<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2241 to 2255.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/7th-india-digital-summit-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/mobile-india-2013"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media">
    <title>TV versus Social Media: The Rights and Wrongs</title>
    <link>https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media</link>
    <description>
        &lt;b&gt;For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a toilet, and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham's guest column was &lt;a class="external-link" href="http://www.tribuneindia.com/2013/20130120/edit.htm#2"&gt;published in the Tribune &lt;/a&gt;on January 20, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many in traditional media, especially television, look at social media with a mixture of envy and trepidation. They have been at the receiving end of various unsavoury characters online and consequently support regulation of social media. A common question asked by television anchors is "shouldn't they be subject to the same regulation as us?" This is because they employ the 'principle of equivalence', according to which speech that is illegal on broadcast media should also be illegal on social media and vice versa. According to this principle, criticising a bandh on national TV or in a newspaper op-ed or on social media should not result in jail time and, conversely, publishing obscene content, in either new or old media, should render you a guest of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that Section 66-A of the Information Technology Act, 2000, places more draconian and arguably unconstitutional limits on free speech when compared to the regulation of traditional and broadcast media, those in favour of civil liberties may be tempted to agree with the 'principle of equivalence' since that will mean a great improvement from status quo. However, we must remember that this compromise goes too far since potential for harm through social media is usually very limited when compared to traditional media, especially when it comes to hate speech, defamation and infringement of privacy. A Facebook update or 'like' or a tweet from an ordinary citizen usually passes completely unnoticed. On rare occasion, an expression on social media originating from an ordinary citizen goes viral and then the potential for harm increases dramatically. But since this is the fringe case we cannot design policy based on it. On the other hand, public persons (those occupying public office and those in public life), including television journalists, usually have tens and hundreds of thousands friends and followers on these social networks and, therefore, can more consistently cause harm through their speech online. For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a public or residential toilet and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ideally speech regulation should address the asymmetries in the global attention economy by constantly examining the potential for harm. This applies to both 'speech about' public persons and also 'speech by' them. Since 'speech about' public persons is necessary for transparent and accountable governance and public discourse, such speech must be regulated less than 'speech about' ordinary citizens. Let us understand this using two examples: One, a bunch of school kids referring to a classmate as an idiot on a social network is bullying, but citizens using the very same term to criticise a minister or television anchor must be permitted. Two, an ordinary citizen should be allowed to photograph or video-record the acts of a film or sports star at a public location and upload it to a social network, but this exception to the right of privacy based on public interest will not imply that the same ordinary citizen can publish photographs or videos of other ordinary citizens. Public scrutiny and criticism is part of the price to be paid for occupying public office or public life. If speech regulation is configured to prevent damage to the fragile egos of public persons, then it would have a chilling effect on many types of speech that are critical in a democracy and an open society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to 'speech by' those in public office or in public life - given the greater potential for harm - they should be held more liable for their actions online. For example, an ordinary citizen with less than 100 followers causes very limited harm to the reputation of a particular person through a defamatory tweet. However, if the very same tweet is retweeted by a television anchor with millions of followers, there can be more severe damage to that particular person's reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many in television also wish to put an end to anonymous and pseudonymous speech online. They would readily agree with Nandan Nilekani's vision of tagging all - visits to the cyber cafe, purchases of broadband connections and SIM cards and, therefore, all activities from social media accounts with the UID number. I have been following coverage of the Aadhaar project for the past three years. Often I see a 'senior official from the UIDAI' make a controversial point. If anonymous speech is critical to protect India's identity project then surely it is an important form of speech. But, unlike the print media, which more regularly uses anonymous sources for their stories, television doesn't see clearly the connection between anonymous speech and free media. This is because many of the trolls that harass them online often hide behind pseudonymous identities. Television forgets that anonymous speech is at the very foundation of our democracy, i.e., the electoral ballot.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media'&gt;https://cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-21T03:09:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness">
    <title>Web of Sameness</title>
    <link>https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness</link>
    <description>
        &lt;b&gt;The social Web has been an ominous space at the start of 2013. It has been awash with horror, pain and grief. The recent gang rape and death of a medical student in Delhi prevents one from being too optimistic about the year to come. My live feeds on various social networks are filled with rue and rage at the gruesome incident and the seeming depravity of our society. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Nishant Shah's column was &lt;a class="external-link" href="http://www.indianexpress.com/news/web-of-sameness/1058374/0"&gt;published in the Indian Express&lt;/a&gt; on January 18, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As I contemplate the event, I see that the Web has become a space for coping with pain and mitigating the horror of our lives. I feel comforted, when I go online, and see people grieving for a woman they never knew, and demanding better conditions for all. As I look at these resolves for change, battle cries demanding justice, and angry responses directed at imagined and imaginary perpetrators of these crimes, I realise that I have heard it all before, over and over again.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Not Again!” has been the refrain of the year. If life were a musical, this would have been the persistent chorus line of 2012. From fighting against censorship and violation of privacy by government and corporations to acts of hatred, or from ridiculing the map glitches on the iPhone to seeing the growing stronghold of authoritarian forces over the social Web, we have repeatedly rolled our digital sleeves, gnashed our fingers on the keyboards and shouted in political solidarity, “Not Again!”. While this show of protest, this robust expression of change holds a promise of how things will change for the better, it is also a refrain that has lost its bite. What does it mean, this ability to repeatedly say “Not Again!” only to experience these horrors in despairing cyclic patterns?