<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 841 to 855.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2015-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/blog_understanding-tagores-music-on-youtube"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/news/civic-brics-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling">
    <title>Genetic Profiling: Is it all in the DNA? </title>
    <link>https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling</link>
    <description>
        &lt;b&gt;A Bill seeks to make genetic profiling mandatory for the fight against crime—and generates a debate about the clash of ethics, freedom, science and data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ullekh NP was &lt;a class="external-link" href="http://www.openthemagazine.com/article/nation/genetic-profiling-is-it-all-in-the-dna"&gt;published in Open Magazine&lt;/a&gt; on August 7, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When British geneticist Sir Alec Jeffreys first developed the DNA  profiling test 31 years ago in his laboratory at Leicester University,  he didn’t help the police prove a man guilty. His test—back then it took  weeks to complete DNA profiling procedures as opposed to a few hours  now—proved that a rape suspect in police custody was innocent. Details  from the whole exercise also subsequently helped the local police nab  the real criminal, who had killed his teenaged rape victim. Later, the  police found that he was the one who had committed a similar crime three  years earlier in a village nearby. Britain was destined to make great  gains in solving crimes thanks to DNA identification, while the rest of  the developed world, including the US, caught up later, but only after  lagging initially thanks to the relentless—and sometimes  ill-founded—opposition from civil liberties activists. In India, the  Human DNA Profiling Bill, 2015, a proposed law that envisages collecting  DNA finger prints—which are unique to an individual—especially of  criminals, has been in the making for the past 12 years. The draft bill,  which will shortly be placed before the Union Cabinet for its nod, has  been prepared by the Department of Biotechnology and the Centre for DNA  Fingerprinting &amp;amp; Diagnostics (CDFD), a Hyderabad-based Central  Government-run agency, after examining and reviewing submissions by a  panel of experts, holding consultations with various stakeholders and  getting responses from the public. Notwithstanding the claims of  safeguards against any misuse of the intended DNA data base, activists,  lawyers, internet freedom fighters, civil liberty activists and  columnists have been up in arms against the Government, arguing that the  DNA profiling bill is ill- conceived and naïve—to the extent that it  would destroy an individual’s right to privacy as it lacks provisions to  check data tampering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The international experience has proved otherwise. Ever since Sir  Jeffreys extracted DNA from human muscle tissue, identified and  processed genetic markers (which are unique to individuals except in the  case of identical twins) from what was until then considered ‘seemingly  purposeless segments of the human DNA’ in the words of writers Peter  Reinharz and Howard Safir, more than 500,000 ‘otherwise unsolvable’  cases have been solved in the developed world thanks to the DNA  identification, note CDFD scientists. DNA is the hereditary material in  the human body. It is found in blood, saliva, urine, strands of hair,  semen, tears, skin, etcetera.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Madhusudan Reddy Nandineni, staff scientist and group leader,  laboratory of DNA fingerprinting services and laboratory of genomics and  profiling applications, CDFD, is worried that opposition to the Bill is  gaining momentum in India due to a raft of reasons. Of course, the  West, too, has witnessed sharp protests against DNA profiling laws. One  of the key reasons anti-profiling activists have an edge, says a senior  Home Ministry official who asks not to be named, is that there is a  “general public anxiety” over “anything to do with disclosing personal  details”. He agrees that the tests are going to be intrusive, because  muscle tissue may have to be collected from private parts. The procedure  of DNA sample collection—as explained in the draft Bill submitted in  January by a committee headed by TS Rao, senior adviser to the  department of biotechnology—talks about obtaining intimate body samples  of living persons (on page 6-7 of the 48- page document) from ‘the  genital or anal area, the buttocks and also breasts in the case of a  female’. According to the draft Bill, it also involves external  examination of private parts, taking samples from pubic hair or by swabs  or washing or by vacuum suction, by scraping or by lifting by tape and  taking of a photograph or video recording of, or an impression or cast  of a wound in those areas. “But then, it is par for the course,” says  the Home Ministry official by way of justification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;American military historian and author Edward Luttwak agrees that DNA  profiling is a significant intrusion into the “very body of a citizen”.  That is the price one has to pay in the choice between liberty and  equality before investigation, he posits. Luttwak is glad that in the  US, as well as in other countries that have such profiling laws, DNA  identification has yielded results. “It protects suspicious/ low status  but innocent people from false accusations and helps to catch  clever/high-status law-breakers,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;+++&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For his part, Dr Nandineni says that every aspect of the Human  DNA Profiling Bill for India is based on similar legislation that has  already been implemented in the US, Canada, UK, Australia and  Continental Europe for more than 20 years. He also contends that the  benefits that have accrued there are enormous, which India has missed  out on for all these years. “In all these countries, the concerns of the  general public on privacy matters have been allayed in their  legislation,” he adds. He points out that the retention of DNA profiles  in a ‘DNA Data Bank’ is meant to apprehend repeat offenders and thus  serve a larger societal good. As regards privacy concerns, Dr Nandineni  says that consultations on the preparations of the Bill lasted for 2-3  years and took into account the views of an expert committee whose  members included representatives of NGOs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Nandineni is of the view that the opponents of the Bill have  managed to get an upper hand in a national debate thanks to their  media-savvy backgrounds. Agrees the Home Ministry official: “Perhaps the  drafters of the Bill have not been communicative enough in getting  their points across to the public and the media. Which might explain why  the Bill has come under tremendous attack in the media. Even otherwise,  global trends also show that civil liberty rights activists have had  great initial advantage in their campaign against DNA profiling.” After  all, the potential for misuse of DNA samples is not restricted to  biological material collected under the provisions of the DNA Bill  alone, Nandineni offers. “Any and every blood sample collected by a  clinical laboratory has the same potential for misuse,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Dr J Gowrishankar, director, CDFD, has been vocal about the  positives of the Bill, its opponents have been louder. Many of those  who oppose the Bill say the question is not one of being loud or feeble,  but about being naïve or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The likes of Sunil Abraham, executive director of Bangalore-based  internet research organisation Centre for Internet and Society (CIS),  have no argument against DNA profiling being the gold standard for all  forensic investigations. “There is nothing wrong with using DNA evidence  for forensic purposes,” says Abraham, “However, the draft Bill is  filled with techno-utopianism; it assumes that the people and machines  that leverage DNA technologies are infallible.” He goes on, “This is not  true. It is easier to tamper with DNA evidence than it is to tamper  with a video recording. Therefore, all we are asking for are process  checks that prevent compromised persons and machines from using DNA  evidence to convict or exonerate the wrong person.” His contention is  that if the DNA sample is sent to two different labs and both labs come  back with exactly the same result, then the courts can be convinced of  the veracity of the result. “Also the Bill says that DNA labs will give  courts ‘yes’ or ‘no’ answers to questions related to DNA matching. But  ideally, the lab must give the exact match percentage along with all the  detailed information that emerges from the match process so that the  court can fully appreciate the significance of the DNA evidence,” he  suggests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham and legal scholar Usha Ramanathan—both members of the  expert panel who filed notes of dissent and disagreed with various  aspects of the Bill—have a problem with the claim that the proposed DNA  data bank will cover only criminals and not the general public. Points  out Ramanathan: “The Bill does not restrict the data base to criminals  alone, not by a long shot. The provision in the proposed Bill reads:  ‘(Clause 31(4)) Every DNA Data Bank shall maintain following indices for  various categories of data, namely: (a) a crime scene index; (b) a  suspects’ index; (c) an offenders’ index; (d) a missing persons’ index;  (e) unknown deceased persons’ index; (f) a volunteers’ index; and (g)  such other DNA indices as may be specified by regulations.’ That is an  elaborate set of indices. There is certainly a lot of the ‘general  public’ in it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporters of the DNA Profiling Bill have maintained that a DNA  data bank is not for the public but only for a limited category of  individuals. The proposed law also provides for storing profiles with  the consent of relatives of missing children and grownups so that  relationship identities can be established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanathan is also worried that apart from purposes of criminal  justice, DNA profiling may be extended to parental disputes (maternity  or paternity), issues related to pedigree, those related to assisted  reproductive technologies (surrogacy, in vitro fertilisation or IVF,  intrauterine implantation or IUI, and so on), to transplantation of  human organs (donor and recipient) under the Transplantation of Human  Organs Act, 1994, and also related to immigration or emigration. She had  objected to the requirement of revealing a person’s caste in the  application form for offering blood samples. “This Bill is certainly not  a convict data base. The ambitions are much much vaster, and little to  do with crime control,” she alleges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham agrees that some safeguards have been built in the  proposed law to prevent any misuse of DNA data under pressure from  expert panel members such as him. However, he says, cyber security and  privacy-related issues are not addressed in a comprehensive manner. “The  Bill basically hopes that the Privacy Bill will address all of this  when it becomes law. But unfortunately, a bill could take 7-10 years  before it becomes law,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Gowrishankar of CDFD and others have conceded that it was the  decision of the expert panel to include an enabling provision for the  privacy issues of DNA profiling to comply with the proposed Privacy  Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham says that various measures to prevent ‘privacy harms’ to  volunteers are missing in the latest draft of the Bill. “Given that  biometric technology works on probabilistic matching, the larger the  size of the database, the larger the incidence of mistaken  identification. Therefore it is important that the database remain as  small as necessary,” he asserts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;+++&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The estimated cost of the Bill is Rs 20 crore—to create the  infrastructure for the DNA Profiling Board and the data bank, which  includes buildings, furniture, computer servers and so on. Among other  things, the DNA Profiling Board is tasked with the responsibility of  laying down and implementing standards for laboratories and proper  protocols for ‘Data Bank’ operations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDFD scientists and government officials are keen to highlight  the ‘under- hyped’ benefits of DNA profiling –similar to the Innocence  Project in the US, which was aimed at securing the release of people who  were erroneously convicted on the basis of other lines of evidence.  Abraham has no patience for such comparisons. “DNA profiling for  forensic purposes is very advanced and sophisticated, but technologies  do not exist in a vacuum,” he says, “These advanced technologies have to  work within traditional institutions with vulnerabilities and flaws. We  need to, therefore, have non-technological procedural fixes that ensure  that these technologies are not compromised by money and power. The  choice is between the right to privacy and the rights and requirements  of the criminal justice process.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanathan agrees with that view. “In the Indian context, the  state of investigation is so poor that we have been looking for ways of  circumventing our problems, not addressing them. That is how  narco-analysis began to be used, till the court struck it down. DNA may  be more reliable than most other scientific tools available to us today,  but it is not all about the science. We also have to worry about  contamination, what happens in the chain of custody, its potential for  being planted or otherwise abused, and the errors even in the  laboratory. You may remember the avowed mix-up of results in the Aarushi  [Talwar murder] case, something the lab said they noticed over two  years after they had given it to the investigators. The danger of  treating DNA as conclusive and not needing corroboration is exacerbated  in this kind of a vulnerable system. Which is why bringing this into a  DNA data base law and not putting any checks on criminal procedure is  less than wise,” she elaborates. She is least impressed with the ‘idea’  of ‘pedigree’ and of ‘population genetics’ in the Bill. “Institutions  like the CDFD have been collecting DNA from suspects and asking for the  caste of the person on the form. How does this seem innocent and  safeguarded?” she asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, columnist and author Salil Tripathi says that it is  sheer hubris to think that technology will provide all the answers to  crime-fighting. “Tech- nology is enormously useful and powerful, but it  is value-neutral; it can be used for good or bad ends… There have to be  sufficient safeguards, overseen not only by technologists, law  enforcement officers and bureaucrats, but also by lawyers and civil  liberties experts, who can point out potential flaws and misuse and  prevent those.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tripathi, too, is piqued that one of the markers sought is of  caste. “Why?” he asks, emphatic that the country’s people should be  concerned about allowing the state so much power over their lives. “And  it may not be only the state; given that the scope of its future  expansion is undefined, what guarantees are there that private actors  won’t have access to the data, and if so, what security protocols would  apply?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dr Gowrishankar and Dr Nandineni are right in saying that without DNA  fingerprinting, many international criminals would still be at liberty,  and the opponents of the Bill do not disagree with the efficacy of the  technique developed by Sir Jeffreys. Instead, they are placing the  spotlight on various objectionable aspects in the proposed law. In a  country which first needs—according to former RAW chief Vikram Sood—to  ensure access to Photofit (a technique to create an accurate image of a  person that gels with a witness’ description) for its ground-level  police operatives to combat crime, critics of the Bill seem to have won  the war of words.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling'&gt;https://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-13T09:47:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites">
    <title>India blocks access to 857 porn sites</title>
    <link>https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites</link>
    <description>
        &lt;b&gt;India has blocked free access to 857 porn sites in what it says is a move to prevent children from accessing them. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The story was published by BBC on August 3, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Adults will still be able to access the  sites using virtual private networks (VPNs) or proxy servers. In July,  the Supreme Court expressed its unhappiness over the government's  inability to block sites, especially those featuring child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecom companies have said they will not be able to enforce the "ban" immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We  have to block each site one by one and it will take a few days for all  service providers to block all the sites," an unnamed telecom company  executive told The Times of India newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  senior official, who preferred to remained unnamed, told the BBC Hindi  that India's department of telecommunications had "advised" telecom  operators and Internet service providers to "control free and open  access" to &lt;a class="story-body__link-external"&gt;857 porn sites&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There  is no total ban. This was done in the backdrop of Supreme Court's  observation on children having free access to porn sites. The idea is  also to protect India's cultural fabric. This will not prevent adults  from visiting porn sites," the official said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In July, the top court had observed that it was not for the court to order a ban on porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It  is an issue for the government to deal with. Can we pass an interim  order directing blocking of all adult websites? And let us keep in mind  the possible contention of a person who could ask what crime have I  committed by browsing adult websites in private within the four walls of  my house. Could he not argue about his right to freedom to do something  within the four walls of his house without violating any law?," the  court said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;a class="story-body__link-external" href="http://www.pornhub.com/insights/2014-year-in-review"&gt;statistics released&lt;/a&gt; by adult site Pornhub, India was its fourth largest source of traffic  in 2014, behind the US, UK and Canada. Pranesh Prakash of the Bangalore  based Centre for Internet and Society said the directive to block the  857 sites was "the largest single order of its kind" in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The  government's reasoning that it is not a ban because adults can still  access the porn sites is ridiculous," he told the BBC. The move has  caused a great deal of comment on Indian social media networks, with  many prominent personalities coming forward to condemn it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular  author Chetan Bhagat, writer and commentator Nilanjana Roy, politician  Milind Deora and director Ram Gopal Varma have all added their voices to  the debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites'&gt;https://cis-india.org/internet-governance/news/bbc-news-august-3-2015-india-blocks-access-to-857-porn-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-05T01:31:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn">
    <title>India launches crackdown on online porn</title>
    <link>https://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn</link>
    <description>
        &lt;b&gt;India has launched a crackdown on internet pornography, banning access to more than 800 adult websites, including Playboy and Pornhub.&lt;/b&gt;
        &lt;div style="text-align: justify; "&gt;
&lt;p&gt;The article by &lt;span&gt;James Crabtree&lt;/span&gt; published in &lt;a class="external-link" href="http://www.ft.com/intl/cms/s/0/bb000a3a-39bc-11e5-8613-07d16aad2152.html#axzz3htqr5sEH"&gt;Financial Times &lt;/a&gt;on August 3, 2015 quotes Pranesh Prakash.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The restrictions followed a ruling from  India’s telecoms ministry &lt;span class="Object" id="OBJ_PREFIX_DWT142_com_zimbra_url"&gt;&lt;a href="http://cis-india.org/internet-governance/resources/dot-morality-block-order-2015-07-31/view" target="_blank" title="DOT Order Blocking 857 Websites on Grounds of Decency and Morality "&gt;ordering internet service providers&lt;/a&gt;&lt;/span&gt;, including international telecoms groups operating in the country such as the UK’s &lt;span class="Object" id="OBJ_PREFIX_DWT143_com_zimbra_url"&gt;&lt;a class="wsodCompany" href="http://markets.ft.com/tearsheets/performance.asp?s=uk:VOD" target="_blank"&gt;Vodafone&lt;/a&gt;&lt;/span&gt;, to block 857 such sites.&lt;/p&gt;
&lt;p&gt;Prime  Minister Narendra Modi’s government provided no public justification  for the unexpected ban when it came into effect at the weekend. However,  on &lt;span class="Object" id="OBJ_PREFIX_DWT144_com_zimbra_date"&gt;Monday&lt;/span&gt; India’s telecoms ministry said that the order, issued under India’s  Information Technology Act, had been prompted by comments made by a  supreme court judge during a hearing in July.&lt;/p&gt;
&lt;p&gt;The  ministry said that the restrictions were temporary and did not amount  to a “blanket” ban, arguing that internet users running virtual private  networks, which can be used to access blocked sites, could still view  the material. “It isn’t that they are being banned lock, stock and  barrel,” the ministry said. “The justice noted that free and open access  to these websites.... should be controlled, but these sites will  continue to be available through the mechanism of a VPN.”&lt;/p&gt;
&lt;p&gt;The crackdown is set to raise fresh concerns about sudden and sweeping legal restrictions in India, after the introduction of a &lt;span class="Object" id="OBJ_PREFIX_DWT145_com_zimbra_url"&gt;&lt;a href="http://www.ft.com/cms/s/0/46149ada-c17e-11e4-8b74-00144feab7de.html" target="_blank" title="Indian state of Maharashtra bans beef"&gt;ban on the sale of beef&lt;/a&gt;&lt;/span&gt; earlier this year in the western state of Maharashtra, a move that was  supported by Mr Modi’s government. The ruling also drew criticism from  legal experts following broader concerns about a recent rise in &lt;span class="Object" id="OBJ_PREFIX_DWT146_com_zimbra_url"&gt;&lt;a href="http://www.ft.com/cms/s/0/7660233c-ede4-11e1-a9d7-00144feab49a.htmlaxzz3hfM8v5KA" target="_blank" title="Criticism mounts over India censorship"&gt;poorly-targeted internet rules&lt;/a&gt;&lt;/span&gt;, including some restrictions on global social media sites such as &lt;span class="Object" id="OBJ_PREFIX_DWT147_com_zimbra_url"&gt;&lt;a class="wsodCompany" href="http://markets.ft.com/tearsheets/performance.asp?s=us:FB" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/span&gt; and Twitter.&lt;/p&gt;
&lt;p&gt;Pranesh  Prakash of the Bangalore-based Centre for Internet and Society  think-tank questioned the basis of the ruling, describing it as a  further example of a “clumsy” approach to online regulation.&lt;/p&gt;
&lt;p&gt;“There  is no proper justification that they have given for banning all porn,  rather than child porn or revenge porn or something like that,” he said.  “The reaction is heavy handed, and has been done under the cloak of  secrecy.” The remarks by a judge cited by India’s government as a  rationale for the ban were a comment made in court rather than a legal  ruling, Mr Prakash added, casting further doubt on the basis for the  restrictions.&lt;/p&gt;
&lt;p&gt;India’s  mix of strict regulation and conservative public morals mean explicit  sexual content is almost unheard of in mainstream media, where &lt;span class="Object" id="OBJ_PREFIX_DWT148_com_zimbra_url"&gt;&lt;a href="http://www.ft.com/intl/cms/s/0/c359fff4-44be-11e4-ab0c-00144feabdc0.html#axzz3hiAyaOg1" target="_blank" title="Bonds for Bollywood - FT.com"&gt;Bollywood films&lt;/a&gt;&lt;/span&gt; seldom featuring more than a chaste on-screen embrace.However India’s  fast-growing internet population of about 300m is now both the world’s  second largest after China, and an increasingly important sources for  traffic for global pornographic websites.&lt;/p&gt;
&lt;p&gt;Pornhub,  which is the world’s 66th most visited website according to ranking  service Alexa, said Indians were the fourth largest national users of  its content during 2014.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn'&gt;https://cis-india.org/internet-governance/news/financial-times-james-crabtree-august-3-2015-india-launches-crackdown-on-online-porn&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-08-05T01:21:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india">
    <title>Policy Paper on Surveillance in India</title>
    <link>https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india</link>
    <description>
        &lt;b&gt;This policy brief analyses the different laws regulating surveillance at the State and Central level in India and calls out ways in which the provisions are unharmonized. The brief then provides recommendations for the harmonization of  surveillance law in India.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The current legal framework for surveillance in India is a legacy of the colonial era laws that had been drafted by the British. Surveillance activities by the police are an everyday phenomenon and are included as part of their duties in the various police manuals of the different states. It will become clear from an analysis of the laws and regulations below, that whilst the police manuals cover the aspect of physical surveillance in some detail, they do not discuss the issue of interception of telephone or internet traffic. These issues are dealt with separately under the Telecom Act and the Information Technology Act and the Rules made thereunder, which are applicable to all security agencies and not just the police. Since the Indian laws deal with different aspects of surveillance under different legislations, the regulations dealing with this issue do not have any uniform standards. This paper therefore argues that the need of the hour is to have a single legislation which deals with all aspects of surveillance and interception in one place so that there is uniformity in the laws and practices of surveillance in the entire country.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legal Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India does not have one integrated policy on surveillance and law enforcement and security agencies have to rely upon a number of different sectoral legislations to carry out their surveillance activities. These include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Police Surveillance under Police Acts and Model Police Manual&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 246(3) of the Constitution of India, read with Entry 2, List II, of the VIIth Schedule, empowers the States to legislate in matters relating to the police. This means that the police force is under the control of the state government rather than the Central government. Consequently, States have their own Police Acts to govern the conduct of the police force. Under the authority of these individual State Police Acts, rules are formulated for day-to-day running of the police. These rules are generally found in the Police Manuals of the individual states. Since a discussion of the Police Manual of each State with its small deviations is beyond the scope of this study, we will discuss the Model Police Manual issued by the Bureau of Police Research and Development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Model Police Manual, “surveillance and checking of bad characters” is considered to be one of the duties of the police force mentioned in the “Inventory of Police Duties, Functions and Jobs”.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Surveillance is also one of the main methods utilized by the police for preventing law and order situations and crimes.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; As per the Manual the nature and degree of surveillance depends on the circumstances and persons on whom surveillance is mounted and it is only in very rare cases and on rare occasions that round the clock surveillance becomes necessary for a few days or weeks.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of History Sheeted Persons&lt;/i&gt;: Beat Police Officers should be fully conversant with the movements or changes of residence of all persons for whom history sheets of any category are maintained. They are required to promptly report the exact information to the Station House Officer (SHO), who make entries in the relevant registers. The SHO on the basis of this information reports, by the quickest means, to the SHO in whose jurisdiction the concerned person/persons are going to reside or pass through. When a history-sheeted person is likely to travel by the Railway, intimation of his movements should also be given to the nearest Railway Police Station.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; It must be noted that the term “history sheet” or “history sheeter” is not defined either in the Indian Penal Code, 1860, most of the State Police Acts or the Model Police Manual, but it is generally understood and defined in the Oxford English Dictionary as persons with a criminal record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of “Bad Characters”&lt;/i&gt;: Keeping tabs on and getting information regarding “bad characters” is part of the duties of a beat constable. In the case of a “bad character” who is known to have gone to another State, the SHO of the station in the other state is informed using the quickest means possible followed by sending of a BC Roll 'A' directly to the SHO.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; When a “bad character” absents himself or goes out of view, whether wanted in a case or not, the information is required to be disseminated to the police stations having jurisdiction over the places likely to be visited by him and also to the neighbouring stations, whether within the State or outside. If such person is traced and intimation is received of his arrest or otherwise, arrangements to get a complete and true picture of his activities are required to be made and the concerned record updated.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Police Manual clarifies the term “bad characters” to mean “offenders, criminals, or members of organised crime gangs or syndicates or those who foment or incite caste, communal violence, for which history sheets are maintained and require surveillance.”&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; A fascinating glimpse into the history of persons who were considered to be “bad characters” is contained in the article by Surjan Das &amp;amp; Basudeb Chattopadhyay in EPW&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; wherein they bring out the fact that in colonial times a number of the stereotypes propagated by the British crept into their police work as well. It appears that one did not have to be convicted to be a bad character, but people with a dark complexion, strong built, broad chins, deep-set eyes, broad forehead, short hair, scanty or goatee beard, marks on face, moustache, blunt nose, white teeth and monkey-face would normally fit the description of “bad characters”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of Suspicious Strangers&lt;/i&gt;: When a stranger of suspicious conduct or demeanour is found within the limits of a police station, the SHO is required to forward a BC Roll to the Police Station in whose jurisdiction the stranger claims to have resided. The receipt of such a roll is required to be immediately acknowledged and replied. If the suspicious stranger states that he resides in another State, a BC Roll is sent directly to the SHO of the station in the other State.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The manual however, does not define who a “suspicious stranger” is and how to identify one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Release of Foreign Prisoners&lt;/i&gt;: Before a foreign prisoner (whose finger prints are taken for record) is released the Superintendent of Police of the district where the case was registered is required to send a report to the Director, I.B. through the Criminal Investigation Department informing the route and conveyance by which such person is likely to leave the country.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shadowing of convicts and dangerous persons:&lt;/i&gt; The Police Manual contains the following rules for shadowing the convicts on their release from jails:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Dangerous convicts who are not likely to return to their native places are required to be shadowed. The fact, when a convict is to be shadowed is entered in the DCRB in the FP register and communicated to the Superintendent of Jails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The Police Officer deputed for shadowing an ex-convict is required to enter the fact in the notebook. The Police Officers area furnished with a challan indicating the particulars of the ex-convict marked for shadowing. This form is returned by the SHO of the area where the ex-convict takes up his residence or passes out of view to the DCRB / OCRS where the jail is situated, where it is put on record for further reference and action if any. Even though the subjects being shadowed are kept in view, no restraint is to put upon their movements on any account.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the provisions discussed above, there are also provisions in the Police Manual regarding surveillance of convicts who have been released on medical grounds as well as surveillance of ex-convicts who are required to report their movements to the police as per the provisions of section 356 of the Code of Criminal Procedure.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted above, the various police manuals are issued under the State Police Acts and they govern the police force of the specific states. The fact that each state has its own individual police manual itself leads to non-uniformity regarding standards and practices of surveillance. But it is not only the legislations at the State levels which lead to this problem, even legislation at the Central level, which are applicable to the country as a whole also have differing standards regarding different aspects of surveillance. In order to explore this further, we shall now discuss the central legislations dealing with surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. The Indian Telegraph Act, 1885&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5 of the Indian Telegraph Act, 1885, empowers the Central Government and State Governments of India to order the interception of messages in two circumstances: (1) in the occurrence of any public emergency or in the interest of public safety, and (2) if it is considered necessary or expedient to do so in the interest of:&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;the sovereignty and integrity of India; or&lt;/li&gt;
&lt;li&gt;the security of the State; or&lt;/li&gt;
&lt;li&gt;friendly relations with foreign states; or&lt;/li&gt;
&lt;li&gt;public order; or&lt;/li&gt;
&lt;li&gt;for preventing incitement to the commission of an offence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has specified the terms 'public emergency' and 'public safety', based on the following&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Public emergency would mean the prevailing of a sudden condition or state of affairs affecting the people at large calling for immediate action. The expression 'public safety' means the state or condition of freedom from danger or risk for the people at large. When either of these two conditions are not in existence, the Central Government or a State Government or the authorised officer cannot resort to telephone tapping even though there is satisfaction that it is necessary or expedient so to do in the interests of it sovereignty and integrity of India etc. In other words, even if the Central Government is satisfied that it is necessary or expedient so to do in the interest of the sovereignty and integrity of India or the security of the State or friendly relations with sovereign States or in public order or for preventing incitement to the commission of an offence, it cannot intercept the message, or resort to telephone tapping unless a public emergency has occurred or the interest of public safety or the existence of the interest of public safety requires. Neither the occurrence of public emergency nor the interest of public safety are secretive conditions or situations. Either of the situations would be apparent to a reasonable person."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2007, Rule 419A was added to the Indian Telegraph Rules, 1951 framed under the Indian Telegraph Act which provided that orders on the interception of communications should only be issued by the Secretary in the Ministry of Home Affairs. However, it provided that in unavoidable circumstances an order could also be issued by an officer, not below the rank of a Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, the interception of any message or class of messages is to be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;in remote areas, where obtaining of prior directions for interception of messages or class of messages is not feasible; or&lt;/li&gt;
&lt;li&gt;for operational reasons, where obtaining of prior directions for interception of message or class of messages is not feasible;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;however, the concerned competent authority is required to be informed of such interceptions by the approving authority within three working days and such interceptions are to be confirmed by the competent authority within a period of seven working days. If the confirmation from the competent authority is not received within the stipulated seven days, such interception should cease and the same message or class of messages should not be intercepted thereafter without the prior approval of the Union Home Secretary or the State Home Secretary.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A also tries to incorporate certain safeguards to curb the risk of unrestricted surveillance by the law enforcement authorities which include the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Any order for interception issued by the competent authority should contain reasons for such direction and a copy of such an order should be forwarded to the Review Committee within a period of seven working days;&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Directions for interception should be issued only when it is not possible to acquire the information by any other reasonable means;&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directed interception should include the interception of any message or class of messages that are sent to or from any person n or class of persons or relating to any particular subject whether such message or class of messages are received with one or more addresses, specified in the order being an address or addresses likely to be used for the transmission of communications from or to one particular person specified or described in the order or one particular set of premises specified or described in the order;&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The interception directions should specify the name and designation of the officer or the authority to whom the intercepted message or class of messages is to be disclosed to;&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception would remain in force for sixty days, unless revoked earlier, and may be renewed but the same should not remain in force beyond a total period of one hundred and eighty days;&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception should be conveyed to the designated officers of the licensee(s) in writing by an officer not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank;&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer authorized to intercept any message or class of messages should maintain proper records mentioning therein, the intercepted message or class of messages, the particulars of persons whose message has been intercepted, the name and other particulars of the officer or the authority to whom the intercepted message or class of messages has been disclosed, etc.;&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All the requisitioning security agencies should designate one or more nodal officers not below the rank of Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisitions for interception to the designated officers of the concerned service providers to be delivered by an officer not below the rank of Sub-Inspector of Police;&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Records pertaining to directions for interception and of intercepted messages should be destroyed by the competent authority and the authorized security and Law Enforcement Agencies every six months unless these are, or likely to be, required for functional requirements;&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to Rule 419A, service providers \are required by law enforcement to intercept communications are required to comply with the following&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should designate two senior executives of the company in every licensed service area/State/Union Territory as the nodal officers to receive and handle such requisitions for interception;&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should issue acknowledgment letters to the concerned security and Law Enforcement Agency within two hours on receipt of intimations for interception;&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The system of designated nodal officers for communicating and receiving the requisitions for interceptions should also be followed in emergent cases/unavoidable cases where prior approval of the competent authority has not been obtained;&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The designated nodal officers of the service providers should forward every fifteen days a list of interception authorizations received by them during the preceding fortnight to the nodal officers of the security and Law Enforcement Agencies for confirmation of the authenticity of such authorizations;&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Service providers are required to put in place adequate and effective internal checks to ensure that unauthorized interception of messages does not take place, that extreme secrecy is maintained and that utmost care and precaution is taken with regards to the interception of messages;&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers are held responsible for the actions of their employees. In the case of an established violation of license conditions pertaining to the maintenance of secrecy and confidentiality of information and unauthorized interception of communication, action shall be taken against service providers as per the provisions of the Indian Telegraph Act, and this shall not only include a fine, but also suspension or revocation of their license;&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Service providers should destroy records pertaining to directions for the interception of messages within two months of discontinuance of the interception of such messages and in doing so they should maintain extreme secrecy.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Review Committee&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A of the Indian Telegraph Rules requires the establishment of a Review Committee by the Central Government and the State Government, as the case may be, for the interception of communications, as per the following conditions:&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The Review Committee to be constituted by the Central Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Cabinet Secretary - Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary to the Government of India in charge, Legal Affairs - Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the Government of India, Department of Telecommunications – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Review Committee to be constituted by a State Government shall consist of the following members, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Chief Secretary – Chairman&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Secretary Law/Legal Remembrancer in charge, Legal Affairs – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Secretary to the State Government (other than the Home Secretary) – Member&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Review Committee meets at least once in two months and records its findings on whether the issued interception directions are in accordance with the provisions of sub-section (2) of Section 5 of the Indian Telegraph Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and order for destruction of the copies of the intercepted message or class of messages;&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the Unlawful Activities (Prevention) Act, 1967, (which is currently used against most acts of urban terrorism) also allows for the interception of communications but the procedures and safeguards are supposed to be the same as under the Indian Telegraph Act and the Information Technology Act.&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Telecom Licenses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecom sector in India has seen immense activity in the last two decades ever since it was opened up to private competition. These last twenty years have seen a lot of turmoil and have offered a tremendous learning opportunity for the private players as well as the governmental bodies regulating the sector. Currently any entity wishing to get a telecom license is offered a UL (Unified License) which contains terms and conditions for all the services that a licensee may choose to offer. However there were a large number of other licenses before the current regime, and since the licenses have a long phase out, we have tried to cover what we believe are the four most important licenses issued to telecom operators starting with the CMTS License:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cellular Mobile Telephony Services (CMTS) License&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of National Telecom Policy (NTP)-1994, the first phase of liberalization in mobile telephone service started with issue of 8 licenses for Cellular Mobile Telephony Services (CMTS) in the 4 metro cities of Delhi, Mumbai, Calcutta and Chennai to 8 private companies in November 1994. Subsequently, 34 licenses for 18 Territorial Telecom Circles were also issued to 14 private companies during 1995 to 1998. During this period a maximum of two licenses were granted for CMTS in each service area and these licensees were called 1st &amp;amp; 2nd cellular licensees.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt; Consequent upon announcement of guidelines for Unified Access (Basic &amp;amp; Cellular) Services licenses on 11.11.2003, some of the CMTS operators were permitted to migrate from CMTS License to Unified Access Service License (UASL) but currently no new CMTS and Basic service licenses are being awarded after issuing the guidelines for Unified Access Service Licence (UASL).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The important provisions regarding surveillance in the CMTS License are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for Interception&lt;/i&gt;: The CMTS License requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring of Telecom Traffic&lt;/i&gt;: The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee have the right to monitor the telecommunication traffic in every MSC or any other technically feasible point in the network set up by the licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at licensee’s cost. In case the security agencies intend to locate the equipment at licensee’s premises for facilitating monitoring, the licensee is required to extend all support in this regard including space and entry of the authorised security personnel. The interface requirements as well as features and facilities as defined by the Licensor are to be implemented by the licensee for both data and speech. The Licensee is also required to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of Privacy&lt;/i&gt;: It is the responsibility of the Licensee to ensure the protection of privacy of communication and ensure unathorised interception of messages does not take place.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;License Agreement for Provision of Internet Services (ISP License)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet services were launched in India on 15th August, 1995 by Videsh Sanchar Nigam Limited. In November, 1998, the Government opened up the sector for providing Internet services by private operators. The major provisions dealing with surveillance contained in the ISP License are given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Authorization for monitoring&lt;/i&gt;: Monitoring shall only be by the authorization of the Union Home Secretary or Home Secretaries of the States/Union Territories.&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access to subscriber list by authorized intelligence agencies and licensor&lt;/i&gt;: The complete and up to date list of subscribers will be made available by the ISP on a password protected website – accessible to authorized intelligence agencies.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; Information such as customer name, IP address, bandwidth provided, address of installation, data of installation, contact number and email of leased line customers shall be included in the website.&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; The licensor or its representatives will also have access to the Database relating to the subscribers of the ISP which is to be available at any instant.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right to monitor by the central/state government&lt;/i&gt;: The designated person of the central/state government or the licensor or nominee will have the right to monitor telecommunications traffic in every node or any other technically feasible point in the network. To facilitate this, the ISP must make arrangements for the monitoring of simultaneous calls by the Government or its security agencies.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Right of DoT to monitor&lt;/i&gt;: DoT will have the ability to monitor customers who generate high traffic value and verify specified user identities on a monthly basis.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of mirror images:&lt;/i&gt; Mirror images of the remote access information should be made available online for monitoring purposes.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt; A safeguard provided for in the license is that remote access to networks is only allowed in areas approved by the DOT in consultation with the Security Agencies.&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of information stored on dedicated transmission link:&lt;/i&gt; The ISP will provide the login password to DOT and authorized Government agencies on a monthly basis for access to information stored on any dedicated transmission link from ISP node to subscriber premises.&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of subscriber identity and geographic location:&lt;/i&gt; The ISP must provide the traceable identity and geographic location of their subscribers, and if the subscriber is roaming – the ISP should try to find traceable identities of roaming subscribers from foreign companies.&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring:&lt;/i&gt; The ISP must provide the necessary facilities for continuous monitoring of the system as required by the licensor or its authorized representatives.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for tracing&lt;/i&gt;: The ISP will also provide facilities for the tracing of nuisance, obnoxious or malicious calls, messages, or communications. These facilities are to be provided specifically to authorized officers of the Government of India (police, customs, excise, intelligence department) when the information is required for investigations or detection of crimes and in the interest of national security.&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities and equipment to be specified by government:&lt;/i&gt; The types of interception equipment to be used will be specified by the government of India.&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt; This includes the installation of necessary infrastructure in the service area with respect to Internet Telephony Services offered by the ISP including the processing, routing, directing, managing, authenticating the internet calls including the generation of Call Details Record, IP address, called numbers, date, duration, time, and charge of the internet telephony calls.&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for surveillance of mobile terminal activity&lt;/i&gt;: The ISP must also provide the government facilities to carry out surveillance of Mobile Terminal activity within a specified area whenever requested.&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring international gateway:&lt;/i&gt; As per the requirements of security agencies, every international gateway location having a capacity of 2 Mbps or more will be equipped will have a monitoring center capable of monitoring internet telephony traffic.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Facilities for monitoring in the premise of the ISP&lt;/i&gt;: Every office must be at least 10x10 with adequate power, air conditioning, and accessible only to the monitoring agencies. One local exclusive telephone line must be provided, and a central monitoring center must be provided if the ISP has multiple nodal points.&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Protection of privacy&lt;/i&gt;: There is a responsibility on the ISP to protect the privacy of its communications transferred over its network. This includes securing the information and protecting against unauthorized interception, unauthorized disclosure, ensure the confidentiality of information, and protect against over disclosure of information- except when consent has been given.&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of users:&lt;/i&gt; Each ISP must maintain an up to date log of all users connected and the service that they are using (mail, telnet, http, etc). The ISPs must also log every outward login or telnet through their computers. These logs as well as copies of all the packets must be made available in real time to the Telecom Authority.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of internet leased line customers:&lt;/i&gt; A record of each internet leased line customer should be kept along with details of connectivity, and reasons for taking the link should be kept and made readily available for inspection.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Log of remote access activities:&lt;/i&gt; The ISP will also maintain a complete audit trail of the remote access activities that pertain to the network for at least six months. This information must be available on request for any agency authorized by the licensor.&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring requirements&lt;/i&gt;: The ISP must make arrangements for the monitoring of the telecommunication traffic in every MSC exchange or any other technically feasible point, of at least 210 calls simultaneously.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Records to be made available&lt;/i&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;CDRS&lt;/i&gt;: When required by security agencies, the ISP must make available records of i) called/calling party mobile/PSTN numbers ii) time/date and duration of calls iii) location of target subscribers and from time to time precise location iv) telephone numbers – and if any call forwarding feature has been evoked – records thereof v) data records for failed call attempts vi) CDR of roaming subscriber.&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Bulk connections&lt;/i&gt;: On a monthly basis, and from time to time, information with respect to bulk connections shall be forwarded to DoT, the licensor, and security agencies.&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of calls beyond specified threshold&lt;/i&gt;: Calls should be checked, analyzed, and a record maintained of all outgoing calls made by customers both during the day and night that exceed a set threshold of minutes. A list of suspected subscribers should be created by the ISP and should be informed to DoT and any officer authorized by the licensor at any point of time.&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Record of subscribers with calling line identification restrictions&lt;/i&gt;: Furthermore, a list of calling line identification restriction subscribers with their complete address and details should be created on a password protected website that is available to authorized government agencies.&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified Access Services (UAS) License&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unified Access Services operators provide services of collection, carriage, transmission and delivery of voice and/or non-voice messages within their area of operation, over the Licensee’s network by deploying circuit and/or packet switched equipment. They may also provide Voice Mail, Audiotex services, Video Conferencing, Videotex, E-Mail, Closed User Group (CUG) as Value Added Services over its network to the subscribers falling within its service area on a non-discriminatory basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The terms of providing the services are regulated under the Unified Access Service License (UASL) which also contains provisions regarding surveillance/interception. These provisions are regularly used by the state agencies to intercept telephonic and data traffic of subscribers. The relevant terms of the UASL dealing with surveillance and interception are discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Confidentiality of Information&lt;/i&gt;: The Licensee cannot employ bulk encryption equipment in its network. Any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, any encryption equipment connected to the Licensee’s network for specific requirements has to have prior evaluation and approval of the Licensor or officer specially designated for the purpose. However, the Licensee has the responsibility to ensure protection of privacy of communication and to ensure that unauthorised interception of messages does not take place.&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt; The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Responsibility of the Licensee:&lt;/i&gt; The Licensee has to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides the service and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that :&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service to the third party; and&lt;/li&gt;
