<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1711 to 1725.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/april-2010-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/approaching-open-research-via-open-data-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/research-into-spectrum-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anti-social-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-report-2017-2018.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/annual-report-2016-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/annual-report-2015-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-report-2014-15.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/annual-report-2012-13.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/reports/annual-report-2011-2012.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/annual-report-2009.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/annual-report-2008.pdf"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2011-bulletin">
    <title>April 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India.&lt;/p&gt;
&lt;h3&gt;Workshops organised in Bangalore&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=334&amp;amp;qid=39041" target="_blank"&gt;Shadow Search Project (SSP)&lt;/a&gt; [CIS, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=335&amp;amp;qid=39041" target="_blank"&gt;Facebook Resistance&lt;/a&gt;&lt;/span&gt; [CIS, April 2, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;Columns on Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A fortnightly column on ‘Digital Natives’ authored by Nishant Shah is featured in the Sunday Eye, the national edition of Indian Express, Delhi, from 19 September 2010 onwards. The following were published in the month of April:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=336&amp;amp;qid=39041" target="_blank"&gt;Who the Hack?&lt;/a&gt;&lt;/span&gt; [Indian Express, April 24, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=337&amp;amp;qid=39041" target="_blank"&gt;One for the avatar&lt;/a&gt;&lt;/span&gt; [Indian Express, April 3, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives Newsletter&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Links in the Chain is a bi-monthly publication which highlights the projects, ideas and news of the Digital Natives with a Cause? The first issue of volume IV is here:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=338&amp;amp;qid=39041" target="_blank"&gt;links in the chain volume 4 Best Practices&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry by Samuel Tettner&lt;/h3&gt;
&lt;p&gt;Samuel Tettner is a Digital Natives Coordinator in CIS. He has written the following blog entry:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=339&amp;amp;qid=39041" target="_blank"&gt;Cyber Fears: What scares Digital Natives and those around them&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;Workshop organised in Hyderabad&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=340&amp;amp;qid=39041" target="_blank"&gt;Web Sites Accessibility Evaluation Methodologies: Conference Report&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software. Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=341&amp;amp;qid=39041" target="_blank"&gt;Comments on Draft National Policy on ICT in School Education&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=342&amp;amp;qid=39041" target="_blank"&gt;Towards Open and Equitable Access to Research and Knowledge for Development&lt;/a&gt;&lt;/span&gt; [PLoS, March 29, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;Featured&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=343&amp;amp;qid=39041" target="_blank"&gt;DIT's Response to RTI on Website Blocking&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=344&amp;amp;qid=39041" target="_blank"&gt;What are the legal provisions for blocking websites in India?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=345&amp;amp;qid=39041" target="_blank"&gt;We are anonymous, we are legion&lt;/a&gt;&lt;/span&gt; [published in the Hindu, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=346&amp;amp;qid=39041" target="_blank"&gt;You Have the Right to Remain Silent&lt;/a&gt;&lt;/span&gt; [published in the Sunday Guardian, April 17, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Study Tour&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=347&amp;amp;qid=39041" target="_blank"&gt;Iraq Delegation to Visit India for Study of E-Governance in Indian Cities ― Meetings in Bangalore and Delhi&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=348&amp;amp;qid=39041" target="_blank"&gt;The DNA Profiling Bill 2007 and Privacy&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=349&amp;amp;qid=39041" target="_blank"&gt;Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Interview&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=350&amp;amp;qid=39041" target="_blank"&gt;An Interview with Activist Shubha Chacko: Privacy and Sex workers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshops organized in Ahmedabad and Bangalore&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=351&amp;amp;qid=39041" target="_blank"&gt;'Privacy Matters', Ahmedabad: Conference Report&lt;/a&gt;&lt;/span&gt; [Ahmedabad Management Association, Ahmedabad, March 26, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=352&amp;amp;qid=39041" target="_blank"&gt;Privacy, By Design&lt;/a&gt;&lt;/span&gt; [CIS, April 16, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=353&amp;amp;qid=39041" target="_blank"&gt;Is Data Protection Enough?&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=354&amp;amp;qid=39041" target="_blank"&gt;Surveillance Technologies&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=355&amp;amp;qid=39041" target="_blank"&gt;Encryption Standards and Practices&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=356&amp;amp;qid=39041" target="_blank"&gt;News Broadcasting Standards Authority censures TV9 over privacy violations!&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Column&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=357&amp;amp;qid=39041" target="_blank"&gt;Learning from Fukushima&lt;/a&gt;&lt;/span&gt; [published in the Business Standard on April 7, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=358&amp;amp;qid=39041" target="_blank"&gt;The Gary Chapman International School on Digital Transformation&lt;/a&gt;&lt;/span&gt;[International School on Digital Transformation, July 17-22, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=359&amp;amp;qid=39041" target="_blank"&gt;Iraqi delegation in Bangalore to study e-governance projects&lt;/a&gt;&lt;/span&gt; [Economic Times, April 20, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=360&amp;amp;qid=39041" target="_blank"&gt;Dark waders&lt;/a&gt;&lt;/span&gt; [Time Out Bengaluru, Vol. 3, Issue 20, April 15 - 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=361&amp;amp;qid=39041" target="_blank"&gt;Beyond Clicktivism&lt;/a&gt;&lt;/span&gt; [Outlook, April 18, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=362&amp;amp;qid=39041" target="_blank"&gt;Gone in a flash&lt;/a&gt;&lt;/span&gt; [Times of India, April 16, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=363&amp;amp;qid=39041" target="_blank"&gt;How Web 2.0 responded to Hazare&lt;/a&gt;&lt;/span&gt; [Hindu, April 11, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=364&amp;amp;qid=39041" target="_blank"&gt;EU Commissioner Hedegaard to deliver keynote address at consumer world congress&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=365&amp;amp;qid=39041" target="_blank"&gt;Net cracker&lt;/a&gt;&lt;/span&gt; [Time Out Bengaluru Vol. 3 Issue 19, April 1 - 14, 2011]&lt;/li&gt;
&lt;li&gt;&lt;span style="text-decoration: underline;"&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=366&amp;amp;qid=39041" target="_blank"&gt;On the Path to Global Open Access: A Few More Miles to Go&lt;/a&gt;&lt;/span&gt; [PLoS, March 2011, Volume 8, Issue 3]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=367&amp;amp;qid=39041" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=368&amp;amp;qid=39041" target="_blank"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=369&amp;amp;qid=39041" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=370&amp;amp;qid=39041" target="_blank"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2011-bulletin'&gt;https://cis-india.org/about/newsletters/april-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T10:45:01Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/april-2010-bulletin">
    <title>April 2010 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/april-2010-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! We bring you updates of our research, events and news for the month of April 2010.&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;News Updates &lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;Worries voiced over ID Project&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Government of India's Unique Identification (UID) Project came under flak at a workshop organised jointly by the Citizen Action Forum (CAF), the People's Union of Civil Liberties - Karnataka, the Alternative Law Forum and the Centre for Internet and Society - An article in The Hindu - 17th April.&lt;br /&gt; &lt;a href="https://cis-india.org/news/worries-voiced-over-id-project" target="_blank"&gt;http://cis-india.org/news/worries-voiced-over-id-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID: A debate on the Fundamental Rights&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;UID: A debate on the Fundamental Rights - was jointly organized by the Citizen Action Forum, People's Union for Civil Liberties - Karnataka, Alternative Law Forum and the Centre for Internet and Society on April 16th at IAT, Queens Road, Bangalore - An article in the Prajavani news paper - April 17th. &lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-a-debate-on-fundamental-rights" target="_blank"&gt;http://cis-india.org/news/uid-a-debate-on-fundamental-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;UID is an invasion of Privacy: Experts&lt;/b&gt;&lt;br /&gt; The Nandan Nilekani headed Unique Identification Authority of India (UIDAI) came in for much criricism at the first of a series of debates on the issue organised in the city on Friday - Deccan Chronicle, April 17th.&lt;br /&gt; &lt;a href="https://cis-india.org/news/uid-is-an-invasion-of-privacy-experts" target="_blank"&gt;http://cis-india.org/news/uid-is-an-invasion-of-privacy-experts&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Experts debate on UID and rights &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Bangalore, Apr 16, DHNS: A debate on ‘UID and Fundamental Rights’ organised by several city-based organisations, discussed the social, ethical issues, economic and legal issues that accompanies the UID. &lt;br /&gt; &lt;a href="https://cis-india.org/news/experts-debate-on-uid-and-rights" target="_blank"&gt;http://cis-india.org/news/experts-debate-on-uid-and-rights&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Amendment to Copyright Act opposed &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A report on the press conference held on 15th April, at the Press Club, Bangalore: The Hindu &lt;br /&gt; &lt;a href="https://cis-india.org/news/amendment-to-copyright-act-opposed" target="_blank"&gt;http://cis-india.org/news/amendment-to-copyright-act-opposed&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;They fight for the visually challenged &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Times News Network - A report on the press conference held at the Press Club, Bangalore on 15th April, 2010. &lt;br /&gt; &lt;a href="https://cis-india.org/news/they-fight-for-the-visually-challenged" target="_blank"&gt;http://cis-india.org/news/they-fight-for-the-visually-challenged&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Digital Natives Research Project Coordinator &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Centre for Internet and Society, Bangalore, in collaboration with Hivos Netherlands, is looking for a Research Project Coordinator to help develop a knowledge network and coordinate international workshops for the project "Digital Natives with a Cause?" &lt;br /&gt; &lt;a href="https://cis-india.org/news/research-coordinator" target="_blank"&gt;http://cis-india.org/news/research-coordinator&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Expel or not? That is the question &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The decision of an international school to expel 14 students for their alleged ‘promiscuous’ behaviour has led to much debate and discussion. &lt;br /&gt; &lt;a href="https://cis-india.org/news/expel-or-not" target="_blank"&gt;http://cis-india.org/news/expel-or-not&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Nokia eyes GeNext to tap mobile email mkt &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Finnish handset giant banks on youth to be in the technology race &lt;br /&gt; &lt;a href="https://cis-india.org/news/nokia-eyes-genNext" target="_blank"&gt;http://cis-india.org/news/nokia-eyes-genNext&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Research&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Critical Point of View: Videos &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;The Second event for the Critical Point of View reader on Wikipedia was held in Amsterdam, by the Institute of Network Cultures and the Centre for Internet and Society. A wide range of scholars, academics, researchers, practitioners, artists and users came together to discuss questions on design, analytics, access, education, theory, art, history and processes of knowledge production. The videos for the full event are now available for free viewing and dissemination.&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Colour Me Political &lt;/b&gt;&lt;br /&gt; What are the tools that Digital Natives use to mobilise groups towards a particular cause? How do they engage with crises in their immediate environments? Are they using their popular social networking sites and web 2.0 applications for merely entertainment? Or are these tools actually helping them to re-articulate the realm of the political? Nishant Shah looks at the recent Facebook Colour Meme to see how new forms of political participation and engagement are being initiated by young people across the world.&lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn2" target="_blank"&gt;http://cis-india.org/research/dn/dn2&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Meet the Web 2.0 Suicide Machine&lt;/b&gt;&lt;br /&gt;Digital Natives live their lives differently. But sometimes, they also die their lives differently! What happens when we die online? Can the digital avatar die? What is digital life? The Web 2.0 Suicide machine that has now popularly been called the 'anti-social-networking' application brings some of these questions to the fore. As a part of the Hivos-CIS "Digital Natives with a Cause?" research programme, Nishant Shah writes about how Life on the Screen is much more than just a series of games. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dn1" target="_blank"&gt;http://cis-india.org/research/dn/dn1&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Digital Natives with a Cause? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Digital Natives With A Cause? - a product of the Hivos-CIS collaboration charts the scholarship and practice of youth and technology with a specific attention for developing countries to create a framework that consolidates existing paradigms and informs further research and intervention within diverse contexts and cultures. &lt;br /&gt; &lt;a href="https://cis-india.org/research/dn/dnrep" target="_blank"&gt;http://cis-india.org/research/dn/dnrep&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;e-Accessibility: A Wiki Project &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Envisaged and funded by the National Internet Exchange of India, and executed by the Centre for Internet and Society, a Wiki site pertaining to issues of disability and e-accessibility has recently been launched. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/e-accessibility-a-wiki-project&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Copyright Law as a tool for Inclusion &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Can Copyright Law be used as a tool for Inclusion? Rahul Cherian examines this in his blog on copyright. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/copyright-law-as-tool-for-inclusion&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal"&gt;&lt;b&gt;Web Accessibility as a Government Mandate?&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;/span&gt;Is Web accessibility just a Government Mandate? Should private sites be ignored? Wesolowski examines this in light of the steps taken by ictQATAR to make its website accessible to W3C standards, and hopes that Qatar and eventually all other Arab nations will follow suit and make Web accessibility much more of a mandate. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate" target="_blank"&gt;http://cis-india.org/advocacy/accessibility/blog/web-accessibility-government-mandate&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription"&gt;&lt;b&gt;When Copyright Goes Bad &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;A part of the Access to Knowledge Project, this short film by Consumers International is available on DVD and online at A2Knetwork.org/film. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad" target="_blank"&gt;http://cis-india.org/advocacy/ipr/blog/when-copyright-goes-bad&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Research Project on Open Video in India &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Open Video Alliance and the Centre for Internet and Society are calling for researchers for a project on open video in India, its potentials, limitations, and recommendations on policy interventions. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/open-video-research" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/open-video-research&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Does the Social Web need a Googopoly?&lt;/b&gt;&lt;br /&gt;While the utility of the new social tool Buzz is still under question, the bold move into social space taken last week by the Google Buzz team has Gmail users questioning privacy implications of the new feature. In this post, I posit that Buzz highlights two privacy challenges of the social web. First, the application has sidestepped the consensual and contextual qualities desirable of social spaces. Secondly, Google’s move highlights the increasingly competitive and convergent nature of the social media landscape. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/does-the-social-web-need-a-googopoly&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;The (in)Visible Subject: Power, Privacy and Social Networking &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;In this entry, I will argue that the interplay between privacy and power on social network sites works ultimately to subject individuals to the gaze of others, or to alternatively render them invisible. Individual choices concerning privacy preferences must, therefore, be informed by the intrinsic relationship which exists between publicness/privateness and subjectivity/obscurity. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking" target="_blank"&gt;http://cis-india.org/advocacy/openness/blog/the-in-visible-subject-power-privacy-and-social-networking&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Does the Safe-Harbor Program Adequately Address Third Parties Online? &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data. Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Sense and censorship &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Sunil Abraham examines Google's crusade against censorship in China in wake of the attacks on its servers in this article published in the Indian Express. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/sense-and-censorship" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/sense-and-censorship&lt;/a&gt;&lt;/p&gt;
&lt;p class="ecxmsonormal" style="text-align: justify; "&gt;&lt;b&gt;Report on the Fourth Internet Governance Forum for Commonwealth IGF &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;This report by Pranesh Prakash reflects on the question of how useful is the IGF in the light of meetings on the themes of intellectual property, freedom of speech and privacy. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF" target="_blank"&gt;http://cis-india.org/advocacy/igov/blog/report-on-fourth-IGF&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h3&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;The Right Ring Tone &lt;/b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;Focus on improving service quality with a strong partner, and not on one-shot stake sales, says Shyam Ponappa in his article published in the Business Standard on April 1, 2010. &lt;span style="text-decoration: underline;"&gt;&lt;br /&gt; &lt;/span&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/ring-tone" target="_blank"&gt;http://cis-india.org/advocacy/telecom/blog/ring-tone&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Other Advocacy&lt;/b&gt;&lt;/h2&gt;
&lt;p class="ecxdocumentdescription" style="text-align: justify; "&gt;&lt;b&gt;Maps for Making Change Wiki Now Open to the Public &lt;/b&gt;&lt;br /&gt; Since December 2009, CIS has been coordinating and nurturing the Maps for Making Change project, organised in collaboration with Tactical Tech. During the past four months, participants have been on a challenging yet fertile and inspiring journey that is now slowly coming to an end. Would you like to know more about what has happened in the time that has passed? The Maps for Making Change wiki is a good place to start. &lt;br /&gt; &lt;a href="https://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public" target="_blank"&gt;http://cis-india.org/advocacy/others/maps-for-making-change-wiki-now-open-to-the-public&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/april-2010-bulletin'&gt;https://cis-india.org/about/newsletters/april-2010-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2012-08-13T04:51:19Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/approaching-open-research-via-open-data-2015">
    <title>Approaching Open Research via Open Data - Presentation at TERI, December 22, 2015</title>
    <link>https://cis-india.org/openness/approaching-open-research-via-open-data-2015</link>
    <description>
        &lt;b&gt;The Energy and Resources Institute (TERI), Delhi, organised a seminar on 'Open Access in Research Area: A Strategic Approach' on December 22, 2015. We supported the seminar as a knowledge partner. Sumandro Chattapadhyay was invited to deliver a special address. Here are the notes and slides from the presentation.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The brief presentation foregrounded &lt;em&gt;open data&lt;/em&gt; as a crucial part of open research, and also as an instrument of opening up research for public consumption, discussion, and scrutiny.&lt;/p&gt;
&lt;p&gt;The presentation started with reference to the &lt;a href="http://cis-india.org/openness/open-access-dialogues-report"&gt;Open Access Dialogues&lt;/a&gt; organised by The African Commons Project and the Centre for Internet and Society during November 2012 to March 2013 that explored the global open access agenda from a developing world perspective.&lt;/p&gt;
&lt;p&gt;I noted that one of the key findings from the Indian participants of the online consultations organised as part of the Open Access Dialogues was the need for a &lt;em&gt;broader vision of open access&lt;/em&gt;. Open research data is a key component of this broader vision of open access and open research.&lt;/p&gt;
&lt;p&gt;There was a brief discussion of how to start doing and thinking about open data as an approach to open research. I highlighted the need to get started on 1) getting government to open up data relevant to research, 2) opening up academic research data, and 3) sectoral conversations on data standards (technical and semantic); as well as the need to think about 1) open data as bridge across disciplinary communities, 2) quantification of life and the widening sphere of research data, and 3) academic research and public life.&lt;/p&gt;
&lt;p&gt;In next slides, I quickly mentioned the international processes going on in the open data landscape - the conversation on open data and Sustainable Development Data, the possibility of using big (social and telecom) data for purposes of development monitoring, and the International Open Data Charter as a set of global principles for open data.&lt;/p&gt;
&lt;p&gt;More about the seminar: &lt;a href="http://cis-india.org/openness/teri-seminar-on-open-access-in-research"&gt;http://cis-india.org/openness/teri-seminar-on-open-access-in-research&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/la5ulZYBT15DiL" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/approaching-open-research-via-open-data-2015'&gt;https://cis-india.org/openness/approaching-open-research-via-open-data-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Research</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-01-12T14:37:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/research-into-spectrum-regulation">
    <title>APC starts research into spectrum regulation in Brazil, India, Kenya, Morocco, Nigeria and South Africa</title>
    <link>https://cis-india.org/news/research-into-spectrum-regulation</link>
    <description>
        &lt;b&gt;Communication infrastructure is the foundation of the knowledge-based economy and while there has been a boom in the construction of undersea cables bringing potentially terabits of capacity to the African continent, the ability to deliver broadband to consumers is hampered by inefficient telecommunications markets and policies. Wireless connectivity offers tremendous potential to deliver affordable broadband to developing countries but inefficient spectrum policy and regulation means the opportunity to seize the advantages brought about by improvements in wireless  broadband technologies are extremely limited. &lt;/b&gt;
        
&lt;h3&gt;Spectrum policy in a nutshell&lt;/h3&gt;
&lt;p&gt;Television, mobile phones, wireless&amp;nbsp; networking and amateur radio all transmit their data using radio waves. Different parts of the radio spectrum are used for different radio transmission technologies and applications and ranges of allocated frequencies are often referred to by their provisioned use (for example, wireless&amp;nbsp; spectrum or television spectrum). Spectrum policy around the world focuses on three factors – allocation, assignment and enforcement.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Allocation sets aside spectrum for specific uses such as cell phones at 1.9 GHz, and broadcast TV at 500 Mhz.&lt;/li&gt;&lt;li&gt;Assignment is most widely carried out through spectrum auctions. In a spectrum auction, those who make the highest bid secure use of the spectrum.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Enforcement (within nations) is usually split between two institutions – a governmental/ministerial one that overseas spectrum relating to and reserved for national security and a regulatory one for the enforcement of spectrum that fulfils commercial and/or socio-economic objectives.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;We are seeing accelerated change in the capacity of wireless&amp;nbsp; technologies to deliver affordable access. According to wireless&amp;nbsp; pioneer Martin Cooper, “every 30 months the amount of information that can be transmitted over a given amount of radio spectrum doubles”. However, without forward-looking policy and regulation that can embrace the rapid change in wireless&amp;nbsp; technologies, African, Asian and Latin American countries will miss the opportunity to allow affordable, pervasive wireless&amp;nbsp; broadband infrastructure to develop in their countries.&lt;/p&gt;
&lt;p&gt;Unfortunately, one of the biggest barriers to utilising this opportunity is simply a lack of awareness of global trends and of what policy and regulatory processes exist to manage spectrum.&lt;/p&gt;
&lt;p&gt;APC’s new research: Understanding spectrum regulation&lt;br /&gt;The overall goal of APC’s new research project is to provide an understanding of spectrum regulation in several countries in Africa, Asia and Latin America, not just in terms of making information available, or how spectrum is assigned, but who deals with spectrum and what policy or regulatory framework is currently in use.&lt;/p&gt;
&lt;p&gt;The procedures governing spectrum allocation and assignment are often opaque, highly technical and governed by an inner circle of technical experts in the regulators, operators and equipment suppliers in each country. An important dimension of the research will lie in decoding some of this complexity and making the information as transparent and accessible as possible. The research will also seek to examine arguments that proclaim the scarcity of spectrum1.&lt;/p&gt;
&lt;p&gt;The research is timely as the rapid growth of wireless&amp;nbsp; and mobile in Asia, Africa and Latin America is raising fresh questions about the use of spectrum and the policies that govern it. Civil society-based alliances such as the Open Spectrum Alliance in South Africa2 and the national broadband campaigns in South Africa3, Ghana and Nigeria are raising spectrum issues. Digital migration and the opportunity it creates to make use of white spaces in frequencies currently allocated for broadcasting for broadband wireless&amp;nbsp; networks has renewed interest by governments in auctioning off blocks of spectrum as a revenue-generating mechanism. The research will feed into this dynamic context of debate and dialogue on spectrum regulation and wireless&amp;nbsp; broadband.&lt;/p&gt;
