<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 211 to 225.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/citizen-activism-the-past-decade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/bots-got-some-votes-home"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/hyper-connected-hyper-lonely"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/analysis-copyright-amendment-bill-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/framing-the-digital-alternatives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/vote-for-digital-natives"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/video-contest/digital-natives-contest"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/world-narrow-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/digital-natives/citizen-activism-the-past-decade">
    <title>Citizen Activism the Past Decade</title>
    <link>https://cis-india.org/digital-natives/citizen-activism-the-past-decade</link>
    <description>
        &lt;b&gt;Call for Contributions to the ‘Digital Natives with a Cause?’ newsletter, ‘Citizen Activism the Past Decade’. Deadline: August 15, 2012.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The past decade (2001 – 2011) has been marked by unprecedented democratic protests across the globe. Not only have citizens risen against autocratic regimes or systemic corruption, which is not unprecedented in itself, but also, a spark in one region inflamed solidarity among neighbouring nations to pick up the placards and march for change. Plenty has been written about the strategic deployment of social media, Web 2.0 platforms and Smart-gadgets by the digital natives (the youth and the old alike) to rewrite the rules of citizen activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this issue of the newsletter, we explore the mechanics of activism aided by media: web, social, digital, and traditional. What do we understand by a cause and how does it find resonance at the local and global platforms? Is the digital native a community player or a global citizen? How do digital natives connect, collaborate, mobilize and bring about their visions of change? The aim is to not establish or reinforce these dichotomies, if indeed they exist, but to understand the dimensions of the stage the digital natives operate on &lt;em&gt;and if that stage is a synecdoche for global youth-led civic action.&lt;/em&gt; A case in point: &lt;strong&gt;‘Slut Walk’ &lt;/strong&gt;moved from being a one-off march in Toronto to becoming a global movement and came full circle when small towns and cities across the world organized protest marches with a local ‘twist’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Topics that contributors can explore:&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;What do we understand by citizen activism? How has citizen activism changed over the last 10 years with the advent of new media tools?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Youth as 'change agents'. Are protest movements youth oriented today? How are civil rights movements of the past decade different from the wave of movements that marked the 60s? (women's lib, LGBT rights, civil rights, disability rights). Explore the mechanics of organizing, mobilizing and measuring the success of a campaign in both the cases.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Participatory Politics and Web 2.0 | Value and power of the Network in effecting change | Mobilizing support and consensus within the network |studies on politically active youth using social media | digital natives as apathetic citizens | Is Slacktivism still a misunderstood term?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kony 2012 video campaign | interviews | what went wrong and what did they do right? | Rise of DIY activism | mechanics of digital activism | resources, tools and strategies&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rise of the ‘Glocal’ (global with local resonance) cause | Slut Walk and Co – global protests inspiring local campaigns | Children of globalization with global stakes supporting local causes – how does this work?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of new media as a vehicle for civic engagement | Are new media and traditional media mutually exclusive in influencing citizen action? | How are new media strategies deployed by citizens in comparison with traditional media engagement?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Learning from past campaigns: citizen activism initiates and strategies in history that inspire modern campaigns (The ‘Walk to Work’ protest in Uganda protesting against fuel price hike and removal of subsidies is similar to Mahatma Gandhi’s &lt;em&gt;Dandi&lt;/em&gt; &lt;em&gt;March&lt;/em&gt; in pre-independence India to protest against Salt Tax).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Finding commonalities in citizen activism across Asia, Africa and Middle East | Explore the citizen action campaigns that have shaped political discourse in the past decade | Explore some of the most successful youth action campaigns of the past decade &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How do we measure value, quality and success of campaigns? When does a protest officially end? Studies that explore the life-cycle of a protest or movement &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The future of activism: new technologies, new demography, new forms of engagement | art and activism | Gamification &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of non-governmental organizations and civil society networks in fostering political change | collaboration between NGOs and social media activists / independent protesters&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State and the empowered citizen | State response to protest | surveillance and censorship&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Technologies of protest&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Studying citizen activism | digital native research methodology to study citizen activism&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;To know more about the topics you can write about, please write to: &lt;a class="external-link" href="http://mailtonilofar.ansh@gmail.com"&gt;nilofar.ansh@gmail.com&lt;/a&gt; (Nilofar Ansher, Community Manager). Contributions can be in the form of essays, notes, commentaries, reviews (book or paper), dialogues and chat transcript, poems, sketches / graphics. Essay word count between 800-1,600 words. Send your entries along with a brief bio and a profile picture by August 15, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;View previous issues of the 'Digital Natives with a Cause?' newsletter here: &lt;a href="https://cis-india.org/digital-natives/newsletter" class="external-link"&gt;http://cis-india.org/digital-natives/newsletter&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/citizen-activism-the-past-decade'&gt;https://cis-india.org/digital-natives/citizen-activism-the-past-decade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:52:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act">
    <title>Overview and Concerns Regarding the Indian Draft DNA Profiling Act</title>
    <link>https://cis-india.org/internet-governance/indian-draft-dna-profiling-act</link>
    <description>
        &lt;b&gt;The Indian Code of Criminal Procedure was amended in 2005 to enable the collection of a host of medical details from accused persons upon their arrest.  Section 53 of the Cr.PC provides that upon arrest, an accused person may be subjected to a medical examination if there are “reasonable grounds for believing” that such examination will afford evidence as to the crime.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The scope of this examination was expanded in 2005 to include “the examination of blood, blood-stains, semen, swabs in case of sexual offences, sputum and sweat, hair samples and finger nail clippings by the use of modern and scientific techniques including DNA profiling and such other tests which the registered medical practitioner thinks necessary in a particular case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Thogorani Alias K. Damayanti v. State of Orissa and Ors, 2004 Cri. LJ 4003 (Ori), the Orissa High Court affirmed the legality of ordering a DNA test in criminal cases to ascertain the involvement of persons accused. Refusal to cooperate would result in an adverse inference drawn against the accused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After weighing the privacy concerns involved, the court laid down the following considerations as relevant before the DNA test could be ordered: “(i) the extent to which the accused may have participated in the commission of the crime; (ii) the gravity of the offence and the circumstances in which it is committed; (iii) age, physical and mental health of the accused to the extent they are known; (iv) whether there are less intrusive and practical ways of collecting evidence tending to confirm or disprove the involvement of the accused in the crime; (v) the reasons, if any, for the accused for refusing consent.” Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the 2007 draft DNA Profiling Bill (hereinafter “Bill”) pending before parliament attempts to create an ambitious centralized DNA bank that would store DNA records of virtually anyone who comes within any proximity to the criminal justice system. Specifically, records are maintained of suspects, offenders, missing persons and “volunteers.” The schedule to the Bill contains an expansive list of both civil and criminal cases where DNA data can be collected including cases of abortion, paternity suits and organ transplant. In all fairness, the Bill contains provisions limiting access to and use of information contained in the database, and provides for the deletion of a person’s DNA profile upon their acquittal.&lt;/p&gt;
&lt;h2&gt;2007 Draft DNA Profiling Bill&lt;/h2&gt;
&lt;h3&gt;Preamble (§ 1)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 1 of the Bill sets out the broad policy objectives of its drafters. The most telling portion of § 1 states: “[DNA analysis] makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead without any doubt.” Bill, § 1 (emphasis added). Although it later makes mention of potential harms resulting from governmental misuse of genetic information technology, it is evident that the policy animating the Bill presupposes the objective infallibility of genetic analysis. This patent mistruth underpins the policy rationale for the Bill, and as such casts a long shadow over its substantive provisions. At the very least, it tells the reader (and perhaps one day the court) to broadly interpret the Bill’s language to favor DNA analysis as the privileged solution to investigational and prosecutorial needs.&lt;/p&gt;
&lt;h3&gt;Definitions (§ 2)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A number of the Bill’s definitions are overbroad, further expanding the scope of its later provisions. The “crime scene index” is defined to include “DNA profiles from forensic material found . . . on or within the body of any person, on anything, or at any place, associated with the commission of a specified offence.” Id., § 2(1)(vii) et seq. A “specified offence” is defined as any of a number of more serious crimes, “or any other offence specified in the Schedule [to the Bill].” The so-called “Schedule,” tucked neatly on page 34 of the Bill’s 35 pages, lists a hodgepodge of various crimes from rape, to “offences relating to dowry,” defamation, and “unnatural 3 offenses.”&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Taken together, the government is empowered to conduct genetic testing on almost anyone in any way connected with even minor infractions of the criminal law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, the crucial term “suspect” is defined as anyone “suspected of having committed an offence.” Id., § 2(1)(xxxvi). By intentionally leaving out the qualifier “specified,” the drafters’ intent is plain: to sweep within the Bill’s breadth all persons suspected of any crime whatsoever. And, accordingly, the Bill defines the “suspects index” to include “DNA profiles derived from forensic material lawfully taken from suspects.” Id., § 2(1)(xxxvix). It is hard to imagine anybody of subsequent regulation that could adequately circumscribe this manifest affront to personal privacy and bodily integrity.&lt;/p&gt;
&lt;h3&gt;DNA Profiling Board (§§3 to 13)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DNA Profiling Board (hereinafter “Board”) is responsible for administering and overseeing the Indian DNA database. §3 et seq. Among its several enumerated powers, the Board is charged with “recommend[ing] privacy protection statutes, regulations and practices relating to access to, or use of stored DNA samples or DNA analyses,” as well as “mak[ing] specific recommendations to . . . ensure the appropriate use and dissemination of DNA information [and] take any other necessary steps require to be taken to protect privacy.” §13(1)(xv) to (xvi). This provision is in lieu of any substantive principle limiting the scope of the legislation, which the bill otherwise lacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is a significant omission. As expressed in the preamble, the stated purpose of the Bill is “to enhance protection of people in the society and [the] administration of justice.” §1. Taken alone, this expresses only the government’s interest in the legislation, suggesting an ambiguously wide scope for its provisions. A substantive concept of individual privacy is required to counterbalance the interests of the government and provide protections for the equally vital privacy interests of the individual. As such, a limiting privacy principle should be included alongside the expressing in §1 of the government’s security interest. Without it, the Board will effectively have carte blanche with regard to what privacy protections are—or are not—adopted.&lt;/p&gt;
&lt;h3&gt;Approval of Laboratories (§§14 to 18)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sections 14 to 18 provide for the approval by the DNA Profiling Board of DNA laboratories that will process and analyze genetic material for eventual inclusion on the DNA database. Under §14, all laboratories must be approved in writing prior to processing or analyzing any genetic material. However, a conflicting provision appears in the next section, §15(2), which permits DNA laboratories in existence at the time the legislation is enacted to process or analyze DNA samples immediately, without first obtaining approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either an oversight on the part of the drafters, or the product of overly-vague language, the result is that established genetic laboratories—including whatever genetic material or profiles they may already have for whatever reason—are in effect “grandfathered” into the system. The only review of these laboratories is the post hoc approval of the laboratory by the DNA profiling board. The potential for abuse and error that this conflict of provisions would be best addressed in keeping with the rule articulated in §14, i.e. correcting the language of §15(2) that allows for laboratories to be “grandfathered” into the system.&lt;/p&gt;
&lt;h3&gt;Standards, Obligations of DNA Laboratory (§§19 to 28)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V, which concerns the obligations of and the standards to be observed by approved DNA laboratories, lacks adequate administrative provisions. For example, §22 requires that labs ensure “adequate security” to minimize contamination without providing for accountability in the event of contamination. Similarly, §28 provides for audits of DNA laboratories only, withholding from similar scrutiny of the DNA Profiling Board itself.&lt;/p&gt;
&lt;h3&gt;National DNA Database (§§33 to 37)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition on one national DNA database, the Bill sanctions the several Indian states to maintain their own DNA databases, provided these state-level databases forward copies of their content to the national database. Id., § 33(3). The national database is envisioned to comprise several sub-databases, each to contain the genetic information of a subset of persons/samples, namely: (1) unidentified crime scene samples, (2) samples taken from suspects, (3) samples taken from persons convicted or currently subject to prosecution for “subject offences,” (4) samples associated with missing persons, (5) samples taken from unidentified bodies, (6) samples taken from “volunteers,”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and finally (7) samples taken for reasons “as may be specified by regulations. Id., § 33(4) et seq. Putting to one side the breadth of persons subject to inclusion under subcategories (1) through (6), subsection (7) appears on its face to be a “catch all” provision, leaving one only to guess at the circumstances under which its specificities may be promulgated. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A close reading of § 33(6) strongly suggests that the agency &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;conducting conducting the forensic analyses and populating the DNA database shall retain the DNA samples thereafter. This section reads in relevant part:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DNA Data Bank shall contain . . . the following information, namely: (i) in the case of a profile in the offenders index, the identity of the person from whose body substance or body substances the profile was derived, and (ii) in case of all other profiles, the case reference number of the investigation associated with the body substance or body substances from which the profile was derived. Id., § 33(6).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rather than choose to link the DNA profile data to a specific offender or case, the drafters of the Bill instead like the “body substance or body substances” with that specific offender or case. Whether sloppy drafting or clever nuance, this provision elides the DNA profile with the DNA sample, injecting unneeded—and potentially harmful—ambiguity into the proposed law.&lt;/p&gt;
&lt;h3&gt;Confidentiality, Access to DNA Profiles, Samples, and Records (§§ 38-44)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Further compounding this ambiguity, § 36 entitled “Access to Information” opens the door to much more than DNA profiles alone being kept on the government database. In all three of its subsections it purports to govern access to “the information” contained in the database, not “the DNA profiles” contained in the database. Id., § 36(1) et seq. Subsection 2 employs even broader language, covering “the information in the offenders’ index pertaining to a convict.” Id. Taken at face value, this provision of the Bill suggests that any and all sort of “information . . . pertaining to a convict” that might be derived from his or her DNA can be stored on the database. Even if prudential oversight provisions elsewhere in the Bill suggests a tightly-controlled techno-forensic apparatus, the overbroad construction of provisions such as §§ 33 and 36 raise significant questions about the wisdom of enacting the text in this form.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two further provisions regarding access to the database warrant close scrutiny. First, §§ 39 and 40 purport to confer upon the police direct access to all of the information contained in the national DNA database. While administratively expedient, this arrangement opens up the possibility for misuse. A more prudent system would place the Board (or some administrative subordinate portion thereof) between the police and the content of the DNA database, with the latter having to make specific and particular requests to the former. This would minimize the risks inherent in the more expansive model of database access the bill currently envisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, and more concerning, § 41 permits the Data Bank Manager to grant access to the database to “any person or class of persons that the Data Bank Manager considers appropriate.” This is a sweeping provision. It vests in one individual the ability to permit almost anyone access to the DNA database—without administrative review or oversight of any kind. Taken together with the general lack of administrative safeguards in the bill, § 41 again places the government’s interest in investigating crime far above individual privacy rights.&lt;/p&gt;
&lt;h3&gt;Omissions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Most notably, the bill specifically excludes a private cause of action for the unlawful collection of DNA, or for the unlawful storage of private information on the national DNA database. Nor does the bill grant an individual right to review one’s personal data contained on the database. Without these two key features, there is effectively no check against the unlawful collection, analysis, and storage of private genetic information on the database.&lt;/p&gt;
&lt;h3&gt;Best Practices Analysis&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Collection of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;With consent: only for a specific investigation (e.g. from a victim or for elimination purposes). Volunteers should not have information entered on a database&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Without consent: only from persons suspected of a crime for which DNA evidence is directly relevant i.e. a crime scene sample exists or is likely to exist. Or, broader categories?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requirement for an order by a court? Or allowed in other circumstances?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Samples collected by police officers, or only medical professionals? Must take place in a secure location i.e. not on the street etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Provision of information for all persons from whom DNA is taken&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scenes should be promptly examined if DNA evidence is likely to be relevant, and quality assurance procedures must protect against contamination of evidence&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Analysis of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Should take place only in laboratories with quality assurance&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Laboratories should be independent of police&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Profiling standards must be sufficient to minimise false matches occurring by chance. This must take account of increased likelihood of false matches in transboundary searches, and with relatives.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Storage of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Data from convicted persons should be separate from others e.g. missing persons’ databases&lt;/td&gt;
&lt;td&gt;Unclear&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Access to databases and samples must be restricted and there must be an independent and transparent system of governance, with regular information published e.g. annual reports, minutes of oversight meetings&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Access to database at discretion of DNA Data Bank Manager&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Personal identification information should not be sent with samples to laboratories&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Any transfer of data e.g. from police station to lab or database, must be secure&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;User Samples and Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses should be restricted to anonymised verification of database performance (e.g. checking false matches etc.). Third party access to data for such purposes should be allowed, provided public information on research projects is published. There should be an ethics board.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses for other purposes e.g. health research, behavioural research should not be allowed.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Uses should be restricted by law to solving crimes or identifying dead bodies/body parts. Identification of a person is not an acceptable use. Missing persons databases (if they exist) should be separate from police databases.&lt;/td&gt;