&lt;li&gt;No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of monitoring facilities&lt;/i&gt;: Requisite monitoring facilities /equipment for each type of system used, shall be provided by the service provider at its own cost for monitoring as and when required by the licensor.&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt; The license also requires the Licensee to provide necessary facilities to the designated authorities for interception of the messages passing through its network.&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt; The licensor in this case is the President of India, as the head of the State, therefore all references to the term licensor can be assumed to be to the government of India (which usually acts through the department of telecom (DOT). For monitoring traffic, the licensee company has to provide access of their network and other facilities as well as to books of accounts to the security agencies.&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring by Designated Person:&lt;/i&gt; The designated person of the Central/ State Government as conveyed to the Licensor from time to time in addition to the Licensor or its nominee has the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. The hardware at Licensee’s end and software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at Licensee’s cost. However, the respective Government instrumentality bears the cost of user end hardware and leased line circuits from the MSC/ Exchange/MGC/MG&lt;b&gt; &lt;/b&gt;to the monitoring centres to be located as per their choice in their premises or in the premises of the Licensee. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel. The Licensee is required to implement the interface requirements as well as features and facilities as defined by the Licensor for both data and speech. The Licensee is to ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies.&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring Records to be maintained:&lt;/i&gt; Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;List of Subscribers:&lt;/i&gt; The complete list of subscribers shall be made available by the Licensee on their website (having password controlled access), so that authorized Intelligence Agencies are able to obtain the subscriber list at any time, as per their convenience with the help of the password.&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt; The Licensor or its representative(s) have an access to the Database relating to the subscribers of the Licensee. The Licensee shall also update the list of his subscribers and make available the same to the Licensor at regular intervals. The Licensee shall make available, at any prescribed instant, to the Licensor or its authorized representative details of the subscribers using the service.&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; The Licensee must provide traceable identity of their subscribers,&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt; and should be able to provide the geographical location (BTS location) of any subscriber at a given point of time, upon request by the Licensor or any other agency authorized by it.&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CDRs for Large Number of Outgoing Calls:&lt;/i&gt; The call detail records for outgoing calls made by subscribers making large number of outgoing calls day and night and to the various telephone numbers should be analyzed. Normally, no incoming call is observed in such cases. This can be done by running special programs for this purpose.&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt; Although this provision itself does not say that it is limited to bulk subscribers (subscribers with more than 10 lines), it is contained as a sub-clause of section 41.19 which talks about specific measures for bulk subscribers, therefore it is possible that this provision is limited only to bulk subscribers and not to all subscribers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt; It interesting to note that the monitoring under the UASL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring from Centralised Location&lt;/i&gt;: The Licensee has to ensure that necessary provision (hardware/ software) is available in its equipment for doing lawful interception and monitoring from a centralized location.&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unified License (UL)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Telecom Policy - 2012 recognized the fact that the evolution from analog to digital technology has facilitated the conversion of voice, data and video to the digital form which are increasingly being rendered through single networks bringing about a convergence in networks, services and devices. It was therefore felt imperative to move towards convergence between various services, networks, platforms, technologies and overcome the incumbent segregation of licensing, registration and regulatory mechanisms in these areas. It was for this reason that the Government of India decided to move to the Unified License regime under which service providers could opt for all or any one or more of a number of different services.&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provision of interception facilities by Licensee&lt;/i&gt;: The UL requires that the requisite monitoring/ interception facilities /equipment for each type of service, should be provided by the Licensee at its own cost for monitoring as per the requirement specified by the Licensor from time to time.&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt; The Licensee is required to provide necessary facilities to the designated authorities of Central/State Government as conveyed by the Licensor from time to time for interception of the messages passing through its network, as per the provisions of the Indian Telegraph Act.&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Bulk encryption and unauthorized interception&lt;/i&gt;: The UL prohibits the Licensee from employing bulk encryption equipment in its network. Licensor or officers specially designated for the purpose are allowed to evaluate any encryption equipment connected to the Licensee’s network. However, it is the responsibility of the Licensee to ensure protection of privacy of communication and to ensure that unauthorized interception of messages does not take place.&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt; The use of encryption by the subscriber shall be governed by the Government Policy/rules made under the Information Technology Act, 2000.&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Safeguarding of Privacy and Confidentiality&lt;/i&gt;: The Licensee shall take necessary steps to ensure that the Licensee and any person(s) acting on its behalf observe confidentiality of customer information.&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt; Subject to terms and conditions of the license, the Licensee is required to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and its business to whom it provides services and from whom it has acquired such information by virtue of the service provided and shall use its best endeavors to secure that: a) No person acting on behalf of the Licensee or the Licensee divulges or uses any such information except as may be necessary in the course of providing such service; and b) No such person seeks such information other than is necessary for the purpose of providing service to the third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided the above para does not apply where: a) The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or b) The information is already open to the public and otherwise known.&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;No Remote Access to Suppliers&lt;/i&gt;: Suppliers/manufacturers and affiliate(s) are not allowed any remote access to the be enabled to access Lawful Interception System(LIS), Lawful Interception Monitoring(LIM), Call contents of the traffic and any such sensitive sector/data, which the licensor may notify from time to time, under any circumstances.&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt; The Licensee is also not allowed to use remote access facility for monitoring of content.&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt; Further, suitable technical device is required to be made available at Indian end to the designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes.&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Monitoring as per the Rules under Telegraph Act&lt;/i&gt;: In order to maintain the privacy of voice and data, monitoring shall be in accordance with rules in this regard under Indian Telegraph Act, 1885.&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt; Just as in the UASL, the monitoring under the UL license is required to be as per the Rules prescribed under the Telegraph Act, but no mention is made of the Rules under the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Terms specific to various services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the UL License intends to cover all services under a single license, in addition to the general terms and conditions for interception, it also has terms for each specific service. We shall now discuss the terms for interception specific to each service offered under the Unified License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Access Service&lt;/i&gt;: The designated person of the Central/ State Government, in addition to the Licensor or its nominee, shall have the right to monitor the telecommunication traffic in every MSC/ Exchange/ MGC/ MG/ Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including space and entry of the authorized security personnel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Lawful Interception and Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each MSC of the Licensee in the service area shall have the capacity for provisioning of at least 3000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and no. of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along with the monitored call following records are to be made available:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Called/calling party mobile/PSTN numbers.&lt;/li&gt;
&lt;li&gt;Time/date and duration of interception.&lt;/li&gt;
&lt;li&gt;Location of target subscribers. Cell ID should be provided for location of the target subscriber. However, Licensor may issue directions from time to time on the precision of location, based on technological developments and integration of Global Positioning System (GPS) which shall be binding on the LICENSEE.&lt;/li&gt;
&lt;li&gt;Telephone numbers if any call-forwarding feature has been invoked by target subscriber.&lt;/li&gt;
&lt;li&gt;Data records for even failed call attempts.&lt;/li&gt;
&lt;li&gt;CDR (Call Data Record) of Roaming Subscriber.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies.&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The call detail records for outgoing calls made by those subscribers making large number of outgoing calls day and night to the various telephone numbers with normally no incoming calls, is required to be analyzed by the Licensee. The service provider is required to run special programme, devise appropriate fraud management and prevention programme and fix threshold levels of average per day usage in minutes of the telephone connection; all telephone connections crossing the threshold of usage are required to be checked for &lt;i&gt;bona fide&lt;/i&gt; use. A record of check must be maintained which may be verified by Licensor any time. The list/details of suspected subscribers should be informed to the respective TERM Cell of DoT and any other officer authorized by Licensor from time to time.&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee shall provide location details of mobile customers as per the accuracy and time frame mentioned in the Unified License. It shall be a part of CDR in the form of longitude and latitude, besides the co-ordinate of the BTS, which is already one of the mandated fields of CDR. To start with, these details will be provided for specified mobile numbers. However, within a period of 3 years from effective date of the Unified License, location details shall be part of CDR for all mobile calls.&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Internet Service&lt;/i&gt;: The Licensee is required to maintain CDR/IPDR for Internet including Internet Telephony Service for a minimum period of one year. The Licensee is also required to maintain log-in/log-out details of all subscribers for services provided such as internet access, e-mail, Internet Telephony, IPTV etc. These logs are to be maintained for a minimum period of one year. For the purpose of interception and monitoring of traffic, the copies of all the packets originating from / terminating into the Customer Premises Equipment (CPE) shall be made available to the Licensor/Security Agencies. Further, the list of Internet Lease Line (ILL) customers is to be placed on a password protected website in the format prescribed in the Unified License.&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lawful Interception and Monitoring (LIM) systems of requisite capacities are to be set up by the Licensees for Internet traffic including Internet telephony traffic through their Internet gateways and /or Internet nodes at their own cost, as per the requirement of the security agencies/Licensor prescribed from time to time. The cost of maintenance of the monitoring equipment and infrastructure at the monitoring centre located at the premises of the licensee shall be borne by the Licensee. In case the Licensee obtains Access spectrum for providing Internet Service / Broadband Wireless Access using the Access Spectrum, the Licensee shall install the required Lawful Interception and Monitoring systems of requisite capacities prior to commencement of service. The Licensee, while providing downstream Internet bandwidth to an Internet Service provider is also required to ensure that all the traffic of downstream ISP passing through the Licensee’s network can be monitored in the network of the Licensee. However, for nodes of Licensee having upstream bandwidth from multiple service providers, the Licensee may be mandated to install LIM/LIS at these nodes, as per the requirement of security agencies. In such cases, upstream service providers may not be required to monitor this bandwidth.&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case the Licensee has multiple nodes/points of presence and has capability to monitor the traffic in all the Routers/switches from a central location, the Licensor may accept to monitor the traffic from the said central monitoring location, provided that the Licensee is able to demonstrate to the Licensor/Security Agencies that all routers / switches are accessible from the central monitoring location. Moreover, the Licensee would have to inform the Licensor of every change that takes place in their topology /configuration, and ensure that such change does not make any routers/switches inaccessible from the central monitoring location. Further, Office space of 10 feet x 10 feet with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the monitoring agencies shall be provided by the Licensee at each Internet Gateway location at its cost.&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;National Long Distance (NLD) Service&lt;/i&gt;: The requisite monitoring facilities are required to be provided by the Licensee as per requirement of Licensor. The details of leased circuit provided by the Licensee is to be provided monthly to security agencies &amp;amp; DDG (TERM) of the Licensed Service Area where the licensee has its registered office.&lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;International Long Distance (ILD) Service&lt;/i&gt;: Office space of 20’x20’ with adequate and uninterrupted power supply and air-conditioning which is physically secured and accessible only to the personnel authorized by the Licensor is required to be provided by the Licensee at each Gateway location free of cost.&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt; The cost of monitoring equipment is to be borne by the Licensee. The installation of the monitoring equipment at the ILD Gateway Station is to be done by the Licensee. After installation of the monitoring equipment, the Licensee shall get the same inspected by monitoring /security agencies. The permission to operate/commission the gateway will be given only after this.&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The designated person of the Central/ State Government, in addition to the Licensor or its nominee, has the right to monitor the telecommunication traffic in every ILD Gateway / Routers or any other technically feasible point in the network set up by the Licensee. The Licensee is required to make arrangement for monitoring simultaneous calls by Government security agencies. For establishing connectivity to Centralized Monitoring System, the Licensee, at its own cost, is required to provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time. In case the security agencies intend to locate the equipment at Licensee’s premises for facilitating monitoring, the Licensee should extend all support in this regard including Space and Entry of the authorized security personnel. The Interface requirements as well as features and facilities as defined by the Licensor should be implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations of monitoring of at least 480 simultaneous calls as per requirement with at least 30 simultaneous calls for each of the designated security/ law enforcement agencies. Each ILD Gateway of the Licensee shall have the capacity for provisioning of at least 5000 numbers for monitoring. Presently there are ten (10) designated security/ law enforcement agencies. The above capacity provisions and number of designated security/ law enforcement agencies may be amended by the Licensor separately by issuing instructions at any time&lt;i&gt;.&lt;/i&gt;&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to provide the call data records of all the specified calls handled by the system at specified periodicity, as and when required by the security agencies in the format prescribed from time to time.&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/i&gt;: The designated Authority of the Central/State Government shall have the right to monitor the telecommunication traffic in every Gateway set up in India. The Licensee shall make arrangement for monitoring of calls as specified in the Unified License.&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hardware/software required for monitoring of calls shall be engineered, provided/installed and maintained by the Licensee at the ICC (Intercept Control Centre) to be established at the GMPCS Gateway(s) as also in the premises of security agencies at Licensee’s cost. The Interface requirements as well as features and facilities shall be worked out and implemented by the Licensee for both data and speech. The Licensee should ensure suitable redundancy in the complete chain of Monitoring equipment for trouble free operations. The Licensee shall provide suitable training to the designated representatives of the Licensor regarding operation and maintenance of Monitoring equipment (ICC &amp;amp; MC). Interception of target subscribers using messaging services should also be provided even if retrieval is carried out using PSTN links. For establishing connectivity to Centralized Monitoring System, the Licensee at its own cost shall provide appropriately dimensioned hardware and bandwidth/dark fibre upto a designated point as required by Licensor from time to time.&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt; The License also has specific obligations to extend monitored calls to designated security agencies as provided in the UL.&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt; Further, the Licensee is required to provide the call data records of all the calls handled by the system at specified periodicity, if and as and when required by the security agencies.&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt; It is the responsibility of the service provider for Global Mobile Personal Communication by Satellite (GMPCS) to provide facility to carry out surveillance of User Terminal activity.&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to make available adequate monitoring facility at the GMPCS Gateway in India to monitor all traffic (traffic originating/terminating in India) passing through the applicable system. For this purpose, the Licensee shall set up at his cost, the requisite interfaces, as well as features and facilities for monitoring of calls by designated agencies as directed by the Licensor from time to time. In addition to the Target Intercept List (TIL), it should also be possible to carry out specific geographic location based interception, if so desired by the designated security agencies. Monitoring of calls should not be perceptible to mobile users either during direct monitoring or when call has been grounded for monitoring. The Licensee shall not prefer any charges for grounding a call for monitoring purposes. The intercepted data is to be pushed to designated Security Agencies’ server on fire and forget basis. No records shall be maintained by the Licensee regarding monitoring activities and air-time used beyond prescribed time limit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee has to ensure that any User Terminal (UT) registered in the gateway of another country shall re-register with Indian Gateway when operating from Indian Territory. Any UT registered outside India, when attempting to make/receive calls from within India, without due authority, shall be automatically denied service by the system and occurrence of such attempts along with information about UT identity as well as location shall be reported to the designated authority immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Licensee is required to have provision to scan operation of subscribers specified by security/ law enforcement agencies through certain sensitive areas within the Indian territory and shall provide their identity and positional location (latitude and longitude) to Licensor on as and when required basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Public Mobile Radio Trunking Service (PMRTS)&lt;/i&gt;: Suitable monitoring equipment prescribed by the Licensor for each type of System used has to be provided by the Licensee at his own cost for monitoring, as and when required.&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/i&gt;: Requisite monitoring facilities/ equipment for each type of system used have to be provided by the Licensee at its own cost for monitoring as and when required by the Licensor.&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; The Licensee shall provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location to be determined by the Licensor.&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Surveillance of MSS-R Service&lt;/i&gt;: The Licensee has to provide at its own cost technical facilities for accessing any port of the switching equipment at the HUB for interception of the messages by the designated authorities at a location as and when required.&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; It is the responsibility of the service provider of INSAT- Mobile Satellite System Reporting (MSS-R) service to provide facility to carry out surveillance of User Terminal activity within a specified area.&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Resale of International Private Leased Circuit (IPLC) Service&lt;/i&gt;: The Licensee has to take IPLC from the licensed ILDOs. The interception and monitoring of Resellers circuits will take place at the Gateway of the ILDO from whom the IPLC has been taken by the Licensee. The provisioning for Lawful Interception &amp;amp; Monitoring of the Resellers’ IPLC shall be done by the ILD Operator and the concerned ILDO shall be responsible for Lawful Interception and Monitoring of the traffic passing through the IPLC. The Resellers shall extend all cooperation in respect of interception and monitoring of its IPLC and shall be responsible for the interception results. The Licensee shall be responsible to interact, correspond and liaise with the licensor and security agencies with regard to security monitoring of the traffic. The Licensee shall, before providing an IPLC to the customer, get the details of services/equipment to be connected on both ends of IPLC, including type of terminals, data rate, actual use of circuit, protocols/interface to be used etc. The Resellers shall permit only such type of service/protocol on the IPLC for which the concerned ILDO has capability of interception and monitoring. The Licensee has to pass on any direct request placed by security agencies on him for interception of the traffic on their IPLC to the concerned ILDOs within two hours for necessary actions.&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. The Information Technology Act, 2000&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000, was amended in a major way in 2008 and is the primary legislation which regulates the interception, monitoring, decryption and collection of traffic information of digital communications in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More specifically, section 69 of the Information Technology Act empowers the central Government and the state governments to issue directions for the monitoring, interception or decryption of any information transmitted, received or stored through a computer resource. Section 69 of the Information Technology Act, 2000 expands the grounds upon which interception can take place as compared to the Indian Telegraph Act, 1885. As such, the interception of communications under Section 69 is carried out in the interest of&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The sovereignty or integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Defence of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Security of the State&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign States&lt;/li&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offense relating to the above&lt;/li&gt;
&lt;li&gt;For the investigation of any offense&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;While the grounds for interception are similar to the Indian Telegraph Act (except for the condition of prevention of incitement of only &lt;i&gt;cognizable&lt;/i&gt; offences and the addition of investigation of any offence) the Information Technology Act does not have the overarching condition that interception can only occur in the case of public emergency or in the interest of public safety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, section 69 of the Act mandates that any person or intermediary who fails to assist the specified agency with the interception, monitoring, decryption or provision of information stored in a computer resource shall be punished with imprisonment for a term which may extend to seven years and shall be liable for a fine.&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69B of the Information Technology Act empowers the Central Government to authorise the monitoring and collection of information and traffic data generated, transmitted, received or stored through any computer resource for the purpose of cyber security. According to this section, any intermediary who intentionally or knowingly fails to provide technical assistance to the authorised agency which is required to monitor and collection information and traffic data shall be punished with an imprisonment which may extend to three years and will also be liable to a fine.&lt;a href="#_ftn121" name="_ftnref121"&gt;[121]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main difference between Section 69 and Section 69B is that the first requires the interception, monitoring and decryption of all information generated, transmitted, received or stored through a computer resource when it is deemed “necessary or expedient” to do so, whereas Section 69B specifically provides a mechanism for all metadata of all communications through a computer resource for the purpose of combating threats to “cyber security”. Directions under Section 69 can be issued by the Secretary to the Ministry of Home Affairs, whereas directions under Section 69B can only be issued by the Secretary of the Department of Information Technology under the Union Ministry of Communications and Information Technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overlap with the Telegraph Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Thus while the Telegraph Act only allows for interception of messages or class of messages transmitted by a telegraph, the Information Technology Act enables interception of any information being transmitted or stored in a computer resource. Since a “computer resource” is defined to include a communication device (such as cellphones and PDAs) there is a overlap between the provisions of the Information Technology Act and the Telegraph Act concerning the provisions of interception of information sent through mobile phones. This is further complicated by the fact that the UAS License specifically states that it is governed by the provisions of the Indian Telegraph Act, the Indian Wireless Telegraphy Act and the Telecom Regulatory Authority of India Act, but does not mention the Information Technology Act.&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; This does not mean that the Licensees under the Telecom Licenses are not bound by any other laws of India (including the Information Technology Act) but it is just an invitation to unnecessary complexities and confusions with regard to a very serious issue such as interception. This situation has thankfully been remedied by the Unified License (UL) which, although issued under section of 4 of the Telegraph Act, also references the Information Technology Act thus providing essential clarity with respect to the applicability of the Information Technology Act to the License Agreement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of internet communications is mainly covered by the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009under the Information Technology Act (the “&lt;b&gt;IT Interception Rules&lt;/b&gt;”). In particular, the rules framed under Section 69 and 69B include safeguards stipulating to who may issue directions of interception and monitoring, how such directions are to be executed, the duration they remain in operation, to whom data may be disclosed, confidentiality obligations of intermediaries, periodic oversight of interception directions by a Review Committee under the Indian Telegraph Act, the retention of records of interception by intermediaries and to the mandatory destruction of information in appropriate cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the IT Interception Rules, only the competent authority can issue an order for the interception, monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub-section (2) of section 69 of the Information Technology Act.&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt; At the State and Union Territory level, the State Secretaries respectively in charge of the Home Departments are designated as “competent authorities” to issue interception directions.&lt;a href="#_ftn124" name="_ftnref124"&gt;[124]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;In unavoidable circumstances the Joint Secretary to the Government of India, when so authorised by the Competent Authority, may issue an order. Interception may also be carried out with the prior approval of the Head or the second senior most officer of the authorised security agency at the Central Level and at the State Level with the approval of officers authorised in this behalf not below the rank of Inspector General of Police, in the belowmentioned emergent cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource is not feasible,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;however, in the above circumstances the officer would have to inform the competent authority in writing within three working days about the emergency and of the interception, monitoring or decryption and obtain the approval of the competent authority within a period of seven working days. If the approval of the competent authority is not obtained within the said period of seven working days, such interception or monitoring or decryption shall cease and the information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the competent authority.&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt; If a state wishes to intercept information that is beyond its jurisdiction, it must request permission to issue the direction from the Secretary in the Ministry of Home Affairs.&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the risk of unauthorised interception, the IT Interception Rules provide for the following safeguards:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;If authorised by the competent authority, any agency of the government may intercept, monitor, or decrypt information transmitted, received, or stored in any computer resource only for the purposes specified in section 69(1) of the IT Act.&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The IT Interception Rules further provide that the competent authority may give any decryption direction to the decryption key holder.&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The officer issuing an order for interception is required to issue requests in writing to designated nodal officers of the service provider.&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Any direction issued by the competent authority must contain the reasons for direction, and must be forwarded to the review committee seven days after being issued.&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In the case of issuing or approving an interception order, in arriving at its decision the competent authority must consider all alternate means of acquiring the information.&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The order must relate to information sent or likely to be sent from one or more particular computer resources to another (or many) computer resources.&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The reasons for ordering interceptions must be recorded in writing, and must specify the name and designation of the officer to whom the information obtained is to be disclosed, and also specify the uses to which the information is to be put.&lt;a href="#_ftn133" name="_ftnref133"&gt;[133]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The directions for interception will remain in force for a period of 60 days, unless renewed. If the orders are renewed they cannot be in force for longer than 180 days.&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Authorized agencies are prohibited from using or disclosing contents of intercepted communications for any purpose other than investigation, but they are permitted to share the contents with other security agencies for the purpose of investigation or in judicial proceedings. Furthermore, security agencies at the union territory and state level will share any information obtained by following interception orders with any security agency at the centre.&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;All records, including electronic records pertaining to interception are to be destroyed by the government agency “every six months, except in cases where such information is required or likely to be required for functional purposes”.&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted, monitored, or decrypted information will not be used or disclosed by any agency, competent authority, or nodal officer for any purpose other than its intended purpose.&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The agency authorised by the Secretary of Home Affairs is required to appoint a nodal officer (not below the rank of superintendent of police or equivalent) to authenticate and send directions to service providers or decryption key holders.&lt;a href="#_ftn138" name="_ftnref138"&gt;[138]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The IT Interception Rules also place the following obligations on the service providers:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In addition, all records pertaining to directions for interception and monitoring are to be destroyed by the service provider within a period of two months following discontinuance of interception or monitoring, unless they are required for any ongoing investigation or legal proceedings.&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Upon receiving an order for interception, service providers are required to provide all facilities, co-operation, and assistance for interception, monitoring, and decryption. This includes assisting with: the installation of the authorised agency's equipment, the maintenance, testing, or use of such equipment, the removal of such equipment, and any action required for accessing stored information under the direction.&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, decryption key holders are required to disclose the decryption key and provide assistance in decrypting information for authorized agencies.&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Every fifteen days the officers designated by the intermediaries are required to forward to the nodal officer in charge a list of interceptions orders received by them. The list must include the details such as reference and date of orders of the competent authority.&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The service provider is required to put in place adequate internal checks to ensure that unauthorised interception does not take place, and to ensure the extreme secrecy of intercepted information is maintained.&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The contents of intercepted communications are not allowed to be disclosed or used by any person other than the intended recipient.&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Additionally, the service provider is required to put in place internal checks to ensure that unauthorized interception of information does not take place and extreme secrecy is maintained. This includes ensuring that the interception and related information are handled only by the designated officers of the service provider.&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, under section 69B of the Information Technology Act, stipulate that directions for the monitoring and collection of traffic data or information can be issued by an order made by the competent authority&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt; for any or all of the following purposes related to cyber security:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;forecasting of imminent cyber incidents;&lt;/li&gt;
&lt;li&gt;monitoring network application with traffic data or information on computer resource;&lt;/li&gt;
&lt;li&gt;identification and determination of viruses or computer contaminant;&lt;/li&gt;
&lt;li&gt;tracking cyber security breaches or cyber security incidents;&lt;/li&gt;
&lt;li&gt;tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/li&gt;
&lt;li&gt;identifying or tracking any person who has breached, or is suspected of having breached or likely to breach cyber security;&lt;/li&gt;
&lt;li&gt;undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/li&gt;
&lt;li&gt;accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/li&gt;
&lt;li&gt;any other matter relating to cyber security.&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;According to these Rules, any direction issued by the competent authority should contain reasons for such direction and a copy of such direction should be forwarded to the Review Committee within a period of seven working days.&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt; Furthermore, these Rules state that the Review Committee shall meet at least once in two months and record its finding on whether the issued directions are in accordance with the provisions of sub-section (3) of section 69B of the Act. If the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue an order for the destruction of the copies, including corresponding electronic record of the monitored or collected traffic data or information.&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information Technology (Guidelines for Cyber Cafes) Rules, 2011&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (Guidelines for Cyber Cafes) Rules, 2011, were issued under powers granted under section 87(2), read with section 79(2) of the Information Technology Act, 2000.&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; These rules require cyber cafes in India to store and maintain backup logs for each login by any user, to retain such records for a year and to ensure that the log is not tampered. Rule 7 requires the inspection of cyber cafes to determine that the information provided during registration is accurate and remains updated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. The Indian Post Office Act, 1898&lt;/b&gt;&lt;br /&gt;Section 26 of the Indian Post Office Act, 1898, empowers the Central Government and the State Governments to intercept postal articles.&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt; In particular, section 26 of the Indian Post Office Act, 1898, states that on the occurrence of any public emergency or in the interest of public safety or tranquility, the Central Government, State Government or any officer specially authorised by the Central or State Government may direct the interception, detention or disposal of any postal article, class or description of postal articles in the course of transmission by post. Furthermore, section 26 states that if any doubt arises regarding the existence of public emergency, public safety or tranquility then a certificate to that effect by the Central Government or a State Government would be considered as conclusive proof of such condition being satisfied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to this section, the Central Government and the State Governments of India can intercept postal articles if it is deemed to be in the instance of a 'public emergency' or for 'public safety or tranquility'. However, the Indian Post Office Act, 1898, does not cover electronic communications and does not mandate their interception, which is covered by the Information Technology Act, 2000 and the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. The Indian Wireless Telegraphy Act, 1933&lt;/b&gt;&lt;br /&gt;The Indian Wireless Telegraphy Act was passed to regulate and govern the possession of wireless telegraphy equipment within the territory of India. This Act essentially provides that no person can own “wireless telegraphy apparatus”&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt; except with a license provided under this Act and must use the equipment in accordance with the terms provided in the license.&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major sources of revenue for the Indian State Broadcasting Service was revenue from the licence fee from working of wireless apparatus under the Indian Telegraph Act, 1885.The Indian State Broadcasting Service was losing revenue due to lack of legislation for prosecuting persons using unlicensed wireless apparatus as it was difficult to trace them at the first place and then prove that such instrument has been installed, worked and maintained without licence. Therefore, the current legislation was proposed, in order to prohibit possession of wireless telegraphy apparatus without licence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presently the Act is used to prosecute cases, related to illegal possession and transmission via satellite phones. Any person who wishes to use satellite phones for communication purposes has to get licence from the Department of Telecommunications.&lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. The Code of Criminal Procedure&lt;/b&gt;&lt;br /&gt;Section 91 of the Code of Criminal Procedure regulates targeted surveillance. In particular, section 91 states that a Court in India or any officer in charge of a police station may summon a person to produce any document or any other thing that is necessary for the purposes of any investigation, inquiry, trial or other proceeding under the Code of Criminal Procedure.&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt; Under section 91, law enforcement agencies in India could theoretically access stored data. Additionally, section 92 of the Code of Criminal Procedure regulates the interception of a document, parcel or thing in the possession of a postal or telegraph authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further section 356(1) of the Code of Criminal Procedure provides that in certain cases the Courts have the power to direct repeat offenders convicted under certain provisions, to notify his residence and any change of, or absence from, such residence after release for a term not exceeding five years from the date of the expiration of the second sentence.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy Suggestions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to avoid the different standards being adopted for different aspects of surveillance and in different parts of the country, there should be one single policy document or surveillance and interception manual which should contain the rules and regulations regarding all kinds of surveillance. This would not only help in identifying problems in the law but may also be useful in streamlining the entire surveillance regime. However it is easier said than done and requires a mammoth effort at the legislative stage. This is because under the Constitutional scheme of India law and order is a State subject and the police machinery in every State is under the authority of the State government. Therefore it would not be possible to issue a single legislation dealing with all aspects of surveillance since the States are independent in their powers to deal with the police machinery.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even when we look at the issue of interception, certain state legislations especially the ones dealing with organized crime and bootleggers such as the Maharashtra Control of Organized Crime Act, 1999, the Andhra Pradesh Control of Organized Crime Act, 2001, also deal with the issue of interception and contain provisions empowering the state government to intercept communications for the purpose of using it to investigate or prevent criminal activities. Further even the two central level legislations that deal with interception, &lt;i&gt;viz.&lt;/i&gt; the Telegraph Act and the Information Technology Act, specifically empower the State governments also to intercept communications on the same grounds as the Central Government. Since interception of communications is mostly undertaken by security and law enforcement agencies, broadly for the maintenance of law and order, State governments cannot be prevented from issuing their own legislations to deal with interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the abovementioned legal and constitutional complexities the major problem in achieving harmonization is to get both the Central and State governments on to the same page. Even if the Central government amends the Telegraph Act and the IT Act to bring them in line with each other, the State governments will still be free to do whatever they please. Therefore it seems the best approach in order to achieve harmonization may be to have a two pronged strategy, i.e. (i) issue a National Surveillance Policy covering both interception and general surveillance; and (ii) amend the central legislations i.e. the Telegraph Act and the Information Technology Act in accordance with the National Surveillance Policy. Once a National Surveillance Policy, based on scientific data and the latest theories on criminology is issued, it is hoped that State governments will themselves like to adopt the principles enshrined therein and amend their own legislations dealing with interception to fall in line with the National Surveillance Policy.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Section 6(2)(b) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Section 191 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Section 200 (D) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Section 2011 (I) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 201 (II) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 201 (IV) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Section 193 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Surjan Das &amp;amp; Basudeb Chattopadhyay, &lt;i&gt;Rural Crime in Police Perception&lt;/i&gt;: &lt;i&gt;A Study of Village Crime Note Books&lt;/i&gt;, 26(3) Economic and Political Weekly 129, 129 (1991).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Section 201 (III) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 201 (V) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 201 (VII) of the Model Police Manual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Section 356(1) of the Criminal Procedure Code states as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;356. Order for notifying address of previously convicted offender.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) When any person, having been convicted by a Court in India of an offence punishable under section 215, section 489A, section 489B, section 489C or section 489D of the Indian Penal Code, (45 of 1860 ) or of any offence punishable under Chapter XII or Chapter XVII of that Code, with imprisonment for a term of three years or upwards, is again convicted of any offence punishable under any of those sections or Chapters with imprisonment for a term of three years or upwards by any Court other than that of a Magistrate of the second class, such Court may, if it thinks fit, at the time of passing a sentence of imprisonment on such person, also order that his residence and any change of, or absence from, such residence after release be notified as hereinafter provided for a term not exceeding five years from the date of the expiration of such sentence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; The Indian Telegraph Act, 1885, &lt;a href="http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf"&gt;http://www.ijlt.in/pdffiles/Indian-Telegraph-Act-1885.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Privacy International, Report: &lt;i&gt;“India”, &lt;/i&gt;Chapter 3: “Surveillance Policies”, &lt;a href="https://www.privacyinternational.org/reports/india/iii-surveillance-policies"&gt;https://www.privacyinternational.org/reports/india/iii-surveillance-policies&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Rule 419A(1), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Rule 419A(2), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Rule 419A(3), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Rule 419A(4), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Rule 419A(5), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Rule 419A(6), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Rule 419A(7), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Rule 419A(8), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Rule 419A(9), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Rule 419A(18), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt;&lt;i&gt; Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; Rule 419A(10), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Rule 419A(11), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; Rule 419A(12), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Rule 419A(13), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Rule 419A(14), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Rule 419A(15), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Rule 419A(19), Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Section 46 of the Unlawful Activities Prevention Act, 1967. The Unlawful Activities (Prevention) Act, 1967 has certain additional safeguards such as not allowing intercepted information to be disclosed or received in evidence unless the accused has been provided with a copy of the same atleast 10 days in advance, unless the period of 10 days is specifically waived by the judge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; State owned Public Sector Undertakings (PSUs) (Mahanager Telephone Nigam Limited (MTNL) and Bharat Sanchar Nigam Limited (BSNL)) were issued licenses for provision of CMTS as third operator in various parts of the country. Further, 17 fresh licenses were issued to private companies as fourth cellular operator in September/ October, 2001, one each in 4 Metro cities and 13 Telecom Circles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Section 45.2 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Section 41.09 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Section 44.4 of the CMTS License. Similar provision exists in section 44.11 of the CMTS License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Section 34.28 (xix) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Section 34.12 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Section 34.13 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Section 34.22 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Section 34.6 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Section 34.15 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Section 34.28 (xiv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Section 34.28 (xi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Section 34.14 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Section 34.28 (ix)&amp;amp;(x) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Section 30.1 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Section 33.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Section 34.4 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Section 34.7 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Section 34.9 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; Section 34.27 (a)(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; Section 34.27(a)(ii-vi) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Section 32.1, 32.2 (i)(ii), 32.3 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Section 34.8 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; Section 34.18 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; Section 34.28 (xv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; Section 41.10 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Section 41.19(i) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; Section 41.19(ii) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; Section 41.19(iv) of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; Section 39.1 of the UASL. Similar provision is contained in section 41.4, 41.12 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; Section 39.3 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Section 39.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Section 23.2 of the UASL. Similar provisions are contained in section 41.7 of the UASL regarding provision of monitoring equipment for monitoring in the “interest of security”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; Section 42.2 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Section 41.20(xx) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Section 41.10 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; Section 41.14 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; Section 41.16 of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Section 41.20(ix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Section 41.19(ii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; Section 41.20(xii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; Section 41.20(xiii) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; Section 41.20(xiv) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; Section 41.20 (xix) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Section 41.20(xvi) of the UASL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; The different services covered by the Unified License are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Unified License (All Services)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Access Service (Service Area-wise)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Internet Service (Category-A with All India jurisdiction)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Internet Service (Category-B with jurisdiction in a Service Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e. Internet Service (Category-C with jurisdiction in a Secondary Switching Area)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f. National Long Distance (NLD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g. International Long Distance (ILD) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;h. Global Mobile Personal Communication by Satellite (GMPCS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Public Mobile Radio Trunking Service (PMRTS) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;j. Very Small Aperture Terminal (VSAT) Closed User Group (CUG) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;k. INSAT MSS-Reporting (MSS-R) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;l. Resale of International private Leased Circuit (IPLC) Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Authorisation for Unified License (All Services) would however cover all services listed at para 2(ii) (b) in all service areas, 2 (ii) (c), 2(ii) (f) to 2(ii) (l) above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; Chapter IV, Para 23.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; Chapter VI, Para 40.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; Chapter V, Para 37.1 of the UL. Similar provision is contained in Chapter VI, Para 39.4,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Chapter V, Para 37.5 of the UL/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Chapter V, Para 37.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Chapter V, Para 37.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Chapter VI, Para 39.23(xii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; Chapter VI, Para 39.23 (xiii) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; Chapter VI, Para 39.23 (xiv) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; Chapter VI, Para 39.23 (xix) of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; Chapter VIII, Para 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; Chapter VIII, Para 8.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; Chapter VIII, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; Chapter IX, Paras 7.1 to 7.3 of the UL. Further obligations have also been imposed on the Licensee to ensure that its ILL customers maintain the usage of IP addresses/Network Address Translation (NAT) syslog, in case of multiple users on the same ILL, for a minimum period of one year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; Chapter IX, Paras 8.1 to 8.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; Chapter IX, Paras 8.4 and 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Chapter X, Para 5.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Chapter XI, Para 6.3 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; Chapter XI, Para 6.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Chapter XI, Para 6.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; Chapter XI, Para 6.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; Chapter XII, Para 7.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; Chapter XII, Para 7.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Chapter XII, Para 7.6 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Chapter XII, Para 7.7 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Chapter XII, Para 7.8 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; Chapter XIII, Para 7.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; Chapter XIV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; Chapter XIV, Para 8.2 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; Chapter XV, Para 8.1 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Chapter XV, Para 8.5 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Chapter XVI, Paras 4.1 - 4.4 of the UL.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 69 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt;&lt;i&gt; Ibid&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; Section 69B of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Section 32 of the ISP License.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; Rule 2(d), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Rule 3, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; Rule 6, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Rule 4, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Rule 5, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Rule 7, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Rule 8, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Rule 9, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Rule 10, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; Rule 11, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Rule 25(2)&amp;amp;(6), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Rule 23, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; Rule 12, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; Rule 23(2), Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; Rule 19, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; Rule 17, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; Rule 18, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; Rule 20&amp;amp; 21, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Rule 25, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; Rule 20, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Rule 3(1) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; Rule 3(2) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; Rule 3(3) of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; Rules 7 of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Introduction to the Information Technology (Guidelines for Cyber Cafe) Rules, 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; The Indian Post Office Act, 1898, &lt;a href="http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf"&gt;http://www.indiapost.gov.in/Pdf/Manuals/TheIndianPostOfficeAct1898.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; The expression “wireless telegraphy apparatus” has been defined as “any apparatus, appliance, instrument or material used or capable of use in wireless communication, and includes any article determined by rule made under Sec. 10 to be wireless telegraphy apparatus, but does not include any such apparatus, appliance, instrument or material commonly used for other electrical purposes, unless it has been specially designed or adapted for wireless communication or forms part of some apparatus, appliance, instrument or material specially so designed or adapted, nor any article determined by rule made under Section 10 not to be wireless telegraphy apparatus;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; Section 4, Wireless Telegraphy Act, 1933.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Snehashish Ghosh, Indian Wireless Telegraphy Act, 1933, &lt;a href="http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act"&gt;http://cis-india.org/telecom/resources/indian-wireless-telegraphy-act&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; The Code of Criminal Procedure, 1973, Section 91, &lt;a href="http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf"&gt;http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india'&gt;https://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-03T15:27:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2015-bulletin">
