<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 601 to 615.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/surveillance-privacy-roundtable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/information-influx-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2014-bulletin">
    <title>August 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2014-bulletin</link>
    <description>
        &lt;b&gt;Eighth issue of the newsletter (August 2014) below: &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the eighth issue of the newsletter (August 2014). Archives of our newsletters can be 	accessed at: &lt;a href="http://cis-india.org/about/newsletters"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;hr /&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;CIS published a policy guide on &lt;a href="http://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide"&gt;Privacy in Healthcare&lt;/a&gt; that seeks to understand the legal regulations governing data flow in the health sector - particularly hospitals, and how these regulations are 		implemented.&lt;/li&gt;
&lt;li&gt;Nehaa Chaudhari wrote two articles on the Karnataka Goondas Act in Spicy IP. The first one is an 	&lt;a href="http://cis-india.org/a2k/blog/spicy-ip-nehaa-chaudhari-august-13-2014-preventive-detention-for-copyright-violation"&gt; overview on the various provisions of the law and discusses the potential impact of the amendment &lt;/a&gt; . The second one is a 	&lt;a href="http://cis-india.org/a2k/blog/spicy-ip-nehaa-chaudhari-august-28-2014-karnataka-goondas-act-a-note-on-legislative-competence"&gt; note on legislative competence &lt;/a&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Andhra Loyola College and CIS		&lt;a href="http://cis-india.org/openness/blog/alc-cis-sign-mou-better-net-access"&gt;entered into a memorandum of understanding&lt;/a&gt; (MoU) to steward the 		growth of Telugu Wikipedia and to make available free knowledge in Telugu to all Telugus across the globe.&lt;/li&gt;
&lt;li&gt;In July 2014, the Department of Biotechnology and the Department of Science, Ministry of Science and Technology, Government of India released a 	draft Open Access Policy. CIS participated in discussions along with experts brought on board by the Drafting Committee to develop and review the open 	access policy. As a follow-up, 	&lt;a href="http://cis-india.org/openness/cis-comments-to-the-department-of-biotechnology-and-department-of-science-open-access-policy"&gt; CIS prepared comments to the draft Policy &lt;/a&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Anandini K. Rathore wrote a 		&lt;a href="http://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014"&gt; report on the second privacy and surveillance roundtable &lt;/a&gt; held in New Delhi at the India International Centre on July 4, 2014.&lt;/li&gt;
&lt;li&gt;As part of its project on mapping cyber security experts in Asia with funding from Citizen's Lab, CIS interviewed Tibetan monk&lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"&gt;Gyanak Tsering&lt;/a&gt; and	&lt;a href="http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah"&gt;Saumil Shah&lt;/a&gt;, security expert.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Published a 		&lt;a href="https://cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper"&gt; white paper on content removal best practices &lt;/a&gt; and put it up for feedback. The draft paper has been created to frame the discussion towards the creation of a set of principles for intermediary 		liability in consultation with groups of Internet-focused NGOs and the academic community. &lt;/li&gt;
&lt;li&gt; Shyam Ponappa's monthly column		&lt;a href="http://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-august-7-2014-transformation-or-drift"&gt;Transformation, or Drift?&lt;/a&gt; published in Business Standard and Organizing India Blogspot was mirrored on the CIS website. &lt;/li&gt;
&lt;li&gt; P.P. Sneha blogged on the 		&lt;a href="http://cis-india.org/raw/digital-humanities/digital-humanities-and-alt-academy"&gt; emergence of the phenomenon of the alt-academy in the West and the nuances and possibilities of such a space in the Indian context &lt;/a&gt; . &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The updated draft is being reviewed by the Office of the Chief Commissioner for Persons with Disabilities. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;NVDA and eSpeak&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/accessibility/blog/nvda-e-speak-update-august-2014.pdf"&gt;Work Report for August&lt;/a&gt; (by Suman Dogra, August 31, 2014). &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/accessibility/blog/smartphones-return-to-dependency"&gt;Smartphones and the Return to Dependency&lt;/a&gt; (by Anandhi Viswanathan, August 30, 2014). &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/accessibility/news/apr-igf-delhi-2014-towards-an-accessible-internet-for-people-with-disabilities"&gt;Towards an Accessible Internet for People with Disabilities &lt;/a&gt; (organized by International Centre for Free and Open Source Software and ISOC Australia, Delhi, August 4, 2014). Sunil Abraham was a speaker at this 		workshop organized as part of APrIGF. &lt;/li&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge &lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/a2k/blog/spicy-ip-nehaa-chaudhari-august-13-2014-preventive-detention-for-copyright-violation"&gt; Preventive Detention for Copyright Violation: Karnataka Amends the 'Goondas' Act &lt;/a&gt; (by Nehaa Chaudhari, August 13, 2014). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/a2k/blog/spicy-ip-nehaa-chaudhari-august-28-2014-karnataka-goondas-act-a-note-on-legislative-competence"&gt; Karnataka Goondas Act - A note on Legislative Competence &lt;/a&gt; (by Nehaa Chaudhari, August 28, 2014). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/a2k/blog/interviews-with-app-developers-dis-regard-towards-ipr-vs-patent-hype-2013-part-ii"&gt; Interviews with App Developers: [dis]regard towards IPR vs. Patent Hype - Part II &lt;/a&gt; (by Samantha Cassar, August 14, 2014). &lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submission&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/cis-comments-to-the-department-of-biotechnology-and-department-of-science-open-access-policy"&gt;Comments on the Department of Biotechnology and Department of Science Open Access Policy &lt;/a&gt; (by Anubha Sinha, August 22, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss"&gt;Connecting the Next Two Billion: The Role of FOSS &lt;/a&gt; (organized by ICFOSS, Noida, August 4, 2014). Sunil Abraham was a speaker at this workshop held as part of the APrIGF. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Announcement&lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/alc-cis-sign-mou-better-net-access"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/alc-cis-sign-mou-better-net-access"&gt;Andhra Loyola College and the Centre for Internet &amp;amp; Society sign MoU for Better Net Access &lt;/a&gt; (by Rahmanuddin Shaik, August 19, 2014): Ten theosophical books authored by Rev. Fr. P. Jojaiah, SJ were released under free license (CC-BY-SA-4.0); 		For the first time an educational institution in the state of Andhra Pradesh is signing an MoU with CIS-A2K to work collaboratively to qualitatively 		improve Telugu Wikipedia; ALC faculty and students will create free e-content in Telugu on Telugu Wikipedia; Digital content from the fields of Botany, 		Physics, Chemistry, Telugu, Statistics, Ethics and Religion, Music and Dance will be produced on Telugu Wikipedia. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/news/deccan-herald-shruthi-august-5-2014-now-christ-students-will-contribute-to-wikipedia"&gt; Now, Christ students will contribute to Wikipedia &lt;/a&gt; (by H.M.Shruthi, Deccan Herald, August 5, 2014). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/openness/news/cis-mou-with-alc-coverage-in-eenadu"&gt;CIS-A2K Signs MoU with Andhra Loyola College in Vijayawada&lt;/a&gt; (Eenadu, August 15, 2014). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/news/the-hindu-august-15-2014-alc-signs-mou-for-better-net-access"&gt;ALC signs MoU for better net access&lt;/a&gt; (The Hindu, August 15, 2014). &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Konkani Global Enclave (organized by Jagotik Konknni Songhotton, Kalaangann, Shaktinagar, August 24, 2014). T. Vishnu Vardhan participated in the 	event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Policy Guide&lt;/b&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt; &lt;a href="https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide"&gt;Privacy in Healthcare: Policy Guide&lt;/a&gt; (by Tanvi Mani, August 26, 2014). &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014"&gt; Second Privacy and Surveillance Roundtable &lt;/a&gt; (by Anandini K Rathore, August 6, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt;&lt;b&gt; &lt;/b&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration &lt;/a&gt; (by Joe Sheehan, August 3, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications &lt;/a&gt; (by Divij Joshi, August 14, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Learning Event - The Internet and Economic, Cultural and Social Rights (organized by the International Development Research Centre and Association 	for Progressive Communications, August 8 - 10, 2014). Sunil Abraham was a remote participant.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india"&gt;Understanding Surveillance and Privacy in India &lt;/a&gt; (organized by Jamia Millia Islamia, New Delhi, August 28, 2014). Bhairav Acharya delivered a lecture. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Free Speech&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on Freedom of Expression (funded through a grant from the MacArthur Foundation) to study the restrictions placed on freedom of 	expression online by the Indian government and contribute to the debates around Internet governance and freedom of expression at forums like ICANN, ITU, 	IGF, WSIS, etc., we bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Paper&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper"&gt; Zero Draft of Content Removal Best Practices White Paper &lt;/a&gt; (by Jyoti Panday, August 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage &lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/the-telegraph-august-3-2014-i-am-going-to-ruin-you-dear"&gt;'I'm going to ruin you, dear' &lt;/a&gt; (by Prasun Chaudhuri with additional reporting by Varuna Verma in Bangalore, August 3, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas"&gt;We the goondas&lt;/a&gt; (by Shyam Prasad, Bangalore Mirror, August 4, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/livemint-august-9-2014-anirban-sen-sunil-abraham-the-online-warrior"&gt;Sunil Abraham | The online warrior&lt;/a&gt; (by Anirban Sen, Livemint, August 9, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/news/tech-first-post-dot-bharat-domain-to-roll-out-on-august-21"&gt;Dot Bharat domain to roll out on August 21 &lt;/a&gt; (originally published by IANS and mirrored in FirstPost, August 19, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/tech-president-jessica-mckenzie-august-28-2014-the-uncertain-future-of-indias-plan-to-biometrically-identify-everyone"&gt;The Uncertain Future of India's Plan to Biometrically Identify Everyone &lt;/a&gt; (by Jessica Mckenzie, TechPresident, August 28, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/news/scroll-in-rohan-venkataramakrishnan-will-domain-dot-bharat-spur-the-growth-of-Indian-languages-on-the-internet"&gt;Will domain dot भारत spur the growth of Indian languages on the internet? &lt;/a&gt; (by Rohan Venkataramakrishnan, August 29, 2014).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/news/livemint-august-30-2014-shreeja-sen-sc-seeks-govt-reply-on-pil-challenging-powers-of-it-act"&gt;SC seeks govt reply on PIL challenging powers of IT Act &lt;/a&gt; (by Shreeja Sen, Livemint, August 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Stewards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of its project on mapping cyber security actors in South Asia and South East Asia with the Citizen Lab, Munk School of Global Affairs, University 	of Toronto and the International Development Research Centre, Canada, CIS conducted 2 new interviews. With this it has finished a total of 21 interviews:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Video Interviews&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah"&gt;Saumil Shah&lt;/a&gt; (August 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"&gt;Gyanak Tsering&lt;/a&gt; (August 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-august-7-2014-transformation-or-drift"&gt; Transformation, or Drift? &lt;/a&gt; (by Shyam Ponappa, Business Standard, August 6, 2014 and Organizing India Blogspot, August 7, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india"&gt;"OTTs Eating Into Our Revenue": Telcos in India&lt;/a&gt; (by Geetha Hariharan, August 7, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/digital-humanities-and-alt-academy"&gt;Digital Humanities and the Alt-Academy&lt;/a&gt; (by P.P. Sneha, August 19, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at	&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 	Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2014-bulletin'&gt;https://cis-india.org/about/newsletters/august-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    

   <dc:date>2014-10-04T06:09:57Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india">
    <title>Understanding Surveillance and Privacy in India</title>
    <link>https://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india</link>
    <description>
        &lt;b&gt;Bhairav Acharya delivered a lecture at the Jamia Millia Islamia in New Delhi on August 28, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;While privacy seems intuitive to most people, its legal codification and protection is complex. This is because varying expectations of privacy exist in different social contexts demanding different forms and degrees of protection. In India, an unambiguous and enforceable constitutional right to privacy does not exist. The Supreme Court of India has, intermittently and unconvincingly, recognised a limited right to privacy in certain situations. Recent debates on privacy focus primarily on two areas: surveillance, and data protection. The interception of communications – phone calls, emails, and letters, – which is a type of surveillance, is statutorily regulated in India in an uneven way. A colonial law permits and regulates wiretaps in India. A derivative law governs emails and electronic communications. Both these laws suffer serious shortcomings. Indian law permits executive authorisations – by bureaucrats – of wiretaps without an independent audit and oversight mechanism. No legal provisions exist to redress improper wiretaps or information leaks – the Radia tapes controversy illustrates this. These lacunae remain unaddressed even as large-scale techno-utopian projects, such as the Central Monitoring System, move forward. However, the recent governmental push for privacy law does not stem from surveillance concerns but from international commerce in personal data. There is also a growing domestic constituency that is alarmed by the state’s collection of personal data without regulatory safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About the Speaker&lt;/b&gt;&lt;br /&gt;Bhairav Acharya is a constitutional lawyer in India who joined the Bar in 2004 after graduating from the National Law School of India University, Bangalore. From 2004 - 2009, he was the Deputy Director of the Public Interest Legal Support and Research Centre (PILSARC), an organisation established to provide institutional legal support and credible research to popular movements, and to ideas and communities marginalised by law. He headed a UNHCR project to draft a refugee protection law for India and is a member of the NHRC’s National Experts Group on Refugee Law. He litigated – mostly constitutional law – in the chambers of a senior counsel in the Supreme Court of India, where he became especially interested in free speech law. From 2009 - 2010, he advised a leading Indian multinational information technology major on privacy law and data protection. At present, he independently advises the Centre for Internet and Society, Bangalore, on privacy law, and is drafting a proposed privacy statute to regulate data protection and surveillance in India to provide a participatory and consensus - based legal submission to the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Details&lt;/b&gt;&lt;br /&gt;Venue: CCMG Network Governance Lab,&lt;br /&gt;Date: Thursday, August 28, 2014&lt;br /&gt;Time: 11.30 a.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india'&gt;https://cis-india.org/internet-governance/news/understanding-privacy-and-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T06:08:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/surveillance-privacy-roundtable">
    <title>Surveillance and Privacy Law Roundtable </title>
    <link>https://cis-india.org/events/surveillance-privacy-roundtable</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, COAI and Vahura invite you to a privacy roundtable at the India International Centre in New Delhi on September 1, 2014.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf" class="internal-link"&gt;Download the Invite &lt;/a&gt;(PDF, 1207 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recent legislative developments regarding privacy law in India&lt;/b&gt;&lt;br /&gt;In 2010, the European Union commissioned an assessment of the adequacy of Indian data protection laws in light of the transfer of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian privacy law to safeguard personal data. Consequently, in 2011, the Department of Personnel and Training (DoPT) proposed draft privacy legislation called the ‘Right to Privacy Bill, 2011’. The DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. Simultaneously, the Ministry of Communications and Information Technology issued the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 to give effect to section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Justice Shah Group of Experts on Privacy and the National Privacy Principles&lt;/b&gt;&lt;br /&gt;Aware of the need for privacy laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah to make specific proposals for future Indian privacy law. The Group of Experts submitted its Report to the Planning Commission in October 2012 wherein it proposed the adoption of nine National Privacy Principles. These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in future privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance law in India&lt;/b&gt;&lt;br /&gt;The cases of &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; (1963) and &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; (1975) first brought the questions of permissibility and limits of surveillance to the Supreme Court for judicial review. The regime governing the interception of telecommunications is contained in section 5(2) of the Indian Telegraph Act, 1885 read with rule 419A of the Indian Telegraph Rules, 1951. The Telegraph Rules were twice amended to give effect to certain procedural safeguards laid down by the Supreme Court in &lt;i&gt;PUCL&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1996). In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the Information Technology Act permit the interception and monitoring of electronic communications to collect traffic data and to intercept, monitor, and decrypt such communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About these roundtable consultations&lt;/b&gt;&lt;br /&gt;These roundtable consultations are hosted by the Centre for Internet &amp;amp; Society (CIS), COAI and Vahura. They are a series of national roundtables to focus on surveillance regulation and interception of communications in relation to telecom service providers, internet service providers, internet access providers, and internet-based service providers. These roundtables are designed to elicit comments on legal proposals to regulate surveillance. The text of these legal proposals has been drafted at CIS and continues to be modified to reflect the opinions and consensus at each roundtable consultation. The objective of these meetings is gain a stakeholder-based, participatory, and democratic consensus on the future of Indian surveillance and privacy law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/surveillance-privacy-roundtable'&gt;https://cis-india.org/events/surveillance-privacy-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-25T15:08:33Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf">
    <title>Surveillance and Privacy Law Roundtable Invite</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf'&gt;https://cis-india.org/internet-governance/blog/surveillance-privacy-roundtable-invite.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-25T09:24:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications">
    <title>Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications</title>
    <link>https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications</link>
    <description>
        &lt;b&gt;“The internet never forgets” is a proposition which is equally threatening and promising.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The phrase reflects the dichotomy presented by the extension on     the lease of public memory granted by the internet – as information is more accessible and more permanent, letting go of the past is becoming increasingly     difficult. The question of how to govern information on the internet – a space which is growing increasingly important in society and also one that     presents a unique social environment - is one that persistently challenges courts and policy makers. A recent decision by the European Court of Justice,     the highest judicial authority of the European Union, perfectly encapsulates the way the evolution of the internet is constantly changing our conceptions of individual privacy and the realm of information. On the 13&lt;sup&gt;th&lt;/sup&gt; of May, 2014, the ECJ in its ruling in    &lt;i&gt;Google v Costeja,&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;b&gt;[1]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt;effectively read a “right to be forgotten” into existing EU     data protection law. The right, broadly, provides that an individual may be allowed to control the information available about them on the web by removing     such information in certain situations - known as the right to erasure. In certain situations such a right is non-controversial, for example, the deletion     of a social media profile by its user. However, the right to erasure has serious implications for the freedom of information on the internet when it     extends to the removal of information not created by the person to whom it pertains.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and Perfect Memory&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The internet has, in a short span, become the biggest and arguably the most important tool for communication on the planet. However, a peculiar and     essential feature of the internet is that it acts as a repository and a reflection of public memory – usually, whatever is once made public and shared on     the internet remains available for access across the world without an expiry date. From public information on social networks to comments on blog posts,     home addresses, telephone numbers and candid photos, personal information is disseminated all across the internet, perpetually ready for access - and often     without the possibility of correcting or deleting what was divulged. This aspect of the internet means that the internet is a now an ever-growing     repository of personal data, indexed and permanently filed. This unlimited capacity for information has a profound impact on society and in shaping social     relations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The core of the internet lies in its openness and accessibility and the ability to share information with ease – most any information to any person is now     a Google search away. The openness of information on the internet prevents history from being corrupted, facts from being manipulated and encourages     unprecedented freedom of information. However, these virtues often become a peril when considering the vast amount of personal data that the internet now     holds. This “perfect memory” of the internet means that people are perpetually under the risk of being constantly scrutinized and being tied to their     pasts, specifically a generation of users that from their childhood have been active on the internet.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Consider the example of online criminal databases in the United States, which regularly and permanently upload criminal records of convicted offenders even     after their release, which is accessible to all future employers;&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; or the example of the Canadian psychotherapist who was permanently banned from the United States after an internet search revealed that he had experimented with LSD in his past;    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; or the cases of “revenge porn” websites, which (in most cases legally) publically host deeply private photos or videos of persons, often with their personal information, for the specific purpose of causing them deep embarrassment.    &lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These examples show that, due to the radically unrestricted spread of personal data across the web, people are no longer able to control how and by whom     and in what context their personal data is being viewed. This creates the vulnerability of the data collectively being “mined” for purposes of surveillance     and also of individuals being unable to control the way personal data is revealed online and therefore lose autonomy over that information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Right to be Forgotten and the ECJ judgement in &lt;i&gt;Costeja&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The problems highlighted above were the considerations for the European Union data protection regulation, drafted in 2012, which specifically provides for     a right to be forgotten, as well as the judgement of the European Court of Justice in &lt;i&gt;Google Spain v Mario Costeja Gonzalves. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petitioner in this case, sought for the removal of links related to attachment proceedings for his property, which showed up upon entering his name on     Google’s search engine. After refusing to remove the links, he approached the Spanish Data Protection Agency (the AEPD) to order their removal. The AEPD     accepted the complaints against Google Inc. and ordered the removal of the links. On appeal to the Spanish High Court, three questions were referred to the     European Court of Justice. The first related to the applicability of the data protection directive (Directive 95/46/EC) to search engines, i.e. whether     they could be said to be “processing personal data” under Article 2(a) and (b) of the directive,&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; and     whether they can be considered data controllers as per Section 2(d) of the directive. The court found that, because the search engines retrieve, record and     organize data, and make it available for viewing (as a list of results), they can be said to process data. Further, interpreting the definition of “data     controller” broadly, the court found that ‘     &lt;i&gt; It is the search engine operator which determines the purposes and means of that activity and thus of the processing of personal data that it itself         carries out within the framework of that activity and which must, consequently, be regarded as the ‘controller’ &lt;/i&gt; ’&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and that ‘     &lt;i&gt; it is undisputed that that activity of search engines plays a decisive role in the overall dissemination of those data in that it renders the latter         accessible to any internet user making a search on the basis of the data subject’s name, including to internet users who otherwise would not have found         the web page on which those data are published.’&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;b&gt;[8]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; The latter reasoning highlights the particular role of search engines, as indexers of data, in increasing the accessibility and visibility of data from     multiple sources, lending to the “database” effect, which could allow the structured profiling of an individual, and therefore justifies imposing the same     (and even higher) obligations on search engines as on other data controllers, notwithstanding that the search engine operator has no knowledge of the     personal data which it is processing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second question relates to the territorial scope of the directions, i.e. whether Google Inc., being the parent company based out of the US, came within     the court’s jurisdiction – which only applies to member states of the EU. The court held that even though it did not carry on the specific activity of     processing personal data, Google Spain, being a subsidiary of Google Inc. which promotes and sells advertisement for the parent company, was an     “establishment” in the EU and Google Inc., and, because it processed data “in the context of the activities” of the establishment specifically directed     towards the inhabitants of a member state (here Spain), came under the scope of the EU law. The court also reaffirmed a broad interpretation of the data protection law in the interests of the fundamental right to privacy and therefore imputed policy considerations in interpreting the directive.    &lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third question was whether Google Spain was in breach of the data protection directive, specifically Articles 12(b) and 14(1)(a), which state that a     data subject may object to the processing of data by a data controller, and may enforce such a right against the data controller, as long as the conditions     for their removal are met. The reasoning for enforcing such a claim against search engines in particular can be found in paragraphs 80 and 84 of the     judgement, where the court holds that     &lt;i&gt; “(a search engine) enables any internet user to obtain through the list of results a structured overview of the information relating to that individual         that can be found on the internet — information which potentially concerns a vast number of aspects of his private life and which, without the search         engine, could not have been interconnected or could have been only with great difficulty — and thereby to establish a more or less detailed profile of         him.” &lt;/i&gt; and that “     &lt;i&gt; Given the ease with which information published on a website can be replicated on other sites and the fact that the persons responsible for its         publication are not always subject to European Union legislation, effective and complete protection of data users could not be achieved if the latter         had to obtain first or in parallel the erasure of the information relating to them from the publishers of websites.” &lt;/i&gt; In fact, the court seems to apply a higher threshold for search engines due to their peculiar nature as indexes and databases.    &lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the court’s conception of the right of erasure, search engines are mandated to remove content upon request by individuals, when the information is     deemed to be personal data that is “     &lt;i&gt; inadequate, irrelevant or excessive in relation to the purposes of the processing, that they are not kept up to date, or that they are kept for longer than is necessary unless they are required to be kept for historical, statistical or scientific purposes,”        &lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;b&gt;[11]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; notwithstanding that the publication itself is lawful and causes no prejudice to the data subject. The court reasoned that when the data being projected     qualified on any of the above grounds, it would violate Article 6 of the directive, on grounds of the data not being processed “     &lt;i&gt; fairly and lawfully’, that they are ‘collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with         those purposes’, that they are ‘adequate, relevant and not excessive in relation to the purposes for which they are collected and/or further         processed’, that they are ‘accurate and, where necessary, kept up to date’ and, finally, that they are ‘kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data were collected or for which they are further processed’.”        &lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;b&gt;[12]&lt;/b&gt;&lt;/a&gt; &lt;/i&gt; Therefore, the court held that, due to the nature of the information, the data subject has a right to no longer have such information linked to his or her     name on a list of results following a search made on their name. The grounds laid down by the court, i.e. relevancy, inadequacy, etc. are very broad, yet     such a broad conception is necessary in order to effectively deal with the problems of the nature described above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judgement of the ECJ concludes by applying a balancing test between the rights of the data subject and both the economic rights of the data controller     as well as the general right of the public to information. It states that generally, as long as the information meets the criteria laid down by the     directive, the right of the data subject trumps both these rights. However, it adds an important caveat – such a right is inapplicable “     &lt;i&gt; the in specific cases, on the nature of the information in question and its sensitivity for the data subject’s private life and on the interest of the         public in having that information, an interest which may vary, in particular, according to the role played by the data subject in public life.” &lt;/i&gt; This crucial point on the balancing of two rights directly hit by the judgement was only summarily dealt with by the ECJ, without effectively giving any clarity as to what standards to apply or laying down any specific guidelines for the application of the new rule.    &lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Doing so, it effectively left the decision to determine what was in the public interest and how the     rights are to be balanced to the search engines themselves. Delegating such a task to a private party takes away from the idea of the internet as a common     resource which should be developed for the benefit of the larger internet community as a whole, by allowing it to be governed and controlled by private     stakeholders, and therefore paves an uncertain path for this crucial aspect of internet governance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Implications of the ECJ ruling&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The decision has far reaching consequences on both privacy and on freedom of information on the internet. Google began implementing the decision through a     form submission process, which requires the individual to specify which links to remove and why, and verifies that the request comes from the individual     themselves via photo identification, and has also constituted an expert panel to oversee its implementation (similar to the process for removing links     which infringe copyright law).&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Google has since received more than 91,000 requests for removal,     pertaining to 328,000 links of which it has approved more than half.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; In light of such large volumes of     data to process, the practical implementation of the ruling has been necessarily problematic. The implementation has been criticized both for implicating     free speech on the internet as well as disregarding the spirit of the right to be forgotten. On the first count, Google has been criticized for taking down     several links which are clearly are in public interest to be public, including several opinion pieces on politicians and corporate leaders, which amounts     to censorship of a free press.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; On the second count, EU privacy watchdogs have been critical of Google’s     decision to notify sources of the removed content, which prompts further speculation on the issue, and secondly, privacy regulators have challenged     Google’s claim that the decision is restricted to the localised versions of the websites, since the same content can be accessed through any other version     of the search engine, for example, by switching over to “Google.com”.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This second question also raises complicated questions about the standards for free speech and privacy which should apply on the internet. If the EU wishes     for Google Inc. to remove all links from all versions of its search engine, it is, in essence, applying the balancing test of privacy and free speech which     are peculiar to the EU (which evolved from a specific historical and social context, and from laws emerging out of the EU) across the entire world, and is     radically different from the standard applicable in the USA or India, for example. In spirit, therefore, although the judgement seeks to protect individual     privacy, the vagueness of the ruling and the lack of guidelines has had enormous negative implications for the freedom of information. In light of these     problems, the uproar that has been caused in the two months since the decision is expected, especially amongst news media sites which are most affected by     this ruling. However, the faulty application of the ruling does not necessarily mean that a right to be forgotten is a concept which should be buried.     Proposed solutions such as archiving of data or limited restrictions, instead of erasure may be of some help in maintaining a balance between the two     rights.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; EU regulators hope to end the confusion through drafting comprehensive guidelines for the search engines, pursuant to meetings with various stakeholders, which should come out by the end of the year.    &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Until then, the confusion will most likely continue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Is there a Right to be Forgotten in India?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian law is notorious for its lackadaisical approach towards both freedom of information and privacy on the internet. The law, mostly governed by the     Information Technology Act, is vague and broad, and the essence of most laws is controlled by the rules enacted by non-legislative bodies pursuant to     various sections of the Act. The “right to be forgotten” in India can probably be found within this framework, specifically under Rule 3(2) of the     Intermediary Guideline Rules, 2011, under Section 79 of the IT Act. Under this rule, intermediaries are liable for content which is “invasive of another’s     privacy”. Read with the broad definition of intermediaries under the same rules (which includes search engines specifically) and of “affected person”, the     applicable law for takedown of online content is much more broad and vague than the standard laid down in &lt;i&gt;Costeja. &lt;/i&gt;It remains to be seen whether     the EU’s interpretation of privacy and the “right to be forgotten” would further the chilling effect caused by these rules.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;i&gt;Google Spain v Mario Costeja Gonzalves, &lt;/i&gt; C‑131/12,             &lt;i&gt; Available at                 http://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=152065&amp;amp;pageIndex=0&amp;amp;doclang=en&amp;amp;mode=req&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=264438. &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;See &lt;/i&gt; Victor Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, (Princeton, 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; For example, &lt;i&gt;See &lt;/i&gt; http://mugshots.com/; and http://www.peoplesearchpro.com/resources/background-check/criminal-records/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; LSD as Therapy? Write about It, Get Barred from US, (April, 2007) &lt;i&gt;available at&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;http://thetyee.ca/News/2007/04/23/Feldmar/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;It’s nearly impossible to get revenge porn of the internet, &lt;/i&gt; (June, 2014), &lt;i&gt;available t &lt;/i&gt;http://www.vox.com/2014/6/25/5841510/its-nearly-impossible-to-get-revenge-porn-off-the-internet&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Article 2(a) -             &lt;i&gt; “personal data” shall mean any information relating to an identified or identifiable natural person (“data subject”); an identifiable person is                 one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to                 his physical, physiological, mental, economic, cultural or social identity; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Article 2(b) - “             &lt;i&gt; processing of personal data” (“processing”) shall mean any operation or set of operations which is performed upon personal data, whether or not                 by automatic means, such as collection, recording, organisation, storage, adaptation or alteration, retrieval, consultation, use, disclosure by                 transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction; &lt;/i&gt; &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; ¶36, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; The court also recognizes the implications on data profiling through the actions of search engines organizing results in ¶37.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; ¶74 judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; In ¶83, the court notes that the processing by a search engine affect the data subject &lt;i&gt;additionally &lt;/i&gt;to publication on a webpage; ¶87            &lt;i&gt;- &lt;/i&gt; &lt;i&gt; Indeed, since the inclusion in the list of results, displayed following a search made on the basis of a person’s name, of a web page and of the                 information contained on it relating to that person makes access to that information appreciably easier for any internet user making a search                 in respect of the person concerned and may play a decisive role in the dissemination of that information, it is liable to constitute a more                 significant interference with the data subject’s fundamental right to privacy than the publication on the web page. &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; ¶92, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; ¶72, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; ¶81, judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; The form is available at https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; &lt;i&gt;Is Google intentionally overreacting on the right to be forgotten? &lt;/i&gt; (June, 2014), &lt;i&gt;available at &lt;/i&gt;http://www.pcpro.co.uk/news/389602/is-google-intentionally-overreacting-on-right-to-be-forgotten.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Will the right to be forgotten extend to Google.com?,&lt;/i&gt; (July, 2014), &lt;i&gt;available at http://www.pcpro.co.uk/news/389983/will-right-to-be-forgotten-extend-to-google-com. &lt;/i&gt;&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;The right to be forgotten is a nightmare to enforce, &lt;/i&gt; (July, 2014), &lt;i&gt;available at &lt;/i&gt;http://www.forbes.com/sites/kashmirhill/2014/07/24/the-right-to-be-forgotten-is-a-nightmare-to-enforce.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Michael Hoven, &lt;i&gt;Balancing privacy and speech in the right to be forgotten, available ati &lt;/i&gt; http://jolt.law.harvard.edu/digest/privacy/balancing-privacy-and-speech-in-the-right-to-be-forgotten#_edn15&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; EU poses 26 questions on the right to be forgotten, (July, 2014), &lt;i&gt;available at &lt;/i&gt; http://www.cio-today.com/article/index.php?story_id=1310024135B0&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications'&gt;https://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-19T05:24:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india">
    <title>“OTTs Eating Into Our Revenue”: Telcos in India </title>
    <link>https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india</link>
    <description>
        &lt;b&gt;On August 5, 2014, the Telecom Regulatory Authority of India organised a seminar on a regulatory framework for Over-The-Top services. This is a lay discussion of the Seminar and its focus on matters crucial to telecom, the Internet and the existing regulatory framework.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On  Tuesday, the Telecom Regulatory Authority of India (TRAI) held a seminar  to initiate discussion on potential regulation of “over the top”  services (OTTs) in India. TRAI organized the seminar to “understand  perspectives of all stakeholders involved”, following grievances of  telcos that OTTs are eating into their revenues and free-riding on their  networks. In fact, a letter from the Cellular Operators Association of  India (COAI) to TRAI outlines these concerns excellently. The letter,  which I had the opportunity to see in print, objects that telcos take  the trouble of laying and maintaining networks, while rapidly  mushrooming OTTs eat into their revenue. Whatsapp, Skype and  alternatives to paid text-and-call find particular mention in the COAI’s  letter, and the COAI President Vikram Tiwathia was vociferous in his  iteration of operators’ concerns. With VOIP and other OTTs replacing  telco services, telcos are rapidly losing large parts of their revenue,  he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I  don’t mean to brush their concerns aside, of course. However, there is a  need to consider in depth certain questions with statistical,  regulatory and principled exploration. As Dr. Rajat Kathuria of &lt;a href="http://www.icrier.org/"&gt;ICRIER&lt;/a&gt; said at the Seminar’s first session, we need to evaluate whether  there’s a need for regulation in the first place. This includes  exploring whether the answer lies in &lt;i&gt;deregulation&lt;/i&gt;, as Suhaan Mukerji of &lt;a href="https://www.linkedin.com/company/plr-chambers"&gt;PLR Chambers&lt;/a&gt; and Subho Ray of &lt;a href="http://www.iamai.in/"&gt;IAMAI&lt;/a&gt; emphasized separately. Our solution, as Mr. Ray said, should not be to  chain the free OTTs just because we are in chains ourselves. Unchaining  telcos from their stringent licensing and other regulations may be more  appropriate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Seminar was attended by telcos, OTTs, civil society and other  stakeholders, and the frank exchange of views at the PHD Chamber of  Commerce was heartening. While telcos in the room were broadly open to  OTT innovation upon their networks (Mr. T.V. Ramachandran of &lt;i&gt;Vodafone&lt;/i&gt; was particularly vocal on this), there exists a broadly reactionary  loss-of-footing and apprehension over their current and projected  revenue loss. Mr. C.S. Rao of &lt;i&gt;Reliance&lt;/i&gt; was spot on when he said that telcos are afraid that what’s worked for them so far may not work in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We’ve  seen examples of such fear of incumbent operators before. In the early  1990s, the invention and spread of the Internet displaced appliancized,  bundled models of telco services, and telcos were similarly unwelcoming.  Indeed, AT&amp;amp;T went to court to fight the introduction of the  Carterfone. In India, the falling demand for VAS today, and OTT-response  to consumer demand, fosters such fear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But  accounting for OTTs’ lack of consumer servicing or responsibility for  monetization models, what was of chief concern at the TRAI Seminar was  the predominant focus on revenue. Telco profitability and their  incentives for investment &lt;i&gt;are&lt;/i&gt; important. Increasing supply side  costs, with the government seeking to maximize revenue from spectrum  allocation and demands of lower consumer prices, &lt;i&gt;might&lt;/i&gt; be  throttling current telco business models. We’d need to analyse data  usage charges and projected mobile broadband penetration, in comparison  with voice penetration, to be clear about the extent of such  strangulation. But if the answer to failing telco business lies in  further regulation and potential strangling of innovation, that’s a  concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s in two ways. &lt;i&gt;First&lt;/i&gt;,  it isn’t merely the NetFlix or Google or Apple that populate the app  economy. Raman Chima (ironically of Google) offered the example of  Slideshare in Okhla, Delhi as one of the many successful Indian  micro-multinationals. There are many others across India. &lt;i&gt;Second&lt;/i&gt;,  India’s current telecom regulatory model is unfit for a data/Internet  content model. There’s a need, Suhaan Mukerji and Mahesh Uppal of &lt;a href="http://in.linkedin.com/pub/com-first-india-pvt-ltd/76/268/186"&gt;ComFirst&lt;/a&gt; pointed out, to rethink our strict telecom licensing regime. We should begin to think, at least, of a vertically integrated &lt;i&gt;layered&lt;/i&gt; model of telecom regulation that regulates on the basis of &lt;i&gt;function&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These  layers are integral to Internet architecture: network, transport,  application. OTTs lie at the application layer, while telcos operate at  the network and transport layers. It may be inefficient to utilize  failures at one layer to regulate or share revenue of companies at other  layers – that would stunt competition and innovation. A reconfigured  licensing regime, permitting telcos to innovate more (someone at the  Seminar said security clearances take years, while OTTs need no such  clearance) might be more efficient and beneficial for all stakeholders  involved – not least the disempowered individual consumers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s my sense of the Seminar. Profitability and incentives are crucial. But they are crucial &lt;i&gt;insofar&lt;/i&gt; as they benefit consumers – with access, choice, freedom of speech,  security and privacy. Revenue sharing or partnership models, which were  mentioned far too many times by multiple speakers without &lt;i&gt;sufficient&lt;/i&gt; justification or elaboration, may not be ideal for any of us in the  long term. But these are issues we – and TRAI – should consider while  debating a regulatory framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Underlying infrastructure has an impact on our fundamental freedoms such as speech – the Supreme Court’s decisions in &lt;i&gt;Sakal Papers &lt;/i&gt;and &lt;i&gt;Express Newspapers&lt;/i&gt; makes that clear. Fast-paced innovation and the boundary-less benefits  of a single, interoperable Internet have pushed us to favour security  against freedoms. But every model we consider today – ad-based  monetization, big data analytics – have implications that the NSA’s  mass, cross-border surveillance has highlighted. Since TRAI is  rethinking our regulatory framework for telecom and the Internet – and I  envisage this going into a constructive consultation in the near future  – these issues must inform its analysis and conclusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more, read &lt;a href="http://www.medianama.com/2014/08/223-siddhartha-roy-hungama-net-neutrality-ott-telecom/"&gt;Nikhil Pahwa’s report&lt;/a&gt; over at MediaNama.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india'&gt;https://cis-india.org/telecom/blog/otts-eating-into-our-revenue-telcos-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>TRAI, OTT</dc:subject>
    