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I want to see how the social Web and the new public spheres online might offer us outlets for emotions but not necessarily platforms for action. Some of the earliest critiques of the Web expressed the fear that given the extreme customisation of social networks, we might soon reside only in digital echo chambers. In the heavily informatised ages that we live in, it is not uncommon to set up specific groups that we belong to, identify friends that we talk with, mark people we follow, set up circles we share in, and configure filters that help us receive information that is tailor-made to suit our personalised preferences. Unfortunately, this quest for selective information sampling often means that we separate the digital spaces of life from the physical ones, without even realising it. We might be seamlessly navigating these two spaces, not really caring for the distinctions of “virtual reality” and “real life”, but in instances like these, it is easy to see how we shroud ourselves in echo chambers, never allowing voices to translate into the world of action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You are sure to have been bombarded with tweets that have insightfully analysed the conditions of safety in our public spaces. And in all of this, like me, you must have been comforted thinking that there is still hope. But for every “like” you received on your status update, for every time your tweet got favourited or retweeted, for every time you found yourself agreeing with the social experts, you also separated yourself from the reality. Because the people who gave your opinions the attention, are actually people just like you. They are already on your side of things. Talking to them, exchanging ideas with them, calling for change side-by-side is like preaching to the choir, but it gives us a sense of having reached out. The voices in an echo chamber are not just repeated ad nauseum, but they are also not heard by anybody else on the outside, thus stifling the energy and passions that might have resulted in real change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Web also offers an easy separation of us versus them. As coping mechanisms and as a way of distancing ourselves from these events, the Web offers us a clear disavowal of guilt. The young man, who shot those children in the school, was mentally unstable. The laws that allowed him to purchase guns are because of the politicians and the arms industry. The student, who got raped in a bus, is the responsibility of the ‘rape capital’ Delhi. If we were in charge, these things would not have happened this way. But now they have happened, and so we will be angry, we will be shocked, we will tweet “Not Again!” and then quickly shift our ever-expanding attention to the burgeoning space of information online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And then we will wait, for the next incident to happen — oh, not the same, but similar — and we will go through this process once again.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If I have to look into the future and hope that 2013 shall be the year of change, then I am hoping that the change will be from “Not Again” to a “Never Again”. We will have to learn how to use the energy, the power of the Web, the influence of the digital crowds on the digital commons, to produce a change that goes beyond the social network feeds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope that the social Web matures. We have to make sure that the promise of change that the digital social network offers, does not die as armchair clicktivism that witnesses but does nothing to change the act that affects us.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness'&gt;https://cis-india.org/internet-governance/blog/indianexpress-nishant-shah-january-12-2013-web-of-sameness&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-18T06:17:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age">
    <title>Is freedom of expression under threat in the digital age?</title>
    <link>https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age</link>
    <description>
        &lt;b&gt;This week Index held a high level panel debate in partnership with the Editors Guild of India and the India International Centre to discuss the question “Is freedom of expression under threat in the digital age?” Mahima Kaul reports&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This post by Mahima Kaul was &lt;a class="external-link" href="http://www.indexoncensorship.org/2013/01/india-conference-index/"&gt;published in Index on Censorship&lt;/a&gt; on January 18, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Index on Censorship, in partnership with The Editors Guild of India,  hosted a debate in New Delhi on Tuesday (15 January) asking, “Is freedom  of expression under threat in the digital age?”  Discussing the topic  were Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div id="themename"&gt;&lt;a href="http://www.indexoncensorship.org/theme/digital-media/" rel="tag"&gt;Digital&lt;/a&gt;&lt;/div&gt;
&lt;h1 class="post"&gt;&lt;a href="http://www.indexoncensorship.org/2013/01/india-conference-index/" rel="bookmark"&gt;Is freedom of expression under threat in the digital age?&lt;/a&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span class="date"&gt;18 Jan 2013&lt;/span&gt;&lt;/p&gt;
&lt;div class="clearfix buttons-wrap" style="float:left; "&gt;&lt;br /&gt;
&lt;div&gt;
&lt;div class="fb_iframe_widget fb_edge_widget_with_comment fb-like"&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;b&gt;This week Index held a&lt;/b&gt;&lt;b&gt; high level panel&lt;/b&gt;&lt;b&gt; debate  in partnership with the Editors Guild of India and the India  International Centre to discuss the question “Is freedom of expression  under threat in the digital age?” Mahima Kaul reports &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="more-43750"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Index  on Censorship, in partnership with The Editors Guild of India, hosted a  debate in New Delhi on Tuesday (15 January) asking, “Is freedom of  expression under threat in the digital age?”  Discussing the topic were  Ajit Balakrishnan (founder and Chief Executive of &lt;a href="http://rediff.com/" target="_blank"&gt;rediff.com&lt;/a&gt;),  Index on Censorship CEO Kirsty Hughes, Sunil Abraham (Executive  Director of the centre for Internet and Society), and Professor Timothy  Garton Ash, Director of the Free Speech Debate  project.&lt;/p&gt;
&lt;p&gt;Sunil  Abraham  questioned the idea of technology specific “internet freedom”  that has been advocated by many not least the US Secretary of State  Hillary Clinton. He said there was for instance much greater freedom and  diversity on Indian TV than in the US.  He also argued that that this  freedom does not seem to extend to a right of access to knowledge, as  demonstrated by the charges brought against open access activist and  developer Aaron Swartz, who committed suicide earlier this month. Swartz  was &lt;a href="http://blog.indexoncensorship.org/2013/01/14/aaron-swartz-reddit/" target="_blank"&gt;facing charges&lt;/a&gt; for allegedly downloading 4.8 million academic articles from subscription-only digital library JSTOR.&lt;/p&gt;
&lt;p&gt;Abraham  said one unintentional effect of censorship by governments is that it  teaches citizens how to protect themselves online. Finally, he  questioned the Indian government’s draconian laws and arbitrary actions &lt;a href="http://uncut.indexoncensorship.org/2012/08/india-internet-freedom/" target="_blank"&gt;in the digital realm&lt;/a&gt;,  wondering whether this is the authorities’ way of warning future  netizens about “acceptable online behaviour”, to condition the public  not to criticise the government and to create a chilling effect.