    <title>July 2015 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2015-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of July is below:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We are happy to share with you the seventh issue of the Centre for Internet and Society (CIS) newsletter (July 2015). The past editions of the newsletter can be accessed at &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;ul&gt;
&lt;li&gt;NVDA team &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-e-speak-marathi"&gt;conducted a training at SIES College, Sion, Mumbai&lt;/a&gt;. Thirty-four delegates attended the training programme.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A training workshop was held at &lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt;Anne Jane Askwith Higher Secondary School&lt;/a&gt; for the Visually Impaired, Palayamkottai, Tirunelveli by NVDA team. Sixteen delegates participated in this.&lt;/li&gt;
&lt;li&gt;Konkani Wikipedia is the second Wikimedia project after Odia Wikisource that has gone live out of incubation. The project stayed in   the incubation for nine long years and the community has gone through a long debate to have a Wikipedia of their own. Subhashish Panigrahi has &lt;a href="http://cis-india.org/openness/blog/konkani-wikipedia-goes-live"&gt;blogged on this highlighting the three Konkani Wikimedians&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The 30&lt;sup&gt;th&lt;/sup&gt; Session of the WIPO Standing Committee on Copyrights and Related Rights was held in Geneva from June 29 to July 3.   Nehaa Chaudhari prepared a statement about the negotiations on the &lt;a href="http://cis-india.org/a2k/blogs/statement-by-the-centre-for-internet-and-society-india-on-the-broadcast-treaty-at-sccr-30"&gt;Proposed Treaty for Broadcasting Organisations&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Sumandro Chattapadhyay &lt;a href="http://cis-india.org/internet-governance/blog/hindustan-times-july-15-2015-sumandro-chattapadhyay-iron-out-contradictions-in-the-digital-india-programme"&gt;wrote an article in the Hindustan Times&lt;/a&gt; about India’s “Digital India” initiative to develop communication   infrastructure, government information systems, and general capacity to   digitise public life in India.&lt;/li&gt;
&lt;li&gt;CIS published the &lt;a href="http://cis-india.org/internet-governance/blog/technology-business-incubators"&gt;first draft of its analysis on technology business incubators&lt;/a&gt; ("TBI") in India. The report prepared by Sunil Abraham, Vidushi Marda, Udbhav Tiwari and Anumeha Karnatak looks at operating procedures,   success stories and lessons that can be learnt from TBIs in India.&lt;/li&gt;
&lt;li&gt;Pranesh Prakash did a &lt;a href="http://cis-india.org/internet-governance/blog/clearing-misconceptions-dot-panel-net-neutrality"&gt;brief analysis&lt;/a&gt; about the Department of Telecommunications Panel Report on Net Neutrality.&lt;/li&gt;
&lt;li&gt;CIS has participated in the Expert Committee for DNA Profiling   constituted by the Department of Biotechnology in 2012 for the purpose   of deliberating on and finalizing the draft Human DNA Profiling Bill and   appreciates this opportunity. &lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;CIS has prepared a dissent note to the Expert Committee on DNA Profiling&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;In the last few decades, all major common law jurisdictions have   decriminalised non-procreative sex – oral and anal sex (sodomy) – to   allow private, consensual, and non-commercial homosexual intercourse.   Bhairav Acharya &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality"&gt;brought out the developments from across the world in a blog entry&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia, CIS conducted interviews with a &lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous"&gt;Tibetan security researcher and information activist&lt;/a&gt; and &lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"&gt;Shantanu Ghosh, Managing Director, Symantec Product Operations, India&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;CIS, the Observer Research Foundation, the Internet Policy   Observatory, the Centre for Global Communication Studies and the   Annenberg School for Communication, University of Pennsylvania had   organized a conference in April in New Delhi. The findings have been   condensed in a report titled “&lt;a href="http://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age"&gt;Effective research, policy formulation, and the development of regulatory frameworks in South Asia&lt;/a&gt;”.&lt;/li&gt;
&lt;li&gt;Pranesh Prakash in a research paper titled &lt;a href="http://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality"&gt;Regulatory Perspectives on Net Neutrality&lt;/a&gt; gives an overview on why India needs to put in place net neutrality   regulations, and the form that those regulations must take to avoid   being over-regulation.&lt;/li&gt;
&lt;li&gt;Rakshanda Deka undertook an analysis &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"&gt;on the anti-spam laws in different jurisdictions&lt;/a&gt;.   This analysis is a part of a larger attempt at formulating a model   anti-spam law for India by analysing the existing spam laws across the   world.&lt;/li&gt;
&lt;li style="text-align: left; "&gt;As part of the 'Studying Internets in India' series, RAW has published blog entries on &lt;a href="http://cis-india.org/raw/blog_whatsapp-and-the-creation-of-a-transnational-sociality"&gt;WhatsApp and the Creation of a Transnational Sociality&lt;/a&gt;; &lt;a href="http://cis-india.org/raw/blog_users-and-the-internet"&gt;Users and the Internet&lt;/a&gt;; &lt;a href="http://cis-india.org/raw/blog_effective-activism"&gt;Effective Activism: The Internet, Social Media, and Hierarchical Activism in New Delhi&lt;/a&gt;; &lt;a href="http://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights"&gt;Studying the Internet Discourse in India through the Prism of Human Rights&lt;/a&gt;; and &lt;a href="http://cis-india.org/raw/blog_understanding-tagores-music-on-youtube"&gt;'Originality,' 'Authenticity,' and 'Experimentation': Understanding Tagore’s Music on YouTube&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The National Optic Fibre Network, a part of the Government's Digital    India Initiative, has been in the news since the recent Expert    Committee Report. Aditya Garg in a blog entry &lt;a class="external-link" href="http://cis-india.org/telecom/blog/funding-of-national-optic-fibre-network-who-is-accountable"&gt;examined the accountability of the funding of the project&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the &lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed &lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Updates&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/july-2015-report.pdf"&gt;July 2015 Report&lt;/a&gt; (Suman Dogra; July 31, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The training programmes were held in June and the reports were published in July&lt;/i&gt;:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-using-espeak-tamil-with-nvda-training-tirunelveli"&gt;Tamil Computing with NVDA Training Workshop&lt;/a&gt; (Organized by NVDA team: Anne Jane Ask with Higher Secondary School for the Visually Impaired, Palayamkottai, Tirunelveli; June 3 – 7, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/accessibility/blog/report-on-training-in-e-speak-marathi"&gt;Training in eSpeak Marathi&lt;/a&gt; (Organized by NVDA team; SIES College, Sion, Mumbai; June 28, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission / Comment&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/a2k/blogs/statement-by-the-centre-for-internet-and-society-india-on-the-broadcast-treaty-at-sccr-30"&gt;Statement by the Centre for Internet and Society on the Broadcast Treaty at SCCR 30&lt;/a&gt; (Nehaa Chaudhari; July 2, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/reading-devanagri-konkani-wikipedia-in-kannada-script"&gt;Reading Devanagari Script based sites like Konkani Wikipedia in Kannada Script&lt;/a&gt; (Dr. U.B. Pavanaja; July 13, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/konkani-wikipedia-goes-live"&gt;Konkani Wikipedia Goes Live After 'Nine Years' of Incubation&lt;/a&gt; (Subhashish Panigrahi; July 18, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Christ University Undergraduate Programme (Organized by CIS-A2K; Bangalore; July 1 - 8, 2015). Students were initiated into the Wikimedia activities with hands on sessions of typing on Wikisource. Faculty of the Christ University helped the A2K team in deciding on the texts that were to be typed. These texts will provide much needed impetus for Wikisource related activities in Indian Languages. Wikipedia Education Programme at Christ University received support from Ravishankar.A of the Tamil Wikimedia community and Sayant Mahato from Sanskrit Wikimedia community.&lt;/li&gt;
&lt;li&gt;Aloysius College (Organized by CIS-A2K; Mangalore; July 1 – 4, 2015). Tulu and Kannada Wikipedia workshops were conducted in St. Aloysis College, Mangalore. Tulu Wikipedia is in Incubator and a small community is growing in Mangalore. Pavanaja U.B. and Rahmanuddin Shaik participated in this events.&lt;/li&gt;
&lt;li&gt;Media Wiki Train the Trainer Program (Organized by CIS-A2K; Bangalore; June 24 – 27, 2015): A four-day long train-the-trainer program aimed at building leadership among technical contributors to Indic language Wikimedians in the areas of bugs, bots--Pywikipedia and Auto Wiki Browser, various MediaWiki tools, and translations. Ravishankar A. from Wikimedia India, MediaWiki developers Pavithra H., Yogesh Omshivaprakash H.L. and Harsh Kothari, and Tamil Wikimedian Dineshkumar Ponnusamy provided support for the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="https://wikimania2015.wikimedia.org/wiki/Wikimania"&gt;Wikimania 2015&lt;/a&gt; (Organized by Wikimedia Foundation; Mexico City; July 15 - 19, 2015): A whole day was dedicated for evaluation of strategies and activities by various major stakeholders of the Wikimedia movement. Community members who lead major activities, Wikimedia chapters, affiliate organizations and Wikimedia Foundation itself took part in the discussions. There were several group activities, exchange of ideas focused on project and community level outreach and other activities, tools and techniques, and best practices. Subhashish Panigrahi participated in this event and gave a talk on &lt;a href="https://commons.wikimedia.org/wiki/File:How_to_do_Guerrilla_GLAM_-_presentation_in_Wikimania_2015,_Mexico_City.pdf"&gt;How to do Guerrilla GLAM&lt;/a&gt;. Subhashish Panigrahi was a panelist along with Rohini Lakshané in the session “&lt;a href="https://wikimania2015.wikimedia.org/wiki/Submissions/Edit-a-thons_for_bridging_the_gender_gap_on_Wikimedia"&gt;Edit-a-thons for Bridging the Gender Gap on Wikimedia: A Panel Discussion&lt;/a&gt;”. An Indic Meet-up was also organized. Wikimedians from India, Bangladesh and Nepal representing various language communities, Wikimedia India, Wikimedia Bangladesh, Wikimedia Nepal, and Access to Knowledge (CIS-A2K) gathered to discuss about various challenges, cross-community collaborative projects, organizing larger events, and strategies to grow the Wikimedia movement in South Asia.&lt;/li&gt;
&lt;li&gt;Classical Languages in the Digital Era Conference (Organized by Central Institute of Indian Languages, Mysore; July 17, 2015) Tanveer Hasan participated in this conference aimed at discussing about the future of Indian classical languages in the digital era. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/the-times-of-india-july-5-2015-not-many-contributors-for-kannada-centric-wiki-page"&gt;Not many contributors for Kannada-centric Wiki page&lt;/a&gt; (The Times of India, July 5, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/indian-express-july-5-2015-upload-more-kannada-articles-on-wikipedia"&gt;Upload More Kannada Articles on Wikipedia&lt;/a&gt; (Indian Express, July 5, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/kannada-wikipedia-workshop-july-4-2015-coverage-in-udayavani"&gt;Kannada Wikipedia Workshop in Mangaluru&lt;/a&gt; (Udayavani; July 5, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/openness/news/kannada-wikipedia-workshop-july-5-2015-coverage-in-prajavani"&gt;Kannada Wikipedia Workshop in Mangaluru&lt;/a&gt; (Prajavani; July 5, 2015)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Staff Movement&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;Tito Dutta, Luis Gomes and Abhinav Garule have joined the CIS-A2K team as Programme Associates from March this year. Tito is working for internal documentation and resource building, and Luis and Abhinav are implementing the Konkani and Marathi work plan respectively along with community liaison.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its research on privacy and free speech, CIS is engaged with two different projects. The first one (under a grant from Privacy International and International Development Research Centre (IDRC)) is on surveillance and freedom of expression (SAFEGUARDS). The second one (under a grant from MacArthur Foundation) is on studying the restrictions placed on freedom of expression online by the Indian government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality"&gt;Regulatory Perspectives on Net Neutrality&lt;/a&gt; (Pranesh Prakash; July 8, 2015). Vidushi Marda and Tarun Krishnakumar assisted Pranesh Prakash in this.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation"&gt;Free Speech Policy in India: Community, Custom, Censorship, and the Future of Internet Regulation&lt;/a&gt; (Bhairav Acharya; July 13, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage"&gt;Net Neutrality and the Law of Common Carriage&lt;/a&gt; (Bhairav Acharya; July 14, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age"&gt;Freedom of Expression in a Digital Age&lt;/a&gt; (Geetha Hariharan and Jyoti Panday; July 14, 2015). CIS, the Observer Research Foundation, the Internet Policy Observatory, the Centre for Global Communication Studies and the Annenberg School for Communication, University of Pennsylvania organized this conference on April 21, 2015 in New Delhi. Elonnai Hickok edited the report.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/clearing-misconceptions-dot-panel-net-neutrality"&gt;Clearing Misconceptions: What the DoT Panel Report on Net Neutrality Says&lt;/a&gt; (and Doesn't) (Pranesh Prakash; July 21, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/role-of-intermediaries-in-counting-online-abuse"&gt;Role of Intermediaries in Countering Online Abuse&lt;/a&gt; (Jyoti Panday; July 31, 2015). This got published as two blog entries in the NALSAR Law Tech Blog. Part 1 can be accessed &lt;a href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-i/"&gt;here&lt;/a&gt; and Part 2 &lt;a href="https://techlawforum.wordpress.com/2015/06/30/role-of-intermediaries-in-countering-online-abuse-still-a-work-in-progress-part-ii/"&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india"&gt;A Public Discussion on Criminal Defamation in India&lt;/a&gt; (Organized by CIS, the Network of Women in Media, India; and Media Watch; Bangalore; July 29, 2015). The event was a public discussion about the continued criminalisation of defamation in India.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/round-table-discussion-on-whois"&gt;Roundtable discussion on WHOIS&lt;/a&gt; (Organized by Department of Electronics &amp;amp; Information Technology (DeitY), Govt. of India; July 28, 2015; New Delhi). Sunil Abraham and Vidushi Marda participated in the discussion remotely. Aditya Garg attended in person.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/anti-spam-laws-in-different-jurisdictions"&gt;Anti-Spam Laws in Different Jurisdictions: A Comparative Analysis&lt;/a&gt; (Rakshanda Deka; July 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;A Dissent Note to the Expert Committee for DNA Profiling&lt;/a&gt; (Elonnai Hickok; July 17, 2015). Click for &lt;a href="http://cis-india.org/internet-governance/blog/dna-bill-functions.pdf"&gt;DNA Bill Functions&lt;/a&gt;, &lt;a href="http://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf"&gt;DNA List of Offences&lt;/a&gt;, and &lt;a href="http://cis-india.org/internet-governance/blog/cis-note-on-dna-bill.pdf"&gt;CIS Note on DNA Bill&lt;/a&gt;. A modified version was published by &lt;a href="http://bangalore.citizenmatters.in/articles/dna-bill-problems-issues-inputs-from-bangalore"&gt;Citizen Matters Bangalore&lt;/a&gt; on July 28.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality"&gt;Privacy, Autonomy, and Sexual Choice: The Common Law Recognition of Homosexuality&lt;/a&gt; (Bhairav Acharya; July 18, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt;Aadhaar Number vs the Social Security Number&lt;/a&gt; (Elonnai Hickok; July 21, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/best-practices-meet-2015"&gt;7th Best Practices Meet 2015&lt;/a&gt; (Organized by Data Security Council of India; Bangalore; July 9 – 10, 2015). Sunil Abraham was a panelist in the session "Architecting Security for transformation to Digital India". Elonnai Hickok was a panelist in the session "Steering privacy in the age of extreme innovation technology &amp;amp; business models."&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Security&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Videos&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous"&gt;Cyber Security Series Part 23&lt;/a&gt; (Purba Sarkar; July 13, 2015). CIS interviews a Tibetan security researcher and information activist.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"&gt;Cyber Security Series Part 24&lt;/a&gt; (Purba Sarkar; July 15, 2015). CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Miscellaneous&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/hindustan-times-july-15-2015-sumandro-chattapadhyay-iron-out-contradictions-in-the-digital-india-programme"&gt;Iron out contradictions in the Digital India programme&lt;/a&gt; (Sumandro Chattapadhyay; Hindustan Times; July 28, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Paper&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/technology-business-incubators"&gt;First draft of Technology Business Incubators: An Indian Perspective and Implementation Guidance Report&lt;/a&gt; (Sunil Abraham, Vidushi Marda, Udbhav Tiwari and Anumeha Karnatak; July 25, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS  is involved in promoting access and accessibility to telecommunications  services and resources and has provided inputs to ongoing policy  discussions and consultation papers published by TRAI. It has prepared  reports on unlicensed spectrum and accessibility of mobile phones for  persons with disabilities and also works with the USOF to include  funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Op-ed&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/business-standard-op-ed-july-2-2015-shyam-ponappa-centrality-of-cash-flows"&gt;The Centrality of Cash Flows&lt;/a&gt; (Shyam Ponappa; Business Standard; July 1, 2015 and Organizing India Blogspot; July 2, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/telecom/blog/funding-of-national-optic-fibre-network-who-is-accountable"&gt;Funding of National Optic Fibre Network (NOFN) - Who's Accountable?&lt;/a&gt; (Aditya Garg; July 17, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/raw"&gt;Researchers at Work&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Researchers at Work (RAW) programme is an interdisciplinary research initiative driven by contemporary concerns to understand the reconfigurations of social practices and structures through the Internet and digital media technologies, and vice versa. It is interested in producing local and contextual accounts of interactions, negotiations, and resolutions between the Internet, and socio-material and geo-political processes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_whatsapp-and-the-creation-of-a-transnational-sociality"&gt;WhatsApp and the Creation of a Transnational Sociality&lt;/a&gt; (Maitrayee Deka; July 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_users-and-the-internet"&gt;Users and the Internet&lt;/a&gt; (Purbasha Auddy; July 10, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_effective-activism"&gt;Effective Activism: The Internet, Social Media, and Hierarchical Activism in New Delhi&lt;/a&gt; (Sarah McKeever; July 16, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights"&gt;Studying the Internet Discourse in India through the Prism of Human Rights&lt;/a&gt; (Deva Prasad M.; July 22, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/raw/blog_understanding-tagores-music-on-youtube"&gt;'Originality,' 'Authenticity,' and 'Experimentation': Understanding Tagore’s Music on YouTube)&lt;/a&gt; (Ipsita Sengupta; July 27, 2015).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/cio-july-1-2015-irctc-aadhaar-play-can-violate-sc-order-and-derail-national-security"&gt;'IRCTC’s Aadhaar play can violate SC order and derail National Security'&lt;/a&gt; (Shubhra Rishi; CIO.IN; July 1, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/catch-news-july-2-2015-the-digital-divide-pros-and-cons-of-modi-s-latest-big-initiative"&gt;The Digital Divide: pros and cons of Modi's latest big initiative&lt;/a&gt; (Suhas Munshi; July 2, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-statesman-rakesh-kumar-july-13-2015-corporate-push-modis-billion-digital-dream"&gt;Corporate push to Modi’s Rs.4.5-billion digital dream&lt;/a&gt; (Rakesh Kumar; The Statesman; July 13, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/huffington-post-july-16-2015-betwa-sharma-criminal-defamation-the-urgent-cause-that-has-united-rahul-gandhi-arvind-kejriwal-and-subramanian-swamy"&gt;Criminal Defamation: The Urgent Cause That has United Rahul Gandhi, Arvind Kejriwal and Subramanian Swamy&lt;/a&gt; (Betwa Sharma; Huffington Post; July 15, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/five-nations-one-future"&gt;Five Nations, One Future?&lt;/a&gt; (Bjorn Ludtke, Ellen Lee, Jaideep Sen, Gwendolyn Ledger, David Nicholson, and Jesko Johannsen; Voestalpine; July 18, 2015).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it"&gt;The scariest bill in Parliament is getting no attention – here’s what you need to know about it&lt;/a&gt; (Nayantara Narayanan; Scroll.in; July 24, 2015)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/news/livemint-nikita-mehta-july-29-2015-regulation-misuse-concerns-still-dog-dna-profiling-bill"&gt;Regulation, misuse concerns still dog DNA profiling bill&lt;/a&gt; (Nikita Mehta; Livemint; July 29, 2015)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society  (CIS) is a non-profit organisation that undertakes interdisciplinary  research on internet and digital technologies from policy and academic  perspectives. The areas of focus include digital accessibility for  persons with diverse abilities, access to knowledge, intellectual  property rights, openness (including open data, free and open source  software, open standards, open access, open educational resources, and  open video), internet governance, telecommunication reform, digital  privacy, and cyber-security. The academic research at CIS seeks to understand the mediation and reconfiguration of social and cultural processes and structures by the internet and digital media technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS - Twitter:&lt;a href="http://twitter.com/cis_india"&gt; http://twitter.com/cis_india&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - Facebook:&lt;a href="https://www.facebook.com/cisa2k"&gt; https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Access to Knowledge - E-Mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - E-Mail: &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Researchers at Work - Mailing List: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer /  citizen rights on the Internet! Write a cheque in favour of ‘The Centre  for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross,  Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners,  artists, and theoreticians, both organisationally and as individuals, to  engage with us on topics related internet and society, and improve our  collective understanding of this field. To discuss such possibilities,  please write to Sunil Abraham, Executive Director, at  sunil@cis-india.org (for policy research), or Sumandro Chattapadhyay,  Research Director, at sumandro@cis-india.org (for academic research),  with an indication of the form and the content of the collaboration you  might be interested in. To discuss collaborations on Indic language  Wikipedia projects, write to Tanveer Hasan, Programme Officer, Access to Knowledge, at &lt;a href="mailto:tanveer@cis-india.org"&gt;tanveer@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its primary donor  the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding and support for  most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans  Foundation, MacArthur Foundation, and IDRC for funding its various  projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2015-bulletin'&gt;https://cis-india.org/about/newsletters/july-2015-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-21T16:23:52Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa">
    <title>Comparative Transparency Review of Collective Management Organisations in India, United Kingdom and the United States</title>
    <link>https://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa</link>
    <description>
        &lt;b&gt;This Transparency Review seeks to compare the publicly available information on the websites of music collective management organizations (“CMOs”) operating within India, the United States, and the United Kingdom. A total of 10 CMOs were selected, which included a range of non-profit, government registered organizations to for-profit, private organizations, managing works on behalf of record labels, publishers, composers, lyricists, and music performers. This exercise intends to contribute to the growing body of research on the relationship between transparency and effectiveness of CMOs. It concludes with recommendations and learnings which may lead to more transparent and effective functioning of copyright societies in India, and management of music copyright overall.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The research paper was co-authored by Maggie Huang, Arpita Sengupta, Paavni Anand.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Taking into account the needs of users and members of CMOs, the following pieces of information was determined to be useful to report on the websites: : membership lists, governing directors, user types, tariff rates, royalty distribution schemes, and annual revenue reports. Collectively, the presence of these became rough parameters for transparency. The authors then reviewed each website to determine whether this information was made publicly available, and whether such disclosure was voluntary or mandated by law. As a proxy for effectiveness, percentage of revenue distributed as royalties was calculated for those who made their annual revenue report available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the review found that India's 2012 Copyright Amendment Act and 2013 Copyright Rules were by far the most stringent regarding registration, operations, rate setting, and reporting. Despite India's strict laws, it appears there is little compliance, particularly by PPL which failed to report the mandated tariff rates, royalty distribution policy, and its annual revenue report. ISRA had all the information sought on their website except for the crucial annual revenue report. IPRS however clearly made an effort to comply, with all information sought, provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relative to India, CMOs in the United Kingdom were regulated less strictly, with U.K.'s 2014 Copyright Regulations allowing self regulation provided CMOs follow guidelines to comply with the operating code of conduct.  All six indicators were available on websites of both UK PPL and PRS for Music, although the latter required user authorization to access membership/repertoire data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In comparison, the U.S. seems to have the most lax reporting standards of the three, really only mandating basic reporting for CMOs administering statutory licenses. However, similar to India, rate-setting in the U.S. for certain digital broadcasts are subject to significant government control, in addition to anticompetetive measures which prevent partial withdrawal of rights from certain CMOs’ blanket licenses. Availability of information varied, with BMI and Sound Exchange complying with the more demanding parts of US legislation and disclosing all information sought, while ASCAP and HFA were missing tariff rates and user types respectively. SESAC was the least informative, with governing directors absent, and more crucially, their annual revenue report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To determine relative efficiency, the authors calculated the percentage of royalties distributed per total revenue for those CMOs which published their revenue reports. All distributed royalties ranged between 80%-90%. Though not necessarily the most accurate measure, there appeared no significant correlation between the percentage of distributed royalties, and amount of information found; therefore a correlation between effectiveness and information transparency remain unknown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, throughout the exercise, the limitations of the research design became clear, leading to its own learnings for future research. Methodologically, the more attention should have been paid to spanning a wider spectrum of legal control, drawing clear lines of which types of CMOs to include in the study, being careful not to equate presence of information with usability or effectiveness, deeper assessment of the legal provisions, and the inclusion of membership exclusive data as part of the exercise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nevertheless, the comparative review process did produce several learnings that Indian CMOs could adopt for enhanced transparency and potentially improved effectiveness as well. These recommendations are as follows:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Publish the full repertoire of works the CMO is authorized to license, and its corresponding rights holder information in a searchable format;&lt;/li&gt;
&lt;li&gt;Provide a platform for collectively identifying the rights-holder of orphan works (works which are registered whose royalties are collected, but ownership information is unknown);&lt;/li&gt;
&lt;li&gt;Guide new users and potential members through a more user-friendly designed page with simplified, accessible introduction to music licensing;&lt;/li&gt;
&lt;li&gt;Increase clarity surrounding royalty distribution policies;&lt;/li&gt;
&lt;li&gt;Publish updated annual revenue reports; and&lt;/li&gt;
&lt;li&gt;Clarify the dispute resolution processes.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This review concludes by suggesting future research through stronger methodological design, further exploring membership exclusive data, assessing effectiveness outcomes between multiple, competing licensing bodies versus a single, state-granted monopoly society, and the possibility of alternative compensation schemes for music financing and production.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MOTIVATIONS FOR RESEARCH: MUSIC COPYRIGHT MANAGEMENT IN THE MOBILE MUSIC AGE for the PERVASIVE TECHNOLOGIES PROJECT &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Managing copyright in the digital age is one of the most contentious issues today amongst music industries globally. Innovation in digital technologies has 	opened up formerly restricted production and distribution channels, resulting in a proliferation of music like never before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mobile phone is one of these innovations, particularly since becoming the most preferred music listening device in India.	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The overarching utility of the mobile phone has made it the object of study for the Centre for Internet 	and Society's Pervasive Technologies project&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;, which seeks to identify intellectual property levers which 	can enhance access to affordable mobile devices' hardware, software, and content within India and China.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Access to music content&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; via the mobile phone is one of the chapter's primary focus, with a research 	objective of balancing access to music for internet and mobile consumers, while ensuring the protection of rights and remuneration for artists and 	creators.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The initial phases of this research found that new stakeholders such as device manufacturers, telecom operators, and streaming services were developing 	business models based on a free, ad-supported service with a paid premium tier, ultimately resulting in high royalty payouts and low profit margins. 	However, artists in India and worldwide are raising grievances due to decreasing royalty revenue, putting to question whether these business models are 	sustainable in the long term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We had hoped to answer these questions within the Indian context, but the findings were ultimately inconclusive. This was primarily due to two reasons: 1) 	lack of data transparency at multiple levels of the music distribution chain, and 2) a copyright management system heavily in flux due to poor enforcement 	of the ambiguous 2012 Copyright Amendment Act. The copyright societies in India embodied both these issues in India, resulting in a need to study these 	institutions further as one of the main objects of research.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a name="h.vg3w2y5ah5bq"&gt;&lt;/a&gt; INTRODUCTION to COLLECTIVE MANAGEMENT ORGANIZATIONS and the NEED FOR TRANSPARENCY&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Music copyright societies, commonly referred to as collecting agencies or collective management organizations ("CMOs") provides music rights holders 	(authors, owners, and performers of lyrics, compositions, and sound recordings) the ability to authorize the licensing of their copyrighted works to 	another body (the CMO) who can collect royalties from the numerous sources of usage on behalf of its members. If the law allows, these CMOs are also able 	to collectively negotiate for rates as well. Royalties derived from these licenses are often collected and distributed by CMOs as a source of income for 	the creators of musical works, after administrative costs are deducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CMOs and their rights-holder members represent a principle-agent relationship as agent-CMOs collects royalties from users on behalf of its principle 	rightsholder-members. However, if a conflict of interest arises, the inherent information asymmetry may give rise to abuse. In the case of CMOs, this 	standard principle-agent problem has manifested in forms ranging from inefficient administration overhead, to more dubious acts of corruption and 	collusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Economic theory tells us that the key to a free and fair market is "perfect information", or when stakeholders are equipped with the relevant information 	needed to make market decisions. Information enforces accountability, an idea that sparked the Right to Information movement in India. This is why 	transparency is especially critical in the music industry, characterized by complex revenue and consumption patterns, an intricate copyright law framework 	and stakeholders with varying levels of bargaining power.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given many CMOs operate as state-granted monopolies which exclusively administer specific class of works, it is important that the collection and 	distribution of royalties occur in a transparent manner so members and regulators can scrutinize its functioning to ensure greatest effectiveness. For 	countries which allow competition between CMOs, transparency in operations and revenue data can provide users and members the ability to make an informed 	choice, and the opportunity for other competing players to enter the market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within India, transparency has been a recurring issue due to allegations of mismanagement and corruption&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; of the copyright societies. This was one of the motivations for the 2012 Copyright Amendment and subsequent&lt;a href="http://copyright.gov.in/Documents/Copy-Right-Rules-2013.pdf"&gt;2013 &lt;/a&gt;&lt;a href="http://copyright.gov.in/Documents/Copy-Right-Rules-2013.pdf"&gt;Copyright&lt;/a&gt; &lt;a href="http://copyright.gov.in/Documents/Copy-Right-Rules-2013.pdf"&gt; &lt;/a&gt;&lt;a href="http://copyright.gov.in/Documents/Copy-Right-Rules-2013.pdf"&gt;Rules&lt;/a&gt; which attempted to address, amongst other issues, regulations around transparency for registered copyright societies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, in light of new transparency and operations regulations for India, and inconclusive research findings due to sparse data, the authors sought to 	review the transparency of various CMO websites and their corresponding regulatory measures in the hopes of answering the following questions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. How does India's level of CMO transparency compare to other countries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Is disclosure of information a result of regulatory pressures or voluntary?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. What kind of learnings and recommendations can be made from the voluntary information disclosure and/or legal regulatory environments of other 	countries?&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;METHODOLOGY&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="h.fubfsutt2035"&gt;&lt;/a&gt; Selecting countries for comparison&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since one of the broader goals of this review was to identify legal and/or industry led proposals for increased CMO effectiveness in India, the authors 	wanted to select case study country samples which were relevant and useful for the Indian context, while also considering differing legal and regulatory 	regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was chosen due to its competitive CMO structure where multiple CMOs administering the same class of musical works, and representing 	similar kinds of rights-holders can co-exist as private entities. Aside from statutory rate-setting of sound recording broadcasts, and anticompetitive 	consent decrees for ASCAP and BMI, the United States seem to have little to no regulation overall surrounding CMO operations and management. 	&lt;br /&gt; &lt;br /&gt; The United Kingdom was selected due to its recent growing interests in the Indian music industry. This was demonstrated by the high volume of British 	attendants at recent Indian music industry conferences , several of which were directly sponsored by UK Trade &amp;amp; Investment as a music trade export 	mission.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; In addition, U.K.'s CMO structure seemed to be more streamlined, with class of works separately 	managed under two main music CMOs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian research participants of ongoing research also expressed interest in registering their musical works with CMOs in the U.S. and U.K. given increasing 	market demand, higher currency exchange, and increased reliability of royalty receipts. This was further indication of relevant country case studies for a 	comparison with India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="h.38a2nkn6kv5k"&gt;&lt;/a&gt; Identifying the Relevant CMOs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Due to challenges enforcing India's 2012 Copyright Amendment Act, and subsequent ambiguity of copyright societies' registration statuses, the selection 	criteria for CMOs consisted of those organizations which generally issued music licenses and collected royalty revenue on behalf of other rights-holder 	members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the following three CMOs were identified for this review: the Indian Performing Right Society ("IPRS") which collects on behalf of composers, 	lyricists, and publisher-members&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;; the Phonographic Performance Limited ("PPL") which exclusively controls 	public performance and broadcasting rights for its music label members&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;; and the Indian Singers Rights Association ("ISRA") which is currently the sole officially registered copyright society collecting on behalf of singers for their Performer's Rights.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The status of IPRS and PPL as registered societies are ambiguous due to recent reports of registration withdrawal	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;; therefore compliance to Section 33 of the Copyright Act is uncertain. However, the authors chose to 	uphold the same standards in this review due to similarity in purpose and functioning.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the U.S., the identified CMOs included the American Society of Composers, Authors, and Publishers ("ASCAP"), Broadcast Music, Inc, ("BMI") and SESAC 	(originally the Society of European Stage Authors and Composers) which are all competing Performing Rights Organizations collecting on behalf of 	songwriters and music publishers for public performance rights. SoundExchange is responsible for managing digital sound recordings for copyright owners 	(mostly music labels) and performing artists; while Harry Fox Agency ("HFA") collects mechanical royalties on behalf of publishers and songwriters when 	their compositions are reproduced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the U.K., two CMOs were identified: PRS for Music which manages public performance rights on behalf of songwriters, composers, and music publishers; and 	Phonographic Performance Limited ("PPL-UK"), which manages the rights of performers and record producers. Unlike the United States and India, each society 	exclusively manages separate categories of works. Although technically a compulsory collective licensing scheme is mandated under Indian copyright law for 	musical works incorporated in cinematograph films or sound recordings, ambiguity in India remains due to the unregistered/deregistered yet still 	functioning licensing bodies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Identifying the comparative parameters&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To compare CMOs transparency, the authors sought to develop a feasible proxy to determine their website's degree of disclosure. This was done considering 	two main stakeholders who most often access CMO websites: rights-holders, and users. The rights holders are owners and/or authors of a copyright or related 	right (i.e. performer's right) who is a member, has sought membership, or is a potential member of the CMO. The user is any person or organization who 	seeks to use the copyrighted work and is hence made to pay a fee for such use. This fee is generally based on the licensing agreement, struck between the 	CMO and the user on behalf of their collective rights holders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the following information was identified to be useful for comparative assessment: list of members, governing directors, usage types, tariff rates, 	royalty distribution policy, annual revenue report, and percentage of distributed royalties. The justifications, and comparative findings are outlined 	below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FINDINGS&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of members&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Publishing members lists is useful for potential users since it can collectively reduce search costs for ownership information, making the process of 	licensing and royalty collection more efficient overall. In addition, users approached for licensing payment can also verify that the CMO is indeed authorized to administer those works. This has been a recurring issue in recent history for CMOs in both the United States	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; and India&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;, which have reported extortion-like 	licensing demands for songs which may not have been even owned by their member rights-holders. Some have been alleged to demand licenses for broad, 	undefined catalogs like entire genres of music.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Having members lists published can prevent these 	discrepancies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, all identified CMOs published their membership lists in accordance with Rule 66, section 1(c) of the Copyright Rules, which mandates the 	disclosure of members lists explicitly on the website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the U.S., all CMOs have published their membership data either as full lists or in the form of a searchable repertoire database corresponding with the 	specific work. This presentation format was similar in the U.K. although PRS for Music restricted access to authorized users. Nevertheless, this disclosure 	went beyond U.K.'s&lt;i&gt; Copyright Regulations&lt;/i&gt; which only require the number of rights holders represented, whether as members or non-member rights 	holders to be published in the annual report. To the authors' knowledge, the U.S. does not seem to have an equivalent law as such. 	&lt;br /&gt; &lt;br /&gt; Several CMO websites in the U.S. and U.K. also feature a search for owners of orphan works - copyrighted songs within their catalog in which the due 	rights-holders are unable to be contacted, or simply unknown due to a multitude of reasons, including lack of data collection, transfer of rights, unknown 	inheritance from deceased rights holders, amongst others. Many of these CMOs hold undistributed royalties for these works, bringing to question whether 	rights-holder members truly give genuine authorization for their continued licensing. 	&lt;br /&gt; &lt;br /&gt; India's CMOs could enhance their transparency by adopting the repertoire format of membership disclosure which corresponds with each copyrighted work. It 	could also provide a platform to collectively identify orphan works' due rights-holders.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;List of Members Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation? &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Copyright Rules, 2013,&lt;/i&gt; Rule 66 Code of Conduct for Copyright Societies.					&lt;i&gt; Section (1): Every society shall make available on its website... c) List of all members in the general body&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, members can be searched through a database&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, members can be searched through a database.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, member list available through repertoire search and as downloadable full list.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, artists can be individually searched via HFA's 'Songfile' database&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; but not 					available as a whole&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, repertoire search database including member/label search exists.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The &lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Copyright&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt; (&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Regulation&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt; of &lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Relevant&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Licensing&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Bodies&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;)&lt;/a&gt;&lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;Regulations&lt;/a&gt; &lt;a href="http://www.legislation.gov.uk/ukdsi/2014/9780111110485/pdfs/ukdsi_9780111110485_en.pdf"&gt;, 2014&lt;/a&gt; Reporting Requirements&lt;/p&gt;
&lt;p&gt;6. The code of practice shall require the relevant licensing body to publish an annual report which includes: 					&lt;br /&gt; &lt;br /&gt; a) the number of right holders represented, whether as members or through representative arrangements including, where possible and if 					applicable, an estimate of the number of non-member right holders represented by any Extended Collective Licensing Scheme&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;A database exists but restricted to authorized users&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Governing directors&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For rights holder members, knowledge of the governing members directing the functioning of the CMO can help ensure decision making occurs in a representative, accountable manner. In 2011, it was found that IPRS and PPL of India were governed by the same Board of Directors	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;, despite theoretically managing distinct sets of rights and representing different rights-holder 	members. Stopps (2013) in WIPO's&lt;i&gt; 'How to Make a Living from Music'&lt;/i&gt; states that democratic governance is highly desirable if not essential, since 	the board structure should ideally reflect the rights they administer.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, all CMOs comply with the 2013 Copyright Rules which mandates the publishing of Governing Council members on its website. All CMOs in the United 	States, with the exception of SESAC have published information on their governing or executive board. SESAC does highlight the appointment of the CEO 	within its 'news' section, but not in an easily accessible location. 	&lt;br /&gt; &lt;br /&gt; In the UK, the governing directors are disclosed, though not explicitly mandated for disclosure on the website. Copyright Regulations does require the 	appointment procedure of the Directors and their remuneration be included in the Annual Report. India's&lt;i&gt; 2014 Copyright Rules&lt;/i&gt; appears relatively 	stringent in comparison given the process is specified in detail rather than a self-regulated process.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Governing Directors Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Copyright Rules, 2013,&lt;/i&gt; Rule 66 Code of Conduct for Copyright Societies. 					&lt;i&gt; Section (1): Every society shall make available on its website… d) Names and address of chairman, other members of the Governing 						Council and other officers in the society &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; Copyright Rules 59 Management of Copyright Society (1) Every copyright society shall have… a) General body…b) Governing 						Council with Chairman… c) a CEO… (3) The Chairman shall be elected by two third of the majority…. &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, management&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Appointment of CEO announced under 'News' section.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; No other members found&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt; Copyright (Regulation of Relevant Licensing Bodies) Regulations, 2014 requires the procedure for appointment of Directors, and the list of 					remuneration of the Directors to be included in the Annual Report.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;User Categories&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The categorization of users simply allow potential licensees to understand when they would be legally required to purchase a music license given the scope 	and scale of their business/usage. User categories can range from restaurants, internet streaming, radio broadcasting, and live performance; to the 	physical reproduction of a musical composition or sound recording (for example through photocopying of sheet music or burning of CDs).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All CMOs identified had user categories displayed on the websites, with some presenting the distinctions through search options while others outlined usage 	types as a general list. Only India's Copyright Rules mandated the publishing of different categories of users as part of their tariff scheme. 	&lt;br /&gt; U.S.'s HFA did not not distinguish licensing requirements by user type, but did communicate when a license would be needed through simple questions 	regarding usage.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;User categories&lt;b&gt; Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;According to Rule 56 of the Copyright Rules, 2013, it is mandatory for Indian CMOs to publish on their website the different categories of 					users in their Tariff Scheme&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, Search bar for user types available&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically, but section on 'What kind of license do I need' delineates user types&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Tariff Rates&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Tariff rates are the costs of licenses issued by the CMOs. The calculation of these rates are done in a myriad of ways, ranging from being fixed by 	statutory provisions, set collectively by CMOs, or negotiated privately in a willing buyer-willing seller market. Some rate-setting considerations have 	included anticipated number of listeners, physical size of establishment, time of music use, number of loudspeakers, etc. Due to similarities in mode and 	scale of usage, most fixed tariff rates such as blanket licenses offered by CMOs are distinguished by different categories of users, most fixed tariff 	rates are divided accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a market like the U.S. where CMOs compete to sublicense similar kinds of rights, publishing tariff rates can enable comparison of licensing fees for the 	most cost effective choice.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; It can also allow users to forecast licensing expenses and adjust their 	business models or anticipated usage accordingly. Lastly, transparent cost calculations as opposed to hidden negotiated rates can prevent price and user 	discrimination, since licensees can verify the accuracy of their license charge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, IPRS and ISRA complies to Rule 56 (2) of the &lt;i&gt;Copyright Rules 2014 &lt;/i&gt;which mandates the publication of rates distinguished by categories of users, mode of exploitation, user group, durations of use, and territory. In U.K., both CMOs comply with Section 5(c) of their	&lt;i&gt;Copyright Regulations 2014 &lt;/i&gt;which mandates the publication of 'tariff rates in a uniform format' on the website as part of the monitoring and 	reporting requirements. In the U.S., all CMOs with the exception of ASCAP publish their tariff rates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the U.S. does not seem to mandate the explicit disclosure of rates, both U.S. and India set statutory rates for certain uses of sound recordings. 	In the U.S. for example, the rates for ephemeral sound recordings akin to non-interactive, radio-like services are set by the Copyright Royalty Board under 	S17 USC 112 and 114. Similarly, in India, a statutory rate is also fixed by the Copyright Board for radio broadcasting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an anticompetitive measure, music consent decrees in the U.S. also mandate that ASCAP and BMI provide licenses on equivalent, non exclusive terms. This 	means that while its members can still individually refrain from joining a CMO in its entirety, partial withdrawing of their works from blanket licenses 	are not allowed.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite fairly affordable statutory rates for use in non-interactive services, interactive streaming which seeks to host popular content often still 	requires direct licensing agreements from major record label conglomerates. Due to the importance of acquiring that content, these labels are often able to 	negotiate exclusive deals with hidden terms. Evolving music consumption patterns and an inconsistent rate-setting landscape have raised grievances, 	particularly amongst songwriters. In the U.S., this has led to the Copyright Office's review and reconsideration of the music licensing landscape in recent 	months, while in India, the cost of content acquisition remain a source of debate by the services.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Tariff Rates Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, listed as per usage types&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 33A of the Copyright Act, 1957 and Rule 56 of the Copyright Rules, 2013: ...must indicate separate for categories of users, media 					of exploitation, user group, durations of use and territory, etc.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No, must request&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No regulation mandating the disclosure of tariff rates.&lt;/p&gt;