&lt;td style="text-align: left; "&gt;Ambiguous provisions suggest much wider scope&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Familial searching should be restricted e.g. ordered by a court? Or not used? Or regulated for use in special cases?&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Destruction of DNA and Linked Datas&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them, allowing for sufficient time for quality assurance, e.g. six months&lt;/td&gt;
&lt;td&gt;DNA samples are retained&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;An automatic removals process is required for deletion of data from innocent persons. This must take place within a reasonable time of acquittal etc.&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;There should be limits on retention of DNA profiles from persons convicted of minor crimes&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;There should be an appeals process against retention of data&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Linked data on other databases (e.g. police record of arrest, fingerprints) should be deleted at the same time as DNA database records&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scene DNA evidence should be retained for as long as a reinvestigation might be needed (including to address miscarriages of justice)&lt;/td&gt;
&lt;td&gt;DNA evidence permitted to be retained indefinitely&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Use in Court&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to have a second sample taken from them and reanalysed as a check&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Expert evidence and statistics must not misrepresent the role and value of the DNA evidence in relation to the crime&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Other&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Relevant safeguards must be proscribed by law and there should be appropriate penalties for abuse&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Impacts on children and other vulnerable persons (e.g. mentally ill) must be considered&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Potential for racial bias must be minimised&lt;/td&gt;
&lt;td&gt;No provision&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. No examples are given as to which unnatural offences are intended, leaving the reader wondering. Perhaps a DNA test of witchcraft?&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 15(2) does mandate that such laboratories petition the DNA Profiling Board for approval within six months after the legislation is enacted.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].Per § (2)(1)(xxxxiii) of the Definitions, a “volunteer” is “a person who volunteers to undergo a DNA procedure.” The definition does not require that the “volunteer” be informed of the nature, purpose, or possible consequences of his generosity; nor is any such requirement specified elsewhere in the Bill.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].Or, as is laid out in great detail in §§ 14-32, at the privately-contracted forensics laboratory.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: § is a symbol for 'section'.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/indian-draft-dna-profiling-act'&gt;https://cis-india.org/internet-governance/indian-draft-dna-profiling-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>GeneWatch UK &amp; the Council for Responsible Genetics, US</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-07-11T11:30:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/bots-got-some-votes-home">
    <title>The Bots That Got Some Votes Home</title>
    <link>https://cis-india.org/digital-natives/bots-got-some-votes-home</link>
    <description>
        &lt;b&gt;Nilofar Ansher gives us some startling updates on the "Digital Natives Video Contest" voting results declared in May 2012, in this blog post.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;It was a hint of suspicion raised by one of our colleagues at the Centre for Internet &amp;amp; Society that spurred our Web Analytics team to check into the voting activity of the contest that was all about the ‘&lt;a href="https://cis-india.org/digital-natives/vote-for-digital-natives" class="external-link"&gt;Everyday Digital Native&lt;/a&gt;’. And while we acknowledged and celebrated the ‘digital’ in the native (users of technology), we forgot the human part that the digital has to engage with. Following weeks of deliberations, we now have conclusive evidence that points to irregularities in voting numbers of the Top 10 contestants. We are now staring at the elephant in the room: those innocuous little automated scripts we sweetly nicknamed, ‘bots’.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Internet bots, also known as web robots or simply bots, are software applications that run automated tasks over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering, in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. Each server can have a file called robots.txt, containing rules for the spidering of that server that the bot is supposed to obey. In addition to their uses outlined above, bots may also be implemented where a response speed faster than that of humans is required (e.g., gaming bots and auction-site robots) or less commonly in situations where the emulation of human activity is required, for example chat bots (Source: Wikipedia).&lt;/p&gt;
&lt;h3&gt;What irregularities?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;You would see how a script or bot would have played a role in ‘automating’ the votes for a video. The Top 10 videos received a combined voting number of 20,000+. The discrepancy occurs at the juncture where the votes polled on the front end (the webpage where the contestant video was visible to the public) did not match with the number of hits the page received on the backend (this is the analytics part). For instance, the top polled video has some few thousand votes more than the number of people who actually visited our CIS website in the same duration. This prompted a review of the logs and the possible “hand” of a nonhuman agent acting on its human creator’s command to drive up the votes.&lt;/p&gt;
&lt;h3&gt;How was this done? The Technicalities&lt;/h3&gt;
&lt;p&gt;The following graph shows the extremely high level of voting requests just before the closing date (March 31, 2012). This would not be extraordinary except for the fact that two or three entries had an exceptionally higher vote count relative to their page views as per the analytics statistics.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/scripted-voting-report/quickhist_march_april.png" alt="null" class="image-inline" title="Voting requests by date" /&gt;&lt;/p&gt;
&lt;h3&gt;Analysis of the voting against the http requests for the voting link against page views&lt;/h3&gt;
&lt;div&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr style="text-align: center;"&gt;
&lt;th&gt;
&lt;p&gt;Entry&lt;/p&gt;
&lt;/th&gt;
&lt;th&gt;Actual Votes Recorded (1)&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Direct http requests to votes (2)&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;http requests for&amp;nbsp; normal page view access (3)&lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Recommended adjusted vote count (4)&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/digital-media-dance" class="internal-link"&gt;Digital Dance&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;268&lt;/td&gt;
&lt;td&gt;448&lt;/td&gt;
&lt;td&gt;198&lt;/td&gt;
&lt;td&gt;&lt;span class="visualHighlight"&gt;198&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/big-stories-small-towns" class="internal-link"&gt;Big Stories, Small Town&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;112&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/digital-natives-contest/entries/connecting-souls-bridging-dreams" class="internal-link"&gt;Connecting Souls, Bridging Dreams&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;1113&lt;/td&gt;
&lt;td&gt;2018&lt;/td&gt;
&lt;td&gt;1685&lt;/td&gt;
&lt;td&gt;1113&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/finalist-summary/deployed" class="internal-link"&gt;Deployed&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;191&lt;/td&gt;
&lt;td&gt;479&lt;/td&gt;
&lt;td&gt;195&lt;/td&gt;
&lt;td&gt;191&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p class="internal-link"&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/from-the-wild-into-the-digital-world" class="internal-link"&gt;From The Wild Into The Digital World&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;10317&lt;/td&gt;
&lt;td&gt;11880&lt;/td&gt;
&lt;td&gt;810&lt;/td&gt;
&lt;td&gt;&lt;span class="visualHighlight"&gt;810&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/i-am-a-ghetto-digital-native" class="internal-link"&gt;I Am A Ghetto Digital Native&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;321&lt;/td&gt;
&lt;td&gt;365&lt;/td&gt;
&lt;td&gt;844&lt;/td&gt;
&lt;td&gt;321&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/life-in-the-city-slums" class="internal-link"&gt;Life in the City Slums&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;94&lt;/td&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/who-is-a-digital-native" class="internal-link"&gt;Digital Natives&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;111&lt;/td&gt;
&lt;td&gt;328&lt;/td&gt;
&lt;td&gt;102&lt;/td&gt;
&lt;td&gt;&lt;span class="visualHighlight"&gt;102&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/with-no-distinction" class="internal-link"&gt;With No Distinction&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;369&lt;/td&gt;
&lt;td&gt;557&lt;/td&gt;
&lt;td&gt;1232&lt;/td&gt;
&lt;td&gt;369&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right;"&gt;
&lt;td&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/digital-coverage-in-a-digital-world" class="internal-link"&gt;Digital Coverage in a Digital World&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;9622&lt;/td&gt;
&lt;td&gt;13650&lt;/td&gt;
&lt;td&gt;181&lt;/td&gt;
&lt;td&gt;&lt;span class="visualHighlight"&gt;181&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;span class="internal-link"&gt; &lt;/span&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;These are the public votes displayed on the contestant’s page through the thumbs up icon&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;These are http requests to the voting link against each video when the user clicked on the thumbs up icon.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;These are http requests which are collectively related to the video  page (page view). A normal human user would browse through a page first,  which downloads some other urls, such as the HTML for the page,  JavaScript, images, and so on. A normal vote request would be included  collectively. A direct http request to the voting link on the other hand  does not do this, and only makes a specific request to vote without  downloading the other parts that make up the page.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A normal human vote count should be the same or less than the number  of page views. Only three videos highlighted show abnormal behaviour  and it is recommended these be adjusted to the page view counts.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Are you saying contestants cheated?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;While the use of programming scripts to accrue votes is no new tactic  and we should, in fact, have a more robust mechanism to monitor such  activity during a contest, we cannot prove the culpability of the human  agents. The contestants might be innocent actors with overzealous  friends or colleagues who ran the voting scripts. As of now, since there  is no way to ascertain their part in this irregularity, it’s best we  give them the benefit of the doubt. What comes through loud and clear is  that once you do away with the scripted votes, four contestants still  manage to have enough votes to maintain their positions in the final  five. In the fifth position, we now have a contestant from the top ten  finalists, who has secured the requisite votes (after vote adjustment)  to propel him into the final five.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;‘Digital Dance’ (Cijo Abraham), ‘From the Wild into the Digital  World’ (John Musila) and ‘Digital Coverage in a Digital World’ (T.J.  Burks) had additional vote url counts than page views. It is recommended  that the total votes for these videos be adjusted to the page view  counts, and not the actual vote counts as displayed on their individual  web pages (thumbs up icon) during the voting period.&lt;/p&gt;
&lt;p&gt;The rankings of the adjusted voting would now read as:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Connecting Souls, Bridging Dreams – Marie Jude Bendiola (1113)&lt;/li&gt;
&lt;li&gt;From The Wild Into The Digital World - John Musila (810)&lt;/li&gt;
&lt;li&gt;With No Distinction - T.J. K. M. (369)&lt;/li&gt;
&lt;li&gt;I Am A Ghetto Digital Native – MJ (321)&lt;/li&gt;
&lt;li&gt;Digital Dance – Cijo Abraham (198)&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Transparency at CIS&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;‘The Digital Natives with a Cause?’ research inquiry is shaped around  concerns of transparency, equity and community accountability. In our  research methods as well as in outputs of the different activities, we  have always maintained a complete transparency of decision making  processes as well as in depending upon the incredible people we work  with to help us learn, grow and reflect openly on the concerns that we  have been engaged with. We strive to follow this method and in  publishing these statistics, we want to ensure that there is complete  transparency about the votes that were accrued and how the final winners  were selected. We also take this opportunity as a learning experience  to re-think the question of the non-human actors in our networks and  further about the nature of participation and reputation online. We hope  that the publishing of these results will help answer any inquiries on  how the process unfolded.&lt;/p&gt;
&lt;h3&gt;View Logs and Source Code&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/scripted-voting-report/logs-during-voting-period" class="external-link"&gt;All logs from the web server for this period&lt;/a&gt; (24.7MB) Identical IPs are from caching server.&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.cis-india.org/digital-natives/video-contest/scripted-voting-report/main.R"&gt;R script to evaluate data for table&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;What next?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Since we spotted the error in time, we haven’t disbursed the prize  money of EUR 500 to each of the Top 5 contestants. They will now receive  the prize along with a chance to participate in the Digital Native  workshop-cum-Webinar, slated to be held in July 2012. The top 10 videos  will be showcased in this event.&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/bots-got-some-votes-home'&gt;https://cis-india.org/digital-natives/bots-got-some-votes-home&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:56:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/hyper-connected-hyper-lonely">
    <title>Hyper-connected, Hyper-lonely?</title>
    <link>https://cis-india.org/digital-natives/hyper-connected-hyper-lonely</link>
    <description>
        &lt;b&gt;The Digital Natives newsletter, part of the 'Digital Natives with a Cause?' project, invites contributions to its April-May 2012 double issue. &lt;/b&gt;
        
&lt;p&gt;The April issue puts the spotlight on an emerging trope in society and media: the more connected we are to our gadgets, peer network and social media, the lonelier we feel. The debate, which traces its opening volley to Sherry Turkle's book 'Alone Together', will look at the recurrent media commentary that points to pop-surveys, anecdotes from psychologists, and conscientious academics who talk about increasing isolation among heavy gadget users. Since our gadgets are more often than not net enabled, it doesn't take a giant leap to infer that people who spend a lot of time online count themselves as part of the Lonely Hearts Club. Is loneliness a peculiarly modern phenomenon? &lt;br /&gt;Editor: Shobha Vadrevu&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the May issue, we look at a technology that was considered sci-fi a decade ago, but is now the next best thing since our Smartphones: Augmented Reality. How do scientists and geeks go about augmenting our reality? How inspirational have movies (remember Minority Report) been in engaging imagination with what is commonplace and common sense? Does Google Glass excite you or scare you senseless? Would you still make distinctions between the virtual world and the real one? &lt;br /&gt;Editor: Nilofar Ansher&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We invite short pieces, lengthy reflections, haikus and verses, cartoons, graphics, videos, and other forms of creative expressions for both the issues. Deadline: June 21, 2012. For more information, email: &lt;a class="external-link" href="mailto:nilofar.ansh@gmail.com"&gt;nilofar.ansh@gmail.com&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/hyper-connected-hyper-lonely'&gt;https://cis-india.org/digital-natives/hyper-connected-hyper-lonely&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:57:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/analysis-copyright-amendment-bill-2012">
    <title>Analysis of the Copyright (Amendment) Bill 2012</title>
    <link>https://cis-india.org/a2k/blogs/analysis-copyright-amendment-bill-2012</link>
    <description>
        &lt;b&gt;There are some welcome provisions in the Copyright (Amendment) Bill 2012, and some worrisome provisions.  Pranesh Prakash examines five positive changes, four negative ones,  and notes the several missed opportunities. The larger concern, though, is that many important issues have not been addressed by these amendments, and how copyright policy is made without evidence and often out of touch with contemporary realities of the digital era.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://164.100.24.219/BillsTexts/RSBillTexts/PassedRajyaSabha/copy-E.pdf"&gt;Copyright (Amendment) Bill 2012&lt;/a&gt; has been passed by both Houses of Parliament, and will become law as soon as the President gives her assent and it is published in the Gazette of India. While we celebrate the passage of some progressive amendments to the Copyright Act, 1957 — including an excellent exception for persons with disabilities — we must keep in mind that there are some regressive amendments as well. In this blog post, I will try to highlight those provisions of the amendment that have not received much public attention (unlike the issue of lyricists’ and composers’ ‘right to royalty’).&lt;/p&gt;
&lt;h2&gt;Welcome Changes&lt;/h2&gt;
&lt;h3&gt;Provisions for Persons with Disabilities&lt;/h3&gt;
&lt;p&gt;India now has amongst the most progressive exception for persons with disabilities, alongside countries like Chile. Under the amendments, sections 51(1)(zb) and 31B carve out exceptions and limitations for persons with disabilities. Earlier s.52(1)(zb) dealt only with formats that were “special designed only for the use of persons suffering from visual, aural, or other disabilities”. Thanks to a campaign mounted by disability rights groups and public interest groups such as CIS, it now covers “any accessible format”. Section 52(1)(zb) allows any person to facilitate access by persons with disabilities to copyrighted works without any payment of compensation to the copyright holder, and any organization working the benefit of persons with disabilities to do so as long as it is done on a non-profit basis and with reasonable steps being taken to prevent entry of reproductions of the copyrighted work into the mainstream. Even for-profit businesses are allowed to do so if they obtain a compulsory licence on a work-by-work basis, and pay the royalties fixed by the Copyright Board. The onerousness of this provision puts its utility into question, and this won’t disappear unless the expression “work” in s.31B is read to include a class of works.&lt;/p&gt;
&lt;p&gt;Given that the Delhi High Court has — wrongly and &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Per_incuriam"&gt;per incuriam&lt;/a&gt;, since it did not refer to s.14(a)(ii) as it was amended in 1994 — held parallel importation to be barred by the Copyright Act, it was important for Parliament to clarify that the Copyright Act in fact follows international exhaustion. Without this, even if any person can facilitate access for persons with disabilities to copyrighted works, those works are restricted to those that are circulated in India. Given that not many books are converted into accessible formats in India (not to mention the costs of doing so), and given the much larger budgets for book conversion in the developed world, this is truly restrictive.&lt;/p&gt;
&lt;h3&gt;Extension of Fair Dealing to All Works&lt;/h3&gt;
&lt;p&gt;The law earlier dealt with fair dealing rights with regard to “literary, dramatic, musical or artistic works”. Now it covers all works (except software), in effect covering sound recordings and video as well. This will help make personal copies of songs and films, to make copies for research, to use film clips in classrooms, etc.&lt;/p&gt;
&lt;h3&gt;Creative Commons, Open Licensing Get a Boost&lt;/h3&gt;
&lt;p&gt;The little-known s.21 of the Copyright Act, which deals with the right of authors to relinquish copyright, has been amended. While earlier one could only relinquish parts of one’s copyright by submitting a form to the Registrar of Copyrights, now a simple public notice suffices. Additionally, s.30 of the Act, which required licences to be in writing and signed, now only requires it to be in writing. This puts Creative Commons, the GNU Public Licence, and other open licensing models, on a much surer footing in India.&lt;/p&gt;
&lt;h3&gt;Physical Libraries Should Celebrate, Perhaps Virtual Libraries Too&lt;/h3&gt;
&lt;p&gt;Everywhere that the word “hire” occurs (except s.51, curiously), the word “commercial rental” has been substituted. This has been done, seemingly, to bring India in conformance with the WIPO Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty (WPPT). The welcome side-effect of this is that the legality of lending by non-profit public libraries has been clarified. The amendment states:&lt;/p&gt;
&lt;p class="discreet"&gt;"2(1)(fa) “commercial rental” does not include the rental, lease or lending of a lawfully acquired copy of a computer programme, sound recording, visual recording or cinematograph film for non-profit purposes by a non-profit library or non-profit educational institution."&lt;/p&gt;
&lt;p&gt;Even after this, the overwhelming majority of the ‘video lending libraries’ that you see in Indian cities and towns continue to remain illegal.&lt;/p&gt;