&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg"&gt;&lt;img class="wp-image-43807" height="316" src="http://www.indexoncensorship.org/wp-content/uploads/2013/01/indiaevent.jpg" title="indiaevent" width="602" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Freedom  of expression is always under threat and in need of defending, argued  Timothy Garton Ash. However, he didn’t think the threat was particularly  high today  in the digital realm — rather the threats to privacy were  what were particularly concerning online. With 76.8 per cent of India’s  1.2 billion population connected by mobile phone, there is an  extraordinary opportunity for the prevalence of freedom of expression  brought about by new technologies. But he said there are also a lot of  challenges to free expression in India — and that “swing states” such as  Brazil and India will be very important in determining where the global  conversation goes on freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajit Balakrishnan,  founder of web portal Rediff.com, explained that many of the problems  that have occurred in the digital realm in India have to do with poor  drafting of legislation. He was particularly concerned about  intermediary liability and explained why and how intermediaries roles  needed protecting. He also explained that government officials have  genuine problems with phrasing, and that when it comes to the  application of these laws, understanding them and when they should be  applied will take another 25 years. He added that the country is  challenged by a legal system ill-equipped for coping with new  technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kirsty Hughes said that freedom of expression is a  universal right, meant to be applied across borders not just within  countries.  She said that while the digital domain allowed a big  expansion in freedom of expression there were risks we are heading  towards a more controlled net, a partially censored net, and a  fragmented net (for instance with Iran attempting to build its own  internet disconnected from the rest of the world). She said that some of  the negative reactions by government to social media in India were seen  to in the UK where there had been a trend towards criminalising  supposedly offensive comment — although the new interim guidelines on  social media prosecutions were a step in the right direction.  Hughes  emphasised three main concerns — state censorship, privatisation of  censorship and the role of big companies, and mass surveillance. She  pointed out that the British government had pushed for extensive  surveillance with the Communications Data Bill, but this has now been  shelved after a critical report from MPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ramanjit Singh Chima,  policy adviser for Google, said that  the question is not about absolute  freedom, but about what is appropriate and lawful. He emphasised that  in the US, judges had strongly defended free expression online as they  saw the digital world as a powerful space for free exprssion.  He  pointed out how effective social media tools, including Google’s own  products, have become in helping during emergency situations like  natural disasters and terrorist attacks. He also pointed out that the  internet is not only about free expression but business as well. The  internet contributes to 1.6 per cent of India’s GDP. Singh Chima said  positive judgements by US  and EU courts protect the users, adding that  regulation for the net should be appropriate for its engineering.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age'&gt;https://cis-india.org/news/index-on-censorship-mahima-kaul-january-18-2013-is-freedom-of-expression-under-threat-in-the-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-03T10:50:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age">
    <title>Is freedom of expression under threat in digital age?</title>
    <link>https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age</link>
    <description>
        &lt;b&gt;With social networking site Facebook boasting of 1 billion members globally and micro-blogging site Twitter claiming millions, opinion was divided on whether the freedom of expression was under threat in the digital age.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article was originally published by&lt;a class="external-link" href="http://in.news.yahoo.com/freedom-expression-under-threat-digital-age-035801134.html"&gt; Indo Asian News Service&lt;/a&gt; on January 16, 2013. It was also covered in &lt;a class="external-link" href="http://www.business-standard.com/generalnews/ians/news/is-freedomexpression-under-threat-in-digital-age/110168/"&gt;Business Standard&lt;/a&gt;, &lt;a class="external-link" href="http://www.vancouverdesi.com/news/is-freedom-of-expression-under-threat-in-digital-age/453154/"&gt;Vancouver Desi&lt;/a&gt;, &lt;a class="external-link" href="http://www.dnaindia.com/scitech/report_is-freedom-of-expression-under-threat-in-digital-age_1789344"&gt;DNA&lt;/a&gt;, and &lt;a class="external-link" href="http://tech2.in.com/news/general/is-freedom-of-expression-under-threat-in-digital-age/695272"&gt;Tech2&lt;/a&gt;. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p id="yui_3_5_1_19_1358402432026_232" style="text-align: justify; "&gt;"Censorship of content should be  the last resort as curbing a particular content online actually  amplifies its spread over the internet," said &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_6"&gt;Sunil Abraham&lt;/span&gt; from Centre for Internet and Society.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_224" style="text-align: justify; "&gt;He was speaking at a panel discussion organised by London based &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_7"&gt;Index on Censorship&lt;/span&gt; and the &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_1"&gt;Editors Guild of India&lt;/span&gt; on the issue at the &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_3"&gt;India International Centre&lt;/span&gt; Tuesday evening.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_276" style="text-align: justify; "&gt;"The government has refused to  amend Section 66(A) of the IT Act which is used to curb free speech on  the net," said Guild chief TN Ninan who moderated the debate. "The law  treats digital media differently than the print media," he said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_230" style="text-align: justify; "&gt;Director of Free Speech Debate, Oxford University, &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_5"&gt;Timothy Garton Ash&lt;/span&gt; said, "There was no threat to the freedom of speech as internet was  actually an opportunity for spreading freedom of expression."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_289" style="text-align: justify; "&gt;India with the large number of  net users could act as swing state between two extremes of China which  is trying to control the net and the US which champions free speech, he  said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_296" style="text-align: justify; "&gt;"The question is what are the legitimate limits of free speech rather than asking for unlimited speech," said Ash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ajit Balakrishnan, CEO and founder of online portal rediff.com, said  "there was a sense of powerlessness among nation states as only local  laws applied to any such violations."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_277" style="text-align: justify; "&gt;He said the internet was not so  democratic as it sounded as the actual numbers of users who posted  content on Facebook were just 8-9 million while the rest just watched.  The same was with Twitter with just 7-8 percent users actually posting  messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kirsty Hughes, CEO, Index on Censorship, said "freedom of speech was  universal" while noting a "worrying trend that increasingly governments  were moving to control the internet."&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_284" style="text-align: justify; "&gt;"The risks of such controls are that we could have a much more controlled, censored and fragmented internet," she said.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_228" style="text-align: justify; "&gt;Ramanjit Singh Chima of Google India stressed on the need to have laws to protect &lt;span class="cs4-ndcor yshortcuts" id="lw_1358308825_4"&gt;internet freedom&lt;/span&gt; as such curbs affected livelihood of many users and contributed to local economies.&lt;/p&gt;
&lt;p id="yui_3_5_1_19_1358402432026_295" style="text-align: justify; "&gt;He said the internet allowed people to instantly collaborate and publish critical information during emergency situations.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age'&gt;https://cis-india.org/news/ians-news-is-freedomexpression-under-threat-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-17T06:16:09Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig">
    <title>An Introduction to Bitfilm and Bitcoin – A Discussion by Aaron Koenig</title>