&lt;p&gt;Consent decrees for BMI/ASCAP as an anticompetitive measure mandates offering of licenses to services on equivalent, non exclusive terms.&lt;/p&gt;
&lt;p&gt;Statutory rates set by the Copyright Royalty Board under 17 U.S.C. 112 and 114.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, rate charts published&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The Copyright (Regulation of Relevant Licensing Bodies) Regulations 2014 Section 5 of its Specified Criteria mandates 'provide details of 					tariffs in a uniform format on its website.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Royalty distribution policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The royalty distribution policy typically outlines the process and manner of royalty distribution, specifying how royalty is split between member-rights 	holders and the CMO. It usually notes the frequency of payments as well. Since one of the main reasons a rights-holder seeks membership within a CMO is to 	ensure their royalties are received on a consistent basis without themselves having to track down all users of their work, a transparent distribution 	policy is of utmost importance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, IPRS and ISRA published the distribution policy on their website in compliance with Rule 58 of the &lt;i&gt;Copyright Rules&lt;/i&gt;. Upon review of both, 	it was interesting to note the lack of detail in India's policies. Although it is specified in the Act, ISRA does not convey on its website clearly the 	distribution of percentages, nor the administrative cut it seeks to take. IPRS was very unclear about their frequency of payments, noting that "The 	distribution of Royalties shall be carried out &lt;i&gt;promptly from time to time"&lt;/i&gt;, despite the Copyright rules stipulating that the frequency be set at 	every quarter. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the U.S., &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;S&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;. 370.5 (&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;c&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;)&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;of&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;the&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;Code&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;of&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;Federal&lt;/i&gt;&lt;/a&gt; &lt;i&gt; Regulations &lt;/i&gt;for statutorily set sound recordings do state that online-published Annual Reports must have information on how royalties are 	collected, distributed, and spent as administrative expenses. All CMOs seem to comply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the UK, Section 6 of the 2014 Copyright Regulations &lt;i&gt;Specified Criteria &lt;/i&gt;mandates&lt;i&gt; &lt;/i&gt;reporting of the distribution policy in its annual 	report. Both identified CMOs comply.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Royalty Distribution Policy Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, although quite vague, unclear frequency of payments&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rule 58 of the Copyright Rules 2013 outline the terms of the Royalty Distribution Policy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, but vague, unclear re: distribution of percentages and administrative deduction.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, it outlines exactly how it is calculated&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For designated collection and distribution companies for use of sound recordings under statutory licenses:					&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;S&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; . 370.5 ( &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;c&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;)&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;of&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;the&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Code &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;of&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Federal &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Regulations &lt;/a&gt; , as part of the annual Report, Collectives must indicate how royalties are collected and distributed. 					&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, in the Royalty Policy Manual&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, rate charts&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; and commission rates revealed.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;The Copyright (Regulation of Relevant Licensing Bodies) Regulations 2014 Section 6 Reporting Requirements of its Specified Criteria 					mandates the publishing of the distribution policy in its annual report.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Annual revenue report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The annual revenue report provides an overview of total income, which is particularly important for a CMO acting as a non-profit organization. 	Rightsholders can assess what the rest of the revenue is being used for, and cross-verify whether the self-reported data is true. For market and policy 	researchers, the annual revenue report can also provide the breakdown of which licensing services or catalogs are being used. An externally audited revenue 	report also enhances trust in the organization and ensures reliable financial transparency. Thus, the publication of the annual revenue report forms one of 	the most important benchmarks of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, only IPRS has published their 2013-14 annual revenue report in compliance with Rule 66 of the &lt;i&gt;Copyright Rules &lt;/i&gt;which mandates the 	publishing of an annual report and audited accounts on their website. None of the other CMOs seem to have done this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the United States,&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;S&lt;/i&gt;&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;. 370.5 (&lt;/i&gt;&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;c&lt;/i&gt;&lt;/a&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;)&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;of&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;the&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;Code&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;of&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;&lt;i&gt;Federal&lt;/i&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; &lt;i&gt;Regulations&lt;/i&gt; &lt;/a&gt; mandates that CMOs collecting and distributing for statutorily licensed sound recordings must publish their annual revenue report. CMO SoundExchange 	complies, while HFA does so voluntarily. ASCAP and BMI also post their reports on occasion with a few years missing, but SESAC's report seems to be absent, 	possibly due to private incorporated company status.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the UK, both CMOs comply with the 2014 &lt;i&gt;Copyright Regulations &lt;/i&gt;under Rule 6 mandating the publication of an annual report.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Annual Revenue Report Available on Website?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Regulation?&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, for year '13-'14&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rule 66 of the Copyright Rules, 2013, CMOs mandate the publishing of an annual report and audited accounts on their website.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, until 2013&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;For designated collection and distribution companies for use of sound recordings under statutory licenses:					&lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;S&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; . 370.5 ( &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;c&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;)&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;of&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;the&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Code &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt;of&lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Federal &lt;/a&gt; &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=aa7e41c7083f895eb158e8a74d02b056&amp;amp;mc=true&amp;amp;node=se37.1.370_15&amp;amp;rgn=div8"&gt; Regulations &lt;/a&gt; .&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sporadically posted&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No (possibly because privately held company?)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, until 2013&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;In UK, the Copyright (Regulation of Relevant Licensing Bodies) Regulations, 2014 under Rule 6 requires that every CMO publish an annual 					report containing the annual financial statements, collections from the different licenses and the distribution of royalties.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes, until 2014&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="h.ux7616amd2xb"&gt;&lt;/a&gt; Percentage of Revenue as Distributed Royalties&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the main function of CMOs are to secure royalties for rights-holders, the percentage of revenue as distributed royalties was calculated using numbers 	from the latest published annual revenue reports. Although there are differences in CMO mandates and subsequently their investment on litigation and advocacy for example, the proportion of revenue as distributed royalties was used as a simplified proxy of effectiveness for this review.	&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those CMOs who published their annual revenue reports, it was found that the percentage of revenue as distributed royalties seemed to range between 	80-90%. Given the controversies surrounding collecting societies in India, it was admittedly surprising that IPRS' distributed royalty percentage averaged 	almost 1% higher than comparable societies in the UK. It is also interesting that the United States seem to have the most efficient CMOs, with two rounding 	to 90%.&lt;/p&gt;
&lt;table class="grid listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Country&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;CMO &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Data reported on Website&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Percentage of Revenue as Distributed Royalties &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;India&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;IPRS&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;From 2013/14 annual revenue report: 					&lt;br /&gt; Net royalties payable: Rs 396743413 / 					&lt;br /&gt; License fees total revenue Rs 470934348:&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0.84246013204 = 84.25%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ISRA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United States&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;ASCAP&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Self reported 88cents/dollar goes back to artists.&lt;/p&gt;
&lt;p&gt;2014 Revenue Report: 					&lt;br /&gt; Total receipts: 945 385 					&lt;br /&gt; Total distribution to members: 850 984&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="id.gjdgxs"&gt;&lt;/a&gt; 850 984/945 385 = 0.90014544339&lt;/p&gt;
&lt;p&gt;90.01%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;BMI&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Self reported numbers from press release:&lt;/p&gt;
&lt;p&gt;"For the fiscal year ending June 30, 2012, BMI reported revenues of $898.7 million and royalty distributions to our affiliates totaling 					$749.8 million."&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;749.8 / 898.7 = 0.83431623456 					&lt;br /&gt; &lt;br /&gt; 83.43%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SESAC&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;SoundExchange&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Self reported from pre-audit 2013 fiscal report&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;: 					&lt;br /&gt; &lt;br /&gt; Total Royalties Collected $656 					&lt;br /&gt; Total gross distributions $590&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="id.30j0zll"&gt;&lt;/a&gt; 590 / 656 = 0.8993902439&lt;/p&gt;
&lt;p&gt;89.94%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;HFA&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A but self reported 11.5% commission&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PPL UK&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Self reported from 2013 financial statement:&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Total license fee income: £176.9 m&lt;/p&gt;
&lt;p&gt;Net distributable revenue: £148.4m&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="id.1fob9te"&gt;&lt;/a&gt; 0.83889202939&lt;/p&gt;
&lt;p&gt;83.89%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PRS for Music&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Self-reported from 2014 annual revenue report&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;: 					&lt;br /&gt; &lt;br /&gt; Our royalty revenues for the&lt;/p&gt;
&lt;p&gt;year were £664.3m, of which we&lt;/p&gt;
&lt;p&gt;distributed £565.6m to members.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;a name="id.3znysh7"&gt;&lt;/a&gt; 565.6/664.3 = 0.85142255005&lt;/p&gt;
&lt;p&gt;85.14%&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;LIMITATIONS &amp;amp; LEARNINGS&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The major limitation of this review is rooted in its various methodological weaknesses, ranging from the sampling of countries, inclusion of ambiguous 	CMOs, possible bias towards Indian copyright law during the parameter design, limitations of distributed royalties percentage as an effectiveness proxy, 	lack of measurable factors when attempting to evaluate 'ease of website use', and somewhat shallow legal research. Nevertheless, these were part and parcel 	of the learnings which stemmed from this review.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Limitations in Country Selection Process&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The selection of countries to be assessed was not very methodologically sound. After further literature review, it seems a more representative sample could have been selected. Dr. Fabrice Rochelandet in his 1996 conference paper '	&lt;i&gt;Are Collecting Societies Efficient? An evaluation of collective administration of copyright in Europe'&lt;/i&gt; categorized legal supervision systems in the following spectrum: lack of control, control at request, setting up control, permanent control, and extreme control.	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rochelandet (1996) identifies UK as having 'control at request' since decisions surrounding operations are generally left up to the CMO themselves, 	exemplified by the freedom to develop their own functioning and code of practices, which then must be approved. Control at request is also demonstrated by 	rights-holder members ability to procure certain documentation upon request, and call upon the tribunals for dispute resolution if desired.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using this taxonomy, India would likely span across 'setting up control', 'control at request', and possibly 'permanent control'. Setting up control is 	fitting since the 2012 Copyright Amendment mandates the registration of any organization in the business of issuing and granting licenses for underlying 	musical works (composition and lyrics) as a 'copyright society'. Typically this requires extensive documentation on procedural and governance matters, most 	of which is predetermined in detail in the &lt;i&gt;2012 Copyright Act and 2014 Rules.&lt;/i&gt; Permanent control may also apply since the Central Government has 	powers to cancel the registration of any copyright society and legally cease its functioning. Additionally, quite substantial regulations determine rate 	setting process and even calculation, as well as distribution of royalties. Lastly, control at request may also be fitting since similar to the UK system, 	an internal dispute resolution is legally mandated. However, any dispute can also be brought to the quasi-judicial Copyright Board if unable to settle 	matters internally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States appears as if it would deviate from former examples of more involved legal supervision since it would likely be characterized by 'lack of 	control'. Few requirements exist regarding specific operations of licensing bodies, with the exception of rate setting for ephemereal sound recordings and 	anticompetitive consent decrees, the U.S. does provide a contrasting comparative system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these examples do span across part of the spectrum of legal control, a future case study country could include one which mandates complete control 	such as in the case of Italy with a single state granted monopolist or New Zealand in which a single clearance license is offered to reduce complexity and 	transaction costs for music users.&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Limitations of CMO Identification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Throughout the methodology design, one of the main challenges was deciding which CMOs to include in the review. Due to lack of in-depth knowledge of U.S. 	and U.K.'s music licensing space, the initial survey and selection included bodies irrelevant to music licensing specifically. Due to the ambiguity in 	India, all organizations who were involved in some form collective licensing were initially included, including private entities like Novex Communications, 	and the South Indian Music Companies Association, due to their seeming similarities in functioning. However, they were eventually excluded in the final 	review to include only those which have received registered society status, or are currently registered as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also a lack of distinction made between licensing bodies specifically managing underlying works like music composition and lyrics, sound 	recording (phonographic rights), and performance rights. Although interesting insights may have been able to be drawn between similarly managed members and 	rights, the disaggregated rights management in the U.S. made these categorizations and comparisons challenging. 	&lt;br /&gt; &lt;br /&gt; Part of the confusion stemmed from the vast variety of CMO systems and characteristics. Ficsor (2003) distinguishes these differences from four varying 	viewpoints: the level of collectivization, rights' owners freedom of choice, scope of rights and rights-owners covered, and the freedom of CMOs to set 	rates and other licensing terms.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; The level of collectivization range in terms of representation, 	authorization, and even distribution of royalties/returns. The freedom of rights owners' have range in the ability to choose joint management of rights, or 	even which CMO to manage their rights -- assuming the option is not restricted by their respective copyright laws. The scope of rights and rights owners 	covered by a CMO varies from exclusively managing its own members rights, occasionally managing other members rights, and occasionally managing all similar 	members rights with no ability to opt out. Lastly, the freedom of CMOs to set rates and licensing terms range from free negotiations with the possibility 	of an arbitration body, to legally fixed predetermined rates and conditions. 	&lt;br /&gt; &lt;br /&gt; The tremendous variety of CMO characteristics and the lack of bright lines in defining control factors for this review's selection meant that major music 	publishers, music services who directly issue payment, and even content aggregators who collate and distribute works for a certain fee could have been 	included. However, the decision to include only those officially recognized and legally registered as CMOs enhanced the feasibility of this review.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Limitations of Parameter Selection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While reviewing the parameters for transparency, it soon became clear that there were several limitations to the information identified. These include 	heavy influence in its development from India's context and legal provisions, an assumed value in transparency for transparency's sake, lack of specificity 	when surveying 'ease of website use', overly simplified proxy for efficiency measurement, a relatively shallow review of the law, and lack of assessment of 	membership data. 	&lt;i&gt; &lt;br /&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While selecting the comparative parameters, the process of developing a feasible transparency proxy may have been tilted towards the context and legal 	developments of India. This appeared to be the case when the first round of data collection was inconsistent with further reviews due to what appeared to 	be differences in the terms being sought - terms used in the Indian Copyright Act - rather than the substance of the content. This is indicative of how 	India's laws heavily influenced the development of the parameters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exposure to mistrust and lack of data in the Indian context may have also led authors to a somewhat presumed ideal of transparency for transparency's sake, 	implying in a weak correlation between publicly available information, the more effective the website and possibly the CMO . However, Schroff (2014) noted 	that information overload could occur if a potential licensee is uncertain what they are looking for.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt; From an efficiency point of view, search costs may actually decrease if less information is provided upfront, but better presented in more accessible 	language and format to guide the user to the relevant information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following review of the websites for a list of members, it appears that a more fruitful parameter may have been the publication of actual works and 	affiliated creators, rather than only the rights-holder members themselves. A grievance occasionally raised is the lack of recognition of composers and 	producers within a song, since it is typically the singer (or in the case of Indian film music, the actor and the film) who the audience associates with 	the work. Thus, a full repertoire list could be a useful addition for Indian websites to consider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The selection of governing directors as a marker of transparency may have also been influenced by India's recent concerns surrounding copyright societies' 	leadership. Although it is a useful indicator, private, for-profit CMOs which have exclusive membership does not necessarily have the same burdens of a 	compulsory collective licensing scheme in which representation is necessary. What may be more useful for members is ensuring a dispute resolution process 	is easily accessible so that any grievances can be taken up through proper channels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Identifying a relatively simple proxy for effectiveness and efficiency was also challenging. Many CMOs in their annual reports highlighted figures such as 	'administrative costs', 'operation costs', 'cost to income ratios', and other similar indicators to report expenses outside of royalty licensing, 	collection, and distribution. However, due to differences in calculations, a simplified proxy was developed to assess the effectiveness of their core 	purpose of royalty distribution. However, this calculation does not account for absolute sums, year on year growth, taxation, and other non-monetary 	benefits. In addition, the differing years, geographies, and class of works makes comparison not very methodologically sound.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The authors had initially included 'ease of website use' as part of the review. However, this parameter was not very clearly developed and defined, and 	thus reviewed subjectively by different research assistants with varying assessments. Nevertheless, closer attention was paid to web design and user 	interface to enable greater efficiency in searching for relevant information. Future assessments could measure the number of clicks or amount of time it 	takes to find a certain piece of oft-sought information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assessment of each country's relevant laws was based on whether reporting the information online was mandated by law. However, throughout the exercise 	it soon became clear that beyond reporting standards, more interesting distinctions such as the level of control and specificity to which the law sought to 	determine functioning and operations of the CMOs. Although this was briefly touched upon throughout the review, further research should be explored in this 	area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, data the authors did not seek due to logistical limitations were membership-exclusive information. Recent complaints about royalties of streaming 	services have resulted in the publishing of 	&lt;br /&gt; numerous HFA and SoundExchange royalty reports by their rights-owners. These reports outline the services and songs from which they have received their 	royalties, allowing for more informed debate and discussion of royalty payouts and business models of the various digital services. Ongoing research 	surrounding copyright management in India have found that detailed reports on how royalty was calculated, or from which works/services they were generated 	are often absent upon receipt of their royalty cheques.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;CONCLUSIONS 	&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite India's strict legal provisions and control regarding registration, operations, rate setting, and reporting, it appears there is little enforcement 	and even less compliance, particularly by Phonographic Performance Limited which failed to report tariff rates, royalty distribution policy, and its annual 	revenue report. The Indian Singers Rights Association published all parameters sought with the exception of their annual revenue report, leaving authors 	without data needed to calculate the percentage of distributed royalty. The Indian Performing Rights Association provided all information sought in this 	review, with an 84.25% of revenue as distributed royalties as calculated from its 2013/14 annual revenue report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relative to India, CMOs in United Kingdom were regulated less strictly, allowing self-developed codes of conduct providing adherence to certain broad 	guidelines on operations and reporting. It appears the government only imposes rules in the absence of adequate self-regulation. U.K.'s Phonographic 	Performance Limited displayed all six indicators sought, with 83.9% as distributed revenues from its 2013 financial statement. PRS for Music did not make 	its members list and repertoire open to the general public, but did publish all other parameters with 85.1% of distributed revenues as calculated from its 	2014 annual revenue report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the authors' knowledge, the U.S. has the least operations regulation for CMOs with the exception of reporting laws for those issuing statutory licenses. 	Anticompetitive consent decrees also prevent partial withdrawal from blanket licenses to ensure non-discrimination towards select services. Despite relaxed 	regulation, BMI and SoundExchange reported all identified parameters, while ASCAP and HFA reported five, with SESAC only having four. ASCAP, Sound 	Exchange, and BMI were the only ones to have published their annual revenue report, with percentage of revenue royalty calculated to 90.0%, 89.9%, and 	83.4% respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to reiterate however that information transparency demonstrated by CMOs website does not necessarily indicate effectiveness. Though not 	necessarily the most accurate indicator, there appeared no significant correlation between the percentage of distributed royalties, and amount of information found. All three countries have recently, or are currently undergoing regulatory reviews and reform to enhance copyright management.	&lt;i&gt;India's Copyright Amendment Act and Copyright Rules was &lt;/i&gt; a response to allegations of corruption and collusion of copyright societies. The legal 	status of certain CMOs and other private authorized agents not included here are ambiguous. Though they seem to function similarly to private CMOs in the 	US, whether they will be obliged to comply with copyright societies regulation is uncertain. The United States' Copyright Office has recently undergone a 	major study of the music licensing landscape. One of the major grievances highlighted was the disparity between negotiated sound recording rates and 	statutory rates of licenses for works of composers and publishers for the rapidly growing use of internet radio streaming. This disparity is furthered by 	the aforementioned Consent Decrees. In early 2014, the European Commission had also adopted the Collective Rights Management Directive with the main 	objectives of increasing transparency and efficiency of CMOs, and to facilitate cross-border licensing for music online. Thus, transparency and increased 	effectiveness of CMOs particularly in light of the digital age are being made a priority within legislation; and hopefully, in execution as well.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Through reviewing other CMO websites, a few learnings were found which could be adopted by Indian CMOs for enhanced transparency and effectiveness:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Publish a full repertoire of works the CMO is authorized to license with corresponding rights holder information.&lt;/b&gt; This recommendation stems from other CMO websites which present their administrable works in a searchable database, allowing users the ability to 	efficiently identify whether the work they seek to use are covered by the license.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Provide a platform for collectively identifying the due rights-holder of orphan works.&lt;/b&gt; This recommendation was a feature found in several other websites which lost contact with the rights holder through failure to update ownership information 	in the case of rights transfer, changes in contact details ,passing of the original author, unknown inheritance, and more.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Guide new users and potential members through a more user-friendly designed page with simplified, accessible introduction to music licensing. &lt;/b&gt; As exemplified by the layout of other websites, the webpage could be subdivided between information useful for prospective or current &lt;i&gt;licensees&lt;/i&gt;, 	and prospective or current &lt;i&gt;member rights-holders&lt;/i&gt;. Basic questions framed in accessible language can guide the website user to the correct 	information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Increase clarity surrounding royalty distribution policies.&lt;/b&gt; During the review, IPRS and ISRA's royalty distribution scheme were noticeably vague. Although ISRA noted the most crucial elements, certain details like 	how "reliable statistical data" were to be procured and calculated in the case of missing log sheets was absent. IPRS was even more obscure, noting their 	frequency of royalty distribution would occur "promptly, from time to time."&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Publish updated annual revenue reports.&lt;/b&gt; This document is probably one of the key indicators of how a CMO is doing financially, and it is important that these are made available so CMOs remain 	transparent and accountable to its rights-holder members and users.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Clarify dispute resolution processes.&lt;/b&gt; This is important particularly for those jurisdictions which do not allow much choice, if at all, 	between various institutions and rate-setting processes. Membership and representation would ideally provide and promote proper channels for raising and 	addressing grievances prior to seeking legal remedies.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="text-align: justify; "&gt;Further Questions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although a few insights were found through this review, the numerous limitations indicate a better designed exercise asking different, more nuanced 	questions may uncover some more fruitful conclusions. Future research could explore membership-exclusive data, and how reporting is presented across CMOs. 	From a legal standpoint, a more detailed analysis of regulations across different jurisdictions may shed light on different international standards of 	transparency and reporting. Additionally, given that the highest percentage of distributed royalties were from CMOs based in the U.S., the correlation 	leads to the question of whether more relaxed reporting requirements, or perhaps a competitive CMO structure can actually contribute to increased 	effectiveness? Lastly, given the increasingly complex licensing environment and continued creation of rights due to technological innovations, the 	feasibility of this system to monitor and finance music should be questioned as well. Further research on alternative compensation schemes considering 	tax-based, or patron-based financing will increasingly become more feasible and important systems to explore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;WORKS CITED&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Agarwal, Devika. "After IPRS, PPL next to Claim It Is Not a 'Copyright Society.'" &lt;i&gt;SpicyIP&lt;/i&gt;, n.d. 	http://spicyip.com/2015/03/after-iprs-ppl-next-to-claim-that-it-is-not-a-copyright-society.html.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Andrew. "Transparency and the Collective Management Organisations." &lt;i&gt;CREATe&lt;/i&gt;, October 1, 2014. 	http://www.create.ac.uk/blog/2014/10/01/transparency-and-the-collective-management-organisations.&lt;/li&gt;
&lt;li&gt;ASCAP. "Ascap Clearance Express (ACE) Search." &lt;i&gt;ASCAP We Create Music&lt;/i&gt;, n.d. https://www.ascap.com/Home/ace-title-search/index.aspx.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Basheer, Shamnad. "Indian Copyright Collecting Societies and Foreign Royalties: Whither Transparency?," November 18, 2008. 	http://spicyip.com/2008/11/indian-copyright-collecting-societies.html.&lt;/li&gt;
&lt;li&gt;BMI. "BMI Search." &lt;i&gt;BMI&lt;/i&gt;, n.d. http://www.bmi.com/search.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Centre for Internet and Society. "Research Proposal: Pervasive Technologies: Access to Knowledge in the Marketplace.," n.d. 	http://www.google.com/url?q=http%3A%2F%2Fcis-india.org%2Fa2k%2Fpervasive-technologies-research-proposal.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNF4hnAUXGIRMcUozZfs5QOFwvO55A.&lt;/li&gt;
&lt;li&gt;FICCI &amp;amp; KPMG. "The Stage Is Set: FICCI-KPMG Indian Media and Entertainment Industry Report 2014." Industry Report. FICCI-KPMG, 2014. 	https://www.kpmg.com/IN/en/Topics/FICCI-Frames/Documents/FICCI-Frames-2014-The-stage-is-set-Report-2014.pdf.&lt;/li&gt;
&lt;li&gt;Ficsor, Mihali. &lt;i&gt;Collective Management of Copyright and Related Rights&lt;/i&gt;. Geneva: WIPO, 2002. 	http://www.wipo.int/edocs/pubdocs/en/copyright/855/wipo_pub_855.pdf.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Future of Music Coalition. "ASCAP - BMI Consent Decrees." &lt;i&gt;Future of Music Coalition&lt;/i&gt;, October 3, 2014. 	https://futureofmusic.org/article/fact-sheet/ascap-bmi-consent-decrees.&lt;/li&gt;
&lt;li&gt;Harry Fox. "Songfile Search." &lt;i&gt;Songfile&lt;/i&gt;, n.d. https://secure.harryfox.com/songfile/termsofuse/publictermsofuse.do.&lt;/li&gt;
&lt;li&gt;HFA. "HFA Commission Rates." &lt;i&gt;HFA&lt;/i&gt;, n.d. https://www.harryfox.com/publishers/commission_rate.html.&lt;/li&gt;
&lt;li&gt;---. "Rate Charts," 2014. https://www.harryfox.com/find_out/rate_charts.html.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Huang, Maggie. "Copyright Management in the Age of Mobile Music," December 26, 2014. 	http://cis-india.org/a2k/blogs/copyright-management-in-age-of-mobile-music.&lt;/li&gt;
&lt;li&gt;IPRS. "Distribution Scheme As Per 17-5-2013." &lt;i&gt;Indian Performing Right Association&lt;/i&gt;, 2012. http://www.iprs.org/cms/IPRS/DistributionScheme.aspx.&lt;/li&gt;
&lt;li&gt;---. "The Indian Performing Right Society Limited.," n.d. http://www.iprs.org/cms/.&lt;/li&gt;
&lt;li&gt;ISRA. "About ISRA." &lt;i&gt;ISRA Copyright&lt;/i&gt;, n.d. http://isracopyright.com/about_isra.php.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Philipes, Richard Hayes. "How One Independent Musician Defeated BMI." &lt;i&gt;Woodpecker.com&lt;/i&gt;, 2003. 	http://www.woodpecker.com/writing/essays/phillips.html.&lt;/li&gt;
&lt;li&gt;PPL. "About Us." &lt;i&gt;Phonographic Performance LImited&lt;/i&gt;, n.d. http://www.pplindia.org/aboutus.aspx.&lt;/li&gt;
&lt;li&gt;---. "PPL Member/Label Search," n.d. 	http://repsearch.ppluk.com/ars/faces/pages/licenseSearch.jspx?_afrWindowMode=0&amp;amp;_afrLoop=6609527708771000&amp;amp;_adf.ctrl-state=17ajb42h7o_4.&lt;/li&gt;
&lt;li&gt;PPL UK. "Annual Review 2014." Annual Revenue Report, 2014. http://www.ppluk.com/Documents/Annual%20reviews/PPL_Annual_Report_2014.pdf.&lt;/li&gt;
&lt;li&gt;PRS for Music. "PRS for Music 2014 Review." Annual Review, 2014. 	https://www.prsformusic.com/SiteCollectionDocuments/About%20MCPS-PRS/financial-results/prs-for-music-financial-review-2014.pdf.&lt;/li&gt;
&lt;li&gt;Reddy, Prashant. "Did the Big Music Companies on IPRS &amp;amp; PPL Collude to Deny Lyricists and Composers Crores of Rupees in 'Ringtone Royalties? - An 	Investigation." Http://spicyipindia.blogspot.in/2011/02/did-big-music-companies-on-iprs-ppl.html. &lt;i&gt;Spicy IP&lt;/i&gt;, February 14, 2011. 	http://spicyipindia.blogspot.in/2011/02/did-big-music-companies-on-iprs-ppl.html.&lt;/li&gt;
&lt;li&gt;Reid, Harvey. "ASCAP &amp;amp; BMI - Protectors of Artists or Shadowy Thieves?" &lt;i&gt;Wooedpecker.com&lt;/i&gt;, 1993. 	http://www.woodpecker.com/writing/essays/royalty-politics.html.&lt;/li&gt;
&lt;li&gt;SESAC. "Repertory Seearch." &lt;i&gt;SESAC&lt;/i&gt;, n.d. https://www.sesac.com/repertory/RepertorySearch.aspx?x=100&amp;amp;y=22.&lt;/li&gt;
&lt;li&gt;---. "SESAC Announces the Appointment of John Josephson as Chairman and CEO of SESAC," July 31, 2014. http://www.sesac.com/News/News_Details.aspx?id=2109.&lt;/li&gt;
&lt;li&gt;Smirke, Richard. "U.K. Music Industry Sets Trade Mission to India." &lt;i&gt;Billboard&lt;/i&gt;, September 4, 2014. 	http://www.billboard.com/articles/business/6243633/ukti-aim-bpi-trade-mission-india-mumbai.&lt;/li&gt;
&lt;li&gt;Sound Exchange. "Sound Exchange Draft Annual Report 2013." Annual Report. Sound Exchange, 2013. 	http://www.soundexchange.com/wp-content/uploads/2014/03/2013-Fiscal-Report-PRE-AUDIT.pdf.&lt;/li&gt;
&lt;li&gt;Stopps, David. "How to Make a Living from Music." Creative Industries. WIPO, 2013. http://www.wipo.int/edocs/pubdocs/en/copyright/939/wipo_pub_939.pdf. &lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; FICCI &amp;amp; KPMG. "The Stage Is Set: FICCI-KPMG Indian Media and Entertainment Industry Report 2014." 			https://www.kpmg.com/IN/en/Topics/FICCI-Frames/Documents/FICCI-Frames-2014-The-stage-is-set-Report-2014.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Centre for Internet and Society. "Research Proposal: Pervasive Technologies: Access to Knowledge in the Marketplace.," 			http://www.google.com/url?q=http%3A%2F%2Fcis-india.org%2Fa2k%2Fpervasive-technologies-research-proposal.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNF4hnAUXGIRMcUozZfs5QOFwvO55A.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Huang, Maggie. "Copyright Management in the Age of Mobile Music," December 26, 2014. 			http://cis-india.org/a2k/blogs/copyright-management-in-age-of-mobile-music.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/copyright-management-in-age-of-mobile-music"&gt; &lt;/a&gt; Reddy, Prashant. "The Background Score to the Copyright (Amendment) Act." &lt;i&gt;NUJS Review&lt;/i&gt; 5, no. 4 (2012). 			http://nujslawreview.org/wp-content/uploads/2015/02/01_prashant.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Smirke, Richard. "U.K. Music Industry Sets Trade Mission to India." &lt;i&gt;Billboard&lt;/i&gt;, Sept 4, 2014. 			http://www.billboard.com/articles/business/6243633/ukti-aim-bpi-trade-mission-india-mumbai.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; IPRS. "The Indian Performing Right Society Limited.," http://www.iprs.org/cms/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; PPL. "About Us." &lt;i&gt;Phonographic Performance LImited&lt;/i&gt;, n.d. http://www.pplindia.org/aboutus.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; ISRA. "About ISRA." &lt;i&gt;ISRA Copyright&lt;/i&gt;, n.d. http://isracopyright.com/about_isra.php.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Agarwal, Devika. "After IPRS, PPL next to Claim It Is Not a 'Copyright Society.'" &lt;i&gt;SpicyIP&lt;/i&gt;, Mar 30 2015. 			http://spicyip.com/2015/03/after-iprs-ppl-next-to-claim-that-it-is-not-a-copyright-society.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Reid, Harvey. "ASCAP &amp;amp; BMI - Protectors of Artists or Shadowy Thieves?" &lt;i&gt;Wooedpecker.com&lt;/i&gt;, 1993. 			http://www.woodpecker.com/writing/essays/royalty-politics.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Basheer, Shamnad. "Indian Copyright Collecting Societies and Foreign Royalties: Whither Transparency?," November 18, 2008. 			http://spicyip.com/2008/11/indian-copyright-collecting-societies.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Philipes, Richard Hayes. "How One Independent Musician Defeated BMI." &lt;i&gt;Woodpecker.com&lt;/i&gt;, 2003. 			http://www.woodpecker.com/writing/essays/phillips.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; ASCAP. "Ascap Clearance Express (ACE) Search." &lt;i&gt;ASCAP We Create Music&lt;/i&gt;, https://www.ascap.com/Home/ace-title-search/index.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; BMI. "BMI Search." &lt;i&gt;BMI&lt;/i&gt; http://www.bmi.com/search.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; SESAC. "Repertory Seearch." &lt;i&gt;SESAC&lt;/i&gt;, https://www.sesac.com/repertory/RepertorySearch.aspx?x=100&amp;amp;y=22.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Harry Fox. "Songfile Search." &lt;i&gt;Songfile&lt;/i&gt;,&lt;/p&gt;
&lt;p&gt;https://secure.harryfox.com/songfile/termsofuse/publictermsofuse.do.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; PPL. "PPL Member/Label Search," 			http://repsearch.ppluk.com/ars/faces/pages/licenseSearch.jspx?_afrWindowMode=0&amp;amp;_afrLoop=6609527708771000&amp;amp;_adf.ctrl-state=17ajb42h7o_4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Reddy, Prashant. "Did the Big Music Companies on IPRS &amp;amp; PPL Collude to Deny Lyricists and Composers Crores of Rupees in 'Ringtone Royalties? - 			An Investigation." http://spicyipindia.blogspot.in/2011/02/did-big-music-companies-on-iprs-ppl.html. &lt;i&gt;Spicy IP&lt;/i&gt;, Feb 14 2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Stopps, David. "How to Make a Living from Music." Creative Industries. WIPO, 2013. 			http://www.wipo.int/edocs/pubdocs/en/copyright/939/wipo_pub_939.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; SESAC. "SESAC Announces the Appointment of John Josephson as Chairman and CEO of SESAC," July 31, 2014. 			http://www.sesac.com/News/News_Details.aspx?id=2109.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Although it is important to note that each work can only be registered exclusively to one society, so the catalogs won't be identical.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Future of Music Coalition. "ASCAP - BMI Consent Decrees." &lt;i&gt;Future of Music Coalition&lt;/i&gt;, October 3, 2014. https://futureofmusic.org/article/fact-sheet/ascap-bmi-consent-decrees.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; HFA. "Rate Charts," 2014. https://www.harryfox.com/find_out/rate_charts.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; IPRS. "Distribution Scheme As Per 17-5-2013." &lt;i&gt;Indian Performing Right Association&lt;/i&gt;, 2012. 			http://www.iprs.org/cms/IPRS/DistributionScheme.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; HFA. "Rate Charts," 2014. https://www.harryfox.com/find_out/rate_charts.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; However, it is important to note the major limitations of these numbers in making any sort of conclusions due to data acquired from different 			years, varying geographies, without accounting for differing mandates and non-royalty collection activities. More reflections on this in the 			Limitations and Learnings Section&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; "Sound Exchange Draft Annual Report 2013." Annual Report. Sound Exchange, 2013. 			http://www.soundexchange.com/wp-content/uploads/2014/03/2013-Fiscal-Report-PRE-AUDIT.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; "HFA Commission Rates." &lt;i&gt;HFA&lt;/i&gt;, https://www.harryfox.com/publishers/commission_rate.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; PPL UK. "Annual Review 2014." Annual Revenue Report, 2014. http://www.ppluk.com/Documents/Annual%20reviews/PPL_Annual_Report_2014.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; PRS for Music. "PRS for Music 2014 Review." Annual Review, 2014. 			https://www.prsformusic.com/SiteCollectionDocuments/About%20MCPS-PRS/financial-results/prs-for-music-financial-review-2014.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Rochelandet, Fabrice. "Are Copyright Collecting Societies Efficient? An Evaluation of Collective Administration of Copyright in Europe." 			Universidad Autónoma de Madrid, 2002.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Resnikoff, Paul. "New Zealand Invents the 'Single Music License' for ALL Performances…." &lt;i&gt;Digital Music News&lt;/i&gt;, September 30, 2013. 			http://www.digitalmusicnews.com/permalink/2013/09/30/newzealand.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ficsor, Mihali. &lt;i&gt;Collective Management of Copyright and Related Rights&lt;/i&gt;. Geneva: WIPO, 2002. 			http://www.wipo.int/edocs/pubdocs/en/copyright/855/wipo_pub_855.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Andrew. "Transparency and the Collective Management Organisations." &lt;i&gt;CREATe&lt;/i&gt;, October 1, 2014. 			http://www.create.ac.uk/blog/2014/10/01/transparency-and-the-collective-management-organisations.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa'&gt;https://cis-india.org/a2k/blogs/comparative-transparency-review-of-collective-management-organisations-in-india-uk-usa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maggie</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-08-21T17:12:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/blog_understanding-tagores-music-on-youtube">
    <title>'Originality,' 'Authenticity,' and 'Experimentation': Understanding Tagore’s Music on YouTube</title>
    <link>https://cis-india.org/raw/blog_understanding-tagores-music-on-youtube</link>
    <description>
        &lt;b&gt;This post by Ipsita Sengupta is part of the 'Studying Internets in India' series. In this essay, she explores the responses to various renditions of songs composed by Rabindranath Tagore available on YouTube and the questions they raise regarding online listening cultures and ideas of authorship of music. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;On typing “Rabindra Sangeet” on YouTube, one finds videos of the concerned Bengali songs in diverse visual and aural compositions. Just like for every other type of video that is put up on the site, as interesting as the videos may be, is the feedback they receive.&lt;/p&gt;
&lt;p&gt;At the centre of this essay are such videos found on the social media platform YouTube, ones that play Rabindra Sangeet. Literally, “Songs of Rabindra(nath)”, this is a term used to identify poetic and musical pieces penned and composed in the late 19th- early 20th centuries by the Bengali writer and artist Rabindranath Tagore. The body of work has today become a genre among Indian music.&lt;/p&gt;
&lt;p&gt;User-generated expression of YouTube makes it a medium with simultaneous individual and group dynamics. Apart from feedback as quantitative data through “Views”, “Likes” and “Dislikes”, the opinions of many users can be found in the “Comments” section.&lt;/p&gt;
&lt;p&gt;Visuals of YouTube song videos of Rabindra Sangeet are diverse. So are renditions, with solitary or duet or band performances, and with varying rhythm and instrumental accompaniment. The set of comments below each video sometimes take the form of a conversation. Between applause and criticism, the latter is of special interest here.&lt;/p&gt;
&lt;p&gt;Content of specific kinds seem to face disapproval: visual montages and stills from contemporary cinema, like images of urban youth, romance, longing. Some have shots of band performers and some, album cover images. Some of these renditions can be categorized as remixes because of their fast pace, bouncy vocals and electronic melody. The comments in question reflect and reveal hurt sentiments of people trying to preserve some kind of sanctity and authenticity of Rabindra Sangeet.&lt;/p&gt;
&lt;p&gt;They state in different ways that the ethics of presenting the genre have been violated, via their notation and design; either by either makers of the film in the song’s incorporation, or by the way young pop stars have been placed in particular montages.&lt;/p&gt;
&lt;p&gt;Here are some comments below to illustrate what audiences find wrong. The video is embedded below, followed by the comments posted on the video page.&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/cjRLkITYhqk?rel=0" frameborder="0" height="360" width="640"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What a rubbish song! Just remember please that Rabindra sangeet is not for Band musicians ! Please do not distort Rabindra sangeet. Only idiots will try to do so. Shame on you lot !
&lt;/li&gt;&lt;li&gt;Unfortunately these band party can never be anything like that great man....hence they should stop making fun of his creation....&lt;/li&gt;
&lt;li&gt;This song is from Shyama and I think that the innocent beauty of a young boy falling in love with a court dancer. The arrangement does not suit the lyrics.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/lSgEsoGGZjQ?rel=0" frameborder="0" height="360" width="480"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Who has sung this? Started well, but after a while it changed the melody on its own. Only Bengalis are so indecent to change the work of the composer while performing. But otherwise, the voice is promising.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/oCmdFo3felo?rel=0" frameborder="0" height="360" width="480"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Robindra shongoter ijjot nosto kore dise... super dislike... (“They have destroyed the dignity of Rabindra Sangeet... super dislike...”)&lt;/li&gt;
&lt;li&gt;Henshit! rock does not suit to melody and classics. Don't fusion "Sangeet"/ folk/patriotic songs.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/VGM-T5cME-4?rel=0" frameborder="0" height="360" width="480"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rabindra sangeet is usually better off with minimum instrumental accompaniment. That is why the Kishore Kumar version is more appealing. And the maestro Hemanta Mukherji used only a harmonium and tabla for most of his superb renditions.&lt;/li&gt;
&lt;li&gt;Simply bogus. In Bengali... Shreya r nyaka voice just intolerable (“Shreya's coquettish voice just intolerable”).&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/yer7wAJdHSA?rel=0" frameborder="0" height="360" width="480"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;some confused experiments with a song rendered by many exponents. This singer in his misguided modernism mostly misses the target.&lt;/li&gt;
&lt;li&gt;bhalo lagche na shunte...Rabindra Nath er gaan er opor please bekar improvisation ta korben na...onar opor churi kachi ta nai ba chalalen... (“I am not enjoying listening to this... please do not do useless improvisations on Rabindranath's songs... do not use knives and scissors on him...)&lt;/li&gt;
&lt;li&gt;… Tomra please originality maintain kore experiment koro … (...Could you please maintain originality while experimenting...)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/WfHX5y-xI2w?rel=0" frameborder="0" height="360" width="480"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;...Go listen to the original tagore score and then come here with some innovative posts, k?&lt;/li&gt;
&lt;li&gt;Absolutely bogus. Very badly sung. Who the hell is the singer? It has Jhankar beats too!!! Who the hell is the music director? Shame that people of such low taste and caliber are directing Bengali movies nowadays. Maobadi der diye petano uchit eder (“They should be beaten up by the Maoists)!!!!!&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.youtube-nocookie.com/embed/-ywjZshLBrI?rel=0" frameborder="0" height="480" width="640"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;THere should be a self imposing limit of Screwing rabindra sangeet.&lt;/li&gt;
&lt;li&gt;F...king Indian Hindi speaking bas....ds&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is not to say that these voices reign supreme. The listeners who enjoy the works leave great appreciation and also debate with the naysayers. But here I am taking into account the criticism that the videos receive. They have turned out to be more descriptive than the appreciation, and because of this they open up a lot of questions. We observe them in the light of both the medium as well as some understanding of the artistic ideals Tagore aspired to in his lifetime. The complete list of URLs of videos with their comments is given in the bibliography.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;The Poetic/Musical Works of Tagore and Technologies of Access&lt;/h2&gt;
&lt;p&gt;Tagore was born in 1858 in a wealthy landowning household in Bengal. In his growing up years, the household Jorasanko was a space where Western and Indian lifestyles and artistic developments coexisted. Besides his own training in musical performance, and education and cultural exposure abroad, he also grew up amidst the rich musical, literary and theatrical talent of his family members.&lt;/p&gt;
&lt;p&gt;Tagore was impressed and inspired by all kinds of artists and musical styles, and traces of these are found in his compositions and lyrics- whether folk, the ritualistic &lt;em&gt;Kirtan&lt;/em&gt;, the mystic &lt;em&gt;Bauls&lt;/em&gt; of rural Bengal, or even songs native to the West. For example the Scottish song ‘Auld Lang Syne’ influenced ‘purano shei diner kotha’ and ‘Ye banks and braes’ inspired ‘phule phule dhole dhole’ (Som, 2009).&lt;/p&gt;
&lt;p&gt;From a young age itself, the poet was uncomfortable with strict boundaries and rules, one of them being the tight-rope walk over &lt;em&gt;Raaga&lt;/em&gt;-based notations and rhythm structures of Indian classical music. He did believe in the power of &lt;em&gt;Raagas&lt;/em&gt; to evoke the emotion they were said to be designed for, and while placing his poetry in musical compositions, he based his tunes on &lt;em&gt;Raagas&lt;/em&gt; depending on the mood of his verse. However, he would combine melodic characteristics of established &lt;em&gt;Raagas&lt;/em&gt; very often- a common practice with artists resulting in “mishra”, or mixed &lt;em&gt;Raagas&lt;/em&gt;. He even combined rhythms or &lt;em&gt;Taala&lt;/em&gt;s, and designed new ones for his songs. He found the classical genre embellishments of &lt;em&gt;Taan&lt;/em&gt; and &lt;em&gt;Aalaap&lt;/em&gt; unnecessary and left them out. “He declared his songs to be his unabashed expression of modernity because in them he could escape adhering to any expected literary standard” (Som, 2009).&lt;/p&gt;
&lt;p&gt;Tagore lived in an era when Indian classical music was being written down with notations which were intelligible to Western audiences. Though he put on paper notations for his own songs, it so happened sometimes that when he was asked to sing in a public gathering, he could not remember the exact composition he’d first created. He would improvise immediately and complete the performance successfully.
