by its IP laws. To borrow 	from the EFF's incisive critique of this annual exercise, the 301 Report pressurizes India to criminalize the act of camcording in a cinema hall despite 	domestic copyright law that prohibits it subject to statutory exceptions.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Further, the Report finds 	India's compliance with the Berne Convention to be insufficient since 'business climate' favours as comprehensive an intellectual property regime as 	possible directed at the expansion of rights and the narrowing of exceptions critical to education and openness of knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;International law on intellectual property is interpreted instrumentally by the drafters of the report. What this means is that IP is being viewed solely 	through the prism of national interest. A particularly egregious implication is being witnessed in the shift of preferred fora to discuss IP from bodies 	like the WIPO to trade-oriented platforms, a theme that is discussed later on in this piece. Further, Italy's notice and takedown regime is praised in the 	2015 Report notwithstanding its procedure of obtaining an order of removal not from the courts but the Communications Regulatory Authority, against the 	Manila Principles of Intermediary Liability, an important albeit non-binding piece of state practice.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the emphasis on the interests of rightsholders themselves coupled with enforcement seldom happens in a comparative context, in the Report. 	This means that the Report privileges the interests of rightsholders to the exclusion of any interest that the exceptions to copyright, for fair use and 	education for instance, may hold. The 2015 Report, for instance, notes positive developments in IP law as exclusively including the strengthening of the 	regulatory framework weighted in favour of rights. It fails to note the ratification of the Accessible Books Consortium or the 	&lt;a href="http://spicyip.com/2015/03/un-special-rapporteur-on-impact-of-intellectual-property-regimes-on-the-enjoyment-of-right-to-science-and-culture.html"&gt; Report of the UN Special Rapporteur Farida Shaheed &lt;/a&gt; on copyright policy,&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; implicitly signalling that the US does not consider these developments favourable. 	This is problematic at two level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First, &lt;/i&gt; competing interests of free speech, open access to knowledge, education, public health are either downplayed or outright ignored. For example, the Report 	entirely ignores the work of WIPO on exceptions and limitations, and the Marrakesh Treat among the multilateral and plurilateral initiatives of note. 	Switzerland, for instance, is censured for the 2010 Swiss Federal Court decision that erred on the side of privacy by prohibiting Logistep from tracking IP 	addresses of entities accused of file-sharing.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Even in the emphasis on rightsholders, the 301 Report reeks 	of hypocrisy and doublespeak. Gabriel J. Michael notes that the 301 Report criticized the European Union for having &lt;i&gt;too much&lt;/i&gt; protection of IP 	through geographical indicators (GI). So, IP protection appears to be an unreserved good as long as it's the &lt;i&gt;right&lt;/i&gt; kind of IP as determined by the 	United States.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; For example, by any reasonably objective standard, the European Union offers very high levels of IP protection. Yet as recently as 2006, Special 301 		listed the European Union on its watch list, citing "concerns" about the EU's geographical indication (GI) regime. Given that GIs are a form of 		intellectual property, USTR essentially placed the EU on its watch list for offering &lt;/i&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt;too much&lt;/i&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt; IP-or, if you prefer, the wrong kind of IP. Interestingly, this is a tacit admission by the U.S. that at least some kinds of IP can act as trade 		barriers &lt;/i&gt; ."&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second, &lt;/i&gt; the 301 Report operates on the assumption that intellectual property is a right &lt;i&gt;in rem&lt;/i&gt;. It does not even attempt to engage with the notion of IP 	as a public right. This is a direct implication of the methodology of the Report that privileges the simple existence of IP frameworks and enforcement 	mechanisms over a more substantive examination of the causal nexus between IP and its purported &lt;i&gt;raison d'etre&lt;/i&gt;. Therefore, the interpretive 	approach of the 301 Report towards intellectual property law construes it not as a means to ends but as an end in itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What Does This Mean?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, there are two implications of this approach to IP rights. The first is on the Report's words on India this year. Credit is given to India for 	establishing the High Level Working Group on Intellectual Property ["IPR Working Group"]. The purpose of the Working Group is said to be to "enable India 	to achieve its important domestic policy goals of increasing investment and stimulating innovation through, not at the expense of, IPR protection and 	enforcement". The façade of public interest behind which the 301 Report attempted to operate is finally off, one might say. IP exists, it seems, to 	facilitate not broader goals of public interest but investment and innovation within the myopic interests of 'rightsholders'. Paradoxically, however, the 	Report does call for more consultation on the First Draft of India's National IPR Policy - a noteworthy development, although inconsistent with the tenor 	of the rest of the Report. Second, the 301 Report as a reflection of American foreign policy goals is now being understood through the lens of ongoing 	trade negotiations. This steady shift in the preferable forum for IP negotiations from inclusive and democratic platforms, such as WIPO, towards 	restrictive and secretive ones, such as the WTO, is driven by regressive notions of IP as reflected in the 301 Report. Signalling a move towards a 	state-centric approach heralded by the United States, critical non-state actors from civil society find it increasingly difficult to exercise agency in 	these negotiations. While WIPO provides space for non-state actors such as non-governmental organizations to represent their positions and aid states with 	research, trade negotiations shunt civil society. The cloak and daggers approach of the United States Government towards the Trans-Pacific Partnership 	Treaty,&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; brought to some light with recent votes in the US Congress, negotiations contrasted with the democratic and open nature of the negotiations surrounding the 	Marrakech treaty underscores the important difference in approach.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, the civil society finds itself unable to counterbalance the power hierarchies entrenched in international relations as it has done, for 	example, with the attempted imposition of TRIPS-plus standards through bilateral and multilateral agreements. A state-centric approach makes it easier for 	larger economies to coerce smaller and dependent countries to draft laws with little regard for limitations and flexibilities that are key for innovation 	and standard of life in large swathes of Global South - peoples who cannot afford the costs of IP protected-innovation. Further, issues of IP and trade are 	not pertinent solely to states but are increasingly driven by and relevant to a raft of non-state actors. Any policy that does not actively seek to include 	these stakeholders in the decision making process is destined to fail. Therefore, on both principled and consequentialist grounds, the Special 301 Report 	deserves very little attention from the international community.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Full text of the provision available at			&lt;a href="https://www.law.cornell.edu/uscode/text/19/2242"&gt;https://www.law.cornell.edu/uscode/text/19/2242&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; http://indianexpress.com/article/opinion/columns/these-rancid-rankings/99/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; https://www.eff.org/deeplinks/2015/04/special-301-balance-not-found&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="https://www.eff.org/deeplinks/2015/04/special-301-balance-not-found"&gt; https://www.eff.org/deeplinks/2015/04/special-301-balance-not-found &lt;/a&gt; ; https://www.manilaprinciples.org/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/HRC/28/57"&gt;http://www.un.org/ga/search/view_doc.asp?symbol=A/HRC/28/57&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; http://arstechnica.com/tech-policy/2010/09/switzerland-gathering-ip-addresses-from-bittorrent-sites-illegal/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="https://topromotetheprogress.wordpress.com/2014/06/05/special-301-is-it-effective/"&gt; https://topromotetheprogress.wordpress.com/2014/06/05/special-301-is-it-effective/ &lt;/a&gt; ;&lt;/p&gt;
&lt;p&gt;https://www.techdirt.com/articles/20140612/17435227561/ustrs-special-301-list-naughty-countries-without-strong-enough-patent-copyright-laws-is-complete-joke.shtml&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="http://www.politico.com/magazine/story/2015/05/tpp-elizabeth-warren-labor-118068.html#.VWvcMk-qqko"&gt; http://www.politico.com/magazine/story/2015/05/tpp-elizabeth-warren-labor-118068.html#.VWvcMk-qqko &lt;/a&gt; ; http://www.ip-watch.org/2015/04/23/divide-and-conquer-the-new-us-strategy-to-disentangle-the-tpp-negotiations/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; http://www.ip-watch.org/2013/12/19/wipo-delegates-hear-concerns-of-ngos-on-exceptions-for-libraries/&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights'&gt;https://cis-india.org/a2k/blogs/us-301-report-a-myopic-view-of-ip-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-06-24T15:35:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think">
    <title>National IPR Policy Series : India's National IPR Policy - What Would WIPO Think?</title>
    <link>https://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think</link>
    <description>