    <link>https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society, Bangalore invites you to a talk by Aaron Koenig, Managing Director, Bitfilm Networks of Hamburg, Germany on January 23, 2013, from 7.00 p.m. to 9.00 p.m.&lt;/b&gt;
        &lt;h3&gt;The Talk&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron Koenig will give a talk on the creation and use of Bitcoin, a  new digital currency and payment system designed for the voting process  of the Bitfilm Festival for Digital Film. Since the year 2000, the  Bitfilm Festival has been showcasing films that use digital technology  in a creative and innovative way. It takes place on the Internet. However,  physical screenings of the films will be held in Bangalore and in  Hamburg. Each of the 59 nominated digital animations has its own Bitcoin  account, and users worldwide may vote by donating Bitcoins to the films  they like anonymously and without any transfer costs. The donated money  will be divided among the most popular films (the films with the most  votes/Bitcoins).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aaron will also present an animated short about Bitcoin which he has  produced with an animation team based in Bangalore. Of course, the  animators were paid in Bitcoin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More info on the Bitfilm Festival: &lt;a class="moz-txt-link-freetext" href="http://www.bitfilm.com/festival"&gt;http://www.bitfilm.com/festival&lt;/a&gt;&lt;br /&gt;More info on Bitcoin: &lt;a class="moz-txt-link-freetext" href="http://blink.li/current-issue"&gt;http://blink.li/current-issue&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;VIDEO&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/mOCBjDM6ZiQ" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aaron Koenig&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Aaron is the Managing Director of Bitfilm. He has  run the organization since 1999. He is a vibrant member of art and film  societies and an Entrepreneur. Currently engaged with Bitfilm.com, Aaron  also publishes a political magazine called BLINK.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig'&gt;https://cis-india.org/internet-governance/events/bitfilm-and-bitcoin-a-discussion-by-aaron-koenig&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-05T10:14:54Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights">
    <title>Draft International Principles on Communications Surveillance and Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights</link>
    <description>
        &lt;b&gt;These principles were developed by Privacy International and the Electronic Frontier Foundation and seek to define an international standard for the surveillance of communications. The Centre for Internet and Society has been contributing feedback to the principles. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The principles are still in draft form. The most recent version can be accessed &lt;a class="external-link" href="http://necessaryandproportionate.net"&gt;here&lt;/a&gt;. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our goal is that these principles will provide civil society groups, industry, and governments with a framework against which we can evaluate whether current or proposed surveillance laws and practices are consistent with human rights. We are concerned that governments are failing to develop legal frameworks to adhere to international human rights and adequately protect communications privacy, particularly in light of innovations in surveillance laws and techniques.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles are the outcome of a consultation with experts from civil society groups and industry across the world. It began with a meeting in Brussels in October 2012 to address shared concerns relating to the global expansion of government access to communications. Since the Brussels meeting we have conducted further consultations with international experts in communications surveillance law, policy and technology.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are now launching a global consultation on these principles. Please send us comments and suggestions by January 3rd 2013, by emailing rights (at) eff (dot) org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Preamble&lt;/b&gt;&lt;br /&gt;Privacy is a fundamental human right, and is central to the maintenance of democratic societies. It is essential to human dignity and it reinforces other rights, such as freedom of expression and association, and is recognised under international human rights law.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Activities that infringe on the right to privacy, including the surveillance of personal communications by public authorities, can only be justified where they are necessary for a legitimate aim, strictly proportionate, and prescribed by law.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before public adoption of the Internet, well-established legal principles and logistical burdens inherent in monitoring communications generally limited access to personal communications by public authorities. In recent decades, those logistical barriers to mass surveillance have decreased significantly. The explosion of digital communications content and information about communications, or “communications metadata”, the falling cost of storing and mining large sets of data, and the commitment of personal content to third party service providers make surveillance possible at an unprecedented scale.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is universally accepted that access to communications content must only occur in exceptional situations, the frequency with which public authorities are seeking access to information about an individual’s communications or use of electronic devices is rising dramatically—without adequate scrutiny. &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; When accessed and analysed, communications metadata may create a profile of an individual's private life, including medical conditions, political and religious viewpoints, interactions and interests, disclosing even greater detail than would be discernible from the content of a communication alone. &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Despite this, legislative and policy instruments often afford communications metadata a lower level of protection and do not place sufficient restrictions on how they can be subsequently used by agencies, including how they are data-mined, shared, and retained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore necessary that governments, international organisations, civil society and private service providers articulate principles establishing the minimum necessary level of protection for digital communications and communications metadata (collectively "information") to match the goals articulated in international instruments on human rights— including a democratic society governed by the rule of law. The purpose of these principles is to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Provide guidance for legislative changes and advancements related to communications and   communications metadata to ensure that pervasive use of modern  communications technology does not result in an erosion of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish appropriate      safeguards to regulate access by public authorities (government agencies,      departments, intelligence services or law enforcement agencies) to      communications and communications metadata about an individual’s use of an      electronic service or communication media. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We call on governments to establish stronger protections as required by their constitutions and human rights obligations, or as they recognize that technological changes or other factors require increased protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These principles focus primarily on rights to be asserted against state surveillance activities. We note that governments are required not only to respect human rights in their own conduct, but to protect and promote the human rights of individuals in general.