&lt;h3&gt;Indians look beyond the present&lt;/h3&gt;
&lt;p&gt;In India the research will go beyond the current status of spectrum regulation and and also will look at the current and potential use of pooled spectrum and infrastructure sharing by mobile operators. Pooled spectrum is an alternative to the open spectrum approach with licensed network/facilities providers and regulated rates/tariffs (because of the rationale of network economies). The Indian study will also explore two additional areas which could also be of value in other parts of the world:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Whether spectrum rights can remain publicly owned/operated by the government, while usage rights are made available for a fee; and, the costs and benefits of larger bands of open spectrum versus the experience-curve benefits of legacy systems, with indicative time frames. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;The APC open spectrum for development initiative will be implemented in partnership with the Open Society Institute (OSI), the International Development Research Centre (IDRC), the Shuttleworth Foundation in South Africa and the Centre for Internet and Society in India. OSI is supporting the research in Kenya, Morocco and Nigeria and IDRC the research in Brazil and India. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Read more about the APC’s &lt;a class="external-link" href="http://www.apc.org/en/projects/open-spectrum-development"&gt;Open spectrum project&lt;/a&gt;&lt;/p&gt;
&lt;a class="external-link" href="http://www.apc.org/en/news/apc-starts-research-spectrum-regulation-brazil-ind"&gt;Click here&lt;/a&gt; for the original article in APC

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/research-into-spectrum-regulation'&gt;https://cis-india.org/news/research-into-spectrum-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2011-04-02T11:56:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions">
    <title>Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions</link>
    <description>
        &lt;b&gt;This paper is divided into three sections. The first section puts forth a comparative table of the spam laws of five different countries - the United States of America, Australia, Canada, Singapore and the United Kingdom - based on eight distinct parameters- jurisdiction of the legislation, definition of ‘spam’, understanding of consent, labelling requirements, types of senders covered, entities empowered to sue, exceptions made and penalties prescribed. The second section is a brief background of the problem of spam and it attempts to establish the context in which the paper is written. The third section is a critical analysis of the laws covered in the first section. In an effort to spot the various loopholes in these laws and suggest effective alternatives, this section points out the distinctions between the various legislations and discusses briefly their respective advantages and disadvantages.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Note:- This analysis is a part of a larger attempt at formulating a model anti-spam law for India by analyzing the existing spam laws across the world.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;CAN-SPAM Act, 2003&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Act, 2003 (Australia)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Spam Control Act, 2007 (Singapore)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Canada's Anti-Spam Legislation, 2014&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;The Privacy and Electronic Communications (EC Directive) Regulations, 2003&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;(United Kingdom)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The defendant must be either an inhabitant of the United States or have a physical place of business in the US.[1]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have an "Australian link" i.e.&lt;/p&gt;
&lt;p&gt;(a) the message originates in Australia; or&lt;/p&gt;
&lt;p&gt;(b) the individual or organisation who sent the message, or&lt;/p&gt;
&lt;p&gt;authorised the sending of the message, is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation whose central management and control&lt;/p&gt;
&lt;p&gt;is in Australia when the message is sent; or&lt;/p&gt;
&lt;p&gt;(c) the computer, server or device that is used to access the&lt;/p&gt;
&lt;p&gt;message is located in Australia; or&lt;/p&gt;
&lt;p&gt;(d) the relevant electronic account-holder is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia&lt;/p&gt;
&lt;p&gt;when the message is&lt;/p&gt;
&lt;p&gt;Spam Act, 2003, § 7&lt;/p&gt;
&lt;p&gt;Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p&gt;Canada's Anti-Spam Legislation, 2014, §accessed; or&lt;/p&gt;
&lt;p&gt;(ii) an organisation that carries on business or activities in&lt;/p&gt;
&lt;p&gt;Australia when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address does not exist-assuming that the&lt;/p&gt;
&lt;p&gt;electronic address existed, it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, server&lt;/p&gt;
&lt;p&gt;or device located in Australia.[2]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;National Jurisdiction.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Must have a "Singapore link"&lt;/p&gt;
&lt;p&gt;An electronic message has a Singapore link in the following circumstances:&lt;/p&gt;
&lt;p&gt;(a) the message originates in Singapore;&lt;/p&gt;
&lt;p&gt;(b) the sender of the message is -&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is sent; or&lt;/p&gt;
&lt;p&gt;(ii) an entity whose central management and control is in Singapore when the message is sent;&lt;/p&gt;
&lt;p&gt;© the computer, mobile telephone, server or device that is used to access the message is located in Singapore;&lt;/p&gt;
&lt;p&gt;the recipient of the message is-&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(ii)an entity that carries on business or activities in Singapore when the message is accessed; or&lt;/p&gt;
&lt;p&gt;(e) if the message cannot be delivered because the relevant&lt;/p&gt;
&lt;p&gt;electronic address has ceased to exist (assuming that the electronic address existed), it is reasonably likely that the&lt;/p&gt;
&lt;p&gt;message would have been accessed using a computer, mobile telephone, server or device located in Singapore.[3]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Extends to cases where the mail originates in a foreign state but is accessed in Canada&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6 of the CASL prohibits the sending of unsolicited CEMs.[4]&lt;/p&gt;
&lt;p&gt;As per Section 12 of the CASL, A person contravenes section 6 only if a computer system located in Canada is used to send &lt;i&gt;or&lt;/i&gt; access the electronic message.&lt;/p&gt;
&lt;p&gt;CASL applies to CEMs sent from, or accessed in, Canada.[5]&lt;/p&gt;
&lt;p&gt;So, if a CEM is sent to Canadians from another jurisdiction, CASL will apply. Notably, there is an exception where the person sending the 					message "reasonably believes" that the message will be accessed in one of a list&lt;/p&gt;
&lt;p&gt;of prescribed jurisdictions with anti-spam laws thought to&lt;/p&gt;
&lt;p&gt;be 'substantially similar' to CASL and the message complies with the laws of that jurisdiction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;European Union&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;These regulations can be enforced against a person or a company anywhere in the European Union who violates the regulations.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Definition Of Spam&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic mail"[6], where&lt;/p&gt;
&lt;p&gt;a commercial electronic mail is "any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a 					commercial product or service"[7]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic messages" where electronic message means a message sent "using an internet carriage service or any other 					listed carriage service; and to an electronic address in connection with: an e-mail account; or an instant messaging account; or a 					telephone&lt;/p&gt;
&lt;p&gt;account; or a similar accounts."[8]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited commercial electronic message sent in bulk", where&lt;/p&gt;
&lt;p&gt;a CEM is &lt;i&gt;unsolicited&lt;/i&gt; if the recipient did not-&lt;/p&gt;
&lt;p&gt;i) request to receive the message; or&lt;/p&gt;
&lt;p&gt;ii)consent to the receipt of the message;[9] and&lt;/p&gt;
&lt;p&gt;CEMs shall be deemed to be sent in bulk if a person sends, causes to be sent or authorizes the sending of-&lt;/p&gt;
&lt;p&gt;a) more than 100 messages containing the same subject matter during a 24-hour period;&lt;/p&gt;
&lt;p&gt;b) more than 1,000 messages containing the same subject matter during a 30-day period;&lt;/p&gt;
&lt;p&gt;c) more than 10,000 messages containing the same subject matter during a one-year period.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;"unsolicited, commercial, electronic message"[10]&lt;/p&gt;
&lt;p&gt;where, an "electronic message" means a message sent by any means of telecommunication, including a text, sound, voice or image message.[11]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These rules apply to all unsolicited direct marketing communications by automatic call machines[12], fax[13], calls[14] or e-mail[15].&lt;/p&gt;
&lt;p&gt;Where, "direct marketing" is defined as "the communication (by whatever means) of any advertising or marketing material which is directed 					to particular individuals"[16]&lt;/p&gt;
&lt;p&gt;The UK used its discretion to include voice-to-voice telephone calls as well.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td rowspan="2"&gt;
&lt;p&gt;&lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-out&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Opt-in&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message provides-&lt;/p&gt;
&lt;p&gt;(i)clear and conspicuous identification that the message is an advertisement or solicitation;&lt;/p&gt;
&lt;p&gt;(ii)clear and conspicuous notice of the opportunity under paragraph (3) to decline to receive further commercial electronic mail messages 					from the sender; and&lt;/p&gt;
&lt;p&gt;(iii) a valid physical postal address of the sender.[17]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 16 prohibits the sending of unsolicited commercial electronic messages. However, where a recipient has consented to the sending of 					the message, the said prohibition does not apply.[18]&lt;/p&gt;
&lt;p&gt;Consent means:&lt;/p&gt;
&lt;p&gt;(a) express consent; or&lt;/p&gt;
&lt;p&gt;(b) consent that can reasonably be inferred from:&lt;/p&gt;
&lt;p&gt;(i) the conduct; and&lt;/p&gt;
&lt;p&gt;(ii) the business and other relationships;&lt;/p&gt;
&lt;p&gt;of the individual or organisation concerned.[19]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;CEMs are unlawful unless the message contains-&lt;/p&gt;
&lt;p&gt;1 a) an electronic mail address, an Internet location address, a telephone number, a facsimile number or a postal address that the 					recipient may use to submit an unsubscribe request; and&lt;/p&gt;
&lt;p&gt;b) a statement the above information may be utilized to send an unsubscribe request.&lt;/p&gt;
&lt;p&gt;2. Where the unsolicited CEM is received by text or multimedia message sent to a mobile telephone number, the CEM must include a mobile 					telephone number to which the recipient may send an unsubscribe request. [20]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Under the CASL, it is prohibited to send or cause or permit to be sent to an electronic address a commercial electronic message unless,&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person to whom the message is sent has consented to receiving it, whether the consent is express or implied; &lt;i&gt;and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;)&lt;/p&gt;
&lt;p&gt;The message must-&lt;/p&gt;
&lt;p&gt;(i) set out prescribed information that identifies the person who sent the message and the person - if different - on whose behalf it is 					sent;&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;ii&lt;/i&gt;) set out information enabling the person to whom the message is sent to readily contact one of the persons referred to in 					paragraph&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;i&lt;/i&gt;); and&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;iii)&lt;/i&gt; set out an unsubscribe mechanism in accordance with subsection 11(1) of CASL.[21]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Under Section 19&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, communications comprising recorded matter for direct marketing 					purposes by means of an automated calling system except in the circumstances where the called line is that of a subscriber who has 					previously notified the caller that &lt;i&gt;for the time being he consents to such communications&lt;/i&gt; being sent by, or at the instigation of, 					the caller on that line.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 20&lt;/b&gt; , A person shall neither transmit, nor instigate the transmission of, unsolicited communications for direct marketing purposes by means of 					a facsimile machine where the called line is that of an individual or a company except in the circumstances where the individual subscriber 					has previously notified the caller that he consents for the time being to such communications being sent by, or at the instigation of, the 					caller.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 21,&lt;/b&gt; A person shall neither use, nor instigate the use of, a public electronic communications service for the purposes of making unsolicited calls for direct marketing purposes where the called line is that of a subscriber who has					&lt;i&gt;previously notified the caller that such calls should not for the time being be made on that line&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Under Section 22&lt;/b&gt; , a person shall neither transmit, nor instigate the transmission of, unsolicited communications for the purposes of direct marketing by means of electronic mail unless the recipient of the electronic mail has previously notified the sender that					&lt;i&gt;he consents for the time being to such communications being sent by, or at the instigation of, the sender.&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Labelling Requirements&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Warning Labels mandatory on e-mails containing pornographic content&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;No person may send to a protected computer, any commercial electronic mail message that includes sexually oriented material and-&lt;/p&gt;
&lt;p&gt;(a) fail to include in subject heading for the electronic mail message the marks or notices prescribed by the law; or&lt;/p&gt;
