<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 911 to 925.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dna-databases-and-human-rights.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/consumer-privacy.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/august-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/resources/mesh-networks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/july-2012-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/spies-we-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/citizen-activism-the-past-decade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/dna-databases-and-human-rights.pdf">
    <title>DNA Databases and Human Rights</title>
    <link>https://cis-india.org/internet-governance/dna-databases-and-human-rights.pdf</link>
    <description>
        &lt;b&gt;Using DNA to trace people who are suspected of committing a crime has been a major advance in policing.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dna-databases-and-human-rights.pdf'&gt;https://cis-india.org/internet-governance/dna-databases-and-human-rights.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-09-17T05:39:06Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/consumer-privacy.pdf">
    <title>Consumer Privacy</title>
    <link>https://cis-india.org/internet-governance/consumer-privacy.pdf</link>
    <description>
        &lt;b&gt;This chapter will examine the present legal state of consumer privacy in India and seek to understand the gap between policy and implementation of policy. In doing so, it will look at what are the existing avenues for protection of consumer privacy in India, how is the definition of consumer privacy evolving through case law and public opinion, and what are the current challenges to consumer privacy in India. Traditionally speaking, and according to the Consumer Protection Act, 1986, in India, a consumer is a broad label for any person who buys goods or services with the intent of using them for non-commercial purposes. In the typical sense, when people think of themselves as being consumers, they think about transactions with a vendor through a physical exchange of money in a store or through an online exchange for a product or service. Certain services that consumers use put an extraordinary amount of sensitive personal information into the hands of vendors.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/consumer-privacy.pdf'&gt;https://cis-india.org/internet-governance/consumer-privacy.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-09-13T09:21:26Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/august-2012-bulletin">
    <title>August 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/august-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the newsletter issue of August 2012 from the Centre for Internet &amp; Society (CIS). The present issue features an analysis of the latest list of sites blocked by the Indian government from August 18, 2012 to August 21, 2012, the India Report for Consumers International IP Watchlist 2012, and press coverage related to the recent North East exodus.&lt;/b&gt;
        &lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The  Internet Governance programme conducts research around the various  social, technical, and political underpinnings of global and national  Internet governance, and includes online privacy, freedom of speech, and  Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Special Section on Freedom of Expression&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We  usually cover Freedom of Expression under Internet Governance. However,  in the month of August there has been much discussion regarding the  North East exodus from Bangalore and the blocking of a number of  websites by the Indian government from August 18 to 21, 2012. This  special section covers reportage and original content from CIS:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Featured Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt;Analysing Latest List of Blocked Sites&lt;/a&gt; (Communalism &amp;amp; Rioting Edition) (by Pranesh Prakash): Pranesh  Prakash did a preliminary analysis on a leaked list of the websites  blocked from August 18, 2012 till August 21, 2012 by the Indian  government. There were a total of 309 specific items (those being URLs,  Twitter accounts, img tags, blog posts, blogs, and a handful of  websites) that were blocked. In this analysis, Pranesh examines why  these have been blocked, are the blocks legitimate, are there any  egregious mistakes, why the whole list hasn’t been put up, why can one  access items that are supposed to be blocked, what should the government  have done, etc. The analysis was quoted/cross-posted in the following  places: &lt;a href="http://blogs.wsj.com/indiarealtime/2012/08/25/opinion-indias-clumsy-twitter-gamble/"&gt;Wall Street Journal&lt;/a&gt; (August 25, 2012), &lt;a href="http://www.thehindu.com/news/national/article3812819.ece"&gt;The Hindu&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.livemint.com/2012/08/23210529/How-ISPs-block-websites-and-wh.html?atype=tp"&gt;LiveMint&lt;/a&gt; (August 24, 2012), &lt;a href="http://globalvoicesonline.org/2012/08/24/india-strong-reactions-to-social-media-censorship/"&gt;Global Voices&lt;/a&gt; (August 24, 2012), &lt;a href="http://bit.ly/PZN75N"&gt;Outlook&lt;/a&gt; (August 23, 2012), &lt;a href="http://www.firstpost.com/tech/epic-fail-how-india-compiled-its-banned-list-of-websites-427522.html"&gt;FirstPost.India&lt;/a&gt; (August 23, 2012), &lt;a href="http://ibnlive.in.com/news/haphazard-censorship-leaked-list-of-blocked-sites/284592-11.html"&gt;IBN Live&lt;/a&gt; (August 23, 2012), &lt;a href="http://newsclick.in/india/analysing-latest-list-blocked-sites-communalism-rioting-edition"&gt;News Click&lt;/a&gt; (August 23, 2012), &lt;a href="http://www.medianama.com/2012/08/223-india-internet-blocks/"&gt;Medianama&lt;/a&gt; (August 23, 2012) and &lt;a href="http://kafila.org/2012/08/23/an-analysis-of-the-latest-round-of-internet-censorship-in-india-communalism-and-rioting-edition-pranesh-prakash/"&gt;KAFILA&lt;/a&gt; (August 23, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question"&gt;To regulate Net intermediaries or not is the question&lt;/a&gt; (by Sunil Abraham, Deccan Herald, August 26, 2012): “Given the  disruption to public order caused by the mass exodus of North-Eastern  Indians from several cities, the government has had for the first time  in many years, a legitimate case to crackdown on Internet intermediaries  and their users.”&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-first-post-com-aug-25-2012-nishant-shah-social-media-sms-are-not-why-ne-students-left-bangalore"&gt;Social media, SMS are not why NE students left Bangalore&lt;/a&gt; (by Nishant Shah, First Post, August 25, 2012): “I woke up one morning  to find that I was living in a city of crisis. Bangalore, where the  largest public preoccupations to date have been about bad roads, stray  dogs, and occasionally, the lack of night-life, the city was suddenly a  space that people wanted to flee and occupy simultaneously.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/down-to-earth-org-nishant-shah-aug-24-2012-what-lurks-beneath-the-network"&gt;What lurks beneath the Network&lt;/a&gt; (by Nishant Shah, Down to Earth, August 24, 2012): “There is a series  of buzzwords that have become a naturalised part of discussions around  digital social media—participation, collaboration, peer-2-peer,  mobilisation, etc. Especially in the post Arab Spring world (and our own  home-grown Anna Hazare spectacles), there is this increasing belief in  the innate possibilities of social media as providing ways by which the  world as we know it shall change for the better. Young people are  getting on to the streets and demanding their rights to the future.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet"&gt;Censoring the Internet: A brief manual&lt;/a&gt; (by Sunil Abraham, Tehelka, August 23, 2012): “Blocking websites on the  Internet should be proportionate to harm they intend. However, the  government of India's approach is against the principles of natural  justice.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/www-livemint-com-chinmayi-arun-aug-20-2012-perils-of-hactivism"&gt;The Perils of 'Hactivism'&lt;/a&gt; (by Chinmayi Arun, LiveMint, August 20, 2012): “Civil disobedience  includes accepting the penalty for breaking the law. Untraceable hackers  are far removed from this ethic.”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Foreign Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-washington-post-rama-lakshmi-august-20-2012-india-blocks-more-than-250-web-sites-for-inciting-hate-panic"&gt;India blocks more than 250 Web sites for inciting hate, panic&lt;/a&gt; (by Rama Lakshmi, Washington Post on August 20, 2012): “A blanket ban  does not necessarily lead to a reduction in the circulation of rumors  because people become more vulnerable in a communication vacuum.”— Sunil  Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-the-globe-and-mail-stephanie-nolen-august-23-2012-indias-ethnic-clashes-intensify-within-social-media-maelstrom"&gt;India’s ethnic clashes intensify within social-media maelstrom&lt;/a&gt; (by Stephanie Nolen, Globe Mail, August 23, 2012): “Now for a change,  the government has legitimate grounds to censor speech...but they’ve  cried wolf on so many occasions before.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/afr-com-aug-24-2012-mark-magnier-india-limits-social-media-after-civil-unrest"&gt;India limits social media after civil unrest&lt;/a&gt; (by Mark Magnier, Australian Financial Review, August 24, 2012):  “Before, the government’s had no grounds for censorship, it was only  acting on the bruised egos of bureaucrats and officials... this time,  it’s got a legitimate right given the disruption of public order. But it  hasn’t done so very effectively.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-com-jai-krishna-and-rumman-ahmed-aug-23-2012-new-delhi-expands-curbs-on-web-content"&gt;New Delhi Expands Curbs on Web Content&lt;/a&gt; (by R Jai Krishna and Rumman Ahmed, Wall Street Journal, August 23,  2012): “The government's move to block several Twitter handles is a  clear case of administrative overreach...This action means citizens are  less likely to believe that the government can use its powers  responsibly.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-livemint-com-aug-24-2012-surabhi-agarwal-govt-in-line-of-fire-over-web-censorship"&gt;Govt in line of fire over web censorship&lt;/a&gt; (by Surabhi Agarwal, Livemint, August 24, 2012): “Both Kanchan Gupta  and Swapan Dasgupta seem to be having a right wing ideology, but while  the former’s account is blocked the latter’s is not...The difference is  on the kind of content which has been posted.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/in-reuters-com-david-lalmalsawma-aug-24-2012-indias-social-media-crackdown-reveals-clumsy-govt-machinery"&gt;India's social media crackdown reveals clumsy govt machinery&lt;/a&gt; (by David Lalmalsawma, Reuters, August 24, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/hosted-2-ap-org-aug-24-2012-internet-expert-criticizes-indian-cyber-blockades"&gt;Internet expert criticizes Indian cyber blockades&lt;/a&gt; (by Muneeza Naqvi, Associated Press, August 24, 2012): “The government  has gone overboard and many of its efforts are legally questionable.” —  Pranesh Prakash. This was also covered in &lt;a href="http://www.businessweek.com/ap/2012-08-24/internet-expert-criticizes-indian-cyber-blockades"&gt;Bloomberg Businessweek&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.khaleejtimes.com/kt-article-display-1.asp?xfile=data/international/2012/August/international_August802.xml&amp;amp;section=international"&gt;Khaleej Times&lt;/a&gt; (August 24, 2012), &lt;a href="http://abcnews.go.com/Technology/wireStory/internet-expert-criticizes-indian-cyber-blockades-17071588#.UDr2TdbibFs"&gt;ABC News&lt;/a&gt; (August 24, 2012), &lt;a href="http://seattletimes.com/html/businesstechnology/2018980504_apasindiacybercensorship.html" target="_blank"&gt;Seattle Times&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.vancouversun.com/mobile/news/world-news/Internet+expert+criticizes+India+cyber+blockades+wake+ethnic/7139293/story.html"&gt;Vancouver Sun&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.kansascity.com/2012/08/24/3776866/internet-expert-criticizes-indian.html" target="_blank"&gt;Kansas City&lt;/a&gt;. (August 24, 2012), &lt;a href="http://www.timescolonist.com/technology/Internet+expert+criticizes+India+cyber+blockades+wake+ethnic/7139293/story.html" target="_blank"&gt;Times Colonist&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.mercedsunstar.com/2012/08/24/2494805_internet-expert-criticizes-indian.html"&gt;Merced Sun-Star&lt;/a&gt; (August 24, 2012), &lt;a href="http://news.yahoo.com/internet-expert-criticizes-indian-cyber-123930580.html"&gt;Yahoo News&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.sanluisobispo.com/2012/08/24/2197739_internet-expert-criticizes-indian.html"&gt;SanLuisObispo.com&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.terrorismwatch.org/2012_08_19_archive.html"&gt;Terrorism Watch&lt;/a&gt; (August 25, 2012), &lt;a href="http://www.sci-tech-today.com/story.xhtml?story_id=84590"&gt;Sci-Tech Today&lt;/a&gt; (August 26, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help"&gt;How ISPs block websites and why it doesn’t help&lt;/a&gt; (by Gopal Sathe, Livemint, August 24, 2012): “Even though many of the  items on that list do deserve (in my opinion) to be removed [...] the  people and companies hosting the material should have been asked to  remove it, instead of ordering the ISPs to block them.” — Pranesh  Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-com-aug-25-2012-rumman-ahmed-r-jai-krishna-indias-internet-curbs-under-legal-cloud"&gt;India’s Internet Curbs Under Legal Cloud&lt;/a&gt; (by Rumman Ahmed and R Jai Krishna, Wall Street Journal, August 26,  2012):” The four orders that were sent to the ISPs don’t say under which  section or under what power these orders are being sent...They were  sent without invoking any statute or without invoking any law.” —  Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-ny-times-aug-25-2012-gardiner-harris-after-violence-in-india-a-crackdown-online"&gt;After Violence in India, a Crackdown Online&lt;/a&gt; (by Gardiner Harris, New York Times, August 25, 2012): “I don’t see  this as politically motivated censorship...I see this as gross  ineptitude by the government.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/http-www-google-com-hostednews-afp-inde-la-tentative-de-controler-i-internet-est-illegale"&gt;Inde: la tentative de contrôler l'internet est "illégale&lt;/a&gt;" (Agence France Presse, August 24, 2012): Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors"&gt;India threatens action against Twitter for ethnic violence 'rumors'&lt;/a&gt; (originally posted by Ben Sheppard in AFP and published in the China  Post, August 25, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites"&gt;Blocked websites: Where India flawed&lt;/a&gt; (CIOL, August 23, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism"&gt;India: Social Media Censorship to Contain ‘Cyber-Terrorism'?&lt;/a&gt; (by Aparna Ray, Global Voices, August 24, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/gulf-today-aug-25-2012-delhi-defends-internet-blocking"&gt;Delhi defends Internet blocking&lt;/a&gt; (Gulf Today, August 25, 2012): “The officials who are trusted with this  don’t know the law or modern technology well enough.” — Pranesh  Prakash.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-ibi-times-co-uk-gianluca-mezzofiore-aug-24-2012-india-blocks-news-website-pages-for-spreading-fear-over-assam-violence"&gt;India Blocks News Website Pages for 'Spreading Fear' over Assam Violence&lt;/a&gt; (by Gianluca Mezzofiore, International Business Times, August 24,  2012): “The government's highest priority should have been to counter  the rumours and it did a really bad job of that.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-gulf-daily-news-com-aug-25-2012-internet-clamp-outrage"&gt;Internet clamp outrage&lt;/a&gt; (Gulf Daily, August 25, 2012): Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/in-reuters-com-devidutta-tripathy-satarupa-bhattacharjya-aug-24-2012-india-faces-twitter-backlash"&gt;India faces Twitter backlash over Internet clampdown&lt;/a&gt; (by Devidutta Tripathy and Satarupa Bhattacharjya, Reuters, August 24,  2012): “This isn't about political censorship. This is about the  government not knowing how to do online regulation properly.” — Pranesh  Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/afp-com-aug-23-2012-indian-govt-defends-internet-blocking"&gt;Indian government defends Internet blocking&lt;/a&gt; (AFP, August 23, 2012): “I hope that this fiasco shows the folly of  excessive censorship and encourages the government to make better use of  social networks and technology to reach out to people.” — Pranesh  Prakash. This was cross-posted in the following: &lt;a href="http://www.thenational.ae/lifestyle/spectre-of-violence-justified-internet-blocking-indian-officials-say"&gt;The National&lt;/a&gt; (August 25, 2012), &lt;a href="http://news.ph.msn.com/sci-tech/indian-govt-defends-internet-blocking" target="_blank"&gt;MSN News&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.starafrica.com/en/news/detail-news/view/india-warns-twitter-over-ethnic-violence-249196.html" target="_blank"&gt;StarAfrica.com&lt;/a&gt; (August 24, 2012), &lt;a href="http://www.thejakartaglobe.com/international/india-defends-internet-censorship/540161" target="_blank"&gt;Jakarta Globe&lt;/a&gt; (August 24, 2012).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-ft-com-aug-24-2012-james-crabtree-tim-bradshaw-criticism-mounts-over-india-censorship"&gt;Criticism mounts over India censorship&lt;/a&gt; (by James Crabtree in Mumbai and Tim Bradshaw in San Francisco,  Financial Times, August 24, 2012): “I am not questioning their original  motives, but I do think this is excessive and incompetent censorship.” —  Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship"&gt;Facebook's Delicate Dance With Delhi On Censorship&lt;/a&gt; (by Mark Bergen, Forbes, August 29, 2012): “Perhaps the Indian  government has wasted, frittered away goodwill...It has cried ‘wolf’ so  many times that this time the internet intermediaries are not taking  them as seriously as they should.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-nytimes-vikas-bajaj-aug-21-2012-internet-analysts-question-indias-efforts-to-stem-panic"&gt;Internet Analysts Question India’s Efforts to Stem Panic&lt;/a&gt; (by Vikas Bajaj, New York Times, August 21, 2012): “The Internet  intermediaries are responding slowly because now they have to trawl  through their networks and identify hate speech.” — Sunil Abraham. This  was cross-posted in &lt;a href="http://www.ndtv.com/article/india/internet-analysts-question-india-s-efforts-to-stem-panic-257760"&gt;NDTV&lt;/a&gt; on August 22, 2012. A version of this article appeared in print on  August 22, 2012, on page B4 of the New York edition with the headline:  Internet Moves by India to Stem Rumors and Panic Raise Questions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/articles-latimes-com-mark-magnier-aug-23-2012-india-limits-social-media-after-civil-unrest"&gt;India limits social media after civil unrest&lt;/a&gt; (by Mark Magnier, Los Angeles Times, August 23, 2012 and cross-posted in &lt;a href="http://www.channel6newsonline.com/2012/08/after-civil-unrest-indian-government-places-limits-social-media/"&gt;Channel 6 News&lt;/a&gt; on August 24, 2012): Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-voanews-com-aug-21-2012-anjana-pasricha-india-debates-misuse-of-social-media"&gt;India Debates Misuse of Social Media&lt;/a&gt; (by Anjana Pasricha, Voice of America, August 21, 2012 and re-posted in &lt;a href="http://english.chosun.com/site/data/html_dir/2012/08/22/2012082200496.html"&gt;Chosunilbo&lt;/a&gt; on September 4, 2012): “Social media websites and other Internet  intermediaries should have been asked by the government to run banner  advertising or some other form of messaging that revealed the lack of  truth in the rumors that were circulating.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/frenchtribune-com-bruce-totolos-aug-22-2012-officials-raise-questions-over-indian-governments-efforts"&gt;Officials Raise Questions over Indian Government’s Efforts&lt;/a&gt; (by Bruce Totolos, French Tribune, August 22, 2012). “The government  acted appropriately, but without sufficient sophistication.” — Sunil  Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-upi-com-aug-24-2012-india-seeks-a-tighter-grip-on-social-media"&gt;India seeks a tighter grip on social media&lt;/a&gt; (United Press International, August 24, 2012): Pranesh Prakash is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;National Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/economic-times-aug-24-2012-internet-expert-pranesh-prakash-criticizes-indian-cyber-blockades"&gt;Internet expert Pranesh Prakash criticizes Indian cyber blockades&lt;/a&gt; (Economic Times, August 24, 2012): Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-aug-24-2012-govt-orders-blocking-of-300-specific-urls-including-16-twitter-accounts"&gt;Govt orders blocking of 300 specific URLs including 16 Twitter accounts&lt;/a&gt; (Times of India, August 23, 2012): “The blocking of many of the items  on the list are legally questionable and morally indefensible, even  while a large number of the items ought to be removed.” — Pranesh  Prakash.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/tech-2-in-com-ne-exodus"&gt;NE exodus: List containing 309 blocked URLs leaks online&lt;/a&gt; (tech 2, August 23, 2012): Pranesh Prakash's analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-hindustantimes-com-aug-24-2012-govt-cracks-down-on-twitter"&gt;Govt cracks down on Twitter&lt;/a&gt; (Hindustan Times, August 24, 2012): “The blocking was done without due  process of law...the government should have engaged with the social  media platforms since a majority — 217 out of 310 — of the block orders  were aimed at Facebook, YouTube, and Twitter.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-hindustantimes-com-aug-24-2012-twitter-users-hit-back-at-govt-ban"&gt;Twitter users hit back at government ban&lt;/a&gt; (originally posted in Reuters and carried in the Hindustan Times,  August 24, 2012): “This isn't about political censorship. This is about  the government not knowing how to do online regulation properly.” —  Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles"&gt;When #GOIBlocks, twitterati fly off their ‘handles’&lt;/a&gt; (Hindustan Times, August 26, 2012). Pranesh Prakash’s tweet is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-the-hindu-aug-26-v-sridhar-regulating-the-internet-by-fiat"&gt;Regulating the Internet by fiat&lt;/a&gt; (by V Sridhar, Hindu, August 26, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/economic-times-aug-26-2012-twitter-handles"&gt;Twitter handles: How and why govt erred and what it can do to be smarter &amp;amp; more effective&lt;/a&gt; (by TV Mahalingam and Shantanu Nandan Sharma, Economic Times, August 26, 2012): “Perhaps, for the first time, the &lt;a href="http://economictimes.indiatimes.com/topic/Indian-government"&gt;Indian government&lt;/a&gt; had legitimate reasons to censor speech.