&lt;p&gt;Another welcome provision is the amended s.52(1)(n), which now allows “non-commercial public libraries” to store an electronic copy of a work if it already has a physical copy of the work. However, given that this provision says that the storage shall be “for preservation”, it seems limited. However, libraries might be able to use this — in conjunction with the fact that under s.14 of the Copyright Act lending rights of authors is limited to “commercial rental” and s.51(b) only covers lending of “infringing copies” — to argue that they can legally scan and lend electronic copies of works in the same manner that they lend physical copies. Whether this argument would succeed is unclear. Thus, India has not boldly gone where the European Commission is treading with talks of a European Digital Library Project, or where scholars in the US are headed with the Digital Public Library of America. But we might have gone there quietly. Thus, this amendment might help foster an Indian &lt;a class="external-link" href="http://internetarchive.org/"&gt;Internet Archive&lt;/a&gt;, or help spread the idea of the &lt;a class="external-link" href="http://openlibrary.org/"&gt;Open Library&lt;/a&gt; in India.&lt;/p&gt;
&lt;p&gt;On a final note, different phrases are used to refer to libraries in the amendment. In s.2(1)(fa), it talks about "non-profit library"; in s.52(1)(n) and (o), it refers to "non-commercial public library"; and in s.52(1)(zb), it talks of "library or archives", but s.52(1)(zb) also requires that the works be made available on a "non-profit basis". The differentiation, if any, that is sought to be drawn between these is unclear.&lt;/p&gt;
&lt;h3&gt;Limited Protection to Some Internet Intermediaries&lt;/h3&gt;
&lt;p&gt;There are two new provisions, s.52(1)(b) and 52(1)(c), which provide some degree of protection to 'transient or incidental' storage of a work or performance. Section 52(1)(b) allows for "the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public", hence applying primarily to Internet Service Providers (ISPs), VPN providers, etc. Section 52(1)(c) allows for "transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy". This seems to make it applicable primarily to search engines, with other kinds of online services being covered or not covered depending on one’s interpretation of the word 'incidental'.&lt;/p&gt;
&lt;h3&gt;Compulsory Licensing Now Applies to Foreign Works Also&lt;/h3&gt;
&lt;p&gt;Sections 31 ("compulsory licence in works withheld from public") and 31A ("compulsory licence in unpublished Indian works") used to apply to Indian works. Now they apply to all works, whether Indian or not (and now s.31A is about "compulsory licence in unpublished or published works", mainly orphan works). This is a welcome amendment, making foreign works capable of being licensed compulsorily in case it is published elsewhere but withheld in India. Given how onerous our compulsory licensing sections are, especially sections 32 and 32A (which deal with translations, and with literary, scientific or artistic works), it is not a surprise that they have not been used even once. However, given the modifications to s.31 and s.31A, we might just see those starting to be used by publishers, and not just radio broadcasters.&lt;/p&gt;
&lt;h2&gt;Worrisome Changes&lt;/h2&gt;
&lt;h3&gt;Term of Copyright for Photographs Nearly Doubled&lt;/h3&gt;
&lt;p&gt;The term of copyright for photographs has now gone from sixty years from publication to sixty years from the death of the photographer. This would mean that copyright in a photograph clicked today (2012) by a 20 year old who dies at the 80 will only expire on January 1, 2133. This applies not only to artistic photographs, to all photographs because copyright is an opt-out system, not an opt-in system. Quite obviously, most photoshopping is illegal under copyright law.&lt;/p&gt;
&lt;p&gt;This has two problems. First, there was no case made out for why this term needed to be increased. No socio-economic report was commissioned on the effects of such a term increase. This clause was not even examined by the Parliamentary Standing Committee. While the WCT requires a ‘life + 50′ years term for photographs, we are not signatories to the WCT, and hence have no obligation to enforce this. We are signatories to the Berne Convention and the TRIPS Agreement, which require a copyright term of 25 years for photographs. Instead, we have gone even above the WCT requirement and provide a life + 60 years term.&lt;/p&gt;
&lt;p&gt;The second problem is that it is easier to say when a photograph was published than to say who the photographer was and when that photographer died. Even when you are the subject of a photograph, the copyright in the photograph belongs to the photographer. Unless a photograph was made under commission or the photographer assigned copyright to you, you do not own the copyright in the photographs. (Thanks to &lt;a href="http://deviantlight.blogspot.com"&gt;Bipin Aspatwar&lt;/a&gt;, for pointing out a mistake in an earlier version, with "employment" and "commission" being treated differently.) This will most definitely harm projects like Wikipedia, and other projects that aim at archiving and making historical photographs available publicly, since it is difficult to say whether the copyright in a photograph still persists.&lt;/p&gt;
&lt;h3&gt;Cover Versions Made More Difficult: Kolaveri Di Singers Remain Criminals&lt;/h3&gt;
&lt;p&gt;The present amendments have brought about the following changes, which make it more difficult to produce cover versions:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Time period after which a cover version can be made has increased from 2 years to 5 years.&lt;/li&gt;
&lt;li&gt;Requirement of same medium as the original. So if the original is on a cassette, the cover cannot be released on a CD.&lt;/li&gt;
&lt;li&gt;Payment has to be made in advance, and for a minimum of 50000 copies. This can be lowered by Copyright Board having regard to unpopular dialects.&lt;/li&gt;
&lt;li&gt;While earlier it was prohibited to mislead the public (i.e., pretend the cover was the original, or endorsed by the original artists), now cover versions are not allowed to "contain the name or depict in any way any performer of an earlier sound recording of the same work or any cinematograph film in which such sound recording was incorporated".&lt;/li&gt;
&lt;li&gt;All cover versions must state that they are cover versions.&lt;/li&gt;
&lt;li&gt;No alterations are allowed from the original song, and alteration is qualified as ‘alteration in the literary or musical work’. So no imaginative covers in which the lyrics are changed or in which the music is reworked are allowed without the copyright owners’ permission. Only note-for-note and word-for-word covers are allowed.&lt;/li&gt;
&lt;li&gt;Alterations were allowed if they were "reasonably necessary for the adaptation of the work" now they are only allowed if it is "technically necessary for the purpose of making of the sound recording".&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;This ignores present-day realities. Kolaveri Di was covered numerous times without permission, and each one of those illegal acts helped spread its popularity. The singers and producers of those unlicensed versions could be jailed under the current India Copyright Act, which allows even non-commercial copyright infringers to be put behind bars. Film producers and music companies want both the audience reach that comes from less stringent copyright laws (and things like cover versions), as well as the ability to prosecute that same behaviour at will. It is indeed ironic that T-Series, the company that broke HMV’s stranglehold over the Indian recording market thanks to cover versions, is itself one of the main movers behind ever-more stringent copyright laws.&lt;/p&gt;
&lt;h3&gt;Digital Locks Now Provided Legal Protection Without Accountability&lt;/h3&gt;
&lt;p&gt;As I have covered the issue of Technological Protection Measures (TPM) and Rights Management Information (RMI), which are ‘digital locks’ also known as Digital Rights Management (DRM), &lt;a href="https://cis-india.org/a2k/blogs/tpm-copyright-amendment" class="external-link"&gt;in great detail earlier&lt;/a&gt;, I won’t repeat the arguments at length. Very briefly:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;It is unclear that anyone has been demanding the grant of legal protection to DRMs in India, and We have no obligation under any international treaties to do so. It is not clear how DRM will help authors and artists, but it is clear how it will harm users.&lt;/li&gt;
&lt;li&gt;While the TPM and RMI provisions are much more balanced than the equivalent provisions in laws like the US’s Digital Millennium Copyright Act (DMC), that isn’t saying much. Importantly, while users are given certain rights to break the digital locks, they are helpless if they aren’t also provided the technological means of doing so. Simply put: music and movie companies have rights to place digital locks, and under some limited circumstances users have the right to break them. But if the locks are difficult to break, the users have no choice but to live with the lock, despite having a legal right.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Removal of Parallel Importation&lt;/h3&gt;
&lt;p&gt;In past blog posts I have covered &lt;a href="https://cis-india.org/a2k/blogs/parallel-importation-of-books" class="external-link"&gt;why allowing parallel imports makes sense in India&lt;/a&gt;. And as explained above, the Delhi High Court acted per incuriam when holding that the Copyright Act does not allow parallel importation. The Copyright Act only prohibits import of infringing copies of a work, and a copy of a book that has been legally sold in a foreign country is not an “infringing copy”. The government was set to introduce a provision making it clear that parallel importation was allowed. The Parliamentary Standing Committee heard objections to this proposal from a foreign publishers’ association, but decided to recommend the retention of the clause. Still, due to pressure from a few publishing companies whose business relies on monopolies over importation of works into India, the government has decided to delete the provision. However, thankfully, the HRD Minister, Kapil Sibal, has assured both houses of Parliament that he will move a further amendment if an&lt;a class="external-link" href="http://www.ncaer.org/"&gt; NCAER&lt;/a&gt; report he has commissioned (which will be out by August or September) recommends the introduction of parallel imports.&lt;/p&gt;
&lt;h3&gt;Expansion of Moral Rights Without Safeguards&lt;/h3&gt;
&lt;p&gt;Changes have been made to author’s moral rights (and performer’s moral rights have been introduced) but these have been made without adequate safeguards. The changes might allow the legal heir of an author, artist, etc., to object to ‘distortion, mutilation, modification, or other act’ of her ancestors work even when the ancestor might not have. By this amendment, this right continues in perpetuity, even after the original creator dies and even after the work enters into the public domain. It seems Indian policymakers had not heard of &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Stephen_James_Joyce"&gt;Stephen Joyce&lt;/a&gt;, the grandson of James Joyce, who has “brought numerous lawsuits or threats of legal action against scholars, biographers and artists attempting to quote from Joyce’s literary work or personal correspondence”. Quoting from his Wikipedia page:&lt;/p&gt;
&lt;p class="callout"&gt;In 2004, Stephen threatened legal action against the Irish government when the Rejoyce Dublin 2004 festival proposed public reading of excerpts of Ulysses on Bloomsday. In 1988 Stephen Joyce burnt a collection of letters written by Lucia Joyce, his aunt. In 1989 he forced Brenda Maddox to delete a postscript concerning Lucia from her biography Nora: The Real Life of Molly Bloom. After 1995 Stephen announced no permissions would be granted to quote from his grandfather’s work. Libraries holding letters by Joyce were unable to show them without permission. Versions of his work online were disallowed. Stephen claimed to be protecting his grandfather’s and families reputation, but would sometimes grant permission to use material in exchange for fees that were often "extortionate".&lt;/p&gt;
&lt;p&gt;Because in countries like the UK and Canada the works of James Joyce are now in the public domain, Stephen Joyce can no longer restrict apply such conditions. However now, in India, despite James Joyce’s works being in the public domain, Stephen Joyce’s indefensible demands may well carry legal weight.&lt;/p&gt;
&lt;h3&gt;Backdoor Censorship&lt;/h3&gt;
&lt;p&gt;As noted above, the provision that safeguard Internet intermediaries (like search engines) is very limited. However, that provision has an extensive removal provision:&lt;/p&gt;
&lt;p class="callout"&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;&lt;/p&gt;
&lt;p&gt;There are two things to be noted here. First, that without proof (or negative consequences for false complaints) the service provider is mandated to prevent access to the copy for 21 day. Second, after the elapsing of 21 days, the service provider may 'put back' the content, but is not mandated to do so. This would allow people to file multiple frivolous complaints against any kind of material, even falsely (since there is no penalty for false compalaints), and keep some material permanently censored.&lt;/p&gt;
&lt;h2&gt;Missed Opportunities&lt;/h2&gt;
&lt;h3&gt;Fair Dealing Guidelines, Criminal Provisions, Government Works, and Other Missed Opportunities&lt;/h3&gt;
&lt;p&gt;The following important changes should have been made by the government, but haven’t. While on some issues the Standing Committee has gone beyond the proposed amendments, it has not touched upon any of the following, which we believe are very important changes that are required to be made.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Criminal provisions: Our law still criminalises individual, non-commercial copyright infringement. This has now been extended to the proposal for circumvention of Technological Protection Measures and removal of Rights Management Information also.&lt;/li&gt;
&lt;li&gt;Fair dealing guidelines: We would benefit greatly if, apart from the specific exceptions provided for in the Act, more general guidelines were also provided as to what do not constitute infringement. This would not take away from the existing exceptions, but would act as a more general framework for those cases which are not covered by the specific exceptions.&lt;/li&gt;
&lt;li&gt;Government works: Taxpayers are still not free to use works that were paid for by them. This goes against the direction that India has elected to march towards with the Right to Information Act. A simple amendment of s.52(1)(q) would suffice. The amended subsection could simply allow for “the reproduction, communication to the public, or publication of any government work” as being non-infringing uses.&lt;/li&gt;
&lt;li&gt;Copyright terms: The duration of all copyrights are above the minimum required by our international obligations, thus decreasing the public domain which is crucial for all scientific and cultural progress.&lt;/li&gt;
&lt;li&gt;Educational exceptions: The exceptions for education still do not fully embrace distance and digital education.&lt;/li&gt;
&lt;li&gt;Communication to the public: No clear definition is given of what constitute a ‘public’, and no distinction is drawn between commercial and non-commercial ‘public’ communication.&lt;/li&gt;
&lt;li&gt;Internet intermediaries: More protections are required to be granted to Internet intermediaries to ensure that non-market based peer-production projects such as Wikipedia, and other forms of social media and grassroots innovation are not stifled. Importantly, after the terrible judgment passed by Justice Manmohan Singh of the Delhi High Court in the Super Cassettes v. Myspace case, any website hosting user-generated content is vulnerable to payment of hefty damages even if it removes content speedily on the basis of complaints.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Amendments Not Examined&lt;/h2&gt;
&lt;p&gt;For the sake of brevity, I have not examined the major changes that have been made with regard to copyright societies, lyricists and composers, and statutory licensing for broadcasters, all of which have received considerable attention by copyright experts elsewhere, nor have I examined many minor amendments.&lt;/p&gt;
&lt;h2&gt;A Note on the Parliamentary Process&lt;/h2&gt;
&lt;p&gt;Much of the discussions around the Copyright Act have been around the rights of composers and lyricists vis-à-vis producers. As this has been covered elsewhere, I won’t comment much on it, other than to say that it is quite unfortunate that the trees are lost for the forest. It is indeed a good thing that lyricists and composers are being provided additional protection against producers who are usually in a more advantageous bargaining position. This fact came out well in both houses of Parliament during the debate on the Copyright Bill.&lt;br /&gt;&lt;br /&gt;However, the mechanism of providing this protection — by preventing assignment of “the right to receive royalties”, though the “right to receive royalties” is never mentioned as a separate right anywhere else in the Copyright Act — was not critically examined by any of the MPs who spoke. What about the unintended consequences of such an amendment? Might this not lead to new contracts where instead of lump-sums, lyricists and music composers might instead be asked to bear the risk of not earning anything at all unless the film is profitable? What about a situation where a producer asks a lyricist to first assign all rights (including royalty rights) to her heirs and then enters into a contract with those heirs? The law, unfortunately at times, revolves around words used by the legislature and not just the intent of the legislature. While one cannot predict which way the amendment will go, one would have expected better discussions around this in Parliament.&lt;/p&gt;
&lt;p&gt;Much of the discussion (in both &lt;a class="external-link" href="http://164.100.47.5/newdebate/225/17052012/Fullday.pdf"&gt;the Rajya Sabha&lt;/a&gt; and &lt;a class="external-link" href="http://164.100.47.132/newdebate/15/10/22052012/Fullday.pdf"&gt;the Lok Sabha&lt;/a&gt;) was rhetoric about the wonders of famous Indian songwriters and music composers and the abject penury in which some not-so-famous ones live, and there was very little discussion about the actual merits of the content of the Bill in terms of how this problem will be overcome. A few MPs did deal with issues of substance. Some asked the HRD Minister tough questions about the Statement of Objects and Reasons noting that amendments have been brought about to comply with the WCT and WPPT which were “adopted … by consensus”, even though this is false as India is not a signatory to the WCT and WPPT. MP P. Rajeeve further raised the issue of parallel imports and that of there being no public demand for including TPM in the Act, but that being a reaction to the US’s flawed Special 301 reports. Many, however, spoke about issues such as the non-award of the Bharat Ratna to Bhupen Hazarika, about the need to tackle plagiarism, and how the real wealth of a country is not material wealth but intellectual wealth.&lt;/p&gt;
&lt;p&gt;This preponderance of rhetoric over content is not new when it comes to copyright policy in India. In 1991, when an amendment was presented to increase term of copyright in all works by ten years (from expiring 50 years from the author’s death to 60 years post-mortem), the vast majority of the Parliamentarians who stood up to speak on the issue waxed eloquent about the greatness of Rabindranath Tagore (whose works were about to lapse into the public domain), and how we must protect his works. Little did they reflect that extending copyright — for all works, whether by Tagore or not — will not help ‘protect’ the great Bengali artist, but would only make his (and all) works costlier for 10 additional years. Good-quality and cheaper editions of Tagore’s works are more easily available post-2001 (when his copyright finally lapsed) than before, since companies like Rupa could produce cheap editions without seeking a licence from Visva Bharati. And last I checked Tagore’s works have not been sullied by them having passed into the public domain in 2001.&lt;/p&gt;
&lt;p&gt;Further, one could find outright mistakes in the assertions of Parliamentarians. In both Houses, DMK MPs raised objections with regard to parallel importation being allowed in the Bill — only in the version of the Bill they were debating, parallel importation was not being allowed. One MP stated that “statutory licensing provisions like these are not found anywhere else in the world”. This is incorrect, given that there are extensive statutory licensing provision in countries like the United States, covering a variety of situations, from transmission of sound recordings over Internet radio to secondary transmission of the over-the-air programming.&lt;/p&gt;
&lt;p&gt;Unfortunately, though that MP did not raise this issue, there is a larger problem that underlies copyright policymaking in India, and that is the fact that there is no impartial evidence gathered and no proper studies that are done before making of policies. We have no equivalent of the Hargreaves Report or the Gowers Report, or the studies by the Productivity Council in Australia or the New Zealand government study of parallel importation.&lt;/p&gt;
&lt;p&gt;There was no economic analysis conducted of the effect of the increase in copyright term for photographs. We have evidence from elsewhere that copyright terms &lt;a class="external-link" href="http://williampatry.blogspot.in/2007/07/statute-of-anne-too-generous-by-half.html"&gt;are already&lt;/a&gt; &lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2024588"&gt;too long&lt;/a&gt;, and all increases in term are what economists refer to as &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Deadweight_loss"&gt;deadweight losses&lt;/a&gt;. There is no justification whatsoever for increasing term of copyright for photographs, since India is not even a signatory to the WCT (which requires this term increase). In fact, we have lost precious negotiation space internationally since in bilateral trade agreements we have been asked to bring our laws in compliance with the WCT, and we have asked for other conditions in return. By unilaterally bringing ourselves in compliance with WCT, we have lost important bargaining power.&lt;/p&gt;
&lt;h2&gt;Users and Smaller Creators Left Out of Discussions&lt;/h2&gt;
&lt;p&gt;Thankfully, the Parliamentary Standing Committee went into these minutiae in greater detail. Though, as I have noted elsewhere, the Parliamentary Standing Committee did not invite any non-industry groups for deposition before it, other than the disability rights groups which had campaigned really hard. So while changes that would affect libraries were included, not a single librarian was called by the Standing Committee. Despite comments having been submitted &lt;a href="https://cis-india.org/a2k/publications/copyright-bill-submission" class="external-link"&gt;to the Standing Committee on behalf of 22 civil society organizations&lt;/a&gt;, none of those organizations were asked to depose. Importantly, non-industry users of copyrighted materials — consumers, historians, teachers, students, documentary film-makers, RTI activists, independent publishers, and people like you and I — are not seen as legitimate interested parties in the copyright debate. This is amply clear from the the fact that only one MP each in the two houses of Parliament raised the issue of users’ rights at all.&lt;/p&gt;
&lt;h2&gt;Concluding Thoughts&lt;/h2&gt;