        &lt;b&gt;As part of the National IPR Policy Series, CIS is evaluating how India's National IPR Policy framework and process holds up to WIPO's suggestions. In this note, Varun Baliga and Nehaa Chaudhari examine in particular, the functioning of the IPR Think Tank and the first draft of the National Policy in light of the WIPO framework and the principles it encapsulates. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This note is a brief overview of the approach set out by the World Intellectual Property Organization ("WIPO")	&lt;a href="http://www.wipo.int/ipstrategies/en/"&gt;for the development of National IPR Strategies by various countries&lt;/a&gt;. This note also compares WIPO's 	approach to the approach adopted by the IPR Think Tank ("Think Tank") in the formulation of India's National IPR Policy This note is only an academic 	exercise and is not to be construed as a recommendation of the procedure set out by WIPO for the development of National IPR Policies/Strategies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;An Overview of WIPO's Approach&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;WIPO's suggested model of a National IPR Policy operates at three levels - The Process, Baseline Questionnaire and Benchmarking Indicators.	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; On process, WIPO suggests an 8-step procedure in developing a National IP Strategy that lays clear 	emphasis on both continuous consultation and methodological rigour in data collection. The initial 'Assessment Mission' is aimed at preparing the ground for the formulation of the policy, and includes meetings with stakeholders so as to involve interested entities from the very beginning.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Given that an IPR policy is necessarily a political exercise, WIPO recommends that the mission be used to 	secure the political capital and commitment that would be necessary to see the exercise through. Then, a 'project (national) team' is constituted for an IP 	audit and develop an understanding of the economic, social and political infrastructure as context for the formulation of the policy. It is also stated 	that, in most instances, the team will include an international consultant. This is further complemented by 'Desk Research' and 'Data Collection' using the 	'Baseline Survey Questionnaire', an integrated data collection tool developed by WIPO. The desk research is an assessment of the existing IP policies 	coupled with the country's broader goals - developmental, economic and social, so as to conceptualize a policy that is in conformity with the goals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 	data collection through the Baseline Survey Questionnaire is meant to complement the IP audit to understand the "weaknesses, strengths and potential" of 	"the current IP situation in the country". This audit and data collection drive is then buttressed with 'National Consultations' to validate the data and 	conclusions reached thus far. WIPO is unambiguous that the aim of these consultations is to enable a wide range of parties to exercise meaningful ownership 	and agency over the process of conceptualizing a national IPR policy. With the inputs received from the process so far, WIPO recommends that the drafting 	of the strategy commence on the basis of the "suggestions, opinions and recommendations received during the national consultation process". The drafting 	should operate at the level of each sector and the country as a whole. This is followed by a 'second round of stakeholder consultations'. These serve a 	dual purpose: to validate the findings of the first draft and to verify whether the first round of inputs are reflected in the draft itself. Finally, an 	'implementation framework' including "implementation structures, a resource mobilization strategy, and monitoring and evaluation mechanisms".&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Assessing the First Draft of India's National IPR Policy:&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Now, we look at the National IPR Policy in India in light of the WIPO framework outlined above. First we look at the Assessment Mission or process followed 	prior to the announcement of any IPR policy. Then, we look at what assessment was undertaken of the existing IP laws in the country. Finally, the 	stakeholders meetings conducted so far are analysed in comparison to the purpose of such consultations that WIPO envisages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Assessment Mission&lt;/b&gt;: There are no reports of an initial meeting having been held to explain the scope and methodology of the process. 	However, the IPR Think Tank invited comments before the release of the draft national policy in order to seek suggestions on the tentative policy. It 	should be noted that these comments have not been published.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Assessment of existing IP framework&lt;/b&gt;: The overview of the existing IP system in the draft policy covers just the various IP legislations 	and the relevant government departments. It then proceeds to underscore elements in Indian law that enhance and incentivize stricter standards for IP 	protection. For example, it illustrated the future challenge in copyright law as being enforcement on digital platforms. It identifies a need for concerted 	action to increase patent filings by Indians as over "75% of patent filings are by foreign entities". Further, even when it mentions India's ratification 	of the 2013 Marrakesh Treaty ensuring access to copyrighted works for persons with visual impairment, it is in the context of further reinforcement of 	copyright.Therefore, it is clear that the perspective of the draft policy towards India's existing framework downplays provisions ensuring access and protecting the 	public interest and focusses on more expansive IP protection, narrower exceptions and an overall priority for IP rights over the public interest in 	accessing knowledge. The purpose of the IP audit and desk research, "to obtain a clear picture of the current IP situation…, its weaknesses, 	strengths and potential.", has not been done justice by this audit weighted in favour of rightsholders. Finally, the Baseline Survey Questionnaire -an 	integrated tool for extensive data collection - has no mention in the draft policy. There is no indication that it has been utilized for the purpose of 	data collection, if any.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;On stakeholder meetings&lt;/b&gt;: The Draft National IP Policy was released on 24 December 2014. A DIPP Press Release called for comments and 	suggestions to the First Draft to be sent in by January 30&lt;sup&gt;th&lt;/sup&gt;, 2015.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; The first set of 	stakeholder meetings were only held on February 5&lt;sup&gt;th&lt;/sup&gt; and 6&lt;sup&gt;th&lt;/sup&gt;, 2015.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; This is at odds 	with what the WIPO recommends. The very first step in the WIPO framework is the 'Assessment Mission' which involves meetings with stakeholders that 	explains the scope and methodology of the process, presumably to elicit views. There is no publicly available information that suggests that this has taken 	place. Second, the national consultation &lt;i&gt;precedes &lt;/i&gt;the drafting of the strategy with the explicit goal of validating the IP audit findings and 	eliciting views on the drafting of the strategy. This is not intended to be a merely formalistic exercise but meaningful involvement of stakeholders in the 	whole process of conceptualizing a national IPR policy. Now, the DIPP has solicited comments prior to the publication of the first draft. However, mere 	solicitation of comments without meaningful consultation is a mere shadow of the objective of the WIPO recommendation of national consultations - "..to 	actively participate in the validation of the IP audit findings and the formulation of the National IP Strategy..to enhance a wide a range of IP 	stakeholders' ownership of the process of developing and eventually implementing a national IP strategy." Therefore, the principled objective of the 	consultation process as outlined by WIPO - enabling stakeholders to exercise a sense of agency over the policy document and drafting process - was severely 	undermined. Furthermore, WIPO suggests that the drafting of the policy should be based on the findings and suggestions submitted by the stakeholders. Given that comments have been solicited before the policy was drafted, it is incumbent upon the Think Tank to make comments submitted public.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The following table summarizes the comparison in the WIPO approach to that of the IPR Think Tank. Apart from the procedure outlined thus far, the table 	touches upon other points of comparison that are sure to inform the continued functioning of the Think Tank in the road towards a National IPR Policy.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;WIPO Suggestion&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;India's National IP Policy Framework - Comparison&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;WIPO has also suggested a number of justifications that may be advanced for the  development of a national IP strategy.						&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; These justifications will help in grounding the policy in a clear, lucid set of 						objectives. These are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Need to consolidate sectoral policies&lt;/li&gt;
&lt;li&gt;National long-term development agenda&lt;/li&gt;
&lt;li&gt;Benchmarking and best practices&lt;/li&gt;
&lt;li&gt;International trade obligations&lt;/li&gt;
&lt;li&gt;Strengthening the national IP office&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;India's Draft National IP Policy provides for the following objectives:&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Create awareness of the economic, social and cultural benefits of IP (&lt;b&gt;IP Awareness and Promotion&lt;/b&gt;)&lt;/li&gt;
&lt;li&gt;Stimulate the creation and growth of IP (&lt;b&gt;Creation of IP&lt;/b&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Strong and effective laws that protect IP rights in a manner consistent with national priorities and intl obligations and that 						balance the interests of the rights owners and the public (&lt;b&gt;Legal and Legislative Framework&lt;/b&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Strengthen IP administration and management of IP rights (&lt;b&gt;IP Administration and Management&lt;/b&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Augment Commercialization of IP rights; valuation, licensing and technology transfer (&lt;b&gt;Commercialization of IP&lt;/b&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Strengthen enforcement and adjudicatory mechanisms to protect and combat against IP rights violations (						&lt;b&gt;Enforcement and Adjudication&lt;/b&gt;)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Human Capital Development in IP&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;The second prong of WIPO's suggestions is devoted entirely to the Baseline Survey Questionnaire. There are seven clusters identified:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;IP Administration and Management&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Generation of IP by universities, research organizations, business, industry, SMEs and individuals&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Commercialization of IP and technology transfer by universities, research organization, business, industry, SMEs and individuals&lt;/li&gt;