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech2-in-com-som-isps-block-wordpress-domain-across-india"&gt;Some ISPs block Wordpress domain across India&lt;/a&gt; (tech 2, August 25, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-the-hindu-com-aug-24-2012-details-emerge-on-govt-blockade-of-websites"&gt;Details emerge on government blockade of websites&lt;/a&gt; (Hindu, August 24, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-indolink-com-india-faces-twitter-backlash"&gt;India faces Twitter backlash over Internet clampdown&lt;/a&gt; (INDOLink, August 25, 2012): Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-pbs-org-aug-28-2012-simon-roughneen-india-blocks-facebook-twitter-mass-texts-in-response-to-unrest"&gt;India Blocks Facebook, Twitter, Mass Texts in Response to Unrest&lt;/a&gt; (by Simon Roughneen, Media Shift, August 28, 2012): “In the older forms  of governance, which were imagined through a broadcast model, the  government was at the center of the information wheel, managing and  mediating what information reached different parts of the country. In  the [peer-to-peer] world, where the government no longer has that  control, it is now trying different ways by which it can reinforce its  authority and centrality to the information ecosystem. Which means that  there is going to be a series of failures and models that don't work.” —  Nishant Shah.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress"&gt;Tata Photon unblocks Wordpress.com&lt;/a&gt; (by Rohini Lakshane, tech 2, August 30, 2012): “This is not the first  time an ISP has gone overboard in implementing censorship, be it  copyright issues, piracy or inflammatory content. In 2006, the  government had &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=18954"&gt;chastised ISPs&lt;/a&gt; for over-censoring content and blocking unintended websites and  pages...ISPs have numerous grouses against the government. They do not  possess the technical capabilities to implement the government's orders,  at times, whether about surveillance or censorship.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-merinews-com-wahid-bukhari-august-23-2012-northeast-exodus"&gt;Northeast exodus: Is there a mechanism to pre-screen social media content?&lt;/a&gt; (by Wahid Bukhari, Merinews.com, August 23, 2012): “Given the amount of  content uploaded on the larger social networks, pre-screening content  is just not possible, while removal upon complaint is. They don't have  editors like newspapers do; importantly, they shouldn't.” — Pranesh  Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-ibnlive-in-com-haphazard-censorship-leaked-list-of-blocked-sites"&gt;Haphazard censorship? Leaked list of blocked websites in India&lt;/a&gt; (IBN Live, August 23, 2012): Pranesh Prakash’s analysis is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/articles-economictimes-indiatimes-com-govt-asks-twitter-to-block-fake-pmo-india-accounts-site-fails-to-respond"&gt;Government asks Twitter to block fake 'PMO India' accounts; site fails to respond&lt;/a&gt; (Economic Times, August 23, 2012): Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Videos&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ibn-live-com-shows-ftn-aug-21-2012-is-it-time-to-regulate-social-media"&gt;FTN: Is it time to regulate social media?&lt;/a&gt; (IBN Live, August 21, 2012): Sunil Abraham, Pavan Duggal, A Mukherji  and Nikhil Pahwa spoke to CNN-IBN Deputy Editor Sagarika Ghose in Face  the Nation episode that was telecasted in IBNLive on August 21, 2012.  Sunil said “if one looks at the initial orders that the government sent  these intermediaries those were very broad instructions. The order was  addressed to all intermediaries under the IT Act.” Watch the &lt;a href="http://ibnlive.in.com/shows/Face+the+Nation/284279.html"&gt;full video&lt;/a&gt; on IBN Live.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-ndtv-com-aug-23-2012-govt-vs-tweeple-has-clampdown-hit-free-speech"&gt;Govt vs Tweeple: Has clampdown hit free speech?&lt;/a&gt; (NDTV, August 23, 2012): Has the Government crossed the line by  ordering the blocking of several Twitter accounts, many belonging to  prominent journalists? The debate was featured in NDTV on August 23,  2012. Sunil Abraham spoke to Sonia Singh of NDTV. Sunil said that “we  should focus on designing of the censorship regime in the country and  the lack of compliance with the principles of natural justice.” Watch  the &lt;a href="http://www.ndtv.com/video/player/india-decides-9/govt-vs-tweeple-has-clampdown-hit-free-speech/243830?vod-mostpopular"&gt;full video&lt;/a&gt; on NDTV.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-ndtv-com-we-the-people-aug-26-2012-is-the-govt-caught-in-the-censorship-web"&gt;Is the govt caught in the 'censorship' web?&lt;/a&gt; (NDTV, August 26, 2012): In “We the People” Pranesh Prakash responded  to Barkha Dutt’s question on what does a government do in a time of  social unrest. See the &lt;a href="http://www.ndtv.com/video/player/we-the-people/is-the-govt-caught-in-the-censorship-web/244248"&gt;full debate&lt;/a&gt; on NDTV.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"&gt;Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian&lt;/a&gt; (CIS, Bangalore, August 27, 2012): Christopher Soghoian gave a lecture  on the role companies play in assisting government surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/iacs-summer-school-2012"&gt;The Asian Edge: 2012 Inter-Asia Cultural Studies Society Summer School&lt;/a&gt;:  The 2nd Biannual Inter Asia Cultural Studies (IACS) Summer School was  hosted in Bangalore by CIS and the Centre for the Study of Culture and  Society.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/biometric-identification"&gt;Biometric  Identification: Specified Error, Accuracy and Efficiency, Considered  for the Operations of the UIDAI — A Talk by Hans Varghese Mathews&lt;/a&gt; (CIS, Bangalore, August 17, 2012): Hans Varghese Mathews gave a public lecture on biometric identification.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/sixth-meeting-of-sub-groups-on-privacy-issues"&gt;Sixth Meeting of the two Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah&lt;/a&gt; (Committee Room No. 228, Yojana Bhawan, Sansad Marg, New Delhi, August 31, 2012): Sunil Abraham participated in the meeting.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://conference.apnic.net/34/program/inet-gov-plenary"&gt;APNIC 34 Conference&lt;/a&gt; (Phnompenh, Cambodia, August 23 – 31, 2012): Sunil Abraham was a  panelist along with Ang Peng Hwa, Paul Wilson, Duangthip Chomprang and  Raul Echeberria in the session on Internet Governance Plenary. The event  was organised by APNIC.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.meetup.com/Bangalore-Designers/events/70796372/"&gt;Meetup for Bangalore's designers&lt;/a&gt; (CIS, Bangalore, August 11, 2012): CIS hosted the meet-up in Bangalore.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Visit  by students from Hindustan University, Chennai (CIS, Bangalore, August  16, 2012): Sunil Abraham and Elonnai Hickok gave a lecture to students  from the Hindustan University.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Interface  Intimacies (TERI Complex, Bangalore, August 18 – 20, 2012): CIS  conducted a research workshop with Audrey Yue and Namita Malhotra.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/thinking-with-data"&gt;Thinking with Data@CIS&lt;/a&gt; (CIS, Bangalore, September 16 – 18, 2012): The Thinking with Data  course offered at the National Institute of Advanced Studies (NIAS) will  be screened at CIS, Bangalore. The screening will be followed by online  discussions with the faculty through Skype or Google+ Hangouts.  Screening starts from September 12.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/cartonama-conference"&gt;Cartonama Conference&lt;/a&gt; (MLR Convention Centre, JP Nagar, Bangalore, September 22, 2012): The  Cartonama Conference is centred around geospatial data, mapping and  location based services. HasGeek supported by CIS is organising this  event.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/uk-dna-database-and-european-court-of-human-rights-lessons-that-india-can-learn-from-mistakes"&gt;UK DNA Database and the European Court of Human Rights&lt;/a&gt;:  Lessons that India can Learn from Its Mistakes (Alternative Law Forum,  Infantry Road, Shivaji Nagar, Bangalore, September 24, 2012): CIS in  collaboration with Alternative Law Forum invites the public to a talk  with international experts, Helen Wallace from GeneWatch, UK and Jeremy  Gruber from the Council for Responsible Genetics in the United States.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While  the potential for growth and returns exist for telecommunications in  India, a range of issues need to be addressed. One aspect is more  extensive rural coverage and the other is a countrywide access to  broadband which is low. Both require effective and efficient use of  networks and resources, including spectrum:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/knowledge-and-capacity-around-telecom-policy" class="external-link"&gt;&lt;b&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ford  Foundation has given a grant of USD 2,00,000 to CIS to build expertise  in the area of telecommunications in India. The knowledge repository  deals with these modules: Introduction to Telecommunications,  Telecommunications Infrastructure and Technologies, Government of India  Regulatory Framework for Telecom, Telecommunication and the Market,  Universal Access and Accessibility, The International Telecommunications  Union and other international bodies, Broadcasting, Emerging Topics and  Way Forward. Dr. Surendra Pal, Satya N Gupta, Paranjoy Guha Thakurta,  Payal Malik, Dr. Rakesh Mehrotra and Dr. Nadeem Akhtar are the expert  reviewers.&lt;/p&gt;
&lt;p&gt;&lt;span class="visualHighlight"&gt;The following are the new outputs:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/auctioning-and-allocation-of-spectrum"&gt;Auctioning and Allocation of Spectrum&lt;/a&gt; (by Snehashish Ghosh): Auction of spectrums was introduced in the  telecommunication market after the failure of the administrative process  of allocating spectrum. Auctions use a price mechanism to allocate  spectrum. Auction of spectrum can be used to increase efficiency and  earn maximum revenue.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/trai-act-1997"&gt;The Telecom Regulatory Authority of India Act, 1997&lt;/a&gt; (by Snehashish Ghosh): The main objective of the TRAI Act was to  establish the TRAI and the Telecom Dispute Settlement Appellate  Tribunal. Snehashish also touches upon the amendment to the TRAI Act,  government control over TRAI, scheme of the TRAI Act, constitution of  TRAI, its powers and functions, grounds and procedures for appeal to the  tribunal, etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/broadband-wireless-access"&gt;Broadband Wireless Access – Standards&lt;/a&gt; (by Jürgen Kock): Jürgen tells us about the broadband wireless access  standards, why we need technical standards, who define BWA standards,  WiMAX standards and long term evolution.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/mesh-networks"&gt;Mesh Networks&lt;/a&gt; (by Ravikiran Annaswamy): Ravikiran tells us the definition of Mesh  Networks, its importance, applications and the things to explore in  future.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/national-telecom-policy"&gt;National Telecom Policy, 2012&lt;/a&gt; (by Snehashish Ghosh): The National Telecom Policy, 2012 was approved  by the Union Cabinet on May 31, 2012. Snehashish tells us about the  vision of the National Telecom Policy, 2012, its background, the  strategies (broadband rural telephony and universal service obligation  fund), licensing, convergence and value-added services, spectrum  management, etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/new-telecom-policy-1999"&gt;New Telecom Policy, 1999&lt;/a&gt; (by Snehashish Ghosh): The New Telecom Policy, 1999 was formulated on  the basis of the report of Group on Telecommunication. In this unit,  Snehashish talks about the objectives of the Policy, its targets, the  new category of service providers, role of the regulator, other mandates  to the Policy, amendment to the New Telecom Policy, 1999, etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/national-telecom-policy-1994"&gt;National Telecom Policy, 1994&lt;/a&gt; (by Snehashish Ghosh): The National Telecom Policy, 1994 was formulated  for the purpose of opening up the Indian markets for foreign direct  investment as well as domestic investment in the telecom sector.  Snehashish throws light on the objectives of the National Telecom  Policy, 1994, the status of telecom services prior to the implementation  of the aforesaid Policy; value added services, hardware and  technological aspects, basic services, and outcomes of the National  Telecom Policy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Column in Business Standard&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/http-organizing-india-blogspot-in-aug-2-2012-shyam-ponappa-decision-analysis-for-interest-rates"&gt;Decision Analysis for Interest Rates - II&lt;/a&gt; (Shyam Ponappa, Business Standard, August 2, 2012): “India needs to  make practical choices that prioritise growth. This is the second  column. The previous column was published in the Business Standard on  July 5, 2012. It explained how lower interest rates could improve growth  by increasing net profits.”&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  Access to Knowledge programme addresses the harms caused to consumers,  developing countries, human rights, and creativity/innovation from  excessive regimes of copyright, patents, and other such monopolistic  rights over knowledge:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Key Research&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/consumers-international-ip-watchlist-report-2012"&gt;Consumers International IP Watchlist 2012 — India Report&lt;/a&gt; (by Pranesh Prakash): The India Report for Consumers International IP  Watchlist 2012 was published on the A2K Network website. According to  the report, India's Copyright Act is a relatively balanced instrument  that recognises the interests of consumers through its broad private use  exception, and by facilitating the compulsory licensing of works that  would otherwise be unavailable. However, the compulsory licensing  provision have not been utilized so far, because of both a lack of  knowledge and more importantly because of the stringent conditions  attached to them.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Press Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/www-businessworld-in-jaya-bhattacharji-rose-august-9-copyright-law"&gt;Copyright Law: More Than a Moral Obligation&lt;/a&gt; (by Jaya Bhattacharji Rose, Businessworld, August 9, 2012): “So far,  things have worked well because sepia-tinted photographs have generally  become part of the public domain. But now, only photographs by  photographers who died before 1951 are part of the public domain. This  has shrivelled up the public domain in photographs since it is even more  difficult to trace the photographer...than to estimate the age of a  photograph, determining whether a photograph is in the public domain is  laden with uncertainty. The use of historical photos in books (and  Wikipedia) will be badly affected.”— Pranesh Prakash.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India  has an estimated 70 million disabled persons who are unable to read  printed materials due to some form of physical, sensory, cognitive or  other disability. The disabled need accessible content, devices and  interfaces facilitated via copyright law and electronic accessibility  policies:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/ring-side-view"&gt;Ring Side View: Update on WIPO Negotiations on the Treaty for the Visually Impaired&lt;/a&gt; (by Rahul Cherian): As the negotiations between Member States  progressed it became clear that the United States and the European Union  were blocking the Treaty while everybody else was pushing hard for the  Treaty.  The United States and the European Union were pushing for some  form of non-binding instrument that would be more in the nature of a  recommendation. Further coverage of this is at &lt;a href="http://www.huffingtonpost.com/2012/07/26/blind-treaty-2012_n_1706543.html"&gt;Huffington Post&lt;/a&gt; and in the &lt;a href="http://www.guardian.co.uk/global-development/2012/jul/30/us-eu-blocking-treaty-blind-books"&gt;Guardian&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital  Natives with a Cause? examines the changing landscape of social change  and political participation in light of the role that young people play  through digital and Internet technologies, in emerging information  societies. Consolidating knowledge from Asia, Africa and Latin America,  it builds a global network of knowledge partners who critically engage  with discourse on youth, technology and social change, and look at  alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Public Talk&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Decoding Digital Natives (Mudra Institute of Communications, Ahmedabad, August 31, 2012): Nishant Shah gave a public lecture.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  'Openness' programme critically examines alternatives to existing  regimes of intellectual property rights, and transparency and  accountability. Under this programme, we study Open Government Data,  Open Access to Scholarly Literature, Open Access to Law, Open Content,  Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Hosted&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/bangalore-force-com-cloud-apps-developer-meetup-event"&gt;Bangalore Force.com August Meetup&lt;/a&gt; (CIS, Bangalore, August 19, 2012): John Barnes, CTO Model Metrics gave a lecture at the event organised by Bangalore Force.com.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/technology-evangelists-religious-evangelists"&gt;Technology Evangelists and Religious Evangelists — A Talk by Katherine Sydenham&lt;/a&gt; (CIS, Bangalore, August 10, 2012): Katherine Sydenham from the University of Michigan School gave a lecture.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/data-driven-journalism-data-literacy-and-open-govt"&gt;Data-Driven Journalism, Data Literacy &amp;amp; Open Government — Talk at CIS&lt;/a&gt; (CIS, Bangalore, August 1, 2012): The event was co-organised by Open  Knowledge Foundation and CIS. Lucy Chambers and Laura Newman gave an  informal talk on ‘Data-Driven Journalism, Data Literacy, and Open  Government'.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;CIS is hiring&lt;/b&gt;&lt;br /&gt; *&lt;a href="https://cis-india.org/jobs"&gt;Jobs&lt;/a&gt;*&lt;br /&gt; CIS is seeking applications from interested candidates for the following posts:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/research-manager"&gt;Research Manager&lt;/a&gt;:  CIS is seeking an individual, full-time, for a period of 12 months,  beginning from October 2012. The Research Manager is expected to  contribute to conceptualising, managing and executing research projects  in the field of Internet and Society, build knowledge networks of  researchers towards collaborative and open knowledge production and  dissemination, developing and executing the monitoring and evaluation  processes for humanities and social sciences based research, supporting  and managing academic, popular and hybrid publishing projects from  existing and new research and initiate innovative and creative areas and  methodologies of studying the Internet and its practices in India and  the larger Global South, to develop key research clusters and networks.  Send in your applications to &lt;a href="mailto:admin@cis-india.org"&gt;admin@cis-india.org&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/vacancy-for-researcher-accessibility"&gt;Researcher/Editor&lt;/a&gt; (Accessibility): CIS is hiring for the full-time position of a  researcher for its accessibility programme. The job will entail working  on researching on national and international policies and best practices  in the field of accessibility of information and technology for persons  with disabilities. To apply, please send your CV and three examples of  writing to &lt;a href="mailto:nirmita@cis-india.org"&gt;nirmita@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/vacancy-for-programme-director"&gt;Programme Director – Access to Knowledge&lt;/a&gt;:  CIS is seeking a Programme Director for its New Delhi office. The  Programme Director will manage CIS’s Access to Knowledge programme which  is funded by the Wikimedia Foundation, to support the growth of  Wikipedia and its sister projects and to advance access to free  knowledge in India. The Programme Director will partner with the large  Wikimedia community in India to focus on Indic and English languages and  will manage a team of four staff members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer – Internet Governance&lt;/a&gt;:  CIS is seeking an individual with a strong background in legal research  and policy work to be part of its internet governance (IG) programme.  The candidates must have good knowledge of Indian and international law  on freedom of expression and privacy, demonstrable research skills, have  strong communication skills and be media savvy with the ability to  convey complex legal issues clearly to a general audience, open to  travel and work independently.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;To apply for the posts of Programme Director and Programme Officers, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) or Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;) with three references.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS  was registered as a society in Bangalore in 2008. As an independent,  non-profit research organisation, it runs different policy research  programmes such as Accessibility, Access to Knowledge, Openness,  Internet Governance, and Telecom. Over the last four years our policy  research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With the Government of India we have done policy research  for Ministry of Communications &amp;amp; Information Technology, Ministry of  Human Resource Development, Ministry of Personnel, Public Grievances  and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS  is an accredited NGO at WIPO and has given policy briefs to delegations  from various countries, our Programme Manager, Nirmita Narasimhan won  the &lt;a href="https://cis-india.org/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS  is grateful to its donors, Ford Foundation, Privacy International, UK,  Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit  and Soma Pujari, philanthropists of Indian origin, for its core funding  and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/august-2012-bulletin'&gt;https://cis-india.org/about/newsletters/august-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-09-11T14:53:44Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship">