&lt;p&gt;What stands out most from this process of amendment of the copyright law, which has been going on since 2006, is how out-of-touch the law is with current cultural practices. Most instances of photoshopping are illegal. Goodbye Lolcats. Cover versions (for which payments have to be made) have to wait for five years. Goodbye Kolaveri Di. Do you own the jokes you e-mail to others, and have you taken licences for quoting older e-mails in your replies? Goodbye e-mail. The strict laws of copyright, with a limited set of exceptions, just do not fit the digital era where everything digital transaction results in a bytes being copied. We need to take a much more thoughtful approach to rationalizing copyright: introduction of general fair dealing guidelines, reduction of copyright term, decriminalization of non-commercial infringement, and other such measures. If we don’t take such measures soon, we will all have to be prepared to be treated as criminals for all our lives. Breaking copyright law shouldn’t be as easy as breathing, yet thanks to outdated laws, it is.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://infojustice.org/archives/26243"&gt;This was reposted in infojustice.org on May 25, 2012&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/analysis-copyright-amendment-bill-2012'&gt;https://cis-india.org/a2k/blogs/analysis-copyright-amendment-bill-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Fair Dealings</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Economics</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Technological Protection Measures</dc:subject>
    

   <dc:date>2013-11-12T14:13:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet">
    <title>Intermediary Liability in India: Chilling Effects on Free Expression on the Internet</title>
    <link>https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society in partnership with Google India conducted the Google Policy Fellowship 2011. This was offered for the first time in Asia Pacific as well as in India. Rishabh Dara was selected as a Fellow and researched upon issues relating to freedom of expression. The results of the paper demonstrate that the ‘Information Technology (Intermediaries Guidelines) Rules 2011’ notified by the Government of India on April 11, 2011 have a chilling effect on free expression.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Intermediaries are widely recognised as essential cogs in the wheel of exercising the right to freedom of expression on the Internet. Most major jurisdictions around the world have introduced legislations for limiting intermediary liability in order to ensure that this wheel does not stop spinning. With the 2008 amendment of the Information Technology Act 2000, India joined the bandwagon and established a ‘notice and takedown’ regime for limiting intermediary liability.&lt;br /&gt;&lt;br /&gt;On the 11th of April 2011, the Government of India notified the ‘Information Technology (Intermediaries Guidelines) Rules 2011’ that prescribe, amongst other things, guidelines for administration of takedowns by intermediaries. The Rules have been criticised extensively by both the national and the international media. The media has projected that the Rules, contrary to the objective of promoting free expression, seem to encourage privately administered injunctions to censor and chill free expression. On the other hand, the Government has responded through press releases and assured that the Rules in their current form do not violate the principle of freedom of expression or allow the government to regulate content.&lt;br /&gt;&lt;br /&gt;This study has been conducted with the objective of determining whether the criteria, procedure and safeguards for administration of the takedowns as prescribed by the Rules lead to a chilling effect on online free expression. In the course of the study, takedown notices were sent to a sample comprising of 7 prominent intermediaries and their response to the notices was documented. Different policy factors were permuted in the takedown notices in order to understand at what points in the process of takedown, free expression is being chilled.&lt;br /&gt;&lt;br /&gt;The results of the paper clearly demonstrate that the Rules indeed have a chilling effect on free expression. Specifically, the Rules create uncertainty in the criteria and procedure for administering the takedown thereby inducing the intermediaries to err on the side of caution and over-comply with takedown notices in order to limit their liability; and as a result suppress legitimate expressions. Additionally, the Rules do not establish sufficient safeguards to prevent misuse and abuse of the takedown process to suppress legitimate expressions.&lt;br /&gt;&lt;br /&gt;Of the 7 intermediaries to which takedown notices were sent, 6 intermediaries over-complied with the notices, despite the apparent flaws in them. From the responses to the takedown notices, it can be reasonably presumed that not all intermediaries have sufficient legal competence or resources to deliberate on the legality of an expression. Even if such intermediary has sufficient legal competence, it has a tendency to prioritize the allocation of its legal resources according to the commercial importance of impugned expressions. Further, if such subjective determination is required to be done in a limited timeframe and in the absence of adequate facts and circumstances, the intermediary mechanically (without application of mind or proper judgement) complies with the takedown notice.&lt;br /&gt;&lt;br /&gt;The results also demonstrate that the Rules are procedurally flawed as they ignore all elements of natural justice. The third party provider of information whose expression is censored is not informed about the takedown, let alone given an opportunity to be heard before or after the takedown. There is also no recourse to have the removed information put-back or restored. The intermediary is under no obligation to provide a reasoned decision for rejecting or accepting a takedown notice.&lt;/p&gt;
&lt;p&gt;The Rules in their current form clearly tilt the takedown mechanism in favour of the complainant and adversely against the creator of expression.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;The research highlights the need to:&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt; increase the safeguards against misuse of the privately administered takedown regime&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;reduce the uncertainty in the criteria for administering the takedown&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; reduce the uncertainty in the procedure for administering the takedown&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; include various elements of natural justice in the procedure for administering the takedown&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;replace the requirement for subjective legal determination by intermediaries with an objective test&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf" class="internal-link" title="Intermediary Liability in India"&gt;Click&lt;/a&gt; to download the report [PDF, 406 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Appendix 2&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/intermediary-liability-and-foe-executive-summary.pdf" class="internal-link"&gt;Intermediary Liability and Freedom of Expression — Executive Summary&lt;/a&gt; (PDF, 263 Kb)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.odt" class="internal-link"&gt;Counter-proposal by the Centre for Internet and Society: Draft Information Technology (Intermediary Due Diligence and Information Removal) Rules, 2012&lt;/a&gt; (Open Office Document, 231 Kb)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf" class="internal-link"&gt;Counter-proposal by the Centre for Internet and Society: Draft Information Technology (Intermediary Due Diligence and Information Removal) Rules, 2012&lt;/a&gt; (PDF, 422 Kb)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;The above documents have been sent to:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Shri Kapil Sibal, Minister of Human Resource Development and Minister of Communications and Information Technology&lt;/li&gt;
&lt;li&gt;Shri Milind Murli Deora, Minister of State of Communications and Information Technology&lt;/li&gt;
&lt;li&gt;Shri Sachin Pilot, Minister of State, Ministry of Communications and Information Technology&lt;/li&gt;
&lt;li&gt;Dr. Anita Bhatnagar, Joint Secretary, Department of Electronics &amp;amp; Information Technology, Ministry of Communications &amp;amp; Information Technology&lt;/li&gt;
&lt;li&gt;Dr. Ajay Kumar, Joint Secretary, Department of Electronics &amp;amp; Information Technology, Ministry of Communications &amp;amp; Information Technology&lt;/li&gt;
&lt;li&gt;Dr. Gulshan Rai, Scientist G &amp;amp; Group Coordinator, Director General, ICERT, Controller Of Certifying, Authorities and Head of Division, Cyber Appellate Tribunal &lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet'&gt;https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rishabh Dara</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-14T10:22:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/all-india-privacy-delhi-report">
    <title>The All India Privacy Symposium: Conference Report</title>
    <link>https://cis-india.org/internet-governance/all-india-privacy-delhi-report</link>
    <description>
        &lt;b&gt;Privacy India, the Centre for Internet and Society and Society in Action Group, with support from the International Development Research Centre, Privacy International and Commonwealth Human Rights Initiative had organised the All India Privacy Symposium at the India International Centre in New Delhi, on February 4, 2012.  Natasha Vaz reports about the event.&lt;/b&gt;
        
&lt;p&gt;The symposium was organized around five thematic panel discussions:&lt;br /&gt;
Panel 1: Privacy and Transparency&lt;br /&gt;
Panel 2: Privacy and E-Governance Initiatives&lt;br /&gt;
Panel 3: Privacy and National Security&lt;br /&gt;
Panel 4: Privacy and Banking&lt;br /&gt;
Panel 5: Privacy and Health&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Elonnai Hickok (Policy Advocate, Privacy India) introduced the 
objectives of Privacy India. The primary objectives were to raise 
national awareness about privacy, do an in-depth study of privacy in 
India and provide feedback on the proposed ‘Right to Privacy’ Bill. 
Privacy India has reviewed case laws, legislations, including the 
upcoming policy and conducted state-level privacy workshops and 
consultations across India in Kolkata, Bangalore, Ahmedabad, Guwahati, 
Chennai, and Mumbai. India like the rest of the world is answering some 
fundamental questions about the powers of the government and citizen’s 
rights and complications that arise from emerging technologies. Through 
our research we have come to understand that privacy varies across 
cultures and contexts, and there is no one concept of privacy but 
instead several distinct core notions that serve as complex duties, 
claims and obligations.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Privacy and Transparency&lt;/h2&gt;
&lt;p&gt;Panelists:&amp;nbsp; Ponnurangam K, (Assistant Professor, IIIT New Delhi), ), 
Chitra Ahanthem (Journalist, Imphal), Nikhil Dey (Social &amp;amp; Political
 Activist), Deepak Maheshwari (Director, Corporate Affairs, Microsoft), 
Gus Hosein (Executive Director, Privacy International, UK), and Prashant
 Bhushan, (Senior Advocate, Supreme Court of India).&lt;br /&gt;
Moderator: Sunil Abraham (Executive Director, Centre for Internet and Society, Bangalore) &lt;br /&gt;
Poster: Srishti Goyal (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Srishti Goyal provided the general contours, privacy protections, 
limits to privacy and loopholes of policy relating to transparency and 
privacy, specifically analyzing the Right to Information Act, Public 
Interest Disclosures Act, and the Official Secrets Act.&lt;/p&gt;
&lt;p&gt;Nikhil Dey commented on the interaction between the right to privacy 
and the right to information (RTI). He referred to Gopal Gandhi, the 
former Governor of West Bengal, “we must ensure that tools like the UID 
must help the citizen watch every move of government; not allow the 
government watch every move of the citizen.” Currently, the RTI and the 
UID stand on contrary sides of the information debate. A privacy law 
could allow for a backdoor to curb RTI. So, utmost care has to be taken 
while drafting legislation with respect to right to privacy.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/1.JPG/image_preview" alt="p1" class="image-inline image-inline" title="p1" /&gt;&lt;/td&gt;
&lt;td&gt;Data and information has leaked furiously in India and it has leaked 
to the powerful. A person who is in a position of power can access 
private information irrespective of any laws in place to safeguard 
privacy. It is necessary to look at the power dynamics, which exists in 
the society before formulating legislation on right to privacy. 
According to Nikhil Dey, there should be different standards of privacy 
with respect to public servants. A citizen should be entitled to 
information related to funds, functions and functionaries. The main 
problem arises while defining the private space of a public servant or 
functionaries.&lt;br /&gt;&lt;br /&gt;The RTI Act has failed to address the legal protection for the right 
to privacy. Perhaps, rules regarding privacy can be added to the Act. It
 can be defined by answering the questions: (i) what is ‘personal 
information’? (ii) what is it’s relation to public activity or public 
interest? (iii) what is the unwarranted invasion of the privacy of an 
individual? and (iv) what is the larger public good? Expanding on these 
four points can provide greater legal protection for the right to 
privacy. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Gus Hosein described the intersection and interaction of the right to 
information and the right to privacy. He referred to a petition filed by
 Privacy International requesting information on the expenses of members
 of parliament. Privacy and transparency of the government are 
compatible in the public interest. Gross abuse of the public funds by 
MPs was revealed by this particular petition such as pornography or 
cleaning of moats of MPs homes. Privacy advocates are supporters of RTI,
 however, it cannot be denied that there is no tension between 
transparency and privacy. In order chalk out the differences, there is a
 need of a legal framework. According to Gus Hosein, in many countries 
the government office that deals with right to information also deals 
with cases related to right to privacy.&lt;/p&gt;
&lt;p&gt;Mumbai and New Delhi police have started using social media very 
aggressively, encouraging citizens to take photographs of traffic 
violations and upload them to Facebook or Twitter. In reference to this,
 Ponnurangam described the perceptions of privacy and if it agreed or 
conflicted with his research findings. Ponnurangam has empirically 
explored the awareness and perspective of privacy in India with respect 
to other countries. He conducted a privacy survey in Hyderabad, Chennai 
and Mumbai. People are very comfortable in posting pictures of others 
committing a traffic violation or running a red light. Ironically, many 
people have posted pictures of police officers committing a traffic 
violation such as not wearing a helmet or running a red light.&lt;br /&gt;
  &lt;br /&gt;
Chitra Ahanthem described the barriers and challenges of using RTI in 
Manipur. There are more than 40 armed militia groups, which are banned 
by the central and state government. The central government provides 
economic packages for the development of the north-east region. However,
 the state government officials and armed groups pocket the economic 
packages. These armed groups have imposed a ban on RTI. Furthermore, 
Manipur is a very small community. If people try and access information 
through RTI they risk getting threatened by the Panchayat members and 
being ostracized from the community or their clan. &lt;br /&gt;
  &lt;br /&gt;
People are apprehensive about filing RTI because they believe that these
 procedures are costly and the police and government may also get 
involved. Officials use the privacy plea to avoid giving out 
information. Since certain information are private and not in the public
 domain, government officials, use the defense of privacy to hide 
information. In addition, the police brutality prevalent in the area 
deters people to even have interactions with government officials. &lt;br /&gt;
  &lt;br /&gt;
According to Deepak Maheshwari, the open data initiative is a subset 
within the larger context of open information. There is an onus on the 
government to publish information, which is in the public domain. As a 
result, one does not necessarily have to go through the entire process 
of filing an RTI to get information, which is already there in the 
public domain. Moreover, if it is freely available in public domain, 
then one can anonymously access such information; this further 
strengthens the privacy aspects of requesting information and 
facilitating anonymity with respect to access to such information in the
 public domain. It has also to be noted that it is not sufficient to put
 data out in the public domain but it should also disclose the basis of 
the data for example, if there is representation of a data on a pie 
chart, the data which was used to arrive at the pie chart should also be
 available in the public domain. The main intention of releasing data to
 the public domain or having open data standards should not only be to 
provide access to such data but also should be in such a fashion so as 
to enable people to use the data for multiple purposes.&lt;/p&gt;
&lt;p&gt;Prashant Bhushan noted that one of the grounds for withholding 
information in the RTI Act is privacy. An RTI officer can disclose 
personal information if he feels that larger public interest warrants 
the disclosure, even if it is personal information, which has no 
relationship to public activity or interest. This raises the important 
question, “what constitutes personal information?” He referred to the 
Radia Tapes controversy. Ratan Tata has filed a petition in the Supreme 
Court on the grounds that the Nira Radia tapes contained personal 
information and that the release of these tapes into the public domain 
violated his privacy. The Centre for Public Interest Litigation has 
filed a counter petition on the grounds that the nature of the 
conversations was not personal but in relation to public activity. They 
were between a lobbyist and bureaucrats, journalists and ministers. 
Prashant Bhushan stressed the importance of releasing these tapes into 
the public domain to show glimpses of all kinds of fixing, deal-making 
and show how the whole ruling establishment functions. It is absurd for 
Ratan Tata to claim that this is an invasion of privacy. Lastly, he felt
 when drafting a privacy law, clearly defining and distinguishing 
personal information and public is extremely important.&lt;/p&gt;
&lt;p&gt;One of the interesting comments made during the panel was on the 
assumption that data is transparent. Transparency can be staged; 
questions have to be asked around whether the word is itself 
transparent.&lt;/p&gt;
&lt;h2&gt;Privacy and E-Governance Initiatives&lt;/h2&gt;
&lt;p&gt;Panelists:&amp;nbsp; Anant Maringanti, (Independent Social Researcher), Usha 
Ramanathan, (Advocate &amp;amp; Social Activist), Gus Hosein, (Executive 
Director, Privacy International, UK), Apar Gupta, (Advocate, Supreme 
Court of India), and Elida Kristine Undrum Jacobsen (Doctoral 
Researcher, The Peace Research Institute Oslo).&lt;br /&gt;
Moderator: Sudhir Krishnaswamy (Centre for Law and Policy Research)&lt;br /&gt;
Poster: Adrija Das (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Adrija Das discussed the legal provision relating to identity 
projects and e-governance initiatives in India. The objective of any 
e-governance project is to increase efficiency and accessibility of 
public services. However, a major problem that arises is the linkage of 
the data results in the creation of a central database, accessible by 
every department of the government. Furthermore, implementing data 
protection and security standards are very expensive.&lt;/p&gt;
&lt;p&gt;Sudhir Krishnaswamy highlighted the default assumptions surrounding 
e-governance initiatives: e-governance initiatives solve governance 
problems, increase efficiency, increase transparency and increase 
accountability. It is important to analyze the problems that arise from 
e-governance initiatives, such as privacy.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Usha Ramanathan described the increased number and vastness of 
e-governance initiatives such as UID, NPR, IT Rules and NATGRID. There 
are also many burdens on privacy that emanate from the introduction and 
existence of electronic data management systems. Electronic data 
management systems have allowed state to collect, store and use personal
 information of individual. Currently, the DNA Profiling Bill is pending
 before the Parliament. It is important to question the purpose and need
 for the government to collect such personal information. It is also to 
be noted that, there are certain laws such as Collection of Statistics 
Act, 2008 that penalize individuals if they do not comply with the 
information requests of the government.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Usha.JPG/image_preview" title="Usha" height="124" width="148" alt="Usha" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Anant Maringanti discussed the limitations of data sharing that once 
existed. Currently, data can move across space in a very short time. He 
analyzed the state and market rationalities involved in e-governance 
initiatives, which raise the question “who can access data and at what 
price?”. Data may seem to be innocent or neutral, but data in the hands 
of wrong people becomes very crucial due to abuse and misuse. For 
example, Andhra Pradesh was praised as the model state for UID 
implementation. However, during the process of collecting data for UID a
 company bought personal information and sold the data to third parties.&lt;br /&gt;
  &lt;br /&gt;
Apar Gupta discussed the dilemmas of e-governance. Generally information
 in the form of an electronic record is presumed to be authentic. The 
data which government collects is most often inaccurate and wrong. So 
the digital identity of a person can be totally different from the real 
identity of that particular person. The process for correcting such 
information is also very inconvenient and sometimes impossible. &lt;br /&gt;
Under the evidence law any electronic evidence is presumed to be 
authentic and admissible as evidence. The Bombay High Court decided a 
case involving the authenticity of a telephone bill generated by a 
machine. The judgment said that since it is being generated by a 
machine, through and automated process, there is no need to challenge 
the authenticity of the document, it is presumed to true and authentic. 
The main danger in such case is that one does away with the process of 
law and attaches certain sanctity to the electronic record and evidence.
 &lt;br /&gt;
  &lt;br /&gt;
It should be also observed that how government maintains secrecy as to 
the ways in which it collects data. For example, the Election Commission
 has refused to disclose the functioning and design of electronic voting
 machines. The reason given for such secrecy is that if such information
 is put in the public domain then the electronic voting machines will be
 vulnerable and can be tampered with. But we, who use the voting 
machines, will never find out its vulnerabilities.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;According to Gus Hosein, politicians generally have this wrong notion
 that technology can solve complex administrative problems. Furthermore,
 the industry is complicit; they indulge in anti-competitive market 
practice to sell these technologies as a solution to problems. However, 
such technology does not solve any problems rather it gives rise to 
problems.&lt;br /&gt;&lt;br /&gt;Huge amount of government funds is associated with collection of 
personal data but such data is rendered useless or rather misused, 
because the government does not have clue as to how to use the data for 
development and security purposes. The UK National Health Records 
project estimated to cost around twelve to twenty billion pounds. 