   <dc:date>2014-09-10T05:36:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014">
    <title>Second Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014</link>
    <description>
        &lt;b&gt;On July 4, 2014, the Centre for Internet and Society in association with the Cellular Operators Association of India organized a privacy roundtable at the India International Centre. The primary aim was to gain inputs on what would constitute an ideal surveillance regime in India.&lt;/b&gt;
        &lt;h2&gt;Introduction: About the Privacy and Surveillance Roundtables&lt;/h2&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local     partners. From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The     Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the     current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill     2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will     be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted     to the Department of Personnel and training&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second Privacy and Surveillance Roundtable was held in New Delhi at the India International Centre by the Centre for Internet and Society in     collaboration with the Cellular Operators Association of India on the 4&lt;sup&gt;th&lt;/sup&gt; of July, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the discussion was to gain inputs on what would constitute an ideal surveillance regime in India working with the&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;CIS Draft Privacy Protection Bill&lt;/a&gt;, the    &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; prepared by the Justice Shah committee, and the    &lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background and Context: Privacy and  Surveillance in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with the chair giving an overview of the legal framework that governs communications interception under Indian Law. The interception     of telecommunication is governed by Section 5(2) of the Telegraph Act,1885 and Rule 419A of the Telegraph Rules,1951. The framework under the Act has remained the same since it was drafted in 1885. An amendment to the Telegraph Rules in 1996 in light of the directions given under    &lt;i&gt;PUCL v Union of India&lt;/i&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt; was possibly the first change to     this colonial framework barring a brief amendment in 1961.&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the drafting of the Act, the only two Indian members of the drafting committee objected to the wide scope given to interception under Section 5(2).     In 1968, however, the 30&lt;sup&gt;th&lt;/sup&gt; Law Commission Report studying Section 5(2) came to the conclusion that the standards in the Act may be     unconstitutional given factors such as ‘public emergency’ were too wide in nature and called for a relook at the provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the interception of postal mail is governed by Section 26 of the Post Office Act, 1898, the interception of modern forms of communication that use     electronic information and traffic data are governed under Sections 69 and 69B of the Information Technology Act, 2000, while interception of telephonic conversations are governed by section 5(2) of the Indian Telegraph Act 1885 and subsequent rules under section 419A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the law ought to be?&lt;/b&gt;&lt;br /&gt;With the shift in time, the Chair noted that the concept of the law has changed from  its original colonial perspective. Cases such as    &lt;i&gt;Maneka Gandhi v Union of India&lt;/i&gt;&lt;a name="_ftnref3"&gt;&lt;/a&gt;, highlighted that an     acceptable law must be one that is ‘just, fair and reasonable’. &lt;span&gt;From judgments such as these, one can impute that any surveillance law should not be arbitrary and must comply with the principles of criminal procedure. Although this is ideal, recent matters that are at the heart of surveillance and privacy, such as the Nira Radia matter, currently sub-judice, will hopefully clarify the     scope of surveillance that is considered permissible in India.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Why is it important now?&lt;/b&gt;&lt;br /&gt;In India, the need to adopt a legislation on privacy came in the wake of the Indo-EU Free Trade Agreement negotiations, where a data adequacy assessment conducted by     the European Commission showed that India’s data protection practices were weak. In response to this, the Department of Personnel and Training drafted a Privacy Bill, of which two drafts have been made, though the later draft has not been made available to the public.&lt;/p&gt;
&lt;p&gt;The formation of a privacy proposal in India is not entirely new. For example in 1980, former Union minister VN Gadgil proposed a bill to deal with     limiting reportage on public personalities. Much of this bill was based on a bill in the House of Lords in 1960 suggested by Lord Mancroft to prevent     uncontrolled reporting. The chair notes here that in India privacy has developed comprehensively as a concept in response to the reporting practices of the     media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although, the right to privacy has been recognised as an implicit part of the right to life under the Constitution, the National Commission to Review the Working of the Constitution set up in February 2000 suggested the addition of a separate and distinct fundamental right to privacy under Article 21 B&lt;a name="_ftnref4"&gt;&lt;/a&gt; along the same lines of Article 8 of the European Convention of Human Rights.    &lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these are notable efforts in the development of privacy, the Chair raised the question of whether India is merely 'inheriting' reports and negotiations, without adopting such standards into practice and a law.&lt;/p&gt;
&lt;h2&gt;Discussions&lt;/h2&gt;
&lt;h3&gt;Cloud base storage and surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening up the discussion on electronic interception, a participant asked about the applicability of a Privacy regulation to cloud based services. Cloud     based storage is of increasing relevance given that the cloud permits foreign software companies to store large amounts of customer information at little     or no cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisdiction, however, would be limited to a server that resides in India or a service provider that originates or terminates in India. Moving the     servers back to India is a possible solution, however, it could have negative economic implications.&lt;span&gt;In terms of telecommunications, any communications that originate or terminate using Indian satellites are protected from foreign interception.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before delving into further discussion, the Chair posed the question of as to what kind of society we would like to live in, contrasting the individual     based society principle and the community based principle. While the former is followed by most Western Nations as a form of governance, Orientalist and/or     Asian tradition follows the community based principle where the larger focus is community rights. However, it would be incorrect to say that the latter     system does not protect rights such as privacy, as often Western perceptions seem to imply. For example, the Chair points out that the oldest Hindu laws     such as the Manu Smriti protected personal privacy.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Regulatory models for surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;After the preliminary discussion, the Chair then posed the fundamental question of &lt;b&gt;how&lt;/b&gt;&lt;b&gt; &lt;/b&gt;a government can regulate surveillance. During the discussion, a&lt;span&gt; comparison was made between the UK, the US &lt;/span&gt;&lt;i&gt;modus operandi &lt;/i&gt;&lt;span&gt;i.e. the rule of probable cause coupled with exhaustion of other remedies, and the Indian rule based     out of Section 5(2) of the Telegraph Act, 1885. &lt;/span&gt;&lt;span&gt;In the United States, wire taps cannot be conducted without a Judge’s authorization.&lt;/span&gt;&lt;span&gt;For example, the Foreign Intelligence Surveillance Act, which governs foreign persons, has secret courts. In addition, a participant added that surveillance requests in the US are rarely if ever, rejected. While on paper, the US model seems acceptable, most participants are weary of the practicability of such a system in India citing that a judiciary that is shielded from public scrutiny entirely cannot be truly independent. T&lt;/span&gt;&lt;span&gt;he UK follows an interception regime regulated by the Executive, the beginnings of which lay in its Telegraph Act in 1861, which the Indian Telegraph Act is based on. However, the interception regime of the UK has constantly changed with a steady re-evaluation of the law. Surveillance in the UK is regulated by the Regulation of Investigatory Powers Act of 2000(RIPA), in addition it has draft bills pending on Data Retention and on the Admissibility of intercepted communications as evidence.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In contrast, India follows an executive framework, where the Home Secretary gives authorization for conducting wiretaps. This procedure can be compromised in emergent circumstances, where an officer not below the rank of a Joint Secretary can pass an     order.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants agreed that the current system is grossly inadequate, and the Chair asked whether both a warrant and a judicial order based system would be appropriate for     India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the judicial model as a possible option, participants thought of the level of judiciary apt for regulating matters on surveillance in India.     While participants felt that High Court judges would be favourable, the immense backlog at the High Court level and the lack of judges is a challenge and     risks being inefficient. &lt;span&gt;If one were to accept the magistrate system, the Chair adds that there are executive magistrates within the hierarchy who are not judicial officers. To this, a participant posed the question as to whether a judicial model is truly a workable one and whether it should be abandoned. &lt;/span&gt;&lt;span&gt;In response, a participant, iterated the &lt;/span&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;span&gt;ratio that “A law must be just, fair and reasonable and be established to the satisfaction     of a judicially trained mind”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was then discussed how the alternative executive model is followed in India, and how sources disclose that police officers often use (and sometimes misuse) dedicated powers under     Section 5(2), despite Rule 419A having narrowed down the scope of authority. A participant disagreed here, stating that most orders for the interception of communications are passed by the Home     Secretary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When the People’s Union for Civil Liberties challenged Section 5(2) of the Telegraph Act, the Supreme Court held that it did not stand the test of Maneka     Gandhi and proposed the set-up of a review committee under its guidelines which was institutionalised following an amendment in 2007 to the Telegraph     Rules.&lt;/span&gt;&lt;a name="_ftnref6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Rule 419A, a review committee comprises of officials such as the Cabinet Secretary, Secretary of the Department of Telecommunications, Secretary of     the Department of Law and Justice and the Secretary of Information Technology and Communication ministry at the Centre and the Chief Secretary ,the Law     Secretary and an officer not below the rank of a Principal secretary at the State level. A participant suggested that the Home Secretary should also be     placed in the review committee to explain the reasons for allowing the interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Albeit Rule 419A states that the Review Committee sits twice a month, the actual review time according to conflicting reports is somewhere between a day to     a week. The government mandates that such surveillance cannot continue for more than 180 days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast to the Indian regime, the UK has a Commissioner who reviews the reasons for the interception along with the volume of communication among other     elements. The reports of such interceptions are made public after the commissioner decides whether it should be classified or declassified and individuals     can challenge such interception at the Appellate Tribunal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant asked whether in India, such a provision exists for informing the person under surveillance about the interception. A stakeholder answered     that a citizen can find out whether somebody is intercepting his or her communications via the government but did not elaborate on how.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Authorities for authorizing interception&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;On the subject of the regulatory model, a participant asked whether magistrates would be competent enough to handle matters on interception. It was pointed out that although this is subjective, it can be said that a lower court judge does not apply the principles of constitutional law, which include privacy, among other rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having rejected the possibility of High Court judges earlier in the discussion, certain participants felt that setting up a tribunal to handle issues related to surveillance could be a good option, considering the subject matter and specialisation of judges. Yet, it was pointed out that the problem with any judicial system, is delay that happens not merely inordinately but strategically with multiple applications being filed in multiple forums. In response, a participant suggested a more federal model with greater checks and balances, which certain others felt can only be found in an executive system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The CIS Privacy Protection Bill and surveillance&lt;/h3&gt;
&lt;p&gt;Section 6 of the CIS Privacy Protection Bill lists the procedure for applying to a magistrate for a warrant for interception. One of the grounds listed in     the Bill is the disclosure of all previously issued warrants with respect to the concerned person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 7 of the Bill, cognisable offences that impact public interest are listed as grounds for interception. Considering the wide range of offences     that are cognisable, there is debate on whether they all constitute serious enough offences to justify the interception of communications. For example, the     bouncing of a cheque under the Negotiable Instruments Act is a cognisable offence in public interest, but is it serious enough an offence to justify the     interception of communications? How should this, then be classified so as to not make arbitrary classifications and manage national security is another     question raised by the Chair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The example of Nira Radia and the fact that the income tax authorities requested the surveillance demonstrates the subsisting lack of a framework     for limiting access to information in India. A participant suggested that a solution could be to define the government agencies empowered to intercept     communications and identify the offences that justify the interception of communications under Section 7 of the CIS Privacy Protection Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the discussion, it was pointed out that the Government Privacy Bill, 2011 gives a broad mandate to conduct interception that goes beyond the reasonable restrictions under Article 19 (2) of the     Constitution. For example, among grounds for interception like friendly relations with other States, Security and public disorder, there are also vague     grounds for interception such as the &lt;i&gt;protection of the rights and freedoms of others&lt;/i&gt; and &lt;i&gt;any other purpose mentioned within the Act&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Justice Shah report did not recommend that “any other purpose within the Act” be a ground for interception, it did recommend “protection of     the freedom of others” continue to be listed as a permissible ground for the interception of communications.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Meta-data and surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Under Section 17 of the Draft Bill, metadata can be intercepted on grounds of national security or commission of an offence. Metadata is not protected     under Rule 419A of the Telegraph Rules and a participant asked as to why this is. The Chair then posed the question to the conference of whether there     should be a distinction between the two forms of data at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While participants agreed that Telecommunication Service Providers store meta data and not content data, there is a need according to certain participants,     to circumscribe the limits of permissible metadata collection. These participants advocated for a uniform standard of protection for both meta and content     data, whereas another participant felt that there needs to be a distinction between content data and meta data. Certain participants also stressed that     defining what amounts to metadata is essential in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chair moved on to discussing the provisions relating to communication service providers under Chapter V. It was noted that this section will be     irrelevant however, if the Central Monitoring System comes into force, as it will allow interception to be conducted by the Government independent of     service providers.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Data Retention and Surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Data can be classified into two kinds for the purposes of interception, i.e. content and Meta data. Content data represents the content in the communication in itself whereas Meta data is the information about the communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecommunications service providers are legally required to retain metadata for the previous year under the Universal Access Service Terms, although no maximum time limit on retention has been legally established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant highlighted that the principle of necessity has been ignored completely in India and there is currently a practice of mass data collection. In particular, metadata is collected freely by companies, as it is not considered an invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another stakeholder mentioned that nodal officers set up under every Telecommunication Service Provider are summoned to court to explain the obtainment of the intercepted data. The participant mentions that Telecom Service Providers are reluctant to explain the process of each interception, questioning as to why Telecom Service Providers must be involved in judicial proceedings regarding the admissibility of evidence when they merely supply the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant asked as to where a Grievance Redressal mechanism can be fit in within the current surveillance framework in India. In response, it was noted that with a Magistrate model, procedure cannot be prescribed as Criminal Procedure would apply. However, if tribunals were to be created, a procedure that deals with the concerns of multiple stakeholders would be apt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A doubt raised by a stakeholder was whether prior sanction could be invoked by public servants against surveillance. Its applicability must be seen on a case to case basis, although for the most part, prior sanction would not be applicable considering that public officials accused of offences are not be entitled to prior sanction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 14 of the CIS Privacy Protection Bill prohibits the sharing of information collected by surveillance with persons other than authorised authorities in an event of national security or the commission of a cognisable offence. Participants agreed that the wording of the section was too wide and could be misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant also pointed out that in practice, such parameters on disclosure are futile as even on civil family matters, metadata is shared amongst the service provider and the individuals that request it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With relation to metadata, a participant suggested a maximum retention period of 2 years. As pointed out earlier, Call Detail Records, a service provider must retain the information for at     least one year, however, there is no limit placed on retention, and destruction of the same is left to the discretion of the service provider. Generally it was agreed by &lt;span&gt;participants that a great deal more clarity is needed as currently the UASL     merely states that Internet Protocol Detail Record (IPDR)&lt;/span&gt;&lt;a name="_ftnref7"&gt;&lt;/a&gt;&lt;span&gt; should be maintained for a     year.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Duties of the Service Provider&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Under the CIS Privacy Protection Bill , the duties of Telecommunication Service Providers broadly includes ‘measures to protect privacy and     confidentiality’ without further elaboration. A participant mentioned that applicable and specific privacy practices for different industries need to be     defined. Another participant stressed that such practices should be based in principles and not based in technology - citing rapidly evolving technology     and the obsolete government standards that are meant to be followed as security practices for ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another area that needs attention according to a participant is the integrity of information after interception is conducted. Participants also felt that     audit practices by Telecommunication Service Providers should be confined to examining the procedures followed by the company, and not examine content,     which is currently the practice according to other participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant also mentioned that standards do not be prescribed to Telco's considering the Department of Telecommunications conducts technical audits. Another     participant felt that the existing system on audits is inadequate and perhaps a different model standard should be suggested. The Chair suggests that a model     akin to the Statement on Auditing Standards that has trained persons acting as auditors could fair better and give security to Telco's by ensuring immunity     for proceedings based on compliance with the standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next issue discussed was whether surveillance requests can be ignored by Telco's, and whether Telco's can be held liable for repeatedly ignoring interception requests. A stakeholder replied that although there are no rules for such compliance, a     hierarchal acquiescence exists which negates any flexibility.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Admissibility of Evidence&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;The significance given to intercepted communications as evidence was the next question put forth by the Chair. For example in the US, the ‘fruit of the     poisonous tree’ rule is followed where evidence that has been improperly received discredits its admissibility in law as well as further evidence found on     the basis of it. In India, however, intercepted communications are accorded full evidentiary value, irrespective of how such evidence is procured. The 1972 Supreme Court Judgment of &lt;i&gt;Malkani v State of Maharashtra&lt;/i&gt;, reiterated a seminal UK judgment, &lt;i&gt;Kuruma, Son of Kanju v. R&lt;/i&gt; &lt;a name="_ftnref8"&gt;&lt;/a&gt;, which stated that if the evidence was admissible it is irrelevant how it was     obtained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants suggested more interaction with the actual investigative process of surveillance, which includes prosecutors and investigators to gain a     better understanding of how evidence is collected and assessed.&lt;/p&gt;