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Companies are required to follow data protection rules and yet are also compelled to respond to lawful requests. Like other initiatives,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; we hope to provide some clarity by providing the below principles on how state surveillance laws must protect human rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Principles&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legality&lt;/b&gt;: Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Legitimate Purpose&lt;/b&gt;: Laws should only allow access to communications or communications metadata by authorised public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Necessity&lt;/b&gt;: Laws allowing access to communications or communications metadata by authorised public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adequacy&lt;/b&gt;: Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Competent Authority&lt;/b&gt;: Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proportionality&lt;/b&gt;: Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Due process&lt;/b&gt;: Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorised in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorisation by a competent authority, except when there is imminent risk of danger to human life. &lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User notification&lt;/b&gt;: Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transparency about use of government surveillance&lt;/b&gt;: The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations, and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Oversight&lt;/b&gt;: An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at a minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Integrity of communications and systems&lt;/b&gt;: It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, &lt;i&gt;a priori&lt;/i&gt; data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards for international cooperation&lt;/b&gt;: In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Safeguards against illegitimate access&lt;/b&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organisations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cost of surveillance&lt;/b&gt;: The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Organisations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Article 19 (International)&lt;/li&gt;
&lt;li&gt;Bits of Freedom (Netherlands)&lt;/li&gt;
&lt;li&gt;Center for Internet &amp;amp;      Society India (CIS India)&lt;/li&gt;
&lt;li&gt;Derechos Digitales (Chile)&lt;/li&gt;
&lt;li&gt;Electronic Frontier Foundation      (International)&lt;/li&gt;
&lt;li&gt;Privacy International      (International)&lt;/li&gt;
&lt;li&gt;Samuelson-Glushko Canadian      Internet Policy and Public Interest Clinic (Canada)&lt;/li&gt;
&lt;li&gt;Statewatch (UK)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Individuals&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Renata Avila, human rights      lawyer (Guatemala)&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Footnotes&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]For more information about the      background to these principles and the process undertaken, see      https://www.privacyinternational.org/blog/towards-international-principles-on-communications-surveillance&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]Universal Declaration of Human      Rights Article 12, United Nations Convention on Migrant Workers Article      14, UN Convention of the Protection of the Child Article 16, International      Covenant on Civil and Political Rights, International Covenant on Civil      and Political Rights Article 17; regional conventions including Article 10      of the African Charter on the Rights and Welfare of the Child, Article 11      of the American Convention on Human Rights, Article 4 of the African Union      Principles on Freedom of Expression, Article 5 of the American Declaration      of the Rights and Duties of Man, Article 21 of the Arab Charter on Human      Rights, and Article 8 of the European Convention for the Protection of      Human Rights and Fundamental Freedoms; Johannesburg Principles on National      Security, Free Expression and Access to Information, Camden Principles on      Freedom of Expression and Equality.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]Martin Scheinin, “Report of the      Special Rapporteur on the promotion and protection of human rights and      fundamental freedoms while countering terrorism,” p11, available at &lt;a href="http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf"&gt;http://www2.ohchr.org/english/issues/terrorism/rapporteur/docs/A_HRC_13_37_AEV.pdf&lt;/a&gt;.      See also General Comments No. 27, Adopted by The Human Rights Committee      Under Article 40, Paragraph 4, Of The International Covenant On Civil And      Political Rights, CCPR/C/21/Rev.1/Add.9, November 2, 1999, available at &lt;a href="http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument"&gt;http://www.unhchr.ch/tbs/doc.nsf/0/6c76e1b8ee1710e380256824005a10a9?Opendocument&lt;/a&gt;.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]Communications metadata may      include information about our identities (subscriber information, device      information), interests, including medical conditions, political and      religious viewpoints (websites visited, books and other materials read,      watched or listened to, searches conducted, resources used), interactions      (origins and destinations of communications, people interacted with,      friends, family, acquaintances), location (places and times, proximities      to others); in sum, logs of nearly every action in modern life, our mental      states, interests, intentions, and our innermost thoughts.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]For example, in the United      Kingdom alone, there are now approximately 500,000 requests for      communications metadata every year, currently under a self-authorising      regime for law enforcement agencies, who are able to authorise their own      requests for access to information held by service providers. Meanwhile,      data provided by Google’s Transparency reports shows that requests for      user data from the U.S. alone rose from 8888 in 2010 to 12,271 in 2011.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]See as examples, a review of      Sandy Petland’s work, ‘Reality Mining’, in MIT’s Technology Review, 2008,      available at &lt;a href="http://www2.technologyreview.com/article/409598/tr10-reality-mining/"&gt;http://www2.technologyreview.com/article/409598/tr10-reality-mining/&lt;/a&gt; and also see Alberto Escudero-Pascual and Gus Hosein, ‘Questioning lawful      access to traffic data’, Communications of the ACM, Volume 47 Issue 3,      March 2004, pages 77 - 82.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]Report of the UN Special      Rapporteur on the promotion and protection of the right to freedom of      opinion and expression, Frank La Rue, May 16 2011, available at &lt;a href="http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf"&gt;http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]The Global Network Initiative      establishes standards to help the ICT sector protect the privacy and free      expression of their users. See &lt;a href="http://www.globalnetworkinitiative.org/"&gt;http://www.globalnetworkinitiative.org/&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]As defined by international and      regional conventions mentioned above.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]Where judicial review is waived      in such emergency cases, a warrant must be retroactively sought within 24      hours.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]One example of such a report is      the US Wiretap report, published by the US Court service. Unfortunately      this applies only to interception of communications, and not to access to      communications metadata. See &lt;a href="http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx"&gt;http://www.uscourts.gov/Statistics/WiretapReports/WiretapReport2011.aspx&lt;/a&gt;.      The UK Interception of Communications Commissioner publishes a report that      includes some aggregate data but it is does not provide sufficient data to      scrutinise the types of requests, the extent of each access request, the      purpose of the requests, and the scrutiny applied to them. See &lt;a href="http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top"&gt;http://www.intelligencecommissioners.com/sections.asp?sectionID=2&amp;amp;type=top&lt;/a&gt;.&lt;/p&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights'&gt;https://cis-india.org/internet-governance/blog/draft-intl-principles-on-communications-surveillance-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:55:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin">