&lt;li&gt;Copyright and copyright industries&lt;/li&gt;
&lt;li&gt;Plan breeders; rights (plant variety protection)&lt;/li&gt;
&lt;li&gt;Enforcement of IP rights&lt;/li&gt;
&lt;li&gt;IP and public policy&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;While there are elements of these clusters in the draft policy, there is no mention of them in the context of the method of a Baseline 						Survey Questionnaire. This means that the data collection was not undertaken in compliance with WIPO's recommendations and means that 						there was either no data collected or the results are undermined.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Finally, the WIPO framework places great emphasis on the implementation of the policy.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; It has elements of this in all three prongs. It requires the policy to have an effective framework for its implementation that includes 						resource mobilization and monitoring and evaluation mechanisms.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The issue of implementation is covered by the draft policy at two levels:&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Implementation of IP rights&lt;/b&gt; - This includes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Placing the burden on individuals to protect their IP rights as IP is an "essentially private rights [sic]".						&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The state merely plays the role of the facilitator for protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Enacting rules and setting up institutions. Examples include the Intellectual Property Rights (Imported Goods) Enforcement Rules 2007 framed to implement border control measures as well as the Copyright Enforcement Advisory Council.						&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; Further, strengthening enforcement mechanisms includes the establishment of a centralized 'Multi-Agency Task Force' for coordination between the raft of agencies that India has.						&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) Facilitate IP dispute resolution through the designation of a specialized patent bench in select High Courts. It also calls for the creation of regional benches of the IPAB in all five regions where IPOs are located as well as an increase in the powers of the IPAB.						&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Implementation of the Policy itself&lt;/b&gt; -&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) It suggests that the integration of the policy with stated government programmes such as 'Make in India' and 'Digital India' would 						enable its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) The establishment of IP Promotion and Development Council (IPPDC) which will open IP Promotion and Development Units (IPPDU) for 						promoting IP awareness, protection and utlilization.&lt;/p&gt;
&lt;p&gt;c) IP support to MSMEs.&lt;/p&gt;
&lt;p&gt;d) Technology Acquisition and Development Fund under the Manufacturing Policy for licensing or procuring patented technologies.&lt;/p&gt;
&lt;p&gt;e) Manufacturing units will be encouraged to set up IP cells in their own units and make IP a part of their corporate strategy.&lt;/p&gt;
&lt;p&gt;f) Integrate with government initiatives.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;&lt;b&gt;Conclusion: Testing Times Ahead&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The IPR Think Tank has not been consistent with WIPO's recommendations on drafting a National IPR Policy. In terms of data analysis, the Think Tank has not 	displayed an iota of the analytical rigour and data collection that WIPO believes is necessary to understand both the state of IP in the country and devise 	effective means of responding to lacunae. Further, while consultations have been held with civil society, these have been lacking in two respects. They 	have not followed the timelines prescribed by WIPO insofar as consultations have happened only after the release of the first draft. As a result, the Think 	Tank has failed in actualizing the &lt;i&gt;raison d'etre&lt;/i&gt; behind national consultations - "enhance a wide range of IP stakeholders' ownership of the 	process of developing and eventually implementing a national IP strategy". Finally, this piece is not an endorsement of WIPO or its recommendations but a 	mere acknowledgement of the role WIPO has played in this exercise. In the final analysis, India has fallen short of adhering to the principles reflected in 	the WIPO framework.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; http://www.wipo.int/ipstrategies/en/methodology/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; The stakeholders that WIPO mentions are "..inter alia, the national IP office(s), relevant government departments, universities and research 			institutes, SMEs, inventors, creators, legal practitioners, non-governmental organizations (NGOs)".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; http://www.dipp.nic.in/English/acts_rules/Press_Release/pressRelease_IPR_Policy_30December2014.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; http://spicyip.com/2015/01/examining-the-draft-national-ip-policy-stakeholder-meetings-to-be-held.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; http://cis-india.org/a2k/blogs/national-ipr-policy-series-cis-comments-to-the-first-draft-of-the-national-ip-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Methodology for the Development of National Intellectual Property Strategies, Tool 1: The Process, p. 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; National IPR Policy (First Draft), p. 6-23.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Methodology for the Development of National Intellectual Property Strategies, Tool 1: The Process, p. 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; , p. 20.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; , p. 20.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; , p. 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; , p. 22.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; , p. 25-26.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think'&gt;https://cis-india.org/a2k/blogs/national-ipr-policy-series-indias-national-ipr-policy-what-would-wipo-think&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2015-07-02T17:47:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1">
    <title>IANA Transition Stewardship &amp; ICANN Accountability (I)</title>
    <link>https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1</link>
    <description>
        &lt;b&gt;This paper is the first in a multi-part series, in which we provide a background to the IANA transition and updates on the ensuing processes. An attempt to familiarise people with the issues at stake, this paper will be followed by a second piece that provides an overview of submitted proposals and areas of concern that will need attention moving forward. The series is a work in progress and will be updated as the processes move forward. It is up for public comments and we welcome your feedback.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In developing these papers we have been guided by Kieren McCarthy's writings in The Register, Milton Mueller writings on the Internet Governance Project, Rafik Dammak emails on the mailings lists, the constitutional undertaking argument made in the policy paper authored by Danielle Kehl &amp;amp; David Post for New America Foundation.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The 53rd ICANN&lt;/b&gt; conference in Buenos Aires was pivotal as it marked the last general meeting before the IANA transition deadline on 30th September, 2015. The multistakeholder process initiated seeks communities to develop transition proposals to be consolidated and reviewed by the the IANA Stewardship Transition Coordination Group (ICG). The names, number and protocol communities convened at the conference to finalize the components of the transition proposal and to determine the way forward on the transition proposals. The Protocol Parameters (IANA PLAN Working Group) submitted to ICG on 6 January 2015, while the Numbering Resources (CRISP Team) submitted on 15 January 2015. The Domain Names (CWG-Stewardship) submitted its second draft to ICG on 25 June 2015. The ICG had a face-to-face meeting in Buenos Aires and their proposal to transition the stewardship of the IANA functions is expected to be out for public comment July 31 to September 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallelly, the CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015 and organised two working sessions at ICANN'53. More recently, the CCWG met in Paris focusing on the proposed community empowerment mechanisms, emerging concerns and progress on issues so far. &lt;b&gt;&lt;i&gt;CIS reserves its comments to the CCWG till the second round of comments expected in July.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This working paper explains the IANA Transition, its history and relevance to management of the Internet. It provides an update on the processes so far, including the submissions by the Indian government and highlights areas of concern that need attention going forward.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is IANA Transition linked to DNS Management?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The IANA transition presents a significant opportunity for stakeholders to influence the management and governance of the global network. The Domain Name System (DNS), which allows users to locate websites by translating the domain name with corresponding Internet Protocol address, is critical to the functioning of the Internet. The DNS rests on the effective coordination of three critical functions—the allocation of IP Addresses (the numbers function), domain name allocation (the naming function), and protocol parameters standardisation (the protocols function).