There were also times when his students or family members would sing their own interpretation of his tunes. Though his contemplation on it was based on a personal judgment of how well they adapted what he'd taught and how talented they were, he realised that the other singer was “not a gramophone” and he’d have to “grant that artistic independence” (Som, 2009).&lt;/p&gt;
&lt;p&gt;“The art with which he matched melody with each nuanced lyric or combined ragas and improvised novel musical expressions, made each song a gem to be discovered anew everytime it is sung” (ibid, 2009).  We may admit this but through this thought we may also understand that every live vocal rendition is intangible, however much we stick to notations.&lt;/p&gt;
&lt;p&gt;In the electronic age, however much we record a rendition on devices, it is stored as data taking up space. Data is a common form that text, visuals, and audio all take. Though some recordings of Tagore's voice can be found online, they are digital versions that have been converted from the analog. Besides the technical transition, today's listener is also accessing it through a device and not listening to him performing. Two dynamics could happen here: either his performances are immortalised by the technology which has collected the sound of his voice in the exact way he has performed them and audiences will form an idea of “authentic” or “original”. And the other is that the audience will understand that in his time, when his voice was recorded, effects like electronic disco beats had not been invented.&lt;/p&gt;
&lt;p&gt;That way, the performances of Tagore's verses that we are witnessing on YouTube today are the tangible notations combining with fresh new thought processes and constantly changing music performance styles, and manifesting on a contemporary media space. It is beyond just a copy, as we will see later, and to put it in Tagore's own words, it is “not a gramophone”.&lt;/p&gt;
&lt;p&gt;Perhaps the accompanying instruments that were recommended for the verses have been replaced in a particular video with other and/or newer sources of musical sound- like digital sound. And the visuals in the video were probably not what the author was familiar with in his lifetime- body language of human actors, their clothes, the cityscape, and the like. In the film clips and non-cinematic material of Rabindra Sangeet videos, contemporary visuals include digital copies of photographs of Tagore and his contemporaries that help us make sense of his era.&lt;/p&gt;
&lt;p&gt;“Adapting Chion’s theorisation of Dolby sound, the aesthetics of the remix may be thought of not as a consequence of technical changes but rather as the way in which technology combines with different musics to create the remix” (Duggal, 2010). It's not that new technology like electronic beats happens to an old composition when time passes and corrupts it like fungus or dust, it is that one one applies new aesthetics to an older text to innovate.&lt;/p&gt;
&lt;p&gt;Describing the prime place of music in the hierarchy of sound in the cultural history of the West, Kahn discussed the phobia of sound that was not “significant” (Kahn, 2003). For a long time, sounds that reproduced the world for us- such as ambient sounds or noise- and which came via machines instead of established musical instruments were not considered valid within music. His stand in this context was that “it would make more sense to experience artistic works in their own right, not how they might conform to gross categorical distinctions”.&lt;/p&gt;
&lt;p&gt;Given the artistic spontaneity which Tagore believed in, and the changing technology, what do we mean when we say that Rabindra Sangeet is being “distorted”, or its dignity (“ijjot”) or “innocence” threatened? What is the misunderstood modern? What is this “original” missing from “experimentation”? Especially when the composer himself is not witness to the forms his songs are taking today, what is this imagination of the ideal performance that leads to the judgment that another type of performance is not acceptable?&lt;/p&gt;
&lt;p&gt;Perhaps at this point we can also shine a tiny light on Tagore's beliefs in other spheres. “Nationalism” is a compilation of a series of lectures given around the world, which Tagore gave in the 1916-‘17. In the introduction to this compilation, Guha illustrates Tagore’s realisation that mindless boycotting of everything that the West introduced in India in the name of Swadeshi (which he used to support) was to throw out the baby with the bath water. Quoting a letter Tagore wrote to a friend in 1908, he writes, “ ‘I will not buy glass for the price of diamonds and I will never allow patriotism to triumph over humanity as long as I live” ’ (Guha, 2009).&lt;/p&gt;
&lt;p&gt;Soon after delivering these lectures in US and Japan, the Visva Bharati University was founded in December 1918. Tagore envisioned “a synthesis of the East and the West through a healthy intellectual and cultural interaction” (Som, 2009). Ironically, Visva Bharati, for over six decades after his death, held a copyright on Tagore’s work and assumed exclusive right of approval over song recordings of how notations were to be followed.&lt;/p&gt;
&lt;p&gt;Surely it is not only due to a lack of understanding of Tagore's ideals that some renditions are marked as &lt;em&gt;wrong&lt;/em&gt;? Many who don't appreciate the new versions may actually be well aware of his life story or beliefs. At various instances, the beats, the voice, the performers are targeted. Can we put a finger on the problem? Does it have something to do with the means of interaction of the medium? What is this search for the authentic or the correct? Is there a xenophobia of generational shifts in lifestyle - the opposition to a lifestyle because that is the “other” of a fantasy of tradition, it is not “high culture”? Because internet access transcends boundaries of class, education, and generation?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Mechanical Reproduction and Digital Media&lt;/h2&gt;
&lt;p&gt;In the early 20th century, when Tagore was writing his songs, in another part of the world political thinker Benjamin wrote in his timeless essay that when a work of art is mechanically reproduced, when there are only copies and the “original” in a particular place and space in history loses significance, its distribution boosts its “exhibition value” (Benjamin, 1936). “The work of art becomes a creation with entirely new functions, among which the one we are conscious of, the artistic function, later may be recognized as incidental.” The “social significance” (ibid.) of an art work increases with multiple reproductions of it reaching the masses because the ritual value of it goes down, and it becomes open to as much criticism as enjoyment or reverence.&lt;/p&gt;
&lt;p&gt;On social media spaces this democracy is visible on the same page- such as the “Comments” discussion. The “aura” (ibid.) of the “original” Tagore cannot exist in the flux of digital reproductions and uploads of individual creations- how valid then is the fight over it? Or is it in fact a fear of losing in this flux a memory of something revered? Does that imagined revered have something to do with defining and maintaining a community identity in this passageway of a multitude of identities that is the internet?&lt;/p&gt;
&lt;p&gt;One of the integral features of a social media space is the option of “sharing” the content, i.e., individuals transmit it further to other users. While YouTube’s Likes and Comments give the content a boost and analytics from YouTube automatically circulate this more “popular” content, individual users have a major role in the circulation of online content.&lt;/p&gt;
&lt;p&gt;Besides directly sharing, they can take either the audio or visual aspects of a video piece, restructure or redesign the piece, creating as a result an all new video and circulating that. Through “appropriation and reproduction”, “the web in general, and the web video in particular intensify the culture of the copy, for it provides its users free access to an immense database of ready-to-use information” (Vanderbeeken, 2011).&lt;/p&gt;
&lt;p&gt;Someone may download from elsewhere an audio composition used earlier in a video of “concentration music”, attach it to different visuals, and upload it back on YouTube under “relaxation music”. After all, as studies have found, the response to one’s online content through mechanisms such as “likes” give the author a sense of gratification and encourages him/her to keep checking notifications every few minutes- on various social media platforms.&lt;/p&gt;
&lt;p&gt;In such a situation, “the original creator suddenly occupies the position of yet another spectator. Within this process, the role of transmitters is so important that they assume a vague position of authority over the works” (Menotti, 2011). Through its one on one connection with the spectator, each individual video exists as an independent entity subject to active, on the spot feedback as well as manipulation by every individual who watches it. And of course, circulation is in the hands of each viewer resulting in content originating as altogether new information.&lt;/p&gt;
&lt;p&gt;At this juncture I would like to make an intervention using a formulation by Frith, about the fluid, transitional nature of identity. “It is in deciding- playing and hearing what sounds right- that we both express ourselves, our own sense of rightness, and suborn ourselves, lose ourselves, in an act of participation” (Frith, 1996).&lt;/p&gt;
&lt;p&gt;Let us take for example, another type of video found on YouTube. Instrumental pieces of music with descriptions such as “music for concentration”, “study music”, and even “brain music”. If we break down the description along these lines, we have firstly, tunes of any kind and varying pace on string and wind instruments. Then colourful visuals of mostly natural landscapes, the human body, or graphical representations of the “mind”. The written word accompanies the frame, and each aspect combines to add meaning to the other two.&lt;/p&gt;
&lt;p&gt;Just because the label says that the music will enhance concentration, does it always have that effect? Our everyday experiences with the audio-visual would have surely shown us that the design of a composition- both musical and cinematic- does not necessarily make everyone feel the same way. Moreover, the credibility of video descriptions is always subject to doubt, as discussed above.&lt;/p&gt;
&lt;p&gt;We see thus that in case of online media, it holds true all the more that one acquires or asserts an identity in playing/listening to a performance of some sort of music and adding opinions below, as much as the performance or presentation itself. We can actually trace this to a perspective that a remixed video is a form of feedback too- to an earlier understanding of Rabindra-Sangeet by the maker who thought that the genre could be expressed this way as well. “The intrinsic relationship of ‘original’ to ‘imitation’ is weakened” (Vanderbeeken, 2011), and this is where digital media picks up from where analog technology left off.&lt;/p&gt;
&lt;p&gt;In such an interaction, between human beings exchanging data with equal authorship over it, could YouTube be playing a role in the “production of the rhetoric of the classical and canonical” (Duggal, 2010) around a historical figure from eastern India, where some audio-visual images are acceptable to his definition and others not?&lt;/p&gt;
&lt;p&gt;An older and a newer understanding of the same cultural object co-exist on one space such as the standardised video frames of YouTube. Alongside Tagore's voice are those of Kishore Kumar, Hemant Kumar, Jayati Chakraborty, Shreya Ghoshal, and many others. A sense of the “original” exists beyond Tagore's voice because everybody has not sung it fast- if its rules were to go slow. And if somebody wants to give a tribute to Rabindra Sangeet by pepping it up, he/she obviously must not have meant to “ruin” it.&lt;/p&gt;
&lt;p&gt;Is it the anonymity of the Comments space which makes the discussions the way they are? Because one cannot see the person who has uploaded it and is confident that what they were taught was the only truth- the uploader/ content creator probably comes across as an imposter.&lt;/p&gt;
&lt;p&gt;But maybe this search for the “correct”  rendition is a search for political correctness in a world densely connected through information technology, where one's identity through a databank of online searches does not belong just to oneself but to corporations and advertisers too. Could there also be people who believe that the very act of having Rabindra Sangeet online is a mismatch of the authentic Tagore experience- because the internet is not from his time or geographical location?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;As described earlier, when Tagore composed his music largely based on the notational arrangements prescribed by &lt;em&gt;Raagas&lt;/em&gt;, he removed what he determined were complications of the indigenous classical music system. What he retained were what he comprehended as the moods evoked by particular &lt;em&gt;Raagas&lt;/em&gt;, and engineered several songs on selected rules of different &lt;em&gt;Raagas&lt;/em&gt;. In the process, he created a genre which those who were not fortunate enough to get formal training in the classical grammar of music could sing and engage in.&lt;/p&gt;
&lt;p&gt;From the point of view of pure classical renditions being “high art”, Rabindra Sangeet thus could not fit into that umbrella. But it was popular and regarded because it spoke to the people, as a result of which it is still given a special place in collective memory after 100 years. Thus we see that “in terms of aesthetic process there is no real difference between high and low music” (Frith, 1996).&lt;/p&gt;
&lt;p&gt;Social media exposes today that musical spontaneity has constraints in the collective memory of forms. Proving at the same time that music truly cannot be contained- since it has such diverse imaginations of the “real” at a time when the author is not alive any more. Tagore was “comfortable in the knowledge that his songs were like wild flowers” (Som, 2009), drawing from natural landscapes and human emotions. Is YouTube telling us that in this century, some consumers of his music might be narrowing down definitions of “significant sound” to identity politics around a literary figure and his homeland? Or simply trying to hold on to something familiar in an ever changing zone, resisting- perhaps unconsciously- an attempt by others to reinterpret it through their reality or sense of beauty?&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Bibliography&lt;/h2&gt;
&lt;p&gt;Benjamin, Walter. 1936. The Work of Art in the Age of Mechanical Reproduction. Trans. Harry Zohn. Ed. Hannah Arendt. Schocken/Random House, 2005. &lt;a href="https://www.marxists.org/reference/subject/philosophy/works/ge/benjamin.htm" target="_blank"&gt;https://www.marxists.org/reference/subject/philosophy/works/ge/benjamin.htm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Duggal, Vebhuti. The Hindi Film Song Remix: Memory, History, Affect. Diss. Jawaharlal Nehru University, 2010.&lt;/p&gt;
&lt;p&gt;Frith, Simon. “Music and Identity”. Questions of Cultural Identity. Eds. Stuart Hall and Paul du Gay. Sage Publications, 1996.&lt;/p&gt;
&lt;p&gt;Guha, Ramachandra. Introduction. Nationalism. Rabindranath Tagore. Penguin Books, 2009.&lt;/p&gt;
&lt;p&gt;Kahn, Douglas. “The Sound of Music”. The Auditory Culture Reader. Eds. Michael Bull and Les Black. Berg Publishers, 2003.&lt;/p&gt;
&lt;p&gt;Menotti, Gabriel. “Objets Propages: The Internet Video as an Audiovisual Format”. Video Vortex Reader II: Moving Images Beyond YouTube. Eds. Geert Lovink and Rachel Somers Miles. INC Reader #6, 2011.&lt;/p&gt;
&lt;p&gt;Som, Reba. Rabindranath Tagore: The Singer and his Song. Penguin Books India, 2009.&lt;/p&gt;
&lt;p&gt;Tagore, Rabindranath. Nationalism. Macmillan and Co. Ltd., 1918.&lt;/p&gt;
&lt;p&gt;Vanderbeeken, Robrecht. “Web Video and the Screen as a Mediator and Generator of Reality”. Video Vortex Reader II: Moving Images Beyond YouTube. Eds. Geert Lovink and Rachel Somers Miles. INC Reader #6, 2011.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The post is published under &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Creative Commons Attribution 4.0 International&lt;/a&gt; license, and copyright is retained by the author.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/blog_understanding-tagores-music-on-youtube'&gt;https://cis-india.org/raw/blog_understanding-tagores-music-on-youtube&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ipsita Sengupta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Media</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2016-07-07T02:18:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/news/civic-brics-forum">
    <title>Civic BRICS Forum 2015</title>
    <link>https://cis-india.org/a2k/news/civic-brics-forum</link>
    <description>
        &lt;b&gt;I attended the Civil BRICS Forum in Moscow last month. My session fell under the Economics and Trade category; and I spoke on the importance of maintaining a balanced IP regime, strengthening access to knowledge and medicines, and ensuring free speech and innovation. The event was held in Moscow from June 29 to July 1, 2015.&lt;/b&gt;
        &lt;p&gt;The working group also invited comments to the Zero draft recommendations and I drafted a quick response to the problematic aspects of the draft. See the &lt;a class="external-link" href="http://www.civilbrics.ru/upload/iblock/98f/98ff0311a446ba25e9349b744e017df4.pdf"&gt;Civic BRICS Forum Statement&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BRICS is a unique interactive format of the five largest and most dynamically developing countries - Brazil, Russia, India, China, and South Africa. BRICS member states in total occupied about a quarter of the land on the world map. The total population of the BRICS countries is about 40%. The cumulative gross domestic product (GDP) is about 26% of the global one. However, BRICS is not only a club intended to strengthen the economic impact of the rapidly developing countries, but as well a fundamentally new form of international or rather an inter-civilizational dialogue based on the principles of polycentricity, non-hierarchy and networking. Therefore it seems that BRICS is able to propose a new concept of equal interaction over all vectors of interstate cooperation: in the monetary sphere, allocation of resources, trade, political and human relations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Internet resource will help not only to get acquainted closer with history and activity of the BRICS club, to trace news and analytical articles on the agenda both the international process of BRICS, and Civil BRICS, but also to participate directly in Civil BRICS activity by means of forums of the Dialogues Internet platform.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of Panels&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Culture of BRICS countries 2015-2040: challenges for public administration (2 parts, longer session)&lt;/b&gt; &lt;br /&gt;D K Hari, Bharath Gyan&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Building racial, ethnic and religious tolerance and nondiscrimination, regulation of migration and integration of migrants (2 parts, longer session) &lt;/b&gt;&lt;br /&gt;Anasua Basu Rau Choudhary, ORF Kolkata&lt;/li&gt;
&lt;li&gt;&lt;b&gt;System of intellectual property protection and promotion of innovations &lt;br /&gt;&lt;/b&gt;Anubha Sinha, Programme Officer, Access to Knowledge&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BRICS and construction of a multipolar world &lt;br /&gt;&lt;/b&gt;Anchal Vohra, CNN-IBN&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;MDGs Implementation, SDGs and role of the BRICS countries &lt;/b&gt;&lt;br /&gt;Gautam Kirtane, ORF Mumbai&lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Social role ofintellectual property protection in healthcare &lt;/b&gt;&lt;br /&gt;Nilanjana Bose, GHS &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Modern global challenges and the role of the BRICS in ensuring peace and security &lt;/b&gt;&lt;br /&gt;Rajeswari Rajagopalan, ORF Delhi&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Sustainable Energy and Climate Change &lt;/b&gt;&lt;br /&gt;Sonali Mitra, ORF Delhi&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;The role of education and science in the development of human capital &lt;/b&gt;&lt;br /&gt;Aparna Sundaresan, ORF Mumbai &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Public healthcare development and access to medical services as priority of BRICS international development &lt;/b&gt;&lt;br /&gt; Anjali Nayyar, GHS &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Socially responsible trade as a tool for further economic development of the BRICS countries&lt;br /&gt; &lt;/b&gt;Nilanjan Ghosh, ORF Kolkata &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Economics in the finite world &lt;/b&gt;&lt;br /&gt;Rajrishi Singhal, Gateway House&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Non-Western view on the World's future &lt;/b&gt;&lt;br /&gt;Varun Sahni, JNU&lt;b&gt; &lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;BRICS and global South societies in addressing growing inequality &lt;/b&gt;&lt;br /&gt;Ashok Malik, ORF Delhi&lt;b&gt; &lt;br /&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Involvement of civil society in global governance and shaping the world’s future (open discussion) &lt;/b&gt;&lt;br /&gt;TCA Rangachari &lt;/li&gt;
&lt;li&gt;&lt;b&gt;BRICS New Development Bank: acting for the common good (open discussion) &lt;/b&gt;&lt;br /&gt;Samir Saran, ORF Delhi &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Food security and civil society &lt;/b&gt;&lt;br /&gt;Rahul Goswami, Centre for Social Markets &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Challenges and threats of the modern world: "color revolutions" and use of "soft power" &lt;/b&gt;&lt;br /&gt;Mihir Sharma, Business Standard &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Money as a Weapon (open discussion) &lt;/b&gt;&lt;br /&gt;Pranay Kothasthane, Takshashila Institution &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Green economy and innovative development (open discussion) &lt;/b&gt;&lt;br /&gt;Kanika Chawla, CEEW &lt;/li&gt;
&lt;li&gt;&lt;b&gt;Sustainable development of local administration: municipal and private innovative entrepreneurship projects &lt;br /&gt;&lt;/b&gt;Rumi Aijaz, ORF Delhi &lt;/li&gt;
&lt;li&gt;&lt;b&gt;BRICS educational space: ways to strengthen scientific and academic ties. Aiming at high quality education (open discussion)&lt;br /&gt; &lt;/b&gt;Dhaval Desai, ORF Mumbai&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Disease prevention and promotion of healthy lifestyles among children and youth from BRICS-countries (open discussion)&lt;/b&gt; &lt;br /&gt;Sarah Farooqui, Takshashila Institution&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/a2k/blogs/civic-brics.pdf" class="external-link"&gt;&lt;b&gt;Download the schedule&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/news/civic-brics-forum'&gt;https://cis-india.org/a2k/news/civic-brics-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-08-10T14:27:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights">
    <title>Studying the Internet Discourse in India through the Prism of Human Rights</title>
    <link>https://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights</link>
    <description>
        &lt;b&gt;This post by Deva Prasad M is part of the 'Studying Internets in India' series. Deva Prasad is Assistant Professor at the National Law School of India University (NLSIU), Bangalore. In this essay, he analyses key public discussions around Internet related issues from the human rights angle, and explores how this angle may contribute to understanding the features of the Internet discourse in India.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The significance of Internet as an important element and tool in day-to-day life of mankind is an established experiential fact. The intrinsic value that Internet brings to our lives has transformed the access to Internet as a necessity. Internet’s intrinsic value acts an enabling tool for information, communication and commerce to be effectively and expeditiously carried forward. It is to due to this enormous intrinsic value attached with Internet that there is an emerging trend of exploring Internet from the perspective of human rights. Moreover, Internet as a medium also helps in furtherance of human rights [1]. Social movements have attained a new lease of life with the digital activism over Internet. Arab spring is an epitome of this phenomenon.&lt;/p&gt;
&lt;p&gt;There is an emerging positive trend of linking established norms of human rights with Internet. The Report of the Special Rapporteur on the right to freedom of opinion and expression has vividly explained the possibility and feasibility of extending and extrapolating the right of freedom of opinion and expression to Internet medium (Article 19 of the UDHR and the ICCPR) [2]. The Special Rapporteur also highlights the need to have access to Internet for effective enjoyment of right to freedom of opinion and expression in the digital sphere. The UN High Commissioner on Human Right’s report on‘The Right To Privacy In The Digital Age’ also explicitly highlights the significance of protecting the right to privacy in the internet medium in light of extensive “surveillance and the interception of digital communications and the collection of personal data” [3]. The extensive interception and blocking of the online communication is also a pertinent reason, which calls for human right protection to be extended to Internet.&lt;/p&gt;
&lt;p&gt;The WSIS Declaration for Building of Information Society [4] and the Charter of Human Rights and Principles for the Internet [5] also have played a significant role in furthering the inter-linkage between human rights and Internet.&lt;/p&gt;
&lt;p&gt;The Internet and human rights policy developments have gathered significant relevance in international human rights law and Internet policy fora. But it is interesting to note that the Indian government and state institutional mechanisms have not yet pro-actively accepted relevance of applying human rights norm to the Internet medium in India.&lt;/p&gt;
&lt;p&gt;As an essay in the Studying Internet series, it is important to highlight how human rights acts as underlying factors in many socio-political issues pertaining to Internet in India. Analysis of these issues helps us to understand that, even though the Indian state turns a blind eye to the human rights element in the various socio-political issues relating to Internet, the digitally conscious Indian’s have realized their rights and even fought their own battle for exercising their rights.&lt;/p&gt;
&lt;p&gt;In recent years, the Internet discourse in India has witnessed many socio-political concerns. This essay would be exploring the pertinent socio-political issues in Indian context and the underlying link to human rights thread. Globally, exploring Internet from the perspective of human rights brings out multitude of issues, which requires application of established human rights norms of right to privacy, freedom of expression, access. The story in India is no different. In this regard, three socio-political issues relating to Internet, which gained much attention in India roughly in last one year, are being analyzed. Interestingly, all three issues have an underlying thread of human right perspective connecting them and need pertinent deliberation from human rights perspective.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Section 66A and Freedom of Speech and Expression&lt;/h2&gt;
&lt;p&gt;The lack of freedom of expression on Internet and Section 66A of Information Technology Act, 2000 is an interesting case study. Indian government used Section 66A as a tool for extensive surveillance and had taken criminal legal action against the Internet and social media users for posting the offensive comments and posts. But Section 66A was badly drafted allowing the government to initiate criminal legal action in an arbitrary and whimsical manner. Thus such a provision could be misused by the state for curbing the freedom of expression in the Internet sphere. The rampant usage of the Indian state machinery of Section 66A had led to sharp reaction amongst the Internet and social media users in India. The vagueness in language and unconstitutionality of Section 66A were criticized by legal experts. The action of state machinery in arresting a cartoonist, a professor and two girls in Maharashtra [6] (and many others) for comments and post on social media against politicians, had made it evident the lack of respect for freedom for speech and expression on Internet by the Indian state machinery (Most of these incidents took place during the year 2012).  These incidents led to wide spread protest for violation of human right to freedom of speech and expression by the digital media users. When the Public Interest Litigation [7] filed by Shreya Singhal led to the Supreme Court striking down the Section 66A on 24th March, 2015 for lack of due process being followed, it was a water shed moment for internet discourse in India. The significance of human rights (especially the freedom of speech and expression) in the Internet medium got asserted.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Net Neutrality and Internet Access Issue&lt;/h2&gt;
&lt;p&gt;The recent net neutrality debate in India has also evoked deliberation about the right of equal access to Internet and the need to maintain Internet as a democratic space. The net neutrality debate on keeping Internet a democratic space that is equally accessible to everyone has got much vogue in India. An important point that needs to be emphasized in the debate regarding net neutrality in India is the equal access question being raised. The equal access question is more a product of the lack of regulatory clarity regarding TRAI’s (Telecom Regulatory Authority of India) capacity to regulate the Over-the top (OTT) services; coupled with the lack of well stipulated right to internet access in the Indian context.&lt;/p&gt;
&lt;p&gt;The net neutrality rides on the premise that the entire data available on the Internet should be equally accessible to everyone. No discrimination should be allowed regarding access to a particular website or any particular content on the Internet. Tim Wu, a renowned scholar in Internet and communication law has mentioned in his seminal work, &lt;em&gt;Network Neutrality and Broadband Discrimination&lt;/em&gt;, that network neutrality signifies “an Internet that does not favor one application” [8].&lt;/p&gt;
&lt;p&gt;In this regard, there has been a constructive dialogue between the Federal Communication Commission in United States and the various stakeholders. An interesting development was a proposition, which attempted to classify broadband internet service access as a public utility [9]. There is much relevance for such debates in the Indian context. India also needs public participation (especially strong voices from internet user’s perspective) to highlight these access concerns regarding Internet. Human right’s concerns regarding Internet should be pro-actively brought to the attention of regulatory institutions such as TRAI. There is need to balance the economic and for-profit interest of service providers with the larger public interest based on equal access.&lt;/p&gt;
&lt;p&gt;The pressure created by public opinion through online activism upon the TRAI’s proposal to regulate the OTT services helps in understanding the power of public participation in the pertinent human rights issues relating to Internet [10]. The broader design in which the principle of human rights in the context of Internet medium would have to be asserted in India is also vividly seen in the case of protest against OTT regulation.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Right to be Forgotten in EU and Repercussions in India&lt;/h2&gt;
&lt;p&gt;The repercussions of ‘Right to be Forgotten’ judgment of European Union also had led to debate of similar rights in Indian context. The Google v. AEPD and Mario Cosjeta [11] is an interesting case decided by the Court of Justice of European Union, where the court held that based on the right to privacy and data protection, persons could ask databases (this case was against the search engine Google) on Internet medium to curtail from referring to certain aspects of their personal information [12]. This is basically referred to as ‘right to be forgotten’.&lt;/p&gt;
&lt;p&gt;Viktor Mayor Schonberg in his book &lt;em&gt;Delete: The Virtue of Forgetting in Digital Age&lt;/em&gt; has elaborated the problem of how the digital age coupled with the Internet has led to store, disseminate and track information in a substantially easy way and advocates for the more informational privacy rights [13]. In this judgment, the Court of Justice of European Union has furthered the information privacy rights in the European Union with the ‘right to be forgotten’.&lt;/p&gt;
&lt;p&gt;In the Indian context, it is important to note that information privacy rights are yet to evolve to the extent that of European Union with definite privacy and data protection law. But interestingly, there was a request made to a media news website by a person attempting to enforce the right to be forgotten [14]. Even though the application of right to be forgotten is not directly applicable in the Indian context, this event throws light to the fact that Internet users in India are becoming conscious of their rights in the Internet space. The way Indian news media gave relevance to the right to be forgotten ruling also is an example of how there is an implicit recognition of the interlink between human rights and Internet that is slowly seeping into the Indian milieu.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Internet Discourse in India and Human Rights&lt;/h2&gt;
&lt;p&gt;Discussion of the three issues mentioned above points out to an important fact that human rights are not pro-actively applied to the Internet medium by the Indian state machinery. Even though the international human rights law and various Internet policy organizations are pushing the Internet and human rights agenda, the same is yet to gain momentum in India.&lt;/p&gt;
&lt;p&gt;But at the same time, an interesting development that could be witnessed from the above discussion is the manner in which the Internet users are asserting their rights over the Internet and slowly paving the path for an enriching view towards applying the human rights perspective to Internet. In the first instance, the freedom of speech and expression was not pro-actively applied to the digital space and Internet. This has happened when Article 19 of Constitution of India has clearly provided for freedom of speech and expression. The second instance of net neutrality has thrown wide open the lack of clear policy regarding Internet access in Indian context.  The public opinion has pointed out to the fact that there is a public interest demand to ensure that there is no discrimination in the case of Internet access. The third instance of looking at ‘right to be forgotten’ in Indian perspective, provides the understanding that the users of Internet are becoming conscious of their individual rights in the digital space in a more affirmative manner.&lt;/p&gt;
&lt;p&gt;Further, the operationalization of human rights in these three instances also needs to be critically looked into. The assertion of the freedom of speech and expression in the Internet medium could be made possible effectively due to the fact that Article 19 of the Constitution of India, 1950, protects freedom of speech and expression. The vast amount of precedence existing in the field of freedom of speech and expression relating to constitutional litigation and allied jurisprudence has helped in crafting the extension of the right of freedom of expression to the digital medium of Internet. Further, using the social action tool of Public Interest Litigation, the unconstitutionality of Article 19 of the Constitution of India, 1950 could be brought before the Supreme Court.&lt;/p&gt;
&lt;p&gt;But interestingly, the net neutrality issue, which is concerning the access to Internet in a non-discriminatory manner, is yet to be perceived in Indian context from a strong human rights perspective. Internet access as a public utility concept is yet to be evolved and articulated in concrete manner in the Indian context. Further, the Indian network neutrality discourse attempts to operationalize through the free market approach. In the free market approach the entire non-discriminatory access has to be ensured by the market competition with the necessary regulatory bodies. In this sense, the human rights angle of access to Internet will have to be ensured by effective competition in the market along with the proper oversight of regulatory bodies such as TRAI and Competition Commission of India. It is important for the regulatory bodies to have broad goals for furthering public interest by ensuring non-discriminatory access to Internet. Further, with the financial and infrastructure led limitations of government’s capability of ensuring access to Internet for all, the market-led model with sufficient regulation might be the right way forward.&lt;/p&gt;
&lt;p&gt;Looking at the issue of the right to be forgotten, it could be easily perceived that the Indian milieu is yet to articulate privacy rights to that high standard. Even though the right to privacy is being understood in the constitutional law context through effective interpretation by the judiciary, the concept of digital privacy has not yet evolved in India. There is no collective understanding, till now, that has emerged regarding right to be forgotten in India. Even though individual attempts to assert the right was witnessed, there is much room for an evolved collective understanding in Indian context. Civil society organizations would have a crucial role to play in this regard.&lt;/p&gt;
&lt;p&gt;There is an emerging consciousness amongst a set of Internet users in India, who values and gives importance to the Internet being a democratic space, without unwanted restriction from the government machinery or even the private entities. Hence looking at the Internet discourse of India from the perspective of human rights, there is an implicit way in which the human rights are being applied to the Internet space. The lack of a state’s pro-active approach in asserting human rights to Internet space is highlighted by the assertions being made by the Internet users in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Way Forward&lt;/h2&gt;
&lt;p&gt;For Internet to remain as a democratic space, there is need for pro-active application of these human rights norms and clear understanding in Internet governance. At present, the state of affairs in India regarding application of human rights to Internet is far from satisfactory.&lt;/p&gt;
&lt;p&gt;This essay which is part of the ‘Studying Internet in India’ series, has till now done a stock taking analysis of emerging dimension of human rights and Internet in India. Lack of interest from government and state machinery to further the human rights and Internet dimension need to be seriously reconsidered. Attempting to intervene in Internet law and policy in India from the rights based approach should be an important agenda for furthering digital rights in India. For this, civil society organizations have an important role to play.  Exploring the public interest could be done effectively with public participation of stakeholders. Here in, platforms such as India Internet Governance Forum could play a crucial role.&lt;/p&gt;
&lt;p&gt;Apart from the civil society organizations, it is also pertinent for state and governmental institutional mechanism to also take a pro-active stance. For ensuring that the rights based approach to Internet has to be duly included in the Internet law and policy; and there should be institutional mechanism, which could look into areas pertaining to human rights and Internet. It is a well know fact that India lacks institutional mechanism for looking into communication and privacy issues regulation. Further, the National Human Rights Commission (NHRC) also needs to look at the relevance of human rights for Internet. Inspiration could be drawn from the pioneering work of Australian Commission of Human Rights on applying human rights norms and standards to Internet medium [15].  This essay has only flagged the need to apply the established human rights norms to Internet space. Much more issues such as access to Internet by disabled, safety of children and Internet medium are also pertinent areas.&lt;/p&gt;
&lt;p&gt;Moreover, it is important to have digital rights of Internet users in India to be explicitly enshrined in a legal framework. Presently, a gap in law and policy framework regarding human rights and Internet is evident, as highlighted in this essay. The pertinent questions regarding access, privacy and freedom of expression are to be taken seriously by the government and state machinery for which clear and well-defined rights relating to Internet space have to be framed. For Internet and human rights to be taken seriously, it is high time that legal and institutional framework to explore these issues also are evolved.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Emphasizing the Right to Communication in India&lt;/h2&gt;
&lt;p&gt;Further, the present understanding of right to communication in India, which is perceived in narrow manner, could be re-worked with the help of a pro-active application of human rights norms to the Internet governance. The intrusion into the freedom of speech and expression especially in the telecommunication context has to be highlighted. Protection of communal harmony has been used as rationale for capping the number of the SMS messages that could be sent per day during the exodus of people of Northeastern states origin from Bangalore, Pune and other major cities in India.&lt;/p&gt;
&lt;p&gt;This move has been criticized for being unreasonable and universality of capping the number of SMS messages [16]. Further, the telecommunication and Internet services (especially Facebook and YouTube) were blocked in Kashmir for restricting the protest [17]. The telecommunication and Internet services were blocked on the grounds of protection of national security.  The reasonableness of restrictions that could be imposed on right to communication is a major concern in the above-mentioned instances. Making a blanket ban applicable in a universal manner undermines the right to communication of various genuine users of bulk messaging and social media sites.&lt;/p&gt;
&lt;p&gt;The right to communication especially in the digital and telecommunication media needs to be emphasized. Applying human rights perspective and norms to Internet governance would help in articulating and evolving the right to communication in India. With adequate institutional oversight, the human rights norms could make the digital right to communication an effective right.&lt;/p&gt;
&lt;p&gt;To conclude, the Internet discourse in India has already paved path for human rights norms to be applied to Internet space. The seriousness that could be attributed to those rights is evident by the assertions by the Internet users in India. But the state and government machinery in India also should explore the human rights and Internet agenda seriously.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;[1] Frank La Rue, Report Of The Special Rapporteur On The Promotion And Protection Of The Right To  Freedom Of Opinion And Expression, Available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[2] Ibid, Special Rapporteur in the Report points out that the language of Article 19 of ICCPR is media neutral and is applicable to online media technological developments also. Para 20 and 21 of the Report.&lt;/p&gt;
&lt;p&gt;[3] UN High Commissioner on Human Right, Report on ‘The Right To Privacy In The Digital Age’, Available at &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf"&gt;http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[4] WSIS Declaration for Building of Information Society, Available at &lt;a href="http://www.itu.int/wsis/docs/geneva/official/dop.html"&gt;http://www.itu.int/wsis/docs/geneva/official/dop.html&lt;/a&gt;. (Last accessed on 25/05/2015). Article 58, WSIS Declaration reads as follows: “The use of ICTs and content creation should respect human rights and fundamental freedoms of others, including personal privacy, and the right to freedom of thought, conscience, and religion in conformity with relevant international instruments”.&lt;/p&gt;
&lt;p&gt;[5] Charter of Human Rights and Principles for the Internet Available at &lt;a href="http://internetrightsandprinciples.org/site/wp-content/uploads/2013/10/IRP_booklet_final1.pdf"&gt;http://internetrightsandprinciples.org/site/wp-content/uploads/2013/10/IRP_booklet_final1.pdf&lt;/a&gt;, (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[6] See Section 66A:Six Cases That Sparked Debate, Available at &lt;a href="http://www.livemint.com/Politics/xnoW0mizd6RYbuBPY2WDnM/Six-cases-where-the-draconian-Section-66A-was-applied.html"&gt;http://www.livemint.com/Politics/xnoW0mizd6RYbuBPY2WDnM/Six-cases-where-the-draconian-Section-66A-was-applied.html&lt;/a&gt;, (Last accessed on 25/05/2015). Also see, Facebook Trouble:10 Cases of Arrest Under Section 66A of IT Act, Available at &lt;a href="http://www.hindustantimes.com/india-news/facebook-trouble-people-arrested-under-sec-66a-of-it-act/article1-1329883.aspx"&gt;http://www.hindustantimes.com/india-news/facebook-trouble-people-arrested-under-sec-66a-of-it-act/article1-1329883.aspx&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[7] Shreya Singhal v. Union of India, Available at &lt;a href="http://indiankanoon.org/doc/110813550/"&gt;http://indiankanoon.org/doc/110813550/&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[8] Tim Wu, Network Neutrality, Broadband Discrimination, Available at &lt;a href="https://cdt.org/files/speech/net-neutrality/2005wu.pdf"&gt;https://cdt.org/files/speech/net-neutrality/2005wu.pdf&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[9] F.C.C. Approves Net Neutrality Rules, Classifying Broadband Internet Service as a Utility, Available at &lt;a href="http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html"&gt;http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[10] The online campaign by www.savetheinternet.in and the AIB video have played a crucial role in gathering public support.&lt;/p&gt;
&lt;p&gt;[11] Court of Justice of European Union, Case C-131/12.&lt;/p&gt;
&lt;p&gt;[12] Rising like a Phoenix: The ‘Right to be Forgotten’ before the ECJ, Available at &lt;a href="http://europeanlawblog.eu/?p=2351"&gt;http://europeanlawblog.eu/?p=2351&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[13] Viktor Mayor Schonberg, Delete: The Virtue of Forgetting in Digital Age, Princeton University Press (2009).&lt;/p&gt;
&lt;p&gt;[14] Right to be Forgotten Poses A Legal Dilemma in India, Available at &lt;a href="http://www.livemint.com/Industry/5jmbcpuHqO7UwX3IBsiGCM/Right-to-be-forgotten-poses-a-legal-dilemma-in-India.html"&gt;http://www.livemint.com/Industry/5jmbcpuHqO7UwX3IBsiGCM/Right-to-be-forgotten-poses-a-legal-dilemma-in-India.html&lt;/a&gt;, (Last accessed on 25/05/2015). Also see We received a Right to be Forgotten request from an Indian user, Available at &lt;a href="http://www.medianama.com/2014/06/223-right-to-be-forgotten-india/"&gt;http://www.medianama.com/2014/06/223-right-to-be-forgotten-india/&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[15] Human Rights and Internet, Available at &lt;a href="https://www.humanrights.gov.au/our-work/rights-and-freedoms/projects/human-rights-and-internet"&gt;https://www.humanrights.gov.au/our-work/rights-and-freedoms/projects/human-rights-and-internet&lt;/a&gt; (Last accessed on 25/05/2015).&lt;/p&gt;
&lt;p&gt;[16] Chinmayi Arun, SMS Block as Threat to Free Speech, Available at &lt;a href="http://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech"&gt;http://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech&lt;/a&gt; (Last accessed on 15/07/2015).&lt;/p&gt;
&lt;p&gt;[17] Pamposh Raina and Betwa Sharma, Telecom Services Blocked to Curb Protests in Kashmir, Available at &lt;a href="http://india.blogs.nytimes.com/2012/09/21/telecom-services-blocked-to-curb-protests-in-kashmir/?_r=0"&gt;http://india.blogs.nytimes.com/2012/09/21/telecom-services-blocked-to-curb-protests-in-kashmir/?_r=0&lt;/a&gt; (Last accessed on 15/07/2015).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Author's Note: All the views expressed are my own and in no way are linked to the opinion of my employers. I thank CIS for this opportunity to explore Internet and Human Rights interface in India as part of the Studying Internet in India essay series.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: The post is published under &lt;a href="https://creativecommons.org/licenses/by/4.0/" target="_blank"&gt;Creative Commons Attribution 4.0 International&lt;/a&gt; license, and copyright is retained by the author.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights'&gt;https://cis-india.org/raw/blog_studying-the-internet-discourse-in-india-through-the-prism-of-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Deva Prasad M</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Human Rights</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-07-22T04:18:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource">
    <title>Odia Wikisource has a new Wikisourcer, and he is the youngest in the Odia Wikimedia community!</title>
    <link>https://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource</link>
    <description>
        &lt;b&gt;Prateek Pattanaik (User:Shrijagannatha on Odia Wikisource) is a young researcher of Odia literature and Odissi music. He has not just digitized as many as 54 Odia-language poetry dating early 18th century but has also annotated, both poetic and prosaic translation in his blogs “Sri Jagannatha” and “Utkal Sangeet”. He has also brought a complete book “Kisora chandranana champu” on Odia Wikisource. A recent entrant into the Odia Wikimedia community, Prateek is also the youngest Odia Wikimedian. He has also digitized 18-19th century 54 poem written by various poets.&lt;/b&gt;
        
&lt;p class="ctl"&gt;&lt;em&gt;Right after Prateek finished his first digitization of an entire book “&lt;a class="external-link" href="http://or.wikisource.org/wiki/କିଶୋରଚନ୍ଦ୍ରାନନ୍ଦ_ଚମ୍ପୂ"&gt;Kishorachandranana Champu&lt;/a&gt;” by Baladeba Ratha (1779-1845 AD) on the Odia Wikisource (&lt;a class="external-link" href="http://or.wikisource.org"&gt;&lt;span class="external-link"&gt;or.wikisource.org&lt;/span&gt;&lt;/a&gt;), Subhashish Panigrahi caught up with Prateek asking him about his passion for Odia literature and Odissi music.&lt;/em&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;Subhashish Panigrahi (SP)&lt;/strong&gt;: Hi Prateek, please tell little bit about yourself?&lt;br /&gt;&lt;strong&gt;Prateek Pattanaik (PP)&lt;/strong&gt;: I live among the pristine hills of  Damanjodi, in the district of Koraput, Odisha, with my parents. My  mother, Mrs.Pallabi Mohapatra, is a teacher in Delhi Public School,  Damanjodi, where I study. My father, Mr. Dipak Kumar Pattanaik, is  lecturer in Botany in the Government College, Koraput. Currently I'm  studying in 11&lt;sup&gt;th&lt;/sup&gt; standard in the Science Stream.&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: What influenced you to take so much interest in Odia literature and Odissi music?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: When I was young, my grandfather, Dr. P. C. Mohapatra, would  tell me bedtime stories that recounted the exploits of Lord Jagannatha –  tales about King Indradyumna, Chodaganga Deva, Jayadeva, the  Panchasakha; those of Dasia Bauri, Salabega; about how Lord Jagannatha  would wander hopelessly in hunger, banished by Lakshmi; how he would  chase the eggplant-plucking lady, enchanted by her rendition of the Gita  Govinda. Those tales fascinated my imagination, and attracted me  towards the Lord. And thus it began, my endless journey of discovering  the infinite cult that surrounded the smiling Gods at Puri.&lt;br /&gt;&lt;br /&gt;As a kid I brought a triad made of  neem wood from Puri. I would worship them, and dress them in the &lt;a href="https://en.wikipedia.org/wiki/Beshas_of_Jagannath"&gt;Beshas&lt;/a&gt;,  costumes of Lord Jagannatha, using thermocole and paints- I smeared  sandalwood paste on them and covered them with tiny blankets during  winter. My mother inspired me – she was the typical Odia homemaker –  from making “&lt;em&gt;Pana”&lt;/em&gt; on the “&lt;em&gt;Makara Sankranti” to &lt;/em&gt;making  'pithas', a large variety of traditional delicacies. And I would offer  all of them to my Lords. She made herbal oils for my Lords when they  were ill with fever. She would never say no to me no matter how  unrealistic my demands. She tried her hand even at making the  traditional “&lt;em&gt;&lt;a href="https://en.wikipedia.org/wiki/Pattachitra"&gt;patta&lt;/a&gt;&lt;a href="https://en.wikipedia.org/wiki/Pattachitra"&gt;chitra&lt;/a&gt;&lt;/em&gt;&lt;em&gt;”&lt;/em&gt; canvases for me to draw.&lt;br /&gt;&lt;br /&gt;During my summer vacations, I would unconditionally rush to  Koraput to my grandparents, and I still do. My Grandmother, Mrs. Kanak  Lata Sabat, &amp;nbsp;who is an Odia-language teacher, taught me the Odia  alphabet when I was very young. My father would bring me pictures of  Lord Jagannatha from the Temple stall outside the Puri Temple. I became  famous in my entire family for my ability to tell them apart without  seeing their name. I was stubborn – I told him to buy those Odia books  even when I did not know how to read. And those were the first books I  read in Odia- filled with vivid descriptions of the Beshas of the Lord;  with simple lines from the Odia Bhagabata to complex lines from medieval  poets. When I asked my grandmother to tell me who was this man called  Upendra Bhanja, whom the books praised no end, she revealed to me the  master he was, and told me about his unbeatable command over the words  he spoke.&lt;br /&gt;&lt;br /&gt;I grew up to being automatically attracted to Odissi Music – which  I would hear amidst songs of the Gita Govinda in local Temples, and &lt;em&gt;Patachitra&lt;/em&gt;s- filled in the soaring structures of the Puri Temple. I myself figured  out how to do those paintings, and began by singing songs of Bhajan  Samrat Bhikari Bal. Later, I heard of age-old classics from my grandma  again – songs which she had learnt while in the third standard- “&lt;em&gt;Ki Shobha go Kunje”&lt;/em&gt;, “&lt;em&gt;Galani ta Gala Katha&lt;/em&gt;” and so on. I learnt them myself, and began going to my sir who would explain to me the nuances of Odissi Classical Music.&lt;br /&gt;&lt;br /&gt;When I was in ninth standard, the Jagannatha temple of Koraput  came forward to use my PowerPoint presentations on the Jagannatha cult  that I had made them for my pleasure, during my leisure time. They took  them and printed them, and made a public exhibition. It was praised no  end. I became somewhat of a child-size know-it-all of the Jagannatha  cult, but I saw there was still more to discover.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: How you started learning about “&lt;em&gt;Champu&lt;/em&gt;”?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: The word “&lt;em&gt;Champu”&lt;/em&gt; itself attracted me. It had a distinct ring to it, an alien-sounding word that was never used in real life. My father told me it was a song in which each line started with the same letter. I asked him to show it to me. He could not. He himself had not seen more than a single song. And when the truth dawned on me that it was not 'a' song- it was a collection of 34 songs, after the 34 letters of the Odia alphabet, I had to get my hands on it. Fortunately, the “&lt;a href="http://oaob.nitrkl.ac.in/view/title/"&gt;Open Access to Oriya Books&lt;/a&gt;” (OAOB) project by Srujanika had tons of Odia books digitized and hosted on the website http://oaob.nitrkl.ac.in, and I could finally behold what it was. I was amazed –  I ran my eyes down the '&lt;em&gt;Ka&lt;/em&gt;' song,and read “&lt;em&gt;Ka&lt;/em&gt;-&lt;em&gt;Ka&lt;/em&gt;-&lt;em&gt;Ka&lt;/em&gt;-&lt;em&gt;Ka”&lt;/em&gt;. What talent! My god, who wrote this? Kabisurya. Kabisurya who? Kabisurya Baladeba Ratha. I discovered the man and was similarly amazed by folktales of his talent.&lt;br /&gt;&lt;br /&gt;When I saw the 'Ga' song was the same song my Grandma loved – I  was again amused. I knew that all the while! Above each song, it was  written '&lt;em&gt;Raga &lt;/em&gt;so and so'. So all of these could be  sung. But how could I learn how to sing them? A single recorded CD, from  the busstand taught me. In a year, I could sing it entirely. I  understood the depth of the lines from the simple commentary below them,  and was disappointed by how less known they were in this day and age. I  thought what I could do – I sung them at the temple during the &lt;a href="https://en.wikipedia.org/wiki/Ratha_Yatra_%28Puri%29"&gt;&lt;em&gt;Ratha Jatra&lt;/em&gt;&lt;/a&gt;,  and they were an instant hit! People longed to hum those ancient tunes.  But they could not. These songs were outdated, no one sung them except a  few maestros of Odissi Classical Music, and no one could comprehend  them. But people loved them. They did not know what they meant, exactly  but they sure did get the feeling. And that was what mattered.&lt;br /&gt;&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: From spending your entire childhood to creating two blogs with  so much annotation on these early writings, and using social media to  popularize them, to bringing them on Wikisource, what made this leap?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: One fine day, it struck me that the same way I made PowerPoint slides, I could make something digital. Why not a website which anyone can see? Wouldn't that breathe new life into the traditional melodies? Good. And so over a span of two long years, I typed out the entire &lt;em&gt;Champu&lt;/em&gt; and created two websites; Shri Jagannatha (&lt;a href="http://shrijagannatha.wordpress.com/"&gt;shrijagannatha.wordpress.com&lt;/a&gt;) for the Jagannatha cult, and later, Utkal Sangeet (&lt;a href="http://utkalsangeet.wordpress.com/"&gt;utkalsangeet.wordpress.com&lt;/a&gt;) for the classical songs. The Utkal Sangeet project was a great learning experience, I used tags, so that you could find any song, view it on any device, sort songs by Raga, Tala, Poet, Book, etc. I translated songs, and uploaded their recordings as well.&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: Did you ever share your work with other fellow researchers? You must have struggled to find these resources, isn't it?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: U.S. Researcher in Ethnomusicology at U.C. Davis, Dr. David Dennen AKA 'David Uncle',was the first and only person who helped me. He himself has submitted his PhD Thesis on the Kishora Chandrananda Champu, from villages to research centers. He sent me tons of research books in digital form, painfully scanning them himself only for me, from locations like Australia and America. None from Odisha even assisted; the people at the Odisha state museum refused to let a child like me to see their manuscripts, and none of the research institutions even responded in an email. David uncle constantly inspired me to carry on further, not being swayed away. He encouraged me constantly, and he is as important to this project, on the Champu, as my very own parents.&lt;br /&gt;&lt;br /&gt;Then in February 2015, it struck me that I could use social  networking to propagate the richness of the Cult at Puri – the grandeur  in literature, dance, music, art, sculpture, food and all. I started a  new Twitter handle @&lt;a href="http://twitter.com/shrijagannatha"&gt;shrijagannatha&lt;/a&gt;,  and linked it with my site. Now the handle has 820 followers within 6  months. Many Twitter users have been very appreciative, and they became  family now. From the Grandfather @nidhi_budha to the 'untimely gourd'  @akala_kushmanda, they post random tweets about Odisha to digitization  of the Odia script, with which I struggled greatly at the beginning.  This soul, devoted to a similar cause as me, was @subhapa, Subhasish  Panigrahi, an active volunteer in the Odia Wikipedia, one of the  founding fathers. After months, Persuaded by the Wikimedians, I too  contributed the entire text of the Kishorachandrananda Champu to the  Odia Wikisource by using my Utkal Sangeet project. It is a collaborative  project, which will blossom healthily. Since so many people visit the  Wikimedia projects, my small contribution to this free online library  could probably quench their literary thirst.&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: What are your plans to expand your work on Wikisource?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: In the future, I plan to make my site even more accessible for the layman. I have a few ideas as of now, to make the ideas reach out to everyone, even someone as young as me. I want to be an active, useful member of this online digital movement for Odia language, and go on with my task forever.&lt;/blockquote&gt;