    <title>Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin</link>
    <description>
        &lt;b&gt;This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression that took place in Dhaka, Bangladesh, on January 14–15, 2013.&lt;/b&gt;
        &lt;p&gt;Bangladeshi blogger Asif Mohiuddin was brutally attacked in a stabbing last evening.  His condition is currently said to be critical.  Violent attacks on mediapersons have led to at least four deaths in the past year.  This trend is now extending to those writing online.&lt;/p&gt;
&lt;p&gt;It is the duty of societies at large to ensure that principles we universally consider sacrosanct, such as the right to life and liberty and of freedom of expression are in fact ideas, and of the government to actively protect the rights guaranteed under the Constitution of Bangladesh and to ensure they are not just words on paper.&lt;/p&gt;
&lt;p&gt;Article 39 of the Constitution of Bangladesh—and Article 19 of the Universal Declaration of Human Rights—guarantee both the freedom of thought and conscience, as well as the right of every citizen of freedom of speech and expression, and freedom of the press.&lt;/p&gt;
&lt;p&gt;Article 32 of the Constitution of Bangladesh—and Article 3 of the Universal Declaration of Human Rights—guarantee that no person shall be deprived of life or personal liberty except by law.&lt;/p&gt;
&lt;p&gt;The attack on Asif Mohiuddin constitutes a violation these fundamental principle by criminals, and we request the government to act decisively to show it will not tolerate such violations.&lt;/p&gt;
&lt;p&gt;Reporters Without Borders note that "the ability of those in the media to work freely has deteriorated alarmingly in Bangladesh, which is now ranked 129th of 179 countries in the 2011-2012 World Press Freedom Index".&lt;/p&gt;
&lt;p&gt;In general, the situation of those working as non-professional 'citizen journalists' is even worse.  In a 2010 report, the UN Special Rapporteur wrote:
&lt;blockquote&gt;"Citizen journalists are by nature more isolated, they are more vulnerable to attack than professional journalists. However, citizen journalists enjoy less protection than their counterparts in traditional media, as they do not have the support of media organizations and networks, in particular the organizational resources, including lawyers and financial resources, which can help shield them from harassment."&lt;/blockquote&gt;
This reality of greater vulnerability is equally applicable to those who do not self-identify as 'citizen journalists', but use social media to express unpopular opinions.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we call upon the government on Bangladesh to carry out swift investigations into this particular incident and bring the perpetrators to justice, and to grant greater legal support to citizen journalists and ensure better protections for all those who use the Internet as a means of expression.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin'&gt;https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Statement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T11:51:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/7th-india-digital-summit-2013">
    <title>7th India Digital Summit 2013</title>
    <link>https://cis-india.org/news/7th-india-digital-summit-2013</link>
    <description>
        &lt;b&gt;This summitt organised by Internet and Mobile Association of India is being held in New Delhi from January 16 to 17, 2013 at the Lalit Hotel&lt;/b&gt;
        &lt;p&gt;Sunil Abraham is the moderator for Plenary Session 3: Discussion on Social Media – Freedom, Moderation or Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/7th-india-digital-summit-2013" class="internal-link"&gt;Click to download the agenda&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Theme of the Summit&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;951 million mobile users with 448 million mobile data subscribers; 137 million Internet users and rural Internet growing 7x in the last two years make India one of the top three digital markets in the world. One of only top two at this scale with free market economy democratic polity; and the only one where there is still headroom for growth. The time to invest in Digital India is now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By 2020 riding on a government investment of 4 billion USD [roughly 10 billion USD on PPP terms] Internet users is expected to be 600 million; and mobile would possibly penetrate 100% of rural India creating the largest free economy digital market in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Digital Opportunity now and in the next 5 years in India is explosive. And the need to create a Digital Economy on scale is a developmental necessity. The opportunity, however, lies in addressing the current challenges of the ability to provide: low cost connectivity, universal access, usable content, secure networks, affordable devices and enabling policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Building on the theme of “Creating the World’s Largest Free Market Digital Economy” the 7th India Digital Summit will focus on five tracks: Infrastructure, Regulatory Frameworks, Services &amp;amp; Content, Entrepreneurship / Innovation and Business 3.0.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Webcast of the Event&lt;/h2&gt;
&lt;h3&gt;Day 1, January 16, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Inaugural&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Welcome Address&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. Hitesh Oberoi, Chairman, IAMAI &amp;amp; Co-Founder and Chief Executive Officer, Info Edge India Limited&lt;br /&gt;&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Address by Chief Guest&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. Montek Singh Ahluwalia, Deputy Chairman, Planning Commission, Government of India&lt;b&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Keynote Address by&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Mr. R Chandrashekhar, Chairman (TC) &amp;amp; Secretary , Department of Telecommunications, Ministry of Communications and IT&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 1: 1000 digital startups a year: How to make it happen?&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter: &lt;br /&gt;Mr. Satyan Gajwani, CEO, Times Internet&lt;/p&gt;
&lt;p&gt;Presenter ‐&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Mahesh Murthy, Founder, Pinstorm  and Co-founder, Seedfund&lt;/li&gt;
&lt;li&gt;Mr. Manish Vij, Founder, VUN Network&lt;/li&gt;
&lt;li&gt;Mr. Pranay Gupta, Joint CEO, Centre for Innovation&lt;/li&gt;
&lt;li&gt;Mr. Rajesh Sawhney, Founder, GSF Accelerator &amp;amp; Superangels&lt;/li&gt;
&lt;li&gt;Mr. Mukund Mohan, CEO in Residence, Microsoft Startup Accelerator&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Business track&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Topic: Importance of Creativity to Digital Advertising&lt;/a&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter Neville Taraporewalla, Sr. Director - Emerging Markets| India, Malaysia,Thailand &amp;amp; Korea, Advertising and Online, Microsoft&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Discussion:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;M Mohit Hira, Senior Vice President &amp;amp; Regional Business Leader-Airtel, JWT&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Vineet Gupta, Managing Partner, 22feet Communications&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Arun Sharma, VP Marketing - Head Media &amp;amp; Rural, Bharti Airtel&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Vikas Tandon, Managing Director, Indigo Consulting Aditya Save, Head-Media &amp;amp; Digital Marketing, Marico &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Audience Interaction &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Lowering the barrier for mobile web - for both operators and users”&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Peter Panait Løjmand, Senior Vice President, Opera Software&lt;br /&gt;Interaction with Mr. Sanjay Goyal, Chief Executive Officer, ACL Wireless &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 2: Cloud – Leveraging the Cloud for Business Efficiency &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair and presenter&lt;br /&gt;Mr. Manoj Chugh, Regional President, Global Accounts-APJ, EMC&lt;/p&gt;