&lt;p&gt;(B) fail to provide that the matter in the message&lt;/p&gt;
&lt;p&gt;that is initially viewable to the recipient, when the message is opened by any recipient and absent any further actions by the recipient, 					includes only-&lt;/p&gt;
&lt;p&gt;(i) material which the recipient has consented to;&lt;/p&gt;
&lt;p&gt;(ii) the identifier information required to be included in pursuance Section 5(5); and&lt;/p&gt;
&lt;p&gt;(iii) Instructions on how to access, or a mechanism to access, the sexually oriented material.[22]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;True e-mail title and clear identification of advertisements with "ADV" label&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Every unsolicited CEM must contain-&lt;/p&gt;
&lt;p&gt;a) where there is a subject field, a title which is not false or misleading as to the content of the message;&lt;/p&gt;
&lt;p&gt;b) the letters "&amp;lt;ADV&amp;gt;" with a space before the title in the subject field or if there is no subject field, in the words first 					appearing in the message to clearly identify that the message is an advertisement;&lt;/p&gt;
&lt;p&gt;c) header information that is not false or misleading; and&lt;/p&gt;
&lt;p&gt;d) an accurate and functional e-mail address or telephone number by which the sender can be readily contacted.[23]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not Applicable.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Other Banned/Restricted Activities&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Illegal Access-&lt;/i&gt; &lt;i&gt;Prohibition Against Predatory and Abusive Commercial E-Mail-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"Whoever, in or affecting interstate or foreign&lt;/p&gt;
&lt;p&gt;commerce, knowingly-&lt;/p&gt;
&lt;p&gt;(1) accesses a protected computer without authorization, and intentionally initiates the transmission of multiple CEMs from or through such 					computer,&lt;/p&gt;
&lt;p&gt;(2) uses a protected computer to relay or retransmit multiple&lt;/p&gt;
&lt;p&gt;CEMs, with the intent to&lt;/p&gt;
&lt;p&gt;deceive or mislead recipients, or any Internet access service, as to the origin of such messages,&lt;/p&gt;
&lt;p&gt;(3) &lt;i&gt;materially falsifies header information&lt;/i&gt; in multiple commercial electronic mail messages and intentionally initiates&lt;/p&gt;
&lt;p&gt;the transmission of such messages,&lt;/p&gt;
&lt;p&gt;(4) registers, using information that materially &lt;i&gt;falsifies the identity of the actual registrant,&lt;/i&gt; for five or more electronic mail 					accounts or online user accounts or two or more domain names, and intentionally initiates the transmission of multiple&lt;/p&gt;
&lt;p&gt;commercial electronic mail messages from any combination of such accounts or domain names, or&lt;/p&gt;
&lt;p&gt;(5) falsely represents oneself to be the registrant or the legitimate successor in interest to the registrant of 5 or more Internet 					Protocol addresses, and intentionally initiates the transmission of multiple commercial electronic mail messages from such addresses, or 					conspires to do so, shall be punished as provided for in the Act.[24]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Supply of address harvesting software and harvested‑address lists &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"A person must not supply or offer to supply:&lt;/p&gt;
&lt;p&gt;(a) address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(b) a right to use address‑harvesting software; or&lt;/p&gt;
&lt;p&gt;(c) a harvested address list; or&lt;/p&gt;
&lt;p&gt;(d) a right to use a harvested‑address list;&lt;/p&gt;
&lt;p&gt;to another person if:&lt;/p&gt;
&lt;p&gt;(e) the supplier is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(f) the customer is:&lt;/p&gt;
&lt;p&gt;(i) an individual who is physically present in Australia at the time of the supply or offer; or&lt;/p&gt;
&lt;p&gt;(ii) a body corporate or partnership that carries on business or activities in Australia at the time of the supply or offer."&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Dictionary Attacks and Address harvesting software&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"No person shall send, cause to be sent, or authorize the sending of, an electronic message to electronic addresses generated or obtained 					through the use of-&lt;/p&gt;
&lt;p&gt;a) a dictionary attack;&lt;/p&gt;
&lt;p&gt;b) address harvesting software.[25]&lt;/p&gt;
&lt;p&gt;Where,&lt;/p&gt;
&lt;p&gt;"dictionary attack" means the method which by which the electronic address of a recipient is obtained using an automated means that 					generates possible electronic addresses by combining names, letters, numbers, punctuation marks or symbols into numerous permutations.[26] 					And,&lt;/p&gt;
&lt;p&gt;"address harvesting software" means software that is specifically designed or marketed for use for-&lt;/p&gt;
&lt;p&gt;a)searching the Internet for electronic addresses; and,&lt;/p&gt;
&lt;p&gt;b) collecting, compiling, capturing or otherwise harvesting those electronic addresses."[27]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Altering Transmission Data&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"It is prohibited, in the course of a commercial activity, to alter or cause to be altered the transmission data in an electronic message 					so that the message is delivered to a destination other than or in addition to that specified by the sender, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the alteration is made with the express consent of the sender or the person to whom the message is sent, and the person 					altering or causing to be altered the data complies with subsection 11(4) of CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the alteration is made in accordance with a court order.[28]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Installation of Computer Program&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A person must not, in the course of a commercial activity, install or cause to be installed a computer program on any other person's 					computer system or, having so installed or caused to be installed a computer program, cause an electronic message to be sent from that 					computer system, unless&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;a&lt;/i&gt;) the person has obtained the express consent of the owner or an authorized user of the&lt;/p&gt;
&lt;p&gt;computer system and complies with subsection 11(5) of the CASL; or&lt;/p&gt;
&lt;p&gt;(&lt;i&gt;b&lt;/i&gt;) the person is acting in accordance with a court order.&lt;/p&gt;
&lt;p&gt;(2) A person contravenes subsection (1) only if the computer system is located in Canada at the relevant time or if the person either is in 					Canada at the relevant time or is acting under the direction of a person who is in Canada at the time when they give the directions."[29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic mail for direct marketing purposes where the identity or address of the sender is concealed&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person shall neither transmit, nor instigate the transmission of, a communication for the purposes of direct marketing by means of 					electronic mail-&lt;/p&gt;
&lt;p&gt;(a) where the identity of the person on whose behalf the communication has been sent has been disguised or concealed; or&lt;/p&gt;
&lt;p&gt;(b)where a valid address to which the recipient of the communication may send a request that such communications cease has not been 					provided.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Types of Senders Covered&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;the term ''sender'', when used with respect to a commercial electronic mail message, means a person who initiates such a message and whose 					product, service, or Internet web site is advertised or promoted by the message."[30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person must not &lt;i&gt;send&lt;/i&gt;, or &lt;i&gt;cause to be sent&lt;/i&gt;, a commercial electronic message that:&lt;/p&gt;
&lt;p&gt;(a) has an Australian link; and&lt;/p&gt;
&lt;p&gt;(b) is not a designated commercial electronic message.[31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers,&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;beneficiaries, and&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;providers of support&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;services&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;"sender" means a person who sends a message, causes the message to be sent, or authorizes the sending of the message.[32]&lt;/p&gt;
&lt;p&gt;Further, persons aiding or abetting the offences under Section 9 or 11 are also punishable under the Act.[33]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Under Section 6, it is prohibited to &lt;i&gt;send&lt;/i&gt; or &lt;i&gt;cause or permit to be sent&lt;/i&gt; to an electronic address a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 7, It is prohibited, in the course of a commercial activity, to &lt;i&gt;alter or cause to be altered&lt;/i&gt; the transmission data 					in a CEM.&lt;/p&gt;
&lt;p&gt;Under Section 8, A person must not, in the course of a commercial activity, &lt;i&gt;install or cause to be installed&lt;/i&gt; a computer program on 					any other person's computer system or, &lt;i&gt;having so installed or caused to be installed&lt;/i&gt; a computer program, cause an electronic 					message to be sent from&lt;/p&gt;
&lt;p&gt;that computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Spammers and beneficiaries-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The texts of Sections 19, 20, 21 and 22 all prohibit the transmission as well as the instigation of the transmission of, communications for 					direct marketing purposes without the consent of the recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Who Can Sue&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;FTC[34], Attorney Generals[35], ISPs and IAPs[36] and most recently even companies/private entities[37]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Australian Communications and Media Agency (ACMA)[38]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[39]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any injured party, including individual users.[40]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Any person who suffers damage by reason of any contravention of any of the requirements of these Regulations.[41]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Transactional or Relationship Messages&lt;/i&gt; [42]&lt;/p&gt;
&lt;p&gt;where,&lt;/p&gt;
&lt;p&gt;The term ''transactional or relationship&lt;/p&gt;
&lt;p&gt;message'' means an electronic mail message the primary purpose of which is-&lt;/p&gt;
&lt;p&gt;(i) to facilitate, complete, or confirm a commercial&lt;/p&gt;
&lt;p&gt;transaction;&lt;/p&gt;
&lt;p&gt;(ii) to provide warranty information, product recall information, etc. with respect to a commercial product or service used or purchased by 					the recipient;&lt;/p&gt;
&lt;p&gt;(iii) to provide notifications-&lt;/p&gt;
&lt;p&gt;(I) concerning a change in the terms or features of;&lt;/p&gt;
&lt;p&gt;(II) of a change in the recipient's standing or status with respect to; or&lt;/p&gt;
&lt;p&gt;(III) information with respect to a subscription, membership, account, loan, or comparable ongoing commercial relationship involving the&lt;/p&gt;
&lt;p&gt;ongoing purchase or use by the recipient of products or services offered by the sender;&lt;/p&gt;
&lt;p&gt;(iv) to provide information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, participating,&lt;/p&gt;
&lt;p&gt;or enrolled; or&lt;/p&gt;
&lt;p&gt;(v) to deliver goods or services, including product updates or upgrades, that the recipient is entitled to receive under the terms of a 					transaction that the recipient has previously agreed to enter into with the sender.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Designated Commercial Electronic Message&lt;/i&gt; (DCEM). A DCEM is a message containing &lt;i&gt;purely factual information&lt;/i&gt;, any related comments of non-commercial nature and some limited 					commercial information as to the identity of the sender company/individual.[43]&lt;/p&gt;
&lt;p&gt;A message is a DCEMs if-&lt;/p&gt;
&lt;p&gt;a) the sending of the message is authorized by any of the following bodies:&lt;/p&gt;
&lt;p&gt;(i) a government body;&lt;/p&gt;
&lt;p&gt;(ii) a registered political party;&lt;/p&gt;
&lt;p&gt;(iii) a religious organization;&lt;/p&gt;
&lt;p&gt;(iv) a charity or charitable institution; and&lt;/p&gt;
&lt;p&gt;(b) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(c) the body is the supplier, or prospective supplier, of the goods or services concerned.[44]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Messages from educational institutions:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;an electronic message is a &lt;b&gt;&lt;i&gt;DCEM &lt;/i&gt;&lt;/b&gt;if:&lt;/p&gt;
&lt;p&gt;(a) the sending of the message is authorised by an educational institution; and&lt;/p&gt;
&lt;p&gt;(b) either or both of the following subparagraphs applies:&lt;/p&gt;
&lt;p&gt;(i) the relevant electronic account‑holder is, or has been, enrolled as a student in that institution;&lt;/p&gt;
&lt;p&gt;(ii) a member or former member of the household of the relevant electronic account‑holder is, or has been, enrolled as a student in 					that institution; and&lt;/p&gt;
&lt;p&gt;(c) the message relates to goods or services; and&lt;/p&gt;
&lt;p&gt;(d) the institution is the supplier, or prospective supplier, of the goods or services concerned.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Electronic Messages authorized by the Government&lt;b&gt;[45]&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on 					the occurrence of any public emergency, in the public interest or in the interests of public security or national defence.[46]&lt;/p&gt;
&lt;p&gt;A certificate signed by the Minister shall be conclusive evidence of existence of a public emergency and the other above stated 					matters.[47]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt;Family and Personal relationships, &lt;/i&gt; where &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;"Family relationship" is a relationship between two people related through marriage, a common law partnership, or any legal parent-child 					relationship who have had direct, voluntary two-way communications; and&lt;/p&gt;
&lt;p&gt;"personal relationship" means a relationship between two people who have had direct, voluntary two-way communications where it would be 					reasonable to conclude that the relationship is personal.[48]&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;i&gt; Mails sent to an individual who practices a particular commercial activity with the mail containing solely an inquiry or 							application related to that activity&lt;b&gt;[49]&lt;/b&gt;. &lt;/i&gt; &lt;/li&gt;