However, a survey carried out by a professor in University College 
London showed that the hospital and other health institutions do not use
 the information collected by the National Health Records. Similarly, 
the UK Identity Card scheme was estimated to cost 1.3 billion pounds and
 finally it was estimated to cost five billion pounds. The identity 
cards are rendered obsolete, the sole department interested in the 
identity card was the Home Office Department, no other department 
intended on using it.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Gus.JPG/image_preview" alt="Gus " class="image-inline image-inline" title="Gus " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Technology should be built in such a manner that it empowers the 
individual. Technology should allow the individual to control his 
identity and as well as access all kinds of information available to the
 government and private bodies on that individual. &lt;br /&gt;
  &lt;br /&gt;
According to Elida Kristine Undrum Jacobsen, technology is regarded in 
this linear manner. It is increasingly being naturalized and as an 
all-encompassing solution. The use of biometric systems in the UID 
raises three areas of concern: power, value and social relationships.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Elida.JPG/image_preview" alt="Elida" class="image-inline image-inline" title="Elida" /&gt;&lt;/td&gt;
&lt;td&gt;With regards to power, there is a difference between providing 
documentation and information for identification. However, problems 
arise when the mode of identification becomes one’s body. It also leads 
to absolute reliance on technology, if the machine says that this is an 
individual’s identity then it is considered to be the absolute truth and
 it does not matter even if the individual is someone else. It becomes 
furthermore problematic with biometric system because it is generally 
used for forensic purposes. &lt;br /&gt;&lt;br /&gt;The other component of UID or any national identification scheme is 
the question of consent and its relationship to privacy. In the case of 
UID project, people are totally unaware about how their information will
 be used and what purposes can it be used or misused for. Therefore, 
there is no informed consent when it comes to collection of biometric 
data under the UID project. &lt;br /&gt;
  &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;On the issue of social value it is to be noted that the value of 
efficiency becomes the most important value, which is valued. Many of 
the UIDAI documents state that the UID will provide a transactional 
identity. However, at the same time it takes away societal layers, which
 is inherently part of one’s identity. In addition, it makes it possible
 for the identity of a person to become a commodity to be sold. This 
also means that the personal information has economic value and players 
in the market such as insurance companies, banks can buy and sell the 
information.&lt;br /&gt;
  &lt;br /&gt;
When there is identification projects using biometrics it gives the 
State a lot of power; the power to determine and dictate one’s identity 
irrespective of the difference in real identity. Moreover, when such 
identifications projects are carried out at a national level it also 
gives rise to problem related to exclusion and inclusion of people or 
various purposes. The classification of the society based on various 
factors becomes easy and there is a huge risk involved with such 
classification.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The issues, which came out from the Q&amp;amp;A session, were:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The interplay between fairness and lawfulness in the context of 
privacy and data collection. There has to be a question asked as to why 
certain information is required by the State and how is it lawful.&amp;nbsp;&lt;/li&gt;&lt;li&gt;In the neo-liberal era corporations are generally considered to be
 private. This has to be questioned and furthermore the difference 
between what is private and what is public. There are also concerns 
about corporations increasingly collaborating with the State. Can it be 
still considered as private?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and National Security&lt;/h2&gt;
&lt;p&gt;Panelists: PK Hormis Tharakan (Former Chief of Research and Analysis 
Wing, Government of India), Saikat Datta (Journalist), Menaka Guruswamy,
 (Advocate, Supreme Court, New Delhi), Prasanth Sugathan, (Legal 
Counsel, Software Freedom Law Center), and Oxblood Ruffin, (Cult of the 
Dead Cow Security and Publishing Collective).&lt;br /&gt;
Moderator:&amp;nbsp; Danish Sheikh (Alternative Law Forum)&lt;br /&gt;
Poster: Suchitra Menon (Law Student, NUJS)&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Suchitra Menon discussed the legal provisions for national security 
in relation to privacy. Specifically, she described the guidelines and 
procedural safeguards with respect to phone tapping and interception of 
communication decisional jurisprudence.&lt;/p&gt;
&lt;p&gt;In the year 2000, the Information Technology Act (IT Act), 2000 was 
enacted, this Act had under section 69 allowed the State to monitor and 
intercept information through intermediaries. Prasanth Sugathan 
described how the government has been trying to bypass the procedural 
safeguard laid down by the Supreme Court in the PUCL case by using 
Section 28 of the IT Act, 2000. The provision deals with certifying 
authority for digital signatures. The certifying authority under the Act
 also has the authority to investigate offences under the Act. The 
provision mainly deals with digital signature but it is used by the 
government to intercept communication without implementing the 
procedural safeguards laid down for such interception. Furthermore, the 
IT Rules which was notified by the government in April, 2007 allows the 
government to intercept any communication with the help of the 
intermediaries. The 2008 amendment to the IT Act was an after effect of 
the 26/11 attacks in Mumbai. The legislation has become draconian since 
then and privacy has been sacrificed to meet the ends of national 
security.&lt;/p&gt;
&lt;p&gt;Oxblood Ruffin read out his speech and the same is reproduced below.&lt;/p&gt;
&lt;p&gt;“The online citizenry of any country is part of its national security
 infrastructure. And the extent to which individual privacy rights are 
protected will determine whether democracy continues to succeed, or 
inches towards tyranny. The challenge then is to balance the legitimate 
needs of the state to secure its sovereignty with protecting its most 
valuable asset: The citizen.&lt;br /&gt;
  &lt;br /&gt;
It has become trite to say that 9/11 changed everything. Yet it is as 
true for the West as it is for the global South. 9/11 kick started the 
downward spiral of individual privacy rights across the entire internet.
 It also ushered in a false dichotomy of choice, that in choosing 
between security and privacy, it was privacy that had adapted to the new
 realities, or so we’ve been told.&lt;br /&gt;
  &lt;br /&gt;
Let’s examine some of the fallacies of this argument.&lt;br /&gt;
&amp;nbsp;&lt;br /&gt;
The false equation which many argue is that we must give up privacy to 
ensure security. But no one argues the opposite. We needn’t balance the 
costs of surveillance over privacy, because rarely banning a security 
measure protects privacy. Rather, protecting privacy typically means 
that government surveillance must be subjected to judicial oversight and
 justification of the need to surveillance. In most cases privacy 
protection will not diminish the state’s effectiveness to secure itself.&lt;br /&gt;
  &lt;br /&gt;
The deference argument is that security advocates insist that the courts
 should defer to elected officials when evaluating security measures. 
But when the judiciary weighs privacy against surveillance, privacy 
almost always loses. Unless the security measures are explored for 
efficacy they will win every time, especially when the word terrorism is
 invoked. The courts must take on a more active role to balance the 
interests of the state and its citizens.&lt;br /&gt;
  &lt;br /&gt;
For the war time argument security proponents argue that the war on 
terror requires greater security and less privacy. But this argument is 
backwards. During times of crisis the temptation is to make unnecessary 
sacrifices in the name of security. In the United States, for example, 
we saw that Japanese-American internment and the McCarthy-era witch-hunt
 for communists was in vain. The greatest challenge for safeguarding 
privacy comes during times when we are least inclined to protect it. We 
must be willing to be coldly rational and not emotional during such 
times.&lt;br /&gt;
  &lt;br /&gt;
We are often told that if you have nothing to hide, you have nothing to
 fear. This is the most pervasive argument the average person hears. But
 isn’t privacy a little like being naked? We might not be ashamed of our
 bodies but we don’t walk around naked. Being online isn’t so different.
 Our virtual selves should be as covered as our real selves. It’s a form
 of personal sovereignty. Being seen should require our consent, just as
 in the real world. The state has no business taking up the role of 
Peeping Tom.&lt;br /&gt;
  &lt;br /&gt;
I firmly believe that the state has a right and a duty to secure itself.
 And I equally believe that its citizens are entitled to those same 
rights. Citizens are part of the national security infrastructure. They 
conduct business; they share information; they are the benefactors of 
democratic values. Privacy rights are what, amongst others, separate us 
from the rule of tyrants. To protect them is to protect and preserve 
democracy. It is a fight worth dying for, as so many have done before 
us.&lt;/p&gt;
&lt;p&gt;PK Hormis Tharakan discussed the importance of interception 
communication in intelligence gathering. In the western liberal 
democracies, restrictions of privacy were introduced for the 
anti-terrorism campaigns and these measures are far restrictive than 
what the Indian legislations contemplate. Preventive intelligence is a 
major component in maintenance of national security and this 
intelligence is generated and can be procured through interception. &lt;br /&gt;
  &lt;br /&gt;
We do need laws to make sure that the power of interception is not 
excessive or out of proportion. But the graver issue is that the 
equipment used for interception of communication is freely available in 
the market at a cheap price. This allows private citizens also to snoop 
into others conversation. So, interception by civilians should be the 
main concern.&lt;br /&gt;
  &lt;br /&gt;
Menaka Guruswamy discussed the lack of regulation of Indian intelligence
 agencies that creates burdens on privacy. When there is a conflict 
between individual privacy and national security, the court will always 
rule in favour of the national security. Public interest always takes 
precedence over individual interest. &lt;br /&gt;
  &lt;br /&gt;
When there is a claim right to privacy vis-à-vis national security, 
generally these claims are characterized by dissent, chilling effects on
 freedom of expression and government accountability. In India, privacy 
is fragile and relatively a less justifiable right. Another challenge to
 privacy is that, when communication is intercepted, which part of the 
conversation can be considered to be private and which part cannot be 
considered so.&lt;br /&gt;
  &lt;br /&gt;
Saikat Datta described his experience of being under illegal 
surveillance by an unauthorized intelligence agency. When a person is 
under surveillance, he or she is already considered to be suspect. If 
the State commits any mistake as to surveillance, carrying surveillance,
 who is not at all a person of interest in such case upon discovery, 
there is no penalty for such discrepancy.&lt;br /&gt;
He warned of the dangers of excessive wiretapping, a practice that 
currently generates such a “mountain” of information that anything with 
real intelligence value tends to be ignored until it is too late, as 
happened with the Mumbai bombings in 2008. It is clear that the Indian 
government’s surveillance and interception programmes far exceed what is
 necessary for legitimate law enforcement.&lt;br /&gt;
  &lt;br /&gt;
The issues, which came during the Q&amp;amp;A session was:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;In case of national security vis-à-vis privacy in heavily 
militarized zone, legislations such as Armed Forces Special Powers Act 
actually give authority to the army to search and seizure on mere 
suspicion? This amounts gross violation of privacy.&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Privacy and Banking&lt;/h2&gt;
&lt;p&gt;Panelists: M R Umarji, (Chief Legal Advisor, Indian Banks Associations), N A Vijayashankar, (Cyber Law Expert), Malavika Jayaram, (Advocate, Bangalore)&lt;br /&gt;Moderator: Prashant Iyengar (Associate Professor, Jindal Law University)&lt;br /&gt;Poster: Malavika Chandu (Law Student, NUJS)&lt;/p&gt;
&lt;p&gt;Prashant Iyengar highlighted how privacy has been a central feature in banking and finance. Even before the notion of privacy came into existence, banks had developed an evolved notion of secrecy and confidentiality, which was fairly robust. Every legislation dealing with banking and finance generally have a clause related to privacy and confidentiality. It might seem that it would be easy to implement privacy in banking and finance given the long relationship between banking and secrecy and confidentiality. However, this is not the case in the contemporary times. Specifically, with the growth in issues related to national security, transparency and technology, the highly regarded notion of privacy seems to be slowly depleting.&lt;/p&gt;
&lt;p&gt;Malavika Chandu described the data protection standards that govern the banking industry. As part of the know-you-customer guidelines, banks are required to provide the Reserve Bank with customer profiles and other identification information. Lastly, she described case laws in relation to privacy with respect to financial records.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;N A Vijayashankar noted that the confidentiality and secrecy practices 
in the banking sector emanate from the banker-customer relationship. In 
the present context, secrecy and privacy maintained by the banks should 
be analyzed from the perspective of the right of the customer to 
safeguard his or her information from any third party. Generally, banks 
and other financial institutions protect personal information as a fraud
 control measure and not as duty to protect the privacy of a customer.&lt;br /&gt;&lt;br /&gt;There has been a paradigm shift in banking practices from traditional 
banking practices to more efficient but less secure banking practice. 
Some of the terms and conditions of internet banking are illegal and do 
not stand the test of law. In contemporary times, banking institutions 
use confidentiality to cover up problems and data breach rather than 
protecting the customer. But the banks are not ready to disclose data 
breach as it apprehends that it will result in public losing faith in 
the system. The Reserve Bank of India, has recently notified that 
protection which is provided to the customers in banking services should
 also be extended to e-banking services. However, the banks have not 
properly implemented this. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Naavi.JPG/image_preview" alt="NA Vijayashankar" class="image-inline image-inline" title="NA Vijayashankar" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;M R Umarji highlighted fourteen laws related to banking which carries confidentiality clauses. In India, public sector banks dominate the market. These banks are created under a statute and such statute governs them. Therefore, they are duty bound to maintain secrecy and confidentiality. Private banks and cooperative banks are not bound by any statute. They do not have any obligations to maintain secrecy, but they do strictly observe confidentiality as a form of banking practice. &lt;br /&gt;&lt;br /&gt;Banks are not allowed to reveal any personal information of an individual unless it is sought by some authority that has a legitimate right to claim such information. There has been a constant erosion of confidentiality due to various laws which empowers authorities to seek confidential information from the banks. Recently, in the light of the growing national security concerns, banks also have an obligation to report suspicious transactions. These have caused heavy burdens on right to privacy of an individual.&lt;br /&gt;&lt;br /&gt;Under the Right to Information Act, 2005 public sector banks are considered to be public authorities. By the virtue of the Statute, any person can access information from banks. For example, in a recent case an information officer directed Reserve Bank of India, to disclose Inspection Reports. These reports generally contain information regarding doubtful accounts, non-performing account, etc. There is a need that banks should be exempted from the Right to Information Act, 2005. Since they are not dealing with public funds there is no need to apply transparency law to the banks.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Malavika Jayaram described the major conflicts and tensions with respect to privacy vis-à-vis banking and financial systems and financial data. Other privacy and transparency issues include:&amp;nbsp; the publication of online tax information and income data. &lt;br /&gt;&lt;br /&gt;Surveillance is built in the design of banking system, so it is capable of tracking personal information and activity. There is a need to implement more privacy friendly and privacy by design systems in the banking sector. Customers are generally ignorant about privacy policies and this influences informed consent and furthermore marketing institution may influence customers to behave in a particular manner. In this context privacy by design becomes very important.&lt;br /&gt;&lt;br /&gt;Data minimization principles should be applied; since the more data collected the more there is a risk of data breach and misuse. In case of data retention it is necessary that person giving such data should know how much proportion of the data is being retained and for how long&amp;nbsp; it is stored and also what is the scope of the data and for what purpose will it be used. &lt;br /&gt;&lt;br /&gt;Personal information and data, which was previously collected by the government, are gradually being outsourced to private bodies. On one hand it is a good thing that private sector get their technology and security measures right as compared to the government agencies but it comes with the risk that it can be sold out by private bodies as commodities in the market. Private bodies that are harvesting the data can also be forced by the government to disclose it under a particular law or statute without taking into consideration the consent of the individual whose personal information is sought for. &lt;br /&gt;&lt;br /&gt;There is multiplicity of documentation for identification, which makes transactions less efficient. This has attracted customers to more convenient systems such as one-access point systems, but people tend to forget the issues related to privacy, in using such a system. What is portrayed as efficient for the consumer is a tool for social control and who has access and authority to use such information.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Often the reason given for collecting information is that it will help the service provider to combat fraud. However, studies have shown people more often fake situation rather than identity. The other concerns are that of sharing of information and lack of choice with respect to such sharing. There should be check as to sharing of personal information as the data belongs to the individual and not the bank or any other institution which requires furnishing personal information in lieu of services. This gives rise to a binary choice to the user; either the individual has to provide information to avail the service or else one cannot avail the services.&lt;/p&gt;
&lt;p&gt;There is supposed to be market for privacy. The notion of personal information is subjective and varies from person to person. For example, one might be comfortable to share certain information. However, others might not be.&lt;br /&gt;&lt;br /&gt;The issues that came out of the Q&amp;amp;A sessions are:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The default settings are generally put at the low protection settings. Unless the user is aware of the privacy protection setting, he or she is prone to breach of privacy. Should the default privacy setting be set to maximum security and option can be given to the user to change it according to his or her preference?&lt;/li&gt;&lt;li&gt;Is there any system in the banks, which allows the customers of bank to know about which all third parties the bank has shared his or her personal information with?&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;Health Privacy&lt;/h2&gt;
&lt;p&gt;Panelists: K. K. Abraham, (President, Indian Network for People with HIV), Dr. B. S. Bedi, (Advisor, CDAC &amp;amp; Media Lab Asia), and Raman Chawla, (Senior Advocacy Officer, Lawyers Collective).&lt;br /&gt;Moderator: Ashok Row Kavi (Journalist and LGBT Activist) &lt;br /&gt;Poster: Danish Sheikh (Researcher, Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. &lt;br /&gt;&lt;br /&gt;Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. &lt;br /&gt;&lt;br /&gt;Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.&lt;br /&gt;&lt;br /&gt;Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. &lt;br /&gt;&lt;br /&gt;The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.&lt;/p&gt;
&lt;p&gt;Danish Sheikh outlined the possible health privacy violations. These included the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, the purpose of collecting data is not specified and improper security standards, storage and disposal. The disclosure of personal health information has the potential to be embarrassing, stigmatizing or discriminatory. &lt;br /&gt;&lt;br /&gt;Subsequently, Danish Sheikh examined the status of sexual minorities’ vis-à-vis the privacy framework. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he also described privacy violations committed by both individuals as well as state authorities. &lt;br /&gt;&lt;br /&gt;Ashok Row Kavi recounted how privacy was very contextual when debating section 377 in the LGBT community. The paradigm upon which they were going to fight the anti-sodomy law was that it was consenting sex between two adults in private space. However, this paradigm was not well received by women, as women did not see private space as safe space, due to domestic violence. Perceptions of privacy are very subjective and it differs from person to person.&lt;br /&gt;&lt;br /&gt;Raman Chawla recounted the history of the Draft HIV/AIDS Bill. In 2002, the need for law related to HIV/AIDS was realized in order to protect right to consent, right against discrimination and right to confidentiality of HIV patients. The bill was finalized in the year 2006. Alarmingly, it is yet to be tabled before the Parliament. &lt;br /&gt;&lt;br /&gt;The privacy provisions in the HIV bill clearly state that no person can be tested, treated or researched for HIV without the consent of the patient. It also casts that in a fiduciary relationship the health care provider must maintain confidentiality, however if the patient provides written consent then their status may be disclosed. The HIV condition of the patient can also revealed by the doctor if there is a court order demanding such disclosure. The doctor may disclose the status of the patient to his or her partner but he has to follow a particular protocol. The doctor should have sufficient belief that his or her partner is at risk of contracting HIV. The person who is infected will be asked for his/her views and counseled before his/her partner is informed. However, there are doubts as to the implementation and enforcement of this protocol.&lt;/p&gt;