&lt;h2&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable in Delhi was not a discussion on surveillance trapped in theory but a practical exposition on the realities of governance and surveillance.     There seemed to be two perspectives on the regulatory model both supported with workable solutions, although the overall agreement was on an organised     executive model with accountability and a review system. In addition, inputs on technology and its bearing on the surveillance regime were informative. A     clear difference of opinion was presented here on the kind of protection metadata should be accorded. In addition, feedback from stakeholders on how     surveillance is conducted at the service provider level, highlight the need for an overhaul of the regime, incorporating multiple stakeholder concerns.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; 1994 4 SCC 569&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The definition of telegraph was expanded with the Telegraph Laws (Amendment) Act, 1961 under Section 3 (1AA) to ‘‘telegraph’ means any appliance,             instrument, material or apparatus used or capable of use for transmission or reception of signs, signals, writing, images and sounds orintelligence             of any nature by wire, visual or other electro-magnetic emissions, radio waves or Hertzian waves, galvanic, electric or magnetic means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation.—’Radio waves’ or ‘Hertzian waves’ means electromagnetic waves of frequencies lower than 3,000 giga-cycles per second propagated in             space without artificial guide;]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; 1978 AIR 597&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Art 21-B-“Every person has a right to respect for his private and family life, his home and his correspondence.”, Accessed at &amp;lt;            &lt;a href="http://lawmin.nic.in/ncrwc/finalreport/v1ch3.htm"&gt;http://lawmin.nic.in/ncrwc/finalreport/v1ch3.htm&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; Article 8 of the European Convention on Human Rights mentions&lt;/p&gt;
&lt;p&gt;&lt;i&gt; 1. Everyone has the right to respect for his private and family life, his home and his correspondence.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; 2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is                 necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the                 prevention of disorder or crime, for the protection of health or morals or for the protection of the rights and freedoms of others. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Article 8 was invoked in &lt;i&gt;Rajagopal v State of Tamil Nadu&lt;/i&gt; (1995 AIR 264)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; PUCL v Union of India, (1997) 1 SCC 301&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; IPDR measures bandwidth and monitors internet traffic.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; [1955] A.C. 197&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014'&gt;https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-09T04:10:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss">
    <title>Connecting the Next Two Billion: The Role of FOSS</title>
    <link>https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss</link>
    <description>
        &lt;b&gt;Sunil Abraham was a speaker at this event organized by ICFOSS at the APrIGF in Noida on August 4, 2014.&lt;/b&gt;
        &lt;h3&gt;Specific Issues of Discussions &amp;amp; Description&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Connecting the next two billion users on the Internet poses unique  challenges that must be addressed. The next two billion users will have  very different profiles as compared to the first billion in terms of  factors such as geography, demography, gender, disability, technology  access, language access, and connectivity devices. In addition, with the  coming of the Internet of Things, the users of the Internet may also  include devices, sensors and sensor networks. Further, the context of  the Internet itself may be changing, particularly in relation to efforts  by various State and non-State actors to restrict  freedom of access to  the Internet and freedom of expression on it.Free &amp;amp; Open Source  Software (FOSS) has now assumed greater significance in the light of  revelations related to arbitrary surveillance conducted by states. This  issue highlights the need to use audited technology and infrastructure  to prevent the wanton violation of privacy of citizens. FOSS can be used  to build shared community infrastructure that will protect users from  privacy abuses. As most of the online applications run on top of free  software, there is also a need for greater  collaboration between the  industry and free software community to ensure security and robustness  of software to prevent incidents like the heartbleed bug  vulnerabilities. As the next two billion comes online, FOSS assumes  great significance for building a safe and secure Internet and robust  communication platforms.The panel will discuss the following issues:•  Relevance of FOSS as an access enabler and source of robust,  cost-effective andfreedom-preserving software• The importance of FOSS in  preventing arbitrary surveillance• Co-operation among businesses and  free software community to develop secure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building community communication infrastructure using FOSS to restrict the dependence on centralised services.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Moderator and Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Moderator: &lt;/b&gt;Ms. &lt;a href="http://2014.rigf.asia/speakers/#Mishi" title="Speakers Profile"&gt;Mishi Choudhary&lt;/a&gt;, Executive Director, SFLC.IN, New Delhi&lt;/li&gt;
&lt;li&gt;Dr. &lt;a href="http://2014.rigf.asia/speakers/#Rahul" title="Speakers Profile"&gt;Rahul De&lt;/a&gt;, IIM Bangalore &lt;i&gt;(Remote)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Dr. &lt;a href="http://2014.rigf.asia/speakers/#Nagariuna" title="Speakers Profile"&gt;G. Nagarjuna&lt;/a&gt;, Free Software Foundation of India &lt;i&gt;(Remote)&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Prasanth" title="Speakers Profile"&gt;Prasanth Sugathan&lt;/a&gt;, Counsel, SFLC.in&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Satish" title="Speakers Profile"&gt;Satish Babu&lt;/a&gt;, Director, ICFOSS&lt;/li&gt;
&lt;li&gt;Mr. &lt;a href="http://2014.rigf.asia/speakers/#Sunil" title="Speakers Profile"&gt;Sunil Abraham&lt;/a&gt;, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li&gt;
&lt;p class="p1"&gt;Mr. S. Ramakrishnan, Media Lab Asia/Govt. of India&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workshop Organizer&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This workshop will be jointly organised by International Centre For Free and Open Source Software (ICFOSS), an autonomous institution under the Government of Keralamandated with the objectives of co-ordinating FOSS initiatives within Kerala, as well as linking up with FOSS initiatives in other parts of the world and SFLC.IN, a donor supported legal services organisation that works to protect freedom in the digital world.The details of the contact person for the workshop is given below:Name: Mr.Satish BabuDesignation: DirectorOrganisation: International Center for Free and Open Source Software (IC-FOSS).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For more details &lt;a class="external-link" href="http://2014.rigf.asia/agenda/workshop-proposals/workshop-proposal-8/"&gt;see the APrIGF website&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss'&gt;https://cis-india.org/openness/news/apr-igf-delhi-2014-connecting-the-next-two-billion-the-role-of-foss&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-09-10T05:04:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration">
    <title>Surat’s Massive Surveillance Network Should Cause Concern, Not Celebration </title>
    <link>https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration</link>
    <description>
        &lt;b&gt;The blog post examines the surveillance network of Surat, a city in Gujarat state in India.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;The Surveillance System&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Surat, a city in the state of Gujarat, has &lt;a href="http://www.narendramodi.in/shri-modi-inaugurates-cctv-surveillance-network-of-surat-police/"&gt;recently unveiled&lt;/a&gt; a comprehensive closed-circuit camera surveillance system that spans almost the entire city.  This makes Surat the first Indian city to have a modern, real-time CCTV system, with eye-tracking software and night vision cameras, along with intense data analysis capabilities that older systems lack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar systems are &lt;a href="http://ibnlive.in.com/blogs/sauravjha/2976/65090/cctvs-and-the-move-to-make-indian-cities-safer-across-states.html"&gt;planned&lt;/a&gt; for cities across India, from Delhi to Punjab, even those that already have older CCTV programs in place.  Phase I of the system, which is currently completed, consists of 104 CCTV cameras installed at 23 locations and a 280 square foot video wall at the police control room. The video wall is one of the largest in the country, according to the &lt;a href="http://timesofindia.indiatimes.com/tech/it-services/Verint-Surat-authorities-launch-city-wide-24x7-surveillance-system/articleshow/18088587.cms"&gt;Times of India&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;Narendra Modi, then the Gujarat chief minister, launched the project in January 2013, though the project was original conceptualized by police commissioner Rakesh Asthana, who has &lt;a href="http://scroll.in/article/667909/Why-India-should-worry-about-Surat's-celebration-of-its-new-closed-circuit-camera-network/"&gt;cited&lt;/a&gt; the CCTV system in Scotland Yard as his inspiration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Phase II of the surveillance project will involve the installation of 550 cameras at 282 locations, and in the future, police plan to install over 5000 cameras across the city. Though other security systems, like those in Delhi, rely on lines from the state owned service provider MTNL, with limited bandwidth for their CCTV network, the Surat system has its own dedicated cables.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The security system was financed by a unique Public-Private Partnership (PPP) model, where a coalition of businesses, including many manufacturing units and representatives of Surat’s textile industry want to prevent crime. The many jewelers in the city also hoped it would limit thefts.  In the model, businesses interested in joining the coalition contribute Rs 25 lakh as a one-time fee and the combined fees along with some public financing go to construct the city-wide system. The chairman of the coalition is always the Commissioner of Surat Police. Members of the coalition not only get a tax break, but also believe they are helping to create a safer city for their industries to thrive.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Arguments for the System&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bomb blasts in Ahmedabad in 2008 led the Gujarat police to consider setting up surveillance systems not just in Ahmedabad, according to &lt;a href="http://scroll.in/article/667909/Why-India-should-worry-about-Surat's-celebration-of-its-new-closed-circuit-camera-network/"&gt;Scroll.in&lt;/a&gt;, but in many cities including Surat. Terror attacks in Mumbai in 2008 and at the Delhi High Court in 2011 lent momentum to surveillance efforts, as did international responses to terror, such as the United Kingdom’s intensive surveillance efforts in response to 2005 bombing in London. The UK’s security system has become so comprehensive that Londoners are caught on camera over &lt;a href="http://www.ibtimes.co.uk/britain-cctv-camera-surveillance-watch-london-big-312382"&gt;300 times a day&lt;/a&gt; on average. The UK’s CCTV systems cost over £500 million between 2008 and 2012, and one single crime has been solved in London for every 1,000 cameras each year, according to &lt;a href="http://news.bbc.co.uk/2/hi/uk_news/8219022.stmhttp:/news.bbc.co.uk/2/hi/uk_news/8219022.stm"&gt;2008 Metropolitan Police figures&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, citizens in London may feel safer in their surveillance state knowing that the Home Office of the United Kingdom regulates how CCTV systems are used to ensure that cameras are being used to protect and not to spy. The UK’s &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/204775/Surveillance_Camera_Code_of_Practice_WEB.pdf"&gt;Surveillance Camera Code of Practice&lt;/a&gt; outlines a thorough system of safeguards that make CCTV implementation less open to abuse. India currently has no comparable regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The combined government worries of terrorism and business owners desire to prevent crime led to Surat’s unique PPP, ournalist Suarav Datta’s &lt;a href="http://scroll.in/article/667909/Why-India-should-worry-about-Surat%27s-celebration-of-its-new-closed-circuit-camera-network"&gt;article&lt;/a&gt; in Scroll.in continues. Though the Surat Municipal Corporation invested Rs 2 crore, business leaders demonstrated their support for the surveillance system by donating the remaining Rs 10 crore required to build the first phase system. Phase II will cost Rs 21 crore, with the state government investing Rs 3 crore and business groups donating the other Rs 18 crore. This finance model demonstrates both public and private support for the CCTV system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Why CCTV systems may do more harm than good&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite hopes that surveillance through CCTV systems may prevent terrorism and crime, evidence suggests that it is not as much of a golden bullet as its proponents believe. In the UK, for example, where surveillance is practice extensively, the number of crimes captured on camera &lt;a href="http://www.nytimes.com/2013/04/29/business/media/bombings-trip-up-reddit-in-its-turn-in-spotlight.html?pagewanted=all"&gt;dropped significantly&lt;/a&gt; in 2010, because there were so many cameras that combing through all the hours footage was proving to be an exercise in futility for many officers. According to Suaray Datta’s article on Scroll.in, potential offenders in London either dodge cameras or carry out their acts in full view of them, which detracts from the argument that cameras deter crime. Additionally, prosecutors &lt;a href="http://www.telegraph.co.uk/news/politics/6088086/Worthless-CCTV-camera-footage-is-not-good-enough-to-fight-crime-leading-QC-warns.html"&gt;allege&lt;/a&gt; that the CCTV systems are of little value in court, because the quality of the footage is so low that it cannot provide conclusive proof of identities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2008 &lt;a href="http://www.sfgate.com/bayarea/article/Crime-cameras-not-capturing-many-crimes-3290349.php"&gt;study&lt;/a&gt; in San Francisco showed that surveillance cameras produce only a placebo effect–they do not deter crime, they just move it down the block, away from the cameras. In Los Angeles, more dramatically, there was little &lt;a href="https://www.library.ca.gov/crb/08/08-007.pdf"&gt;evidence&lt;/a&gt; that CCTV cameras helped detect crime, because in high traffic areas the number of cameras and operators required is so high, and because the city’s system was privately funded, the California Research Bureau’s report noted that it was open to exploitation by private interests pursuing their own goals. Surat’s surveillance efforts are largely privately funded too, a vulnerability that could lead to miscarriages of justice if private security contractors were to gain to security footage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More evidence of the ineffectiveness of CCTV surveillance comes in the Boston marathon bombing of 2013 and the attack on the Indian parliament in 2001. In the case of the Boston bombing, release of CCTV footage to the general public led to rampant and unproductive &lt;a href="http://www.nytimes.com/2013/04/29/business/media/bombings-trip-up-reddit-in-its-turn-in-spotlight.html?pagewanted=all"&gt;speculation&lt;/a&gt; about the identity of the bomber, which resulted in innocent spectators being unfairly painted with suspicion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s lack of regulation over CCTV’s also makes Surat’s new system susceptible to misuse. There is currently no strong legislation that protects citizens filmed on CCTV from having their images exploited or used inappropriately. Only police will have access to the recordings, Surat officials say, but the police themselves cannot always be trusted to adequately respect the rights of the citizens they are trying to protect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy acknowledges the lack of regulations on CCTV surveillance, and recommends that CCTV footage be legally protected from abuse. However, the Report notes that regulating CCTV surveillance to the standards of the National Privacy Principals they establish earlier in the report may not be possible for a number of reasons. First, it will be difficult to limit the quantity of information collected because the cameras are simply recording video of public spaces, and is unlikely that individuals will be able to access security footage of themselves. However, issues of consent and choice can be addressed by indicating that CCTV surveillance is taking place on entryways to monitored spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surat is not the first place in India to experiment with mass CCTV surveillance. Goa &lt;a href="http://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy"&gt;has mandated&lt;/a&gt; surveillance cameras in beach huts to monitor the huts and deter and detect crime. The rollout is slow and ongoing, and some of the penalties the cameras are intended to enforce seem too severe, such as potentially three months in prison for having too many beach chairs. More worryingly, there are still no laws ensuring that the footage will only be used for its proper law-enforcement objectives. Clear oversight is needed in Goa just as it is in Surat.  The Privacy Commissioner outlined by the Report of the Group of Experts could be well suited to overseeing the proper administration of CCTV installations, just as the Commissioner would oversee digital surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns of privacy and civil liberties appear to have flown out the window in Surat, with little public debate. It is unclear that Surat’s surveillance efforts will achieve any of their desired effects, but without needed safeguards they will present an opportunity for abuse. Perhaps CCTV initiatives need to be subjected to a little bit more scrutiny.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration'&gt;https://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T03:05:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2014-bulletin">
    <title>July 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2014-bulletin</link>
    <description>
        &lt;b&gt;Seventh issue of the newsletter (July 2014) below:&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at the Centre for Internet &amp;amp; Society (CIS) welcome you to the seventh issue of the newsletter (July 2014). Archives of our newsletters can be     accessed at: &lt;a href="https://cis-india.org/about/newsletters/"&gt;http://cis-india.org/about/newsletters&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;------------------------------     &lt;br /&gt; &lt;b&gt;Highlights &lt;/b&gt;&lt;br /&gt; ------------------------------&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Nehaa Chaudhari participated in the 28&lt;sup&gt;th&lt;/sup&gt; session of the World Intellectual Property Organisation Standing Committee on Copyright and Related     Rights (WIPO-SCCR) held in Geneva from June 30 to July 4, 2014. The Centre for Internet and Society (CIS) gave its statements on the Limitations and     Exceptions for Libraries and Archives and Proposed Treaty for the Protection of Broadcasting Organizations.&lt;/li&gt;
&lt;li&gt;India became the first country to ratify the Marrakesh Treaty and the Accessible Books Consortium was launched. Nehaa Chaudhari who participated in the     28&lt;sup&gt;th&lt;/sup&gt; session of the WIPO-SCCR reports on this in a blog entry.&lt;/li&gt;
&lt;li&gt;Vikrant Narayan Vasudeva produced a research paper on patent valuation and license fee determination as part of the Pervasive Technologies project.&lt;/li&gt;
&lt;li&gt;Our grant application to the Wikimedia Foundation was approved. CIS has been awarded Rs. 12,000,000 for the next one year for the Access to Knowledge     (Wikipedia) project.&lt;/li&gt;
&lt;li&gt;CIS and the University of Mysore organized the Open Knowledge day in Mysore on July 15, 2014. Six volumes of Kannada Vishwakosha was re-released under     the Creative Commons (CC license).&lt;/li&gt;
&lt;li&gt;We helped the Ministry of Science and Technology draft the Open Access Policy for the DST/DBT.&lt;/li&gt;
&lt;li&gt;The first of the seven proposed roundtable meetings on “Privacy and Surveillance” conducted by CIS in collaboration with the Cellular Operators     Association of India and the Council for Fair Business Practices was held in Mumbai on June 28, 2014. Anandini K. Rathore has blogged on this.&lt;/li&gt;
&lt;li&gt;Bedavyasa Mohanty has produced a blog entry that analyses the nuances of interception of communications under the Indian Telegraph Act and the Indian     Post Office Act.&lt;/li&gt;
&lt;li&gt;Vinayak Mithal has written a blog entry on the Constitutionality of Indian surveillance law that analyses ICANN's reactive transparency mechanism,     comparing it with freedom of information best practices. He describes the DIDP and its relevance for the Internet community.&lt;/li&gt;
&lt;li&gt;Nishant Shah speaks on the right to freedom of speech and expression in the latest interview conducted as part of the Cybersecurity series being done     with a grant from the International Development Research Centre (IDRC), Ottawa.&lt;/li&gt;
&lt;li&gt;Nishant Shah’s peer reviewed article “Asia in the Edges: A Narrative Account of the Inter-Asia Cultural Studies Summer School in Bangalore” was published     in Inter-Asia Cultural Studies Journal, Volume 15, Issue 2, on July 3, 2014. Nishant gives a narrative account of the experiments and ideas that shaped the     second Summer School, “The Asian Edge” hosted in Bangalore, India, in 2012.&lt;/li&gt;