&lt;p class="ctl"&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;strong&gt;SP&lt;/strong&gt;: Thanks Prateek for taking time to share such an  inspiring and insightful story. Would you like to add more about  expanding project for digitizing such valuable literature?&lt;br /&gt;&lt;strong&gt;PP&lt;/strong&gt;: As for my future plans, I would like to type out other such works of &lt;em&gt;Kabisurjya&lt;/em&gt; Baladeba Ratha, like his “&lt;em&gt;Ratnakara Champu”&lt;/em&gt;, “&lt;em&gt;Premodaya Champu”&lt;/em&gt; and even the satirical “&lt;em&gt;Hasyakallola&lt;/em&gt;”. I would definitely contribute the same to Wikisource. The books being rare, they may be lost if not saved. I would like to translate the Kishora Chandrananda Champu, the main one, into English in its entirety – word by word, retaining its true essence so that the Western Audience and even people of their states can understand the marvel it is. Now, I'm researching on various commentaries and references so that I can write my own. The form itself is rare, and more so, such an intricately interwoven part of the typical 'Odia' identity that it cannot be ignored. Let the world glance upon the talents of (Upendra) Bhanja and Kabisurya (Baladeba Ratha) and identify that a small, peaceful state in the East has been the birthplace for such great art.&lt;br /&gt;Thanks!&lt;/blockquote&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource'&gt;https://cis-india.org/openness/blog-old/kisorachandrananachampu-on-odia-wikisource&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-08-21T17:40:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age">
    <title>Freedom of Expression in a Digital Age </title>
    <link>https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, the Observer Research Foundation, the Internet Policy Observatory, the Centre for Global Communication Studies and the Annenberg School for Communication, University of Pennsylvania organized this conference on April 21, 2015 in New Delhi.&lt;/b&gt;
        &lt;p&gt;This report was edited by Elonnai Hickok&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Effective research, policy formulation, and the development of regulatory frameworks in South Asia&lt;/h2&gt;
&lt;h3&gt;Inside this Report&lt;/h3&gt;
&lt;p class="LO-normal"&gt;BACKGROUND TO THE CONFERENCE&lt;/p&gt;
&lt;p class="LO-normal"&gt;THE ORGANIZERS&lt;/p&gt;
&lt;p class="LO-normal"&gt;CONFERENCE PROGRAMME&lt;/p&gt;
&lt;p class="LO-normal"&gt;WELCOME ADDRESS&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 1: LEARNINGS FROM THE PAST &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Smarika Kumar, &lt;i&gt;Alternative Law Forum&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Bhairav Acharya, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 2: CURRENT REALITIES &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Cherian George, &lt;i&gt;Associate Professor, Hong Kong Baptist University&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Zakir Khan, &lt;i&gt;Article 19, Bangladesh&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Chinmayi Arun, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Raman Jit Singh Chima, &lt;i&gt;Asia Consultant, Access Now&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;&lt;b&gt;SESSION 3: LOOKING AHEAD &lt;/b&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Sutirtho Patranobis, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Karuna Nundy, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Geeta Seshu, &lt;i&gt;The Hoot&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;/p&gt;
&lt;p class="LO-normal"&gt;Questions &amp;amp; Comments&lt;/p&gt;
&lt;p class="LO-normal"&gt;Conclusion&lt;/p&gt;
&lt;h2&gt;Background to the Conference&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As the Internet expands and provides greater access and enables critical rights such as freedom of expression and privacy, it also places censorship and 	surveillance capabilities in the hands of states and corporations. It is therefore crucial that there exist strong protections for the right to freedom of 	expression that balance state powers and citizen rights. While the Internet has thrown up its own set of challenges such as extremist/hate speech, the 	verbal online abuse of women, and the use of the Internet to spread rumours of violence, the regulation of cont ent is a question that is far from being 	settled and needs urgent attention. These are compounded by contextual challenges. What role can and should the law play? When is it justified for the 	government to intervene? What can be expected from intermediaries, such as social networks and Internet Service Providers (ISPs)? And what can users do to 	protect the right to free speech - their own and that of others?&lt;/p&gt;
&lt;p&gt;Balancing freedom of expression with other rights is further complicated by the challenges of fast paced and changing technologies and the need for 	adaptable and evolving regulatory frameworks. By highlighting these challenges and questioning the application of existing frameworks we aim to contribute 	to further promoting and strengthening the right to freedom of expression across South Asia.&lt;/p&gt;
&lt;h2&gt;The Organizers&lt;/h2&gt;
&lt;h3&gt;Centre for Internet &amp;amp; Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Established in 2008, the Centre for Internet and Society (CIS) is a non-profit research organization that works on policy issues relating to freedom of 	expression, privacy, accessibility for persons with disabilities, access to knowledge and intellectual property rights, and openness (including open 	standards and open government data). CIS also engages in scholarly research on the budding disciplines of digital natives and digital humanities. CIS has 	offices in Bangalore and New Delhi.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Observer Research Foundation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ORF, established in 1990, is India's premier independent public policy think tank and is engaged in developing and discussing policy alternatives on a wide 	range of issues of national and international significance. The fundamental objective of ORF is to influence the formulation of policies for building a strong and prosperous India in a globalised world. It hosts India's largest annual cyber conference -	&lt;i&gt;CyFy: the India Conference on Cyber Security and Internet Governance&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;The Annenberg School for Communication, The Centre for Global Communication Studies &amp;amp; the Internet Policy Observatory (U. Penn.)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The Annenberg School of Communication (ASC) at the University of Pennsylvania produces research that advances the understanding of public and private 	communications. The Center for Global Communication Studies (CGCS) is a focused academic center at ASC and a leader in international education and training 	in comparative media law and policy. It affords students, academics, lawyers, regulators, civil society representatives and others the opportunity to 	evaluate and discuss international communications issues. The Internet Policy Observatory (IPO) was started by CGCS to research the dynamic technological 	and political contexts in which Internet governance debates take place. The IPO serves as a platform for informing relevant communities of activists, 	academics, and policy makers, displaying collected data and analysis.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conference Programme&lt;b&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;'Freedom of Expression in a Digital Age' &lt;/b&gt;&lt;b&gt;Effective Research, Policy Formation &amp;amp; the Development of Regulatory Frameworks in South Asia&lt;br /&gt;April 21&lt;sup&gt;st&lt;/sup&gt;, 2015 - 11 a.m. to 6 p.m.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;at&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The &lt;/b&gt; &lt;b&gt;Observer Research Foundation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20, Rouse Avenue Institutional Area&lt;/p&gt;
&lt;p&gt;New Delhi - 110 002, INDIA&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;About the Conference&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will be a discussion highlighting the challenges in promoting and strengthening online freedom of expression and evaluating the application of existing regulatory frameworks in South Asia&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agenda&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Learnings from the past&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Current Realities&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Looking ahead &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 1:00&lt;/td&gt;
&lt;td&gt;1:00 - 2:00&lt;/td&gt;
&lt;td&gt;2:00 - 4:00&lt;/td&gt;
&lt;td&gt;4:00- 4:15&lt;/td&gt;
&lt;td&gt;4:15 - 6:00&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Overview of online FoEx policy and regulatory models across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enabling FOEX in South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Challenges associated with formulating regulation for online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Definitions of FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Ways in which FoEx is, or may be, curtailed online&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Ways forward to bridge existing gaps between policy formation and policy implementation with respect to FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Impact of technology and markets on FoEx across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Balancing FoEx and other digital rights &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Exploring emerging regulatory questions for FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Challenges to FoEx online across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;The impact of jurisdiction, multi-national platforms, and domestic regulation on FoEx online &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Impacting and influencing the development and implementation of Internet regulation through research &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Effective research techniques and online FoEx &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Role and responsibility of intermediaries in regulating online speech  across South Asia &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Exploration of the future role and interplay of technology and policy in enabling FOEX online &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Ms. Mahima Kaul, &lt;i&gt;Head (Cyber &amp;amp; Media Initiative), Observer Research Foundation (ORF)&lt;/i&gt;, introduced the conference and its context and format, as 	well as the organisers. In three sessions, the Conference aimed to explore historical lessons, current realities and future strategies with regard to 	freedom of expression on the Internet in India and South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Manoj Joshi, &lt;i&gt;Distinguished Fellow, ORF&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;provided the welcome address. Mr. Joshi highlighted the complexities and distinctions between 	print and electronic media, drawing on examples from history. He stated that freedom of expression is most often conceived as a positive right in the 	context of print media, as restrictions to the right are strictly within the bounds of the Constitution. For instance, during the riots in Punjab in the 	1980s, when hate speech was prevalent, constitutionally protected restrictions were placed on the print media. When efforts were made to crack down on 	journalists with the introduction of the Defamation Bill in the 1980s, journalists were lucky that the Bill also included proprietors as those liable for 	defamation. This created solidarity between journalists and proprietors of newspapers to fight the Bill, and it was shelved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression is necessary in a democratic society, Mr. Joshi stated, but it is necessary that this freedom be balanced with other rights such as 	privacy of individuals and the protection against hate speech. In the absence of such balance, speech becomes one-sided, leaving no recourse to those 	affected by violative speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the digital age, however, things become complex, Mr. Joshi said. The freedom available to speech is enhanced, but so is the misuse of that freedom. The 	digital space has been used to foment riots, commit cybercrime, etc. Online, in India the restrictions placed on freedom of speech have become draconian. 	Section 66A and the incidents of arrests under it are an example of this. It is, therefore, important to consider the kind of restrictions that should be 	placed on free speech online. There is also the question of self-regulation by online content-creators, but this is rendered complex by the fact that no 	one owns the Internet. This conference, Mr. Joshi said, will help develop an understanding of what works and what frameworks we will need going forward.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Pranesh Prakash, &lt;i&gt;Policy Director&lt;/i&gt;, &lt;i&gt;Centre for Internet &amp;amp; Society&lt;/i&gt; &lt;i&gt;(CIS)&lt;/i&gt;, introduced the speakers for the first session. 	Mr. Vibodh Parthasarathi, &lt;i&gt;Associate Professor, Centre for Culture, Media and Governance, Jamia Millia Islamia University&lt;/i&gt;, would first share his views and experience regarding the various ways of curtailing freedom of expression by the State, markets and civil society. Ms. Smarika Kumar of the&lt;i&gt;Alternative Law Forum &lt;/i&gt;(ALF) would then expand on structural violations of freedom of expression. Mr. Bhairav Acharya,	&lt;i&gt;Advocate with the Delhi Bar and Consultant for CIS&lt;/i&gt;, would throw light on the development of free speech jurisprudence and policy in India from the 	colonial era, while Prof. Ambikesh Mahapatra, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;, was to speak about his arrest and charges under Section 	66A of the Information Technology Act, 2000 (am. 2008), providing insight into the way Section 66A was misused by police and the West Bengal government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Vibodh Parthasarathi&lt;/b&gt;&lt;i&gt;, Associate Professor, Centre for Culture, Media and Governance (CCMG), Jamia Millia Islamia University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi began his talk with an anecdote, narrating an incident when he received a call from a print journalist, who said	&lt;i&gt;"TV people can get away with anything, but we can't, and we need to do something about it." &lt;/i&gt;The notion of news institutions getting away with 	non-kosher actions is not new - and has been a perception since the 19&lt;sup&gt;th&lt;/sup&gt; century. He stressed that there have always been tensions between 	Freedom of Expression, access, and other rights. Curtailment happens not just by the state, but by private parties as well - market and civil society. 	Indeed, a large number of non-state actors are involved in curtailing FoE. Subsequently a tension between individual FoE and commercial speech freedom is 	emerging. This is not a new phenomenon. Jurisprudence relating to free speech makes a distinction between the persons in whom the right inheres: 	individuals on the one hand (including journalists and bloggers), and proprietors and commercial entities on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, freedom of speech cases - from 1947 - relate primarily to the rights of proprietors. These cases form the legal and constitutional basis for 	issues of access, transmission and distribution, but are not necessarily favourable to the rights of individual journalists or newsreaders. At the 	individual level, the freedom to &lt;i&gt;receive &lt;/i&gt;information is equally important, and needs to be explored further. For entities, it is crucial to 	consider the impact of curtailment of speech (or threats of curtailment) on entities of &lt;i&gt;different sizes&lt;/i&gt; and &lt;i&gt;kinds&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi further explained that online, freedom of expression depends on similar structural conditions and stressed that scholarship must study 	these as well. For example, intermediaries in the TV industry and online intermediaries will soon come together to provide services, but scholarship does 	not link them yet. The law is similarly disjointed. For instance, 'broadcasting' falls in the Union List under Schedule VII of the Constitution, and is 	centrally regulated. However, distribution is geographically bounded, and States regulate distribution. In order to have a cohesive broadcast regulation, 	he raised the point that the placement of 'broadcasting' in the Union List may need to be re-thought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Parthasarathi, the underlying conceptual basis - for the interlinked scholarship and regulation of intermediaries (online and broadcast), 	of commercial speech and individual access to information, and censorship (State and private, direct and structural) - lies in Article 19(1)(a). He noted 	that there is a need to rethink the nature of this freedom. For whom do we protect freedom of speech? For individuals alone, or also for all private 	entities? From what are we protecting this freedom? For Mr. Parthasarathi, freedom of speech needs to be protected from the State, the market, civil 	society and those with entrenched political interests. Additionally, Mr. Parthasarathi raised the question of whether or not in the online context freedom 	of the enterprise becomes antithetical to universal access&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Parthasarathi also highlighted that it is important to remember that freedom of expression is not an end in itself; it is a facilitator - the 'road'- 	to achieve crucial goals such as diversity of speech. But if diversity is what freedom of expression &lt;i&gt;should&lt;/i&gt; enable, it is important to ask whether 	institutional exercise of freedom has led to enhanced diversity of speech. Do media freedom and media diversity go together? For Mr. Parthasarathi, media 	freedom and media diversity do not always go together. The most vivid example of this is the broadcast environment in India, following the deregulation of 	broadcast media beginning from the mid 1990s - much of which was done through executive orders on an ad hoc basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This led to infrastructural censorship, in addition to the ex-post curtailment of content. Increasingly the conditions on which content is produced are 	mediated i.e. which entities are eligible to obtain licenses, what type of capital is encouraged or discouraged, how is market dominance measured, 	accumulation of interests across content and carriage, or various carriage platforms? Mediating the conditions of producing speech, or infra censorship, is 	primarily operationalised through regulatory silences, as illustrated in the absence of any coherent or systematic anti-competitive measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts are champions in protecting the freedom of expression of 'outlets' - of proprietors and entities. But this has not led to diversity of speech 	and media. Perhaps there is a need to rethink and reformulate ideas of freedom. He pointed out that it is not enough merely to look at &lt;i&gt;ex post&lt;/i&gt; curtailment of speech (i.e., the traditional idea of censorship). Instead &lt;i&gt;the conditions&lt;/i&gt; in which speech is made and censored need to be explored; 	only then can our understanding expand. Mr Parthasarathi ended his talk by stressing that a proactive understanding of freedom of expression can highlight 	architectural curtailment of speech through the grant of licenses, competition and antitrust laws, media ownership and concentration across carriage and 	content, etc. This is essential in a digital age, where intermediaries play a crucial, growing role in facilitating freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Smarika Kumar&lt;/b&gt;&lt;i&gt;, Alternative Law Forum&lt;/i&gt;&lt;br /&gt;Beginning where Mr. Parthasarathi left off, the focus of Ms. Kumar's presentation was the curtailment of speech and the conditions under which speech is 	produced. At the outset, she sought from the audience a sense of the persons for whom freedom of speech is protected: for government-controlled media, the 	markets and commercial entities, or for civil society and citizens? Ms. Kumar aimed to derive ideas and conceptual bases to understand freedom of speech in 	the digital space by studying judicial interpretations of Article 19(1)(a) and its limitations. Towards this end, she highlighted some Indian cases that 	clarify the above issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar began with &lt;b&gt;&lt;i&gt;Sakal Papers&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1962 SC 305]&lt;/b&gt;. In &lt;i&gt;Sakal Papers&lt;/i&gt;, the issue concerned the 	State's regulation of speech by regulation of the number of permitted pages in a newspaper. This regulation was challenged as being in violation of Article 	19(1)(a) of the Constitution. The rationale for such regulation, the State argued, was that newsprint, being imported, was a scarce commodity, and 	therefore needed to be equitably distributed amongst different newspapers - big or small. Further, the State defended the regulation citing its necessity 	for ensuring equal diversity and freedom of expression amongst all newspapers. The petitioners in the case argued that such a regulation would negatively 	impact the newspapers' right to circulation by reducing the space for advertisements, and thus forcing the newspaper to increase selling prices. Readers of 	the newspaper additionally argued that such increase in prices would affect their right to access newspapers by making them less affordable, and hence such 	regulation was against the readers' interests. Ultimately, the Supreme Court struck down the regulation. The Constitution Bench noted that if the number of 	pages of a newspaper were to be limited and regulated, the space available for advertisements would reduce. Were advertisements to reduce, the cost of 	newspapers would increase, affecting affordability and access to information for the citizens. Ultimately, newspaper circulation would suffer; i.e., the 	State's regulation affected the newspapers' right of circulation which would amount to a violation of freedom of expression as the right extends to the 	matter of speech as well as the ability to circulate such speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the number of pages, the Indian government has sought to regulate newsprint in the past. In	&lt;b&gt;&lt;i&gt;Bennett Coleman and Co. &amp;amp; Ors.&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; [AIR 1973 SC 106]&lt;/b&gt;, a Constitution Bench of the Supreme Court 	considered whether regulation of the number of pages permitted in a newspaper constituted an unreasonable restriction on freedom of expression. Towards 	this, the Government of India set forth a Newsprint Policy in 1972, under the terms of which the number of pages of all papers were to be limited to ten; 	where there were small newspapers that did not achieve the ten-page limit, a 20% increase was permitted; and finally, new newspapers could not be started 	by common ownership units. The Newsprint Order aimed to regulate a scarce resource (newsprint), while the Newsprint Policy sought to promote small 	newspapers, encourage equal diversity among newspapers and prevent monopolies. The Supreme Court upheld the Newsprint Order, stating that newsprint was 	indeed a scarce resource, and that the matter of import and distribution of newsprint was a matter of government policy. The Court would not interfere 	unless there was evidence of &lt;i&gt;mala fides&lt;/i&gt;. However, the Court struck down the Newsprint Policy for reasons similar to &lt;i&gt;Sakal&lt;/i&gt; &lt;i&gt;Papers&lt;/i&gt; ; that the rights afforded to newspapers under Article 19(1)(a) - including circulation - could not be abridged for reasons of protecting against 	monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his dissenting opinion, Justice Mathew stated that in conceiving freedom of expression, it is important to also consider the hearer (the reader). For 	Justice Mathew, Meiklejohn's view the "&lt;i&gt;what is essential is not that everyone shall speak, but that everything worth saying shall be said&lt;/i&gt;" cannot be affected if, because of concentration of media ownership, media are not available for most speakers. In such a situation, "	&lt;i&gt;the hearers [cannot] be reached effectively&lt;/i&gt;". However, the imperative is to maximise diversity of speech. For this, we need to balance the rights 	of citizens against those of the press; i.e., the rights of the &lt;i&gt;reader&lt;/i&gt; against those of the &lt;i&gt;speaker&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar pointed out that this was the first case to consider the right of readers to access a diversity of speech. Justice Mathew distinguished 	curtailment of speech by the state, and by the market - and that this is crucial in the digital age, where information is predominantly accessible through 	and because of intermediaries. Ms. Kumar further stressed that especially in an age where 'walled gardens' are a real possibility (in the absence of net 	neutrality regulation, for instance), Justice Mathew's insistence on the rights of readers and listeners to a diversity of speech is extremely important.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Kumar went on to explain that though judges in the Supreme Court recognised the rights of readers/listeners (us, the citizens) for the purposes of news and print media, a similar right is denied to us in the case of TV. In	&lt;b&gt;&lt;i&gt;Secretary, Ministry of Broadcasting&lt;/i&gt; v. &lt;i&gt;Cricket Association of Bengal&lt;/i&gt; [AIR 1995 SC 1236]&lt;/b&gt;, the issue surrounded private operators' right to use airwaves to broadcast. The Supreme Court considered whether government agencies and Doordarshan, the government broadcaster, "	&lt;i&gt;have a monopoly of creating terrestrial signals and of telecasting them or refusing to telecast them&lt;/i&gt;", and whether Doordarshan could claim to be 	the single host broadcaster for all events, including those produced or organised by the company or by anybody else in the country or abroad. The Supreme 	Court held that the TV viewer has a right to a diversity of views and information under Article 19(1)(a), and also that the viewer must be protected 	against the market. The Court reasoned that " 	&lt;i&gt; airwaves being public property, it is the duty of the state to see that airwaves are so utilised as to advance the free speech right of the citizens, 		which is served by ensuring plurality and diversity of views, opinions and ideas &lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If every citizen were afforded the right to use airwaves at his own choosing, "&lt;i&gt;powerful economic, commercial and political interests&lt;/i&gt;" would 	dominate the media. Therefore, instead of affirming a distinct right of listeners, the Court conflated the interests of government-controlled media with 	those of the listeners, on the ground that government media fall under public and parliamentary scrutiny. According to Ms. Kumar this is a regressive 	position that formulates State interest as citizen interest. Ms. Kumar argued that in order to ensure freedom of speech there is a need to frame citizens' 	interests as distinct from those of the market and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court and Delhi High Court &amp;amp; Consultant, CIS&lt;/i&gt;&lt;br /&gt;Mr. Acharya's presentation focused on the divergence between the &lt;i&gt;jurisprudence&lt;/i&gt; and &lt;i&gt;policy&lt;/i&gt; surrounding freedom of expression in India. 	According to him, the policies of successive governments in India - from the colonial period and thereafter - have developed at odds with case-law relating 	to freedom of expression. Indeed, it is possible to discern from the government's actions over the last two centuries a relatively consistent narrative of 	governance which seeks to bend the individual's right to speech to its will. The defining characteristics of this narrative - the government's free speech 	policy - emerge from a study of executive and legislative decisions chiefly in relation to the press, that continue to shape policy regarding the freedom 	of expression on the Internet. Thus, there has been consistent tension between the individual and the community, as well as the role of the government in 	enforcing the expectations of the community when thwarted by law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, free speech scholarship (including digital speech) fails to take into account this consistent divergence between jurisprudence and policy. Mr. 	Acharya pointed out that we think of digital speech issues as new, whereas there is an immense amount of insight to gain by studying the history of free 	speech and policy in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Towards this, Mr. Acharya highlighted that to understand dichotomy between modern and native law and free speech policy, it is useful to go back to the 	early colonial period in India, when Governor-General Warren Hastings established a system of courts in Bengal's hinterland to begin the long process of 	displacing traditional law to create a modern legal system. J. Duncan M. Derrett notes that the colonial expropriation of Indian law was marked by a 	significant tension caused by the repeatedly-stated objective of preserving some fields of native law to create a dichotomous legal structure. These 	efforts were assisted by orientalist jurists such as Henry Thomas Colebrook whose interpretation of the dharmasastras heralded a new stage in the evolution 	of Hindu law. By the mid-nineteenth century, this dual system came under strain in the face of increasing colonial pressure to rationalise the legal system 	to ensure more effective governance, and native protest at the perceived insensitivity of the colonial government to local customs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya explained that this myopia in Indian policy research is similar &lt;i&gt;social censorship&lt;/i&gt; (i.e., social custom as creating limits to free 	speech). Law and society scholars have long studied the social censorship phenomenon, but policy research rejects this as a purely academic pursuit. But 	the truth is that free speech has been regulated by a dual policy of law and social custom in India since colonial times. The then-Chief Justice of the 	Calcutta High Court Elijah Impey required officers to respect local customs, and this extended to free speech as well. But as colonial courts did not 	interpret Hindu law correctly; interpretations of freedom of speech suffered as well. Mr. Acharya noted that the restrictions on freedom of speech 	introduced by the British continue to affect individuals in India today. Prior to British amendments, India had drawn laws from multiple sources - indeed 	customs and laws were tailored for communities and contexts, and not all were blessed with the consistency and precedent so familiar to common law. Since 	the British were unable to make sense of India's law and customs, they codified the principles of English customary law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Penal Code (IPC) saw the codification of English criminal law (the public offences of riots, affray, unlawful assembly, etc., and private 	offences such as criminal intimidation). In Macaulay's initial drafts, the IPC did not contain sedition and offences of hurting religious sentiments, etc. Sections 124A ("&lt;i&gt;Sedition&lt;/i&gt;") and 295A ("	&lt;i&gt;Deliberate and malicious acts intended to outrage religious feelings of any class by insulting its religion or religious beliefs&lt;/i&gt;") were added to 	the IPC in 1860, and changes were made to the Code of Criminal Procedure as well. Today, these sections are used to restrict and criminalise digital 	speech.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;The Right to Offend&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya then considered the history of the "right to offend", in light of the controversies surrounding Section 66A, IT Act. Before the insertion and strengthening of Section 295A, citizens in India had a right to offend others within the bounds of free speech. He clarified that in 1925 a pamphlet "	&lt;i&gt;Rangila Rasool&lt;/i&gt;" was published by Lahore-based Mahashe Rajpal (the name(s) of the author(s) were never revealed). The pamphlet concerned the 	marriages and sex life of the Prophet Mohammed, and created a public outcry. Though the publisher was acquitted of all charges and the pamphlet was upheld, 	the publisher was ambushed and stabbed when he walked out of jail. Under pressure from the Muslim community, the British enacted Section 295A, IPC. The 	government was seeking to placate and be sensitive to public feeling, entrenching the idea that the government may sacrifice free speech in the face of 	riots, etc. The death of India's "&lt;i&gt;right to offend&lt;/i&gt;" begins here, said Mr. Acharya.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;i&gt;prior restraint regime&lt;/i&gt; was created and strengthened in 1835, then in 1838, etc. At this time, the press in India was largely British. Following 	the growth of Indian press after the 1860s, the British made their first statutory attempt at censorship in 1867: a prior sanction was required for 	publication, and contravention attracted heavy penalties such as deportation and exile. Forfeiture of property, search and seizures and press-inspections 	were also permitted by the government under these draconian laws. Mr. Acharya noted that it is interesting that many leaders of India's national movement 	were jailed under the press laws.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Independence and After&lt;/span&gt;&lt;/i&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya further explained that the framers of the Constitution deliberately omitted "freedom of the press" from the text of Article 19(1)(a) and that 	Jawaharlal Nehru did not think the press ought to be afforded such a right. This is despite a report of the Law Commission of India, which recommended that 	corporations be provided an Article 19 right. But why distrust the press, though citizens are granted the freedom of speech and expression under Article 	19(1)(a)? In Mr. Acharya's opinion, this is evidence of the government's divergent approach towards free speech policy; and today, we experience this as a 	mistrust of the press, publications, and of online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya also explained that statutory restrictions on free speech grew at odds with judicial interpretation in the 1950s. Taking the examples of&lt;b&gt;&lt;i&gt;Romesh Thapar&lt;/i&gt; v. &lt;i&gt;the State of Madras&lt;/i&gt; [AIR 1950 SC 124]&lt;/b&gt; and	&lt;b&gt;&lt;i&gt;Brij Bhushan&lt;/i&gt; v. &lt;i&gt;the State of Delhi&lt;/i&gt; [(1950) Supp. SCR 245]&lt;/b&gt;, Mr. Acharya showed how the judiciary interpreted Article 19 favourably. Despite the government's arguments about a public order danger, the Supreme Court refused to strike down left wing or right wing speech (	&lt;i&gt;Romesh Thapar &lt;/i&gt;concerned a left wing publication; &lt;i&gt;Brij Bhushan&lt;/i&gt; concerned right wing views), as "public order" was not a ground for 	restricting speech in the Constitution. The government reacted to the Supreme Court's judgement by enacting the First Amendment to the Constitution: 	Article 19(2) was amended to insert "public order" as a ground to restrict free speech. Thus, it is possible to see the divergence between free speech 	jurisprudence and policy in India from the time of Independence. Nehru and Sardar Vallabhbhai Patel had supported the amendment, while B.R. Ambedkar 	supported Romesh Thapar and Brij Bhushan. On the other hand, then-President Rajendra Prasad sought Constitutional protection for the press.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Why Study Free Speech History?&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Acharya noted how the changes in free speech policy continue to affect us, including in the case of content restrictions online. In the 1950s, 	then-Prime Minister Nehru appointed the First Press Commission, and the newspaper &lt;i&gt;National Herald &lt;/i&gt;was established to promote certain (left wing) 	developmental and social goals. Chalapati Rao was the editor of the National Herald, and a member of the First Press Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At that time, the Commission rejected vertical monopolies of the press. However, today, horizontal monopolies characterize India's press. The First Press 	Commission also opposed 'yellow journalism' (i.e., sensational journalism and the tabloid press), but this continues today. Decades later, Prime Minister 	Indira Gandhi called for a "committed bureaucracy, judiciary and press", taking decisive steps to ensure the first two. For instance, Justice Mathew (one 	of the judges in the &lt;i&gt;Bennett Coleman&lt;/i&gt; case) was an admirer of Indira Gandhi. As Kerala's Advocate General, he wanted the Press Registrar to have 	investigative powers similar to those given in colonial times; he also wanted the attacks on government personalities to be criminalized. The latter move 	was also supported by M.V. Gadgil, who introduced a Bill in Parliament that sought to criminalise attacks on public figures on the grounds of privacy. Mr. 	Acharya noted that though Indira Gandhi's moves and motives with regard to a "committed press" are unclear, the fact remains that India's regional and 	vernacular press was more active in criticizing the Emergency than national press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Demonstrating the importance of understanding a contexts history - both social and legislative, following the striking down of 66A in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt; (Supreme Court, March 24, 2015), elements in the government have stated 	their wish to introduce and enact a new Section 66A. Mr. Acharya explained that such moves from elements in the government shows that despite the striking 	down of 66A, it is still possible for the repressive and mistrustful history of press policy to carry forward in India. This possibility is supported by 	colonial and post-Independence press history and policy that has been developed by the government. When looking at how research can impact policy, greater 	awareness of history and context may allow for civil society, academia, and the public at large to predict and prepare for press policy changes.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Ambikesh Mahapatra&lt;/b&gt;, &lt;i&gt;Professor of Chemistry, Jadavpur University&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prof. Mahapatra introduced himself as a victim of the West Bengal administration and ruling party. He stated that though India's citizens have been granted 	the protection of fundamental rights after Independence, these rights are not fully protected; his experience with the West Bengal ruling party and its 	abuse of powers under the Information Technology Act, 2000 (am. 2008) ("IT Act") highlights this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On March 23, 2012, Prof. Mahapatra had forwarded a cartoon to his friends by email. The cartoon poked fun at West Bengal Chief Minister Mamata Banerjee and 	her ruling party. On the night of April 12, 2012, individuals not residing in the Professor's housing colony confronted him, dragging him to the colony 	building and assaulting him. These individuals forced Prof. Mahapatra to write a confession about his forwarding of the cartoon and his political 	affiliations. Though the police arrived at the scene, they did not interfere with the hooligans. Moreover, when the leader of the hooligans brought the 	Professor to the police and asked that he be arrested, they did so even though they did not have an arrest warrant. At the police station, the hooligans 	filed a complaint against him. The Professor was asked to sign a memo mentioning the charges against him (Sections 114 and 500, Indian Penal Code, 1860 	&amp;amp; Section 66A, IT Act). Prof. Mahapatra noted that the police complaint had been filed by an individual who was neither the receiver nor the sender of 	the email, but was a local committee member with the Trinamool Congress (the West Bengal ruling party).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arrest sparked a series of indignant responses across the country. The West Bengal Human Rights Commission took &lt;i&gt;suo motu &lt;/i&gt;cognizance of the 	arrest, and recommended action against the high-handedness of the police. Fifty six intellectuals appealed to the Prime Minister of India to withdraw the 	arrest; the former Supreme Court judge Markandey Katju was among those who appealed. Thirty cartoonists' organisations from across the world also appealed 	to the President and the Prime Minister to withdraw the case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The West Bengal government paid no heed to the protests, and Chief Minister Mamata Banerjee publicly supported the actions of the police - making public 	statements against Justice Katju and A.K. Ganguly, former judge of the Supreme Court and head of the West Bengal Human Rights Commission respectively. A 	charge sheet was framed against Prof. Mahapatra and others, with Section 66A as one of the charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case has been going on for over two years. Recently, on March 10, 2015, the Calcutta High Court upheld the recommendations of the West Bengal Human 	Rights Commission, and directed the government to implement them. The West Bengal government has preferred an appeal before a division bench, and the case will continue. This is despite the fact that Section 66A has been struck down (by the Supreme Court in	&lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though noting that he was not an expert, Prof. Mahapatra put forward that it seemed that the freedom of expression of the common man depends on the whims 	of the ruling parties and the State/Central governments. It is of utmost importance, according to him, to protect the common man's freedom of speech, for 	his recourse against the government and powerful entities is pitifully limited.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; A participant stated that the core trouble appears to lie in the power struggle of political parties. Political parties wish to retain power and gather 	support for their views. Despite progressive laws, it is the Executive that implements the laws. So perhaps what is truly required is police and procedural 	reforms rather than legislative changes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel agreed that there is a need for more sensitivity and awareness amongst the law enforcement agencies and this might be long overdue 		and much needed step in protecting the rights of citizens. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant was interested in understanding how it might be possible to correct the dichotomy between FoE policy and doctrine? The participant also 	wanted the panel to comment on progressive policy making if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the&lt;b&gt; &lt;/b&gt;panel stated that there is no easy way of correcting this dichotomy between custom and law. Scholars have also argued 		that the relationship between custom and pernicious social censorship is ambiguous. Towards this, more studies are required to come to a conclusion. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q. &lt;/b&gt; A participant requested clarity on what rights can be created to ensure and support a robust right to freedom of expression, and how this might affect the 	debates surrounding net neutrality?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Members of the panel noted that the Internet allows citizens and corporations to regulate speech on their own (private censorship), and this is 		problematic. Members of the panel also responded that the existing free speech right does not enable diversity of speech. Social and local customs 		permit social censorship, and this network effect is clearly visible online; individuals experience a chilling effect. Finally, in the context of net 		neutrality, the interests of content-producers (OTTs, for instance) are different from those of users. They may benefit economically from walled 		gardens or from non-interference with traffic-routing, but users may not. Therefore, there is a need for greater clarity before coming to a conclusion 		about potential net neutrality regulation.&lt;/i&gt;&lt;/p&gt;
&lt;h2&gt;Session 2: Current Realities&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Dr. Cherian George,&lt;/b&gt; &lt;i&gt;Associate Professor, Hong Kong Baptist University &lt;/i&gt;&lt;br /&gt;Dr. George began his talk by highlighting how there is no issue as contentious as offensive speech and how it should be dealt with. The debate around free 	speech is often framed as a battle between those who support democracy and those who oppose it. Yet, this is also a tension within democracy. Citizens 	should not be unjustly excluded from participating in democracy (companion rights in Article 19 and 20, ICCPR). Relevant UN institutions and Article 19 	have come up with reports and ideals that should be universally adopted - norms that apply to many areas including speech. These norms are different from 	traditional approaches. For example:&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Human Rights Norms&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Traditional Approach&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Regulate incitement of violence (discrimination, hate, etc.)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects people's feelings from speech that offends&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Protect minorities as they are more vulnerable to exploitation and uprooting of their values&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law sides with the majority, to protect mainstream values over minority values&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Allow robust criticism of ideas, religions, and beliefs&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Law protects religion, beliefs, and ideas from criticism&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Strive for balance between liberty and equality&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Aims for order and maintenance of status quo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Promote harmony through the media&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Enforces harmony by the state&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Commenting on the traditional approach, Dr. George noted that if the state protects feelings of offence against speech, it allows groups to use such 	protection as a political weapon: "hate spin", which is the giving or taking of offence as a political strategy. Hate spin is normally framed as a 	"visceral, spontaneous reaction" to a video, writing, or speech, etc. Yet, the spontaneous reaction of indignation to speech or content can consistently be 	revealed to result from conscious manipulation by middlemen for political purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Asia is similar to West Asia - as the legal frameworks provide immunity for dangerous speech. In practice, this allows for the incitement of 	discrimination, hostility, and violence. At the same time, the legal frameworks allow for excessive sympathy for wounded feelings, and often the taking of 	offence turns into a political strategy. Power enters the equation here. The law allows the powerful to take offence and use hate speech against those not 	in powerful positions.&lt;/p&gt;
&lt;p&gt;Dr. George highlighted a number of legal quandaries surrounding freedom of expression including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Enforcement gaps:&lt;/b&gt; There is a lack of enforcement of existing laws against incitement.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Non-regulated zones:&lt;/b&gt; Socio-political research demonstrates that many problems cannot be regulated, and yet the law can only deal with what can be regulated. Hate speech is one 	of these as hate speech is not in the speech itself, but in the meaning that is produced in the mind of those saying/listening.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Verdict-proof opportunities: &lt;/b&gt; Political entrepreneurs can use legislative and judicial processes to mainstream hateful views, regardless of how legislature and courts ultimately act. 	The religious right, for instance, can always pit themselves morally against "secular" decisions of apex authorities (SC, etc.). For example, in the 	context of the US and Islamophobia - the State legislature in Alabama introduced an anti-Shariah law. Yet, the law is against a non-existent threat and 	appears to be a ploy to normalize anti-Muslim sentiments, including in political rhetoric. While focusing on winning battles in courts or legislature, the 	intolerant groups do not need to win a legal court case to introduce and entrench language of intolerance in public discourse and discussion. This 	demonstrates that there is a need to begin moving away from a purely legal analysis (interpretation or development) of the laws, and a need to begin 	studying these issues through a sociological lens.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Zakir Khan&lt;/b&gt;, &lt;i&gt;Article 19, Bangladesh &lt;/i&gt;&lt;br /&gt;Mr. Khan introduced Article 19 and its work in Bangladesh and the rest of South Asia. He noted that Article 19 is involved in documenting and analysing 	laws and regulations affecting freedom of expression, including in Bangladesh. Article 19 also campaigns for changes in law and policy, and responds from a 	policy perspective to particular instances of government overreach.&lt;/p&gt;
&lt;p&gt;Mr. Khan explained that India has the Information Technology Act, 2000 (am. 2008) ("IT Act"), and in Bangladesh, the equivalent legislation is the 	Information and Communication Technology Act, 2006 ("ICT Act"). The ICT Act was enacted to bring Bangladeshi law in conformity with international law; i.e. 	in accordance with the UNCITRAL model law on e-commerce and online transactions. The ICT Act deals with hacking, crimes committed with the use of a 	computer system, breach of data, breach of computer system, and hardware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like the IT Act in India, Bangladesh's ICT Act also criminalizes speech and expression online. For instance, Section 57, ICT Act, criminalizes the 	publication of "&lt;i&gt;fake, obscene or defaming information in electronic form&lt;/i&gt;". Similarly, bringing damage to "&lt;i&gt;the state's image&lt;/i&gt;" online is 	criminalized. In 2013, the Bangladesh Ministry of Law amended the ICT Act to increase penalties for online offences, and allow for the detention of 	suspected offenders, warrantless arrests and indefinite detention without bail. Bloggers and activists have been protesting these changes, and have been 	targeted for the same.&lt;/p&gt;