&lt;p align="center"&gt;&lt;img src="https://cis-india.org/home-images/AP.JPG/image_preview" alt="AI" class="image-inline image-inline" title="AI" /&gt;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;Natasha Vaz (Policy Advocate, Privacy India) brought the symposium to a close by thanking the partners, the panelists, the moderators and the participants for their sincere efforts in making the All India Privacy Symposium a grand success. In India, a public discussion regarding privacy has been long over due. The symposium provided a platform for dialogue and building greater awareness around privacy issues in health, banking, national security, transparency and e-governance. Using our research, expert opinions, personal experiences, questions and comments various facets of privacy were explored.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Press Coverage&lt;/h2&gt;
&lt;p&gt;The event was featured in the media as well:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-02-02/news/31017368_1_privacy-law-privacy-international-cis"&gt;India needs an independent privacy law, says NGO Privacy India&lt;/a&gt;, Economic Times, February 2, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.tehelka.com/story_main51.asp?filename=Ws060212Privacy.asp"&gt;New Bill to decide on individual’s right to privacy&lt;/a&gt;, Tehelka, February 6, 2012&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.dnaindia.com/analysis/column_lack-of-strong-privacy-law-in-healthcare-a-big-worry_1649366"&gt;Lack of strong privacy law in healthcare a big worry&lt;/a&gt;, Daily News &amp;amp; Analysis, February 13, 2012&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.washingtonpost.com/world/asia_pacific/privacy-concerns-grow-in-india/2012/01/26/gIQAyM0UmQ_story.html"&gt;Privacy concerns grow in India&lt;/a&gt;, Washington Post, February 3, 2012&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium-agenda.pdf" class="internal-link" title="All India Privacy Symposium - Profiles &amp;amp; Speakers"&gt;Click &lt;/a&gt;to download the Agenda and Profile of Speakers (PDF, 1642 Kb)&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/all-privacy-symposium.pdf" class="internal-link" title="All India Privacy Symposium (File)"&gt;Download the PDF&lt;/a&gt; (555 Kb)&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/all-india-privacy-symposium-webcast" class="external-link"&gt;Follow the webcast of the event&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/all-india-privacy-delhi-report'&gt;https://cis-india.org/internet-governance/all-india-privacy-delhi-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-30T05:16:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/framing-the-digital-alternatives">
    <title>Framing the Digital AlterNatives</title>
    <link>https://cis-india.org/digital-natives/framing-the-digital-alternatives</link>
    <description>
        &lt;b&gt;They effect social change through social media, place their communities on the global map, and share spiritual connections with the digital world - meet the everyday digital native. &lt;/b&gt;
        
&lt;p&gt;The Everyday Digital Native video contest has got its pulse on what makes youths from diverse socio-cultural backgrounds connect with one another in the global community – it’s an affinity for digital technologies and Web 2.0-mediated platforms coupled with a drive to spearhead social change. The contest invited people from around the world to make a video that would answer the question, ‘Who is the Everyday Digital Native’? The final videos received more than &lt;del&gt;20,000&lt;/del&gt; 3,000 votes from the public and our top five winners emerged from across three continents!&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/framing-digital-alternatives" class="internal-link" title="Framing the Digital Alternatives"&gt;The Digital AlterNatives Featurette &lt;/a&gt;(PDF, 2847 KB) is a peek into the minds of digital natives as citizen activists. The 10 featured interviews of the Digital Natives video contest finalists don't fit the stereotype of the Globalized Digital Native: Young Geeks apathetic to 'Saving the Planet'. Rather, these are affirmative citizens, young, middle aged and senior, who consider digital technology as second nature for use in personal, professional or socio-political capacities.&lt;/p&gt;
&lt;p&gt;The 'Digital Natives with a Cause?' is a collaborative research-inquiry between The Centre for Internet &amp;amp; Society, India and HIVOS Knowledge Programme, the Netherlands into the field of youth, change and technology in the context of the Global South. The three-year research project has resulted in the four-book collective, 'Digital AlterNatives with a Cause?' published in 2011. Read more about the project &lt;a href="https://cis-india.org/digital-natives/blog/dnbook" class="external-link"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/framing-the-digital-alternatives'&gt;https://cis-india.org/digital-natives/framing-the-digital-alternatives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Web Politics</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-08T12:28:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/vote-for-digital-natives">
    <title>Vote for the Everyday Digital Native Video Contest!</title>
    <link>https://cis-india.org/digital-natives/vote-for-digital-natives</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and Hivos are super excited to present the final videos in the Everyday Digital Native Video Contest. We invite readers to vote for the TOP 5 Videos. The finalists will each win EUR500! Voting closes March 31, 2012&lt;/b&gt;
        
&lt;h2&gt;Who’s the Everyday Digital Native? This global video contest has the answer&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;They effect social change through social media, place their 
communities on the global map, and share a spiritual connection with the
 digital world - Meet the Everyday Digital Native&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The Everyday Digital Native video contest has got its pulse on what 
makes youths from diverse socio-cultural backgrounds connect with one 
another in the global community – it’s an affinity for digital 
technologies and Web 2.0-mediated platforms coupled with a drive to 
spearhead social change. The contest invited people from around the 
world to make a video that would answer the question, ‘Who is the 
Everyday Digital Native?’. Following a jury-based selection process, the
 final videos are now online and open for public voting.&lt;/p&gt;
&lt;p&gt;Run by the Bangalore-based Centre for Internet &amp;amp; Society (CIS) 
with the support of Dutch NGO HIVOS, the contest will see the top five 
videos with the most votes declared winners on April 1, 2012. The 12 
finalists in the video, who come from different parts of the globe, are 
each vying for the top prize of USD 500 and a chance to have their 
shorts screened in a film screening and panel discussion hosted by CIS. &lt;br /&gt;&lt;br /&gt;Referring
 to the theme of the contest, Dr Nishant Shah, Director of Research and 
Co-founder of the Centre, says that the contest aims at highlighting the
 alternative users of digital technologies. These are people who are 
often not accounted for either in mainstream discourses of changemakers 
or in academic biopics on digital natives. “The 12 video proposals show 
that the everyday digital native does not wake up in the morning and 
think, ‘hmmm today I will change the world’. And yet, in their everyday 
lives, when they see the possibility of producing a change in their 
immediate environments, they turn to the digital to find networks that 
can start a change”, says Shah. &lt;br /&gt;&lt;br /&gt;Apart from the top five public 
selections, the jury members will be instrumental in picking their two 
favorites among the finalists. Talking about the range of ideas that 
participants sent in jury member Leon Tan, a media-art historian, 
cultural theorist and psychoanalyst based in Gothenburg, Sweden, says, 
“The contest is an exciting project as it has the potential to portray 
the lives of digital natives from different corners of the world. The 
generosity of the contestants in creating video proposals is commendable
 as is the range of ideas suggested. The ideas address both the 
opportunities and risks of what we might call digital life.” &lt;br /&gt;&lt;br /&gt;Adds
 Shashwati Talukdar, a filmmaker and jury member from India, “It was 
really interesting to see how different all the proposals were. Some of 
them were taking the notion of digital native as a personal one and some
 were very clearly political and sought an intervention in the real 
world. Dutch digital media artist and jury member Jeroen van Loon refers
 to a proposal from the USA where the participant wanted to explore the 
possibility of unplugging from his digital life. “It’s very interesting 
how digital natives question their own world. The proposals are good 
examples of how technology and culture constantly change each other. We 
can learn a lot from the global digital natives.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest" class="external-link"&gt;Profiles of the finalists and their videos can be viewed here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/vote-for-digital-natives'&gt;https://cis-india.org/digital-natives/vote-for-digital-natives&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-08T12:32:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective">
    <title>Web Accessibility Policy Making: An International Perspective</title>
    <link>https://cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective</link>
    <description>
        &lt;b&gt;G3ict and CIS are pleased to announce the publication of a new, improved edition of the Web Accessibility Policy Making: An International Perspective. The report published in cooperation with the Hans Foundation provides an updated synopsis of the many policies that governments have implemented around the world to ensure that the Internet and websites are accessible to persons with disabilities. &lt;/b&gt;
        &lt;p&gt;The report contains a Foreword by Axel Leblois, Founder and Executive Director of G3ict, an introduction and studies from countries like Australia, Canada, Germany, Ireland, Italy, Japan, South Korea, New Zealand, Philippines, Portugal, Sweden, Thailand, United Kingdom, United States, and the European Union. The report contains contributions from Prashanth Ramadas, Asma Tajuddin, G Aravind, Katie Reisner, Sucharita Narasimhan, Bama Balakrishnan and Nirmita Narasimhan. Axel Leblois, Donal Rice, Immaculada Placienca Porrero, Kevin Carey, Licia Sbattella and Sunil Abraham are the expert reviewers.&lt;/p&gt;
&lt;h2&gt;Foreword by Axel Leblois&lt;/h2&gt;
&lt;p&gt;This third edition of our joint report with CIS “WEB ACCESSIBILITY POLICY MAKING: AN INTERNATIONAL PERSPECTIVE” provides an updated synopsis of the many policies that governments have implemented around the world to ensure that the Internet and web sites are accessible to persons with disabilities. With 153 countries parties to the Convention on the Rights of Persons with Disabilities as of December 2011, an increasing number of governments are now in the midst of developing policies and programs to ensure that web sites and services under their jurisdictions are accessible.&lt;/p&gt;
&lt;p&gt;Indeed, the Preamble of the Convention on the Rights of Persons with Disabilities recognizes “the importance of accessibility to the physical, social, economic and cultural environment, to health and education and to information and communication, in enabling persons with disabilities to fully enjoy all human rights and fundamental freedoms”. Its article 9 stipulates that: “To enable persons with disabilities to live independently and participate fully in all aspects of life, States Parties shall take appropriate measures to ensure to persons with disabilities access, on an equal basis with others, to the physical environment, to transportation, to information and communications, including information and communications technologies and systems” (1). It further specifies that “State Parties shall also take appropriate measures to … Promote access for persons with disabilities to new information and communications technologies and systems, including the Internet” (2.g).&lt;/p&gt;
&lt;p&gt;There is therefore no doubt that all State Parties have an obligation to act upon those commitments. However, as this report demonstrates it clearly, web accessibility policies and their levels of enforcement vary considerably among countries with some common denominators such as the compliance with the W3C – WAI guidelines on web accessibility.&lt;/p&gt;
&lt;p&gt;G3ict and CIS hope that this new, improved edition, which will now be available in print as well as in electronic format, will help accelerate the development of web accessibility policies and programs around the world. We want to express our sincere appreciation to Nirmita Narasimhan, programme manager at CIS and editor of the G3ict Publications and Reports for her dedication to this report which would not have been made possible without her incredible work and motivation as Disability Advocate.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/web-accessibility.pdf" class="internal-link" title="Web Accessibility Policy Making"&gt;Download a PDF of the Web Accessibility Policy Making here&lt;/a&gt; [335 KB]&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/daisy-file" class="internal-link" title="Web Accessibility (Daisy) File"&gt;Download the Daisy File&lt;/a&gt; [23412 KB]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective'&gt;https://cis-india.org/accessibility/web-accessibility-policy-making-an-international-perspective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-09-25T05:33:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/video-contest/digital-natives-contest">
    <title>Digital Natives Video Contest </title>
    <link>https://cis-india.org/digital-natives/video-contest/digital-natives-contest</link>
    <description>
        &lt;b&gt;The Everyday Digital Native Video Contest has its top five winners through public voting.&lt;/b&gt;
        
&lt;p&gt;
&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="354" width="510"&gt;
&lt;param name="src" value="http://www.youtube.com/v/fVa8zg2_wA8"&gt;&lt;embed height="354" width="510" src="http://www.youtube.com/v/fVa8zg2_wA8" type="application/x-shockwave-flash"&gt;&lt;/embed&gt; 
&lt;/object&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;A Day in the Life of a Digital Native: &lt;/strong&gt;Story scripted, shot and edited by Leandra (Cole) Flor. The video is an extension of Cole's photo essay "Mirror Exercises" conceptualized for 'Digital AlterNatives with a Cause' Book 1 &lt;em&gt;To Be&lt;/em&gt;. &lt;a href="https://cis-india.org/digital-natives/blog/dnbook1/at_download/file"&gt;Download the book.&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/MarieJudeBendiolaWinner.jpg" alt="null" title="" width="103" height="142" /&gt;&lt;/th&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/TJKMwinner.jpg" alt="null" title="" width="103" height="142" /&gt;&lt;/th&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/TJBurkswinner.jpg" alt="null" title="" width="103" height="142" /&gt;&lt;/th&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/JohnMusilaKiberawinner.jpg" alt="null" title="" width="103" height="142" /&gt;&lt;/th&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/mj.png/@@images/f52feb88-f69d-4482-b019-881fdf8af7c3.png" title="mj" height="138" width="102" alt="null" class="image-inline" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Top 5 winners of the Digital Native video contest selected through public votes. From left to right: Marie Jude Bendiola, T.J. KM, Thomas Burks, John Musila and MJ.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;The Jury Prize for&amp;nbsp; Two Best Videos goes to John Musila (Kenya) and Marie Jude Bendiola (Singapore)! Congratulations to all winners. The Top 5 winners win the grand prize of EUR 500 each!&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Our Top 10 contestants: Click on their profile to watch their videos&lt;br /&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/MarieJudeBendiolaWinner.jpg" alt="null" title="" width="103" height="142" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Marie Jude Bendiola&lt;/strong&gt;&lt;br /&gt;I come from a third world country  where technology seemed to be hard to reach back in the 90s; especially  by the not-so-privileged. As we progressed, technology has not only  become ubiquitous (in malls, various institutions and technological  hubs) but also, it has come to be used by the common man. My video will  answer how technology bridges the gap between dreams and reality. It  will be a fusion of documentary and re-enactment of real life events and  dramas.&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/connecting-souls-bridging-dreams" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/cijoaj2003.jpg/image_preview" title="Cijo" height="142" width="103" alt="Cijo" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Cijo Abraham Mani&lt;/strong&gt;&lt;br /&gt;The power of digital media will be  presented to audience with the help of showing tweet-a-thon panel  discussions, blood aid tweets getting spread, etc. &lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/digital-media-dance" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/TJKMwinner.jpg" title="" height="142" width="103" alt="null" class="image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;TJ K.M.&lt;/strong&gt;&lt;br /&gt;My video explores the spiritual aspect of digital  technology and how rather than getting in the way of our spiritual  expression, it is actually bringing us face to face with it, if only we  choose to look.&amp;nbsp; The video will be a mixture of live action and stop  motion animation/puppetry where digital devices take on a transcendent  character similar to nature spirits in various cultures. I plan to  investigate the tendency to exclude digital devices and technology from  being categorized alongside nature as if it is somehow exempt from or  superior to this category. Using symbolism and motifs from various  cultures such as the Native American Hopi, Balinese Hinduism and  Japanese Shintoism, my video will create a world where the technology we  use daily is viewed not just as a means for socio-cultural exchange and  communication but is available for the nurturing of our souls if we so  choose.&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/with-no-distinction" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/TJBurkswinner.jpg" title="" height="142" width="103" alt="null" class="image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Thomas Burks&lt;br /&gt;&lt;/strong&gt;We have a small production company in  Birmingham, Alabama. I was hired on a year ago to do film and  commercials for them as they expand into advertising and video coverage  of events. We only have about 3 employees including myself, working out  of our homes. We recently acquired a space to open a studio and retail  location downtown where we live. We use Facebook, blogs, and viral  marketing all the time to get our name out there. Our account executive  is constantly monitoring our Facebook for client orders and bookings. We  are beginning to use twitter to provide information more fluidly to  people. We believe this might be a year of growth for our small company,  as we are becoming able to provide much higher quality content. We're  fully digital; constantly updating our websites and blogs, and I believe  we would be able to tell a great digital story. We submit numerous  small films and skits; we cover awesome concerts, and rely so heavily on  the digital world to show our content. That will be the gist of our  video.&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/alternate-visions-accessing-leisure-through-interfaces" class="external-link"&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/digital-natives-video-contest/entries/digital-coverage-in-a-digital-world" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/digital-natives/video-contest/winners-pictures/JohnMusilaKiberawinner.jpg" title="" height="142" width="103" alt="null" class="image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;John Musila&lt;br /&gt;&lt;/strong&gt;Map Kibera Trust is an organization based in  Kenya’s Kibera slums. Using digital gadgets and technology, they have  transformed the community by placing it on the map as it was only seen  as forest when viewed on a map. They also film stories around the  community and share them with the world on their YouTube channel and  other social networks like Facebook and Twitter. Through this they have  been able to highlight and raise awareness about the challenges the  community faces. Our video would show Kibera’s role in bringing about  change.&lt;a href="https://cis-india.org/author/kiberanewsnetwork" class="external-link"&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/from-the-wild-into-the-digital-world" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/Andres.jpg/image_preview" title="Andres" height="142" width="103" alt="Andres" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Andrés Felipe Arias Palma&lt;br /&gt;&lt;/strong&gt;I think many people are digital  natives unknowingly. Being a digital native is a relationship with  activism and society, not as they initially thought. It was a condition  of being born in specific times and external factors. In the video, I  will interview people about who and what is a digital native? How to use  the Internet? What are the advantages and disadvantages for society  where everything is run with the power of the Internet?&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/who-is-a-digital-native" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/martingpotter.jpg/image_preview" title="Martin" height="142" width="103" alt="Martin" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Martin Potter&lt;br /&gt;&lt;/strong&gt;Over a period of nearly four years, moving  across small towns in Australia and South East Asia, I have seen the  most extraordinary innovations at a local community level. My video will  focus on these local stories with global impact. I am pursuing a PhD in  participatory media and this will lend a uniquely academic perspective  on the concept of collaboration, community life and innovation.&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/big-stories-small-towns" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/rajasekaran.jpg/image_preview" title="Rajasekaran" height="142" width="103" alt="Rajasekaran" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;E. James Rajasekaran&lt;/strong&gt;&lt;br /&gt;I live in the temple town of Madurai  in the south Indian state of Tamil Nadu. I am a social worker and the  plight of people living in slims is something that my NGO is closely  associated with. My video will bring out the efforts of the people who  live in the slums of Madurai.&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/life-in-the-city-slums" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/anan.jpg/image_preview" title="Anand" height="142" width="103" alt="Anand" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Anand Jha&lt;br /&gt;&lt;/strong&gt;Bangalore is home to a lot of technology  start-ups. A lot of geeks, who find it limiting to work for  corporations, are driving a very open source-oriented, frugally-built  and extremely demanding culture. While their products are standing at  the bleeding edge of technology, their personal lives too are constantly  driven on the edge, every launch being a make or break day for them.  The project would aim at capturing their stories, their frustration and  motivation, looking at the possibilities of Indian software scene moving  beyond the services and back-end office culture into a more risk prone  but more passionate business of technology.&lt;br /&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/deployed" class="external-link"&gt;Read More&lt;/a&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/mj.png/@@images/f52feb88-f69d-4482-b019-881fdf8af7c3.png" title="mj" height="138" width="102" alt="null" class="image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;dl&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MJ&lt;/strong&gt;&lt;br /&gt;As a digital native living in a developing country, I have carried out a  series of both online and offline projects, which have always striven  to benefit Zimbabweans in a number of ways since 2000. These projects  have greatly increased my interactions with computers. I might say, I  got married to a computer in 2000 when I bought my first PC; in a way,  my relationship with my computer is intimate. Even though this computer I  bought is an old 386 machine made obsolete by the faster Pentium III  models, this did not change my love for the computer. My video will  focus on a dream-like moment of my digital life.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/video-contest/entries/i-am-a-ghetto-digital-native" class="internal-link"&gt;Read more&lt;/a&gt;&lt;/p&gt;