&lt;li&gt; &lt;i&gt;A mail which&lt;/i&gt; - provides a quote or estimate for the supply of a product, goods, a service, etc. if requested by the recipient; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;· facilitates, completes or confirms a commercial transaction that the recipient previously agreed to enter into with the sender;&lt;/p&gt;
&lt;p&gt;· provides warranty information, product recall information etc. about a product, goods or a service that the recipient uses, has used 					or has purchased;&lt;/p&gt;
&lt;p&gt;· provides notification of factual information about-&lt;/p&gt;
&lt;p&gt;(i) the ongoing use or ongoing purchase by the recipient of a product, goods or a service offered under a subscription, membership, 					account, loan or similar relationship by the sender, or&lt;/p&gt;
&lt;p&gt;· provides information directly related to an employment relationship or related benefit plan in which the recipient is currently 					involved, is currently participating or is currently enrolled;&lt;/p&gt;
&lt;p&gt;· delivers a product, goods or a service, including updates or upgrades, that the recipient is entitled to receive under the terms of 					a transaction that they have previously entered into with the sender.[50]&lt;/p&gt;
&lt;p&gt;· Telecommunications service provider merely because the service provider provides a telecommunications service that enables the 					transmission of the message.[51]&lt;/p&gt;
&lt;p&gt;· CEMs which are two-way voice communication between individuals sent by means of a facsimile or a voice recording sent to a telephone 					account.[52]&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A person may send or instigate the sending of electronic mail for the purposes of direct marketing where&lt;/i&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the contact details of the recipient of that electronic mail in the course of the sale or negotiations for the sale of a product or 					service to that recipient;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the direct marketing is in respect of that person's similar products and services only; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the recipient has been given a simple means of refusing (free of charge except for the costs of the transmission of the refusal) the 					use of his contact details for the purposes of such direct marketing, at the time that the details were initially collected, and, where he 					did not initially refuse the use of the details, at the time of each subsequent communication.[53]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil and Criminal&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Statutory damages-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Amount calculated by multiplying the number of violations by up to $250. Total amount of damages may not exceed $2,000,000. [54]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Imprisonment- &lt;/b&gt; upto 5 years.[55]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Forfeiture from the offender, of-&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;i) any property, real or personal, constituting or&lt;/p&gt;
&lt;p&gt;traceable to gross proceeds obtained from such offense;&lt;/p&gt;
&lt;p&gt;ii) any equipment, software, or other technology used or intended to be used to commit or to facilitate the commission of such offense.[56]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;body corporate with prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 500 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 250 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 10,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 5,000 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person without prior record&lt;/b&gt;,&lt;/p&gt;
&lt;p&gt;for upto 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 20 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 10 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 400 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 200 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For a &lt;b&gt;person with prior record,&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;for upto 2 contravention, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 100 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 50 penalty units in any other case.&lt;/p&gt;
&lt;p&gt;For more than 2 contraventions, civil penalty should not exceed&lt;/p&gt;
&lt;p&gt;i) 2,000 penalty units if the if the civil penalty provision is subsection 16(1), (6) or&lt;/p&gt;
&lt;p&gt;(9); or&lt;/p&gt;
&lt;p&gt;ii) 1,000 penalty units in any other case.[57]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;i) &lt;b&gt;Injunction&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Damages-&lt;/b&gt; calculated in terms of loss suffered as a direct or indirect result of the contravention of the Act.&lt;/p&gt;
&lt;p&gt;ii) &lt;b&gt;Statutory Damages&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;not exceeding $25 for each CEM; and not exceeding in the aggregate $1 million, unless the plaintiff proves that his actual loss from such 					CEMs exceeds $1 million.[58]&lt;/p&gt;
&lt;p&gt;iii)Costs of litigation to the plaintiff.[59]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil only&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Administrative Monetary Penalty&lt;/b&gt; , the purpose of which is to promote compliance with the Act and not to punish.[60]&lt;/p&gt;
&lt;p&gt;The maximum penalty for a violation is $1,000,000 in the case of an individual, and $10,000,000 in the case of any other person.[61]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Civil on private action; Criminal for non-compliance with IC's notice&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;A person who suffers damage by reason of any contravention of any of the requirements of these Regulations by any other person shall be 					entitled to bring proceedings &lt;i&gt;for compensation&lt;/i&gt; from that other person for that damage.[62]&lt;/p&gt;
&lt;p&gt;The enforcement authority for these regulations is Britain's Information Commissioner who oversees both the Act and the Regulations, and 					investigates complaints and makes findings in the form of various types of notices.[63]&lt;/p&gt;
&lt;p&gt;Failure to comply with any notice issued by the Information Commissioner is a criminal offence and is punishable with a fine of upto 					£5000 in England and Wales and £10,000 Scotland.[64]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;THE PROBLEM OF SPAM -WHY IT PERSISTS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per a study conducted by &lt;i&gt;Kaspersky Lab &lt;/i&gt;in 2014, 66.34% of all messages exchanged over the internet were spam.[65] Over the 2000s, several 	countries recognized the threats posed by spam and enacted specific legislations to tackle the same. The ones taken into consideration in this paper are 	the CAN-SPAM Act, 2003 of the United States, Canada's Anti-Spam Legislation, 2014, The Spam Act, 2003 of Australia, Singapore's Spam Control Act, 2007 and 	The Privacy and Electronic Communications (EC Directive) Regulations, 2003 (United Kingdom). As will be analyzed in the course of this paper, none of these 	laws have evolved to become comprehensive mechanisms for combating spam yet. Nevertheless, post the enactment of these laws, spam has reduced as a 	percentage of the net email traffic; however, the absolute quantity of spam has increased owing to the exponential growth of email traffic universally.[66]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who Benefits from Spam?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;Commercial establishments -&lt;/i&gt; Spamming is one of the most cost-effective means of promoting products and services to a large number of potential 	customers. Spams are not necessarily duplicitous and often contain legitimate information to which a fraction of the recipients respond positively. As per 	a recent study, for spam to be profitable, only 1 in 25,000 spam recipients needs to open the email, get enticed, and make a gray-market purchase.[67]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Non-commercial establishments benefitting from advertisements -&lt;/i&gt; Many seemingly non-profit messages benefit from revenue generated through 	advertisements when recipients visit their site. Advertisers pay these sites either per click or per impression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Spammers &lt;/i&gt;- The costs incurred by spammers largely include the cost of e-mail/phone number harvesting and the cost of paying botnet operators. 	As compared to the revenue generated as a percentage of profits earned by the merchant on whose behalf spam messages are sent, these costs are 	negligible.[68]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, spamming proves to be an activity that involves minimal investment and often yields some response from prospective clients.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The impact of spam is clearly widespread. Presently, India lacks a specific anti-spam legislation. In consideration of the swelling growth of spam across 	the globe and the increasing number of Indian users, it is of utmost urgency that a specific legislation is formulated to tackle the issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;OBSERVATIONS AND ANALYSIS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1.&lt;/b&gt; &lt;b&gt;Definition of Spam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;'Spam' must be defined in a technologically neutral manner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legislations analyzed in this paper deal with either one or a cluster of modes of communication through which spam may be sent. However, it is 	essential that 'spam' is defined in a manner that is technologically neutral. Most commercial spam is aimed at promoting products and services to a large 	number of prospective customers. Thus, making only spam e-mails illegal, like the CAN-SPAM Act does, fails to address the issue wholly as companies would 	always retain the option of sending unsolicited messages through other communicative devices. It becomes an issue of merely switching modes of 	communication without there being any actual deterrence to spamming. Thus, a narrow understanding of spam, limiting it to one or few modes of 	communication, is problematic and for a model law, a broader definition that discourages unsolicited messages sent via any network is warranted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Non-commercial spam must also be addressed&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The five legislations examined in this paper address only the issue of unsolicited 'commercial' mails/messages. For instance, under the CAN-SPAM, a commercial mail means "	&lt;i&gt;any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service&lt;/i&gt;". 	Singapore's Spam Control Act defines a commercial message in a similar fashion but more elaborately. CASL, while limiting the scope of the law to 	commercial mail, additionally prescribes that such communication need not have a profit motive. Australia's Spam Act defines a commercial message as a 	message that has the purpose of offering, advertising or promoting goods or services or the supplier or prospective supplier of goods or services. Under 	the EC Directive, the term used is 'marketing communication'; however, in essence, it includes only commercial communications.[69] These definitions suffer 	from an obvious exclusion error. It is known from experience that not all unsolicited messages received are in pursuance of commercial interests. Often, 	unsolicited mails and messages are received with explicit sexual content as well as promoting political and religious agendas sent by party volunteers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it would be in higher consonance with the greater aim of curbing spam to broaden the scope of these legislations to address both commercial as well 	as non-commercial messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Bulk requirement and its quantification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Singaporean law makes 'sent in bulk' a mandatory requirement for spam. However, deciding what quantity of a particular message qualifies it as bulk is 	difficult. If an objective threshold is set, say 100 messages in 24 hours, then anything short of that, say even 99 messages, go unaddressed simply because 	it does not meet the statutory requirement of being in bulk. This enables spammers to misuse the law by marginally falling short of the threshold and still 	continuing to spam. The issue here is comparable to the one faced in setting age as bar to criminal culpability. No matter what, any number arrived at is 	likely to be arbitrary and consequently subject of criticism. A possible way to tackle this would be to strengthen the unsubscribe mechanisms by virtue of 	which individuals are able to, at the very least, stop receiving unsolicited mails. For the determination of threshold for State action and its 	feasibility, a much more detailed study is merited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2.&lt;/b&gt; &lt;b&gt;Consent Requirement&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt- out Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Double Opt-in Model&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Countries following the model&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;United States of America and Singapore&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Canada, Australia and the United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;None at present.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;When messages may be sent&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;At all times until recipient voluntarily opts out/unsubscribes.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient voluntarily opts-in/subscribes to receive messages by submitting his/her contact details to be part of a 					particular mailing list.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Only after the recipient responds in the affirmative to the confirmation mail sent by the sender on receiving an opt-in request from the 					recipient.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Specific requirements&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. The mail/message must bear a clear identifier of its content. E.g. marked as 'ADVT' for advertisements;&lt;/p&gt;
&lt;p&gt;2. An 'unsubscribe' option must be provided in the message which may be utilized by the recipient to express his/her disinterest in the 					message; and&lt;/p&gt;