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of the ICANN-IANA Functions contract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Initially, these key functions were performed by individuals and public and private institutions. They either came together voluntarily or through a series of agreements and contracts brokered by the Department of Commerce’s National Telecommunications and Information Administration (NTIA) and funded by the US government. With the Internet's rapid expansion and in response to concerns raised about its increasing commercialization as a resource, a need was felt for the creation of a formal institution that would take over DNS management. This is how ICANN, a California-based private, non-profit technical coordination body, came at the helm of DNS and related issues. Since then, ICANN has been performing the Internet Assigned Numbers Authority (IANA) functions under a contract with the NTIA, and is commonly referred to as the IANA Functions Operator.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IANA Functions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In February 2000, the NTIA entered into the first stand-alone IANA Functions HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf"contract&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; with ICANN as the Operator. While the contractual obligations have evolved over time, these are largely administrative and technical in nature including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(1) the coordination of the assignment of technical Internet protocol parameters;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) the allocation of Internet numbering resources; and&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) the administration of certain responsibilities associated with the Internet DNS root zone management;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) other services related to the management of the ARPA and top-level domains.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been performing the IANA functions under this oversight, primarily as NTIA did not want to let go of complete control of DNS management. Another reason was to ensure NTIA's leverage in ensuring that ICANN’s commitments, conditional to its incorporation, were being met and that it was sticking to its administrative and technical role.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Root Zone Management—Entities and Functions Involved&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA' s involvement has been controversial particularly in reference to the Root Zone Management function, which allows allows for changes to the&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt; &lt;/a&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf"&gt;HYPERLINK "http://www.internetsociety.org/sites/default/files/The Internet Domain Name System Explained for Non-Experts (ENGLISH).pdf"&lt;/a&gt;highest level of the DNS namespace&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; by updating the databases that represent that namespace. DNS namespace is defined to be the set of names known as top-level domain names or TLDs which may be at the country level (ccTLDs or generic (gTLDs). This&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt; &lt;/a&gt;&lt;a href="https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&gt;HYPERLINK "https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf"&lt;/a&gt;function to maintain the Root was split into two parts&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;—with two separate procurements and two separate contracts. The operational contract for the Primary (“A”) Root Server was awarded to VeriSign, the IANA Functions Contract—was awarded to ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These contracts created contractual obligations for ICANN as IANA Root Zone Management Function Operator, in co-operation with Verisign as the Root Zone Maintainer and NTIA as the Root Zone Administrator whose authorisation is explicitly required for any requests to be implemented in the root zone. Under this contract, ICANN had responsibility for the technical functions for all three communities under the IANA Functions contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN also had policy making functions for the names community such as developing&lt;a href="https://www.iana.org/domains/root/files"&gt; &lt;/a&gt;&lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;rules and procedures and policies under &lt;a href="https://www.iana.org/domains/root/files"&gt;HYPERLINK "https://www.iana.org/domains/root/files"&lt;/a&gt;which any changes to the Root Zone File&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; were to be proposed, including the policies for adding new TLDs to the system. The policy making of numbers and protocols is with IETF and RIRs respectively.&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf"&lt;/a&gt;NTIA role in root zone management&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; is clerical and judgment free with regards to content. It authorizes implementation of requests after verifying whether procedures and policies are being followed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This contract was subject to extension by mutual agreement and failure of complying with predefined commitments could result in the re-opening of the contract to another entity through a Request For Proposal (RFP). In fact, in 2011&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;NTIA issued a RFP pursuant to ICANN&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;'&lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf"&lt;/a&gt;s Conflict of Interest Policy.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why is this oversight needed?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The role of the Administrator becomes critical for ensuring the security and operation of the Internet with the Root Zone serving as the directory of critical resources. In December 2014,&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt; &lt;/a&gt;&lt;a href="http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&gt;HYPERLINK "http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/"&lt;/a&gt;a report revealed 300 incidents of internal security breaches&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; some of which were related to the Centralized Zone Data System (CZDS) – where the internet core root zone files are mirrored and the WHOIS portal. In view of the IANA transition and given ICANN's critical role in maintaining the Internet infrastructure, the question which arises is if NTIA will let go of its Administrator role then which body should succeed it?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transition announcement and launch of process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 14 March 2014, the NTIA &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;announced&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; “&lt;i&gt;its intent to transition key Internet domain name functions to the global multistakeholder community”&lt;/i&gt;. These key Internet domain name functions refer to the IANA functions. For this purpose, the NTIA&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;asked&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; the Internet Corporation for Assigned Names and Numbers (ICANN) to convene a global multistakeholder process to develop a transition proposal which has broad community support and addresses the following four principles:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The transition process has been split according to the three main communities naming, numbers and protocols.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Structure of the Transition Processes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ICANN performs both technical functions and policy-making functions. The technical functions are known as IANA functions and these are performed by ICANN are for all three communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.&lt;i&gt; Naming function:&lt;/i&gt;&lt;/b&gt; ICANN performs &lt;b&gt;&lt;i&gt;technical and policy-making&lt;/i&gt;&lt;/b&gt; for the names community. The technical functions are known as IANA functions and the policy-making functions relates to their role in deciding whether .xxx or .sucks should be allowed amongst other issues. There are two parallel streams of work focusing on the naming community that are crucial to completing the transition. The first, &lt;b&gt;&lt;i&gt;Cross-Community Working Group to Develop an IANA Stewardship Transition Proposal on Naming Related Functions &lt;/i&gt;&lt;/b&gt;will enable NTIA to transition out of its role in the DNS. Therefore, accountability of IANA functions is the responsibility of the CWG and accountability of policy-making functions is outside its scope. CWG has submitted its second draft to the ICG.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second, &lt;b&gt;&lt;i&gt;Cross-Community Working Group on Accountability (CCWG-Accountability)&lt;/i&gt;&lt;/b&gt; is identifying necessary reforms to ICANN’s bylaws and processes to enhance the organization’s accountability to the global community post-transition. Therefore accountability of IANA functions is outside the scope of the CCWG. The CCWG on Enhancing ICANN Accountability offered its first set of proposals for public comment in June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.&lt;i&gt; Numbers function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the numbers community. The policy-making functions for numbers are performed by RIRs. CRISP is focusing on the IANA functions for numbers and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.&lt;i&gt; Protocols function:&lt;/i&gt;&lt;/b&gt; ICANN performs only technical functions for the protocols community. The policy-making functions for protocols are performed by IETF. IETF-WG is focusing on the IANA functions for protocols and has submitted their proposal to the ICG earlier this year.