&lt;/dl&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Jury Members&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Shashwati Talukdar&lt;/strong&gt;&lt;br /&gt; Shashwati Talukdar grew up in India where  her engagement with theatre  and sculpture led to filmmaking, and a  Masters degree from the AJ  Kidwai Mass Communication Research Center in  Jamia Millia Islamia, New  Delhi.  She developed an interest in  American Avant-Garde film and  eventually got an MFA in Film and Media  Arts from Temple University,  Philadelphia (1999).  Her work covers a  wide range of forms, including  documentary, narrative and experimental.   Her work has shown at venues including the Margaret Mead Festival,  Berlin, Institute of Contemporary  Art in Philadelphia, Kiasma Museum of  Art and the Whitney Biennial. She  has been supported by  entities including the Asian Cine Fund in Busan,  the Jerome Foundation,  New York State Council on the Arts among others.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ShashwatiTalukdar.jpg/image_preview" style="float: right;" title="Shashwati" height="115" width="98" alt="Shashwati" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Leon Tan&lt;/strong&gt;&lt;br /&gt; Leon Tan, PhD, is a media-art historian, cultural  theorist and  psychoanalyst based in Gothenburg, Sweden. He has written  on art, media,  globalization and copyright in journals such as CTheory  and Ephemera,  and curated media-art projects and art symposia in  international sites  such as KHOJ International Artists’ Association  (New Delhi, 2011), ISEA  (Singapore, 2008) and Digital Arts Week  (Zurich, 2007). He is currently  researching media-art practices in  India, and networked museums as an expanded field of cultural memory making.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/LeonTan.jpg/image_preview" style="float: right;" title="Leon Tan" height="142" width="103" alt="Leon Tan" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Jeroen van Loon&lt;/strong&gt;&lt;br /&gt; Jeroen, digital media artist, investigates the  (non-) impact of  digital technology on our lives. For two months he  went analogue,  refrained from connecting to the World Wide Web, and  communicated through his Analogue Blog. He is currently working on Life  Needs  Internet in which he travels around the world and collects  people's  personal handwritten internet stories.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/JeroenvanLoon.jpg/image_preview" style="float: right;" title="Jeroen" height="128" width="106" alt="Jeroen" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Becky Band Jain&lt;/strong&gt;&lt;br /&gt; Becky Band Jain is a non-profit communications  specialist and blogs  on everything from technology to psychology and  culture. She spent the  last five years living in India and she’s now  based in New York. She’s a  dedicated yoga and meditation practitioner  and is passionate about ICTD  and new media.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/BeckyBandJain.jpg/image_preview" style="float: right;" title="Becky" height="134" width="107" alt="Becky" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify;"&gt;&lt;strong&gt;Namita A. Malhotra&lt;/strong&gt;&lt;br /&gt; Namita A. Malhotra is a legal researcher  and media practitioner and a  core member of Alternative Law Forum in  Bangalore, India. Her areas of  interest are image, technology, media  and law, and her work takes the  form of interdisciplinary research,  video and film making and exploring  possibilities of recombining  material, practice and discipline. She is also a founder member of  Pad.ma (Public Access Digital Media Archive)  which is a densely  annotated online video archive.&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/NamitaMalhotra.jpg/image_preview" style="float: right;" title="Namita" height="156" width="104" alt="null" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Share this page on:&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://www.facebook.com/"&gt;&lt;img src="https://cis-india.org/home-images/Fshare.jpg/image_icon" title="Facebook" height="20" width="42" alt="Facebook" class="image-inline" /&gt;&lt;/a&gt;&lt;/th&gt;
&lt;th&gt;&lt;a class="external-link" href="http://twitter.com/"&gt;&lt;img src="https://cis-india.org/home-images/Twitter.jpg/image_icon" title="Twitter" height="24" width="24" alt="Twitter" class="image-inline" /&gt;&lt;/a&gt;&lt;/th&gt;
&lt;th&gt;&lt;a class="external-link" href="http://www.youtube.com/"&gt;&lt;img src="https://cis-india.org/home-images/youtube.jpg/image_icon" title="YouTube" height="23" width="23" alt="YouTube" class="image-inline" /&gt;&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/video-contest/digital-natives-contest'&gt;https://cis-india.org/digital-natives/video-contest/digital-natives-contest&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-05-08T12:35:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/world-narrow-web">
    <title>World Narrow Web</title>
    <link>https://cis-india.org/internet-governance/world-narrow-web</link>
    <description>
        &lt;b&gt;Censorship and how govt reacts to it may push us to country-specific networks, writes Pranesh Prakash in an article published in the Indian Express on 4 February 2012. &lt;/b&gt;
        &lt;p&gt;Twitter, a popular micro-blogging service, recently announced that “[today] we give ourselves the ability to reactively withhold content from users in a specific country — while keeping it available in the rest of the world”. In a move a few weeks ago, Blogger, Google’s blogging service, in effect announced something similar, by saying that default they would redirect Blogger users trying to get to Blogspot.com addresses (like &lt;a class="external-link" href="http://example.blogspot.com"&gt;http://example.blogspot.com&lt;/a&gt;) to their respective country sites (like &lt;a class="external-link" href="http://example.blogspot.in"&gt;http://example.blogspot.in&lt;/a&gt;). Twitter’s announcement was greeted with much disapproval by many Twitter users, as a move towards censorship, with some talking (on Twitter) about a boycott. Blogger’s move was hidden away, deep within a help page, and is being noticed now, and is causing quite a stir as caving in to censorship. Are these concerns justified? Before answering that question, let’s look at what the platforms’ announcements really say.&lt;/p&gt;
&lt;p&gt;Twitter has given itself the ability to withhold specific tweets and users in particular countries where that content is legally required to be removed (generally with a court order). Their earlier option, they inform us, was to block the offending tweets and users in all countries. Apart from this, they will publish a notice for each tweet/ user that is blocked in a country. They will also be proactively publishing every removal request they receive at ChillingEffects.org, which allows us to hold them to account and question their decision to remove tweets.&lt;/p&gt;
&lt;p&gt;Google, by redirecting you to the country-specific Blogger, is allowing for country-level removal of both blogs and individual blog posts. However, they also note that you can circumvent this by using a special “no redirect” address. Google currently forwards all search-related removals, but does not do so for Blogger-related requests, and all copyright-related complaints to ChillingEffects.org. Google does publish aggregate data relating to censorship of Blogger, on which free-speech advocates have been asking them to provide more granular information.&lt;/p&gt;
&lt;p&gt;There are three problems. First, while Twitter was just as open to repressive governments’ requests last week, by making this change, they are advertising this fact to such governments. Thailand has noted it, and has congratulated Twitter.&lt;/p&gt;
&lt;p&gt;Second, as Rob Beschizza, managing editor of the website Boing Boing, pointed out, there have been no instances of political content having been removed by Twitter. Even British courts’ super-injunctions (injunctions on speech, that prevent you from mentioning the fact that there is an injunction) were defeated by Twitter users, which only showed that attempts to censor material results in even more attention being drawn to it (which is popularly known as the “Streisand Effect”). So, does this now mean that Twitter will start applying local laws to judge “valid and applicable legal requests”, instead of American laws? What if the law is as bad as that which exists in India, where they are required to remove content within 36 hours based on any affected person’s complaint — without a court order? Will they still act on it? If they don’t, will the government or courts order Twitter.com to be blocked in India, finding it liable for illegal omissions?&lt;/p&gt;
&lt;p&gt;Third, this trend points increasingly to the fact that we are witnessing a Balkanisation of the Web as more countries start asserting their sovereignty online. As Chinese dissident journalist Michael Anti pointed out recently, it seems we now need visas (read “circumvention techniques”) to visit the international Web. But even then, there is no longer a singular “international” Web, but an Indian Web and a Guatemalan Web, and an Angolan Web. And the government’s recent proposal of requiring companies to locate their servers in India is a move towards this (apart from being a move towards killing cloud computing).&lt;br /&gt;&lt;br /&gt;That having been said, the reality is that the CEOs of Google, Google India, and Microsoft have been summoned to appear in Indian courts for allowing their users to publish material which they don’t know about, which is in a sealed envelope (and most of the accused companies haven’t been shown yet), and which they weren’t even asked once to remove.&lt;br /&gt;&lt;br /&gt;The Intermediary Guidelines Rules passed by the Department of Information Technology in April 2011 do not require the user, whose content it is, to be told that there is a complaint, nor to be given a chance to defend themselves. It does not even require public notice that the content has been removed.&lt;/p&gt;
&lt;p&gt;The truth is, the transparency around censorship that Google and Twitter are providing is far better than what most other companies are providing. For instance, Big Rock, an Indian DNS provider, suspended the CartoonsAgainstCorruption.com web address on the basis of a seemingly not legal request by the Cyber Cell of the Mumbai Crime Branch, and did so without any public notice and without even informing the cartoonist whose web address it was. At least Google and Twitter are pushing back against non-legal requests, and refusing to remove content that doesn’t violate&amp;nbsp; local laws. Single-mindedly criticising them will only put off other companies from following in their footsteps.&lt;br /&gt;&lt;br /&gt;Instead of criticising those who are actually working towards transparency in censorship, we should encourage them and others, push intermediaries not to cave in to unreasonable censorship requests, prevent them from over-censoring on their own, and push hard for the government to incorporate their best practices as part of the Intermediary Guidelines Rules.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/world-narrow-web/907579/1"&gt;The original article was published in the Indian Express&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/world-narrow-web'&gt;https://cis-india.org/internet-governance/world-narrow-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-03-27T16:00:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2">
    <title>Digital Futures: Internet Freedom and Millennials</title>
    <link>https://cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2</link>
    <description>
        &lt;b&gt;Last year was a turbulent year for freedom of speech and online expression in India. Early in 2011 we saw the introduction of an Intermediaries Liability amendment to the existing Information Technologies Law in the country, which allowed intermediaries like internet service providers (ISPs), digital content platforms (like Facebook and Twitter) and other actors managing online content, to remove material that is deemed objectionable without routing it through a court of law. Effectively, this was an attempt at crowdsourcing censorship, where at the whim or fancy of any person who flags information as offensive, it could be removed from digital platforms, writes Nishant Shah in DMLcentral on 3 February 2012.&lt;/b&gt;
        
&lt;p&gt;While we were still reeling from the potential abuse this could lead 
to – from weekend drunken games where people send take-down notices on 
an ad hoc basis to regressive fundamentalists using this to silence 
voices of protests – we encountered another shock. The Information and 
Technologies minister of India called some of the biggest social 
networking platforms that support user generated content to exercise a 
regime of self-regulation and censorship. Citing content that was 
considered slanderous to political leaders in the country and 
potentially offensive to the religious sentiments of certain groups, he 
called for a ‘pre-screening’ of online content – invoking visions of 
thought police, where an army of thousands will be trained to read your 
personal and private information, sift it for offensive content, and 
disallow it to be published online.&lt;/p&gt;
&lt;p&gt;And while we deal with the aftermath of what this might mean to the 
future of openness and our constitutionally enshrined rights of freedom 
of speech and expression, there was another shock that awaited us in 
2012. Even as I write this, Facebook and Google – two of the largest 
social media platforms in India – have been 'implicated' in a gamut of 
civil and criminal charges. It has been alleged that these companies 
knowingly allowed obscene and immoral material capable of inciting 
prurience, communal tension, hatred and violence, to proliferate in 
their systems because it helps generate revenue. Because the people who 
uploaded the information are outside the jurisdiction of the court, they
 cannot be punished but these intermediaries that have allowed this 
content that is deemed ‘obscene, lascivious, indecent and shocking’, are
 now being held responsible.&lt;/p&gt;
&lt;p&gt;There has been a lot of debate in and outside the country about the 
implications this has for the form and nature of information online. 
Freedom of speech and expression, information regulation regimes in 
emerging information societies, resurgence of authoritative 
governmentality in the face of quickly eradicating sovereignty, and the 
diminishing openness of the web, have all been variously discussed, much
 like the debates around SOPA/PIPA discussions in the US. In all of 
these conversations, there has been talk about the future but not about 
the people whose futures are the most at stake – digital natives. 
Pulling from my research, here are some summarized reflections of 
members of a younger generation pondering their digital futures:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Innovation&lt;/strong&gt;: One of the tropes that allows digital natives 
intimate relationships with their technology gadgets, platforms and 
environments is to innovate. Especially in the global south where we 
cannot take ubiquitous and affordable access to the internet for 
granted, innovation is not merely about creativity in producing new 
content. Innovation is in mobilizing meager resources in order to 
achieve large tasks. Innovation is in cutting through existing 
boundaries of inequity and building communities of learning and 
information. Innovation is in finding ways by which access can be 
facilitated for large user bases. Free and open information is the 
reward that follows innovation. There is consensus that restricting 
access to information is a negative incentive for those approaching the 
information superhighway. And for some it is also “a challenge to find 
ways of accessing that information. They can ban it, but by the time 
they will ban it, our way of accessing it will have changed!”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Information Read/Write&lt;/strong&gt;: Sometimes the promise of digital 
networks providing abundant information and knowledge, which is free to 
access and consume, overrides the actual allure of speech and 
expression. As one interlocutor explained in Wikipedia terms, “more 
people access Wikipedia to consume information others have produced 
rather than contribute to it...and it is the same everywhere. It is fun 
to write, but it is fun to write only because there is somebody reading 
it. Sometimes I go online to read rather than write.” The censorship 
debates often restrict themselves to freedom of speech and expression, 
but what they overlook is that this also interferes with the freedom to 
read. Reading is a form of engagement, interaction, formation of trust 
and affection online. And when information can no longer be easily read,
 it will have drastic effects on how young people connect and form 
communities.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mapping Learning&lt;/strong&gt;: For many digital natives in my work, the 
digital domain is not only a playground but also a space of learning. 
Not learning in its didactic forms, replacing universities and offering 
abundance of knowledge. For some, the digital space is a new process of 
learning. It helps them negotiate and cope with their formal curricula 
and offers alternative sources to understand and analyze reality. As 
many in our research group mentioned, “we already have access to enough 
academic material through our libraries. What we find on the internet 
are things that help us understand ideas through things that are 
familiar to us.” When pressed for an example, I was shown a wide range 
of popular and academic, cultural and social spaces – blogs, videos, 
movies, music, commentaries, tweets, mashups, etc., which the students 
often map back to their existing curriculum. “Sometimes the textbooks 
talk about things that happened before we were born. Or belonging to 
countries we don’t know much about,” explained a 19-year-old. So as a 
group they try and pull different and more familiar objects back into 
their discussions, using the web, its search potential, and social 
networking sites as filters to gain access to relevant knowledge.&lt;/p&gt;
&lt;p&gt;It is in the nature of information to be filtered or censored. Even 
at a personal level we constantly filter out information that is not 
desirable or useful to us. It is understandable that certain kinds of 
information that are produced with malicious intent needs to be 
controlled. However, the recent attempts attack the very structures that
 define the social web as we understand it now -- openness, 
distribution, sharing, collaboration, co-creation and interactivity. For
 digital natives, being digital is not just about infrastructure and 
access. It is an integral part of how they embed themselves and 
negotiate with our information society. Regulation of information is not
 just about resolving the crisis of the present but also about shaping 
the digital futures for a generation that is growing up digital.&lt;/p&gt;
&lt;p&gt;Banner image credit: zebble &lt;a class="external-link" href="http://www.flickr.com/photos/zebble/6080622/"&gt;http://www.flickr.com/photos/zebble/6080622/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://dmlcentral.net/blog/nishant-shah/digital-futures-internet-freedom-and-millennials"&gt;Read the original published in DML Central&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2'&gt;https://cis-india.org/internet-governance/digital-futures-internet-freedom-and-millennials-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-02-15T04:25:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill">
    <title>Privacy Matters — Analyzing the Right to "Privacy Bill" </title>
    <link>https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill</link>
    <description>
        &lt;b&gt;On January 21, 2012 a public conference “Privacy Matters” was held at the Indian Institute of Technology in Mumbai. It was the sixth conference organised in the series of regional consultations held as “Privacy Matters”. The present conference analyzed the Draft Privacy Bill and the participants discussed the challenges and concerns of privacy in India.&lt;/b&gt;
        
&lt;p&gt;The conference was organized by Privacy India in partnership with the Centre for Internet &amp;amp; Society, International Development Research Centre, Indian Institute of Technology, Bombay, the Godrej Culture Lab and Tata Institute of Social Sciences. Participants included a wide range of stakeholders that included the civil society, NGO representatives, consumer activists, students, educators, local press, and advocates.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary-and-critique-to-the-leaked-right-to-privacy-bill-2011" class="internal-link" title="High Level Summary and Critique to the Leaked Right to Privacy Bill 2011"&gt;Comments to the Right to Privacy Bill&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Welcome&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Prashant Iyengar&lt;/strong&gt; was the Lead Researcher with Privacy India, opened the conference with an explanation of Privacy India’s mandate to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. He summarized the five “Privacy Matters” series previously organised across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary" class="external-link"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore" class="external-link"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad" class="external-link"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report" class="external-link"&gt;Guwahati&lt;/a&gt; on June 23, 2011 and in&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view" class="external-link"&gt; Chennai &lt;/a&gt;on August 6, 2011.&lt;/p&gt;
&lt;h2&gt;Keynote Address&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Na. Vijayashankar&lt;/strong&gt; (popularly known as &lt;strong&gt;Naavi&lt;/strong&gt;), a Bangalore based e-business consultant, delivered the key note address on the quest of a good privacy law in India.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Naavi.jpg/image_mini" title="Naavi" height="171" width="155" alt="Naavi" class="image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;He described the essential features of good privacy legislation. In 
analyzing the Draft Privacy Bill’s definition of the right to privacy, 
he suggested it should be defined through the “right to personal 
liberty” rather than through what constitutes “infringements”.&amp;nbsp; Mr. 