&lt;li&gt;CIS recruited two new staff members in its Bangalore office. Rohini Lakshane joined as a Program Officer in the Pervasive Technologies project and K.N. Medini joined as a Senior Accounts Officer. Their profiles can be accessed at    &lt;a href="https://cis-india.org/about/people/our-team"&gt;http://cis-india.org/about/people/our-team&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;----------------------------------------------     &lt;a href="https://cis-india.org/accessibility"&gt; &lt;br /&gt; &lt;b&gt;Accessibility and Inclusion &lt;/b&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt; ----------------------------------------------     &lt;br /&gt; Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and     programmes on issues relating to persons with disabilities in India. We compiled the National Compendium of Policies, Programmes and Schemes for Persons     with Disabilities (29 states and 6 union territories). We will be publishing this soon. The draft chapters along with the quarterly reports can be accessed     on the &lt;a href="https://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed    &lt;a href="https://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/nvda-e-speak-update-july-2014.pdf"&gt;Work Report for July&lt;/a&gt; (by Suman Dogra, July 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry     &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;India's Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched &lt;/a&gt; (by Nehaa Chaudhari, July 1, 2014): India became the first country to ratify the Marrakesh Treaty.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/news/spicy-ip-july-1-2014-thomas-j-vallianeth-spicy-ip-tidbit-india-ratifies-the-marrakesh-treaty-for-the-visually-impaired"&gt;&lt;b&gt; &lt;/b&gt;SpicyIP Tidbit: India ratifies the Marrakesh Treaty for the Visually Impaired &lt;/a&gt; (by Thomas J. Vallianeth, Spicy IP, July 1, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------------     &lt;br /&gt; &lt;b&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; -----------------------------------------------------------     &lt;br /&gt; As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International     Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support     intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a     grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships     that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►WIPO&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event and Statements     &lt;br /&gt; &lt;/b&gt;Nehaa Chaudhari participated in the 28&lt;sup&gt;th&lt;/sup&gt; session of WIPO-SCCR held in Geneva from June 30 to July 4, 2014. The following have been the outputs     from the event:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blog/cis-statement-on-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; Statement on the Proposed Treaty for the Protection of Broadcasting Organizations at WIPO SCCR 28 &lt;/a&gt; (by Nehaa Chaudhari, July 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blog/opening-statement-of-india-on-limitations-and-exceptions-for-libraries-and-archives"&gt; Opening Comments by India on Limitations and Exceptions for Libraries and Archives at WIPO SCCR 28 &lt;/a&gt; (posted by Nehaa Chaudhari, July 7, 2014). This was the statement made by the Indian delegation at WIPO-SCCR 28&lt;sup&gt;th&lt;/sup&gt; session on July 2, 2014. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blog/cis-statement-on-limitations-and-exceptions-for-libraries-and-archives"&gt; Statement on the Limitations and Exceptions for Libraries and Archives at WIPO SCCR 28 &lt;/a&gt; (by Nehaa Chaudhari, July 3, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blog/wipo-sccr-28-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; 28th Session of the WIPO SCCR: Report on the Proposed Treaty for the Protection of Broadcasting Organizations &lt;/a&gt; (by Nehaa Chaudhari, July 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Research Papers&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/blog/patent-valuation-and-license-fee-determination-in-context-of-patent-pools"&gt;&lt;b&gt; &lt;/b&gt;Patent Valuation and License Fee Determination in Context of Patent Pools &lt;/a&gt; (by Vikrant Narayan Vasudeva, July 9, 2014). Vikrant has produced research that examines patent valuation and license fee determination in detail. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blog/grounds-for-compulsory-patent-licensing-in-us-canada-china-and-india"&gt; Grounds for Compulsory Patent Licensing in United States, Canada, China, and India &lt;/a&gt; (by Maggie Huang, July 29, 2014). In her research paper Maggie tries to answer questions about the grounds of compulsory licensing in international         treaties with specific examples from America and Asia. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia     &lt;br /&gt; As part of the &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to     more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the     Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in     Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcement     &lt;br /&gt; &lt;/b&gt;Our grant application to the Funds Dissemination Committee (FDC) of the Wikimedia Foundation was approved by its board which met in Frankfurt from May 21 to 24, 2014. CIS had requested a grant of Rs. 18,406,454 and were    &lt;a href="https://meta.wikimedia.org/wiki/FDC_portal/FDC_recommendations/2013-2014_round2"&gt;awarded Rs. 12,000,000&lt;/a&gt; for the next one year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following were done this month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Articles / Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/prajavani-july-3-2014-article-on-wikipedia-zero"&gt;&lt;b&gt; &lt;/b&gt;Aircel &amp;amp; Wikimedia Foundation announce Wikipedia Zero &lt;/a&gt; (by Dr. U.B.Pavanaja, Prajavani, July 3, 2014). As per this, users of Aircel need not pay for data for accessing Wikipedia. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/article-on-akruti-unicode-converter-in-samaja"&gt;ଇଣ୍ଟରନେଟରେ ଓଡ଼ିଆ ଅକ୍ଷରସଜ୍ଜା&lt;/a&gt; (by Subhashish Panigrahi, Samaja, July 4, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/state-of-odia-language-in-computing-and-future-steps"&gt; State of Odia Language in Computing and Future Steps &lt;/a&gt; (by Subhashish Panigrahi, Sovereign, July 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/sambad-july-21-2014-paths-for-development-of-odia-language"&gt;ଓଡ଼ିଆ ଭାଷା ବିକାଶର ରାସ୍ତା&lt;/a&gt; (by Subhashish Panigrahi, The Sambad, July 23, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/university-of-mysore-releases-kannada-vishwakosha-under-cc-license"&gt; University of Mysore Re-releases Kannada Vishwakosha (Encyclopaedia) under Creative Commons Free License &lt;/a&gt; (by Dr. U.B.Pavanaja, July 24, 2014). Leading English and Kannada dailies like Andolana Kannada, City Today, Deccan Herald, Hosa Diganta, Kannada Jana         Mana, Kannada Prabha, Rajya Dharma, Samyukta Karnataka, The Hindu, The New Indian Express, Udayavani, Vijaya Karnataka, and Vijaya Vani published about this. Scanned versions of the published articles can be        &lt;a href="https://cis-india.org/openness/blog/open-knowledge-day-mysore-media-coverage-zip"&gt;downloaded here&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/wikimedia-blog-dorothy-howard-wiki-loves-pride-2014-and-adding-diversity-to-wikipedia"&gt; Wiki Loves Pride 2014 and Adding Diversity to Wikipedia &lt;/a&gt; (by Dorothy Howard, Wikimedia Blog, July 25, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/global-voices-subhashish-panigrahi-july-27-2014-doctors-and-translators-are-working-together-to-bridge-wikipedias-medical-language-gap"&gt; Doctors and Translators Are Working Together to Bridge Wikipedia's Medical Language Gap &lt;/a&gt; (by Subhashish Panigrahi, Global Voices, July 27, 2014). This was re-published on the Wikimedia Blog, July 30, 2014. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/odisha-review-june-2014-classical-odia-language-in-digital-age"&gt; Classical Odia Language in the Digital Age &lt;/a&gt; (by Subhashish Panigrahi, Odisha Review, posted on July 28, 2014). The essay was published in the magazine’s June edition. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/events/open-knowledge-day-mysore"&gt;Open Knowledge Day&lt;/a&gt; (co-organized by Mysore University and CIS-A2K, Kuvempu Institute of Kannada Studies, University of Mysore, July 15, 2014). The event coincided with         the Open Knowledge Festival in Berlin from July 15 to 17. Dr. U.B.Pavanaja conducted the event. On this occasion Mysore University released six volumes         of Kannada Vishwakosha under the Creative Commons (CC) license. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/state-of-odia-language-in-computing-and-future-steps"&gt;&lt;b&gt; &lt;/b&gt;National Level Seminar on Computer Application and Odia Language &lt;/a&gt; (organized by Institute of Odia Studies and Research, July 6, 2014). Subhashish Panigrahi was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/ok-festival-2014"&gt;Open Knowledge Festival 2014&lt;/a&gt; (organized by Google, Omidyar, et.al., Berlin, July 15 – 17, 2014). Subhashish Panigrahi represented India as the India Ambassador of OpenGLAM local         and &lt;a href="https://cis-india.org/openness/blog/ok-festival.pdf"&gt;made a presentation&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/nama-the-future-of-indic-languages"&gt;#NAMA: The Future of Indic Languages&lt;/a&gt; (organized by Medianama, The Oberoi Hotel, Bangalore, July 24, 2014). Subhashish Panigrahi participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage     &lt;br /&gt; &lt;/b&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-july-7-2014-renuka-phadnis-wikipedia-edit-a-thons-to-add-content-on-lgbts"&gt; Wikipedia edit-a-thons to add content on LGBTs &lt;/a&gt; (by Renuka Phadnis, The Hindu, July 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-telegraph-july-7-2014-bibhuti-barik-font-problem-hits-odia"&gt;Font problem hits Odia&lt;/a&gt; (by Bibhuti Barik, The Telegraph, July 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-july-12-2014-r-krishna-kumar-four-volumes-of-kannada-encyclopaedia-digitised"&gt; Four volumes of Kannada Encyclopaedia digitised &lt;/a&gt; (by R. Krishna Kumar, The Hindu, July 12, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/prajavani-july-14-2014-four-volumes-of-kannada-encyclopaedia-digitised"&gt; ‘ಕನ್ನಡ ವಿಶ್ವಕೋಶ’ಕ್ಕೆ ಇನ್ನು ಲೈಸೆನ್ಸ್ ಹಂಗಿಲ್ಲ &lt;/a&gt; (Prajavani, July 14, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-july-15-2014-r-krishna-kumar-soon-all-14-volumes-of-kannada-encyclopaedia-to-be-online"&gt; Soon, all 14 volumes of Kannada encyclopaedia to be online &lt;/a&gt; (by R. Krishna Kumar, The Hindu, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/kannada-prabha-july-15-2014-coverage-of-open-knowledge-day"&gt;ವಿಕಿಪಿಡಿಯಾಗೆ ಕನ್ನಡ ವಿಶ್ವಕೋಶ&lt;/a&gt; (Kannada Prabha, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/udayavani-july-15-2014-mysore-university-event-coverage-in-udayavani"&gt;ಕನ್ನಡ ವಿಶ್ವಕೋಶದ ಆರು ಸಂಪುಟ ವಿಕಿಪೀಡಿಯಾಗೆ&lt;/a&gt; (Udayavani, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/just-kannada-july-15-2014-wikipedia-kannada-vishwakosha-mysore-university-free-internet-kannada-department"&gt; ವಿಕಿಪೀಡಿಯಾದಲ್ಲಿ kannada ವಿಶ್ವಕೋಶ : ಈಗ ಆನ್ ಲೈನ್ ನಲ್ಲಿ 6 ಸಂಪುಟಗಳು ಮುಕ್ತ…ಮುಕ್ತ……( &lt;/a&gt; Just Kannada, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/web-india-123-july-15-2014-six-kannada-encyclopaedias-released"&gt;Six Kannada encyclopaedias released&lt;/a&gt; (Webindia 123, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/new-indian-express-july-15-2014-anila-backer-150-rare-books-get-new-lease-of-life-online-courtesy-students"&gt; 150 Rare Books Get New Lease of Life Online, Courtesy Students &lt;/a&gt; (by Anila Backer, New Indian Express, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/spicy-ip-swaraj-paul-barooah-july-15-2014-open-access-students-help-revive-and-digitize-rare-books-for-malayalam-wiki-library"&gt; Open Access: Students help revive and digitize rare books for Malayalam Wiki Library &lt;/a&gt; (Spicy IP, July 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-narayan-lakshman-july-25-2014-trolled-from-us-congress-wikipedia-bans-edits"&gt; 'Trolled' from US Congress, Wikipedia bans edits &lt;/a&gt; (by Narayan Lakshman, The Hindu, July 25, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-july-27-2014-renuka-phadnis-telugu-wikipedia-struggles-to-stay-afloat"&gt; Telugu Wikipedia struggles to stay afloat &lt;/a&gt; (by Renuka Phadnis, The Hindu, July 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/new-indian-express-july-29-2014-svetlana-lasrado"&gt;The joys of being a Wikipedian&lt;/a&gt; (by Svetlana Lasrado, New Indian Express, July 29, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/kannada-wikipedia-presentation-vijayavani-coverage"&gt;Kannada Wikipedia Presentation&lt;/a&gt; (Vijayavani, July 30, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/kannada-wikipedia-presentation-prajavani-coverage"&gt;Kannada Wikipedia Presentation for Kannada Science Writers&lt;/a&gt; (Prajavani, July 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/mozilla-brings-indian-communities-together-twice-in-one-month"&gt;&lt;b&gt; &lt;/b&gt;Mozilla brings Indian Communities together Twice in One Month &lt;/a&gt; (by Subhashish Panigrahi, Mozilla Website, July 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/mozilla-brings-indian-communities-together"&gt;Mozilla Brings Indian Communities Together&lt;/a&gt; (by Subhashish Panigrahi, Opensource.com, July 13, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/department-of-biotechnology-and-department-of-science-ministry-of-science-and-technology-government-of-india-release-open-access-policy"&gt; Department of Biotechnology and Department of Science, Ministry of Science and Technology, Government of India, release Open Access Policy &lt;/a&gt; (by Anubha Sinha, July 18, 2014). We have also been &lt;a href="http://dbtindia.nic.in/docs/DST-DBT_Draft.pdf"&gt;acknowledged in the policy&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HasGeek Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/news/the-fifth-elephant"&gt;The Fifth Elephant&lt;/a&gt; (NIMHANS Convention Centre, July 25-26, 2014). CIS was a community outreach partner. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/news/the-hindu-july-22-2014-renuka-phadnis-plan-for-open-access-to-science-research"&gt;&lt;b&gt; &lt;/b&gt;Plan for open access to science research &lt;/a&gt; (by Renuka Phadnis, The Hindu, July 22, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/medianama-july-23-2014-riddhi-mukherjee-indian-govt-looks-to-provide-free-access-to-public-funded-research-works"&gt; Indian Govt looks to provide free access to publicly-funded research works &lt;/a&gt; (by Riddhi Mukherjee, Medianama, July 23, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------     &lt;br /&gt; &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; -----------------------------------------------&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Freedom of Expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on Freedom of Expression (funded through a grant from the MacArthur Foundation) to study the restrictions placed on freedom of     expression online by the Indian government and contribute to the debates around Internet governance and freedom of expression at forums like ICANN, ITU,     IGF, WSIS, etc., we bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/icann2019s-documentary-information-disclosure-policy-2013-i-didp-basics"&gt;&lt;b&gt; &lt;/b&gt;ICANN’s Documentary Information Disclosure Policy – I: DIDP Basics &lt;/a&gt; (by Vinayak Mithal, July 1, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights"&gt; Reading the Fine Script: Service Providers, Terms and Conditions and Consumer Rights &lt;/a&gt; (by Jyoti Panday, July 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech"&gt; Facebook and its Aversion to Anonymous and Pseudonymous Speech &lt;/a&gt; (by Jessamine Mathew, July 4, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt;Free Speech and Surveillance&lt;/a&gt; (by Gautam Bhatia, July 7, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"&gt; Delhi High Court Orders Blocking of Websites after Sony Complains Infringement of 2014 FIFA World Cup Telecast Rights &lt;/a&gt; (by Anubha Sinha, July 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/gni-and-iamai-launch-interactive-slideshow-exploring-impact-of-indias-internet-laws"&gt; GNI and IAMAI Launch Interactive Slideshow Exploring Impact of India's Internet Laws &lt;/a&gt; (by Jyoti Panday, July 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FOEX Live&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are also posting a selection of news from across India implicating online freedom of expression and use of digital technology:    &lt;a href="https://cis-india.org/internet-governance/blog/foex-live"&gt;July 7, 2014&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in     enhancing respect for the right to privacy in developing countries. We have produced the following outputs during the month:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt;&lt;b&gt; &lt;/b&gt;Models for Surveillance and Interception of Communications Worldwide &lt;/a&gt; (by Bedavyasa Mohanty, July 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications &lt;/a&gt; (by Bedavyasa Mohanty, July 4, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; UK’s Interception of Communications Commissioner — A Model of Accountability &lt;/a&gt; (by Joe Sheehan, July 24, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai"&gt;First Privacy and Surveillance Roundtable&lt;/a&gt; (by Anandini K Rathore, July 18, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt;&lt;b&gt; &lt;/b&gt;Private Censorship and the Right to Hear &lt;/a&gt; (by Chinmayi Arun, The Hoot, July 17, 2014). The article was also mirrored on the        &lt;a href="http://ccgnludelhi.wordpress.com/"&gt;website of the Centre for Communication Governance&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/news/information-influx-conference"&gt;Information Influx Conference&lt;/a&gt; (organized by the Institute for Information Law, University of Amsterdam, July 2 – 4, 2014). Malavika Jayaram was a speaker. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011"&gt; Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011 &lt;/a&gt; (organized by National Campaign for People's Right to Information and Centre for Communication Governance, National Law University, New Delhi, July 5,         2014). Bhairav Acharya participated in the event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/best-practices-meet-2014"&gt;Best Practices Meet&lt;/a&gt; (organized by DSCI, Hotel Leela Palace, Bangalore, July 9, 2014). Sunil Abraham was a panelist. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/rethinking-privacy"&gt; Rethinking Privacy: The Link between Florida v. Jardines and the Surveillance of Nature Films &lt;/a&gt; (organized by Indian Institute of Technology, Madras, July 11, 2014). Bhairav Acharya gave a talk. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/region-as-frame-politics-presence-practice"&gt;Region as Frame: Politics, Presence, Practice&lt;/a&gt; (organized by International Association for Media and Communication Research, Hyderabad, July 18, 2014). Sunil Abraham was a speaker for these panels:         Governing Digital Spaces: Issues of Access, Privacy and Freedom, UNESCO panel debate, and Special Session on Research Paths In and Outside of the         Academy. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/ict-awareness-program-for-myanmar-parliamentarians-yangon"&gt;ICT Awareness Program for Myanmar Parliamentarians&lt;/a&gt; (organized by Myanmar ICT for Development Organization, July 26 – 27, 2014, Yangon). Sunil Abraham participated in the event as a speaker and presented         on Innovation Ecosystem and Thinking about Internet Regulation. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------------     &lt;br /&gt; &lt;a href="https://cis-india.org/news"&gt; &lt;b&gt;News &amp;amp; Media Coverage &lt;/b&gt;&lt;br /&gt; &lt;/a&gt; --------------------------------------&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year"&gt; Cyber-crimes shoot up 52% in India over last year &lt;/a&gt; (by K.V.Kurmanath, Hindu Businessline, July 2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues"&gt; COAI, Centre for Internet &amp;amp; Society to hold pan-India meetings on privacy issues &lt;/a&gt; (IANS, July 4, 2014). The news was mirrored in the         &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/COAI-Centre-for-Internet-Society-to-discuss-privacy-issues/articleshow/37776268.cms"&gt; Times of India &lt;/a&gt; , &lt;a href="http://gadgets.ndtv.com/telecom/news/coai-cis-to-discuss-legal-framework-for-voice-and-data-surveillance-553074"&gt;NDTV&lt;/a&gt;,         &lt;a href="http://www.business-standard.com/article/news-ians/coai-centre-for-internet-society-to-hold-pan-india-meetings-on-privacy-issues-114070400654_1.html"&gt; Business Standard &lt;/a&gt; ,         &lt;a href="http://telecom.economictimes.indiatimes.com/news/corporate/industry/coai-centre-for-internet-society-to-discuss-privacy-issues/37776714"&gt; Economic Times &lt;/a&gt; , and &lt;a href="http://article.wn.com/view/2014/07/04/COAI_Centre_for_Internet_Society_to_hold_panIndia_meetings_o/"&gt;World News&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl"&gt;Living in a Fish Bowl&lt;/a&gt; (by Shuma Raha, The Telegraph, July 16, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"&gt; Terror recruiters target Indians on internet &lt;/a&gt; (by Sandhya Soman, July 18, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"&gt;The trouble with trolls&lt;/a&gt; (by Vishal Mathur, Livemint, July 22, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/news/search-security-july-28-2014-harichandan-arakali-indias-dedicated-cryptology-centre-gets-funding"&gt; India’s dedicated Cryptology centre gets Rs. 115 crore funding &lt;/a&gt; (by Harichandan Arakali, SearchSecurity.in, July 28, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Cyber Stewards     &lt;br /&gt; As part of its project on mapping cyber security actors in South Asia and South East Asia with the Citizen Lab, Munk School of Global Affairs, University     of Toronto and the International Development Research Centre, Canada, CIS conducted 2 new interviews. With this it has finished a total of 19 interviews:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Video Interviews     &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither"&gt;Lobsang Gyatso Sither&lt;/a&gt; (July 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-19-2013-lobsang-sangay"&gt;Lobsang Sangay&lt;/a&gt; (July 31, 2014).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------     &lt;br /&gt; &lt;b&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; --------------------------------     &lt;br /&gt; CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social     sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new     conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Peer Reviewed Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/routledge-inter-asia-cultural-studies-volume-15-issue-2-nishant-shah-asia-in-the-edges"&gt;&lt;b&gt; &lt;/b&gt;Asia in the Edges: A Narrative Account of the Inter-Asia Cultural Studies Summer School in Bangalore &lt;/a&gt; (by Nishant Shah, Inter-Asia Cultural Studies Journal, Volume 15, Issue 2, July 3, 2014). This is the narrative account of the experiments and ideas         that shaped the second Summer School, “The Asian Edge” which was hosted in Bangalore, India, in 2012. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/reading-from-a-distance"&gt;Reading from a Distance — Data as Text&lt;/a&gt; (by P.P. Sneha, July 23, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;-----------------------------------------------------     &lt;br /&gt; &lt;b&gt;&lt;a href="https://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; -----------------------------------------------------     &lt;br /&gt; The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy,     accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and     engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us     &lt;br /&gt; Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No.     194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:     &lt;br /&gt; We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at    &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan,     Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding         and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans         Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2014-bulletin'&gt;https://cis-india.org/about/newsletters/july-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2014-08-11T05:46:53Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither">
    <title>CIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither</link>
    <description>
        &lt;b&gt;CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“The digital arms trade and the digital arms race, that is going on right now is a huge problem, in terms of what is happening around the world. A lot of people talk about digital arms like it’s just digital technology; it’s just surveillance technology; it’s just censorship technology; it’s just technology; it doesn’t kill anyone, but the fact of the matter is that it does kill. It’s as bad as a gun; it’s as bad as a weapon. It's the same thing in my opinion and it has to be restricted; it has to be curtailed, it has to be controlled so that it doesn’t go to places where there are no human rights and where there are rampant human rights violations. People know what it is going to be used for and it is going to be used for human rights violations and that is something that has be kept in mind before the whole aspect of digital arms trade and it has to be treated as any other arms trade&lt;/em&gt;.”&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eighteenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Lobsang Gyatso Sither is a Tibetan born in exile dedicated to increasing cybersecurity among Tibetans inside Tibet and in the diasporas. He has helped to develop community-specific technologies and educational content and deploys them via training and public awareness campaigns at the grassroots level. Lobsang works with key communicators and organizations in the Tibetan community, including Voice of Tibet Radio and the Tibetan Centre for Human Rights and Democracy.&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/OtLkgoiTBeo?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-07-31T05:34:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/information-influx-conference">