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Role of ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After receiving the proposals from all three communities the ICG must combine these proposals into a consolidated transition proposal and then seek public comment on all aspects of the plan. ICG’s role is crucial, because it must build a public record for the NTIA on how the three customer group submissions tie together in a manner that ensures NTIA’s&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;HYPERLINK "http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&lt;/a&gt;criteria&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; are met and institutionalized over the long term. Further, ICG's final submission to NTIA must include a plan to enhance ICANN’s accountability based on the CCWG-Accountability proposal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA Leverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Reprocurement of the IANA contract is &lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;essential for ICANN&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;'&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;s&lt;/a&gt;&lt;a href="http://www.newamerica.org/oti/controlling-internet-infrastructure/"&gt;HYPERLINK "http://www.newamerica.org/oti/controlling-internet-infrastructure/"&lt;/a&gt; legitimacy&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; in the DNS ecosystem and the authority to reopen the contract and in keeping the policy and operational functions separate meant that, NTIA could simply direct VeriSign to follow policy directives being issued from the entity replacing ICANN if they were deemed to be not complying. This worked as an effective leverage for ICANN complying to their commitments even if it is difficult to determine how this oversight was exercised. Perceptually, this has been interpreted as a broad overreach particularly, in the context of issues of sovereignty associated with ccTLDs and the gTLDs in their influence in shaping markets. However, it is important to bear in mind that the NTIA authorization comes after the operator, ICANN—has validated the request and does not deal with the substance of the request rather focuses merely on compliance with outlined procedure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NTIA in its&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&gt;HYPERLINK "http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf"&lt;/a&gt;Second Quarterly Report to the Congress&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; for the period of February 1-March 31, 2015 has outlined some clarifications on the process ahead. It confirmed the flexibility of extending the contract or reducing the time period for renewal, based on community decision. The report also specified that the NTIA would consider a proposal only if it has been developed in consultation with the multi-stakeholder community. The transition proposal should have broad community support and does not seek replacement of NTIA's role with a government-led or intergovernmental organization solution. Further the proposal should maintain security, stability, and resiliency of the DNS, the openness of the Internet and must meet the needs and expectations of the global customers and partners of the IANA services. NTIA will only review a comprehensive plan that includes all these elements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the communities develop and ICG submits a consolidated proposal, NTIA will ensure that the proposal has been adequately “stress tested” to ensure the continued stability and security of the DNS. NTIA also added that any proposed processes or structures that have been tested to see if they work, prior to the submission—will be taken into consideration in NTIA's review. The report clarified that NTIA will review and assess the changes made or proposed to enhance ICANN’s accountability before initiating the transition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to ICANN'53, Lawrence E. Strickling Assistant Secretary for Communications and Information and NTIA Administrator HYPERLINK "http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina"has posed some questions for consideration&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; by the communities prior to the completion of the transition plan. The issues and questions related to CCWG-Accountability draft are outlined below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Proposed &lt;b&gt;&lt;i&gt;new or modified community empowerment tools—&lt;/i&gt;&lt;/b&gt;how can the CCWG ensure that the creation of new organizations or tools will not interfere with the security and stability of the DNS during and after the transition? Do these new committees and structures &lt;b&gt;&lt;i&gt;create a different set of accountability questions&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Proposed membership model for community empowerment—have &lt;b&gt;&lt;i&gt;other possible models&lt;/i&gt;&lt;/b&gt; been thoroughly examined, detailed, and documented? Has CCWG designed stress tests of the various models to address how the multistakeholder model is preserved &lt;b&gt;&lt;i&gt;if individual ICANN Supporting Organizations and Advisory Committees opt out&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;Has CCWG developed stress tests to address the &lt;b&gt;&lt;i&gt;potential risk of capture and barriers to entry for new participants&lt;/i&gt;&lt;/b&gt; of the various models? Further, have stress tests been considered to address &lt;b&gt;&lt;i&gt;potential unintended consequences of “operationalizing” groups&lt;/i&gt;&lt;/b&gt; that to date have been advisory in nature?&lt;/li&gt;
&lt;li&gt;Suggestions on improvements to the current Independent Review Panel (IRP) that has been criticized for its lack of accountability—how does the CCWG proposal &lt;b&gt;&lt;i&gt;analyze and remedy existing concerns with the IRP&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;In designing a plan for improved accountability, should the CCWG consider what exactly is the &lt;b&gt;&lt;i&gt;role of the ICANN Board within the multistakeholder model&lt;/i&gt;&lt;/b&gt;? Should the &lt;b&gt;&lt;i&gt;standard for Board action&lt;/i&gt;&lt;/b&gt; be to confirm that the community has reached consensus, and if so, what &lt;b&gt;&lt;i&gt;accountability mechanisms are needed&lt;/i&gt;&lt;/b&gt; to ensure the Board operates in accordance with that standard?&lt;/li&gt;
&lt;li&gt;The proposal is primarily focused on the accountability of the ICANN Board—has the CCWG considered &lt;b&gt;&lt;i&gt;accountability improvements&lt;/i&gt;&lt;/b&gt; that would apply to &lt;b&gt;&lt;i&gt;ICANN management and staff or to the various ICANN Supporting Organizations and Advisory Committees&lt;/i&gt;&lt;/b&gt;?&lt;/li&gt;
&lt;li&gt;NTIA has also asked the CCWG to &lt;b&gt;&lt;i&gt;build a public record and thoroughly document&lt;/i&gt;&lt;/b&gt; how the NTIA criteria have been met and will be maintained in the future.&lt;/li&gt;
&lt;li&gt;Has the CCWG identified and &lt;b&gt;&lt;i&gt;addressed issues of implementation &lt;/i&gt;&lt;/b&gt;so that the community and ICANN can implement the plan as expeditiously as possible once NTIA has reviewed and accepted it.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;NTIA has also sought community’s input on timing to finalize and implement the transition plan if it were approved. The Buenos Aires meeting became a crucial point in the transtion process as following the meeting, NTIA will need to make a determination on extending its current contract with ICANN. Keeping in mind that the community and ICANN will need to implement all work items identified by the ICG and the Working Group on Accountability as prerequisites for the transition before the contract can end, the community’s input is critical.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NTIA's legal standing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 25th February, 2015 the US Senate Committee on Commerce, Science &amp;amp; Transportation on 'Preserving the Multi-stakeholder Model of Internet Governance'&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; heard from NTIA head Larry Strickling, Ambassador Gross and Fadi Chehade. The hearing sought to plug any existing legal loopholes, and tighten its administrative, technical, financial, public policy, and political oversight over the entire process no matter which entity takes up the NTIA function. The most important takeaway from this Congressional hearing came from Larry Strickling’s testimony&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; who stated that NTIA has no legal or statutory responsibility to manage the DNS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If &lt;b&gt;&lt;i&gt;the NTIA does not have the legal responsibility to act, and its role was temporary; on what basis is the NTIA driving the current IANA Transition process without the requisite legal authority or Congressional mandate?&lt;/i&gt;&lt;/b&gt; Historically, the NTIA oversight, effectively devised as a leverage for ICANN fulfilling its commitments have not been open to discussion.&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt; &lt;/a&gt;&lt;a href="http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&gt;HYPERLINK "http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf"&lt;/a&gt;Concerns have also been raised&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; on the lack of engagement with non-US governments, organizations and persons prior to initiating or defining the scope and conditions of the transition. Therefore, any IANA transition plan must consider this lack of consultation, develop a multi-stakeholder process as the way forward—even if the NTIA wants to approve the final transition plan.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need to strengthen Diversity Principle&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Following submissions by various stakeholders raising concerns regarding developing world participation, representation and lack of multilingualism in the transition process—the Diversity Principle was included by ICANN in the Revised Proposal of 6 June 2014. Given that representatives from developing countries as well as from stakeholder communities outside of the ICANN community are unable to productively involve themselves in such processes because of lack of multilingualism or unfamiliarity with its way of functioning merely mentioning diversity as a principle is not adequate to ensure abundant participation. As CIS has pointed out&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; before issues have been raised about the domination by North American or European entities which results in undemocratic, unrepresentative and non-transparent decision-making in such processes. Accordingly, all the discussions in the process should be translated into multiple native languages of participants in situ, so that everyone participating in the process can understand what is going on. Adequate time must be given for the discussion issues to be translated and circulated widely amongst all stakeholders of the world, before a decision is taken or a proposal is framed. This was a concern raised in the recent CCWG proposal which was extended as many communities did not have translated texts or adequate time to participate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Representation of the global multistakeholder community in