&lt;p&gt;Mr. Khan noted that Article 19 has developed a tool to report violations online. Individuals who have experienced violations of their rights online can 	post this information onto a forum, wherein Article 19 tracks and reports on them, as well as creating awareness about the violation. Any blogger or online 	activist can come and voice concerns and report their stories. Mr. Khan also highlighted that given the ICT Act and the current environment, online 	activists and bloggers are particularly threatened. Article 19 seeks to create a safe space for online bloggers and activists by creating anonymity tools, 	and by creating awareness about the distinctions between political agenda and personal ideology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Chinmayi Arun&lt;/b&gt;, &lt;i&gt;Research Director, Centre for Communication Governance (CCG), National Law University (Delhi)&lt;/i&gt;&lt;br /&gt;Ms. Arun began by noting that usually conversations around freedom of expression look at the overlap between FoE and content i.e. the focus is on the 	speaker and the content. Yet, when one targets the mediator - it shifts the focus as it would be approaching the issue from the intermediary's perspective. 	When structural violation of free speech happens, it either places the middleman in the position of carrying through the violation, or creates a structure 	through which speech violations are incentivized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is the Bazee.com case. At the time of the case the law was structured in such a way that not only perpetrators of unlawful content were 	punished, but so were the bodies/persons that circulated illegal content. In regulatory terms this is known as "gatekeeper liability". In the Bazee.com 	case, a private party put obscene content up for sale and Bazee.com could and did not verify all of the content that was for sale. In the case, the Delhi 	HC held Avnish Bajaj, the CEO of Bazee.com, liable on the precedent of strict liability for circulation of obscene content. The standard of strict 	liability was established under Ranjit Udeshi case. The standard of strict liability is still the norm for non-online content, but after Bazee.com, a 	Parliament Standing Committee created a safe harbour for online intermediaries under Section 79 of the IT Act. As per the provision, if content has been 	published online, but an intermediary has not edited or directly created the content, it is possible for them to seek immunity from liability for the 	content. The Parliament Standing Committee then stated that intermediaries ought to exercise due diligence. Thus, the Indian legal regime provides online 	intermediaries with immunity only if content has not been published or edited by an intermediary and due diligence has been exercised as defined by Rules 	under the Act. While developing India's legal regime for intermediary liability the Parliamentary Standing Committee did not focus on the impact of such 	regulation on online speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a large extent, present research and analysis of Freedom of Expression is focused on the autonomy of the speaker/individual. An alternative formulation 	and way of understanding the right, and one that has been offered by Robert Post through his theory of democratic self governance, is that Freedom of 	Expression is more about the value of the speech rather than the autonomy of the speaker. In such a theory the object of Freedom of Expression is to ensure 	diversity of speech in the public sphere. The question to ask then is: "Is curtailment affecting democratic dialogue?" The Supreme Court of India has 	recognized that people have a right to know/listen/receive information in a variety of cases. Ms. Arun explained that if one accepts this theory of speech, 	the liability of online intermediaries will be seen differently.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Arun further explained that in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the notice-and-takedown regime under section 79 of the IT Act has been amended, but the 	blocking regime under section 69A has not. Thus, the government can still use intermediaries as proxies to take down legitimate content, and not provide 	individuals with the opportunity to to challenge blocking orders. This is because as per the Act, blocking orders must be confidential. Though the blocking 	regime has not been amended, the Supreme Court has created an additional safeguard by including the requirement that the generator of content has to be 	contacted (to the extent possible) before the government can pass and act upon a blocking order. Mr. Arun noted that hopefully, when implemented, this will 	provide a means of recourse for individuals and counter, to some extent, the mandated secrecy of content blocking orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Raman Jit Singh Chima&lt;/b&gt;, &lt;i&gt;Asia Consultant, Access Now &lt;/i&gt;&lt;br /&gt;Mr. Chima began his presentation by noting that the Internet is plagued by a few founding myths. Tim Goldsmith and Jack Wu (in	&lt;i&gt;Who Controls the Internet: Illusions of a Borderless World&lt;/i&gt;) name one: that no &lt;i&gt;laws&lt;/i&gt; apply to the Internet; that, because of the borderless 	nature of the Internet - data flows through cables without regard for State borders - and thus countries' laws do not affect the Internet. These 	cyber-anarchists, amongst whom John Perry Barlow of the Electronic Frontier Foundation (EFF) is inspiring, also argue that &lt;i&gt;regulation&lt;/i&gt; has no role 	for the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima countered these 'myths', arguing that the law affects the Internet in many ways. The US military and Science departments funded the invention of 	the Internet. So the government was instrumental in the founding of the Internet, and the US Department of Commerce has agreements with ICANN (Internet 	Corporation for Assigned Names and Numbers) to govern the Domain Names System. So the law, contracts and regulation already apply to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima further explained that today organisations like EFF and civil society in India argue for, and seek to influence, the creation of regulation for 	the protection of journalists against unfair and wrongful targeting by the government. This includes moves to protect whistleblowers, to ensure the 	openness of the Internet and its protection from illegitimate and violative acts against freedom of expression, access and other rights. Some governments, 	like India, also place conditions in the licenses granted to Internet Service Providers (ISPs) to ensure that they bring access to the rural, unconnected 	areas. Such law and regulation are not only common, but they are also &lt;i&gt;good&lt;/i&gt;; they help the population against virtual wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima pointed out that when States contemplate policy-making for the Internet, they look to a variety of sources. Governments draw upon existing laws 	and standards (like India with the virtual obscenity offence provision Section, 67 and 67A, IT Act, which is drawn from the real-world penal provision 	Section 292, IPC) and executive action (regulation, by-laws, changes to procedural law) to create law for the Internet. Additionally, if a government 	repeats a set of government actions consistently over time, such actions may take on the force of law. Mr. Chima also spoke of web-developers and 	standards-developers (the technical community), who operate by rules that have the force of law, such as the 'rough consensus and running code' of the IETF 	(Internet Engineering Task Force). Governments also prescribe conditions ("terms of use") that companies must maintain, permitting or proscribing certain 	kinds of content on websites and platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, Mr. Chima highlighted international legal and policy standards that play a role in determining the Internet's law and regulation. ICANN, the 	administrator of the Internet Assigned Numbers Authority (IANA) functions and governing body for the Domain Names System, functions by a set of rules that 	operate as law, and in the creation of which, the international legal community (governments, companies, civil society and non-commercial users, and the 	technical community) play a role. The ITU (International Telecommunications Union) and organisations like INTERPOL also play a role.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima explained that when one wants to focus on issues concerning freedom of expression, multiple laws also apply. Different States set different standards. For instance, in the US, the main standards for the Internet came from issues relating to access to certain types of online content. In	&lt;i&gt;Reno &lt;/i&gt;v. &lt;i&gt;ACLU &lt;/i&gt;(1997), the US Supreme Court considered what standards should be created to access obscene and indecent content on the 	Internet. The judges held that the Internet, as a medium of unprecedented dynamism, deserved the higher protection from governmental overreach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Asia, the main legal standards for the Internet came from Internet commerce: the UNCITRAL model law, which prescribed provisions best suited to the 	smoother commercial utilization of a fast and growing medium, became the foundation for Internet-related law in Asian states. Predictably, this did not 	offer the strongest rights protections, but rather, focused on putting in place the most effective penalties. But when Asian states drew from the European 	UNCITRAL law, many forgot that European states are already bound by the European Convention for Human Rights, the interpretation of which has granted 	robust protections to Internet-related rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima provided the example of Pakistan's new Cybercrime Bill. The Bill has troubling provisions for freedom of expression, and minimal to no due 	process protections. While drafting the law, Pakistan has drawn largely from model cybercrime laws from the Council of Europe, which are based on the 	Budapest Convention. In Europe and the US, States have strong parallel protections for rights, but States in Asia and Africa do not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Chima concluded that when one talks of freedom of expression online, it is important to also remember the roles of intermediaries and companies. The 	ISPs can be made liable for content that flows through their wires, through legal mechanisms such as license provisions. ISPs can also be made to take 	further control over the networks, or to make some websites harder to access (like the Internet Watch Foundation's blacklist). When policy organisations 	consider this, it is critical that they ask whether industry bodies should be permitted to do this &lt;i&gt;without public discussion&lt;/i&gt;, on the basis of 	government pressure.&lt;/p&gt;
&lt;h3&gt;Questions &amp;amp; Comments&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for panel members to talk about the context in which bloggers find themselves in danger in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members stated that the courts are not fair to bloggers as often they side with government. It was added that courts have labelled bloggers as 		atheist, and subsequently all bloggers are being associated with the label. Further, it was added that most people who are outraged, do not even know 		what blogging is, and people associate blogging with blasphemy and as opposing religious beliefs. It was also noted that in Bangladesh, while you see 		violations of FoE from the State, you see more violations of blogger rights from non-state actors. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked if there is anything specific about the Internet that alters how we should consider hate speech online and their affective/visceral 	impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt;Pa&lt;/i&gt; &lt;i&gt; nel members noted that they are still grappling with the question of what difference the Internet makes, but noted that it has indeed complicated an 		already complex issue as there is always the question about political entrepreneurs using convenient content to foment fires. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Q.&lt;/b&gt; Participants questioned panel members about how the right to offend is protected in jurisdictions across Asia where there is still tension between 	classical liberalism and communitarian ideologies, and where the individuated nature of rights is not clearly established or entrenched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded by stating that when one compares the US, Indonesia and India, the US seems to be able to strike a balance between free speech 		and other competing interests as they are committed to free speech and committed to religious tolerance and plurality of competing interests. Panel 		members also added that the fabric of civil society also has an impact. For example, Indonesian civil society is simultaneously religious and secular 		and pro-democracy. In India, there seems to be a tension between secular and religious groups. In Indonesia, people are moving to religion for comfort, 		while still seeking a world that is religious and secular. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q. &lt;/b&gt; Participants asked for clarification on ways to approach regulation of hate speech given that hate speech is not just about a particular kind of 	threatening speech, but encompasses rumours and innuendos.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A&lt;/i&gt;&lt;/b&gt; &lt;i&gt; . Panel members acknowledged that more research needs to be done in this area and added that applying the socio-cultural lens on such issues would be 		beneficial. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q.&lt;/b&gt; Participants asked if panel members had a framework for a regulating the content practices of private actors, who are sometimes more powerful than the 	state and also enforcing censorship.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;A. &lt;/i&gt;&lt;/b&gt; &lt;i&gt; Panel members responded that private censorship is an important issue that needs to be reflected upon in some depth, though a framework is far from 		being developed even as research is ongoing in the space. &lt;/i&gt;&lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h2&gt;Session 3: Looking Ahead&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third and final session of the conference aimed to find principles and methods to achieve beneficial and effective regulation of the Internet. One of 	the core aims was the search for the right balance between the dangers of the Internet (and its unprecedented powers of dissemination) and the citizens' 	interest in a robust right to freedom of expression. Mr. Sutirtho Patranobis, &lt;i&gt;Assistant Editor with the Hindustan Times &lt;/i&gt;(Sri Lanka desk, previously China correspondent), shared his experience with governmental regulation of online free speech in China and Sri Lanka. Ms. Karuna Nandy,&lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;, analysed the Indian Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(March 24, 2015), and sought to draw lessons for the current debate on net 	neutrality in India. Ms. Geeta Seshu, &lt;i&gt;founder and editor&lt;/i&gt; of the online magazine &lt;i&gt;The Hoot&lt;/i&gt;, offered an expanded definition of freedom of 	speech, focusing on universal access as the imperative. Finally, Mr. Pranesh Prakash, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;, offered 	his views on net neutrality and the issue of zero-rating, as well as arguing for an increased, cooperative role of civil society in creating awareness on 	issues relating to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sutirtho Patranobis&lt;/b&gt;, &lt;i&gt;Assistant Editor, Hindustan Times&lt;/i&gt;&lt;br /&gt;During his career, Mr. Patranobis was the China correspondent for the &lt;i&gt;Hindustan Times&lt;/i&gt;. Mr. Patranobis began his presentation by sharing his 	experiences in China. In China, multiple online platforms have become sources of news for citizens. Chinese citizens, especially the urban young, spend 	increasing amounts of time on their mobile phones and the Internet, as these are the major sources of news and entertainment in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chinese government's attitude towards freedom of expression has been characterized by increasing control over these online platforms. The includes 	control over global companies like Google and Facebook, which have negotiated with the Chinese government to find mutually acceptable operating rules 	(acceptable to the government and the company, but in most cases unfavourable to the citizens) or have faced being blocked or filtered from the country. 	Mr. Patranobis noted that free speech regulation in China has evolved into a sophisticated mechanism for control and oppression, and the suppression of 	dissent. Not only China, but Sri Lanka has also adopted similar approaches to dealing with freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In China, free speech regulations have evolved with an aim to curtail collective action and dissent. China's censorship programmes work towards silencing 	expression that can represent, reinforce or spur social mobilisation. Mr. Patranobis explained that these programmes aim to put an end to all collective 	activities (current or future) that may be at odds with government policies. Therefore, any online activity that exposes government action as repressive, 	corrupted or draconian is meted out harsh treatment. Indeed it is possible to see that there are sharp increases in online censorship and crackdowns when 	the government implements controversial policies offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis went on to discuss the nature of objectionable content, and the manner in which different jurisdictions deal with the same. Social and 	cultural context, governmental ideologies, and political choices dictate the nature of objectionable content in States such as China and Sri Lanka. On the 	flipside, media literacy, which plays a big role in ensuring an informed and aware public, is extremely low in Sri Lanka, as well as in many other States 	in South Asia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Patranobis raised the question of how the Internet can be regulated while retaining freedom of expression - noting that the way forward is uncertain. 	In Sri Lanka, for instance, research by UNESCO shows that the conflicting policy objectives are unresolved; these first need to be balanced before robust 	freedom of expression can be sustained. The Internet is a tool, after all; a tool that can connect people, that can facilitate the spread of knowledge and 	information, to lift people from the darkness of poverty. The Internet can also be a tool to spread hate and to divide societies and peoples. Finding the 	right balance, contextualised according to the needs of the citizens and the State, is key to good regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Karuna Nundy&lt;/b&gt;, &lt;i&gt;Advocate, Supreme Court of India&lt;/i&gt;&lt;br /&gt;Ms. Nandy focused her presentation on two issues currently raging in India's free speech debates: the Supreme Court's reasoning on Sections 66A and 69A, IT 	Act, in &lt;b&gt;&lt;i&gt;Shreya Singhal &amp;amp; Ors. &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;(Supreme Court, March 24, 2015), and issues of access and 	innovation in the call for a net neutrality regulation. She stated that the doctrine of the "marketplace of ideas" endorsed by Justices Nariman and 	Chelameswar in &lt;i&gt;Shreya Singhal&lt;/i&gt; speaks to the net neutrality debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Nandy held that a law can be challenged as unconstitutional if it prohibits acts that are legitimate and constitutional. Such an argument refers to the 	impugned law's "overbroad impact". For instance, the Supreme Court struck down Section 66A, IT Act, on the ground (among others) that the impugned section leads to the prohibition and criminalisation of legitimate and protected speech. Cases such as&lt;b&gt;&lt;i&gt;Chintaman Rao&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh &lt;/i&gt;[(1950) SCR 759] &lt;/b&gt;and	&lt;b&gt;&lt;i&gt;Kameshwar Prasad&lt;/i&gt; v. &lt;i&gt;State of Bihar &lt;/i&gt;[1962 Supp. (3) SCR 369] &lt;/b&gt;speak to this principle. They expand the principle of 	overbreadth to include the notion of "chilling effect" - i.e., situations where overbroad blocking leads to the prohibition of legitimate constitutional 	speech. In such situations, citizens are unsure what constitutes protected speech and what does not, leading to a chilling effect and self-censorship for 	fear of reprisals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court also considered the "reasonable person" doctrine that has been developed under the law of obscenity. India 	had initially adopted the &lt;i&gt;Hicklin test&lt;/i&gt;, under which the test to determine what is obscene depended on whether prurient minds (minds that have a tendency to be corrupted) would find the impugned material lascivious and corrupting. This test, laid down in	&lt;b&gt;&lt;i&gt;Ranjit Udeshi&lt;/i&gt; v. &lt;i&gt;State of Maharashtra &lt;/i&gt;[AIR 1965 SC 881] &lt;/b&gt;and altered/refined by decades of jurisprudence, was put to rest 	in &lt;b&gt;&lt;i&gt;Aveek Sarkar&lt;/i&gt; v. &lt;i&gt;State of West Bengal &lt;/i&gt;[AIR 2014 SC 1495]&lt;/b&gt;. In &lt;i&gt;Aveek Sarkar&lt;/i&gt;, the Supreme Court adopted the 	"community standards" test to determine obscene content. According to Ms. Nandy, the "community standards" test rests on the doctrine of reasonable 	persons. Ms. Nandy noted that in effect there is a need for more police officers to protect those who produce legitimate content from hecklers.&lt;/p&gt;
&lt;p&gt;Quoting from the U.S. decision of &lt;b&gt;&lt;i&gt;Whitney&lt;/i&gt; v. &lt;i&gt;California&lt;/i&gt; [71 L. Ed. 1095]&lt;/b&gt;, Ms. Nandy submitted that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; It is the function of speech to free men from the bondage of irrational fears. To justify suppression of free speech there must be reasonable ground to 		fear that serious evil will result if free speech is practiced. There must be reasonable ground to believe that the danger apprehended is imminent. 		There must be reasonable ground to believe that the evil to be prevented is a serious one. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the issue of website blocking and the Supreme Court's reasoning on Section 69A, IT Act, in &lt;i&gt;Shreya Singhal&lt;/i&gt;, Ms. Nandy explained that the 	Additional Solicitor General had conceded a number of points during the oral arguments. She further explained that website blocking can be applied when the 	Central Government is satisfied that there is a necessity for it. However, reasons must be recorded in writing. Also, according to the Supreme Court's interpretation of the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009 ("	&lt;i&gt;Blocking Rules&lt;/i&gt;"), both the intermediary and the originator of the communication (the content-creator) have to be given a chance to be heard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 16 of the Blocking Rules, which mandates confidentiality of all blocking requests and orders, was also discussed in &lt;i&gt;Shreya Singhal&lt;/i&gt;. Though 	some confusion has arisen about the Rule's interpretation, Ms. Nandy submitted that Rule 16 has been read down. There is no longer a strict, 	all-encompassing requirement of confidentiality. While the identity of the complainant and the exact nature of the complaint must be kept confidential, the 	blocking order and the reasoning behind the order are no longer bound by Rule 16. This is because in §109 of the judgment, the Supreme Court accepts 	that writ petitions can lie on the basis of blocking orders. In order for writs to lie, affected parties must first be aware of the existence and content 	of the blocking order. Therefore, Ms. Nandy explained, the effect of the Supreme Court's reasoning is that the confidentiality requirement in Rule 16 has 	been read down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Ms. Nandy argued that zero-rating is an efficient solution to providing universal access to the Internet. Services like	&lt;i&gt;Internet.org&lt;/i&gt; are not strictly market-driven. This is because there is not a large demand for Facebook or specific over-the-top (OTT) service 	providers. In speaking about the marketplace for ideas in &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court did not indirectly outlaw services seeking to balance 	access with diversity of speech. Ms. Nandy held that price discrimination in the provision of telecom, broadband and mobile Internet services already 	exists. In light of this, the focus should the provision of these services on the basis of consumer choice.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Geeta Seshu&lt;/b&gt;, &lt;i&gt;The Hoot&lt;/i&gt;&lt;br /&gt;Ms. Seshu began her presentation by noting that one's perspective on online censorship cannot be the same as that on traditional censorship. Traditional 	censorship cuts off an individual's access to the censored material, but on the Internet, material that is censored in traditional media finds free and 	wide distribution. One's conceptualisation of freedom of expression and curtailment of this right must include access to the medium as a crucial part. To 	this end, it is important to not forget that access to the Internet is controlled by a limited number of Internet service and content providers. Thus, a 	large section of the population in India cannot exercise their right to free speech because they do not have &lt;i&gt;access&lt;/i&gt; to the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this context, it is important to understand the way in which the digital rollout is happening in India. Ms. Seshu explained that the rollout process 	lacks transparency, and noted the example of the 4G/LTE rollout plan in India. There is, of course, a diversity of content: those that have access to the 	Internet have the ability to exercise their right to free speech in diverse ways. However, introducing access into the free speech universe highlights many 	inequalities that exist in the right; for instance, Dalit groups in India have limited access to the Internet, and some kinds of content receive limited 	airtime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, Ms. Seshu argued that the government and other entities use technology to regulate content availability. Policymakers exploit the technology 	and architecture of the networks to monitor, surveil and censor content. For instance, one may see the UID scheme as an adaptation of technology to 	facilitate not only service-provision, but also as a move towards a Big Brother state. Civil society and citizens need to study and respond to the ways in 	which technology has been used against them. Unfortunately, the debates surrounding regulation do not afford space for Internet users to be part of the 	discussion. In order to turn this around, it is important that citizens' and users' rights are developed and introduced into the regulatory equation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pranesh Prakash&lt;/b&gt;, &lt;i&gt;Policy Director, Centre for Internet &amp;amp; Society&lt;/i&gt;&lt;br /&gt;Taking up where Ms. Seshu left off, Mr. Prakash wished to explore whether the Internet was merely an enabler of discussion - allowing, for instance, a 	ruckus to be raised around the consultation paper of the Telecom Regulatory Authority in India (TRAI) on Over-The-Top (OTT) services and net neutrality - 	or whether the Internet positively adds value. The Internet is, of course, a great enabler. The discussions surrounding OTTs and net neutrality are an 	example: in response to the TRAI consultation, a campaign titled "Save the Internet" resulted in over 9.5 lakh comments being submitted to the TRAI. It is 	inconceivable that such a widespread public discussion on so complex a topic (net neutrality) could take place without the Internet's facilitation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, Mr. Prakash held, it is important to remember that the Internet is the tool, the platform, for such mobilisation. Campaigns and conversations such as 	those on net neutrality could not take place without the organisations and people involved in it. Civil society organisations have played prominent roles 	in this regard, creating awareness and well-informed discussions. For Mr. Prakash, civil society organisations play their role best when they create such 	public awareness, and it is important, to play to a stakeholders strengths. Some organisations are effective campaigners, while others (such as CIS) are 	competent at research, analysis and dissemination.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Mr. Prakash, it is equally important to remember that successful discussions, campaigns or debates (such as the ongoing one on net neutrality) 	do not occur solely because of one organisation's strengths, or indeed because of civil society alone. Networks are especially critical in successful 	campaigns and policy changes. As researchers, we may not always know where our work is read, but sometimes they reach unexpected venues. For instance, one 	of Mr. Prakash's papers was used by the hacker collective Anonymous for a local campaign, and he was made aware of it only accidentally. Mr. Prakash noted 	that civil society has to also accept its failures, pointing to the controversy surrounding the Goondas Act in Karnataka. Where there are strong 	counter-stakeholders (such as the film lobby in south Indian states), civil society's efforts alone may not lead to success.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On net neutrality, Mr. Prakash noted the example of a strategy employed by the &lt;i&gt;Times of India&lt;/i&gt; newspaper, when it undercut its competitors by 	slashing its own prices. Such moves are not unknown in the market, and they have their benefits. Consumers benefit from the lowered prices. For instance, 	were a Whatsapp or Facebook pack to be introduced by a telecom operator, the consumers may choose to buy this cheap, limited data pack. This is beneficial 	for consumers, and also works to expand access to the Internet. At the same time, diversity of speech and consumer choice is severely restricted, as these 	companies and telecom operators can create 'walled gardens' of information and services. Mr. Prakash put forth that if we can facilitate competitive 	zero-rating, and ensure that anti-competitive cross-subsidization does not occur, then perhaps zero-rated products can achieve access without forcing a 	trade off between diversity and choice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, on the issue of website blocking and takedowns under Sections 69A and 79, IT Act, Mr. Prakash noted that the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment does 	nothing to restrict the judiciary's powers to block websites. According to Mr. Prakash, at the moment, the &lt;i&gt;Shreya Singhal&lt;/i&gt; judgment relieves 	intermediaries of the responsibility to take down content if they receive private complaints about content. After the judgment, intermediaries will lose 	their immunity under Section 79, IT Act, only if they refuse to comply with takedown requests from government agencies or judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, as Mr. Prakash explained, the judiciary is itself a rogue website-blocker. In the past few years, the judiciary has periodically ordered the blocking 	of hundreds of websites. Such orders have resulted in the blocking of a large number of legitimate websites (including, at one point, Google Drive and 	Github). To ensure that our freedom of expression online is effectively protected, Mr. Prakash argued that ways to stop the judiciary from going on such a 	rampage must be devised.&lt;/p&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;Questions &amp;amp; Comments&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A.&lt;/b&gt; Participants and panel members commented that researchers and commentators err by making analogies between the Internet and other media like newspapers, 	couriers, TV, satellite, cable, etc. The architecture of the Internet is very different even from cable. On the Internet, traffic flows both ways, whereas 	cable is not bi-directional. Moreover, pricing models for newspapers have nothing in common with those on the Internet. The comparisons in net neutrality 	debates stand the danger of incorrectness, and we must guard against that. Zero-rating and net neutrality issues in high-access countries are very 	different from the issues in low-access countries like India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B.&lt;/b&gt; Participants and panel members commented that access and availability must play a predominant role in thinking about freedom of expression. In India, we 	are technologically far behind other states, though we have potential. The real end-goal of this is the convergence of services and information, with the 	user at the centre of the ecosystem. Our technological capabilities include satellite and spectrum; the best spectrum bands are lying vacant and can be 	re-framed. For this, the government must be educated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;C.&lt;/b&gt; Participants and panel members commented that in high-access states, the net neutrality issues surround competition and innovation (since there is no or 	very little ISP competition and switching costs are not low), while in India and France, where there is already competition amongst providers, access plays 	a crucial role. On the Internet, the networking or engineering aspects can disrupt the content carried over the network, so that is also a concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;D. &lt;/b&gt; Participants and panel members commented that zero-rating is both a blessing and a curse. Zero-rating would not be detrimental in a market with perfect 	information and competition. But the reality is information asymmetry and imperfect competition. If today, we were to allow zero-rating, diversity would 	suffer and we would be left with 'walled gardens'.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The conference addressed a range of issues characteristic of debates surrounding freedom of expression in India and South Asia. Beginning with the 	conceptual understanding of freedom of expression, panellists advocated an expanded definition, where the right to free speech is teleological. The 	panellists considered freedom of speech as a tool to ensure diversity of speech, both horizontally and vertically. Towards this end, panellists gave 	several suggestions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt; , policymakers and scholars must understand freedom of speech as a right of &lt;i&gt;both&lt;/i&gt; the speaker and the listener/reader, and carve out a separate 	listeners' right. Panellists expanded upon this to show the implications for the debate on net neutrality, cross-media ownership and website-blocking, for 	instance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt; , there is a need for scholars to examine the historical dichotomy between the &lt;i&gt;policy &lt;/i&gt;and &lt;i&gt;jurisprudence&lt;/i&gt; of free speech in India and other 	contexts across South Asia. Such an approach to scholarship and policy research would help predict future government policy (such as in the case of the Indian government's stance towards Section 66A following the Supreme Court's decision in	&lt;b&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/b&gt;) and strategize for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt; , particularly with regard to the Internet, there is a need for policy advocates and policy makers to "bust" the founding myths of the Internet, and look 	to various domestic and international sources of law and regulation. Studies of regulation of freedom of speech on the Internet in different jurisdictions (Bangladesh, China, Sri Lanka) indicate differing government approaches, and provide examples to learn from. The interpretation and consequences of	&lt;i&gt;Shreya Singhal&lt;/i&gt; on website-blocking and intermediary liability in India provide another learning platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Fourth&lt;/i&gt; , panellists discussed the possibilities of cooperation and strategies among civil society and policy organisations in India. Taking the example of the	&lt;i&gt;Save the Internet&lt;/i&gt; campaign surrounding net neutrality in India, panellists speculated on the feasibility of using the Internet itself as a tool to 	campaign for governance and policy reform. Together with the audience, the panellists identified several areas that are ripe for research and advocacy, 	such as net neutrality and zero-rating, and citizens' free speech right as being separate from governmental and corporate interests.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age'&gt;https://cis-india.org/internet-governance/blog/freedom-of-expression-in-a-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetha Hariharan and Jyoti Panday</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-07-15T14:42:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage">
    <title>Net Neutrality and the Law of Common Carriage</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage</link>
    <description>
        &lt;b&gt;Net neutrality makes strange bedfellows. It links the truck operators that dominate India’s highways, such as those that carry vegetables from rural markets to cities, and Internet service providers which perform a more technologically advanced task.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/net-neutrality-law-of-common-carriage.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, the truckers have opposed the government’s attempts to impose the obligations of common carriage on them, this has resulted in strikes and temporary price rises; and, in the years ahead, there is likely to be a similar – yet, technologically very different – debate as net neutrality advocates call for an adapted version of common carriage to bind Internet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality demands a rigorous examination that is not attempted by this short note which, constrained by space, will only briefly trace the law and policy of net neutrality in the US and attempt a brief comparison with the principles of common carriage in India. Net neutrality defies definition. Very simply, the principle demands that Internet users have equal access to all content and applications on the Internet. This can only be achieved if Internet service providers: (i) do not block lawful content; (ii) do not throttle – deliberately slow down or speed up access to selected content; (iii) do not prioritise certain content over others for monetary gain; and, (iv) are transparent in their management of the networks by which data flows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost exactly a year ago, the District of Columbia Circuit Court of Appeals – a senior court below the US Supreme Court – struck down portions of the ‘Open Internet Order’ that was issued by the Federal Communications Commission (FCC) in 2010. Although sound in law, the Court’s verdict impeded net neutrality to raise crucial questions regarding common carriage, free speech, competition, and others. More recently, Airtel’s announcement of its decision to charge certain end-users for VoIP services – subsequently suspended pending a policy decision from the Telecom Regulatory Authority of India (TRAI) – has fuelled the net neutrality debate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because of its innovative technological history in relation to the Internet, the US has pioneered many legal attempts to regulate the Internet in respect of net neutrality. In 1980, when Internet data flowed through telephone lines, the FCC issued the ‘Computer II’ regime which distinguished basic services from enhanced services. The difference between the two turned on the nature of the transmission. Regular telephone calls involved a pure transmission of data and were hence classified as basic services. On the other hand, access to the Internet required the processing of user data through computers; these were classified as enhanced services. Importantly, because of their essential nature, the Computer II rules bound basic services providers to the obligations of common carriage whereas enhanced services providers were not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is common carriage? Common law countries share a unique heritage in respect of their law governing the transport of goods and people. Those that perform such transport are called carriers. The law makes a distinction between common carriers and other carriers. A carrier becomes a common carrier when it “holds itself out” to the public as willing to transport people or goods for compensation. The act of holding out is simply a public communication of an offer to transport, it may be fulfilled even by an advertisement. The four defining elements of a common carrier are (i) a holding out of a willingness (a public undertaking) (ii) to transport persons or property (iii) from place to place (iv) for compensation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common carriers discharge a public trust. By virtue of their unique position and essential function, they are required to serve their customers equally and without discrimination. The law of carriage of goods and people places four broad duties upon common carriers. Firstly, common carriers are bound to carry everyone’s goods or all people and cannot refuse such carriage unless certain strict conditions are met. Secondly, common carriers must perform their carriage safely without deviating from accepted routes unless in exceptional circumstances. Thirdly, common carriers must obey the timeliness of their schedules, they must be on time. And, lastly, common carriers must assume liabilities for the loss or damages of goods, or death or injuries to people, during carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Computer II regime was issued under a telecommunications law of 1934 which retained the classical markers and duties of common carriers. The law extended the principles of common carriage to telephone services providers. In 1980, when the regime was introduced, the FCC did not invest Internet services with the same degree of essence and public trust; hence, enhanced services escaped strict regulation. However, the FCC did require that basic services and enhanced services be offered through separate entities, and that basic services providers that operated the ‘last-mile’ wired transmission infrastructure to users offer these facilities to enhanced services providers on a common carrier basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1996, the new Telecommunications Act revisited US law after more than sixty years. The new dispensation maintained the broad structure of the Computer II regime: it recognised telecommunications carriers in place of basic services providers, and information-services providers in place of enhanced services. Carriers in the industry had already converged telephone and Internet communications as a single service. Hence, when a user engaged a carrier that provided telephone and broadband Internet services, the classification of the carrier would depend on the service being accessed. When a carrier provided broadband Internet access, it was an information-services provider (not a telecommunications carrier) and vice versa. Again, telecommunications carriers were subjected to stricter regulations and liability resembling common carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1998, the provision of broadband Internet over wired telephone lines through DSL technologies was determined to be a pure transmission and hence a telecommunications service warranting common carriage regulation. However, in 2002, the FCC issued the ‘Cable Broadband Order’ that treated the provision of cable broadband through last-mile wired telephone transmission networks as a single and integrated information service. This exempted most cable broadband from the duties of common carriage. This policy was challenged in the US Supreme Court in 2005 in the Brand X case and upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, the decision in the Brand X case was not made on technological merits. The case arose when a small ISP that had hitherto used regular telephone lines to transmit data wanted equal access to the coaxial cables of the broadcasting majors on the basis of common carriage. Instead of making a finding on the status of cable broadband providers based on the four elements of common carriage, the Court employed an administrative law principle of deferring to the decisions of an expert technical regulator – known as the Chevron deference principle – to rule against the small ISP. Thereafter wireless and mobile broadband were also declared to be information services and saved from the application of common carriage law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking advantage of this exemption from common carriage which released broadband providers from the duty of equal access and anti-discrimination, Comcast began from 2007 to degrade P2P data flows to its users. This throttling was reported to the FCC which responded with the 2008 ‘Comcast Order’ to demand equal and transparent transmission from Comcast. Instead, Comcast took the FCC to court. In 2010, the Comcast Order was struck down by the DC Circuit Court of Appeals. And, again, the decision in the Comcast case was made on an administrative law principle, not on technological merits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Comcast case, the Court said that as long as the FCC treated broadband Internet access as an information service it could not enforce an anti-discrimination order against Comcast. This is because the duty of anti-discrimination attached only to common carriers which the FCC applied to telecommunications carriers. Following the Comcast case, the FCC began to consider reclassifying broadband Internet providers as telecommunications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the 2010 ‘Open Internet Order’, the FCC attempted a different regulatory approach. Instead of a classification based on common carriage, the new rules recognised two types of Internet service providers: (i) fixed providers, which transmitted to homes, and, (ii) mobile providers, which were accessed by smartphones. The rules required both types of providers to ensure transparency in network management, disallowed blocking of lawful content, and re-imposed the anti-discrimination requirement to forbid prioritised access or throttling of certain content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before they were even brought into effect, Verizon challenged the Open Internet Order in the same court that delivered the Comcast judgement. The decision of the Court is pending. Meanwhile, in India, Airtel’s rollback of its announcement to charge its pre-paid mobile phone users more for VoIP services raises very similar questions. Like the common law world, India already extends the principles of common carriage to telecommunications. Indian jurisprudence also sustains the distinction between common carriage and private carriage, and applies an anti-discrimination requirement to telecommunications providers through a licensing regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI must decide if it wants to continue this distinction. No doubt, the provision of communications services through telephone and the Internet serves an eminent public good. It was on this basis that President Obama called on the FCC to reclassify broadband Internet providers as common carriers. Telecommunications carriers, such as Airtel, might argue that they have expended large sums of money on network infrastructure that is undermined by the use of high-bandwidth free VoIP applications, and that the law of common carriage must recognise this fact. And still others call for a new approach to net neutrality outside the dichotomy of common and private carriage. Whatever the solution, it must be reached by widespread engagement and participation, for Internet access – as the government’s Digital India project is aware – serves public interest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T11:09:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script">
    <title>Reading Devanagari script based sites like Konkani Wikipedia in Kannada Script</title>
    <link>https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script</link>
    <description>
        &lt;b&gt;This is a small hack to read websites with Devanagari script (used for Hindi, Marathi, Nepali, Maithili and a few more languages) based sites like Konkani Wikipedia in Kannada script.&lt;/b&gt;
        
&lt;p id="docs-internal-guid-ff83ed1f-466f-a710-9ab0-9e891e7f5af6" style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://gom.wikipedia.org/"&gt;Konkani Wikipedia&lt;/a&gt; finally &lt;a href="http://blog.wikimedia.org/2015/07/15/konkani-wikipedia-goes-live/"&gt;went live&lt;/a&gt; in this June after being in &lt;a href="https://incubator.wikimedia.org/wiki/Wp/gom"&gt;Incubator &lt;/a&gt;for nine years. &lt;a href="https://en.wikipedia.org/wiki/Konkani_language"&gt;Konkani language&lt;/a&gt; is written using five different scripts; Devanagari (official script for Konkani in Goa), Kannada, Latin, Malayalam and Persian. The current Konkani Wikipedia is available at &lt;a href="https://gom.wikipedia.org"&gt;https://gom.wikipedia.org&lt;/a&gt; where “gom” is for the Goan variation of Konkani.&lt;/p&gt;
&lt;p style="text-align: center;" dir="ltr"&gt;&lt;img src="https://cis-india.org/home-images/Wikipedia.png" alt="null" class="image-inline" title="Wikipedia" /&gt;&lt;/p&gt;
&lt;p&gt;There is a significant Konkani population in coastal Karnataka and to a small extent in northern Kerala that use &lt;a href="https://en.wikipedia.org/wiki/Kannada_alphabet"&gt;Kannada script&lt;/a&gt; for writing Konkani. Many of these people might be facing issues with reading the Konkani articles in Devanagari script in the Goan Konkani Wikipedia which brings the need for making the Wikipedia available in Kannada and other scripts that Konkani uses.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There are various ways to go about it. Some of the Wikimedia projects like the &lt;a href="https://sr.wikipedia.org/"&gt;Serbian &lt;/a&gt; and &lt;a href="https://zh.wikipedia.org"&gt;Chinese Wikipedia&lt;/a&gt; already had this issue and had multi-script transliteration as a solution. Transliteration between Devanagari and Kannada scripts could be transliterated in multiple ways and below is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Noted typographer &lt;a href="https://kn.wikipedia.org/wiki/%E0%B2%95%E0%B3%86._%E0%B2%AA%E0%B2%BF._%E0%B2%B0%E0%B2%BE%E0%B2%B5%E0%B3%8D"&gt;K. P. Rao&lt;/a&gt; who is known for creating fonts for almost all the Indian scripts has recently come up with a solution for Devanagari⟷Kannada transliteration by creating a new font “Devama” that has Devanagari Unicode encodings with Kannada glyphs. The font has the rendering logic as per Kannada rules which means if we set this fonts for any text typed using Devanagari script, it will display it in Kannada script. This will help anyone who can read Kannada script to read something written in Devanagari. Mr. Rao has generously released “Devama” under Open Font License (OFL) ver. 1.1. The source file for the font is currently available at&lt;a href="https://github.com/pavanaja/DevamaNew"&gt; https://github.com/pavanaja/DevamaNew&lt;/a&gt; for anyone to use and modify with attribution.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;How to use the font:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;a href="https://github.com/pavanaja/DevamaNew/archive/master.zip"&gt;Download and install the font as a .zip file&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Unzip the file and find the “Devama.otf” file. Install it. (the installation will vary based on your operating system, check a &lt;a href="http://www.howtogeek.com/192980/how-to-install-remove-and-manage-fonts-on-windows-mac-and-linux/"&gt;how-to guide&lt;/a&gt; to learn).&lt;/p&gt;
&lt;/li&gt;
&lt;li style="list-style-type: decimal;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Now inorder to make the font working you need to change the browser settings. (check &lt;a href="http://www.howtogeek.com/208552/how-to-change-the-default-fonts-in-your-web-browser/"&gt;here&lt;/a&gt; for Firefox and Chrome browser settings). You need to set “Devama” as the display font for Devanagari script. &lt;br class="kix-line-break" /&gt;In Mozilla Firefox:&lt;/p&gt;
&lt;/li&gt;
&lt;ol&gt;
&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Select “Options” from Tools menu. It will open a new tab. Select the “Content” tab. Click on the button “Advanced...”. Select Devanagari from the drop-down list from “Fonts for” and set “Devama” as the font for all options. Click on “Ok” and close the dialog box. Now reload the Konkani Wikipedia to check if it is working or not.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/ol&gt;
&lt;p&gt;Not just Konkani Wikipedia, any other site in Devanagari script (used for Hindi, Marathi, Nepali, Maithili, Bihari and a few other Indian languages) could also be read in Kannada. This might be useful for those who could read in Kannada and have problems reading in Devanagari.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script'&gt;https://cis-india.org/openness/blog-old/reading-devanagri-konkani-wikipedia-in-kannada-script&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-06-18T18:14:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality">
    <title>Regulatory Perspectives on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality</link>
    <description>
        &lt;b&gt;In this paper Pranesh Prakash gives an overview on why India needs to put in place net neutrality regulations, and the form that those regulations must take to avoid being over-regulation.&lt;/b&gt;
        &lt;p&gt;With assistance by Vidushi Marda (Programme Officer, Centre for Internet and Society)     and Tarun Krishnakumar (Research Volunteer, Centre for Internet and Society). &lt;i&gt;I would like to specially thank Vishal Misra, Steve Song, Rudolf van  der Berg, Helani Galpaya, A.B. Beliappa, Amba Kak, and Sunil Abraham for  extended discussions, helpful suggestions and criticisms.  However,  this paper is not representative of their views, which are varied.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Today, we no longer live in a world of "roti, kapda, makaan", but in the world of "roti, kapda, makaan aur broadband".    &lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is recognized by the National Telecom Policy IV.1.2, which states the need to "recognise telecom, including broadband connectivity as a basic necessity like education and health and work towards 'Right to Broadband'."&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; According to the IAMAI, as of October 2014, India had 278 million internet users.    &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Of these, the majority access Internet through their mobile phones, and the WEF     estimates only 3 in 100 have broadband on their mobiles.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, the bulk of our     population is without broadband. Telecom regulation and net neutrality has a very important role in enabling this vision of Internet as a basic human need     that we should aim to fulfil.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.49zh04wwxm9l"&gt;&lt;/a&gt; &lt;b&gt;1. Why should we regulate the telecom sector? &lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;All ICT regulation should be aimed at achieving five goals: achieving universal, affordable access;    &lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; ensuring and sustaining effective competition in an efficient market and avoiding     market failures; protecting against consumer harms; ensuring maximum utility of the network by ensuring interconnection; and addressing state needs     (taxation, security, etc.). Generally, all these goals go hand in hand, however some tensions may arise. For instance, universal access may not be provided     by the market because the costs of doing so in certain rural or remote areas may outweigh the immediate monetary benefits private corporations could     receive in terms of profits from those customers. In such cases, to further the goal of universal access, schemes such as universal service obligation     funds are put in place, while ensuring that such schemes either do not impact competition or very minimally impact it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that to maximise societal benefit, effective regulation of the ICT sector is a requirement, which otherwise, due to the ability of dominant     players to abuse network effect to their advantage, is inherently prone towards monopolies. For instance, in the absence of regulation, a dominant player     would charge far less for intra-network calls than inter-network calls, making customers shift to the dominant network. This kind of harm to competition     should be regulated by the ICT regulator. However, it is equally true that over-regulation is as undesirable as under-regulation, since over-regulation     harms innovation - whether in the form of innovative technologies or innovative business models. The huge spurt of growth globally of the telecom sector     since the 1980s has resulted not merely from advancements in technology, but in large part from the de-monopolisation and deregulation of the telecom     sector.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Similarly, the Internet has largely flourished under very limited     technology-specific regulation. For instance, while interconnection between different telecom networks is heavily regulated in the domestic telecom sector,     interconnection between the different autonomous systems (ASes) that make up the Internet is completely unregulated, thereby allowing for non-transparent     pricing and opaque transactions. Given this context, we must ensure we do not over-regulate, lest we kill innovation.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="h.psqblglrgt68"&gt;&lt;/a&gt; &lt;b&gt;2. Why should we regulate Net Neutrality? And whom should we regulate?&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;We wouldn't need to regulate Net Neutrality if ISPs were not "&lt;b&gt;gatekeepers&lt;/b&gt;" for last-mile access. "Gatekeeping" occurs when a single     company establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for     Internet services to reach the customers of the telecom network without passing through the telecom network. The situation is very different in the     middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in "transit     agreements", a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and     is thus inefficient in a way). However, this multiplicity of routes is not possible in the last mile.&lt;/p&gt;
&lt;p&gt;This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications,     while harming consumer choice. This is why we believe that promoting the five goals mentioned above would require regulation of last-mile telecom operators     to prevent unjust discrimination against end-users and content providers.&lt;/p&gt;
&lt;p&gt;Thus,     &lt;b&gt; net neutrality is the principle that we should regulate gatekeepers to ensure they do not use their power to unjustly discriminate between similarly         situated persons, content or traffic. &lt;/b&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.79auvw7dxb9s"&gt;&lt;/a&gt; &lt;b&gt;3. How should we regulate Net Neutrality?&lt;/b&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;a name="h.288fq19cym4p"&gt;&lt;/a&gt; 3.1. What concerns does Net Neutrality raise? What harms does it entail?&lt;/h2&gt;
&lt;p&gt;Discriminatory practices at the level of access to the Internet raises the following set of concerns:&lt;/p&gt;
&lt;p&gt;1. Freedom of speech and expression, freedom of association, freedom of assembly, and privacy.&lt;/p&gt;
&lt;p&gt;2. Harm to effective competition&lt;/p&gt;
&lt;p&gt;a. This includes competition amongst ISPs as well as competition amongst content providers.&lt;/p&gt;
&lt;p&gt;b. Under-regulation here may cause harm to innovation at the content provider level, including through erecting barriers to entry.&lt;/p&gt;
&lt;p&gt;c. Over-regulation here may cause harm to innovation in terms of ISP business models.&lt;/p&gt;
&lt;p&gt;3. Harm to consumers&lt;/p&gt;
&lt;p&gt;a. Under-regulation here may harm consumer choice and the right to freedom of speech, expression, and communication.&lt;/p&gt;
&lt;p&gt;b. Over-regulation on this ground may cause harm to innovation at the level of networking technologies and be detrimental to consumers in the long run.&lt;/p&gt;
&lt;p&gt;4. Harm to "openness" and interconnectedness of the Internet, including diversity (of access, of content, etc.)&lt;/p&gt;