&lt;p&gt;Presenters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Manav Khanna, Sr. Consultant –Enterprise Security, SafeNet Inc.&lt;/li&gt;
&lt;li&gt;Mr. Jasminder Singh Gulati, Co-founder and Chief Executive Officer, Nowfloats&lt;/li&gt;
&lt;li&gt;Mr. Ravi Shankar, Chief Executive Officer, Nevales Networks&lt;/li&gt;
&lt;li&gt;Mr. Mandar Kulkarni, Vice President, Solution Engg &amp;amp; Pvt. Cloud Practice, Netmagic&lt;/li&gt;
&lt;li&gt;Mr. Balaka Baruah Aggarwal, Business Evangelist, Amazon Web Services&lt;/li&gt;
&lt;li&gt;Mr. Jaydeep Nargund, Head Services-India, AKAMAI&lt;/li&gt;
&lt;li&gt;Mr. Vivek Ravindran, Director-Core &amp;amp; App Platform, Microsoft&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Email Marketing Roundtable with juvlon&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Email Marketing in the Year of the Snake - 2013&lt;br /&gt;Presented by Mr. Naresh Bhagtani, CEO, Juvlon, Niche Software &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Unique Identity and Its Positive Externalities for Inclusiveness"&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Nandan Nilekani , Chairman, UAIDI&lt;br /&gt;Interaction with Mr. Shubhashis Gangopadhyay, IDF research&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Bharat Broadband [NOFN]: Going extra mile with public investment”&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Sam Pitroda&lt;br /&gt;Interaction with Mr. Lalitesh Katragadda, Country Head-India Products, Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 3: Discussion on Social media – Freedom, moderation or regulation&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Session Chair  &amp;amp; Moderator:&lt;br /&gt;Sunil Abraham, Executive Director, The Centre for Internet and Society &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Discussion with:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rajesh Kalra, Chief Editor, Times Internet&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; R Sukumar, Managing Editor, Mint&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Shivam Vij, Kafila.org &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Track 3: The last mile of customer connect: m-Engagement from OPENHOUSE&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Presenter:&lt;br /&gt;Mr. Ankit Singh, Senior Manager, Enterprise mobility, IMI Mobile&lt;br /&gt;Mr. Ramesh Raman , Senior manager, Marketing, IMI Mobile&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, January 17, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Future of Apps and their Monetization”&lt;/a&gt; &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote Address by Mr. Ilja Laurs, Founder and Chairman, GetJar&lt;br /&gt;Moderated by : Mr. Kiruba Shankar&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;“Communications challenges in the age of Social media” &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Keynote address by &lt;br /&gt;Dr Shashi Tharoor, Minister of State for Human Resource Development, Government of India&lt;br /&gt;Interaction with audience Moderated by Mr. R Jagannanthan&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;Track 4:&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;CXOs Closed door discussion on Local Language – The Game Changer&lt;/a&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session moderated by&lt;br /&gt;Gyan Gupta, Chief Operating Officer, Dainik Bhaskar;&lt;br /&gt;&lt;br /&gt;Address by speakers&lt;br /&gt;Mr. Arvind Pani, Co-founder, Reverie language Technologies&lt;br /&gt;Mr. Ajay Gallwale, Founder, Maayboli&lt;br /&gt;Mr. C Mathew, DGM (Marketing), Malayala Manorama Mr. Manoj Gupta, Head, VAS &amp;amp; Applications, Micromax&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Audience Interaction&lt;br /&gt;Summarising by Moderator &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Start-Up Unconference&lt;/a&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A peer to peer, informal sharing of views between new entrepreneurs and start-ups of our industry &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Chaired by:&lt;br /&gt;Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge&lt;/p&gt;
&lt;p&gt;Moderator by:&lt;br /&gt;Kiruba Shankar&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 5: Discussion on e-Commerce 2.0– Emerging trend &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair  &amp;amp; Moderator:&lt;br /&gt;Mr. Avnish Bajaj, Managing Director, Matrix Partners&lt;/p&gt;
&lt;p&gt;In Discussion with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Alok Mittal, Managing Director, Canaan Patners India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Sachin Bansal, Co-founder &amp;amp; CEO, Flipkart&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Sundeep Malhotra, Chief Executive Officer, HomeShop18&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Muralikrishnan B, Country Manager, eBay&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Mukesh Bansal, Founder, Myntra.com&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Ankur Warikoo, Chief Executive Officer, Groupon India&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 6: Marketers Viewpoint – Online and Mobile Marketing &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Session Chair:&lt;br /&gt;Mr. Upen Rai, Chief Operating Officer and Executive Director, AntFarm&lt;/p&gt;
&lt;p&gt;Presenters:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sanjay Tripathy, EVP - Head Marketing, Products and Direct Channels -  HDFC Life&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Manish Kalra, Chief Marketing Officer, Makemytrip&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Vinay Bhatia, Customer Care Associate and VP - Marketing and Loyalty, Shoppers Stop&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Samil Malhotra, Vice President Sales and Marketing. The Lalit Suri Hospitality Group&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Manu Kumar Jain, Co-founder &amp;amp; Managing Director, Jabong&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;Plenary Session 7: Interaction: Attracting and retaining talent for Digital Industry &lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Thought sharing by Industry Leaders &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Interaction between Industry leaders and Students&lt;br /&gt;Industry Leaders:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sanjiv Bikhchandani, Founder and Executive Vice Chairman, Infoedge&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Deep Kalra, Founder and Chief Executive Officer, Makemytrip&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Anupam Mittal, Founder and Chief Executive Officer, People Group&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Dinesh Agarwal, Founder and Chief Executive Officer, IndiaMART&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Mr. Neville Taraporewalla, Sr. Director , Emerging Markets-India, Malaysia, Thailand &amp;amp; Korea, Advertising and Online, Microsoft&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Student Entrepreneurs:&lt;br /&gt;FMS&lt;br /&gt;IMT Ghaziabad&lt;br /&gt;IITD Moderated by Kiruba Shankar&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;&lt;a class="external-link" href="http://24framesdigital.com/iamai/webcast/160113/"&gt;India Digital Award Ceremony&lt;/a&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/7th-india-digital-summit-2013'&gt;https://cis-india.org/news/7th-india-digital-summit-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-13T06:32:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression">
    <title>Third South Asian Meeting on the Internet and Freedom of Expression</title>