    <title>Facebook's Delicate Dance With Delhi On Censorship</title>
    <link>https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship</link>
    <description>
        &lt;b&gt;At the end of last week, a hashtag briskly rose across India:  #Emergency2012. It was a reference to the 21-month stint, beginning in the summer of 1975, when then PM Indira Gandhi determined democracy an inconvenience.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Contributed by Mark Bergen, the post was &lt;a class="external-link" href="http://www.forbes.com/sites/markbergen/2012/08/29/facebooks-delicate-dance-with-delhi-on-censorship/"&gt;published&lt;/a&gt; in Forbes on August 29, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This time around, the government launched a jumbled attempt, following ethnic violence in the northeast, to stem rumors behind a panicked exodus. They blocked over 300 sites and axed at least 16 Twitter accounts, including those of &lt;a href="http://articles.economictimes.indiatimes.com/2012-08-23/news/33342537_1_twitter-accounts-twitter-users-block-six-fake-accounts" target="_blank"&gt;political opponents and journalists&lt;/a&gt;. Many of us found our cell phone texts suddenly, with no announcement, cut off after five missives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was hardly the Emergency of 1975. The government’s actions were far less draconian than three decades ago. But, back then, there were no foreign internet companies to complicate matters—and, it seems, absolve the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to the recent charges, &lt;a href="http://articles.timesofindia.indiatimes.com/2012-08-24/internet/33365421_1_twitter-accounts-objectionable-content-twitter-users" target="_blank"&gt;Delhi claimed&lt;/a&gt; that there was “no censorship at all.” As the communications minister, Kapil Sibal, put it, “Facebook and Google are cooperating with us.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the circumstances, shutting down the incendiary hate speech online was warranted, explained Sunil Abraham, the director of the Centre for Internet and Society (CIS) in Bangalore. The process was just incredibly inept. “There were so many things they did wrong,” he told me when I asked about the government’s response. And the reaction can be tacked onto &lt;a href="http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/" target="_blank"&gt;a very recent history&lt;/a&gt; of Delhi issuing sweeping, usually empty, threats of censoring U.S. internet companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Perhaps the Indian government has wasted, frittered a way goodwill,” Abraham continued. “It has cried ‘wolf’ so many times that this time the internet intermediaries are not taking them as seriously as they should.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His group &lt;a href="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism" target="_blank"&gt;analyzed the sites&lt;/a&gt; shut down last week, pointing out the “numerous mistakes and inconsistencies that make blocking pointless and ineffectual.” It’s clear that the censorship was also opportunistic—used to stamp out political parody Twitter accounts—and counterproductive. Among the sites blocked was a Pakistani blog debunking the rumors behind the whole exodus episode.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham criticized the government for coming to the intermediaries with broad demands first, rather than directly to Twitter, Facebook and Google. That approach, coupled with earlier censorship demands, may strain the trust between the ruling coalition and the web giants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, Facebook has every reason to keep Delhi happy. This year, the number of users in India &lt;a href="http://articles.timesofindia.indiatimes.com/2011-08-05/social-media/29854245_1_advertisers-and-developers-social-networking-number-of-internet-users" target="_blank"&gt;hit 32 million&lt;/a&gt;—a 85 percent jump from the last. The total is expected to nearly double next year, leap-frogging Indonesia for the title of second largest market. An overwhelming chunk of that growth will come from mobile users. As this solid report from &lt;a href="http://forbesindia.com/article/special/facebooktoo-much-hype-too-little-substance/33106/1#ixzz24kFQXSMH" target="_blank"&gt;&lt;i&gt;Forbes India&lt;/i&gt;&lt;/a&gt; shows, the company is still struggling here, as it is in the U.S., to turn those new users into ad revenue:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Indian businesses spent Rs 2,850 crore on digital advertising as of March 2012, a number that’s expected to grow to Rs 4,391 crore next year, according to a report by the Internet Mobile Association of India/Indian Market Research Bureau (IAMAI/IMRB).&lt;br /&gt;&lt;br /&gt;…But Facebook has not been able to capture much of this share. Mahesh Murthy reckons that businesses spent about Rs 150 crore on Facebook marketing, but only a third went to Facebook’s own kitties in the form of ad revenues. The rest went to social media marketing firms which handle Facebook accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s not to say that the company will discontinue its aggressive efforts. It likely will not be deterred by policies that attack free speech—Zuckerberg’s empire has long been accused of &lt;a href="http://www.forbes.com/sites/markbergen/2012/08/29/facebooks-delicate-dance-with-delhi-on-censorship/techcrunch.com/2007/11/22/is-facebook-really-censoring-search-when-it-suits-them/" target="_blank"&gt;complacency with censorship&lt;/a&gt;. It’s India’s&lt;a href="http://www.indianexpress.com/news/facebook-google-face-heat-on-india-tax/958603/" target="_blank"&gt;infamously unpredictable tax policies&lt;/a&gt; toward foreign entities that would conceivably slow the company’s expansion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s little reason to suspect, then, that Facebook, Google and the western web behemoths will not continue to cooperate with Delhi moving forward. And much of that cooperation should come not as blatant censorship but covert surveillance. According to the &lt;a href="http://www.google.com/transparencyreport/map/" target="_blank"&gt;Google Transparency Report&lt;/a&gt;, India has made over 2,000 data requests and 100 removal requests, third only to the States and Brazil. As the mobile revolution soars, that number will surely rise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Monday evening, Christopher Soghoian, a D.C.-based privacy analyst, spoke at the CIS before a crowd of young Indian law students and activists. Despite the shoddy security default of internet firms, he said, they can impose limits on government surveillance. “When these companies receive requests from where they don’t have an office,” he claimed, “they refuse.” Two years ago, Facebook India opened its first office in Hyderabad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian advised his audience to push for privacy and transparency standards in India. He shared the story of the long-fought &lt;a href="http://mashable.com/2011/01/27/facebook-https/" target="_blank"&gt;battle for encryption protection&lt;/a&gt; with Facebook in the U.S. Yet, he admitted that security provisions can falter when a government is bent on policing the internet—and a company is bent on cooperation. “If you can force companies to hand over the keys,” he said, “then encryption is useless.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship'&gt;https://cis-india.org/news/www-forbes-com-mark-bergen-aug-29-2012-facebooks-delicate-dance-with-delhi-on-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-03T04:39:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress">
    <title>Tata Photon unblocks Wordpress.com </title>
    <link>https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress</link>
    <description>
        &lt;b&gt;As of yesterday, the Tata Photon service of the Internet service provider (ISP) Tata Teleservices seems to have lifted the block it had put on the Wordpress.com domain for over a week.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The post was &lt;a class="external-link" href="http://tech2.in.com/news/services/tata-photon-unblocks-wordpresscom/403112"&gt;published&lt;/a&gt; in tech2 on August 30, 2012. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Tech2 had reported on Saturday that the free platform of &lt;b&gt;&lt;a href="http://tech2.in.com/news/services/some-isps-block-wordpress-domain-across-india/392092" target="_blank" title="Some ISPs block Wordpress domain across India"&gt;Wordpress was put under a blanket ban across India by the ISP&lt;/a&gt;&lt;/b&gt; following government orders to block around 309 URLs carrying disruptive or inflammatory content. Directives issued by the Department of Telecommunications (DoT) to ISPs between August 18 and 21 state that only the URLs mentioned be blocked, not entire domains. Users could neither view Wordpress blogs nor edit or post new content on them, the first instance of which was noticed by us on August 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our repeated efforts to contact Tata Teleservices' officials drew a blank. Numerous users who contacted customer service did not receive any replies or resolution. Through the course of the blockade, the ISP did not even display any message to Wordpress visitors that the domain was blocked, nor did it notify the owners of Wordpress blogs about it. Puzzled users tried resetting their Internet connections, clearing DNS caches, and calling the customer service helpline only to realise that they were experiencing an ISP-level block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reactions of Wordpress users ranged from annoyance to distress. Human rights activist and lawyer Kamayani Bali Mahabal commented on Tech2, &lt;i&gt;"Yes, my wordpress blog is blocked and I have 4 blogs...have also written to TATA. I can access through [an] anonymous browser but I cannot log in, edit and do admin functions, I can do about 50 percent work on my blog. Dashboard not accessible[,] barely manage to post, will be suing TATA soon"&lt;/i&gt;. In a &lt;b&gt;&lt;a href="http://kractivist.wordpress.com/2012/08/29/tatadocomo-censorship-on-wordpress-step-by-step-guide-foe/" target="_blank" title="TATADOCOMO #censorship on wordpress- step by step guide #FOE"&gt;blog post&lt;/a&gt;&lt;/b&gt;, she has described her experience of the block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blogger Shantanu Adhicary who goes by the &lt;i&gt;nom de blog&lt;/i&gt; Tantanoo says, &lt;i&gt;"My blogs are self-hosted [on Wordpress] so I was not affected. But it was annoying that I was unable to access, read or comment on other Wordpress blogs, especially in the absence of any message whatsoever that this site has been blocked".&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move by Tata Teleservices is being seen as ham handed; around 25 million Wordpress blogs were made inaccessible to deal with a few rotten eggs. Blogger and social media consultant Prateek Shah opines, &lt;i&gt;"Blanket bans on domains because content on some of their pages is objectionable are akin to jailing a certain section of society just because some people from the community broke the law. Wordpress plays an extremely important role on the Internet and if such a site were to go down even for a few hours, it would mean mayhem for bloggers as well as readers who count on the platform to get the latest updates and information. ISPs need to mature and grow up to the fact that one can't put millions of people in jeopardy when apparently trying to protect the interests of some".&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, the Madras High Court had granted relief to netizens in India by urging that there be no more John Doe orders. &lt;i&gt;“The order of interim injunction dated 25/04/2012 is hereby clarified that the interim injunction is granted only in respect of a particular URL where the infringing movie is kept and not in respect of the entire website. Further, the applicant is directed to inform about the particulars of URL where the interim movie is kept within 48 hours.”&lt;i&gt; &lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at Centre for Internet and Society (CIS), agrees the move was wrong but shares insights about the position of the ISPs. He says, &lt;i&gt;"It was obviously wrong. It contravenes the government's orders to not block the base URL but individual pages. Action should be taken against them for causing inconvenience to users. This is not the first time an ISP has gone overboard in implementing censorship, be it copyright issues, piracy or inflammatory content. In 2006, the government had &lt;/i&gt;&lt;b&gt;&lt;i&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=18954" target="_blank" title="DoT orders Internet Service Providers to block only the specified webpages/websites"&gt;chastised ISPs&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;i&gt; for over-censoring content and blocking unintended websites and pages. Having said that, ISPs have numerous grouses against the government. They do not possess the technical capabilities to implement the government's orders, at times, whether about surveillance or censorship". &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISPs that are also telecom services providers, find themselves &lt;b&gt;&lt;a href="http://articles.economictimes.indiatimes.com/2012-08-25/news/33385182_1_isps-text-messages-smses" target="_blank" title="Blocking Twitter: How Internet Service Providers &amp;amp; telcos were caught between tweets and tall egos"&gt;unable to decipher government notifications&lt;/a&gt;&lt;/b&gt; about shutting off content on the Internet or introducing curbs on mobile communication. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism" target="_blank" title="Analysing Latest List of Blocked Sites (Communalism &amp;amp; Rioting Edition)"&gt;Prakash's analysis&lt;/a&gt;&lt;/b&gt; of the 300-odd URLs blocked by the Indian government reveals glaring mistakes in the government directives &lt;i&gt;"that made blocking pointless and effectual"&lt;/i&gt;. When asked to opine about what ISPs and telcos should do when the orders from the government were not crystal clear, Prakash said, &lt;i&gt;"They should ask for clarifications from the government. The operators sought clarifications from the Ministry of Telecommunications about the recent orders to ban bulk text messages and MMSes. The ministry was unable to resolve them, and in turn, sought further clarifications from the Home Ministry. The government should coordinate better"&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices was not the only ISP guilty of throwing the baby out with the bathwater. Sify too reportedly imposed a blanket block on the Wordpress domain. Airtel went overboard by temporarily blocking Youtu.be URLs last week citing orders by the court or the DoT.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress'&gt;https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-03T01:53:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech">
    <title>SMS Block as Threat to Free Speech</title>
    <link>https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech</link>
    <description>
        &lt;b&gt;If you could text just one or two people in a day, who would you choose? Many of us have had to make this choice thanks to the order limiting us to five texts a day. Short Message Service (SMS) is not used primarily to send staccato messages like the telegraph was. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;(This article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/article3845405.ece"&gt;published&lt;/a&gt; in the Business Line print edition dated September 1, 2012)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Whole conversations take place across SMS, and language has mutated to facilitate this. Anyone accustomed to this universe of parallel conversation, relationships and support must have found the five texts, and perhaps even the 20 texts, limit very restrictive. It isolated the hearing-impaired and created chaos for those who use bulk-texts to schedule classes or meetings, or run businesses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such a ban on communication must be examined to see whether it violates our right to freedom of speech and expression. The texting limit had a direct restrictive effect on our freedom of speech, since it limited communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We need to consider whether our rights were restricted legitimately, for reasons permitted by the Constitution. The Indian judiciary has created guidelines to help evaluate the reasonability of restrictions on free speech. The SMS block will be examined against these guidelines to see whether the restriction of communication was justified.&lt;/p&gt;
&lt;h3&gt;‘Reasonable’ curbs&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Constitution permits restriction of the right to freedom of speech only for limited permitted reasons, one of which is ‘public order’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, any such restriction must also qualify as reasonable when measured against the standard created by the Supreme Court. For instance, banning publication of all newspapers for a month because of some newspapers carrying material that may incite riots would most certainly not be reasonable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question then arises as to what would amount to a reasonable restriction. The judiciary has considered this question several times and stated that it will take into account, among other things, the nature of the rights infringed, the circumstances under which the restriction has been imposed, the extent and urgency of evil sought to be remedied and the proportionality of the imposition. The order restricting freedom must also have a proximate relationship with the achievement of public order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Examining the situation at hand from this perspective, we find that people of north-east Indian origin in southern India have been receiving threats — via SMS and other communication channels — of such severity, that it has prompted them to uproot themselves from their lives and their homes en masse. That so many citizens were made to feel unsafe in their own country is cause for concern and the Government is right to take it seriously. It can be argued that this is a public order problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However the reasonability of the restriction on SMS is much harder to prove. For such a wide restriction on the freedom of speech to be reasonable, there would need to be a demonstrable nexus or proximate relationship between the bulk-text ban and the resolution of the public order problem. Additionally, the proportionality of the restriction is questionable since it is unclear why such a universal block of bulk-texts was necessary, instead of filtration of texts based on keywords, or identification of a pool of mobile users who pose a greater risk.&lt;/p&gt;
&lt;h3&gt;SMS and public order&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The nexus between texting and restoration of public order appears remote for two reasons. The first is that SMS is not the only way to spread rumours and threats. The block was unlikely to go a long way in protecting anyone from harm since other ways of threatening and rumour-mongering remained available: Third-generation mobile technology, telephone calls and good old-fashioned word-of-mouth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second reason is that the dissemination of rumours and threats by themselves would be of less concern if they did not cause the exodus, which had little to do with technology. The problem lies less in SMS technology’s facilitation of rapid communication, and more in the reality of how people of north-eastern origin are treated in other parts of India and why the state security forces like the police do not inspire much confidence in them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this socio-political reality, restricting the number of reassuring texts and information that people of northeastern origin may send each other was hardly going to help them feel safer.&lt;/p&gt;
&lt;h3&gt;Universal embargo&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the universality of the block is particularly vulnerable to being challenged as unconstitutional. The Delhi High Court has recently declared that an order blocking bulk-SMS unreasonably restricts the right to freedom of speech because such a universal embargo, even if directed at protecting consumers’ privacy, is too broad since it affects not just telemarketers but also people sending non-commercial bulk messages.&lt;/p&gt;
&lt;p&gt;The Court felt that since all categories of texts were blocked regardless of their connection to the harm in question, the bulk-text ban unjustifiably affected citizens’ legitimate free speech rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The order limiting everyone to 200 texts a day was therefore set aside to the extent that it affected people other than the specific group at which it should have been directed. Imagine how this principle might apply to an order that limits the bulk of mobile phone users to five, or even 20, texts a day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The trouble with new communications technology is that it takes some time for policy-makers and interested parties to learn to balance the various rights affected. The SMS block, which was been lifted on August 30, unsuccessfully to protect a group of citizens from harm at the cost of many people’s freedom of speech rights. However laudable the motives, this block was an illustration of the worrying lack of accountability and procedural safeguards that lie between our rights and state excesses.&lt;/p&gt;