ICG&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Currently, the Co-ordination Group includes representatives from ALAC, ASO, ccNSO, GNSO, gTLD registries, GAC, ICC/BASIS, IAB, IETF, ISOC, NRO, RSSAC and SSAC. Most of these representatives belong to the ICANN community, and is not representative of the global multistakeholder community including governments. This is not representative of even a multistakeholder model which the US &lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;g&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ov&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;ernment &lt;/a&gt;&lt;a href="http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&gt;HYPERLINK "http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design"&lt;/a&gt;has announced&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; for the transition; nor in the multistakeholder participation spirit of NETmundial. Adequate number of seats on the Committee must be granted to each stakeholder so that they can each coordinate discussions within their own communities and ensure wider and more inclusive participation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;ICANN's role in the transition process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Another issue of concern in the pre-transition process has been ICANN having been charged with facilitating this transition process. This decision calls to question the legitimacy of the process given that the suggestions from the proposals envision a more permanent role for ICANN in DNS management. As Kieren McCarthy has pointed out &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;ICANN has taken several steps to retain the balance of power in managing these functions which have seen considerable pushback from the community. These include an attempt to control the process by announcing two separate processes&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; – one looking into the IANA transition, and a second at its own accountability improvements – while insisting the two were not related. That effort was beaten down&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; after an unprecedented letter by the leaders of every one of ICANN's supporting organizations and advisory committees that said the two processes must be connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, ICANN was accused of stacking the deck&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; by purposefully excluding groups skeptical of ICANN’s efforts, and by trying to give ICANN's chairman the right to personally select the members of the group that would decide the final proposal. That was also beaten back. ICANN staff also produced a "scoping document"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;, that pre-empt any discussion of structural separation and once again community pushback forced a backtrack.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These concerns garner more urgency given recent developments with the community working &lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;groups&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; and ICANN divisive view of the long-term role of ICANN in DNS management. Further, given HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"ICANNHYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164" HYPERLINK "https://www.youtube.com/watch?v=yGwbYljtNyI#t=1164"President Chehade’s comments that the CWG is not doing its job&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;, is populated with people who do not know anything and the “IANA process needs to be left alone as much as possible”. Fadi also specified that ICANN had begun the formal process of initiating a direct contract with VeriSign to request and authorise changes to be implemented by VeriSign. &lt;b&gt;&lt;i&gt;While ICANN may see itself without oversight in this relationship with VeriSign, it is imperative that proposals bear this plausible outcome in mind and put forth suggestions to counter this.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt; &lt;/a&gt;&lt;a href="http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&gt;HYPERLINK "http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html"&lt;/a&gt;update from IETF on the ongoing negotiation with ICANN on their proposal&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; related to protocol parameters has also flagged that ICANN is unwilling to cede to any text which would suggest ICANN relinquishing its role in the operations of protocol parameters to a subsequent operator, should the circumstances demand this. ICANN has stated that agreeing to such text now would possibly put them in breach of their existing agreement with the NTIA. Finally,&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;ICANN &lt;/a&gt;&lt;a href="https://twitter.com/arunmsukumar/status/603952197186035712"&gt;HYPERLINK "https://twitter.com/arunmsukumar/status/603952197186035712"&lt;/a&gt;Board Member, Markus Kummer&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; stated that if ICANN was to not approve any aspect of the proposal this would hinder the consensus and therefore, the transition would not be able to move forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ICANN has been designated the convenor role by the US government on basis of its unique position as the current IANA functions contractor and the global coordinator for the DNS. However it is this unique position itself which creates a conflict of interest as in the role of contractor of IANA functions, ICANN has an interest in the outcome of the process being conducive to ICANN. In other words, there exists a potential for abuse of the process by ICANN, which may tend to steer the process towards an outcome favourable to itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Therefore there exists a strong rationale for defining the limitations of the role of ICANN as convenor.&lt;/i&gt;&lt;/b&gt; The community has suggested that ICANN should limit its role to merely facilitating discussions and not extend it to reviewing or commenting on emerging proposals from the process. Additional safeguards need to be put in place to avoid conflicts of interest or appearance of conflicts of interest. ICANN should further not compile comments on drafts to create a revised draft at any stage of the process. Additionally, ICANN staff must not be allowed to be a part of any group or committee which facilitates or co-ordinates the discussion regarding IANA transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is the Obama Administration and the US Congress playing this?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even as the issues of separation of ICANN's policy and administrative role remained unsettled, in the wake of the Snowden revelations, NTIA initiated the long due transition of the IANA contract oversight to a global, private, non-governmental multi-stakeholder institution on March 14, 2014. This announcement immediately raised questions from Congress on whether the transition decision was dictated by technical considerations or in response to political motives, and if the Obama Administration had the authority to commence such a transition unilaterally, without prior open stakeholder consultations. Republican&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt; &lt;/a&gt;&lt;a href="http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&gt;HYPERLINK "http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602"&lt;/a&gt;lawmakers have raised concerns about the IANA transition plan &lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;worried that it may allow other countries to capture control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More recently,&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt; &lt;/a&gt;&lt;a href="https://www.congress.gov/bill/114th-congress/house-bill/2251"&gt;HYPERLINK "https://www.congress.gov/bill/114th-congress/house-bill/2251"&lt;/a&gt;Defending Internet Freedom Act&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; has been re-introduced to US Congress. This bill seeks ICANN adopt the recommendations of three internet community groups, about the transition of power, before the US government relinquishes control of the IANA contract. The bill also seeks ownership of the .gov and .mil top-level domains be granted to US government and that ICANN submit itself to the US Freedom of Information Act (FOIA), a legislation similar to the RTI in India, so that its records and other information gain some degree of public access.It has also been asserted by ICANN that neither NTIA nor the US Congress will approve any transition plan which leaves open the possibility of non-US IANA Functions Operator in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Funding of the transition&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Obama administration is also&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt; &lt;/a&gt;&lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;fighting a Republican-backed Commerce, Justice, Science, and &lt;a href="http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&gt;HYPERLINK "http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393"&lt;/a&gt;Related Agencies Appropriations Act (H.R. 2578)&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; which seeks to block NTIA funding the IANA transition. One provision of this bill restricts NTIA from using appropriated dollars for IANA stewardship transition till the end of the fiscal year, September 30, 2015 also the base period of the contact in function. This peculiar proviso in the Omnibus spending bill actually implies that Congress believes that the IANA Transition should be delayed with proper deliberation, and not be rushed as ICANN and NTIA are inclined to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IANA Transition cannot take place in violation of US Federal Law that has defunded it within a stipulated time-window. At the Congressional Internet Caucus in January 2015, NTIA head Lawrence Strickling clarified that NTIA will “not use appropriated funds to terminate the IANA functions...” or “to amend the cooperative agreement with Verisign to eliminate NTIA's role in approving changes to the authoritative root zone file...”. This implicitly establishes that the IANA contract will be extended, and Strickling confirmed that there was no hard deadline for the transition.