&lt;p&gt;3. The message must conspicuously bear a valid physical postal address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Advantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Promotes commercial speech rights-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Since the default position presumes the right to market, average collection rates are considerably higher as more emails can be sent to 					more people.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Reduction in unsolicited messages-&lt;/i&gt; Commercial messages are not sent until the recipient voluntarily consents to receiving such 					messages by submitting his/her contact information.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;Availability of unsubscribe option-&lt;/i&gt; Even after a recipient voluntarily opts in, he/she still has the right to withdraw from 					such messages by unsubscribing.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Ensures people are entering their information correctly, which equals a cleaner list and lowers bounce rates.&lt;/p&gt;
&lt;p&gt;2. Reduces the probability of spam complaints because subscribers have had to take the extra step to confirm their consent.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disadvantages&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. This merely places the &lt;i&gt;burden of reduction of spam on the recipients&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;2. The &lt;i&gt;functionality of the 'unsubscribe' link is itself questionable.&lt;/i&gt; Very often these links themselves are fraudulent. In such a 					case, the recipient is further harmed before any opting-out can even take place.&lt;/p&gt;
&lt;p&gt;3. In the absence of any strict regulatory oversight, there exists &lt;i&gt;no&lt;/i&gt; &lt;i&gt;incentive&lt;/i&gt; for the senders to strictly address 					unsubscribe requests.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. &lt;i&gt;Consent may be obtained in fact but not in spirit&lt;/i&gt; through inconspicuous pre-ticked check boxes.&lt;/p&gt;
&lt;p&gt;2. &lt;i&gt;E-mail addresses may be added to a list by spambots&lt;/i&gt;. Where, the person 'opted-in' may not actually be the person opting in.&lt;/p&gt;
&lt;p&gt;3. &lt;i&gt;Errors may be made when entering emails&lt;/i&gt;; a typo may result in someone submitting an address that is not theirs.&lt;/p&gt;
&lt;p&gt;4. Legitimate addresses may be added by someone who does not own the address.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1. Genuine subscribers may not understand clearly the confirmation process and fail to click the verification link.&lt;/p&gt;
&lt;p&gt;2. Confirmation emails may get stuck in spam filters.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The comparison above highlights that the opt-out model as well as the opt-in model may leave loopholes. The opt-in model has been advocated for as the 	better model as compared to the opt-out model as it prohibits the sending of messages unless the recipient consents to receiving such messages. However, as 	pointed out above, in this model consent may be given by entities other than the owner of the contact details. In such a situation, a double opt-in model 	may be a viable option to contemplate as it is the only model where it can be ensured that only the addressee is enabled to successfully opt-in.[70]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently, the double opt-in model has not been adopted by any of the countries discussed in this paper. Nonetheless, it seems to have the potential to aid 	the fight against spam more effectively than the existing models. Its real efficacy however, shall be proven only on practical implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.&lt;/b&gt; &lt;b&gt;Exceptions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.&lt;/b&gt; &lt;b&gt;Family and Personal Relationships&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the CASL, an exception is made for &lt;i&gt;'personal&lt;/i&gt; &lt;i&gt;relationships'&lt;/i&gt; and &lt;i&gt;'family relationship'&lt;/i&gt;. However, these terms are defined 	quite narrowly. For instance, family relationship is defined as 'a relationship between two people related through marriage, a common law partnership, or 	any legal parent-child relationship and those individuals have had direct, voluntary, two-way communication'.&lt;sup&gt;[71]&lt;/sup&gt; This implies that in a 	situation where an individual wants to send a message offering to sell something to an individual in his extended family, say his cousins, doing so without 	obtaining their consent first, would qualify his mail as spam under the CASL. This would become especially problematic in the Indian context where 	comparatively larger family structures prevail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the anti-spam legislations of the other four countries, no such exceptions are made. Quite obviously, these exceptions are of crucial significance and 	must be provided in any anti-spam legislation; however, it is important that they are defined in a manner such that their actual purpose i.e. of exclusion 	of familial and personal relationships from regulations applicable to spammers, is effectively achieved and the law does not become a creator for 	unnecessary litigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.&lt;/b&gt; &lt;b&gt;Transactional Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term 'transactional messages' is used only under the CAN-SPAM Act of the USA. It basically covers messages sent when the recipient stands in an 	existing transactional relationship with the sender and the mail contains information specific to the recipient. It also includes employment relationships. 	In CASL, a similar exception is made under Section 6(6). The section is worded almost identically as the CAN-SPAM provision, though the term 'transactional 	messages' is not used. In the UK laws, messages for the purpose of direct marketing may be sent where the contact information of the recipient is received 	in the course of the sale or negotiations for the sale of a product or service to that recipient, thus implying an existing transactional relationship. One 	added proviso under the UK law is that the recipient must be clearly and distinctively given the opportunity to object, free of charge and in an easy 	manner, to the use of the e-mail address when collected and on the occasion of each message in case the customer has not initially refused such use.[72]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception for transactional messages is essential to ensure freedom of commercial speech rights even while effectively tackling spam. In the formulation 	of a model law, a combination of the American and the English laws may be workable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c.&lt;/b&gt; &lt;b&gt;Governmental Messages&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Spam Act, 2003 of Australia makes an exemption for &lt;i&gt;'designated commercial electronic message (DCEM)'&lt;/i&gt;. This exemption is to avoid any 	unintended restriction on communication between the government and the community.&lt;sup&gt;[73]&lt;/sup&gt; In order to be a DCEM, a message must-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Be authorized by the government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Contain purely factual information and any related comments of non-commercial nature; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Contain some information as to the identity of the sender company/individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DCEMs need not always be sent by government bodies and may also be sent by third parties authorized by the government.&lt;sup&gt;[74]&lt;/sup&gt; Such messages are 	exempt from the consent requirement as well as the unsubscribe option requirement but must comply with the identifier requirement. However, where 	government bodies are operating in a competitive environment, the provisions of the act would apply normally to them.&lt;sup&gt;[75]&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Singapore's Spam Control Act does not apply to any electronic message where the sending of the message is authorized by the Government or a statutory body on the occurrence of any &lt;i&gt;public emergency&lt;/i&gt;, in &lt;i&gt;public interest&lt;/i&gt; or in the &lt;i&gt;interests of public security&lt;/i&gt; or	&lt;i&gt;national defence&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These exemptions are essential in order to enable free communication of important information between the government and the citizens. The Singaporean 	wording of the exception is rather broad and would give the government immense space for misusing the law. Such a wording might be more effective if 	supplemented with the Australian proviso wherein governmental communications operating in a competitive environment are excluded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.&lt;/b&gt; &lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Penalties must be higher than benefit from spamming&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the penalty prescribed itself is too low, such that loss suffered from paying penalties is lower than net benefit from spamming, the spammer is not 	sufficiently deterred. Four out of the five countries analyzed in this paper prescribe only civil penalties in the form of fines for spamming. Recently, a 	Facebook spammer was found to have made a profit of $200 million in a year.[76] For instance, as noted above, the Australian law sets a limit for penalty 	at $1 million. Thus, such a penalty would constitute a small fraction of the profit from spamming and would not deter a spammer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. High penalty does not imply effective deterrence where probability of prosecution is low.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CAN-SPAM Act prescribes the harshest penalties including both civil as well as criminal penalties. However, it has been rather ineffective in reducing spam. This is for the reason that this Act is more about how to spam legally than anything else. It is more like- '	&lt;i&gt;you can spam but do not use false headers&lt;/i&gt;.'[77] As a consequence, unintentional spam from ignorant commercial establishments has reduced. However, 	due to easy compliance standards, the 'real' spammers still go undetected to a large extent.[78] Thus, even moderate penalties may serve as good deterrents 	where the probability of prosecution is high.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. Effective enforcement is the key to effective deterrence.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cornerstone of an effective spam law is effective enforcement. Penalties must be enforced in a manner that the cost of punishment is always higher than 	the benefit from spamming and the probability of conviction is high. In order to implement legislative measures effectively, governments should also 	undertake an information campaign on spam issues targeting users, business communities, private sector groups and other stakeholders as the one primary 	reason for sustenance of spam is the response received from certain recipients. Such supplementary activities would also facilitate the preservation of 	commercial rights as excessive penalties could inhibit regular commercial activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The observations made in this paper are crucial to the formulation of a model anti-spam law for India. The most important part of any ant-spam legislation 	would be the definition of 'spam' which, as established above, must be technologically neutral in order to be able to address as much unsolicited 	communication as possible. On the question of consent, a double opt-in is what this paper would propose. This model has been contemplated and recommended 	by academic and policy researchers as a possibly more effective consent model for spam laws; however, it has not been codified as a legal regime till date. 	It could be a rather groundbreaking approach that India could adopt as this clearly is the only model where 'opting-in' is realized in fact and in spirit. 	Further, exceptions are necessary in order to prevent the abuse of laws making certain such exceptions do not suffer from inclusive or exclusion errors. A 	combination of the exceptions under the Australian and the American laws seems ideal at this stage of research. In terms of penalty, this paper observed 	that only prescribing harsh penalties is not sufficient to effectively deter spammers but efficient modes of enforcement have to be formulated to ensure 	actual deterrence. Lastly, while a well-drafted national anti-spam legislation is clearly the need of the hour for India; additional steps have to be taken 	towards sensitizing citizens to the fact that the problem of spam is real and a costly threat to the communications infrastructure of the country and 	combat has to begin at the individual level.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[1] CAN-SPAM Act, § 7706(f) (7).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[2] Spam Act, 2003, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[3] Spam Control Act, 2007, § 7(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[4] Canada's Anti-Spam Legislation, 2014, § 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[5] Canada's Anti-Spam Legislation, 2014, § 12.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[6] 15 U.S.C. § 7701 (2003).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[7] CAN-SPAM Act, Section 3 (2)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[8] Spam Act, 2003, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[9] Spam Control Act, 2007, § 5(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[10] Canada's Anti-Spam Legislation, 2014, § 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[11] Canada's Anti-Spam Legislation, 2014, § 1(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[12] Regulation 19, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[13] Regulation 20, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[14] Regulation 21, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[15] Regulation 22, EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[16] Section 11, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[17] CAN-SPAM Act, Section 5(5)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[18] Spam Act, 2003, § 16(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[19] Spam Act, 2003, Schedule 2 (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[20] Spam Control Act, 2007 Section 11, Schedule 2(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[21] Canada's Anti-Spam Legislation, 2014, Section 6&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[22] CAN-SPAM Act, 2003, Section 5(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[23] Spam Control Act, 2007, Schedule 2, 3(1), Section 11&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[24] Chapter 47 of title 18, U.S.C., § 1037, inserted through an amendment by the CAN-SPAM Act, § 4(a) (1); '§ 5(A)(1).