&lt;h3&gt;Right to communicate&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;If Arab Spring made headlines on how mobile phones were use to mobilise, Bahrain’s silenced revolution demonstrated use of the same technology to unravel mobilisation by blocking communication. Our constitution protects our right to communicate freely as well as our right to assemble. As technology evolves to better enable communication, we need to protect its infrastructure, by embedding our rights in the new communication framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is to be hoped that India provides better protection of constitutional rights across communication networks. Restriction of communication needs to be proportionate, justified and within the constitutional accountability mechanism, so that citizens’ rights are not violated any more than strictly necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Without this, we are powerless in the face of what may come — be it the mass surveillance that was once the stuff of dystopic novels or the throttling of communication in the public sphere reminiscent of China.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;b&gt;However, laudable the motives, the SMS block was an illustration of the lack of accountability and procedural safeguards that lie between our rights and state excesses.&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech'&gt;https://cis-india.org/internet-governance/www-the-hindubusinessline-op-ed-sep-1-2012-chinmayi-arun-sms-block-as-threat-to-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Chinmayi Arun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-09-02T09:02:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles">
    <title>When #GOIBlocks, twitterati fly off their ‘handles’ </title>
    <link>https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles</link>
    <description>
        &lt;b&gt;Ever since the news broke mid-week that some genuine Twitter accounts and six spoof accounts were blocked, the social networking platform has been in a tizzy.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.hindustantimes.com/technology/SocialMedia-Updates/When-GOIBlocks-twitterati-fly-off-their-handles/SP-Article1-919446.aspx"&gt;Published&lt;/a&gt; in the Hindustan Times on August 26, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Hashtags like #GOIblocks and variations on the same theme began “trending” and the twitterati, functioning like a virtual democracy, have been bombarding the world in real time with posts about the issue. 16 accounts of the 15 million twitter users in India, among them those of a few journalists, spoof accounts like @PM0India, a right-wing parody of @PMOIndia, the official twitter account of the Prime Minister’s office, and a few anonymous accounts like Barbarian Indian (@barbarindian) and Dosabandit (@dosabandit) were blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Narendra Modi turned his twitter display picture black in solidarity with the idea of freedom of speech (and was promptly termed a hypocrite with many like @JagPaws, who has 641 followers, tweeting, “Whoa!! Is he supporting Jihadi sites?”), Pankaj Pachauri, (49,827 followers) Communications Adviser to the Prime Minister’s office, has put up twitter rules and the National Security Advisor Shivshankar Menon’s ominously pro-surveillance keynote address at the release of the IDSA report on “India’s Cyber Security Challenge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many like Nitin Pai @acorn, with 16,988 followers, founder of Takshashila Institute, a public policy think tank, tweeted that “under extraordinary circumstances, the govt must do whatever it can under the constitution to prevent loss of life” and added that targeted and temporary blocks of sites, facebook pages and twitter handles that spewed hate were acceptable. Others like film maker Harini Calamur (@calamur) (11,277 followers) who says she is against censorship tweeted that “Blocking internet handles &amp;amp; sites is silly” and “the Govt’s job is to uphold the constitution &amp;amp; protect our fundamental rights. Not make value judgements.” Much of the debate has led to a genuine exchange, sometimes making comrades of people from opposing camps. Kanchan Gupta, a journalist known for his pro-Hindutva views, whose twitter handle @KanchanGupta (26,424 followers) was among those blocked, accepted on TV that scores of “people from all communities” many of whom “disagreed violently” with him had extended their support on twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others like writer Shivam Vij (@Dilidurast), who has 3,296 followers, whom Hindutvawadis has often branded ‘pseudo sickular’, surprised baiters by speaking against the ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many were strident in their criticism of the arbitrary nature of the blocks and tweeted that it was indicative of authoritarianism. “Internet blocks in India have been increasing in frequency&amp;amp;intensity. I wouldn't put this down to knee-jerk/foolishness.There is *intent*,” tweeted Nikhil Pahwa (@nixxin), founder and editor of @medianama. Others like business journalist Samidha Sharma @samidhas worried that the government’s frequent attacks on freedom of expression shows that it is “following china in all the wrong things”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh Prakash (@pranesh_prakash) of the Centre for Internet and Society tweeted, “They've blocked sites from all parts of the spectrum: Muslim right-wing, Hindu right-wing, neutral news sites, etc. No politics”, many others saw the move as a “self-serving” one. “Dear GoI: why not be honest enough to say that this web censorship has NOTHING to do with security+ all to do with your own arrogance” tweeted Sunny Singh (@sunnysingh_nw3).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles'&gt;https://cis-india.org/news/www-hindustan-times-aug-26-2012-when-goi-blocks-twitterati-fly-off-their-handles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-26T05:56:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help">
    <title>How ISPs block websites and why it doesn’t help</title>
    <link>https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help</link>
    <description>
        &lt;b&gt;Banning websites is ineffective against malicious users as workarounds are easy and well known.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Gopal Sathe's article was &lt;a class="external-link" href="http://www.livemint.com/2012/08/23210529/How-ISPs-block-websites-and-wh.html?atype=tp"&gt;published&lt;/a&gt; by LiveMint on August 24, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India blocked 245 web pages for provocative content on Monday in an effort to prevent the spread of hate messages and lessen communal tensions in the country, and suggested via an official release on the website of the Press Information Bureau that more could follow.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As was widely reported in the days that followed, most websites blocked were not related to the ethnic clashes in Assam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, programme manager with the Bangalore-based Centre for Internet and Society, analysed the sites which were listed by the government. In his analysis, 33% of all blocked addresses were on Facebook, 27.8% on YouTube, 9.7% on Twitter and the rest were spread over a number of different websites including Wikipedia, &lt;i&gt;Firspost.com&lt;/i&gt; and &lt;i&gt;TimesofIndia.Indiatimes.com.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash says, “I don’t believe that the decision to block sites was politically motivated, but I do believe that in trying to prevent harm, the government has gone overboard.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also writes in his analysis, “Even though many of the items on that list do deserve (in my opinion) to be removed [...] the people and companies hosting the material should have been asked to remove it, instead of ordering the ISPs to block them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prakash also pointed out, “There are numerous egregious mistakes. Even people and posts debunking rumours have been blocked, and it is clear that the list was not compiled with sufficient care.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, India’s overall record on Internet censorship isn’t great, with the current laws encouraging Internet service providers (ISPs) to take down content without investigating individual cases properly. And that is not even taking into consideration official government orders, such as this decision to block websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of blocking content for an ISP is very simple. After all, any content that is coming from a website to your computer has to travel through the ISP, giving it ample opportunity to observe and censor banned content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Think of it like this—you’re on an island, with no way to reach the mainland (Internet) where all the websites are. The ISP builds a bridge connecting you to the mainland, and charges you to let cars (data) from the sites come to you, by opening the road. Each web page has a unique ID, like a licence plate. If the government tells the ISP to block a specific page, it’s added to the blacklist, and isn’t allowed on the bridge. The government could also block a full domain, such as &lt;i&gt;Facebook.com&lt;/i&gt;, which would be like blocking all cars with DL plates, instead of specific numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New Delhi based cyber security consultant Dominic K. says, “The content is still there and can be accessed from outside India, so these measures are really very ineffective. People can use proxies or a virtual private network (VPN) to circumvent these measures with ease, by appearing to be a different site; so banning sites does nothing to deter malicious users.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proxies are websites that load blocked sites for you—if the proxy is not using the ISP doing the block, they can still load the content from the blocked site and present it to the users, since the blocklists simply block websites, and not their content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;VPNs work in a similar fashion, creating a virtual presence for the user outside of their own country. This can be done to circumvent blocks and access region-specific content, but is also a perfectly legitimate tool, and can increase your security greatly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s a pretty crude system but it’s used around the world. In Australia, for example, the government has a page that directly lists their web censorship activities. It wants to block material that includes child sexual abuse imagery, bestiality, sexual violence, detailed instruction in crime, violence or drug use and/or material that advocates the doing of a terrorist act. However, as noted on the same page, these measures can be easily circumvented. Since the content remains on the Internet, and is only blocked, it can be accessed by “any technically competent user”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;China, meanwhile, is frequently criticized for what is called, tongue-in-cheek, “the great firewall of China”. Reporters without Borders, a French organization that works for freedom of the press, has a list of countries that are “enemies of the Internet”. China, Iran, North Korea and Burma are some of the worst offenders, but Australia, India, Egypt, France and South Korea are also on the watchlist as “countries under surveillance”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Saudi Arabia and the UAE publish detailed information on their filtering practices but other countries such as China return connection errors, and fake “file not found” errors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a long history of Internet censorhip in India, and a perception that the laws have been used for political ends. Net censorship has been around for a while—in 1999, VSNL blocked access to Pakistani newspapers. Later, in 2006 the government wanted to block certain separatist groups of the Yahoo! Groups platform. While the government issued specific pages for the ban, initially, the whole Yahoo! Groups domain was blocked by ISPs. In 2007, Orkut was told to remove “defamatory” pages created by users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cartoon pornography website &lt;i&gt;Savitabhabi.com&lt;/i&gt; was also blocked in 2009, while several blogging services such as Typepad were blocked last year for a few weeks, and then the block was lifted, with no explanations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like Australia, in the UK too, child pornography is filtered by the government, though users there have to opt-in for this filtering. Other countries such as Denmark, Norway and Sweden also see such content being filtered. The Indian IT Act also notes various kinds of illegal content which is not permissible, such as child pornography and hate speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other countries, such as the US, also have aggressive Internet censorship of copyrighted content. Prakash says, “Internet censorship is not restricted to India alone. Every country in the world has been doing this in different ways. The United States, for example, has even seized domains in copyright cases, which were legally hosted in other countries. With regards to political censorship, which some feel is a concern now, I don’t think that the Indian government is doing that. I believe that they are sincerely trying to address a serious issue, but people are going overboard.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds, “The biggest concern is that there is no transparency about what is being blocked, or why, and this leaves things open for active misuse in the future.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Google’s 2011 &lt;i&gt;Transparency Report&lt;/i&gt;, released in June this year, India did not feature very favourably. According to Google, the number of content removal requests the company received increased by 49% from 2010. There were five court orders from India ordering the Internet giant to remove content and there were 96 other requests by Indian government agencies for 246 individual items.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In comparison, the US made only 77 requests in the same period. They also revealed that 70% of the content removal requests from India were related to defamation. National security and religious offence attracted far fewer removal requests. Google received only one request from Indian agencies from July to December 2011 for removal of pornographic content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our government might not be politically motivated in this instance—however, the possibility for abuse is high, and what’s more, the measures that are being taken are limited at best. Instead of ordering ISPs to block content directly, the government should be working with the content owners and platforms offering the content to have it taken down properly. Instead, we get crude measures which do nothing to deter malicious users, and only serve to inconvenience the general users.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help'&gt;https://cis-india.org/news/www-livemint-com-aug-24-2012-gopal-sathe-how-isps-block-websites-and-why-it-doesnt-help&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-25T06:56:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/resources/mesh-networks">
    <title> Mesh Networks</title>
    <link>https://cis-india.org/telecom/resources/mesh-networks</link>
    <description>
        &lt;b&gt;Ravikiran Annaswamy tells us the definition of Mesh Networks, its importance, applications and the things to explore in future.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Imagine&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; a room full of people in a party spread around randomly. One of the people wants to pass information to another in the corner of the room. The traditional telecom networking way of passing information involves having a person at the center of the room acts as a switch and routes the information from sender to receiver.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mesh networks provides a new way of organizing the network, every person    in the room can speak independently to the person next to him and in    turn the second person speaks to the next person till the information    reaches the destination. The route for the information is optimized to    get the shortest path.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/MeshNetworks1.jpg/@@images/435c77bd-244a-46b8-847b-8c9bf9ee91bf.jpeg" alt="Mesh Networks 1" class="image-inline" title="Mesh Networks 1" /&gt;&lt;/p&gt;
&lt;h3&gt;Definition of Mesh Networks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Mesh networks are highly interconnected network of computers or communication devices.  This concept is applicable in software systems, wired networks and wireless networks.  These networks consist of nodes (like computers, routers, radio base stations and mobile phones) and are connected to each other to carry information across.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mesh networking is organic — every node in the neighborhood contributes network resources and cooperates.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By Definition, Mesh networks are a way of structuring peer nodes in such a way that each node acts as a switch or a router deciding how to forward the information they receive.  These networks use every node to determine the path of the signal, hence its important for every node in the network to be live and healthy. This requires self-healing algorithms to dynamically identify new routes in the network. The concept of Self-organizing Networks (SON) is being implemented to achieve flexibility and scalability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Importance of Mesh Networks&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Traditionally telecom networks are hierarchically structured with centralized control systems. Mobility and increase in number of wireless devices needs a distributed architecture with intelligent nodes like in Mesh networks to manage bandwidth, optimally use spectrum and device power consumption.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IEEE 802.11s is a standard that defines how wireless devices can interconnect to create a mesh network. This covers both the static networks and the ad-hoc networks.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Applications of Mesh Networks&lt;/h3&gt;
&lt;p&gt;Mesh Networks are applied in various areas of telecom like:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Optical Mesh Networks enable the transport networks with dynamic quality of service, bandwidth on demand and managing bandwidth with peer nodes and applying policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rural or Village communication systems work with wireless nodes in every village connected to each other and provide communication services without depending on the operator infrastructure.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wireless Ad-hoc networks are decentralized networks with no predefined structure.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wireless mesh Network is a telecom network made up of radio nodes organized in a mesh topology.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; This network is used in LTE radio, Metro-Wi-Fi networks and military communication applications in battlefield surveillance, tunnels and oil rigs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mobile Ad-hoc Networks (MANET) are mobile devices connected to each other without the need of a central infrastructure. Vehicular ad-hoc networks where vehicles communicate with fixed internet points on the road or between the vehicles themselves is an interesting application.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Next things to look for in future&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Mesh networks are evolving in to real world scenarios where in sensors that monitor physical and environmental conditions are networked. These small low power wireless devices are connected through standardized ZigBee&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; protocol specifications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The application of ZigBee is seen in Home automation, Health care, Remote controls and Smart energy meters.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].System Architecture for Wireless Meshes, Fairpoint Group White paper, April 2007, FPG 2007-127.1&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Self Organizing Wireless Mesh Networks, Microsoft Research, &lt;a class="external-link" href="http://bit.ly/11Rmec"&gt;http://bit.ly/11Rmec&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Wireless Mesh Networks: &lt;a class="external-link" href="http://bit.ly/hVKII0"&gt;http://bit.ly/hVKII0&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].ZigBee Description: &lt;a class="external-link" href="http://bit.ly/u8XNS"&gt;http://bit.ly/u8XNS&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Glossary&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Metro-Wi-Fi&lt;/b&gt;: Wireless network built with Wi Fi components covering the entire city&lt;br /&gt;&lt;b&gt;MANET&lt;/b&gt;: Mobile Ad-hoc networks&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/resources/mesh-networks'&gt;https://cis-india.org/telecom/resources/mesh-networks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ravikiran Annaswamy</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-03-15T09:39:03Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/july-2012-bulletin">
    <title>July 2012 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/july-2012-bulletin</link>
    <description>
        &lt;b&gt;Welcome to the newsletter issue of July 2012 from the Centre for Internet &amp; Society (CIS). The present issue features a constitutional analysis of the Information Technology (Intermediaries' Guidelines) Rules notified in April 2011, an analysis of the Indian Draft DNA Profiling Act and CIS statement on Exceptions and Limitations for Libraries and Archives made at WIPO.&lt;/b&gt;