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DOTCOM Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Communications and Technology Subcommittee of the House Energy and Commerce Committee&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt; &lt;/a&gt;&lt;a href="http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&gt;HYPERLINK "http://energycommerce.house.gov/markup/communications-and-technology-subcommittee-vote-dotcom-act"&lt;/a&gt;amended the DOTCOM Act&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;, a bill which, in earlier drafts, would have halted the IANA functions transition process for up to a year pending US Congressional approval. The bill in its earlier version represented unilateral governmental interference in the multistakeholder process. The new bill reflects a much deeper understanding of, and confidence in, the significant amount of work that the global multistakeholder community has undertaken in planning both for the transition of IANA functions oversight and for the increased accountability of ICANN. The amended DOTCOM Act would call for the NTIA to certify – as a part of a proposed GAO report on the transition – that &lt;i&gt;“the required changes to ICANN’s by-laws contained in the final report of ICANN’s Cross Community Working Group on Enhancing ICANN Accountability and the changes to ICANN’s bylaws required by ICANN’s IANA have been implemented.” &lt;/i&gt;The bill enjoys immense bipartisan support&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;, and is being lauded as a prudent and necessary step for ensuring the success of the IANA transition.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; IANA Functions Contract &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/sf_26_pg_1-2-final_award_and_sacs.pdf&amp;gt; accessed 15th June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Daniel Karrenberg, The Internet Domain Name System Explained For Nonexperts &amp;lt;http://www.internetsociety.org/sites/default/files/The%20Internet%20Domain%20Name%20System%20Explained%20for%20Non-Experts%20(ENGLISH).pdf&amp;gt; accessed 15 June 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; David Post and Danielle Kehl, Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Iana.org, 'IANA — Root Files' (2015) &amp;lt;https://www.iana.org/domains/root/files&amp;gt; accessed 11 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; 'NTIA's Role In Root Zone Management' (2014). &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntias_role_root_zone_management_12162014.pdf&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;Contract&lt;/i&gt; ( 2011) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/11102011_solicitation.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Kieren McCarthy, 'Confidential Information Exposed Over 300 Times In ICANN Security Snafu' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/04/30/confidential_information_exposed_over_300_times_in_icann_security_snafu/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; NTIA, ‘NTIA Announces Intent To Transition Key Internet Domain Name Functions’ (2014) &amp;lt;http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; David Post and Danielle Kehl, &lt;i&gt;Controlling Internet Infrastructure The “IANA Transition” And Why It Matters For The Future Of The Internet, Part I&lt;/i&gt; (1st edn, Open Technology Institute 2015) &amp;lt;https://static.newamerica.org/attachments/2964-controlling-internet-infrastructure/IANA_Paper_No_1_Final.32d31198a3da4e0d859f989306f6d480.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; National Telecommunications and Information Administration, 'REPORT ON THE TRANSITION OF THE STEWARDSHIP OF THE INTERNET ASSIGNED NUMBERS AUTHORITY (IANA) FUNCTIONS' (NTIA 2015) &amp;lt;http://www.ntia.doc.gov/files/ntia/publications/ntia_second_quarterly_iana_report_05.07.15.pdf&amp;gt; accessed 10 July 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Lawrence Strickling, 'Stakeholder Proposals To Come Together At ICANN Meeting In Argentina' &amp;lt;http://www.ntia.doc.gov/blog/2015/stakeholder-proposals-come-together-icann-meeting-argentina&amp;gt; accessed 19 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Philip Corwin, 'NTIA Says Cromnibus Bars IANA Transition During Current Contract Term' &amp;lt;http://www.circleid.com/posts/20150127_ntia_cromnibus_bars_iana_transition_during_current_contract_term/&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Sophia Bekele, '"No Legal Basis For IANA Transition": A Post-Mortem Analysis Of Senate Committee Hearing' &amp;lt;http://www.circleid.com/posts/20150309_no_legal_basis_for_iana_transition_post_mortem_senate_hearing/&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt;&lt;i&gt; Comments On The IANA Transition And ICANN Accountability Just Net Coalition&lt;/i&gt; (2015) &amp;lt;http://forum.icann.org/lists/comments-ccwg-accountability-draft-proposal-04may15/pdfnOquQlhsmM.pdf&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; The Centre for Internet and Society, 'IANA Transition: Suggestions For Process Design' (2014) &amp;lt;http://cis-india.org/internet-governance/blog/iana-transition-suggestions-for-process-design&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Kieren McCarthy, 'Let It Go, Let It Go: How Global DNS Could Survive In The Frozen Lands Outside US Control Public Comments On Revised IANA Transition Plan' &lt;i&gt;The Register&lt;/i&gt; (2015) &amp;lt;http://www.theregister.co.uk/2015/05/26/iana_icann_latest/&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Icann.org, 'Resources - ICANN' (2014) &amp;lt;https://www.icann.org/resources/pages/process-next-steps-2014-08-14-en&amp;gt; accessed 13 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &amp;lt;https://www.icann.org/en/system/files/correspondence/crocker-chehade-to-soac-et-al-18sep14-en.pdf&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Richard Forno, '[Infowarrior] - Internet Power Grab: The Duplicity Of ICANN' (&lt;i&gt;Mail-archive.com&lt;/i&gt;, 2015) &amp;lt;https://www.mail-archive.com/infowarrior@attrition.org/msg12578.html&amp;gt; accessed 10 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; ICANN, 'Scoping Document' (2014) &amp;lt;https://www.icann.org/en/system/files/files/iana-transition-scoping-08apr14-en.pdf&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Milton Mueller, 'ICANN: Anything That Doesn’T Give IANA To Me Is Out Of Scope |' (&lt;i&gt;Internetgovernance.org&lt;/i&gt;, 2014) &amp;lt;http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;DNA Member Breakfast With Fadi Chehadé (2015-02-11)&lt;/i&gt; (The Domain Name Association 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Andrew Sullivan, '[Ianaplan] Update On IANA Transition &amp;amp; Negotiations With ICANN' (&lt;i&gt;Ietf.org&lt;/i&gt;, 2015) &amp;lt;http://www.ietf.org/mail-archive/web/ianaplan/current/msg01680.html&amp;gt; accessed 14 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Mobile.twitter.com, 'Twitter' (2015) &amp;lt;https://mobile.twitter.com/arunmsukumar/status/603952197186035712&amp;gt; accessed 12 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Alina Selyukh, 'U.S. Plan To Cede Internet Domain Control On Track: ICANN Head' &lt;i&gt;Reuters&lt;/i&gt; (2015) &amp;lt;http://www.reuters.com/article/2015/06/02/us-usa-internet-icann-idUSKBN0OI2IJ20150602&amp;gt; accessed 15 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; 114th Congress, 'H.R.2251 - Defending Internet Freedom Act Of 2015' (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; John Eggerton, 'House Bill Blocks Internet Naming Oversight Handoff: White House Opposes Legislation' &lt;i&gt;Broadcasting &amp;amp; Cable&lt;/i&gt; (2015) &amp;lt;http://www.broadcastingcable.com/news/washington/house-bill-blocks-internet-naming-oversight-handoff/141393&amp;gt; accessed 9 June 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;i&gt;Communications And Technology Subcommittee Vote On The DOTCOM Act&lt;/i&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Timothy Wilt, 'DOTCOM Act Breezes Through Committee' &lt;i&gt;Digital Liberty&lt;/i&gt; (2015) &amp;lt;http://www.digitalliberty.net/dotcom-act-breezes-committee-a319&amp;gt; accessed 22 June 2015.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1'&gt;https://cis-india.org/internet-governance/blog/iana-transitition-stewardship-icann-accountability-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2015-07-31T14:56:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages">
    <title>The Newly Updated Indic Keyboard App Now Supports 22 Asian Languages </title>
    <link>https://cis-india.org/openness/blog-old/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages</link>
    <description>
        &lt;b&gt;This blog post was written in my personal capacity.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The blog post was published by &lt;a class="external-link" href="http://globalvoicesonline.org/2015/06/12/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages/"&gt;Global Voices&lt;/a&gt; on June 12, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="http://indicproject.org" target="_blank"&gt;Indic Project&lt;/a&gt;, which belongs to&amp;nbsp;the Indian non-profit&amp;nbsp;&lt;a href="http://smc.org.in/" target="_blank"&gt;Swathanthra Malayalam Computing&lt;/a&gt; (SMC), has released a new and significantly upgraded version of its  input app “Indic Keyboard” for the Android mobile operating system. This  major update comes&amp;nbsp;roughly one year after the app's initial release in  March 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Indic Keyboard now supports 22 Asian languages, including 18 Indian  languages apart from English, and 54 input layouts. The 23 supported  languages are Assamese, Arabic, Bengali, Burmese, English, Gujarati,  Hindi, Kannada, Kashmiri, Malayalam, Manipuri, Maithili, Marathi, Mon,  Nepali, Odia, Punjabi, Sanskrit, Santali, Sinhala, Tamil, Telugu, and  Urdu. On its company blog, SMC lists the &lt;a href="http://blog.smc.org.in/indic-keyboard-version-2-0-is-out/" target="_blank"&gt;various features&lt;/a&gt; included in the new update:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Addition of 7 new languages and several new layouts.&lt;/li&gt;
&lt;li&gt;We now support 23 languages and 54 layouts in total.&lt;/li&gt;
&lt;li&gt;All new Setup wizard makes it simpler for you to get started.&lt;/li&gt;
&lt;li&gt;Material design, ability to changes themes.&lt;/li&gt;
&lt;li&gt;Material white, Material dark, Holo blue and Holo white themes are available.&lt;/li&gt;
&lt;li&gt;Intelligent word suggestion for transliteration – type faster with fewer keystrokes.&lt;/li&gt;
&lt;li&gt;For languages with complex letters we now have the ability to type ZWJ and ZWNJ characters directly.&lt;/li&gt;
&lt;li&gt;Arabic keyboard – by popular demand.&lt;/li&gt;
&lt;li&gt;Code base is updated to support Android Lollipop edition.&lt;/li&gt;