Vijayashankar went on to explain that the “privacy right” should be 
taken beyond “information protection” and defined as a “personal privacy
 or a sense of personal liberty without constraints by the society”. He 
explained the various classifications and levels of protection 
associated with the availability and disclosure of data. He expressed 
concerns regarding monitoring of data processors and suggested that data
 controllers have contractual agreements between data processors, so as 
to ensure an obligation of data security practices. He also called for 
the simplification and division of offences and suggested numerous 
reasons as to why the Cyber Appellate Tribunal would not be an ideal 
monitoring mechanism or authority. See Naavi's presenation &lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Session I: Privacy and the Legal System&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Dr. Sudhir Krishnaswamy&lt;/strong&gt;, Assistant Professor at the National Law School of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Dr. Krishnaswamy started off the presentation by questioning the 
normative assumptions the Draft Privacy Bill makes. He referred to the 
controversy of Newt Gingrich's second marriage, to question the range of
 moral interests that were involved. The Bill falls short in accounting 
for dignity in relation to privacy.&lt;br /&gt;&lt;br /&gt;He described the Draft Privacy Bill as a reasonable advance, given where
 privacy laws were before. Although, he feels that it does fall short, 
in terms of a narrow position, on what privacy law should do. He also 
questioned if it satisfies constitutional standards. He stressed the 
importance of philosophical work around the Draft Privacy Bill 
considering that the nature of privacy is not neat and over-arching.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/sudhir.jpg/image_mini" title="Sudhir Krishnaswamy" height="144" width="152" alt="Sudhir Krishnaswamy" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and the Constitutional Law&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;N S Nappinai&lt;/strong&gt;, Advocate, High Court, Mumbai,&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/nappinai.jpg/image_preview" title="Nappinai" height="172" width="157" alt="Nappinai" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Nappinai spoke on the constitutional right to privacy. She explained the
 substantial development of Article 21 of the Constitution of India to 
include the ‘right to privacy’ with regards to its interpretation and 
application. She described the different shift of the application of the
 right to privacy in the West in comparison to India. The West has moved
 from the right to privacy pertaining to property to the right to 
privacy concerning personal rights, whereas India moved from personal 
rights to property rights. She outlined three aspects of privacy: 
dignity, liberty and property rights. &lt;br /&gt;&lt;br /&gt;Ms. Nappinai dissected the Bill in its major components: interception, 
surveillance, method and manner of personal data, health information, 
collection, processing and use of personal data. Using these components,
 she questioned what precedence exists? What should be further protected
 or reversed? What lessons should legislators draw from?&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Shortcomings of the Draft Right to Privacy Bill falls include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The objects and reasons section in the Draft Privacy Bill declares the right to privacy to every citizen as well as delineates the collection and dissemination of data. Nappinai dismisses the need for this delineation on the grounds that data protection is an inherent part of the right to privacy, it is not exclusive.&lt;/li&gt;&lt;li&gt;Large focus on transmission of data. The provisions do not account for property rights pertaining to the right to privacy. Therefore, the ‘knock-and-enter’ rule, the ‘right to be left alone’ and the ‘right to happiness’ should be included.&lt;/li&gt;&lt;li&gt;Applicability of the Bill should extend to all persons as well as data residing within the territory. It would be self-defeating if it only includes citizens, considering that the Constitution extends to all persons within the territory.&lt;/li&gt;&lt;li&gt;The right to dignity is unaccounted for.&lt;br /&gt;&lt;br /&gt;See Nappinai's presentation &lt;a href="https://cis-india.org/internet-governance/privacy-and-the-constitution" class="internal-link" title="Privacy and the Constitution"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Session II: Privacy and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Apar Gupta&lt;/strong&gt;, Advocate, Delhi&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Apar Gupta is an advocate based in Delhi who specializes in IP and 
electronic commerce law, spoke predominantly on the interplay between 
privacy and freedom of expression. He used the example of an advocate 
tweeting about his criticism of a judges’ ruling, to illustrate how 
different realms of online anonymity enable freedom of speech. He went 
beyond the traditional realm of journalistic architecture such as 
television channels or newspapers and explained online community 
disclosure.
&lt;p&gt;Mr. Gupta provided a practical example of Indian Kanoon, a popular 
online database of Indian court decisions. Because Indian Kanoon is 
linked to the Google search engine, many individuals involved in civil 
and criminal matters have requested Indian Kanoon to remove the court 
judgments, under privacy claims. This particularly occurs with 
individuals involved in matrimonial cases. However, as court judgment 
constitute public records India Kanoon only removes court judgments when
 requested by a court order.&lt;/p&gt;
&lt;p&gt;He described the several ways legislators can define privacy and 
freedom of expression. Considering that the privacy of an individual may
 border upon freedom of speech and expression, he questioned whether or 
not privacy should override the right to freedom of speech and 
expression. In addition, Mr. Gupta discussed the debate on whether or 
not the Privacy Bill should override all existing provisions in other 
laws.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Gupta.jpg/image_preview" alt="Apar Gupta" class="image-inline image-inline" title="Apar Gupta" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Additionally, he analyzed the provisions of the Draft Privacy Bill 
using three judgments. In these judgments, different entities sought of 
various forms of speech to be blocked under privacy claims. He spoke 
about the dangers of a statutory right for privacy that does not 
safeguard freedom of speech and expression. Considering that the privacy
 statute may allow for a form of civil action permitting private parties
 to approach courts to stop certain publications, he stressed the 
importance for legislators to ensure balanced privacy legislation 
inclusive of freedom of speech and expression.&lt;/p&gt;
&lt;h3&gt;Sexual Minorities and Privacy&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Danish Sheikh&lt;/strong&gt;, researcher at Alternative Law Forum&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/danish.jpg/image_preview" alt="Danish " class="image-inline image-inline" title="Danish " /&gt;&lt;/td&gt;
&lt;td&gt;Danish examined the status of sexual minorities in the light of privacy 
framework in India. The tag of decriminalization has served to greatly 
alter the way institutions approach the question of privacy when it 
comes to sexual minorities. He used the Naz Foundation judgment as a 
chronological marker to map the developments in the right to privacy and
 sexual minorities over the years.
&lt;p&gt;He outlined four key effects on the right to privacy due to the Naz Foundation judgment:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Prepared the understanding of privacy as a positive right and placed obligations on the state,&lt;/li&gt;&lt;li&gt;Discussed privacy as dealing with persons and not just places, it took into account decisional privacy as well as zonal privacy,&lt;/li&gt;&lt;li&gt;Connected privacy with dignity and the valuable worth of individuals, and&lt;/li&gt;&lt;li&gt;Included privacy on one’s autonomous identity.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He described various incidents that took place before the Naz Foundation judgment, pre-Naz, that altered the way we conceived of queer rights in general and privacy in particular, including the Lucknow incidents, transgender toilets, passport forms, the medical establishment and lesbian unions. Post-Naz, he described two incidents including the Allahabad Muslim University sting operation as well as the TV9 “Expose” that captured public imagination.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He concluded by asking: “What do these stories tell us about privacy?” The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs display the institutionalized disrespect for privacy and that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2&gt;Session III: Privacy and National Security&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Menaka Guruswamy&lt;/strong&gt;, Advocate, Supreme Court of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Menaka explored national security and its relationship to privacy. In
 her presentation, she compared the similar manner in which the courts 
approach national security and privacy issues. The courts feel national 
security and privacy issues are too complex to define, therefore, they 
take a case-by-case approach.&lt;br /&gt;
&lt;br /&gt;
&lt;p&gt;Ms. Guruswamy described three incidents that urged her to question 
national security and privacy. First, she was interested in the lack of 
regulation surrounding intelligence agencies and was involved in the 
introduction of the Regulations of Intelligence Agencies Bill as a 
private members bill. Second, national security litigation between the 
Salwa Judum judgment and the State of Chhattisgarh is an example of how 
national security triumphs constitutional rights and values. Third, 
privacy in the context of the impending litigation of Naz Foundation in 
the Supreme Court. She described the larger conversation of national security focus on 
values of equality and privacy. She discussed the following questions 
that serve in advancing certain conception of rights:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;How do we posit privacy which necessarily, philosophically as 
well as judicially, is carved out as the right of an individual to be 
left alone?&lt;/li&gt;&lt;li&gt;What are the consequences when national security, 
which is posited as the rights of the nation, is in conflict with the 
right of the individual to be left alone?&lt;/li&gt;&lt;li&gt;Considering that 
constitutional rights are posited as a public facet of citizenship how 
does a right to privacy play in that context?&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_menaka.jpg/image_preview" alt="Menaka" class="image-inline image-inline" title="Menaka" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and UID&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;R. Ramakumar&lt;/strong&gt;, professor at the Tata Institute of Social Sciences&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ramkumar.jpg/image_preview" title="Ramakumar" height="171" width="202" alt="Ramakumar" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Ramakumar spoke on UID, its collection of information and the 
threat to individual privacy. First, he provided a historical trajectory
 of national security that has led to increased identity card schemes. 
He described the concrete connection between UID and national security.
&lt;p&gt;&lt;br /&gt;He briefed the gathering on the objectives of the UID project. He 
described several false claims as proposed by the UIDAI. He explicitly 
disproved the UIDAI claim that Aadhaar is voluntary. He did this by 
comparing various legislations associated with the National Population 
Registrar that had provisions mandating the inclusion of the UID number.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He went on to explain that the misplaced emphasis of technology to 
handle large populations remains unproven. He described two specific 
violations of privacy inherent in the UID system: convergence of 
information and consent. The UID database makes it possible for the 
linking or convergence of information across silos. In addition, consent
 is unaccounted for in the UID system. The UID enrollment form requires 
consent from a person to share their information. However, the software 
of the enrollment form automatically checks ‘yes’, therefore you are not
 asked. Even if you disagree, it automatically checks ‘yes’. Default 
consent raises the important question, “to what extent are we the owners
 of our information?” and “what are the privacy implications?”&lt;/p&gt;
&lt;p&gt;Mr. Ramakumar was once asked, by Yashwant Sinha in a Parliamentary Standing Committee meeting, “Is the Western concept of privacy important in developing country like India?”. Using this question posed to him, he stressed the importance of privacy to be understood as a globally valued right, entitlement and freedom. He also referred to Amartya Sen’s work on individual freedoms.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;During the daylong consultation numerous questions and themes relating to privacy were discussed:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;&lt;li&gt;How is the right to privacy defined?&lt;/li&gt;&lt;li&gt;How can the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy" class="internal-link" title="Draft Bill on Right to Privacy"&gt;Draft Privacy Bill&lt;/a&gt; redefine the right to privacy?&lt;/li&gt;&lt;li&gt;How can reasonable deterrence mechanisms be included?&lt;/li&gt;&lt;li&gt;Does duplication of the right to privacy exists in different statutes?&lt;/li&gt;&lt;li&gt;Is the Cyber Appellate Tribunal an ideal monitoring mechanism or authority? &lt;br /&gt;&lt;/li&gt;&lt;li&gt;What are the circumstances under which authorized persons can exercise the Right of privacy invasion?&lt;/li&gt;&lt;li&gt;How can the Draft Privacy Bill account for the right to dignity?&lt;/li&gt;&lt;li&gt;How much information should the State be allowed to collect?&lt;/li&gt;&lt;li&gt;How can citizens become more informed about the use of their information and the privacy implications involved?&lt;/li&gt;&lt;li&gt;What would be the appropriate balance or trade-off between security and civil liberties?&lt;/li&gt;&lt;li&gt;What are the dangers with permitting the needs of national security to trump competing values?&lt;/li&gt;&lt;li&gt;What are the consequences for the homosexual community, when faced with institutionalized disregard for privacy? &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_usha.jpg/image_preview" alt="Usha " class="image-inline image-inline" title="Usha " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="https://cis-india.org/home-images/contests.jpg/image_preview" alt="Participants" class="image-inline image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill'&gt;https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-02-15T04:27:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books">
    <title>How India Makes E-books Easier to Ban than Books (And How We Can Change That)</title>
    <link>https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books</link>
    <description>
        &lt;b&gt;Without getting into questions of what should and should not be unlawful speech, Pranesh Prakash chooses to take a look at how Indian law promotes arbitrary removal and blocking of websites, website content, and online services, and how it makes it much easier than getting offline printed speech removed.&lt;/b&gt;
        &lt;h2&gt;E-Books Are Easier To Ban Than Books, And Safer&lt;/h2&gt;
&lt;p&gt;Contrary to what Mr. Sibal's recent hand-wringing at objectionable online material might suggest, under Indian laws currently in force it is far easier to remove material from the Web, by many degrees of magnitude, than it is to ever get them removed from a bookstore or an art gallery.  To get something from a bookstore or an art gallery one needs to collect a mob, organize collective outrage and threats of violence, and finally convince either the government or a magistrate that the material is illegal, thereby allowing the police to seize the books or stop the painting from being displayed.  The fact of removal of the material will be noted in various records, whether in government records, court records, police records or in newspapers of record.    By contrast, to remove something from the Web, one needs to send an e-mail complaining about it to any of the string of 'intermediaries' that handle the content: the site itself, the web host for the site, the telecom companies that deliver the site to your computer/mobile, the web address (domain name) provider, the service used to share the link, etc.  Under the &lt;a href="https://cis-india.org/internet-governance/resources/intermediary-guidelines-rules"&gt;'Intermediary Guidelines Rules'&lt;/a&gt; that have been in operation since 11th April 2011, all such companies are required to 'disable access' to the complained-about content within thirty-six hours of the complaint.  It is really that simple.&lt;/p&gt;

&lt;p&gt;"That's ridiculous," you think, "surely he must be exaggerating."  Think again.  A researcher working with us at the Centre for Internet and Society tried it out, several times, with many different intermediaries and always with frivolous and flawed complaints, and was successful &lt;a class="external-link" href="http://www.cis-india.org/news/chilling-impact-of-indias-april-internet-rules"&gt; six out of seven times &lt;/a&gt;.  Thus it is easier to prevent Flipkart or Amazon from selling Rushdie's Midnight's Children than it is to prevent a physical bookstore from doing so: today Indira Gandhi wouldn't need to win a lawsuit in London against the publishers to remove a single line as she did then; she would merely have to send a complaint to online booksellers and get the book removed.  It is easier to block Vinay Rai's Akbari.in (just as CartoonsAgainstCorruption.com was recently blocked) than it is to prevent its print publication.  Best of all for complainants: there is no penalty for frivolous complaints such as those sent by us, nor are any records kept of who's removed what.  Such great powers of censorship without any penalties for their abuse are a sure-fire way of ensuring a race towards greater intolerance, with the Internet — that republic of opinions and expressions — being a casualty.&lt;/p&gt;

&lt;h2&gt;E-Book Bans Cannot Be Challenged&lt;/h2&gt;
&lt;p&gt;In response to some of the objections raised, the Cyberlaw Division of the Department of Information Technology, ever the dutiful guardian of free speech, noted that if you have a problem with access to your content being 'disabled', you could always &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=72066"&gt;approach a court&lt;/a&gt; and get that ban reversed.  Unfortunately, the Cyberlaw Division of the Department of Information Technology forgot to take into account that you can't contest a ban/block/removal if you don't know about it.  While they require all intermediaries to disable access to the content within thirty-six hours, they forgot to mandate the intermediary to tell you that the content is being removed.  Whoops.  They forgot to require the intermediary to give public notice that content has been removed following a complaint from person ABC or corporation XYZ on such-and-such grounds.  Whoops, again.&lt;/p&gt;

&lt;p&gt;So while records are kept, along with reasons, of book bans, there are no such records required to be kept of e-book bans.&lt;/p&gt;


&lt;h2&gt;E-Book Censors Are Faceless&lt;/h2&gt;
&lt;p&gt;Vinay Rai is a brave man.  He is being attacked by fellow journalists who believe he's disgracing the professional upholders of free-speech, and being courted by television channels who believe that he should be encouraged to discuss matters that are sub judice.  He is viewed by some as a man who's playing politics in courts on behalf of unnamed politicians and bureaucrats, while others view him as being bereft of common-sense for believing that companies should be legally liable for not having been clairvoyant and removing material he found objectionable, though he has never complained to them about it, and has only provided that material to the court in a sealed envelope.    I choose, instead, to view him as a scrupulous and brave man.  He has a face, and a name, and is willing to openly fight for what he believes in.  However, there are possibly thousands of unscrupulous Vinay Rais out there, who know the law better than he does, and who make use not of the court system but of the Intermediary Guidelines Rules, firmly assured by those Rules that their censorship activities will never be known, will never be challenged by Facebook and Google lawyers, and will never be traced back to them.&lt;/p&gt;
&lt;h2&gt;Challenging Invisible Censorship&lt;/h2&gt;
&lt;p&gt;Dear reader, you may have noticed that this is a bit like a trial involving Free Speech in which Free Speech is presumed guilty upon complaint, is not even told what the charges against it are, has not been given a chance to prove its innocence, and has no right to meet its accusers nor to question them.  Yet, the Cyberlaw Division of the Department of Information Technology continues to issue press releases defending these Rules as fair and just, instead of being simultaneously Orwellian and Kafkaesque.  These Rules are delegated legislation passed by the Department of Information Technology under &lt;a href="https://cis-india.org/internet-governance/resources/section-79-information-technology-act"&gt;s.79 of the Information Technology Act&lt;/a&gt;.  The Rules were laid before Parliament during the 2011 Monsoon session.  We at CIS believe that these Rules are *ultra vires* the IT Act as well as the Constitution of India, not only with respect to what is now (newly) proscribed online (which in itself is enough to make it unconstitutional), but how that which is purportedly unlawful is to be removed.  We have prepared an alternative that we believe is far more just and in accordance with our constitutional principles, taking on best practices from Canada, the EU, Chile, and Brazil, while still allowing for expeditious removal of unlawful material.  We hope that the DIT will consider adopting some of the ideas embodied in our draft proposal.&lt;/p&gt;

&lt;p&gt;As Parliament passed the IT Act in the midst of din, without any debate, it is easy to be skeptical and wonder whether Rules made under the IT Act will be debated.  However, I remain hopeful that Parliament will not only exercise its power wisely, but will perform its solemn duty — borne out of each MP's oath to uphold our Constitution — by rejecting these Rules.&lt;/p&gt;

&lt;p&gt;Photo credit: &lt;a href="https://secure.flickr.com/photos/grandgrrl/5240360344/"&gt;Lynn Gardner&lt;/a&gt;, under CC-BY-NC-SA 2.0 licence*&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?279712"&gt;This was reproduced in Outlook Magazine&lt;/a&gt; on 27 January 2012&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books'&gt;https://cis-india.org/internet-governance/blog/india-ebooks-easier-to-ban-than-books&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-02-21T11:50:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