&lt;p&gt;a. Exceptions for specialized services should be limited to preserve the open and interconnectedness of the Internet and of the World Wide Web.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It might help to think about Net Neutrality as primarily being about two overlapping sets of regulatory issues: preferential treatment of particular     Internet-based services (in essence: content- or source-/destination-based discrimination, i.e., discrimination on basis of 'whose traffic it is'), or     discriminatory treatment of applications or protocols (which would include examples like throttling of BitTorrent traffic, high overage fees upon breaching     Internet data caps on mobile phones, etc., i.e., discrimination on the basis of 'what kind of traffic it is').&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Situations where the negative or positive discrimination happens on the basis of particular content or address should be regulated through the use of         competition principles, while negative or positive discrimination at the level of specific class of content, protocols, associated ports, and other         such sender-/receiver-agnostic features, should be regulated through regulation of network management techniques &lt;/b&gt; . The former deals with instances where the question of "in whose favour is there discrimination" may be asked, while the latter deals with the question     "in favour of what is there discrimination".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to do this, a regulator like TRAI can use both hard regulation - price ceilings, data cap floors, transparency mandates, preventing specific     anti-competitive practices, etc. - as well as soft regulation - incentives and disincentives.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.y84hsu73ibky"&gt;&lt;/a&gt; 3.1.1 Net Neutrality and human rights&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any discussion on the need for net neutrality impugns the human rights of a number of different stakeholders. Users, subscribers, telecom operators and     ISPs all possess distinct and overlapping rights that are to be weighed against each other before the scope, nature and form of regulatory intervention are     finalised. The freedom of speech, right to privacy and right to carry on trade raise some of the most pertinent questions in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, to properly consider issues surrounding the practice of paid content-specific zero-rating from a human rights point of view, one must seek to     balance the rights of content providers to widely disseminate their 'speech' to the largest audiences against the rights of consumers to have access to a     diverse variety of different, conflicting and contrasting ideas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This commitment to a veritable marketplace or free-market of ideas has formed the touchstone of freedom of speech law in jurisdictions across the world as well as finding mention in pronouncements of the Indian Supreme Court. Particular reference is to be made to the dissent of Mathew, J. in&lt;i&gt;Bennett Coleman v. Union of India&lt;/i&gt;&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and of the majority    &lt;i&gt;Sakal Papers v. Union of India&lt;/i&gt;&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which rejected the approach.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the practice of deep-packet inspection, which is sometimes used in the process of network management, raises privacy concerns as it seeks to go beyond what is "public" information in the header of an IP packet, necessary for routing, to analysing non-public information.    &lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.yjyiwnikxizu"&gt;&lt;/a&gt; 3.2 What conditions and factors may change these concerns and the regulatory model we should adopt?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the principles relating to Net Neutrality remain the same in all countries (i.e., trying to prevent gatekeepers from unjustly exploiting their     position), the severity of the problem varies depending on competition in the market, on the technologies, and on many other factors. One way to measure     fair or stable allocation of the surplus created by a network - or a network-of-networks like the Internet - is by treating it as a convex cooperation game     and thereupon calculating that game's Shapley value:&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the case of the Internet,     this would be a game involving content ISPs, transit ISPs, and eyeball (i.e., last-mile) ISPs. The Shapley value changes depending on the number of     competitors there are in the market: thus, the fair/stable allocation when there's vibrant competition in the market is different from the fair/stable     allocation in a market without such competition. That goes to show that a desirable approach when an ISP tries to unjustly enrich itself by charging other     network-participants may well be to increase competition, rather than directly regulating the last-mile ISP. Further, it shows that in a market with     vibrant last-mile competition, the capacity of the last-mile ISP to unjustly are far diminished.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In countries which are remote and have little international bandwidth, the need to conserve that bandwidth is high. ISPs can regulate that by either     increasing prices of Internet connections for all, or by imposing usage restrictions (such as throttling) on either heavy users or bandwidth-hogging     protocols. If the amount of international bandwidth is higher, the need and desire on part of ISPs to indulge in such usage restrictions decreases. Thus,     the need to regulate is far higher in the latter case, than in the former case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above paragraphs show that both the need for regulation and also the form that the regulation should take depend on a variety of conditions that aren't     immediately apparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the framework that the regulator sets out to tackle issues relating to Net Neutrality are most important, whereas the specific rules may need to     change depending on changes in conditions. These conditions include:&lt;/p&gt;
&lt;p&gt;● last-mile market&lt;/p&gt;
&lt;p&gt;○ switching costs between equivalent service providers&lt;/p&gt;
&lt;p&gt;○ availability of an open-access last-mile&lt;/p&gt;
&lt;p&gt;○ availability of a "public option" neutral ISP&lt;/p&gt;
&lt;p&gt;○ increase or decrease in the competition, both in wired and mobile ISPs.&lt;/p&gt;
&lt;p&gt;● interconnection market&lt;/p&gt;
&lt;p&gt;○ availability of well-functioning peering exchanges&lt;/p&gt;
&lt;p&gt;○ availability of low-cost transit&lt;/p&gt;
&lt;p&gt;● technology and available bandwidth&lt;/p&gt;
&lt;p&gt;○ spectrum efficiency&lt;/p&gt;
&lt;p&gt;○ total amount of international bandwidth and local network bandwidth&lt;/p&gt;
&lt;p&gt;● conflicting interests of ISPs&lt;/p&gt;
&lt;p&gt;○ do the ISPs have other business interests other than providing Internet connectivity? (telephony, entertainment, etc.)&lt;/p&gt;
&lt;h2&gt;&lt;a name="h.1yozvmhaur7z"&gt;&lt;/a&gt; 3.3 How should we deal with anti-competitive practices?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Anti-competitive practices in the telecom sector can take many forms: Abuse of dominance, exclusion of access to specific services, customer lock-in,     predatory pricing, tying of services, cross-subsidization, etc., are a few of them. In some cases the anti-competitive practice targets other telecom     providers, while in others it targets content providers. In the both cases, it is important to ensure that ensure that telecom subscribers have a     competitive choice between effectively substitutable telecom providers and an ability to seamlessly switch between providers.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.smm9g46xsi3q"&gt;&lt;/a&gt; 3.3.1 Lowering Switching Costs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;TRAI has tackled many of these issues head on, especially in the mobile telephony space, while competitive market pressures have helped too:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Contractual or transactional lock-in&lt;/b&gt;. The easiest way to prevent shifting from one network to another is by contractually     mandating a lock-in period, or by requiring special equipment (interoperability) to connect to one's network. In India, this is not practised in the     telecom sector, with the exception of competing technologies like CDMA and GSM. Non-contractual lock-ins, for instance by offering discounts for purchasing     longer-term packages, are not inherently anti-competitive unless that results in predatory pricing or constitutes an abuse of market dominance. In India,     switching from one mobile provider to another, though initiated 15 years into the telecom revolution, is in most cases now almost as easy as buying a new     SIM card.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; TRAI may consider proactive regulation against contractual lock-in.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number of competitors&lt;/b&gt;. Even if switching from one network to another is easy, it is not useful unless there are other equivalent     options to switch to. In the telecom market, coverage is a very important factor in judging equivalence. Given that last mile connectivity is extremely     expensive to provide, the coverage of different networks are very different, and this is even more true when one considers wired connectivity, which is     difficult to lay in densely-populated urban and semi-urban areas and unprofitable in sparsely-populated areas. The best way to increase the number of     competitors is to make it easier for competitors to exist. Some ways of doing this would be through enabling spectrum-sharing, lowering right-of-way rents,     allowing post-auction spectrum trading, and promoting open-access last-mile fibre carriers and to thereby encourage competition on the basis of price and     service and not exclusive access to infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Interconnection and mandatory carriage&lt;/b&gt;. The biggest advantage a dominant telecom player has is exclusive access to its customer     base. Since in the telecom market, no telco wants to not connect to customers of another telco, they do not outright ban other networks. However, dominant     players can charge high prices from other networks, thereby discriminating against smaller networks. In the early 2000s, Airtel-to-Airtel calls were much     cheaper than Airtel-to-Spice calls. However, things have significantly changed since then. TRAI has, since the 2000s, heavily regulated interconnection and     imposed price controls on interconnection ("termination") charges.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Thus, now,     generally, inter-network calls are priced similarly to intra-network calls. And if you want cheaper Airtel-to-Airtel calls, you can buy a special     (unbundled) pack that enables an Airtel customer to take advantage of the fact that her friends are also on the same network, and benefits Airtel since     they do not in such cases have to pay termination charges. Recently, TRAI has even made the interconnection rates zero in three cases:     landline-to-landline, landline-to-cellular, and cellular-to-landline, in a bid to decrease landline call rates, and incentivise them, allowing a very low per call interconnection charges of 14 paise for cellular-to-cellular connections.    &lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ With regard to Net Neutrality, we must have a rule that     &lt;b&gt; no termination charges or carriage charges may be levied by any ISP upon any Internet service. No Internet service may be discriminated against with         regard to carriage conditions or speeds or any other quality of service metric. In essence &lt;i&gt;all&lt;/i&gt; negative discrimination should be prohibited. &lt;/b&gt; This means that Airtel cannot forcibly charge WhatsApp or any other OTT (which essentially form a different "layer") money for the "privilege" of being     able to reach Airtel customers, nor may Airtel slow down WhatsApp traffic and thus try to force WhatsApp to pay. There is a duty on telecom providers to     carry any legitimate traffic ("common carriage"), not a privilege. It is important to note that consumer-facing TSPs get paid by other interconnecting     Internet networks in the form of &lt;i&gt;transit charges&lt;/i&gt; (or the TSP's costs are defrayed through peering). There shouldn't be any separate charge on the     basis of content (different layer from the carriage) rather than network (same layer as the carriage). This principle is especially important for startups,     and which are often at the receiving end of such discriminatory practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Number Portability&lt;/b&gt;. One other factor that prevents users from shifting between one network and another is the fact that they have     to change an important aspect of their identity: their phone number (this doesn't apply to Internet over DSL, cable, etc.). At least in the mobile space, TRAI has for several years tried to mandate seamless mobile number portability. The same is being tried by the European Commission in the EU.    &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While intra-circle mobile number portability exists in India - and TRAI is     pushing for inter-circle mobile number portability as well&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - this is nowhere as     seamless as it should be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● &lt;b&gt;Multi-SIM phones&lt;/b&gt;. The Indian market is filled with phones that can accommodate multiple SIM cards, enabling customers to shift     seamlessly between multiple networks. This is true not just in India, but most developing countries with extremely price-sensitive customers. Theoretically, switching costs would approach zero if in a market with full coverage by &lt;i&gt;n&lt;/i&gt; telecom players every subscriber had a phone with    &lt;i&gt;n &lt;/i&gt;SIM slots with low-cost SIM cards being available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation in the telecom sector with respect to the above provides a stark contrast to the situation in the USA, and to the situation in the DTH     market. In the USA, phones get sold at discounts with multi-month or multi-year contracts, and contractual lock-ins are a large problem. Keeping each of     the above factors in mind, the Indian mobile telecom space is far more competitive than the US mobile telecom space.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, in the Indian DTH market, given that there is transactional lock-in (set-top boxes aren't interoperable in practice, though are mandated to be so     by law&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;), there are fewer choices in the market; further, the equivalent of     multi-SIM phones don't exist with respect to set-top boxes. Further, while there are must-carry rules with respect to carriage, they can be of three types:     1) must mandatorily provide access to particular channels&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (positive obligation,     usually for government channels); 2) prevented from not providing particular channels (negative obligation, to prevent anti-competitive behaviour and political censorship); and 3) must mandatorily offer access to at least a set number of channels (positive obligation for ensuring market diversity).    &lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Currently, only (1) is in force, since despite attempts by TRAI to ensure (3) as     well.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the shifting costs are low and transparency in terms of network practice is reported in a standard manner and well-publicised, then that significantly     weakens the "&lt;b&gt;gatekeeper effect&lt;/b&gt;", which as we saw earlier, is the reason why we wish to introduce Net Neutrality regulation. This     consequently means, as explained above in section 3.2, that     &lt;b&gt; &lt;i&gt; despite the same Net Neutrality principles applying in all markets and countries, the precise form that the Net Neutrality regulations take in a             telecom market with low switching costs would be different from the form that such regulations would take in a market with high switching costs. &lt;/i&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.glaa2bev2dhk"&gt;&lt;/a&gt; 3.3.2 Anti-competitive Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some potential anti-competitive practices, which are closely linked, are cross-subsidization, tying (anti-competitive bundling) of multiple services, and     vertical price squeeze. All three of these are especial concerns now, with the increased diversification of traditional telecom companies, and with the entry into telecom (like with DTH) of companies that create content. Hence, if Airtel cross-subsidizes the Hike chat application that it recently acquired,    &lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or if Reliance Infocomm requires customers to buy a subscription to an offering     from Reliance Big Entertainment, or if Reliance Infocomm meters traffic from another Reliance Big Entertainment differently from that from Saavn, all those     would be violative of the &lt;b&gt;principle of non-discrimination by gatekeepers&lt;/b&gt;. This same analysis can be applied to all unpaid deals and     non-commercial deals, including schemes such as Internet.org and Wikipedia Zero, which will be covered later in the section on zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While we have general rules such as sections 3 and 4 of the Competition Act,     &lt;b&gt; we do not currently have specific rules prohibiting these or other anti-competitive practices, and we need Net Neutrality regulation that clearly         prohibit such anti-competitive practices so that the telecom regulator can take action for non-compliance &lt;/b&gt; . We cannot leave these specific policy prescriptions unstated, even if they are provided for in    &lt;a href="http://indiankanoon.org/doc/1153878/"&gt;section 3 of the Competition Act&lt;/a&gt;. These concerns are especial concerns in the telecom sector, and the     telecom regulator or arbitrator should have the power to directly deal with these, instead of each case going to the Competition Commission of India. This     should not affect the jurisdiction of the CCI to investigate and adjudicate such matters, but should ensure that TRAI both has suo motu powers, and that     the mechanism to complain is made simple (unlike the current scenario, where some individual complainants may fall in the cracks between TRAI and TDSAT).&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.yd0ptbr561l8"&gt;&lt;/a&gt; 3.3.3 Zero-rating&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Since a large part of the net neutrality debate in India involves zero-rating practices, we deal with that in some length. Zero-rating is the practice of     not counting (aka "zero-rating") certain traffic towards a subscriber's regular Internet usage. The     &lt;b&gt; zero-rated traffic could be zero-priced or fixed-price; capped or uncapped; subscriber-paid, Internet service-paid, paid for by both, or unpaid;         content- or source/destination-based, or agnostic to content or source/destination; automatically provided by the ISP or chosen by the customer &lt;/b&gt; . The motivations for zero-rating may also be varied, as we shall see below. Further, depending on the circumstances, zero-rating could be competitive or     anti-competitive. All forms of zero-rating result in some form of discrimination, but not all zero-rating is harmful, nor does all zero-rating need to be     prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While, as explained in the section on interconnection and carriage above, negative discrimination at the network level should be prohibited, that leaves     open the question of positive discrimination. It follows from section 3.1 that the right frame of analysis of this question is harm to competition, since     the main harm zero-rating is, as we shall see below, about discriminating between different content providers, and not discrimination at the level of     protocols, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether one should allow for any form of positive discrimination at the network level or not depends on whether positive discrimination of (X) has an     automatic and unfair negative impact on all (~X). That, in turn, depends on whether (~X) is being subject to unfair competition. As Wikipedia notes,     "unfair competition means that the gains of some participants are conditional on the losses of others, when the gains are made in ways which are     illegitimate or unjust."     &lt;b&gt; Thus, positive discrimination that has a negative impact on effective competition shall not be permitted, since in such cases it is equivalent to         negative discrimination ("zero-sum game") &lt;/b&gt; .     &lt;b&gt; Positive discrimination that does not have a negative impact on effective competition may be permitted, especially since it results in increased access         and increases consumer benefit, as long as the harm to openness and diversity is minimized &lt;/b&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While considering this, one should keep in mind the fact that startups were, 10-15 years ago, at a huge disadvantage with regard to wholesale data     purchase. The marketplaces for data centres and for content delivery networks (which speed up delivery of content by being located closer, in network     terms, to multiple last-mile ISPs) were nowhere near as mature as they are today, and the prices were high. There was a much higher barrier to startup     entry than there is today, due to the prices and due to larger companies being able to rely on economies of scale to get cheaper rates. Was that unfair?     No. There is no evidence of anti-competitive practices, nor of startups complaining about such practices. Therefore, that was fair competition, despite     specific input costs that were arguably needed (though not essential) for startups to compete being priced far beyond their capacity to pay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the marketplace is very different, with a variety of offerings. CDNs such as Cloudflare, which were once the preserve of rich companies, even have     free offerings, thus substantially lowering barriers for startups that want faster access to customers across the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Is a CDN an essential cost for a startup? No. But in an environment where speed matters and customers use or don't use a service depending on speed; and     where the startup's larger competitors are all using CDNs, a startup more or less has to. Thankfully, given the cheap access to CDNs these days, that cost     is not too high for a startup to bear. If the CDN market was not competitive enough, would a hypothetical global regulator have been justified in outright     banning the use of CDNs to 'level' the playing field? No, because the hypothetical global regulator instead had the option to (and would have been     justified in) regulating the market to ensure greater competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; A regulator should not prohibit an act that does not negatively impact access, competition, consumer benefit, nor openness (including diversity), since         that would be over-regulation and would harm innovation. &lt;/b&gt;&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.3j3bch9mpwr2"&gt;&lt;/a&gt; 3.3.3.1 Motivations for Zero-Rating&lt;/h4&gt;
&lt;h5&gt;&lt;a name="h.pxa0ovwqncfy"&gt;&lt;/a&gt; 3.3.3.1.1 Corporate Social Responsibility / Incentivizing Customers to Move Up Value Chain&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There exist multiple instances where there is no commercial transaction between the OTT involved and the telecom carrier, in which zero-priced zero-rating     of specific Internet content happens. We know that there is no commercial transaction either through written policy (Wikipedia Zero) or through public     statements (Internet.org, a bouquet of sites). In such cases, the telecom provider would either be providing such services out of a sense of public     interest, given the social value of those services, or would be providing such services out of self-interest, to showcase the value of particular Internet     set the same time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apprehended risk is that of such a scheme creating a "walled garden", where users would be exposed only to those services which are free since the    &lt;i&gt;search and discovery costs&lt;/i&gt; of non-free Internet (i.e., any site outside the "walled garden") would be rather high. This risk, while real, is     rather slim given the fact that the economic incentives for those customers who have the ability to pay for "Internet packs" but currently do not find a     compelling reason to do so, or out of both a sense of public interest and self-interest of the telecom providers works against this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gzz6numa7y24"&gt;&lt;/a&gt; In such non-commercial zero-priced zero-rating, a telecom provider would only make money if and only if subscribers start paying for sites outside of the     walled garden. If subscribers are happy in the walled garden, the telecom provider starts losing money, and hence has a strong motivation to stop that     scheme. If on the other hand, enough subscribers start becoming paying customers to offset the cost of providing the zero-priced zero-rated service(s) and     make it profitable, that shows that despite the availability of zero-priced options a number of customers will opt for paid access to the open Internet and     the open Web, and the overall harms of such zero-priced zero-rating would be minimal. Hence, the telecom providers have an incentive to keep the costs of     Internet data packs low, thus encouraging customers who otherwise wouldn't pay for the Internet to become paying customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is the potential of consumer harm when users seek to access a site outside of the walled garden, and find to their dismay that they have been charged     for the Internet at a hefty rate, and their prepaid balance has greatly decreased. This is an issue that TRAI is currently appraised of, and a suitable     solution would need to be found to protect consumers against such harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All in all, given that the commercial interests of the telecom providers align with the healthy practice of non-discrimination, this form of limited     positive discrimination is not harmful in the long run, particularly because it is not indefinitely sustainable for a large number of sites. Hence, it may     not be useful to ban this form of zero-priced zero-rating of services as long as they aren't exclusive, or otherwise anti-competitive (a vertical     price-squeeze, for instance), and the harm to consumers is prohibited and the harm to openness/diversity is minimized.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.2xvaoc7t0zmu"&gt;&lt;/a&gt; 3.3.3.1.2 Passing on ISP Savings / Incentivizing Customers to Lower ISP's Cost&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Suppose, for instance, an OTT uses a CDN located, in network distance terms, near an eyeball ISP. In this case, the ISP has to probably pay less than it     would have to had the same data been located in a data centre located further away, given that it would have fewer interconnection-related charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the monetary costs of providing access to different Web destinations are not equal for the ISP. This cost can be varied either by the OTT (by it     locating the data closer to the ISP - through a CDN, by co-locating where the ISP is also present, or by connecting to an Internet Exchange Point which the     ISP is also connected to - or by it directly "peering" with the ISP) or by the ISP (by engaging in "transparent proxying" in which case the ISP creates     caches at the ISP level of specific content (usually by caching non-encrypted data the ISP's customers request) and serves the cached content when a user     requests a site, rather than serving the actual site). None of the practices so far mentioned are discriminatory from the customer's perspective with     regard either to price or to prioritization, though all of them enable faster speeds to specific content. Hence none of the above-mentioned practices are considered even by the most ardent Net Neutrality advocates to be violations of that principle.    &lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, if an ISP zero-rates the content to either pass on its savings to the     customer&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or to incentivize the customer to access services that cost the ISP less     in terms of interconnection costs, that creates a form of price discrimination for the customer, despite it benefiting the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The essential economic problem is that the cost to the ISP is variable, but the cost to the customer is fixed. Importantly, this problem is exacerbated in India where web hosting prices are high, transit prices are high, peering levels are low, and Internet Exchange Points (IXPs) are not functioning well.    &lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These conditions create network inefficiencies in terms of hosting of content     further away from Indian networks in terms of network distance, and thus harms consumers as well as local ISPs. In order to set this right, zero-rating of     this sort may be permitted as it acts as an incentive towards fixing the market fundamentals. However, once the market fundamentals are fixed, such     zero-rating may be prohibited.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.fpfvyrxp6pif"&gt;&lt;/a&gt; This example shows that the desirability or otherwise of discriminatory practices depends fully on the conditions present in the market, including in terms     of interconnection costs.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.uc9je2dcrwpx"&gt;&lt;/a&gt; 3.3.3.1.3 Unbundling Internet into Services ("Special Packs")&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Since at least early 2014, mobile operators have been marketing special zero-rating "packs". These packs, if purchased by the customer, allow capped or in     some instances uncapped, zero-rating of a service such as WhatsApp or Facebook, meaning traffic to/from that service will not be counted against their     regular Internet usage.&lt;/p&gt;
&lt;p&gt;For a rational customer, purchasing such a pack only makes sense in one of two circumstances:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, but has not purchased an "Internet data pack" since she doesn't find the     Internet valuable. Instead, she has heard about "WhatsApp", has friends who are on it, and wishes to use that to reduce her SMS costs (and thereby eat into     the carriage provider's ability to charge separately for SMSes). She chooses to buy a WhatsApp pack for around ₹25 a month instead of paying     ₹95 for an all-inclusive Internet data pack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● The person has Internet connectivity on her Internet-capable phone, and has purchased an "Internet data pack". However, that data pack is capped     and she has to decide between using WhatsApp and surfing web sites. She is on multiple WhatsApp groups and her WhatsApp traffic eats up 65% of her data     cap. She thus has to choose between the two, since she doesn't want to buy two Internet data packs (each costing around ₹95 for a month). She chooses     to buy a WhatsApp pack for ₹25 a month, paying a cumulative total of ₹120 instead of ₹190 which she would have had to had she bought two     Internet data packs. In this situation, "unbundling" is happening, and this benefits the consumer. Such unbundling harms the openness and integrity of the     Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If users did not find value in the "special" data packs, and there is no market demand for such products, they will cease to be offered. Thus, assuming a     telco's decision to offer such packs is purely customer-demand driven - and not due to deals it has struck with service providers - if Orkut is popular, telcos would be interested in offering Orkut packs and if Facebook is popular, they would be interested in offering a Facebook pack. Thus, clearly,    &lt;b&gt;there is nothing anti-competitive about such customer-paid zero-rating packs, whereas they clearly enhance consumer benefit&lt;/b&gt;. Would this     increase the popularity of Orkut or Facebook? Potentially yes. But to prohibit this would be like prohibiting a supermarket from selectively (and     non-collusively) offering discounts on popular products. Would that make already popular products even more popular? Potentially, yes. But that would not     be seen as a harm to competition but would be seen as fair competition. This contravenes the "openness" of the Internet (i.e., the integral interconnected     diversity that an open network like the Internet embodies) as an independent regulatory goal. The Internet, being a single gateway to a mind-boggling     variety of services, allows for a diverse "long tail", which would lose out if the Internet was seen solely as a gateway to popular apps, sites, and     content. However, given that this is a choice exercised freely by the consumer, such packs should not be prohibited, as that would be a case of     over-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The one exception to the above analysis of competition, needless to say, is if that these special packs aren't purely customer-demand driven and are the     product of special deals between an OTT and the telco. In that case, we need to ensure it isn't anti-competitive by following the prescriptions of the next     section.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.f0rfoerqprro"&gt;&lt;/a&gt; 3.3.3.1.4 Earning Additional Revenues from Content Providers&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;With offerings like Airtel Zero, we have a situation where OTT companies are offering to pay for wholesale data access used by their customers, and make     accessing their specific site or app free for the customer. From the customer's perspective, this is similar to a toll-free number or a pre-paid envelope     or free-to-air TV channel being offered on a particular network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, from the network perspective, these are very different. Even if a customer-company pays Airtel for the toll-free number, that number is accessible     and toll-free across all networks since the call terminates on Airtel networks and Airtel pays the connecting network back the termination charge from the     fee they are paid by the customer-company. This cannot happen in case of the Internet, since the "call" terminates outside of the reach of the ISP being     paid for zero-rating by the OTT company; hence unless specific measures are taken, zero-rating has to be network-specific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The comparison to free-to-air channels is also instructive, since in 2010 TRAI made recommendations that consumers should have the choice of accessing     free-to-air channels à-la-carte, without being tied up to a bouquet.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This would, in essence, allow a subscriber to purchase a set-top box, and without paying a regular subscription fee watch free-to-air channels.    &lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, similar to toll-free numbers, these free-to-air channels are     free-to-air on all MSO's set-top boxes, unlike the proposed Airtel Zero scheme under which access to a site like Flipkart would be free for customers on     Airtel's network alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, these comparisons, while useful in helping think through the regulatory and competition issues, &lt;i&gt;should not&lt;/i&gt; be used as instructive exact     analogies, since they aren't fully comparable situations.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.pyn97x5b6nfq"&gt;&lt;/a&gt; 3.3.3.1.5 Market Options for OTT-Paid Zero-Rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;As noted above, a competitive marketplace already exists for wholesale data purchase at the level of "content ISPs" (including CDNs), which sell wholesale     data to content providers (OTTs). This market is at present completely unregulated. The deals that exist are treated as commercial secrets. It is almost     certain that large OTTs get better rates than small startups due to economies of scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, at the eyeball ISP level, it is a single-sided market with ISPs competing to gain customers in the form of end-users. With a scheme like "Airtel     Zero", this would get converted into a double-sided market, with a gatekeeper without whom neither side can reach the other being in the middle creating a     two-sided toll. This situation is ripe for market abuse: this situation allows the gatekeeper to hinder access to those OTTs that don't pay the requisite     toll or to provide preferential access to those who pay, apart from providing an ISP the opportunity to "double-dip".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way to fix this is to prevent ISPs from establishing a double-sided market. The other way would be to create a highly-regulated market where the     gatekeeping powers of the ISP are diminished, and the ISP's ability to leverage its exclusive access over its customers are curtailed. A comparison may be     drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to     them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being     even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus     even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP     innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot     discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other     telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would     enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure     that this doesn't lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs,     and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring     transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need     be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single     marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having     exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for     free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it     doesn't there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all forms of competitive Internet service-paid zero-priced zero-rating, even when they don't harm competition, innovation amongst content     providers, or consumers, will necessarily harm openness and diversity of the Internet. For instance, while richer companies with a strong presence in India     may pay to zero-rate traffic for their Indian customers, decentralized technologies such as XMPP and WebRTC, having no central company behind them, would     not, leading to customers preferring proprietary networks and solutions to such open technologies, which in turn, thanks to the network effect, leads to a     vicious cycle.     &lt;b&gt; These harms to openness and diversity have to be weighed against the benefit in terms of increase in access when deciding whether to allow for         competitive OTT-paid zero-priced zero-rating, as such competition doesn't exist in a truly level playing field &lt;/b&gt; . Further, it must be kept in mind that there are forms of zero-priced zero-rating that decrease the harm to openness / diversity, or completely remove     that harm altogether: that there are other options available must be acknowledged by the regulator when considering the benefit to access from competitive     OTT-paid zero-priced zero-rating.&lt;/p&gt;
&lt;h5&gt;&lt;a name="h.huy1gfie05he"&gt;&lt;/a&gt; 3.3.3.1.6 Other options for zero-rating&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;There are other models of zero-priced zero-rating that either minimize the harm is that of ensuring free Internet access for every person. This can take     the form of:&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● A mandatorily "leaky" 'walled garden':&lt;/p&gt;
&lt;p&gt;○ The first-degree of all hyperlinks from the zero-rated OTT service are also free.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers during specified     hours.&lt;/p&gt;
&lt;p&gt;○ The zero-rated OTT service provider has to mandatorily provide free access to the whole of the World Wide Web to all its customers based on amount     on usage of the OTT service.&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;● Zero-rating of all Web traffic&lt;/p&gt;
&lt;p&gt;○ In exchange for viewing of advertisements&lt;/p&gt;
&lt;p&gt;○ In exchange for using a particular Web browser&lt;/p&gt;
&lt;p&gt;○ At low speeds on 3G, or on 2G.&lt;/p&gt;
&lt;h4&gt;&lt;a name="h.ncpm1d9hru2b"&gt;&lt;/a&gt; 3.3.3.2. What kinds of zero-rating are good&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The majority of the forms of zero-rating covered in this section are content or source/destination-based zero-rating. Only some of the options covered in     the "other options for zero-rating" section cover content-agnostic zero-rating models. Content-agnostic zero-rating models are not harmful, while     content-based zero-rating models always harm, though to varying degrees, the openness of the Internet / diversity of OTTs, and to varying degrees increase     access to Internet-based services. Accordingly, here is an hierarchy of desirability of zero-priced zero-rating, from most desirable to most harmful:&lt;/p&gt;
&lt;p&gt;1. Content- &amp;amp; source/destination-agnostic zero-priced zero-rating.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. Content- &amp;amp; source/destination-based non-zero-priced zero-rating, without any commercial deals, chosen freely &amp;amp; paid for by users.    &lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. Content- &amp;amp; source/destination-based zero-priced zero-rating, without any commercial deals, with full transparency.    &lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of commercial deal with partial zero-priced access to all content, with     non-discriminatory access to the same deal by all with full transparency.&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Content- &amp;amp; source/destination-based zero-priced zero-rating, on the basis of a non-commercial deal, without any benefits monetary or otherwise, flowing directly or indirectly from the provider of the zero-rated content to the ISP, with full transparency.    &lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Content- &amp;amp; source-destination-based zero-priced zero-rating, across all telecom networks, with standard pricing, non-discriminatory access, and full     transparency.&lt;/p&gt;
&lt;p&gt;7. Content- &amp;amp; source-destination-based zero-priced zero-rating, with standard pricing, non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;8. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and full transparency.&lt;/p&gt;
&lt;p&gt;9. Content- &amp;amp; source-destination-based zero-priced zero-rating, with non-discriminatory access, and transparency to the regulator.&lt;/p&gt;
&lt;p&gt;10. Content- &amp;amp; source-destination-based zero-priced zero-rating, without any regulatory framework in place.&lt;/p&gt;
&lt;h3&gt;&lt;a name="h.f8vwrsnhu1fj"&gt;&lt;/a&gt; 3.3.4 Cartels and Oligopoly&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While cartels and oligopolies may have an impact on Net Neutrality, they are not problems that any set of anti-discrimination rules imposed on gatekeepers     can fix. Further, cartels and oligopolies don't directly enhance the ability of gatekeepers to unjustly discriminate if there are firm rules against     negative discrimination and price ceilings and floors on data caps are present for data plans. Given this, TRAI should recommend that this issue be     investigated and the Competition Commission of India should take this issue up.&lt;/p&gt;
&lt;h1&gt;&lt;a name="h.1ckcvcwez55d"&gt;&lt;/a&gt; &lt;b&gt;3.4 Reasonable Network Management Principles&lt;/b&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Reasonable network management has to be allowed to enable the ISPs to manage performance and costs on their network. However, ISPs may not indulge in acts     that are harmful to consumers in the name of reasonable network management. Below are a set of guidelines for when discrimination against classes of     traffic in the name of network management are justified.&lt;/p&gt;
&lt;p&gt;● Discrimination between classes of traffic for the sake of network management should only be permissible if:&lt;/p&gt;
&lt;p&gt;○ there is an intelligible differentia between the classes which are to be treated differently, and&lt;/p&gt;
&lt;p&gt;○ there is a rational nexus between the differential treatment and the aim of such differentiation, and&lt;/p&gt;
&lt;p&gt;○ the aim sought to be furthered is legitimate, and is related to the security, stability, or efficient functioning of the network, or is a technical     limitation outside the control of the ISP&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and&lt;/p&gt;
&lt;p&gt;○ the network management practice is the least harmful manner in which to achieve the aim.&lt;/p&gt;
&lt;p&gt;● Provision of specialized services (i.e., "fast lanes") is permitted if and only if it is shown that&lt;/p&gt;
&lt;p&gt;○ The service is available to the user only upon request, and not without their active choice, and&lt;/p&gt;
&lt;p&gt;○ The service cannot be reasonably provided with "best efforts" delivery guarantee that is available over the Internet, and hence requires     discriminatory treatment, or&lt;/p&gt;
&lt;p&gt;○ The discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are only applicable at the level of ISPs, and not on access gateways for institutions that may in some cases be run by ISPs (such as a     university network, free municipal WiFi, at a work place, etc.), which are not to be regulated as common carriers.&lt;/p&gt;
&lt;p&gt;These principles may be applied on a case-by-case basis by a regulator, either &lt;i&gt;suo motu&lt;/i&gt; or upon complaint by customers.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Report of the &lt;i&gt;Special Rapporteur on the Promotion and Protection of the right to freedom of opinion and expression, &lt;/i&gt;(19 May 2011),             http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Available at http://www.trai.gov.in/WriteReadData/userfiles/file/NTP%202012.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; IAMAI, &lt;i&gt;India to Cross 300 million internet users by Dec 14, &lt;/i&gt;(19 November, 2014),             http://www.iamai.in/PRelease_detail.aspx?nid=3498&amp;amp;NMonth=11&amp;amp;NYear=2014.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; World Economic Forum, &lt;i&gt;The Global Information Technology Report 2015, &lt;/i&gt;http://www3.weforum.org/docs/WEF_Global_IT_Report_2015.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ictregulationtoolkit.org/4.1#s4.1.1&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; R.U.S. Prasad, &lt;i&gt;The Impact of Policy and Regulatory Decisions on Telecom Growth in India&lt;/i&gt; (July 2008),             http://web.stanford.edu/group/siepr/cgi-bin/siepr/?q=system/files/shared/pubs/papers/pdf/SCID361.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1973 AIR 106&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 1962 AIR 305&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; "When ISPs go beyond their traditional use of IP headers to route packets, privacy risks begin to emerge." Alissa Cooper,            &lt;i&gt;How deep must DPI be to incur privacy risk? &lt;/i&gt;http://www.alissacooper.com/2010/01/25/how-deep-must-dpi-be-to-incur-privacy-risk/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Richard T.B. Ma &amp;amp; Vishal Misra, &lt;i&gt;The Public Option: A Non-Regulatory Alternative to Network Neutrality&lt;/i&gt;,             http://dna-pubs.cs.columbia.edu/citation/paperfile/200/netneutrality.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mobile number portability was launched in India on January 20, 2011 in the Haryana circle. See             &lt;a href="http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html"&gt; http://indiatoday.intoday.in/story/pm-launches-nationwide-mobile-number-portability/1/127176.html &lt;/a&gt; . Accessed on April 24, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For a comprehensive list of all TRAI interconnection regulations &amp;amp; subsequent amendments, see             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Interconnection Usage Charges (Eleventh Amendment) Regulations, 2015 (1 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 30 of the Universal Service Directive, Directive 2002/22/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; See Telecommunication Mobile Number Portability (Sixth Amendment) Regulations, 2015 (3 of 2015), available at             http://www.trai.gov.in/Content/Regulation/0_1_REGULATIONS.aspx.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Seventh) (The Direct to Home Services) Tariff Order, 2015 (2 of 2015).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 8, Cable Television Networks Act, 1995.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;TRAI writes new rules for Cable TV, Channels, Consumers, &lt;/i&gt; REAL TIME NEWS, (August 11, 2014), http://rtn.asia/rtn/233/1220_trai-writes-new-rules-cable-tv-channels-consumers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; An initial requirement for all multi system operators to have a minimum capacity of 500 channels was revoked by the TDSAT in 2012. For more             details, see http://www.televisionpost.com/cable/msos-not-required-to-have-500-channel-headends-tdsat/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aparna Ghosh, &lt;i&gt;Bharti SoftBank Invests $14 million in Hike, &lt;/i&gt;LIVE MINT, (April 2, 2014),             http://www.livemint.com/Companies/nI38YwQL2eBgE6j93lRChM/Bharti-SoftBank-invests-14-million-in-mobile-messaging-app.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mike Masnick, &lt;i&gt;Can We Kill This Ridiculous Shill-Spread Myth That CDNs Violate Net Neutrality? They Don't&lt;/i&gt;,             https://www.techdirt.com/articles/20140812/04314528184/can-we-kill-this-ridiculous-shill-spread-myth-that-cdns-violate-net-neutrality-they-dont.shtml.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Mathew Carley, What is Hayai's stance on "Net Neutrality"?, https://www.hayai.in/faq/hayais-stance-net-neutrality?c=mgc20150419&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helani Galpaya &amp;amp; Shazna Zuhyle, &lt;i&gt;South Asian Broadband Service Quality: Diagnosing the Bottlenecks&lt;/i&gt;,             http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1979928&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; DTH players told to offer pay channels on la carte basis, HINDU BUSINESS LINE (July 22, 2010),             http://www.thehindubusinessline.com/todays-paper/dth-players-told-to-offer-pay-channels-on-la-carte-basis/article999298.ece.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunication (Broadcasting and Cable) Services (Fourth) (Addressable Systems) Tariff Order, 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These suggestions were provided by Helani Galpaya and Sunil Abraham, based in some cases on existing practices.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p align="left"&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is what is being followed by the Jana Loyalty Program:             &lt;a href="http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/"&gt; http://www.betaboston.com/news/2015/05/06/with-a-new-loyalty-program-mobile-app-marketplace-jana-pushes-deeper-into-the-developing-world/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: free Internet access at low speeds, with data caps.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: special "packs" for specific services like WhatsApp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: zero-rating of all locally-peered settlement-free traffic.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: "leaky" walled gardens, such as the Jana Loyalty Program that provide limited access to all of the Web alongside access to the zero-rated             content.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Example: Wikipedia Zero.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A CGNAT would be an instance of such a technology that poses network limitations.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/regulatory-perspectives-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2015-07-18T02:46:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check">
    <title>India’s digital check</title>
    <link>https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check</link>
    <description>
        &lt;b&gt;All nine pillars of Digital India directly correlate with policy research conducted at the Centre for Internet and Society, where I have worked for the last seven years. This allows our research outputs to speak directly to the priorities of the government when it comes to digital transformation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.dnaindia.com/analysis/column-india-s-digital-check-2102575"&gt;published by DNA&lt;/a&gt; on July 8, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Broadband Highways and Universal Access to Mobile Connectivity: The  first two pillars have been combined in this paragraph because they both  require spectrum policy and governance fixes. Shyam Ponappa, a  distinguished fellow at our Centre calls for the leveraging of shared  spectrum and also shared backhaul infrastructure. Plurality in spectrum  management, for eg, unlicensed spectrum should be promoted for  accelerating backhaul or last mile connectivity, and also for community  or local government broadband efforts. Other ideas that have been  considered by Ponappa include getting state owned telcos to exit  completely from the last mile and only focus on running an open access  backhaul through Bharat Broadband Limited. Network neutrality  regulations are also required to mitigate free speech, diversity and  competition harms as ISPs and TSPs innovate with business models such as  zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public Internet Access Programme: Continuing investments into Common  Service Centres (CSCs) for almost a decade may be questionable and  therefore a citizen’s audit should be undertaken to determine how the  programme may be redesigned. The reinventing of post offices is very  welcome, however public libraries are also in need urgent reinventing.  CSCs, post offices and public libraries should all leverage long range  WiFi for Internet and intranet, empowering BYOD [Bring Your Own Device]  users. Applications will take time to develop and therefore immediate  emphasis should be on locally caching Indic language content. State &lt;a href="http://www.dnaindia.com/topic/public-library-acts"&gt;Public Library Acts&lt;/a&gt; need to be amended to allow for borrowing of digital content. Flat-fee  licensing regimes must be explored to increase access to knowledge and  culture. Commons-based peer production efforts like Wikipedia and  Wikisource need to be encouraged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Governance: Reforming Government through Technology: DeitY, under the  leadership of free software advocate Secretary RS Sharma, has  accelerated adoption and implementation of policies supporting  non-proprietary approaches to intellectual property in e-governance.  Policies exist and are being implemented for free and open source  software, open standards and electronic accessibility for the disabled.  The proprietary software lobby headed by Microsoft and industry  associations like &lt;a href="http://www.dnaindia.com/topic/nasscom"&gt;NASSCOM&lt;/a&gt; have tried to undermine these policies but have failed so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should continue to resist such pressures. Universal  adoption of electronic signatures within government so that there is a  proper audit trail for all communications and transactions should be  made an immediate priority. Adherence to globally accepted data  protection principles such as minimisation via “form simplification and  field reduction” for Digital India should be applauded. But on the other  hand the mandatory requirement of Aadhaar for DigiLocker and eSign  amounts to contempt of the Supreme Court order in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Kranti — Electronic Delivery of Services: The 41 mission mode projects  listed are within the top-down planning paradigm with a high risk of  failure — the funds reserved for these projects should instead be  converted into incentives for those public, private and public private  partnerships that accelerate adoption of e-governance. The dependency on  the National Informatics Centre (NIC) for implementation of &lt;a href="http://www.dnaindia.com/topic/e-governance"&gt;e-governance&lt;/a&gt; needs to be reduced, SMEs need to be able to participate in the  development of e-governance applications. The funds allocated for this  area to DeitY have also produced a draft bill for Electronic Services  Delivery. This bill was supposed to give RTI-like teeth to e-governance  service by requiring each government department and ministry to publish  service level agreements [SLAs] for each of their services and  prescribing punitive action for responsible institutions and individuals  when there was no compliance with the SLAs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information for All: The open data community and the Right to  Information movement in India are not happy with the rate of  implementation of National Data Sharing and Accessibility Policy  (NDSAP). Many of the datasets on the Open Data Portal are of low value  to citizens and cannot be leveraged commercially by enterprise.  Publication of high-value datasets needs to be expedited by amending the  proactive disclosure section of the Right to Information Act 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronics Manufacturing: Mobile patent wars have begun in India with  seven big ticket cases filed at the Delhi High Court. Our Centre has  written an open letter to the previous minister for HRD and the current  PM requesting them to establish a device level patent pool with a  compulsory license of 5%. Thereby replicating India’s success at  becoming the pharmacy of the developing world and becoming the lead  provider of generic medicines through enabling patent policy established  in the 1970s. In a forthcoming paper with Prof Jorge Contreras, my  colleague Rohini Lakshané will map around fifty thousand patents  associated with mobile technologies. We estimate around a billion USD  being collected in royalties for the rights-holders whilst eliminating  legal uncertainties for manufacturers of mobile technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT for Jobs: Centralised, top-down, government run human resource  development programmes are not useful. Instead the government needs to  focus on curriculum reform and restructuring of the education system.  Mandatory introduction of free and open source software will give Indian  students the opportunity to learn by reading world-class software. They  will then grow up to become computer scientists rather than computer  operators. All projects at academic institutions should be contributions  to existing free software projects — these projects could be global or  national, for eg, a local government’s e-governance application. The  budget allocated for this pillar should instead be used to incentivise  research by giving micro-grants and prizes to those students who make  key software contributions or publish in peer-reviewed academic journals  or participate in competitions. This would be a more systemic approach  to dealing with the skills and knowledge deficit amongst Indian software  professionals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early Harvest Programmes: Many of the ideas here are very important. For  example, secure email for government officials — if this was developed  and deployed in a decentralised manner it would prevent future  surveillance of the Indian government by the NSA. But a few of the other  low-hanging fruit identified here don’t really contribute to  governance. For example, biometric attendance for bureaucrats is just  glorified bean-counting — it does not really contribute to more  accountability, transparency or better governance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author works for the Centre for Internet and Society which  receives funds from Wikimedia Foundation that has zero-rating alliances  with telecom operators in many countries across the world&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check'&gt;https://cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2015-09-15T14:55:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