    <title>Information Influx Conference</title>
    <link>https://cis-india.org/news/information-influx-conference</link>
    <description>
        &lt;b&gt;Malavika Jayaram was a speaker at the event organized by the Institute for Information Law, University of Amsterdam from July 2 to 4, 2014. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the &lt;a class="external-link" href="http://informationinflux.org/wp-content/uploads/2014/05/20140530_Programme_InformationInflux_flyer.pdf"&gt;full details here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;When IViR set up its research 25 years ago, the digital transition was just starting to gather speed. Since then, our societies have been undergoing enormous changes in the modes of expression, organization and (re)use of information. Traditional roles of producers, intermediaries, users and governments blur and are recast. Information is the central building block of market economies. New ways of creating, disseminating and using it impact the workings of democracy, of science and education, creativity and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information Influx will bridge disciplines, regions and institutional perspectives to confront the major challenges of developing the rules that govern the expression, organization and re(use) of information in our society – as the central aspects of IViR’s Research Programme.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wednesday 2 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.00 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information Influx Young Scholars Competition:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.00 – 15.00&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Welcome by Prof. &lt;b&gt;Mireille van Eechoud&lt;/b&gt; &amp;amp; 	&lt;b&gt;Dr. L. Guibault&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Catherine Doldirina&lt;/b&gt; (Joint Research Centre 	EC) – Open data and Earth observations: the case of opening access 	to and use of EO through the Global Earth Observation System of 	Systems&lt;br /&gt;Comments by &lt;b&gt;Prof. Mark Perry&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Jenny Metzdorf&lt;/b&gt; (University of Luxembourg) – 	The implementation of the Audiovisual Media Services Directive by 	national regulatory authorities – National reponses to regulatory 	challenges&lt;br /&gt;Comments by&lt;b&gt; Dr. Tarlach McGonagle&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Harry Halpin&lt;/b&gt; (MIT/W3C) – No Safe Haven: 	The Storage of Data Secrets&lt;br /&gt;Comments by &lt;b&gt;Dr. Philippe 	Aigrain&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.00 – 15.15&lt;/b&gt;&lt;br /&gt;Refreshments break&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.15 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Ellen Wauters&lt;/b&gt; (ICRI – University of 	Leuven) – Social Networking Sites’ Terms of Use: addressing 	imbalances in the user-provider relationship through ex ante and ex 	post mechanisms&lt;br /&gt;Comments by &lt;b&gt;Dr. Chantal Mak&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Nicolo Zingales&lt;/b&gt; (Tilburg University) – 	Virtues and perils of anonymity: should intermediaries bear the 	burden?&lt;br /&gt;Comments by &lt;b&gt;Prof. Joel Reidenberg&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Closing remarks&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.00 – 18.30&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;p&gt;Information Influx public opening:&lt;/p&gt;
&lt;li&gt;
&lt;p&gt;Welcome &lt;b&gt;Louise Gunning-Schepers&lt;/b&gt; (University of Amsterdam), &lt;b&gt;Edgar du Perron&lt;/b&gt; (University of 	Amsterdam) and &lt;b&gt;Bernt Hugenholtz&lt;/b&gt; (Institute for Information 	Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Keynote&lt;/b&gt; – 	Degrees of Freedom: Sketches of a political theory for an age of 	deep uncertainty and persistent imperfection – &lt;b&gt;prof. Yochai 	Benkler&lt;/b&gt; (Harvard Law School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Young Scholars Award ceremony&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;b&gt;Speech by&lt;/b&gt; &lt;b&gt;Neelie Kroes&lt;/b&gt; (Vice-President of the European Commission) – &lt;a href="http://europa.eu/rapid/press-release_SPEECH-14-528_en.htm" target="_blank"&gt;Our 	Single Market is Crying out for Copyright Reform!&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19.00 – 22.00&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;IViR 25th birthday soirée – by invitation&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Thursday 3 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9.00 – 10.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Governance, Function and Form – prof. Deirdre Mulligan (University of California, Berkeley)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As data and technology to wield it become pervasive, privacy protection must take new forms. Traditional models of governance centered on state actors, and human oversight do not scale to today’s challenges. Drawing from several research projects Mulligan suggests that focusing on roles and functions, rather than traditional forms and actors, can assist us in leveraging the potential of a range of human and technical actors towards privacy’s protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10.30 – 12.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel1"&gt;Rights 	in the mix&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel2"&gt;Behavioural 	targeting – If you cannot control it, ban it?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel3"&gt;Tomorrow’s 	news: bright, mutualized and open?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel4"&gt;Filtering away 	Infringement: copyright, Injunctions and the role of ISPs&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12.30 – 13.45&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lunch&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13.45 – 14.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Julian Oliver &amp;amp; Danja Vasiliev&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14.30 – 16.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel5"&gt;Mass-digitization 	and the conundrum of online access&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel6"&gt;The 	algorithmic public: towards a normative framework for automated 	media&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel7"&gt;Accountability 	and the public sector data push&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel8"&gt;A new 	governance model for communications security?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.00 – 18.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Copyright as Innovation Policy – Fred von Lohmann (Google)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Copyright has historically been concerned with encouraging commercial cultural production. Thanks to digital technology, however, copyright law today finds itself called upon to take on additional unfamiliar roles, including fostering technological innovation and encouraging amateur creative expression. The talk will suggest some ways that copyright can successfully grow into these new roles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19.00 – 22.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conference Dinner&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Friday 4 July&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9.00 – 10.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Datafication, dataism and dataveillance – prof. José van Dijck (University of Amsterdam)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The popularization of datafication as a neutral paradigm is carried by a widespread belief  and supported by institutional guardians of trust. That notion of trust becomes problematic when it leads to dataveillance by a number of institutions that handle people’s (meta)data. The interlocking of government, business, and academia in the adaptation of this ideology (“dataism”) prompts us to look more critically at the entire ecosystem of connective media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10.30 – 12.30&lt;/b&gt;&lt;br /&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel9"&gt;Global 	information flows and the nation state&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel10"&gt;United 	in diversity – the future of the public mission&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel11"&gt;Legalizing 	file-sharing: an idea whose time has come – or gone?&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12.30 – 14.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Buffet Lunch, plus: Brown bag lunch with &lt;b&gt;Rob Frieden&lt;/b&gt; – Net Neutrality: One step beyond&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14.00 – 15.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Keynote – Intellectual Property: Two Pasts and A Future – prof. James Boyle (Duke Law School)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twenty years from now, will our children look up from their digital devices and ask “Daddy, did anyone ever own a book”? In his keynote speech, James Boyle will trace the past lives of intellectual property, the battles fought, the technologies regulated. Can we find hints of the future in the battles of our past? Boyle’s answer is yes, and that answer should give us pause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15.30 – 17.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parallel sessions:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel12"&gt;Assembly 	(Information.influx)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel13"&gt;Big 	brother is back&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://informationinflux.org/#panel14"&gt;Who owns the 	World Cup? The case for and against property rights in sports events&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.30 – 18.30&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Farewell drinks&lt;/p&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;Parallel sessions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rights in the mix&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among amateur and professional creators alike there is a manifest need to not only share but also remix existing works. The panel discusses how adequately open content licensing systems support these needs. It also looks to how well this licensing system fits in the wider legal framework.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Séverine 	Dusollier (University of Namur) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Paul Keller (Kennisland)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Daniel Gervais (Vanderbilt 	Law School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Volker Grassmuck (Lüneburg University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Behavioural targeting – If you cannot control it, ban it?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion about the potential pitfalls of behavioural targeting practices and the problems it may create for users and user rights continues in full force. The growing evidence of the ineffectiveness of the existing informed-consent-approach to regulation can no longer be ignored. Is it time for the regulator to move to more drastic means and ban certain behavioural targeting practices, and if so, which practices?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Chris Hoofnagle (University 	of California, Berkeley) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Neil Richards (Washington 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Frederik Borgesius (Institute for 	Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Joseph Turow (University of 	Pennsylvania)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Mireille Hildebrandt 	(University of Nijmegen)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Tal Zarsky (University of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tomorrow’s news: bright, mutualized and open? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As public debate becomes more diversified, crowded, interactive, noisy and technology-dependent than ever before, what survival strategies are being devised for the news as we know it? Are existing expressive and communicative rights, and related duties and responsibilities, fit-for-purpose in increasingly digitized and networked democratic societies? Will tomorrow’s news still be worth tuning into?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;dr. Tarlach McGonagle (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Susanne Nikoltchev (European 	Audiovisual Observatory)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Aidan White (Ethical Journalism 	Network)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Luís Santos (University of 	Minho)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Eugenia Siapera (Dublin City 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Gillian Phillips (The Guardian)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Filtering away infringement: copyright, injunctions and the role of ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Can technology solve the problem of intermediary liability for online copyright infringement? If so, should technology be allowed to determine law? This panel shall focus on the issue of injunctions imposed on online intermediaries to force them to adopt measures that filter or block copyright infringements by third parties on their websites.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Dirk Visser (University of 	Leiden)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remy Chavannes (Brinkhof)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fred von Lohmann (Google)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sir Richard Arnold (High Court UK)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Niva Elkin-Koren (University 	of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Reto Hilty (Max Planck Institute)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass-digitization and the conundrum of online access&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cultural heritage institutions face difficulties providing online access to digitized materials in their collections. This session examines a number of pressing issues, taking a trans-Atlantic perspective.  When does digitization in public-private partnerships pose a threat to access to public domain materials? What ways are there to manage rights clearance of copyrighted materials and deal with territoriality?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Martin Senftleben (VU 	University Amsterdam) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Pamela Samuelson (University 	of California, Berkeley)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Elisabeth Niggemann (Deutsche 	Nationalbibliothek)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Martin Kretschmer (Glasgow University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The algorithmic public: towards a normative framework for automated media&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the online media, decisions about what users get to see (or not to see) are increasingly automated, through the use of smart algorithms and extensive data about users’ preferences and online behaviour. This raises a number of fundamental questions about freedom of expression, editorial integrity and user autonomy. Leading thinkers will debate algorithmic decision-making in online media and explore the contours of a much needed normative framework for automated media.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Natali Helberger (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Joris van Hoboken (New York 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Wolfgang Schulz 	(Hans-Bredow-Institut)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Niva Elkin-Koren (University 	of Haifa)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Bernhard Rieder (University of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Accountability and the public sector data push&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initiatives to make governments more ‘transparent’ abound. Freedom of information laws are reconfigured to push out ever more information to citizens and businesses. Promises of benefits abound too: better accountability and increased participation, as well as efficiency gains and new business opportunities. Can and should the next generation of freedom of information laws serve both political-democratic objectives and economic ones?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Mireille van Eechoud 	(Institute for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Chris Taggart (Open Corporates)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Helen Darbishire (Access Info)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Deirdre Curtin (University 	of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Ben Worthy (Birkbeck 	University College London)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Jonathan Gray (Open Knowledge Foundation / University of 	London)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A new governance model for communications security?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, the vulnerable state of electronic communications security dominates headlines across the globe, while money and power increasingly permeate the policy arena. 2013 has seen no less than five sweeping legislative initiatives in the E.U., while the U.S. seems to trust in the market to deliver. Amidst these diverging approaches, how should communications security be regulated?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Axel Arnbak (Institute for 	Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Deirdre Mulligan (University 	of California, Berkeley)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Ian Brown (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Michel van Eeten (Delft 	university of technology)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Amelia Andersdotter (European 	Parliament)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ashkan Soltani (independent researcher)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Global information flows and the nation state&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information flows contest the physical spaces in which the nation state has been deemed a sovereign for almost five centuries. This tension dominates nearly all areas of information law, from data protection and IP enforcement to mass surveillance by national intelligence agencies. This session reflects on the broader challenges that territoriality presents for information law today.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Urs Gasser (Harvard) 	(moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Joel Reidenberg (Fordham Law 	School)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Graeme Dinwoodie (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Malavika Jayaram (Harvard)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Hielke Hijmans (Vrije Universiteit Brussel)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;United in diversity – the future of the public mission&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital technologies and the information economy create fascinating new opportunities but also pose fundamental challenges to the fulfilment of the public mission of the media, public archives and libraries alike. This panel is a step towards establishing a dialogue between the three institutions: to explore the congruence between their missions, and their responses to critical issues such as technological convergence, the changing habits of users, the growing abundance of content and their relationship to new information intermediaries, such as search engines, social networks or content platforms.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Natali Helberger (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Klaus Schönbach (University 	of Vienna)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Frank Huysmans (University 	of Amsterdam)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Egbert Dommering (Institute 	for Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Maarten Brinkerink (Netherlands 	Institute for Sound and Vision)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Richard Burnley (European Broadcasting Union)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legalizing file-sharing: an idea whose time has come – or gone?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alternative compensation systems are designed to legalize and monetize online copyright restricted acts of distributing and consuming content. Empirical evidence shows that end-users strongly support paying flat-rate fees for the ability to legally download and share content. So what prevents us from introducing such schemes? The group of experts convened debates the future of alternative compensation systems in light of current legal, business and technology trends.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Neil Netanel (University of 	California, Los Angeles)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Alexander Peukert 	(University of Frankfurt)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Philippe Aigrain (Quadrature 	du Net)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Séverine Dusollier (University of Namur)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Assembly (Information influx)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking legal cases and controversies involving intellectual property, art collective Agency composes a growing list of “Things” that resist the split between “nature” and “culture”, a split that intellectual property relies upon. From the list of over a 1,000 Things, Agency calls forth Thing 002094, the copyright controversy Être et Avoir, to jointly speculate upon. The purpose is less to re-enact the judgment and more to prolong hesitation.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Agency&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Severine Dusollier&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Wilco Kalff&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Sanne Rovers&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Margot van de Linde&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Arnisa Zeqo&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Big brother is back&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate about the pervasive surveillance of the online environment is roaring. Considering what we know now, what better metaphor is there than to conclude that we live in the world of Big Brother? This session will bring together leading thinkers and doers related to power and control in the communication environment, who will provide critical input on the way we think and speak about information freedom and control. Should we aspire to tame Big Brother or should we think differently about the problem?&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Axel Arnbak (Institute for 	Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Joris van Hoboken (New York 	University) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;John McGrath (National Theatre of 	Wales)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;dr. Seda Gürses (New York 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Hans de Zwart (Bits of Freedom)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who owns the World Cup? The case for and against property rights in sports events&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sports have important economic, social and cultural dimensions. What is the optimal form of legal protection of sports events considering the public-private nature of sports? The focus of debate will be on football because of its major relevance in Europe in terms of diffusion, commercial exploitation, and social impact; but we can expect many insights to hold true for other sports as well.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;prof. Bernt Hugenholtz (Institute 	for Information Law) (moderator)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Lionel Bently (University of 	Cambridge)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Dirk Voorhoof (Ghent 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Peter Jaszi (American 	University Washington)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Graeme Dinwoodie (Oxford 	University)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Egbert Dommering (Institute 	for Information Law)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;prof. Alan Bairner (Loughborough University)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;Associated events&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Invitation only&lt;/b&gt;:&lt;br /&gt;Wednesday 2 July: Big Breakfast with &lt;b&gt;Joseph Turow&lt;/b&gt; &amp;amp; &lt;b&gt;Tal Zarksy&lt;/b&gt; – Ethical, normative, social and cultural implications of profiling &amp;amp; targeting in an era of big data – towards a research agenda, Institute for Information Law (IViR) &amp;amp; Amsterdam School of Communication Research (ASCoR), East India House, room E0.02, 09.00-12.00 a.m.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Public event:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Friday 4 July: Lecture &lt;b&gt;James Boyle&lt;/b&gt; &amp;amp; &lt;b&gt;Marjan Hammersma about cultural heritage and the public domain&lt;br /&gt;&lt;/b&gt;More information and registration at:&lt;br /&gt;&lt;a href="https://news.rijksmuseum.nl/2/3fde87960331d4d6027365f23775a21213f3b7240794a3874320c261e5164567e2c4a28236f2500097115073023" target="_blank"&gt;Cultural heritage institutions as guardians of public domain works in the digital environment&lt;/a&gt;, Rijksmuseum &amp;amp; Kennisland in cooperation with IViR, Rijksmuseum Auditorium, 18.00-20.00 p.m.&lt;/p&gt;