        &lt;h3&gt;&lt;a href="https://cis-india.org/jobs"&gt;Jobs&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;CIS is seeking applications from interested candidates for the following posts:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/research-manager"&gt;Research Manager&lt;/a&gt;: CIS is seeking an      individual, full-time, for a period of 12      months, beginning from October 2012. The Research Manager is expected to      contribute to conceptualising, managing and executing research projects in      the field of Internet and Society, build knowledge networks of researchers      towards collaborative and open knowledge production and dissemination,      developing and executing the monitoring and evaluation processes for      humanities and social sciences based research, supporting and      managing academic, popular and hybrid publishing projects from existing      and new research and initiate innovative and creative areas and      methodologies of studying the Internet and its practices in India and the      larger Global South, to develop key research clusters and networks. Send      in your applications by September 5, 2012 to &lt;a href="mailto:admin@cis-india.org"&gt;admin@cis-india.org&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/vacancy-for-programme-director"&gt;Programme Director – Access to      Knowledge&lt;/a&gt;: CIS is seeking a Programme Director for its New      Delhi office. The Programme Director will      manage CIS’s Access to Knowledge programme which is funded by the      Wikimedia Foundation, to support the growth of Wikipedia and its sister      projects and to advance access to free knowledge in India. The Programme      Director will partner with the large Wikimedia community in India to focus      on Indic and English languages and will manage a team of four staff      members. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Programme Officer – Access to      Knowledge and Openness&lt;/a&gt;: CIS is seeking an individual with a strong background in policy research and advocacy to be part      of its Openness and Access to Knowledge programmes. The candidates must      have knowledge of Indian and international law on copyright, demonstrable      research skills, public-speaking skills, open to travel and work      independently. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer – Internet      Governance&lt;/a&gt;: CIS is seeking an individual with a strong background in legal research and policy work to be      part of its internet governance (IG) programme. The candidates must have      good knowledge of Indian and international law on freedom of expression      and privacy, demonstrable research skills, have strong communication      skills and be media savvy with the ability to convey complex legal issues      clearly to a general audience, open to travel and work independently. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To apply for the posts of Programme Director and Programme Officers, please send your resume to Sunil Abraham (&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt;) or Pranesh Prakash (&lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;) with three references.&lt;/p&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes:&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"&gt;Constitutional Analysis of the Information Technology      (Intermediaries' Guidelines) Rules, 2011&lt;/a&gt; (by Ujwala Uppaluri): Ujwala      Uppaluri provides a constitutional analysis of the Information Technology      (Intermediaries' Guidelines) Rules notified in April 2011, and examines      its compatibility with Articles 14, 19, 21 of the Constitution of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act"&gt;Overview and Concerns Regarding the Indian Draft DNA      Profiling Act&lt;/a&gt; (by GeneWatch UK &amp;amp; the Council for      Responsible Genetics, US): The 2007 DNA Profiling Bill pending before the      Parliament attempts to create an ambitious centralized DNA bank that would      store DNA records of virtually anyone who comes within any proximity to      the criminal justice system. The Bill contains provisions limiting access      to and use of information contained in the database, and provides for the      deletion of a person’s DNA profile upon their acquittal.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Columns&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/internet-censorship"&gt;Internet Censorship: Anonymous      Can’t be Just Harmful Hackers&lt;/a&gt; (Nishant Shah,      FirstPost, July 13, 2012): If there was ever an interesting time for      people concerned with freedom of speech and expression to live in, it is      now, and it is definitely in India. It has been a series of battles the      last couple of years, where a slightly out-dated government machinery has      been trying to control and contain the burgeoning online spaces, only to      be put in their place by the new-age tech-ninjas that have risen as the      new heroes in our digital times.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton"&gt;Open letter to Hillary Clinton on      Internet Freedom&lt;/a&gt; (Sunil Abraham, Thinking      Aloud, July 17, 2012): Sunil Abraham’s open letter to Hillary Clinton was      based on a presentation made during a panel discussion at a Google      sponsored conference titled Internet at Liberty 2012 in Washington DC on      May 24, 2012. &lt;i&gt;The present article      published in Thinking Aloud is an updated version of the blog entry      published by CIS earlier this year&lt;/i&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Report&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/medical-privacy-conference-report"&gt;Privacy Matters — Medical Privacy&lt;/a&gt; (Yashwantrao Chavan Academy of Development Administration, Pune, June 30,      2012): Privacy India in partnership with the Indian Network for People      living with HIV/AIDS, CIS, IDRC, and Society in Action Group with support      from London-based Privacy International, held a public discussion on      "Medical Privacy". Elonnai Hickok introduced the draft book      Privacy in India: A Policy Guide that Privacy India had been compiling. The      participants discussed medical privacy in India, the legal aspects of      medical privacy, Supreme Court views on medical negligence,      confidentiality and privacy, best practices on medical privacy in various      health settings, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Ongoing Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/iacs-summer-school-2012"&gt;The Asian Edge: 2012 Inter-Asia Cultural Studies      Society Summer School&lt;/a&gt;: The 2nd Biannual Inter Asia Cultural      Studies (IACS) Summer School is being hosted in Bangalore, India by CIS      and the Centre for the Study of Culture and Society. The IACS Summer      School brings together South and East Asian experts from different      disciplines as faculty for graduate and advanced research students to      engage with key issues of larger social, cultural and political concerns      in cultural studies in Asia. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance"&gt;Role of the US Tech Companies in Government      Surveillance: A Lecture by Christopher Soghoian&lt;/a&gt; (Centre for      Internet and Society, 194, 2-C Cross, Domlur Stage II, Bangalore (Near      Domlur Club and the TERI Complex)): Your internet, phone and web      application providers are all, for the most part, in bed with US and other      foreign government agencies. They all routinely disclose their customers'      communications and other private data to law enforcement and intelligence      agencies. Worse, firms like Google and Microsoft specifically log data in      order to assist the government — How? — Find out — Christopher Soghoian      will give a lecture on the role companies play in assisting government      surveillance.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Organised&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/consumer-privacy-delhi"&gt;Privacy Matters — Consumer Privacy&lt;/a&gt; (India      International Centre, New Delhi, July 7, 2012): Privacy India, in      partnership with the Centre for Internet &amp;amp; Society, International      Development Research Centre, Society in Action Group and Privacy      International, invite you to a public conference focused on discussing the      challenges and concerns to consumer privacy in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/has-geek-presents-the-fifth-elephant"&gt;The Fifth Elephant&lt;/a&gt; (NIMHANS Convention      Centre, Bangalore, July 27 and 28, 2012): The event was organised by      HasGeek and supported by CIS. The first day covered the technology track      and talks from business and industry were held on the following day.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Events Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/speak-easy"&gt;Speak      Easy: Citizenship, Freedom of Expression and Online Governance&lt;/a&gt; (American Centre, Kasturba Gandhi Marg, Connaught Place, New Delhi, July      31, 2012): Chinmayi Arun, a Fellow at CIS spoke at this event organised by      the YP Foundation, Youth Ki Awaaz, Change.Org and RTI Anonymous.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/session-m4-international-public-policy-and-internet-governance-issues-pertaining-to-the-internet"&gt;Asia Pacific Regional Internet Governance Forum 2012&lt;/a&gt; (Aoyama Campus, Aoyama Gakuin University, Tokyo, July 20, 2012). Sunil      Abraham was a speaker in the session on international public policy and      internet governance issues pertaining to the internet. The event was      organised by APrIGF.Asia. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/fifth-meeting-of-two-sub-groups-on-privacy"&gt;Fifth Meeting of the two Sub-Groups      on Privacy Issues under the Chairmanship of Justice AP Shah&lt;/a&gt; (New      Delhi, July 22, 2012): Sunil Abraham participated in this meeting held under      the Chairmanship of Justice A.P. Shah, former Chief Justice of Delhi High      Court.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/fourth-meeting-of-sub-groups-on-privacy-issues"&gt;Fourth Meeting of the two      Sub-Groups on Privacy Issues under the Chairmanship of Justice AP Shah&lt;/a&gt; (Committee Room No. 228, Yojana Bhawan, Planning Commission, New Delhi,      July 9, 2012): Sunil Abraham participated in the fourth meeting on privacy      issues under the Chairmanship of Justice A.P. Shah, former Chief Justice      of Delhi High Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;News &amp;amp; Media Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/a-net-of-hatred"&gt;A      Net of Hatred&lt;/a&gt; (Samar Khurshid, Hindustan Times, July 14, 2012):      “The problem is...that internet conversations become extreme. Liberals      don’t get embroiled in heated arguments while fundamentalists, dedicated      to extreme ideologies, tend to win out." Web censorship...is in vain      as the net is too vast to control.”— Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/post-website-attack"&gt;Post-website attack, cops hot on      pursuit of Anonymous hackers&lt;/a&gt; (The Times of      India, July 11, 2012): “Anonymous consists of a large bunch of activists      who gained some credibility in India after they organised offline      protests. But this operation doesn't serve any purpose and brings down      their credibility as details of those who filed complaints have been      revealed.” — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/kids-on-facebook"&gt;The      kids are all on Facebook&lt;/a&gt; (Shikha Kumar, Daily News &amp;amp;      Analysis, July 8, 2012): “Children’s interaction online should always be      under parental supervision. Censorship and control is not the      responsibility of the government, but of parents.” — Sunil Abraham.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/freedom-debate-takes-a-new-course"&gt;Freedom debate takes a new course&lt;/a&gt; (Deepa      Kurup, The Hindu, July 1, 2012): “Under Indian copyright law, ISPs cannot      be liable for copyright infringement committed by their users. So while it      is good that the court clarified that its order was limited in its scope,      it is possible to read even this as going far beyond that which is allowed      under the law.” — Pranesh Prakash.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;h3&gt;WIPO&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS participated at the 24&lt;sup&gt;th&lt;/sup&gt; session of the WIPO Standing Committee on Copyrights and Related Rights held in Geneva from July 16 to 25, 2012. The outcomes are listed below:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/india-opening-statement-sccr24-tvi"&gt;India's Opening Statement on the Treaty for the      Visually Impaired at SCCR 24&lt;/a&gt;: The opening statement of the      Indian delegation was delivered by G.R. Raghavender on July 19, 2012. The      statement called upon all countries to conclude textual work on the treaty      and call for a Diplomatic Conference to finalize it.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-statement-sccr24-treaty-visually-impaired"&gt;CIS's Statement on the Treaty for      the Visually Impaired&lt;/a&gt;: Pranesh Prakash read out      CIS statement on July 20, 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-statement-sccr24-broadcast-treaty"&gt;CIS's Statement on the WIPO      Broadcast Treaty&lt;/a&gt;: Pranesh Prakash read out CIS      statement specifically on the Chair's Non Paper on the Protection of      Broadcasters which was released on July 23, 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blog/cis-statement-sccr24-libraries-archives"&gt;CIS's Statement on Exceptions      &amp;amp; Limitations for Libraries and Archives&lt;/a&gt;: Pranesh      Prakash delivered the statement on the issue of exceptions and limitations      for libraries and archives on July 25, 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/wipo-sccr24-discussions-transcripts"&gt;Transcripts of Discussions at      WIPO&lt;/a&gt;: The proceedings were live streamed. Copies of the      unedited transcripts are hosted for archival purposes.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;International Press Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/us-support-sought-for-treaty-to-allow-blind-people-access-to-copyrighted"&gt;U.S. support sought for treaty to allow blind people      access to copyrighted works&lt;/a&gt; (Rama Lakshmi, Washington Post,      July 24, 2012): “The vast majority of visually disabled people live in      poor, developing countries where very little money is spent on converting      books into accessible formats, while they are much more readily available      elsewhere...The treaty would end the book famine that they currently face.”      — Pranesh Prakash.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/us-and-eu-blocking-treaty"&gt;US and EU blocking treaty to give blind people access      to books&lt;/a&gt; (Paige McClanahan, The Guardian, July 30, 2012): “We      in developing countries have found our voice and we are not going to back      down. When people are demanding their basic rights, no power in the world      is strong enough to stop them getting what they want.”— Rahul Cherian.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;National Press Coverage&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/eu-stalls-treaty-talks-to-allow-copyright-waiver-for-print-disabilities"&gt;EU stalls treaty talks to allow copyright waiver for      print disabilities&lt;/a&gt; (The Hindu, Priscilla Jebaraj, July 25,      2012): “[The treaty] would allow organisations working for the blind to      import and export accessible works without seeking the copyright holder's      permission, since very little money is spent in developing countries on      converting books into accessible formats, while they are much more readily      available elsewhere.” — Pranesh Prakash.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India has an estimated 70 million disabled persons who are unable to read printed materials due to some form of physical, sensory, cognitive or other disability. The disabled need accessible content, devices and interfaces facilitated via copyright law and electronic accessibility policies:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/accessibility-audit-of-govt-websites"&gt;Accessibility of Government Websites in India — Test      Results&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The 'Openness' programme critically examines alternatives to existing regimes of intellectual property rights, and transparency and accountability. Under this programme, we study Open Government Data, Open Access to Scholarly Literature, Open Access to Law, Open Content, Open Standards, and Free/Libre/Open Source Software:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/unpacking-openness"&gt;Unpacking Openness: From Seemingly Transparent to      Definitely Opaque&lt;/a&gt;: Nishant Shah was in Netherlands recently and      as part of his trip had given a public lecture to an audience at      Kennisland. One of the respondents wrote a small write-up of the talk. This      was originally &lt;a href="http://www.kennisland.nl/filter/opinies/unpacking-openness-from-seemingly-transparent-to-definitely-opaqu"&gt;published&lt;/a&gt; on the Kennisland website on July      25, 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/2012-conference-on-trends-in-knowledge-information-dynamics"&gt;2012 Conference on Trends in Knowledge Information      Dynamics&lt;/a&gt; (by Rebecca Schild): The 2012 Conference on Trends in      Knowledge Information Dynamics convened a panel on Open Access. There was      consensus amongst the panelist that the “big question” facing the open      access movement no longer remains "if" or "why" open      access, but rather "how" open access. The panel proved      instructive for shifting the discussion away from ideology towards      concrete questions facing the open access agenda and its implementation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/open-government-data-commitments-best-practices"&gt;Open Government Data&lt;/a&gt; (by Pranesh Prakash):      Pranesh Prakash provides an analysis of the chapter that CIS published in      this report with Transparency &amp;amp; Accountability Initiative.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: left; "&gt;Grant Award&lt;/h3&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikimedia-foundation-awards-grant-to-cis"&gt;Wikimedia Foundation awards grant to Centre for      Internet and Society to expand Access to Knowledge in India&lt;/a&gt;:      Wikimedia Foundation has approved a grant to the Centre for Internet and      Society to expand their Access to Knowledge program in India. This      information was &lt;a href="http://blog.wikimedia.org/2012/08/01/wikimedia-foundation-awards-grant-to-centre-for-internet-and-society-to-expand-access-to-knowledge-in-india/"&gt;published&lt;/a&gt; by Barry Newstead, Chief Global Development Officer on the Wikimedia Foundation      website on August 1, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;h3&gt;Book Review&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/young-people-technology-new-literacies"&gt;Deconstructing Digital Natives: Young People, Technology and the New Literacies&lt;/a&gt;: Nishant Shah was invited to do a book review of a new anthology 'Deconstructing Digital Natives', edited by Michael Thomas. The review was published in Routledge's Journal of Children and Media on July 18, 2012.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives Newsletter&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/citizen-activism-the-past-decade"&gt;Citizen Activism the Past Decade&lt;/a&gt;: The      deadline for contribution to the Digital Natives newsletter expires on      August 15. Nilofar Ansher gives a list of topics that contributors can      explore in this blog entry.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Columns&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/across-borders"&gt;Across Borders&lt;/a&gt; (Nishant Shah, Indian Express, July 5, 2012): “Digital Natives are not      only a mobile-wielding generation, but also a mobile generation. They are      fluid, not necessarily tied to the geographies of their origin, and often      imagine themselves, as travelling across different networks and systems,      like the information traffic on the internet. This dislocation of the      fixity of where we are from and who we are is one of the most exciting      results of the digital turn.”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/digital-natives/revisiting-techno-euphoria"&gt;Revisiting Techno-euphoria&lt;/a&gt; (Nishant Shah,      DML Central, July 5, 2012): “The gadgets and tools we use are, actually,      only material manifestations of the digital — which operates at the level      of a paradigm or a context, through which we are slowly reshaping the      material, social, and cultural notions of who we are and how we connect to      the world around us.”&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Event Participated&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/istr-conference"&gt;10th      International ISTR Conference&lt;/a&gt; (Universita Degli Studi Di Siena,      Italy, July 10 – 13, 2012): Nishant Shah was a panelist in the session, "Theoretical      Grounding of Civic Driven Change". He gave a public lecture on Beyond      Normative Citizenships: Exploring the ‘New’ in Digital Activism.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;h3&gt;Building Knowledge and Capacity around Telecommunication Policy in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ford Foundation has given a grant of USD 200,000 to CIS to build expertise in the area of telecommunications in India. The following are the latest outputs:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/fixed-line-telephones" class="external-link"&gt;Fixed Line Telephones&lt;/a&gt; (by Jürgen Kock): This module discusses the features and the various      stages of the development of fixed line telephones, its early history, the      basic principle of a fixed line telephone system, plain old telephone service,      digital telephones, cordless phones to today's features of fixed line      telephones.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/video-communication" class="external-link"&gt;Different Forms of Video Communication&lt;/a&gt; (by Tina Mani): In this module, Tina Mani takes      us through some of the common forms of video communication such as video      calling, video conferencing, telepresence and video sharing.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/broadband-policy-2004" class="external-link"&gt;Broadband Policy, 2004&lt;/a&gt; (by Snehashish Ghosh): In this module, Snehashish Ghosh tells us that the      Policy was laid down by the Government of India in order to realize the      potential of broadband services. It aimed at enhancing the quality of life      by implementation of tele-education, tele-medicine, e-governance,      entertainment, etc. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/cable-television-networks-regulation-act" class="external-link"&gt;Cable Television Networks Regulation Act, 1955&lt;/a&gt; (by Snehashish Ghosh): In this module, Snehashish      examines the purpose of the legislation, the persons affected by it, the      administrative bodies which come under the Act, the penalties (including      the consequences in case of non-compliance), appeal process and the      debates surrounding the legislation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/telecom-knowledge-repository/indian-wireless-telegraphy-act" class="external-link"&gt;The Indian Wireless Telegraphy Act, 1933&lt;/a&gt; (by Snehashish Ghosh): In this module, Snehashish      Ghosh throws light on the main objective of the Act — that of regulating      the possession of wireless telegraphy apparatus.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;RTI Application&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/dot-response-to-rti-on-use-of-dpi-technology-by-isps"&gt;Use of DPI Technology by ISPs — Response by the      Department of Telecommunications&lt;/a&gt; : Smiti Mujumdar on behalf of      CIS filed requests under the Right to Information with the Department of      Telecommunications, Telecom Regulatory Authority of India, BSNL and MTNL,      asking a number of questions related to the use of Deep Packet Inspection      (DPI) technology by Internet Service Providers (ISP) in India and      corresponding regulations. A scanned version of the response from the      Department of Telecommunications is &lt;a href="https://cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf"&gt;hosted online&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Column in Business Standard&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/decision-analysis"&gt;Decision Analysis for Interest Rates&lt;/a&gt; (Shyam      Ponappa, Business Standard, July 5, 2012):      The      discipline of systematic evaluation through applying process-flow and      decision analysis — in this example, of financial logic — can help make      reasoned, practical decisions, whether for interest rates, or for      resolving issues in power supply, or in telecommunications, spectrum and      broadband. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;About CIS&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. Over the last four years our policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;span&gt;&lt;a href="https://cis-india.org/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;&lt;/span&gt;, &lt;a href="https://cis-india.org/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos. With the Government of India we have done policy research for Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is an accredited NGO at WIPO and has given policy briefs to delegations from various countries, our Programme Manager, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;span&gt;&lt;a href="https://cis-india.org/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us      on Twitter&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/july-2012-bulletin'&gt;https://cis-india.org/about/newsletters/july-2012-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-10-09T11:46:15Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance">