&lt;li&gt;A number of bug fixes (e.g. &lt;a href="https://github.com/smc/Indic-Keyboard/issues?q=is%3Aclosed"&gt;1&lt;/a&gt; and &lt;a href="https://gitlab.com/smc/indic-keyboard/issues?state=closed" target="_blank"&gt;2&lt;/a&gt;).&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;So far, the updated&amp;nbsp;keyboard is enjoying a warm response from users:&lt;/p&gt;
&lt;blockquote style="text-align: justify;" class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;20,000 people upgraded Indic Keyboard in first 2 days after its new release.&lt;/p&gt;
&lt;p&gt;— Jishnu (@jishnu7) &lt;a href="https://twitter.com/jishnu7/status/604651850789298176"&gt;May 30, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Brilliant for &lt;a href="https://twitter.com/hashtag/Android?src=hash"&gt;#Android&lt;/a&gt; users interested in writing in their mother tongue. Indic Keyboard v 2.0 supports 23 languages &lt;a href="http://t.co/ZVoWuMPFai"&gt;http://t.co/ZVoWuMPFai&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Karthik Subramanian (@chennaikat) &lt;a href="https://twitter.com/chennaikat/status/604134235436261377"&gt;May 29, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;One commenter &lt;a href="http://blog.explodingads.com/?p=21897"&gt;writes&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;Vernacular computing is a blocker for the complete roll  out of computers and Internet to the world. Projects like these are  welcome patches to fix that issue.&lt;/p&gt;
&lt;p&gt;Typing on touch-screens can be rethought. Especially when it comes to  Indic languages which have about double the number of characters  compared to English. We shouldn’t constrain our minds to think in  traditional layouts. Transliteration is a very good idea. But it puts  the dependency back on English. We need radicalize the input methods for  non-English languages and avoid the dependence of English altogether.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;Anivar Aravind, Executive Director of Indic Project at SMC, and  Jishnu Mohan, a Project Administrator at SMC, recently sat down with&amp;nbsp;&lt;em&gt;Rising Voices&lt;/em&gt; to discuss&amp;nbsp;the updated app.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Rising Voices (RV): &lt;/strong&gt;What was the objective behind bringing this mobile app for Indian languages? What has been Indic Project's core motivation?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;Anivar Aravind (AA):&lt;/strong&gt; Indic project  focuses on community powered Research and Development of&amp;nbsp; free and open  source Indian language information infrastructure&amp;nbsp; for majority of India  that does not speak English. “It is pretty clear that unlike most other  countries, India will be a “mobile-first” country because the first  computing device for most Indians will be the mobile and not the PC.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;Why you think language display and input are important for Indian users?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; Unavailability of Indian Language  interfaces, keyboards and fonts limits freedom of expression of people  in their native languages and prevents them from tapping the full  potential offered by smart phones and Internet. We believe all mobile  users must able to read and write in their native language using their  choice of layout. Indic Keyboard is coming as a part of our effort for  digital inclusion on the mobile frontier.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;What&amp;nbsp;is the reach of the app at this moment?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; Indic Keyboard received good user  base of 168K+ downloads so far, primarily based on user reviews, without  any advertisements and promotions.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;Can&amp;nbsp;you share how Indic Keyboard was conceived and has grown?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; Indic Keyboard was started as a personal project by Malayalam-language computing advocate and developer &lt;a href="https://twitter.com/jishnu7" target="_blank"&gt;Jishnu Mohan&lt;/a&gt; in 2013, is later upscaled into a community project collecting Indian  language layouts suitable for mobile devices, updated and maintained by  the free and open source community.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;Jishnu, as&amp;nbsp;the core developer on&amp;nbsp;this project, can&amp;nbsp;you tell us how you overcame major roadblocks while designing Indic Keyboard?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;Jishnu Mohan (JM):&lt;/strong&gt; Absence of fonts in  Android operating system was the major roadblock in increasing the  language coverage. Android 4.4 supported only few Indian scripts, but  some vendors like Samsung included more Indian language scripts. So we  decided to go with 16 language support in Indic Keyboard 1.0 version  last year. Since Android 5.1 has increased script coverage, we were able  to support more languages in this 2.0 release.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;What were&amp;nbsp;the other major challenges you faced, Anivar?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; The initial challenges of bringing a  mobile input layout were many; from building dictionaries to the user  interface. Google's&amp;nbsp; &lt;a href="https://source.android.com/" target="_blank"&gt;Android Open Source&lt;/a&gt; Project (AOS) was used as a base for building this app where the  keyboards that were integrated came from various sources. Keyboard  layouts are not copyrighted and this was very useful for us to use a  popular layout like Tamil99 for Tamil or another popular layout like &lt;a href="http://www.mediawiki.org/wiki/Help:Extension:UniversalLanguageSelector/Input_methods/or-lekhani" target="_blank"&gt;Lekhani &lt;/a&gt;that was developed by the Odia Wikimedia community.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote style="text-align: justify;" class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Happy to see Script support for Odiya ,  Saurashtra , Meetri Mayek, Lepcha, Limbu, Ol chikki (Santhali), Sylheti  Nagari In Android 5.1&lt;/p&gt;
&lt;p&gt;— indicproject (@indicproject) &lt;a href="https://twitter.com/indicproject/status/576962425850720256"&gt;March 15, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;How was Indic Project started and what have been its&amp;nbsp;major accomplishments, so far?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; During 2005-2008 major ground work  was done for localization support in Indic languages and overall  improvement of communication using Indian languages. By 2009 web based  technology were became our focus which oriented towards building and  improving mobile applications for more users reading and writing in  their native Indian languages. The&amp;nbsp; project upscaling&amp;nbsp; and 1.0 release  of project was part of with the SMC-&lt;a href="http://icfoss.in/" target="_blank"&gt;ICFOSS &lt;/a&gt;collaboration as a part of &lt;a href="http://www.dot.gov.in/" target="_blank"&gt;Department of Telecommunications&lt;/a&gt; (DIT) Android R &amp;amp; D Project of the Government of India. The project also received &lt;a href="http://blog.smc.org.in/policy-brief-mobile-indian-lang/" target="_blank"&gt;another grant&lt;/a&gt; from ICFOSS via Government of Kerala's &lt;a href="http://www.itmission.kerala.gov.in/malayalam-computing.php" target="_blank"&gt;Malayalam Computing project&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;What can you&amp;nbsp;tell us about your work in policy-level lobbying and&amp;nbsp;negotiations?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; We have done some work in policy  front and recently submitted a policy brief requesting the government to  mandate the inclusion of at least one Indian language font and one  keyboard layout of all 22 official languages recognized as per &lt;a href="http://en.wikipedia.org/wiki/Languages_with_official_status_in_India#Eighth_Schedule_to_the_Constitution" target="_blank"&gt;8th schedule&lt;/a&gt; of the Indian constitution in all smart phones and tablets selling in India.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;How did you reach so many users? What are your&amp;nbsp;future promotion plans?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; The most important reason why Indic  Keyboard reached out to 200k users with over 100k downloads is because  of it not bringing up new keyboard layouts where as almost all other  mobile input apps have their own proprietary layouts that users take  time to learn and use.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;What are the difficulties of reaching out to masses of people?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; Many of the layouts were already  popular and it was an added benefit for the primarily targeting people  who know about inputting in their languages. Partnerships with mobile  manufacturers and integrators this year for adoption of these keyboards.  So users can get Indian language experience via vendor firmware itself  without any extra download. Indic Keyboard liberated Indian language  input in mobile devices and we want to port the same experience to all  emerging mobile platforms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;RV: &lt;/strong&gt;Are there any&amp;nbsp;final comments or bit of information you'd like to share?&lt;/p&gt;
&lt;blockquote style="text-align: justify;"&gt;
&lt;p&gt;&lt;strong&gt;AA:&lt;/strong&gt; Continuing research and development  in this domain including ability to download of dictionaries for user  preferred languages, increasing coverage to all 22 official languages in  India, developing an free software library for gesture typing and  building support for predictive input will be our main focus in the  future.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;As a promoter and developer of free and open source language  technology, SMC plans to focus more on cross-platform mobile  input-library-building and policy-level adoption for language input and  other language technology advancements in the near future. SMC says  it's&amp;nbsp;currently in talks&amp;nbsp;with the Indian government about mandating  native keyboards on smart phones.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The keyboard can&amp;nbsp;be downloaded from the Google&amp;nbsp;Play store at &lt;a href="http://j.mp/indicmal" target="_blank"&gt;http://j.mp/indicmal&lt;/a&gt; and also from the software repository at Gitlab at &lt;a href="https://gitlab.com/smc/indic-keyboard" target="_blank"&gt;https://gitlab.com/smc/indic-keyboard&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages'&gt;https://cis-india.org/openness/blog-old/the-newly-updated-indic-keyboard-app-now-supports-22-asian-languages&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T18:21:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