&lt;h2 class="western" style="text-align: justify; "&gt;About IViR&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Institute for Information Law (IViR) is a centre of excellence in academic research which consistently seeks to further our understanding of how legal norms reflect and shape the creation, dissemination and use of information in our societies. That is the ambition at the heart of the many research initiatives IVIR has undertaken since its foundation in 1989. The urgency of taking an interdisciplinary and international approach has only grown in the past decades. It is crucial if we want to understand and evaluate the rapidly evolving complex and myriad legal norms that govern information relations in markets, in social and in political spaces. With over &lt;a href="http://www.ivir.nl/staff/overview.html" target="_blank"&gt;30 researchers, teachers and support staff&lt;/a&gt; based in our &lt;a href="http://www.ivir.nl/about.html" target="_blank"&gt;offices &lt;/a&gt;in the historic centre of Amsterdam, we have the critical mass to broach key regulatory challenges of today’s information society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our focus on information relations deliberately cuts across traditional boundaries in legal scholarship. We bring together insights from constitutional law, human rights, public administration, intellectual property, contract and property law, and competition law. Our functional approach enables fruitful collaboration with experts from an array of academic disciplines, in information and communications technology, economics, media studies, political science and the arts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Continuing a long Dutch tradition of openness towards the world, our work has a strong international orientation. It shows in the topics we study, the strong global network of affiliations we have in academia and the wonderful dynamic mix of upcoming and experienced researchers from all over Europe and beyond that make up IViR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With each consecutive research programme we prioritize legal developments that fascinate us, and translate them into a variety of research projects. This includes doctoral research, research for policymakers at national, European and international level, and projects funded through national and European research grant programmes. Our current research programme and an overview of research projects can be found &lt;a href="http://www.ivir.nl/research/overview.html" target="_blank"&gt;here&lt;/a&gt;. Doctoral dissertations, journal articles, books, case comments, studies, reports, lectures, debates, workshops, conferences and summer schools are the staple means of communicating what we do. Browse our publications &lt;a href="http://www.ivir.nl/publications/overview.html" target="_blank"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media reports and conference outputs will be posted on the &lt;a href="http://www.ivir.nl/influx.html" target="_blank"&gt;IViR website&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/information-influx-conference'&gt;https://cis-india.org/news/information-influx-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T06:31:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability">
    <title>UK’s Interception of Communications Commissioner — A Model of Accountability</title>
    <link>https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability</link>
    <description>
        &lt;b&gt;The United Kingdom maintains sophisticated electronic surveillance operations through a number of government agencies, ranging from military intelligence organizations to police departments to tax collection agencies. However, all of this surveillance is governed by one set of national laws outlining specifically what surveillance agencies can and cannot do.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The primary law that governs government investigations is the Regulation of Investigatory Powers Act 2000, abbreviated as RIPA 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To ensure that this law is being followed and surveillance operations in the United Kingdom are not conducted illegally, the RIPA 2000 Part I establishes an Interception of Communications Commissioner, who is tasked with inspecting the surveillance operations, assessing their legality, and compiling an annual &lt;a href="http://www.iocco-uk.info/docs/2013%20Annual%20Report%20of%20the%20IOCC%20Accessible%20Version.pdf"&gt;report&lt;/a&gt; to for the Prime Minister.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 8, 2014 the current Commissioner, Rt Hon. Sir Anthony May, laid the 2013 annual report before the House of Commons and the Scottish Parliament. In its introduction, the report notes that it is responding to concerns raised as a result of Edward Snowden’s actions, especially misuse of powers by intelligence agencies and invasion of privacy. The report also acknowledges that the laws governing surveillance, and particularly RIPA 2000, are difficult for the average citizen to understand, so the report includes a narrative outline of relevant provisions in an attempt to make the legislation clear and accessible. However, the report points out that while the Commissioner had complete access to any documents or investigative records necessary to construct the report, the Commissioner was unable to publish surveillance details indiscriminately, due to confidentiality concerns in a report being issued to the public. (It is worth noting here that though the Commissioner is one man, he has an entire agency working under him, so it is possible that he himself did not do or write all of that the report attributes to him). As a whole, the report outlines a series of thorough audits of surveillance operations, and reveals that the overwhelming majority of surveillance in the UK is conducted entirely legally, and that the small minority of incorrectly conducted surveillance appears to be unintentional. Looking beyond the borders of the United Kingdom, the report represents a powerful model of a government initiative to ensure transparency in surveillance efforts across the globe.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Role of the Commissioner&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report begins in the first person, by outlining the role of the Commissioner. May’s role, he writes, is primarily to audit the interception of data, both to satisfy his own curiosity and to prepare a report for the Prime Minister. Thus, his primary responsibility is to review the lawfulness of surveillance actions, and to that end, his organization possesses considerable investigative powers. He is also tasked with ensuring that prisons are legally administrated, though he makes this duty an afterthought in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Everyone associated with surveillance or interception in the government must disclose whatever the commissioner asks for. In short, he seems well equipped to carry out his work. The Commissioner has a budget of £1,101,000, almost all of which, £948,000 is dedicated to staff salaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report directly addresses questions about the Commissioner’s ability to carry out his duties. Does the Commissioner have full access to whatever materials or data it needs to conduct its investigations, the report asks, and it answers bluntly, yes. It is likely, the report concludes, that the Commissioner also has sufficient resources to adequately carry out his duties. Yes, the Commissioner is fully independent from other government interests; the commissioner answers his own question. Finally, the report asks if the Commissioner should be more open in his reports to the public about surveillance, and he responds that the sensitivity of the material prohibits him from disclosing more, but that the report adequately addresses public concern regardless. There is a degree to which this question and answer routine seems self-congratulatory, but it is good to see that the Commissioner is considering these questions as he carries out his duties.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Interception of Communications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report first goes into detail about the Commissioner’s audits of communications interception operations, where interception means wiretapping or reading the actual content of text messages, emails, or other communications, as opposed to the metadata associated with communications, such as timestamps and numbers contacted. In this section, the report outlines the steps necessary to conduct an interception, outlining that an interception requires a warrant, and only a Secretary of State (one of five officials) can authorize an interception warrant. Moreover, the only people who can apply for such warrants are the directors of various intelligence, police, and revenue agencies. In practice, the Secretaries of State have senior staff that read warrant applications and present those they deem worthy to the Secretary for his or her signature, as their personal signature is required for authorization.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a warrant to be granted, it must meet a number of criteria. First, interception warrants must be &lt;i&gt;necessary&lt;/i&gt; in the interests of national security, to prevent or detect serious crime, or to safeguard economic wellbeing of the UK. Additionally, a warrant can be granted if it is necessary for similar reasons in other countries with mutual assistance agreements with the UK. Warrants must be &lt;i&gt;proportionate &lt;/i&gt;to the ends sought. Finally, interception warrants for communications inside the UK must specify either a person or a location where the interception will take place. Warrants for communications outside of the UK require no such specificity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, 2760 interception warrants were authorized, 19% fewer warrants than in 2012. The Commissioner inspected 26 different agencies and examined 600 different warrants throughout 2013. He gave inspected agencies a report on his findings after each inspection, so they could see whether or not they were following the law. He concluded that the agencies that undertake interception “do so lawfully, conscientiously, effectively, and in our national interest.” Thus, all warrants adequately meet the application and authorization requirements outlined in RIPA 2000.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Communications Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to discuss communications data collection, where communications data refers to metadata–not the content of the communications itself, but data associated with it, such as call durations, or a list of email recipients. The Commissioner explains that metadata is easier to obtain than an interception warrant. Designated officials in their respective surveillance organization read and grant metadata warrant applications, instead of one of the Secretaries of State who could grant interception warrants. Additionally, the requirements for a metadata warrant are looser than for interception warrants. Metadata warrants must still be necessary, but necessary for a broader range of causes, ranging from collecting taxes, protecting public health, or for &lt;i&gt;any&lt;/i&gt; purpose specified by a Secretary of State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relative ease of obtaining a metadata warrant is consistent with a higher number of warrants approved. In 2013, 514,608 metadata warrants were authorized, down from 570,135 in 2012. Local law enforcement applied for 87.5% of those warrants while intelligence agencies accounted for 11.5%. Only a small minority of requests was sent from the revenue office or other departments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of these warrants were similarly concentrated. 76.9% of metadata warrants were issued for prevention or detection of crime. Protecting national security justified 11.4% of warrants and another 11.4% of warrants were issued to prevent death or injury. 0.2% of warrants were to identify people who had died or otherwise couldn’t identify themselves, 0.11% of warrants were issued to protect the economic wellbeing of the United Kingdom, and 0.02% of warrants were associated with tax collection. The Commissioner identified less than 0.01% of warrants as being issued in a miscarriage of justice, a very low proportion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Commissioner inspected metadata surveillance efforts, conducting 75 inspections in 2013, and classified the practices of those operations inspected as good, fair or poor. 4% of operations had poor practices. He noticed two primary errors. The first was that data was occasionally requested on an incorrect communications address, and the second was that he could not verify that some metadata was not being stored past its useful lifetime. May highlighted that RIPA 2000 does not give concrete lengths for which data should be stored, as Section 15(3) states only that data must be deleted “as soon as there are no longer grounds for retaining it as necessary for any of the authorized purposes.”  He noted that he was only concerned because some metadata was being stored for longer periods than associated interception data. As May put it, “I have yet to satisfy myself fully that some of these periods are justified and in those cases I required the agencies to shorten their retention periods or, if not, provide me with more persuasive reasons.” The Commissioner seems determined that this practice will either be eliminated or better justified to him in the near future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Applications&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The United Kingdom’s Interception of Communications Commissioner has similar powers to the Indian Privacy Commissioner suggested by the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report&lt;/a&gt; of the Group of Experts on Privacy.  Similar to the United Kingdom, it is recommended that a Privacy Commissioner in India have investigative powers in the execution of its charter, and that the Privacy Commissioner represent citizen interests, ensuring that data controllers are in line with the stipulated regulations. The Report also broadly states that “with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material, the Commissioner may exercise broad oversight functions.”  In this way, the Report touches upon the need for oversight of surveillance, and suggests that this responsibility may be undertaken by the Privacy Commissioner, but does not clearly place this responsibility with the Privacy Commissioner. This raises the question of if India should adopt a similar model to the United Kingdom – and create a privacy commissioner – responsible primarily for overseeing and enforcing data protection standards, and a separate surveillance commissioner – responsible for overseeing and enforcing standards relating to surveillance measures. When evaluating the different approaches there are a number of considerations that should be kept in mind:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Law enforcement and security agencies are the exception to a number of data protection standards including access and disclosure.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There is a higher level of ‘sensitivity’ around issues relating to surveillance than data protection and each needs to be handled differently. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ‘competence’ required to deliberate on issues related to data protection is different then the ‘competence’ required deliberating on issues related to surveillance.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, this raises the question of whether India needs a separate regulation governing data protection and a separate regulation governing surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Allegations of Wrongdoing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that though May describes surveillance operations conducted in compliance with the law, many other organizations have accused the UK government of abusing their powers and spying on citizens and internet users in illegal ways. The GCHQ, the government’s communications surveillance center has come under particular fire. The organization has been accused indiscriminate spying and introducing malware into citizen’s computers, among other things. Led by the NGO Privacy International, internet service providers around the world have &lt;a href="http://www.theguardian.com/world/2014/jul/02/isp-gchq-mass-surveillance-privacy-court-claim"&gt;recently&lt;/a&gt; lodged complaints against the GCHQ, alleging that it uses malicious software to break into their networks. Many of these &lt;a href="http://www.theguardian.com/uk-news/2014/may/13/gchq-spy-malware-programme-legal-challenge-privacy-international"&gt;complaints&lt;/a&gt; are based on the information brought to light in Edward Snowden’s document leaks. Privacy International alleges that malware distributed by GCHQ enables access to any stored content, logging keystrokes and “the covert and unauthorized photography or recording of the user and those around him,” which they claim is similar to physically searching through someone’s house unbeknownst to them and without permission. They also accuse GCHQ malware of leaving devices open to attacks by others, such as identity thieves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Snowden’s files also indicate a high level of collaboration between GCHQ and the NSA. According to the &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;Guardian&lt;/a&gt;, which analyzed and reported on many of the Snowden files, the NSA has in past years paid GCHQ to conduct surveillance operations through the US program called Prism. Leaked documents &lt;a href="http://www.theguardian.com/uk-news/2013/aug/02/gchq-accused-selling-services-nsa"&gt;report&lt;/a&gt; that the British intelligence agency used Prism to generate 197 intelligence reports in the year to May 2012. Prism is not mentioned at all in the Interception of Communications Commissioner’s report. In fact, while the report’s introduction explains that it will attempt to address details revealed in Snowden’s leaked documents, very little of what those documents indicate is later referenced in the report. May ignores the plethora of accusations of GCHQ wrongdoing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, while May’s tone appears genuine and sincere, the details of his report do little to dispel fears of widespread surveillance. It is unclear whether May is being totally forthcoming in his report, especially when he devotes so little energy to directly responding to concerns raised by Snowden’s leaks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;May wrapped up his report with some reflections on the state of surveillance in the United Kingdom. He concluded that RIPA 2000 protects consumers in an internet age, though small incursions are imaginable, and especially lauds the law for it’s technological neutrality. That is, RIPA 2000 is a strong law because it deals with surveillance in general and not with any specific technologies like telephones or Facebook, use of which changes over time. The Commissioner also was satisfied that powers were not being misused in the United Kingdom. He reported that there have been a small number of unintentional errors, he noted, and some confusion about the duration of data retention. However, any data storage mistakes seemed to stem from an unspecific law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite May’s report of surveillance run by the books, other UK groups have accused GCHQ, the government’s communications surveillance center, of indiscriminate spying and introducing malware into citizen’s computers. &lt;a href="https://www.privacyinternational.org/press-releases/privacy-international-files-legal-challenge-against-uk-government-over-mass"&gt;Privacy International has submitted a claim arguing that a litany of malware is employed by the GCHQ to log detailed personal data such as keystrokes.&lt;/a&gt; The fact that May’s report does little to disprove these claims casts the Commissioner in an uncertain light.  It is unclear whether surveillance is being conducted illegally or, as the report suggests, all surveillance of citizens is being conducted as authorized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, the concept of a transparency report and audit of a nation’s surveillance initiatives report is a step towards government accountability done right, and should serve as a model for enforcement methods in other nations. May’s practice of giving feedback to the organizations he inspects allows them to improve, and the public report he releases serves as a deterrent to illegal surveillance activity. The Interception of Communications Commissioner–provided he reports truthfully and accurately–is what gives the safeguards built into the UK’s interception regime strength and accountability. In other nations looking to establish privacy protections, a similar role would make their surveillance provisions balanced with safeguards and accountability to ensure that the citizens fundamental rights–including the right to privacy–are not compromised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability'&gt;https://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-24T06:08:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai">
    <title>First Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners.  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and Training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of seven proposed roundtable meetings on “Privacy and Surveillance” conducted by the Centre for Internet and Society in collaboration with the Cellular Operators Association of India and the Council for Fair Business Practices was held in Mumbai on the 28th of June, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable’s discussion centered on the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;Draft Privacy Protection Bill&lt;/a&gt; formed by CIS in 2013, which contains provisions on the regulation of interception and surveillance and its implications on individual privacy. Other background documents to the event included the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, and the &lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance.&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background and Context&lt;/h2&gt;
&lt;p&gt;The Chair of the Roundtable began by giving a brief background of Surveillance regulation in India, focusing its scope to primarily telegraphic, postal and electronic surveillance.&lt;/p&gt;
&lt;h3&gt;Why a surveillance regime now?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A move to review the existing privacy laws in India came in the wake of Indo-EU Fair Trade Agreement negotiations; where a Data Adequacy Assessment conducted by European Commission found India’s data protection policies and practices inadequate for India to be granted EU secure status. The EU’s data protection regime is in contrast, fairly strong, governed by the framework of the EU Data Protection Directive, 1995.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to this, the Department of Personnel and Training, which drafted the Right to Information Act of 2005 and the Whistleblower’s Protection Act, 2011 was given the task of forming a Privacy Bill. Although the initial draft of the Bill was made available to the public, as per reports, the Second draft of the Bill has been shared selectively with certain security agencies and not with service providers or the public.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p&gt;The Chair began the discussion by posing certain preliminary questions to the Roundtable:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What should a surveillance law contain and how should it function?&lt;/li&gt;
&lt;li&gt;If the system is warrant based, who would be competent to execute it? &lt;/li&gt;