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[25] Spam Control Act, 2007, '§ 9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[26] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[27] Spam Control Act, 2007, '§ 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[28] Canada's Anti-Spam Legislation, 2014, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[29] Canada's Anti-Spam Legislation, 2014, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[30] CAN-SPAM Act, 2003, § 3(16)(A)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[31] Spam Act, 2003, Section 16(1), Section 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[32] Spam Control Act, 2007, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[33] Spam Control Act, 2007, § 12&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[34] CAN-SPAM Act, 2003, § 7(a)(c)(d)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[35] CAN-SPAM Act, 2003, § 7(f)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[36] CAN-SPAM Act, 2003, § 7(g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[37] &lt;i&gt;MySpace, Inc. v. The Globe.com, Inc.&lt;/i&gt;, 2007 WL 1686966 (C.D. Cal., Feb. 27, 2007)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[38] Spam Act, 2003, § 26(1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[39] Spam Control Act, 2007, § 13&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[40] Canada's Anti-Spam Legislation, § 47&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[41] Regulation 30(1), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[42] CAN-SPAM Act, 2003, § 3(2)(B)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[43] Spam Act, 2003, Schedule 1, § 2&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[44] Spam Act, 2003, Schedule 1, § 3&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[45] Spam Control Act, 2007, § 7(3)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[46] Spam Control Act, 2007, First Schedule Clause (1)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[47] Spam Control Act, 2007, First Schedule Clause (2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[48] Canada's Anti-Spam Legislation, § 6(5a)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[49] Canada's Anti-Spam Legislation, § 6(5b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[50] Canada's Anti-Spam Legislation, § 6(6)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[51] Canada's Anti-Spam Legislation, § 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[52] Canada's Anti-Spam Legislation, § 8&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[53]Section 22(3), EC Directives, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[54] CAN-SPAM Act, § 7 (f)(3)(A).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[55] CAN-SPAM Act, § 4 (b)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[56] CAN-SPAM Act, § 4 (c)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[57] Spam Act, 2003, Sections 24, 25&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[58] Spam Control Act, 2007, § 14&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[59] Spam Control Act, 2007, § 15&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[60] Canada's Anti-Spam Legislation, 2014, § 20(2)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[61] Canada's Anti-Spam Legislation, 2014, § 20(4)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[62] Regulation 30(1), EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[63] Regulations 31-32, EC Directive, 2003&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[64] Section 47 and 60, Data Protection Act, 1998&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[65] Spam and Phishing Statistics Report Q1-2014, Kaspersky Lab&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q1-2014#.VVQxNndqN5I (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[66] Snow and Jayakar, Krishna, &lt;i&gt;Can We Can Spam? A Comparison of National Spam Regulations,&lt;/i&gt; August 15, 2013. TPRC 41: The 41st Research Conference 	on Communication, Information and Internet Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[67] Justin Rao and David Reiley, &lt;i&gt;The Economics of Spam, &lt;/i&gt;Vol.&lt;i&gt; &lt;/i&gt;26, No. 3 The Journal of Economic Perspectives (2012), p. 104.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[68] Supra n. 66; p. 7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[69] Refer Table in Section 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[70] Dr. Ralph F. Wilson, &lt;i&gt;Spam, Spam Bots, and Double Opt-in E-mail Lists, &lt;/i&gt;April 21, 2010; available at 	http://webmarketingtoday.com/articles/wilson-double-optin/ (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[71] Section 2(a), Electronic Commerce Protection Regulations, http://fightspam.gc.ca/eic/site/030.nsf/eng/00273.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 	2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[72] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[73] &lt;i&gt;Spam Act 2003- A Practical Guide for Government, &lt;/i&gt;Australian Communications Authority, available at- 	http://www.acma.gov.au/webwr/consumer_info/spam/spam_act_pracguide_govt.pdf (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[74] &lt;i&gt;Ibid&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[75] &lt;i&gt;Id&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[76] Charles Arthur, &lt;i&gt;Facebook spammers make $200m just posting links, researchers say, &lt;/i&gt;The Guardian, 28&lt;sup&gt;th&lt;/sup&gt; August 2013, 	http://www.theguardian.com/technology/2013/aug/28/facebook-spam-202-million-italian-research (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[77] Evangelos Moustakas, C. Ranganathan and Penny Duquenoy,	&lt;i&gt;Combating Spam Through Legislation: A Comparative Analysis Of US And European Approaches, &lt;/i&gt;available at http://ceas.cc/2005/papers/146.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[78] Carolyn Duffy Marsan, &lt;i&gt;CAN-SPAM: What went wrong?, &lt;/i&gt;6&lt;sup&gt;th&lt;/sup&gt; October 2008, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://www.networkworld.com/article/2276180/security/can-spam--what-went-wrong-.html (last accessed 29&lt;sup&gt;th&lt;/sup&gt; May, 2015)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions'&gt;https://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rakshanda Deka</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-02T16:21:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anti-social-network">
    <title>Anti-Social Network</title>
    <link>https://cis-india.org/news/anti-social-network</link>
    <description>
        &lt;b&gt;Social media is driving teens to a reality they can't handle. This article by Max Martin was published in Mail Today on February 27, 2011. &lt;/b&gt;
        
&lt;p&gt;THIS is the generation of instant messaging and two-minute noodles. Impatient teenagers are always plugged in to their computers and cell phones. Their reality is virtual and most of their friends can be found online. "It's the coolest way to keep in touch," says Charlotte William, a college student in Bangalore whose Facebook was got flooded with birthday greetings on Saturday. Her FB page is an almost-instantly updated open book of her life.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Such minute-by-minute minute updates are an integral part of any teenager's life but the older generation is cautious. Not just old-fashioned people but even the tech-savvy are raising several issues with this uncontrolled explosion of social networking. India is the seventh largest social networking market in the world, with millions of users and many issues like privacy, etiquette, commercial, and political interests. Even though people have control over the information they post online, unauthorised access&amp;nbsp;--&amp;nbsp;usage and republication -- is a major cause of concern, says Nikhil Pahwa, who publishes MediaNama, a mobile business news site based in Delhi. "You put up information about friends and family without realising the enormous consequences of it being in the public domain," says Pahwa.&lt;/p&gt;
&lt;p&gt;"I see a lot of people exchanging personal messages and phone numbers on their walls. A lot of people are rather nonchalant about it," says Christian Wolff, a German development researcher, living in Hyderabad, who finds it amazing how Indians are not as concerned about their privacy as they should be. Bangalore-based lawyer Sarim Naved says the internet gives people a misplaced sense of anonymity, which makes them shed their inhibitions -- and etiquette. Should you allow a friend to post pictures of you from that crazy party last night? What if a family member sees them? We still live by traditional values and customs and footloose pictures may not be appreciated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;And while you may think that your privacy settings are in place to never allow such an unfortunate incident take place, privacy settings give a false sense of security. "Many people cannot figure out how to put filters on," says Yamini Atmavilas, a teacher of gender studies in Hyderabad. She also says that social networking is a mixed bag: "Studies show that women use social networks differently from men. They have helped build women's social capital, providing an outlet for connection and expression."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AARTI Mundkur, who was involved in the national 'Pink Chaddi' campaign against the pub-attacking Sri Ram Sene, agrees. "Social networks capture only the imagination of the upper middle class -- and fail to evoke any other kind of response," says this activist lawyer. While the social media is powerful -- and can be used for many purposes -- it is limited in scope.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, these sites are turning into what Wolff calls 'all-devouring marketing machines'. Facebook, for instance, is always in the midst of some controversy over its automatic personalisation or using technology to accommodate differences between individuals, so that disbursing personalised advertisements gets easier. Most of us do not realise that every little bit of information we post online is under the scrutiny of corporate entities that analyse and track browsing, spending, networking, and even music preferences.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"They make money with the data you post online for free," says Anivar Aravind, an IT consultant and commentator who started the online campaign for justice for Binayak Sen. "Even worse is when these service providers pass on this personal information to the government as Yahoo did in China leading to the imprisonment of a journalist," says Aravind.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also getting increasingly active in the online circuit are crooks, says Shantanu Ghosh, who handles the India product operations of Symantec, a leading network and computer security firm. These crooks, he says, launch virus attacks, put up false events to attract people, and spoof networking sites to extract personal data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This attack was observed before the Cricket World Cup 2011. Attackers had created a page offering ticket deals for the World Cup final in Mumbai, requiring users to log into their social networking accounts. Those who fell for this trick would have ended up revealing their confidential login information to these attackers." Ghosh advises: "You should treat anything you see online with skepticism -- especially if it involves clicking a link or installing an application." Also make sure you check and understand privacy policies and settings.&lt;/p&gt;
&lt;p&gt;This is even more important because existing laws on cyber crime are not strong enough. Also, the question whether new laws will be effective remains.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"It really depends on the law. If it goes into too much detail then it will be rendered irrelevant because of advancements in technology," says Sunil Abraham, who heads Centre for Internet and Society, a Bangalore-based research group. "A good law usually focuses on principles. What we need in India is a privacy regulator that can dynamically interpret the principles in law to quickly react to developments on the internet."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;&lt;li&gt;Read the article in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=2722011"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Also see the article in the Free Library &lt;a class="external-link" href="http://www.thefreelibrary.com/ANTI-+SOCIAL+NETWORK+(+Social+media+is+driving+teens+to+a+reality...-a0250124694"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the news from Mail Today &lt;a href="https://cis-india.org/advocacy/anti-social-network.pdf" class="internal-link" title="Anti-Social Network (PDF)"&gt;here&lt;/a&gt; (pdf, 2.92 MB)&lt;/li&gt;&lt;/ul&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anti-social-network'&gt;https://cis-india.org/news/anti-social-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:59:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3">
    <title>Another 5 Years: What Have We Learned about the Wikipedia Gender Gap and What Has Been Done? (Part 3.)</title>
    <link>https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3</link>
    <description>
        &lt;b&gt;Five years after Wikimedia Foundation’s 2011 editor survey was conducted and revealed the gender gap issue, scholars, practitioners, and communities around the globe have come a long way to address the gender imbalance of the online encyclopedia. This blog post series (of three parts) serve as a summary of movements and discoveries in Wikipedia gender gap narrowing on both local (India) and global scales.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;This is the third
(last) part of the blog series, please see &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-1"&gt;Part 1 &lt;/a&gt;and &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-2"&gt;Part 2&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Responding to the
Wikipedia gender gap problem, former WMF Executive Director Sue Gardner set a
target in 2011 to raise the female editor percentage &lt;a href="http://www.nytimes.com/2011/01/31/business/media/31link.html"&gt;to 25%&lt;/a&gt; by 2015. In an &lt;a href="http://www.bbc.com/news/business-28701772"&gt;interview&lt;/a&gt; in August 2014, Jimmy Wales declared that “&lt;em&gt;we’ve completely failed,&lt;/em&gt;” Gardner also
noted that the solutions should come from local Wikipedian communities rather
than from the Foundation on a macro scale.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the
target was not met, initiatives and reforms taken places globally and locally in
the past five years are not fruitless. And as mentioned in Part 2, we should
not define this movement as merely pursuing a goal towards certain percentage
or number. As for now dialogue has been created to include the issue into more strategic