    <title>Role of the US Tech Companies in Government Surveillance: A Lecture by Christopher Soghoian </title>
    <link>https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance</link>
    <description>
        &lt;b&gt;Christopher Soghoian will deliver a lecture on the role US tech companies play in assisting government surveillance at the Centre for Internet &amp; Society office in Bangalore on August 27, 2012, from 5.00 p.m. to 7.00 p.m.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Your internet, phone and web application providers are all, for the most part, in bed with US and other foreign government agencies. They all routinely disclose their customers' communications and other private data to law enforcement and intelligence agencies. Worse, firms like Google and Microsoft specifically log data in order to assist the government. How many government requests does your ISP get for its customers' communications each year? How many do they comply with? How many do they fight? How much do they charge for the surveillance assistance they provide? Who knows? Most companies have a strict policy of not discussing such topics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The differences in the privacy practices of the major players in the telecommunications and internet applications market are significant. Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide the government access to user data, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. For an individual, later investigated by the police or intelligence services, the data retention practices adopted by their phone company or email provider can significantly impact their freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, although many companies claim to care about end-user privacy, and some even that they compete on their privacy features, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. Because information about each firms' practices is not publicly known, consumers cannot vote with their wallets, and pick service providers that best protect their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This talk will pierce the veil of secrecy surrounding these practices. Based upon a combination of Freedom of Information Act requests, off the record conversations with industry lawyers, and investigative journalism, the practices of many of these firms will be revealed.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Christopher's Personal Experience&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2006, the Federal Bureau of Investigation (FBI) raided Christopher’s home at 2.00 a.m. seizing his personal documents and computers. Two attorneys, Stephen Braga and Jennifer Granick came to his defence. With their expert assistance, Christopher was able to get back his possessions within three weeks, and FBI’s criminal and TSA’s civil investigations were closed without any charges being filed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jennifer Granick came to Christopher’s assistance once again (joined by Steve Leckar) in 2010 after the Federal Trade Commission’s Inspector General investigated Christopher for using his government badge to attend a closed-door surveillance industry conference. It was at that event that Christopher recorded an executive from wireless carrier ‘Sprint’ bragging about the eight million times his company had obtained GPS data on its customers for law enforcement agencies in the previous years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To know more, read Christopher Soghoian’s dissertation titled "&lt;a href="https://cis-india.org/internet-governance/spies-we-trust" class="internal-link"&gt;The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance&lt;/a&gt;". [PDF, 1056 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;About Christopher Soghoian&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is a Principal Technologist and Senior Policy Analyst at the American Civil Liberties Union and is based in Washington, D.C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice &lt;i&gt;pro se&lt;/i&gt;, and used several other investigative research methods. His research has appeared in publications including the &lt;i&gt;Berkeley Technology Law Journal &lt;/i&gt;and been cited by several federal courts, including the Ninth Circuit Court of Appeals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Between the years, 2009-2010, he was the first ever in-house technologist at the Federal Trade Commission's Division of Privacy and Identity Protection, where he worked on investigations of Facebook, Twitter, MySpace and Netflix. Prior to joining the FTC, he co-created the Do Not Track privacy anti-tracking mechanism now adopted by all of the major web browsers.&lt;/p&gt;
&lt;p&gt;He is a TEDGlobal 2012 Fellow, was an Open Society Foundations Fellow between the years, 2011-2012, and was a Student Fellow at the Berkman Center for Internet &amp;amp; Society, Harvard University between 2008 and 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance'&gt;https://cis-india.org/internet-governance/role-of-us-tech-companies-in-govt-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-08-26T11:03:19Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/spies-we-trust">
    <title>The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance</title>
    <link>https://cis-india.org/internet-governance/spies-we-trust</link>
    <description>
        &lt;b&gt;Christopher Soghoian's dissertation was submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree "Doctor of Philosophy" in the School of Informatics, Department of Computer Science, Indiana University
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/spies-we-trust'&gt;https://cis-india.org/internet-governance/spies-we-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-31T04:47:48Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/citizen-activism-the-past-decade">
    <title>Citizen Activism the Past Decade</title>
    <link>https://cis-india.org/digital-natives/citizen-activism-the-past-decade</link>
    <description>
        &lt;b&gt;Call for Contributions to the ‘Digital Natives with a Cause?’ newsletter, ‘Citizen Activism the Past Decade’. Deadline: August 15, 2012.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The past decade (2001 – 2011) has been marked by unprecedented democratic protests across the globe. Not only have citizens risen against autocratic regimes or systemic corruption, which is not unprecedented in itself, but also, a spark in one region inflamed solidarity among neighbouring nations to pick up the placards and march for change. Plenty has been written about the strategic deployment of social media, Web 2.0 platforms and Smart-gadgets by the digital natives (the youth and the old alike) to rewrite the rules of citizen activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this issue of the newsletter, we explore the mechanics of activism aided by media: web, social, digital, and traditional. What do we understand by a cause and how does it find resonance at the local and global platforms? Is the digital native a community player or a global citizen? How do digital natives connect, collaborate, mobilize and bring about their visions of change? The aim is to not establish or reinforce these dichotomies, if indeed they exist, but to understand the dimensions of the stage the digital natives operate on &lt;em&gt;and if that stage is a synecdoche for global youth-led civic action.&lt;/em&gt; A case in point: &lt;strong&gt;‘Slut Walk’ &lt;/strong&gt;moved from being a one-off march in Toronto to becoming a global movement and came full circle when small towns and cities across the world organized protest marches with a local ‘twist’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Topics that contributors can explore:&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;What do we understand by citizen activism? How has citizen activism changed over the last 10 years with the advent of new media tools?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Youth as 'change agents'. Are protest movements youth oriented today? How are civil rights movements of the past decade different from the wave of movements that marked the 60s? (women's lib, LGBT rights, civil rights, disability rights). Explore the mechanics of organizing, mobilizing and measuring the success of a campaign in both the cases.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Participatory Politics and Web 2.0 | Value and power of the Network in effecting change | Mobilizing support and consensus within the network |studies on politically active youth using social media | digital natives as apathetic citizens | Is Slacktivism still a misunderstood term?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kony 2012 video campaign | interviews | what went wrong and what did they do right? | Rise of DIY activism | mechanics of digital activism | resources, tools and strategies&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rise of the ‘Glocal’ (global with local resonance) cause | Slut Walk and Co – global protests inspiring local campaigns | Children of globalization with global stakes supporting local causes – how does this work?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of new media as a vehicle for civic engagement | Are new media and traditional media mutually exclusive in influencing citizen action? | How are new media strategies deployed by citizens in comparison with traditional media engagement?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Learning from past campaigns: citizen activism initiates and strategies in history that inspire modern campaigns (The ‘Walk to Work’ protest in Uganda protesting against fuel price hike and removal of subsidies is similar to Mahatma Gandhi’s &lt;em&gt;Dandi&lt;/em&gt; &lt;em&gt;March&lt;/em&gt; in pre-independence India to protest against Salt Tax).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Finding commonalities in citizen activism across Asia, Africa and Middle East | Explore the citizen action campaigns that have shaped political discourse in the past decade | Explore some of the most successful youth action campaigns of the past decade &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How do we measure value, quality and success of campaigns? When does a protest officially end? Studies that explore the life-cycle of a protest or movement &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The future of activism: new technologies, new demography, new forms of engagement | art and activism | Gamification &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of non-governmental organizations and civil society networks in fostering political change | collaboration between NGOs and social media activists / independent protesters&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State and the empowered citizen | State response to protest | surveillance and censorship&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Technologies of protest&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Studying citizen activism | digital native research methodology to study citizen activism&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;To know more about the topics you can write about, please write to: &lt;a class="external-link" href="http://mailtonilofar.ansh@gmail.com"&gt;nilofar.ansh@gmail.com&lt;/a&gt; (Nilofar Ansher, Community Manager). Contributions can be in the form of essays, notes, commentaries, reviews (book or paper), dialogues and chat transcript, poems, sketches / graphics. Essay word count between 800-1,600 words. Send your entries along with a brief bio and a profile picture by August 15, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;View previous issues of the 'Digital Natives with a Cause?' newsletter here: &lt;a href="https://cis-india.org/digital-natives/newsletter" class="external-link"&gt;http://cis-india.org/digital-natives/newsletter&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/citizen-activism-the-past-decade'&gt;https://cis-india.org/digital-natives/citizen-activism-the-past-decade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:52:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/open-letter-to-hillary-clinton">
    <title>Open letter to Hillary Clinton on Internet Freedom</title>
    <link>https://cis-india.org/internet-governance/open-letter-to-hillary-clinton</link>
    <description>
        &lt;b&gt;Last month I wrote an open letter to Hillary Clinton. It was based on a presentation I that I made during a panel discussion at a Google sponsored conference titled Internet at Liberty 2012 in Washington DC on May 24, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://thinkingaloud.in/ArticleComments.aspx?ArtId=1097"&gt;published&lt;/a&gt; in Thinking Aloud on July 17, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The question that my panel tried to grapple with was "In a world where nearly nine out of ten Internet users are not American, what is the responsibility of United States institutions in promoting internet freedom?" My co-panelists were Cynthia Wong who is with the Centre for Democracy and Technology, Mohamed El Dahshan a writer and journalist, Dunja Mijatovic the OSCE Representative on Freedom of the Media.&lt;br /&gt;&lt;br /&gt;Internet freedom is a curious subject. It is a technology specific liberty - for a moment consider television freedom. The US has more Muslims than India has Christians. But Indian television in the average hotel comes in hundreds and there are at least 3 channels of Christian preaching. But US television in hotels is usually less than 50 channels with no channels of Islamic preaching. In fact even the reception of secular channels from the Islamic World like Al Jazeera is still difficult in America. Can we accuse the US of not having television freedom since their television features Christian evangelists but not Muslim evangelists? Should it be part of India's foreign policy to evangelize television freedom given that there is a large domestic industry with clear international potential?&lt;br /&gt;&lt;br /&gt;In an ideal world - citizens will possess technology-neutral freedom to communication and expression. But nothing can be farther from the truth. Communication technologies are regulated using a plethora of policies and practices and very often these have a chilling effect on freedoms.&lt;br /&gt;&lt;br /&gt;The following is my response to the technology-specific demands for deregulation from the US Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Text of the Open Letter[2]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise Access to Knowledge (A2K) as pre-condition for freedom of expression&lt;/b&gt;: There is no difference between aggressive enforcement of imbalanced and obsolete intellectual property laws and censorship. The need of the moment is not more enforcement to protect obsolete business models against the everyday practices of ordinary netizens but rather the reform of intellectual property law (levies, broader exceptions and limitations, pools, statutory and compulsory licenses, prizes etc.) to keep pace with innovations in technology and the production of knowledge and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise privacy as pre-condition for security:&lt;/b&gt; The alleged tension between privacy and security is a false dichotomy. Blanket surveillance by design compromises security. &lt;b&gt;Surveillance is like salt in cooking — essential in very small quantities but dangerous even if slightly in excess. Blanket surveillance technologies are only going make things easier for — and will only serve as targets for — current and future online villains.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't lose the moral high-ground:&lt;/b&gt; Remember, with great power comes great responsibility. Other countries are waiting to cherry pick from your worst practices. Also don't use trade agreements to selectively export components of US policy without the accompanying safeguards for civil liberties and rights. Citizens in oppressive and authoritarian states are depending on the US government, courts and civil society to protect their rights online. Don't undermine their capacity to shame their governments by holding up the US as the example of 'how to get things right'. They urgently need the US government to lead by example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Recognise that freedom of expression has become a trade issue:&lt;/b&gt; This is unfortunate but this is true — thanks to the precedent set by the developed world when it came to asymmetric trade negotiations. Just as the US is interested in protecting the interests of its corporations in global markets — other governments are keen protect the interests of their own corporations. The optimal solution in this case is where all countries and corporations are equally unsatisfied. This will remain a continuing discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Address developing country anxieties around critical internet infrastructure:&lt;/b&gt; Security by obscurity will no longer do — security by transparency through open standards, technologies and governance is the only way to fears and build a trust-worthy and secure Internet for all of us. For example, there is urgent need to develop standards for supply chain audits of information infrastructure. The US has dealt with the fear of back doors by banning the use of hardware and software from countries it does not trust. The developing world is not sure if there are back-doors in hardware and software manufactured by US corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time has comes to address this and other related anxieties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Appreciate diversity in nomenclature:&lt;/b&gt; 'Freedom' and 'liberty' may be appropriate terms to use in the United States of America. But openness may be more in countries that are not yet full and robust liberal democracies. The Internet Governance Forum for example uses 'openness' instead of 'freedom'. Openness is also preferred because it includes 'freedom of expression', 'freedom of information' (also known as right to information, access to information or public and 'free knowledge' (free software, open standards, open content, open access, open data, open educational resources, etc.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Don't be too instrumental in your interventions:&lt;/b&gt; Don't undermine the local credibility of like-minded civil society, think-tanks and research organisations by being too directive in your support. Managerialism will undermine reform of policies and practices in information societies and so does inappropriate/premature monitoring and evaluation (for example, looking for explicit attribution in terms of casual connections between your actions and outcomes). There is a need to support greater reflexivity in the global information society by developing institutional capacity in developing countries through unrestricted funding. True critical thinking is the foundation of both scientific progress and open societies. Go out of your way to find and support those who disagree with you. Protect the plural foundation of our networked society!&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham was a speaker along with Cynthia Wong, Mohamed El Dahshan and Dunja Mijatovic in Plenary IV Debate 3 at the &lt;b&gt;Internet at Liberty 2012 &lt;/b&gt;event&lt;b&gt; &lt;/b&gt;organised by Google on May 24, 2012. &lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/9YMte4hdYu0" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.youtube.com/watch?v=9YMte4hdYu0"&gt;View the video on YouTube&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/open-letter-to-hillary-clinton'&gt;https://cis-india.org/internet-governance/open-letter-to-hillary-clinton&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-04T08:28:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules">
    <title>Constitutional Analysis of the Information Technology (Intermediaries' Guidelines) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules</link>
    <description>