&lt;li&gt;Can any government department be allowed a surveillance request? &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;A larger question posed was whether the concerns and questions posed above would be irrelevant with the possible enforcement of a Central Monitoring System in the near future? As per reports, the Central Monitoring System would allow the government to intercept communications independently without using service providers and thus, in effect, shielding such information from the public entirely.&lt;/p&gt;
&lt;h2&gt;The CIS Privacy Protection Bill’s Regulatory Mechanism&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the type of regulatory mechanism that a privacy and surveillance regime in India should have in place. The participants did not find favour in either a quasi-judicial body or a self-regulatory system – instead opting for a strict regulatory regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Draft Privacy Protection Bill proposes a regime that consists of a Data Protection Regulation Authority that is similar to the Telecom Regulatory Authority of India, including the provision for an appellate body. The Bill envisions that the Authority will act as an adjudicating body for all complaints relating to the handling of personal data in addition to forming and reviewing rules on personal data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although, the Draft Bill dealt with privacy and surveillance under one regulatory authority, the Chair proposes a division between the two frameworks, as the former is governed primarily by civil law, and the latter is regulated by criminal law and procedure. Though in a &lt;a href="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;2014 leaked version of the governments Privacy Bill,&lt;/a&gt; surveillance and privacy are addressed under one regulation, as per reports, the Department of Personnel and Training is also considering creating two separate regulations: one for data protection and one for surveillance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Authorities in Other Jurisdictions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing the regulatory authorities within other jurisdictions and the procedures followed by them. The focus was largely on the United States and the United Kingdom, which have marked differences in their privacy and surveillance systems. &lt;br /&gt;&lt;br /&gt;In the United Kingdom, for example, a surveillance order is reviewed by an Independent Commissioner followed by an Appellate Tribunal, which has the power to award compensation. In contrast, the United States follows a far less transparent system which governs foreigners and citizens under separate legislations. A secret court was set up under the FISA, an independent review process, however, exists for such orders within this framework.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The Authority for Authorizing Surveillance in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The authority for regulating requests for interceptions of communication under the Draft CIS Privacy Protection Bill is a magistrate. As per the procedure, an authorised officer must approach the Magistrate for approval of a warrant for surveillance. Two participants felt that a Magistrate is not the appropriate authority to regulate surveillance requests as it would mean vesting power in a few people, who are not elected via a democratic process.&lt;br /&gt;&lt;br /&gt;In the present regime, the regulation of interception of telecommunications under Indian Law is governed by the Telegraph Act,1885 and the Telegraph Rules,1951. Section 5(2) of the Act and Rule 419A of the Telegraph Rules, permit interception only after an order of approval from the Home Secretary of the Union Government or of the State Governments, which in urgent cases, can be granted by an officer of the Joint Secretary Level or above of the Ministry of Home Affairs of the Union or that State’s Government. &lt;br /&gt;&lt;br /&gt;Although most participants felt confident that a judicial authority rather than an executive authority would serve as the best platform for regulating surveillance, there was debate on what level of a Magistrate Judge would be apt for receiving and authorizing surveillance requests - or whether the judge should be a Magistrate at all. Certain participants felt that even District Magistrates would not have the competence and knowledge to adjudicate on these matters. The possibility of making High Court Judges the authorities responsible for authorizing surveillance requests was also suggested. To this suggestion participants noted that there are not enough High Court judges for such a system as of now. &lt;br /&gt;&lt;br /&gt;The next issue raised was whether the judges of the surveillance system should be independent or not, and if the orders of the Courts are to be kept secret, would this then compromise the independence of such regulators.  As part of this discussion, questions were raised about the procedures under the Foreign Intelligence Surveillance Act, the US regulation governing the surveillance of foreign individuals, and if such secrecy could be afforded in India. During the discussions, certain stakeholders felt that a system of surveillance regulation in India should be kept secret in the interests of national security. Others highlighted that this is the existing practice in India giving the example of the Intelligence Bureau and Research and Analysis Wing orders which are completely private, adding however, that none of these surveillance regulations in India have provisions on disclosure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;When can interception of communications take place?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The interception of communications under the CIS Privacy Protection Bill is governed by the submission of a report by an authorised officer to a Magistrate who issues a warrant for such surveillance. Under the relevant provision, the threshold for warranting surveillance is suspicious conduct. Several participants felt that the term ‘suspicious conduct’ was too wide and discretionary to justify the interception of communication and suggested a far higher threshold for surveillance. Citing the Amar Singh Case, a participant stated that a good way to ensure ‘raise the bar’ and avoid frivolous interception requests would be to require officers submitting interception request to issue affidavits. A participant suggested that authorising officers could be held responsible for issuing frivolous interception requests. Some participants agreed, but felt that there is a need for a higher and stronger standard for interception before provisions are made for penalising an officer. As part of this discussion, a stakeholder added that the term “person” i.e. the subject of surveillance needed definition within the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion then moved to comparing other jurisdictions’ thresholds on permitting surveillance. The Chair explained here that the US follows the rule of probable cause, which is where a reasonable suspicion exists, coupled with circumstances that could prove such a suspicion true. The UK follows the standard of ‘reasonable suspicion’, a comparatively lesser degree of strength than probable cause. In India, the standard for telephonic interception under the Telegraph Act 1885 is the “occurrence of any public emergency or in the interest of public safety” on the satisfaction of the Home Secretary/Administrative Officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants, while rejecting the standard of ‘suspicious conduct’ and agreeing that a stronger threshold was needed, were unable to offer other possible alternatives.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Multiple warrants, Storing and sharing of Information by Governmental Agencies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The provision for interception in the CIS Privacy Protection Bill stipulates that a request for surveillance should be accompanied by warrants previously issued with respect to that individual. The recovery of prior warrants suggests the sharing of information of surveillance warrants across multiple governmental agencies which certain participants agree, could prevent the duplication of warrants.&lt;br /&gt;&lt;br /&gt;Participants briefly discussed how the Central Monitoring System will allow for a permanent log of all surveillance activities to be recorded and stored, and the privacy implications of this. It was noted that as per reports, the hardware purported to be used for interception by the CMS is Israeli, and is designed to store a log of all metadata. &lt;br /&gt;&lt;br /&gt;A participant stated that automation component of the Centralized Monitoring System may be positive considering that authentication of requests i.e. tracing the source of the interception may be made easier with such a system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conditions prior to issuing warrant&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protect Bill states that a Magistrate should be satisfied of either. A reasonable threat to national security, defence or public order; or a  cognisable  offence,  the  prevention,  investigation  or  prosecution  of  which  is necessary in the public interest. When discussing these standards, certain participants felt that the inclusion of ‘cognizable offences’ was too broad, whereas others suggested that the offences would necessarily require an interception to be conducted should be listed.  This led to further discussion on what kind of categorisation should be followed and whether there would be any requirement for disclosure when the list is narrowed down to graver and serious offences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair also posed the question as to whether the term ‘national security’ should elaborated upon, highlighting the lack of a definition in spite of two landmark Supreme Court judgments on national security legislations, Terrorist and Disruptive Activities Act,1985 and the Prevention of Terrorism Act,  i.e. Kartar Singh v Union of India &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; and PUCL v Union of India.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kinds of information and degree of control&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion then focused on the kinds of information that can be intercepted and collected. A crucial distinction was made here, between content data and metadata, the former being the content of the communication itself and the latter being information about the communication.  As per Indian law, only content data is regulated and not meta-data. On whether a warrant should be issued by a Magistrate in his chambers or in camera, most participants agreed that in chambers was the better alternative. However, under the CIS Privacy Protection Bill, in chamber proceedings have been made optional, which stakeholders agreed should be discretionary depending on the case and its sensitivity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidentiary Value&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The foundation of this discussion, the Chair noted, is the evidentiary value given to information collected from interception of communications. For instance, the United States follows the exclusionary rule, also known as the “fruit of the poisonous tree rule”, where evidence collected from an improper investigation discredits the evidence itself as well as further evidence found on the basis of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian courts however, allow for the admission of evidence collected through improper collection, as does the UK.  In Malkani v State of Maharashtra&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; the Supreme Court stated that an electronically recorded conversation can be admissible as evidence, and stated that evidence collected from an improper investigation can be relied upon for the discovery of further evidence - thereby negating the application of the exclusionary rule.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Emergent Circumstances: who should the authority be?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The next question posed to the participants was who the apt authority would be to allow surveillance in emergent circumstances. The CIS Privacy Protection Bill places this power with the Home Secretary, stating that if the Home Secretary is satisfied of a grave threat to national security, defence or public order, he can permit surveillance. The existing law under the Telegraph Act 1885 uses the term ‘unavoidable circumstance’, though not elaborating on what this amounts to for such situations, where an officer not below the rank of a Joint Secretary evaluates the request. In response to this question, a stakeholder suggested that the issuing authority should be limited to the police and administrative services alone.  In the CIS Privacy Protection Bill - a review committee for such decisions relating to interception is comprised of senior administrative officials both at the Central and State Government level.  A participant suggested that the review committee should also include the Defence secretary and the Home secretary.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sharing of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The CIS Privacy Protection Bill states that information gathered from surveillance should not be shared be shared amongst persons, with the exception that if the information is sensitive in terms of national security or prejudicing an investigation, an authorised officer can share the information with an authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant highlighted that this provision is lacking an authority for determining the sharing of information. Another participant noted that the sharing of information should be limited amongst certain governmental agencies, rather than to ‘any competent organisation.’&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposals for Telecommunication Service Providers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the Indian interception regime, although surveillance orders are passed by the Government, the actual interception of communication is done by the service provider. Certain proposals have been introduced to protect service providers from liability. For example, an execution provision ensures that a warrant is not served on a service provider more than seven days after it is issued. In addition an indemnity provision prevents any action being taken against a service provider in a court of law, and indemnifies them against any losses that arise from the execution of the warrant, but not outside the scope of the warrant. During discussions, stakeholders felt that the standard should be a blanket indemnity without any conditions to assure service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Indian interception regime, a service provider must also ensure confidentiality of the content and meta data of the intercepted communications. To this, a participant suggested that in situations of information collection, a service provider may have a policy for obtaining customer consent prior to the interception. The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011 are clearer in this respect, which allow for the disclosure of information to governmental agencies without consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant mentioned that the inconsistencies between laws on information disclosure and collection, such as the IT Act, the Right to Information Act and the recently enacted Whistleblower’s Protection Act, 2011 need to be harmonised. Other stakeholders agreed with this, though they stated that surveillance regulations should prevail over other laws in case of any inconsistency.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The inputs from the Bombay Roundtable seem to point towards a more regulated approach, with the addition of a review system to enhance accountability. While most stakeholders here agreed that national security is a criterion that takes precedence over concerns of privacy vis-à-vis surveillance, there is a concomitant need to define the limits of permissible interception. The view here is that a judicial model would prove to be a better system than the executive system; however, there is no clear answer as of yet on who would constitute this model. While the procedure for interception was covered in depth, the nature of the information itself was covered briefly and more discussion would be welcome here in forthcoming sessions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bombay-report.pdf" class="internal-link"&gt;&lt;b&gt;Click to download the Report&lt;/b&gt;&lt;/a&gt; (PDF, 188 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 1994 4 SCC 569.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. [1973] 2 S.C.R. 417.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai'&gt;https://cis-india.org/internet-governance/blog/privacy-surveillance-roundtable-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-09T04:13:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl">
    <title>Living in a Fish Bowl</title>
    <link>https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl</link>
    <description>
        &lt;b&gt;Though India needs a comprehensive law on the right to privacy, it may not be ready for something as avant garde as the “right to be forgotten” on the Internet, argues Shuma Raha&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shuma Raha was &lt;a class="external-link" href="http://www.telegraphindia.com/1140716/jsp/opinion/story_18619655.jsp#.U8YcmY2Sz6I"&gt;published in the Telegraph&lt;/a&gt; on July 16, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you do a Google search for journalist and television personality Barkha Dutt, a raft of scurrilous information about her pops up. It isn’t tucked away somewhere on the 10th page either — it’s all up front, right there in “autosuggest”, almost prompting you to go and check it out. And thanks to Google’s search algorithm, the more people click on that link, it further strengthens the score for that “hit”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dutt says she has brought the matter to the attention of Google, but to no avail. “I have lost interest in the whole struggle,” she says. “But Google definitely needs to do something about the slanderous, inaccurate, fictional information out there that creates a narrative of its own.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Well, in Europe at least, the tech giant has taken a step in that direction. Late last month, it started erasing search results that threw up information deemed to be “irrelevant”, “outdated” or “excessive”. The move came after the European Court of Justice ruled that Internet search engines would have to allow people the “right to be forgotten” in specific cases and accordingly, take down information about them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The European Court ruling has triggered a huge debate since an individual’s right to be forgotten seems to be at complete loggerheads with people’s right to know. Nevertheless, it’s a landmark decision when it comes to right to privacy on the Internet. After all, the online space has perma-memory and inaccurate or irrelevant or outdated information about a person can be embedded there forever, damaging him or her in manifold ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how far are we in India from securing the right to be forgotten on the Internet?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The short answer to that is, very far. That is because India does not have a well-defined privacy regime wherein one could envisage a court of law handing out a similar — and some would say a somewhat radical — order on a Google or a Bing. “The right to be forgotten is a bit too advanced for us,” says Sunil Abraham, director, Centre for Internet and Society, a non-profit organisation that works on policy issues relating to freedom of expression and privacy. “After all, we are yet to come up with a privacy and data protection regime that implements the best practices of European countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Adds Apar Gupta, a Delhi-based lawyer, who has written extensively on privacy issues, “Sector specific privacy legislation do exist, but they do not provide substantive rights or efficient remedy in case of violations.”&lt;br /&gt;No one disputes that India should get a right to privacy law, especially one that relates to the collection, processing and use of personal data. Right now the government’s surveillance mechanisms like the Central Monitoring System and the Lawful Interception and Monitoring Systems allow security agencies and income tax authorities to intercept communication, snoop on phone conversations, read emails and SMSes with little or no safeguards for privacy protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A right to privacy bill has, in fact, been in the works since as early as 2011. But the government has been dragging its feet over it. Early this year, a new version of the draft bill was “leaked” to the press. But few are happy with it. On the positive side, it raises the penalty for unlawful interception of communication (from Rs 1 lakh to Rs 2 crore) and increases penalties for other offences such as obtaining personal data under false pretexts. But crucially, it almost wholly exempts intelligence agencies from the purview of the law, thereby allowing them unbridled access to personal information. Of course, no one knows if this “leaked” draft is indeed the official one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say that the government should really formulate a right to privacy law based on the recommendations of a committee chaired by Justice A.P. Shah. The report, which was published in 2012, proposes that the right to privacy be statutorily extended to all Indians. It recommends, among other things, the appointment of privacy commissioners and the formulation of certain “national privacy principles” such as taking the consent of the individual prior to the collection of data, allowing him the choice to withdraw such consent, limiting the use of personal information to the stated purpose and so on. The privacy principles would apply to all data collectors in both private and public sectors.&lt;br /&gt;There are, of course, a number of provisions in existing laws that relate to privacy. For example, Rule 419A of the Indian Telegraph Rules, 1951, sets down certain privacy safeguards such as maintaining details about the officer ordering an intercept of telecommunication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, Section 66E of the Information Technology Act, 2000, prescribes “punishment for the violation of privacy” (in the context of capturing “private” images of a person without his or her consent); Section 43A lays down that a “body corporate” will be liable to pay compensation in case it fails to protect personal data gathered in the course of its operation; and Section 79 stipulates that “intermediaries” — entities such as Google, Facebook, Twitter — would have to take down any information stored or transmitted by them that is found to be grossly harassing, defamatory, blasphemous, obscene, pornographic and so on, within 36 hours of being notified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, this section of the IT Act has been roundly criticised as arbitrary and Draconian, but that is another story.&lt;br /&gt;The point is that despite the fair number of privacy provisions, in the absence of a comprehensive law, the untrammelled and unauthorised use of personal data cannot be ruled out. “Every country in the world collects personal data. But once the data are collected for a particular purpose they should not be used for any other purpose. The law has to be in a position to catch the violators,” says Kamlesh Bajaj, CEO of Data Security Council of India, an organisation that works to promote data protection and privacy best practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As always, the key issue is that an individual’s right to privacy has to be balanced with public interest. And it is in that context that experts feel that even if India were to have a privacy law, it is probably not ready for something akin to the European Court ruling on the right to be forgotten. As Gupta says, “It raises a real danger of public personalities blocking legitimate journalism on grounds of privacy. This is specially true in a country like India which permits a high degree of illegality in the name of secrecy and confidentiality.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham agrees with that view. “I’m not sure if the right to be forgotten will enhance privacy or usher in a level of censorship,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Europe grapples with that debate, India’s privacy warriors are asking for something far more fundamental — a comprehensive law that guarantees the right to privacy to all.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl'&gt;https://cis-india.org/news/the-telegraph-july-16-2014-living-in-a-fish-bowl&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-16T07:15:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