plans; collectives are established to cumulate and share resources across
communities. There has been abundance of learning (and definitely much more to
learn) in the issue.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;What has been done?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Be it ongoing or spontaneous, international or local, there have been
many interventions trying to address the gender gap in Wikipedia.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Intervention events&lt;em&gt;&lt;/em&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In July 2015, WikiProject
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red"&gt;Women in Red&lt;/a&gt;&lt;span class="MsoHyperlink"&gt; (WiR)&lt;/span&gt; was launched to &lt;em&gt;“turn "&lt;a title="Wikipedia:WikiProject Women in Red/Redlist index" href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red/Redlist_indexhttps:/en.wikipedia.org/wiki/Wikipedia:WikiProject_Women_in_Red/Redlist_index"&gt;redlinks&lt;/a&gt;
(non-existing pages) into&amp;nbsp;&lt;a title="Wikilink" href="https://en.wikipedia.org/wiki/Wikilink"&gt;blue ones&lt;/a&gt; (existing pages).” &lt;/em&gt;&amp;nbsp;The project encourages editors worldwide to
create (or expand) female-related pages (biographies, women’s work,
contribution, issues, etc.) that fit the notability criteria of Wikipedia. WiR
also picks monthly and annual topics to feature. Currently in September, 2016,
edit-a-thons on Women in nursing and women labour activists are happening
online. And “Women scientists” edit-a-thon is a year-long featured topic for
2016. Although WiR is still primarily an English-WP project, some communities
have expanded and localized it to local initiatives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Coincidentally, in
2013, Indian Wikipedian communities have carried out one of the biggest and
most well-known gender gap intervention – &lt;a href="https://meta.wikimedia.org/wiki/Lilavati%27s_Daughters_Edit-a-thon"&gt;Lilavatis’
Daughters&lt;/a&gt;. “Lilavati’s Daughters” is &lt;a href="http://www.thehindu.com/todays-paper/tp-features/tp-literaryreview/forgotten-daughters/article662225.ece"&gt;a
book&lt;/a&gt; of essay collections featuring nearly one hundred women scientists in Indian
since the Victorian Era. The 2013 edit-a-thon was hence to create Wikipedia
pages for these biographies in different Indian languages. Collaborating with
institutions and colleges, the event was greeted with high popularity and
success. Similar events were also carried out afterwards, including &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Indian_Women_in_Science_Edit-a-thon"&gt;Indian
Women in Science Edit-a-thon&lt;/a&gt; which has been held annually since 2014; the
last event was held in July, 2016 at the Indian Institute of Science,
Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another
significant initiative across the globe and in Indian communities is the annual
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiWomen%27s_History_Month"&gt;Wikiwomen’s history
month&lt;/a&gt; in March along with the celebration of International Women’s Day on March
8&lt;sup&gt;th&lt;/sup&gt;. The initiative started in 2012, edit-a-thons, photo-thons
(updating photos onto Wikimedia Commons), and meetups have been held to raise
the awareness of the gender gap online, create female-related content available
on Wikipedia, and to strengthen the bonding between local Wikiwomen.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Recently,
Wikimedia Foundation collaborated with the United Nations to launch the one-day
&lt;a href="https://meta.wikimedia.org/wiki/UN_Women_Her_Story"&gt;Her Story project&lt;/a&gt;&lt;span class="MsoHyperlink"&gt; Edit-a-thon&lt;/span&gt; on August 12&lt;sup&gt;th&lt;/sup&gt;, 2016 to celebrate International Youth Day
globally. Cities in India like &lt;a href="https://www.empowerwomen.org/en/campaigns/herstory"&gt;Chennai and Delhi
also held local edit-a-thons&lt;/a&gt; on the day of in response to the event. With
the opportunity to work alongside the UN, it is a good sign that the Wikipedia
gender gap issue is drawing global attention, not just in the Wikipedian
community level, but also in global institution level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Collaborative&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://meta.wikimedia.org/wiki/WikiWomen%27s_Collaborative"&gt;Wikiwomen’s
Collaborative&lt;/a&gt; is a global platform for female Wikipedians to share
projects, insights, and support. The Collaborative also encourages participants
to write blog post on the &lt;a href="https://blog.wikimedia.org/c/community/wikiwomen/"&gt;Wikiwomen’s Blog&lt;/a&gt;
to spread more words about the gender gap issue and initiatives. A &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:WikiProject_Countering_systemic_bias/Gender_gap_task_force"&gt;Gender
Gap Task Force (GGTF)&lt;/a&gt; was founded in 2013 aiming to challenge the
patriarchal culture of knowledge and Wikipedia. GGTF tries to fix the
encyclopedia’s imbalance power structure by initiating discussion and
examination on its policies and editor interaction. It has also been a place to
cumulate research studies and resources on the gender gap topic.&amp;nbsp; A (global) &lt;a href="https://lists.wikimedia.org/mailman/listinfo/gendergap"&gt;gender gap
mailing list&lt;/a&gt; is also created to spread the news and words with more
communities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;u&gt;Improvement in the
Interface&lt;/u&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Aside from events and
collectives organized by respective communities, the Wikipedia platform itself
has also been under constant transition in the last few years, trying to create
a friendlier place for women and newcomers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Since June 2012,
the new prototype &lt;a href="https://www.mediawiki.org/wiki/VisualEditor"&gt;Visual
Editor&lt;/a&gt; has become available in more and more language versions of Wikimedia
projects – including most Indian languages. Visual Editor enables editor to
contribute without learning the &lt;a href="https://en.wikipedia.org/wiki/Wiki_markup"&gt;Wiki markups&lt;/a&gt;, as it
creates the “write-as-how-you-will-see-it” feature requiring only basic typing
skills. Nevertheless, Visual Editor does have several &lt;a href="https://en.wikipedia.org/wiki/Wikipedia:VisualEditor#Limitations"&gt;limitations&lt;/a&gt;
comparing to the traditional edit source option, including slower speed, unavailable
in talk and discussion namespaces, limited template editing options, and so on.
While a &lt;a href="https://meta.wikimedia.org/wiki/Research:VisualEditor%27s_effect_on_newly_registered_editors/June_2013_study"&gt;research&lt;/a&gt;
in 2013 on Visual Editor’s use in English Wikipedia showed low effectiveness of
the new feature in attracting and encouraging new editors, more research should
also be done in the non-English (especially Global South) context. &lt;a href="https://commons.wikimedia.org/wiki/Category:Marathi_Wikipedia_Tutorials"&gt;Online
tutorial resources&lt;/a&gt; about editing are also becoming available in Indian
communities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/wikimarkup.png/image_large" alt="Traditional wiki markup editing screenshot" class="image-inline" title="Traditional wiki markup editing screenshot" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Traditional Wiki
markup editing screenshot&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/a2k/blogs/visualeditor.png/image_large" alt="visual editor of wikipedia screenshot" class="image-inline" title="visual editor of wikipedia screenshot" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Visual Editor
screenshot&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;On the other hand,
&lt;a href="https://en.wikipedia.org/wiki/Wikipedia:Editing_on_mobile_devices"&gt;mobile
apps of Wikipedia&lt;/a&gt; has been improved in its editing function. Although the
apps are still in constant development to make the function smoother and easier
for mobile users, it is a great breakthrough for those who do not have personal
computers to contribute in small ways (or even in great ways – &lt;a href="https://en.wikipedia.org/wiki/User:Cullen328/Smartphone_editing#Why_I_edit_by_smartphone"&gt;some&lt;/a&gt;
have created pages and denied the statement that mobile editing is
impractical).&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;What’s more to be learned?&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is no
denying that our Indian language communities have been putting efforts to
highlight and address the gender gap issue on Wikipedia. The &lt;a href="https://meta.wikimedia.org/wiki/WikiConference_India_2016"&gt;Wikiconference
India 2016&lt;/a&gt; in August also had a panel responding to this topic where
panelists from both outreach and research threads proposed localized
perspective and strategies to fix the problem.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, there are
still much more to be learned. First of all, we need a more organized feedback
loop (a cycle of planning-executing-evaluating-sharing learning) for local
interventions to learn from our success and mistakes. Secondly, the issue has
to become more “public” in a sense that we are not just promoting within our
own circles. Awareness-building through media coverage and institutional
collaboration can bring in greater public opinions and volunteers to help the
online encyclopedia become a more inclusive place. The third point is a change
of mindset: women's feeling and experience should be put forward into the
central of our initiatives and interventions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;“We made it clear
that we were focusing on the (female) participants and their experience, the
content they created online are of course important too, but that’s just the
by-product.&lt;/em&gt;” -&lt;span style="text-align: right;"&gt;Wikiconference Indian 2016 Gender Gap panel presenter&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;In other words, as
we are engaging more and more women, the focus should not be numbers but the
humans. At the same time, we should always encourage women to stand out and
speak out. As mentioned in the previous part, gender discrimination cases have
not yet been reported in our communities, but we also have to ensure if it does
happen both the female editors and the community should have a certain level of
awareness (what constitutes harassment/discrimination/sexism; when and how to
call out) and a report and support mechanism to the problem.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The road to a real
equalized knowledge system is not easy. As many have noticed and pointed out
“This is not just a Wikipedia problem!” Indeed, similar gender imbalance exists
in our academies, IT industries, free and open-source software (FOSS) workplace,
to name a few. Nonetheless, with the flexibility and the strong bond that Indian
Wikipedian communities possess, we can be one of the pioneers in positive
changes. After all, the knowledge created and action taken today will shape
what our tomorrow can be like.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3'&gt;https://cis-india.org/a2k/blogs/another-5-years-what-have-we-learned-about-the-wikipedia-gender-gap-and-what-has-been-done-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ting</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Wikipedia gender gap</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    

   <dc:date>2016-09-22T07:54:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-report-2017-2018.pdf">
    <title>Annual Report 2017-2018</title>
    <link>https://cis-india.org/about/reports/annual-report-2017-2018.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-report-2017-2018.pdf'&gt;https://cis-india.org/about/reports/annual-report-2017-2018.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2019-01-29T01:57:43Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/annual-report-2016-2017">
    <title>Annual Report 2016-2017</title>
    <link>https://cis-india.org/internet-governance/files/annual-report-2016-2017</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/annual-report-2016-2017'&gt;https://cis-india.org/internet-governance/files/annual-report-2016-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-09-20T01:43:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/annual-report-2015-2016">
    <title>Annual Report 2015-2016</title>
    <link>https://cis-india.org/internet-governance/files/annual-report-2015-2016</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/annual-report-2015-2016'&gt;https://cis-india.org/internet-governance/files/annual-report-2015-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2017-09-20T01:35:54Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-report-2014-15.pdf">
    <title>Annual Report 2014-15</title>
    <link>https://cis-india.org/about/reports/annual-report-2014-15.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-report-2014-15.pdf'&gt;https://cis-india.org/about/reports/annual-report-2014-15.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-12-11T07:29:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/annual-report-2012-13.pdf">
    <title>Annual Report (2012-13)</title>
    <link>https://cis-india.org/internet-governance/blog/annual-report-2012-13.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/annual-report-2012-13.pdf'&gt;https://cis-india.org/internet-governance/blog/annual-report-2012-13.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-22T00:04:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/reports/annual-report-2011-2012.pdf">
    <title>Annual Report (2011-12)</title>
    <link>https://cis-india.org/about/reports/annual-report-2011-2012.pdf</link>
    <description>
        &lt;b&gt;Draft Annual Report of 2011-12 from the Centre for Internet and Society&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/reports/annual-report-2011-2012.pdf'&gt;https://cis-india.org/about/reports/annual-report-2011-2012.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-22T00:15:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/annual-report-2009.pdf">
    <title>Annual Report (2009-10)</title>
    <link>https://cis-india.org/accessibility/annual-report-2009.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/annual-report-2009.pdf'&gt;https://cis-india.org/accessibility/annual-report-2009.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-06-20T11:54:08Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/annual-report-2008.pdf">
    <title>Annual Report (2008-09)</title>
    <link>https://cis-india.org/accessibility/annual-report-2008.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/annual-report-2008.pdf'&gt;https://cis-india.org/accessibility/annual-report-2008.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-06-20T12:23:29Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