        &lt;b&gt;Ujwala Uppaluri provides a constitutional analysis of the Information Technology (Intermediaries' Guidelines) Rules notified in April 2011, and examines its compatibility with Articles 14, 19, 21 of the Constitution of India.&lt;/b&gt;
        &lt;h2&gt;Summary of Salient Provisions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;Information Technology (Intermediaries’ Guidelines) Rules, 2011&lt;/b&gt; (‘&lt;b&gt;the Intermediary Guidelines&lt;/b&gt;’)&lt;b&gt; &lt;/b&gt; were notified in April, 2011 as rules enacted in exercise of powers conferred under section 87(2)(zg) read with Section 79 of the Information Technology Act, 2000 (as amended) (‘&lt;b&gt;the IT Act&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 2 of the Intermediary Guidelines imports definitions for key terms from the IT Act. Notably, this includes an importation of Section 2 (w) by &lt;b&gt;Rule 2 (i)&lt;/b&gt;, which defines “intermediary” broadly in the following terms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt; “intermediary”, with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes;&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 whose margin note indicates that it is limited to due diligence measures to be adhered to by intermediaries nevertheless also raises other liabilities by creating a regime to censor content, pre-publication as well as once content has been made publically available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (2) of Rule 3&lt;/b&gt; inventories the classes of content which are deemed actionable, with only clause (i), clause (c), clause (e) and, arguably clause (h), of that rule addressing the national interest, public order and security restrictions cognizable under Article 19(2) of the Constitution. The remainder of grounds includes private claims such as content which “belongs to another person”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, or otherwise infringes proprietary rights&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;, or is “defamatory”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;. Still others are terminologically indeterminate and purely subjective, with the terms “grossly harmful”, “harassing” and “disparaging” being examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule also includes a number of redundancies. While there is reference to libelous as well as defamatory content in clause (b), it is well established that Indian law does not admit of the former concept, instead dissolving the common law distinction between the two to treat them alike.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; There is also clause (e), which prohibits content which is all ready illegal for violating the provisions of an existing statute and the residuary phrasing of the clause (b)’s reference to content which is “otherwise unlawful in any manner whatever”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-rules immediately following the list in Rule 3(2) address the consequences of users publishing content listed in that rule:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (3) of rule 3&lt;/b&gt; provides that intermediaries will not knowingly deal in any manner whatsoever, whether by hosting, publication, transmission or otherwise, with any content of the types that are listed in the previous clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (4) of rule 3&lt;/b&gt; creates a complaints mechanism in respect of content incompatible with Rule 3 (2) by requiring intermediaries to disable access to offending content within 36 hours of obtaining knowledge themselves or on being brought to “actual knowledge” by an “affected person”. The Intermediaries Guidelines do nothing to clarify what would amount to “actual knowledge”, to indicate in unambiguous terms, which parties would have sufficient &lt;i&gt;locus&lt;/i&gt; to bring complaints in order to be deemed an “affected person” for the purposes of these provisions or to suggest that there is a procedure or timeline for action by the intermediary, such that requirements such notice to the author of the content and time for the preparation of a defence by the author and/or the intermediary are accounted for.  Rule 3 (4) also requires that all information which is taken down be preserved, along with “associated records” for a duration of atleast ninety days for investigative purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sub-rule (5) of rule 3 &lt;/b&gt;mandates that intermediaries inform users that non-compliance with the Intermediary Guidelines, &lt;i&gt;inter alia&lt;/i&gt;, is a ground for the exercise of their right to terminate access or usage rights and remove non-compliant content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, &lt;b&gt;sub-rule (11) of rule 3 &lt;/b&gt;requires intermediaries to name Grievance Officers to receive complaints on any matters relating to the computer resources made available by the intermediary, including for non-compliance or harm in terms of Rule 3 (2). This officer is bound to respond to the complaint within one month from the date of receipt of the complaint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the Intermediary Guidelines create a two-track system by which private censorship is legitimized online. In the first place, intermediaries can take down content on their own motion where they are of the opinion that the content falls under any of the grounds enumerated in Rule 3 (2) or, alternatively, do so in response to a complaint, in terms of Rule 3 (4).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the provisions relating to censorship, the Intermediary Guidelines also provide for information to be given over to government agencies making a request with lawful authority and in writing under &lt;b&gt;sub-rule (7) of rule 3&lt;/b&gt;, for data protection measures in accordance with the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Information) Rules, 2011 notified under Section 43A of the IT Act to be adhered to (&lt;b&gt;sub-rule (8) of rule 3&lt;/b&gt;) and for intermediaries to report and share information realting to cyber security with CERT-In (&lt;b&gt;sub-rule (9) of rule 3&lt;/b&gt;).&lt;/p&gt;
&lt;h2&gt;Areas of Infirmity&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is doubtful whether the Intermediary Guidelines could pass constitutional muster, on several grounds:&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 19 (1) (a) and (2)&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;(a) Applicability of Article 19 (2) to Rule 3 (2) Grounds&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Romesh Thappar v. State of Madras&lt;/i&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; the Supreme Court held that the freedom of speech and expression under Article 19(1)(a) includes the freedom to propogate and disseminate ideas. It also held that very narrow and stringent limits govern the permissibility of legislative abridgment of the right of free speech. Ordinarily, any abridgement of free speech by means of censorship must be compatible with one or more of the grounds provided for under Article 19 (2), and the Supreme Court held in &lt;i&gt;Express Newspapers (Private) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;that limitations on the exercise of the Article 19(1)(a) right which do not fall within Article 19(2) cannot be upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the right to free speech applies across all media, and the internet is no exception. In &lt;i&gt;Secretary, Ministry of Information and Broadcasting v. Cricket Association of Bengal&lt;/i&gt;&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;, the Supreme Court reflected the understanding that where media are different, such that the treatment accorded to them must be different in accordance with that indicia of difference, it will treat them as such in order to uphold fundamental rights. More specifically, in &lt;i&gt;Ajay Goswami v. Union of India&lt;/i&gt;&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, the Supreme Court opined (in &lt;i&gt;obiter&lt;/i&gt;) that the internet, as a unique medium of expression, deserved a different standard of protection than other mediums that have preceded it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 (2) of the Intermediary Guidelines, which lists the grounds for censorship, is not complaint with Article 19 (2) for two reasons:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, many of the grounds mentioned have no constitutional basis whatsoever. Rule 3 (2) prohibits, &lt;i&gt;inter alia&lt;/i&gt;, content which “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”, in addition to content which is simply illegal, and should be actionable &lt;i&gt;ex post&lt;/i&gt; rather than prohibited &lt;i&gt;ex ante &lt;/i&gt;(content infringing intellectual property under Rule 3 (2) (d), for example). Most of the terms employed are not legal standards, but merely subjective indicators of personal sensitivities, while still others though legal do not figure in Article 19 (2). Since the whole scheme of the Intermediary Guidelines is premised on these extra-constitutional grounds, they are, as a whole, subject to being to being struck down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the restriction is unreasonable because instead of preserving rights online in accordance with &lt;i&gt;Ajay Goswami&lt;/i&gt;, the Intermediary Guidelines unjustifiably abridge the right to speak and receive information on the internet. The Intermediary Guidelines overreach in their scope, by including as actionable content which is not itself punishable when communicated via any other medium. For example, disparaging speech, as long as it is not defamatory, is not criminalised in India, and cannot be because the Constitution does not allow for it. Similarly, content about gambling in print is not unlawful, but now all Internet intermediaries are required to remove any content that promotes gambling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) Nature of Censorship: Directness of Censorship and Legitimacy of Private and Prior Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In judging whether a statute is constitutional, the effect that the statute will have on the fundamental rights of citizens must be examined. The Supreme Court held in &lt;i&gt;Bennett Coleman &amp;amp; Co. v. Union of India&lt;/i&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; that the test was to examine whether the &lt;i&gt;effect&lt;/i&gt; of an impugned action was to abridge a fundamental right, notwithstanding its object.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, while it is true in light of the Supreme Court’s holdings in &lt;i&gt;Prakash Jha Productions v. Union of India&lt;/i&gt;&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;that pre-censorship is permissible within the Indian constitutional scheme, this permissibility is qualified. Prior censorship may be undertaken only within closely regulated circumstances, such as under the grounds in the Cinematograph Act, 1952, and even then, only by an appropriately empowered governmental entity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines create mechanisms for the abridgement of the freedom of speech which amount to indirect and unjustifiable prior censorship, contrary to Article 19 (2):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Firstly&lt;/i&gt;, while the state does not itself censor under these rules, it has empowered private, commercial entities to do so &lt;i&gt;vide &lt;/i&gt;the Intermediary Guidelines. These rules thus transfer the executive power of censorship to private intermediaries. This amounts to an indirect form of censorship for the purposes of the &lt;i&gt;Bennett Coleman &lt;/i&gt;test and has the result of increased censorship on the Internet because the state granted legislative sanction to such a system, although it does not censor by itself or through a state agency. The Intermediary Guidelines, and specifically Rule 3 (4) read with Rule 3 (2), place a burden on intermediaries to decide on the lawfulness of content as a pre-condition for their statutory exemption from liability. An intermediary, on receiving a complaint, to ensure that it continues to receive the protection offered by Section 79 of the IT Act, will be forced to disable access to the content posted by a user. Thus, the direct effect of the rules will be strict censoring of content posted on-line by users. The rules will have a direct effect on the fundamental right of freedom of speech and expression guaranteed under Article 19(1) of the Constitution unreasonable restrictions on fundamental rights, that are imposed by a statute or executive orders are liable to be struck down as unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Secondly&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;while prior censorship is permissible only in a strictly limited range of cases, the Intermediary Guidelines allow for an unrestrained and unlimited degree of prior and arguably invisible censorship. Rule 3 of the Intermediary Guidelines clearly envisages such a system of prior censorship. Whereas the consequences for passively displaying content incompatible with Rule 3(2) would be a complete waiver and dissolution of the Section 79 immunity that would ordinary accrue to neutral intermediaries, intermediaries or complainants have no obligation in respect of ensuring the tenability of complaints and the grounds cited in them. The Intermediary Guidelines do not draw a distinction between arbitrary actions of an intermediary and take-downs subsequent to a request. Further, the inclusion of a residuary clause in Rule 3 (2) (b) allowing pre-censorship of content which is “unlawful in any manner whatever”, also indicates that the Intermediary Guidelines allow the use of the exceptional instrument of not only allows private censorship, but that they actively encourage it as the default rule rather than the exception without any justification whatsoever.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(c)&lt;/i&gt;&lt;i&gt; Vagueness and Overbreadth: Possibility for Over-Censorship&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vagueness in the terms of a restriction to free speech is grounds for it to be struck down, even where the ground is apparently broadly constitutional. The Supreme Court held in &lt;i&gt;Sakal Papers (P) Ltd. v. Union of India&lt;/i&gt;&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; that the Constitution must be interpreted in order to enable citizens to enjoy their rights to fullest measure, subject to limited permissible restrictions. In &lt;i&gt;Romesh Thapar&lt;/i&gt;&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;the Supreme Court also held that a legislation authorizing the imposition of restrictions on free speech in language wide enough to cover restrictions which are permissible as well as extra-constitutional will be held to be wholly unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds listed in Rule 3 (2) of the Intermediary Guidelines are highly subjective, private interest grounds which are not defined either in the Intermediary Guidelines or in the IT Act itself. These include terms such as “grossly harmful”, “harassing”, “invasive of another’s privacy”, “hateful”, “disparaging”, “grossly offensive” or “menacing”. Consequently, the Intermediary Guidelines constitute unreasonable restrictions on freedom of speech, with Rule 3 (2) containing vague terms which, in addition to falling beyond the purview of Article 19(2), cover only private and subjective grounds, incapable of objective definition or application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Intermediary Guidelines do no precisely define the term “affected person” employed in Rule 3 (4). Thus, complaints from &lt;i&gt;any&lt;/i&gt; party, including those uninvolved or unaffected by content must all be complied with, without qualification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the result, the vagueness of the grounds in Rule 3 (2) and the diffuse terminology of “affected person” leaves Rule 3 (2) grounds serving as placeholders for whatever claim a complainant, having no &lt;i&gt;locus&lt;/i&gt; whatsoever, chooses to bring, without regard for whether it is constitutional or even legal. Online content is thus treated as presumptively illegal and take down of content as the presumptive course of action. Additionally, there is a further consequence to the vagueness and overbreadth of the terms in Rule 3 (2): because of the indeterminacy in the grounds listed thereunder, intermediaries tasked with enforcing the law will tend to err on the side of caution and censor, rather than keep speech accessible online. There is empirical evidence to show that cautious intermediaries will over-censor and over comply with complaints in order to avoid liability under Section 79 of the IT Act.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) Contravention of International Human Rights Norms &amp;amp; Horizontal Application&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The censorship regime constructed by the Intermediary Guidelines is non-compliant not only with domestic requirements under the Constitution, but also with India’s obligations under international human rights law under Articles 19 of the Universal Declaration of Human Rights (‘&lt;b&gt;UDHR&lt;/b&gt;’) and the International Covenant on Civil and Political Rights (‘&lt;b&gt;ICCPR&lt;/b&gt;’), under the UN Human Rights Council’s  Report of the Special Rapporteur Frank La Rue on the Promotion and Protection of the Right to Freedom of Opinion and Expression (2011)&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;(‘&lt;b&gt;Special Rapporteur’s Report&lt;/b&gt;’) and the UN Human Rights Council Resolution on Internet Freedom (2012)&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; (‘&lt;b&gt;UN Internet Freedom Resolution&lt;/b&gt;’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ICCPR as well as the UDHR guarantee a right to free speech “through any…media of…choice” in their respective Articles 19, the Special Rapporteur’s Report and the UN Internet Freedom Resolution recognize the need for special efforts to be undertaken by states to preserve free speech on the internet. The former document justifies censorship only in the most limited circumstances and makes specific mention of the commercial interests that may be implicated in delivering free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through the Intermediary Guidelines,  the Indian state creates a system by which the right to free speech can be systematically violated by private and undisclosed entities and even empowers them to do so, without imposing any constitutional safeguards whatsoever. Thus, egregious violations of the right to free speech and expression are a direct and inevitable consequence of the Intermediary Guidelines. To the degree that the Indian Supreme Court has enagaged with free speech online, it appears from &lt;i&gt;Ajay Goswami &lt;/i&gt;that it would apply standards consistent with international law obligations to rectify the Intermediary Guidelines to meet them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Indian Supreme Court has held, where necessary for their true enjoyement, that fundamental rights may involve a degree of horizontality in their application. In other words, private action could be guided by fundamental rights, such as in &lt;i&gt;Vishaka v. State of Rajasthan&lt;/i&gt;&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; which evidences the Supreme Court’s willingness to hold that private entities could be held to constitutional and international human rights law standards where that is necessary for the real rather than illusory enjoyment of fundamental rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result, the Intermediary Guidelines are also liable to be struck down for their failure to recognize and account for the role of private interests while empowering them with the right to curtail fundamental rights.&lt;/p&gt;
&lt;h3&gt;Compatibility with Article 21&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (a) Adverse Impact on Privacy (and consequently on Free Speech)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A constitutional right to privacy has been read into Article 21’s guarantee of life and personal liberty in several instances by the Supreme Court. The State is consequently under an obligation to refrain from interfering, whether by itself or through any of its agencies, with private lives and spaces. By the same coin, laws which encourage unwarranted state or societal intrusions into private life will contravene the victim’s Article 21 right. In &lt;i&gt;People’s Union for Civil Liberties v. Union of India&lt;/i&gt;,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; the Supreme Court held that Article 21 privacy protected individuals against the interception and monitoring of private communications by the state in the absence of sufficient safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, an individual’s privacy interests in information relating to him are not dissolved merely because information is not confidential or because another entity has some property interest in that information. In &lt;i&gt;District Registrar and Collector, Hyderabad v. Canara Bank&lt;/i&gt;&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;, the Supreme Court recognized that even where the search of private documents was concerned, Article 21 protected “persons not places”, &lt;i&gt;i.e.&lt;/i&gt;, that the privacy interest did not vest in property or communications but, rather, in the rightsholder himself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines include no limits whatsoever on the scope of disclosures that government agencies can demand or expect to retain, in contravention of Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, Rule 3 (4), which requires data retention for a statutory minimum of ninety days of content taken down as well as “associated records”, violates users’ rights to privacy. In addition to the financial and technical burden (in storing and securing data) imposed by the Intermediary Guidelines in requiring potentially unlimited data retention by intermediaries, there is no clarity as to what or how much information precisely must be held in the form of “associated records”. Instead of subjecting data to limited and closely qualified retention by private intermediaries, and thus limiting the impairment of the fundamental right to privacy to the minimum possible degree necessary, Rule 3 (4) imposes blanket data retention requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 3 (7), which makes any information held by an intermediary subject to being disclosed to the government upon request is also inconsistent with the requirement that the right to life and personal liberty be violated only in accordance with fair, just and reasonable procedures. Notwithstanding that Rule 3 (7) is consistent with Section 67C of the IT Act and specific rules framed in regard to the surveillance of communications, it is also unconstitutional because it fails to include any safeguards whatsoever in the process of surveillance. These would include, as minimum obligatory conditions in light of &lt;i&gt;PUCL&lt;/i&gt;, the requirement that the surveilled be informed of the surveillance and be allowed to challenge its propriety &lt;i&gt;ex ante &lt;/i&gt;or its procedural regularity &lt;i&gt;ex post&lt;/i&gt;, or atleast administrative or judicial review &lt;i&gt;ex parte&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b)  Non-compliance with Due Process and Natural Justice Requirements&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 21 explicitly includes a due process guarantee. This means that the right to life and personal liberty, and its constituent rights, can be interfered with only through constitutionally consistent procedures. A cornerstone of fair procedure, compliant with the rule of law, is the notion of natural justice. Consequently, Article 21 contemplates that the procedure by which fundamental rights are curtailed will satisfy natural justice principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Maneka Gandhi v. Union of India&lt;/i&gt;,&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; the Supreme Court held that natural justice was not a rigid or mechanical term, but one that referred to those practices and principles that would ensure&lt;i&gt; &lt;/i&gt;“fair play in action”&lt;i&gt;.&lt;/i&gt; In addition the Court held that all deviations&lt;i&gt; &lt;/i&gt;from natural justice requirements must be supported by a sufficiently justificatory “compelling state interest”. Specifically, in &lt;i&gt;Union&lt;/i&gt; &lt;i&gt;of&lt;/i&gt; &lt;i&gt;India&lt;/i&gt; &lt;i&gt;v.&lt;/i&gt; &lt;i&gt;Tulsiram&lt;/i&gt; &lt;i&gt;Patel&lt;/i&gt;&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;, the Supreme Court held that the principle of natural justice required the satisfaction of the &lt;i&gt;audi alteram partem&lt;/i&gt; rule, which consisted of several requirements, including the requirement that a person against whose detriment an action is taken be informed of the case against him and be afforded a full and fair opportunity to respond.  Finally, in &lt;i&gt;M.C. Mehta v. Union of India&lt;/i&gt;&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; the Supreme Court held that the absence of due notice and a reasonable opportunity to respond would vitiate any holding to the rightsholder’s detriment. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines fail to satisfy the requirement of natural justice, and particularly the rights to prior notice as well as that of the affected party to a hearing:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By requiring that content be taken down swiftly (within 36 hours of complaint, under Rule 3 (4)) and by failing to require the author of the content to be informed of the complaint and its contents, the Intermediary Guidelines violate the author’s right to notice and consequently affect his/her right to prepare and present a defence at all. In practice, authors of content which is the subject of a complaint may never know of the complaint or even of the fact of the take down, given the absence of any mechanism under the rules by which they could have been informed. In a scheme for silent, invisible censorship, authors are never afforded an opportunity to challenge the take down, just as they have no opportunity to rebut the initial complaint. In addition, at any event, it is the intermediary, a biased private entity whose immunity under Section 79 of the IT Act could be called into question based on the outcome, who must make the determination as to the legality of the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While there is nothing to prohibit intermediaries from informing authors on the receipt of a complaint, the limited time within which action must be taken means that such intermediaries would risk liability for non-compliance with the compliant and a waiver of their Section 79 immunity, where the content is not taken down, whether because communication does not occur within the 36 hour timeframe or because an author elects to resist takedown. By creating a system in which takedowns necessarily occur in response to complaints, irrespective of their legitimacy, the Intermediary Guidelines presume and rule in favour of the complainants and in favour of (private) censorship instead of presuming in favour of the preservation of the fundamental right to free speech, or even maintaining neutrality between the two ends.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Compatibility with Article 14&lt;/h3&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The guarantee of “equal protection of laws” requires equality of treatment of persons who are similarly situated, without discrimination &lt;i&gt;inter se&lt;/i&gt;. It is a corollary that that persons differently situated cannot be treated alike. &lt;i&gt;In&lt;/i&gt;&lt;i&gt; E.&lt;/i&gt;&lt;i&gt; P.&lt;/i&gt;&lt;i&gt; Royappa&lt;/i&gt;&lt;i&gt; v. State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Tamil&lt;/i&gt;&lt;i&gt; Nadu&lt;/i&gt;&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;i&gt; the&lt;/i&gt;&lt;i&gt; Supreme&lt;/i&gt;&lt;i&gt; Court&lt;/i&gt;&lt;i&gt; held&lt;/i&gt;&lt;i&gt; that arbitrary or unfair actions necessarily run counter to Article 14. The Supreme Court explained in M/S&lt;/i&gt;&lt;i&gt; Sharma&lt;/i&gt;&lt;i&gt; Transport&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Government&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Andhra Pradesh&lt;/i&gt;&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;i&gt; that&lt;/i&gt; arbitrary actions are actions which are unreasonable, non-rational done capriciously or without adequate determining principle, reason or in accordance with due judgment. In addition, Article 14 also requires that state action be reasonable. I&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Mahesh&lt;/i&gt;&lt;i&gt; Chandra&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; Regional&lt;/i&gt;&lt;i&gt; Manager,&lt;/i&gt;&lt;i&gt; U.P.&lt;/i&gt;&lt;i&gt; Financial&lt;/i&gt;&lt;i&gt; Corporation&lt;/i&gt;&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt;&lt;i&gt; it was held that discretion must be exercised objectively, and that what is not fair or just will be unreasonable, and subject to being struck down as unconstitutional.&lt;/i&gt;Additionally, Article 14 also requires that the basis upon which classifications are undertaken for the purposes of same or differential treatment be reasoned and fair. The Supreme Court held in &lt;i&gt;Sube Singh v. State of Haryana&lt;/i&gt;&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; that the state’s failure to support a classification on the touchstone of reasonability, with the existence of intelligible differentia or the rational basis of achieving a stated object, will be ground for it to be held arbitrary and unreasonable. Finally, all state action having the potential to curtail Article 14 must be reasonable, justifiable, undertaken in &lt;i&gt;exercise of &lt;/i&gt;constitutional powers and be informed and guided by public interest. The Supreme Court held to this effect i&lt;i&gt;n&lt;/i&gt;&lt;i&gt; Kasturi&lt;/i&gt;&lt;i&gt; Lal&lt;/i&gt;&lt;i&gt; Lakshmi&lt;/i&gt;&lt;i&gt; Reddy&lt;/i&gt;&lt;i&gt; v.&lt;/i&gt;&lt;i&gt; State&lt;/i&gt;&lt;i&gt; of&lt;/i&gt;&lt;i&gt; Jammu&lt;/i&gt;&lt;i&gt; and&lt;/i&gt;&lt;i&gt; Kashmir&lt;/i&gt;&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines contravene Article 14 on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, intermediaries who are not similarly situated are treated alike. Rule 2 (i) imports the IT Act’s omnibus definition of the term “intermediary”, such that all classes of intermediaries, ranging from intermediaries which control the architecture of the internet and the hardware  which enables it to run (such as ISPs and DNS providers) to intermediaries that enable content creation, sharing and communications online (such as email clients, content aggregators, social networking services and content hosts), are empowered to censor and are required to comply with complaints regarding content. Intermediaries, for the purposes of the IT Act and the Intermediary Guidelines, thus refer to a large and disparate group of providers of services enabling access to as well as use of the Internet. Reasoned state action must recognize that their liabilities must necessarily vary with the specific type of service that each provides. The Intermediary Guidelines fail to do so, and are consequently incompatible with Article 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Intermediary Guidelines treat the same or similar content across media differently, without apparent justification. More specifically, users of the internet are unfairly discriminated against. All of the Rule 3 (2) grounds which are not explicitly mentioned in Article 19 (2) in particular reflect this discriminatory, unreasoned treatment. To illustrate, the prohibition under Rule 3 (2) on the display of any content online when it relates to gambling treats speakers using the internet differently from speakers communicating this content via any other medium of communication. Given that nothing in the nature of the medium itself attaches a new or different character to the content, criminality or liability must attach to such content in a medium-neutral fashion. So, while content qualifying as seditious under law remains so across media, whether it be print, audio or video broadcast or online, the same as not the case for communications on the internet. In other words, while gambling itself may be prohibited under law, speech or expression involving it is nowhere prohibited under law. While such content is legal and protected across print and broadcasting media, the same content is liable to take down online. This would amount to discriminatory treatment of equal content &lt;i&gt;merely&lt;/i&gt; because speakers choose the internet, and the speech occurred online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Intermediary Guidelines accord unrestrained discretion in the curtailment of fundamental rights to &lt;i&gt;private &lt;/i&gt;functionaries, without any guidance whatsoever. This should have been the sole reserve of the state. In addition to the lack of guidance, the breadth of the grounds for censorship in Rule 3 (2), some of which are&lt;i&gt; themselves incapable of precise and non-subjective application&lt;/i&gt;, means that private censorship can occur to an arguably unlimited degree. Expecting compliance with such terms, and attaching liability (for intermediaries) or a curtailment of fundamental rights (for generators of content), without the provision of a right to challenge or even, more fundamentally, be informed is both unreasonable and arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Rules 3 (4) and 3 (5) empower intermediaries to take down content without providing any realistic opportunity of hearing to its author. Intermediaries are accorded an adjudicatory role to the intermediary in deciding questions whether or not authors can access their fundamental right to free speech in the process. This role is ordinarily reserved for competent courts or administrative authorities, which are subject to constitutional checks and balances and a general obligation to preserve and promote fundamental rights. Assigning such functions to a self-interested private entity without any accountability whatsoever is both unreasonable as well as arbitrary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Finally&lt;/i&gt;, the Intermediary Guidelines fail to account for the public interest because they directly restrict the public’s freedom of speech and expression, without any justifiable reason, and privilege the personal and not necessarily constitutional sensitivities of private complainants instead. Rule 3(3) in effect vests an extraordinary power of censorship in intermediaries, entities which operate on the basis of private interest and outside the limits of administrative or even the most basic human rights control. Safeguards must apply to power-bearers to the degree and in the manner required in relation to the nature of the power, rather than its holder, if fundamental rights are to be legislatively preserved. While the Supreme Court in &lt;i&gt;A.K. Kraipak v. Union of India&lt;/i&gt;&lt;a href="#_ftn27"&gt;[27]&lt;/a&gt; extended the applicability of natural justice principles from judicial bodies alone and quasi-judicial bodies to administrative bodies as well, the applicability of such principles still remains limited to state entities. In other words, there is an acknowledged difficulty in applying public law standards to private, commercial entities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines thus vest the right to abridge core fundamental rights (under Articles 14, 19 and 21) in private delegates operating outside public law controls that constrain the scope in which the power can be exercised and ensure that citizen interest can be preserved. In the alternative, they also failed to provide for other safeguards to prevent abuse to the detriment of fundamental rights private delegates of governmental power, even as they granted such powers in unlimited terms. As a result, the Intermediary Guidelines evidence thoughtless, arbitrary, unreasoned and unjust state action.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vires vis á vis the Parent Act&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While it is permissible within the constitutional scheme for legislative functions of the Parliament to be delegated to a degree, they may be struck down on several grounds. In general, per &lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Express&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Newspapers&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;(Bombay)&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Pvt.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Union&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;India&lt;/i&gt;&lt;a href="#_ftn28"&gt;,[28]&lt;/a&gt; subordinate legislation can be challenged not only on any of grounds on which the parent legislation is vulnerable to challenge, but also on the grounds that it does not conform to parent statute, that it is contrary to other statutes or that it is unreasonable, in the sense that it is manifestly arbitrary. Notably, the Court also held here that subordinate legislation is liable to being struck down where it fails to conform to constitutional requirements, or, specifically that “it offends Article 14 or Article 19 (1) (a) of the Constitution”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is a well-accepted proposition that delegated legislation which travels outside the scope of its enabling law will not stand as valid. It was held in &lt;i&gt;Agricultural&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Market&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Committee&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Shalimar&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Chemical&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Works&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ltd &lt;/i&gt;&lt;a href="#_ftn29"&gt;[29]&lt;/a&gt; that a delegate cannot alter the scope of the act under which it has been it has been empowered to make rules, or even of a provision or principle included there under. In &lt;i&gt;State&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;of&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Karnataka&lt;/i&gt;&lt;i&gt; v&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Ganesh&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Kamath&lt;/i&gt;&lt;a href="#_ftn30"&gt;[30]&lt;/a&gt; the Supreme Court held that “it is a well settled principle of interpretation of statutes that the conferment of rule-making power by an Act does not enable the rule-making authority to make a rule which travels beyond the scope of the enabling Act or which is inconsistent there with or repugnant thereto”. Similarly, in &lt;i&gt;KSEB&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;v.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Indian&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Aluminium&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Company&lt;/i&gt;&lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;, it held that“subordinate legislation cannot be said to be valid unless it is within the scope of the rule making power provided in the statute”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intermediary Guidelines were enacted under Sections 79(2) and 87(2)(zg) of the Information Technology Act, 2000 (as amended). While the latter provision explicitly grants the Central Government rule-making powers by which it can lay out guidelines to be followed by intermediaries in order to comply with Section 79(2), it appears that the rules in their current form appear to have been drafted based on a misunderstanding of Section 79.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 79(2) itself merely clarifies the circumstances in which intermediaries can claim that intermediaries are not liable for content where they do not initiate the transmission of potentially actionable content or select its recipient, modify its contents and observe all necessary “due diligence” requirements under the IT Act and rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent to which the Intermediary Guidelines alter the intent and scope of section 79 (or other provisions of the IT Act, in some cases) clearly leaves them &lt;i&gt;ultra vires&lt;/i&gt; the parent statute. The specific instances of deviation by the Intermediary Guidelines from the IT Act are listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, Rule 3 (3) is ultra vires section 79 of the IT Act. Where this rule expressly prohibits the hosting, publication or initiation of transmission of content described in Rule 3 (2), section 79 does not intend any prohibition. All that it does is to waive the immunity otherwise accorded to intermediaries where the conditions specified are not satisfied. In other words, the section is optional, rather than mandatory and punitive: whether or not an intermediary can claim immunity will depend on whether it chooses to comply with section 79 (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, Rule 3 (4) requires intermediaries to take steps to disable access to within 36 hours of receiving a complaint in relation thereto. This is inconsistent with section 69B of the IT Act, which lays down in detail, the procedure to be followed to disable access to information. Since section 69B is statutory law, Rule 3 (4), being mere delegated legislation, will have to yield in its favour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, Rule 3 (7) is &lt;i&gt;ultra&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;vires&lt;/i&gt; sections 69 and 69B, and falls outside the scope of section 79 (2). Rule 3 (7) provides that intermediaries must comply with requests for information or assistance when required to do so by appropriate authorities. This provision has no relation to the contents of section 79, which regulates intermediaries’ liability for content, and under which these rules were notified. In addition, rules have already been issued under the properly relevant sections, namely sections 69 and 69B, to provide a procedure to be followed by the government for the interception, monitoring, and decryption of information held by intermediaries. Rule 3 (7) is not consistent with the rules under sections 69 and 69B, as it removes all safeguards that those rules included. Under the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption) Rules 2009, for instance, permission must be obtained from the competent authority before an intermediary can be directed to provide access to its records and facilities while Rule 3 (7) makes intermediaries answerable to virtually any request from any government agency.&lt;/p&gt;
&lt;p align="left"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Rule 3 (2) (a).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Rule 3 (2) (d).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Rule 3 (2) (b)&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 499, Indian Penal Code, 1860 (“Defamation” is defined to include both written and spoken words).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. AIR 1950 SC 124.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. AIR 1958 SC 578.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. AIR 1995 SC 1236.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].(2007) 1 SCC 170.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. AIR 1973 SC 106.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. (2011) 8 SCC 372.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. AIR 1962 SC 305, ¶31.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Supra, &lt;/i&gt;n.5.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Centre for Internet &amp;amp; Society, &lt;i&gt;Intermediary Liability in India&lt;/i&gt;&lt;i&gt;: Chilling Effects on Free Expression on the Internet 2011&lt;/i&gt; &lt;i&gt;available at&lt;/i&gt; cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet/intermediary-liability-in-india.pdf.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. UN Document no. A/HRC/17/27.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. UN Document no. A/HRC/20/.13.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. AIR 1997 SC 3011.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. AIR 1997 SC 568.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. 1978 SCR (2) 621.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. AIR 1985 SC 1416.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. AIR 1999 SC 2583.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. AIR 1974 SC 555.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. AIR 2002 SC&lt;i&gt; &lt;/i&gt;322&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. AIR 1993 SC 935&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. (2001) 7 SCC 545, 548, ¶10.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].1980 AIR 1992.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. &lt;i&gt;AIR&lt;/i&gt; 1970 SC 150.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. AIR 1986 SC 515.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. AIR 1997 SC 2502.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. (1983) 2 SCC 40.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr35" name="fn31"&gt;31&lt;/a&gt;]. AIR 1976 SC 1031.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules'&gt;https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ujwala</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-10-31T08:44:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