    <link>https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Internet Democracy Project, Voices for Interactive Choice &amp; Empowerment and Global Partners &amp; Associates are organizing this event in Dhaka on January 14 - 15, 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash is moderating the session on "Understanding cyber security and surveillance in South Asia today". Chinmayi Arun is speaking in this panel.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Third South Asian Meeting on the Internet and Freedom of Expression seeks to address the question of how freedom of expression on the Internet is best protected by taking as its starting point two of the biggest challenges for freedom of expression online in South Asia today: hate speech online on the one hand, and cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting seeks to investigate how these challenges affect freedom of expression on the Internet as well as how they can be addressed most effectively while protecting free speech online. It will also touch briefly on the important question of what kind of Internet governance processes are most likely to ensure the desired outcomes materialise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A very short history of the South Asian Meeting on the Internet and Freedom of Expression&lt;/b&gt;&lt;br /&gt;The first South Asian Meeting on the Internet and Freedom of Expression took place in March 2011 in Delhi, and mapped the many challenges for free speech online in our region, as an input into the report on the Internet and freedom of expression of UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second South Asian Meeting, in Kathmandu in November 2011, assessed the extent to which policy and regulation in the South Asian countries complied with the recommendations Mr. La Rue made in his report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This third meeting will now build on these earlier efforts by bringing together experts from civil society, business, the research community and other stakeholder groups from across the region to discuss two of the biggest shared challenges for freedom of expression online in South Asia today in detail: the rising visibility of hate speech on the one hand, and the impact of discourses regarding cyber security and surveillance on the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why focus on hate speech and security/surveillance now?&lt;/b&gt;&lt;br /&gt;Since UN Special Rapporteur on Freedom of Expression, Mr. Frank La Rue, presented his report on the Internet and freedom of expression to the UN Human Rights Council in June 2011, the complexity of this topic has received growing recognition. However, not all trends that La Rue had pointed out as directly affecting freedom of expression online – from access to the Internet to cyber attacks – are equally important in the South Asian region. Detailed analysis in several South Asian countries has shown that, though Internet penetration rates remain fairly low, most countries do possess, for example, the political will crucial to improve these figures. The two trends that seem to be of greatest concern in our region are that of the fight against hate speech, and the impact on freedom of expression of cyber security and surveillance measures. The latter is foregrounded for a variety of reasons ranging from the safety of individual users to national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Incidentally, across the region, as in many parts of the world, hate speech and cyber security have also been among the most important reasons governments have quoted to justify greater government control over the Internet. At the national level, this has at times manifested itself through the approval and implementation of legislation that has far-reaching consequences for freedom of speech online, without consulting many of the stakeholders who are affected at any point in time. At the global level, we see a growing number of proposals by governments that would effectively expand their collective powers to regulate the Internet, though with varying levels of involvement of other stakeholders envisioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet while governments' intentions when imposing censorship or approving surveillance measures may at times be in doubt, it is difficult to deny that the Internet has facilitated a new proliferation of hate speech, as well as that it has thrown up new security challenges that couldn't even be imagined before.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore our contention that the challenges of hate speech online and of ensuring cyber security in our region are real, and need to be addressed head-on if we are to strengthen and protect the right to freedom of expression online. For this reason, the meeting seeks to investigate both the precise nature of these challenges and what Internet governance mechanisms we need to evolve to ensure that they can be addressed most effectively whilst upholding and strengthening the right to freedom of expression. If we are to take the challenges the threats of hate speech and cyber security policy embody seriously yet also aim to uphold and strengthen the right to freedom of expression online, then what are the solutions we require? And who will need to be responsible for implementing them?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participants&lt;/b&gt;&lt;br /&gt;Taking into account the many parallels in the shape problems of hate speech and cyber security and surveillance take across the South Asian region as a result of shared cultures and historical legacies alike, participants will be invited from Bangladesh, India, Nepal, Pakistan, Afghanistan, Sri Lanka and the Maldives. Moreover, as solutions to these problems will invariably require collaboration among various stakeholders in the Internet governance field in order to be effective, participants will be drawn from a wide variety of stakeholder groups, including civil society, business, government, academia and the media from across the region. In this way, the meeting hopes tofacilitate a South Asia wide, multistakeholder dialogue, to learn, discuss and evolve more detailed thinking on these topics for one and a half days. The meeting will come to an end with a public event at the end of the second day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting will use a variety of formats, including key note presentations, panel discussions, case studies and small group conversations.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;January 14, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-09.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Welcome and introductions to participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;09.45-10.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Introduction to the meeting: the challenge that hate speech online and cyber security/surveillance pose to freedom of expression on the Internet – Dixie Hawtin&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intro: Internet governance and human rights issues in general&lt;/li&gt;
&lt;li&gt;Why is this event focussed on hate speech and surveillance?&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.15-10.45&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-12.15&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;The challenge of hate speech on the Internet in South Asia Strengthening the right to freedom of expression to curtail hate speech (Anja Kovacs)&lt;/p&gt;
&lt;p&gt;Three country perspectives, from the Maldives (Mariyath Mohamed), Pakistan (tbc), and Bangladesh (Salim Khan)&lt;br /&gt;Moderator: Bishakha Datta&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.15-13:30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-14.00&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Keynote: Thinking about a rights-based approach to cyber security and surveillance as it relates to speech – KS Park&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;14.00-15.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Understanding cyber security and surveillance in South Asia today With Three country perspectives from Bangladesh (Mohammad Rahman), Nepal (Kailash Prasad Neupane) and India (Chinmayi Arun).&lt;br /&gt;Moderator: Pranesh Prakash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15.30-16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea/coffee break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-17.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Legal and ethical questions and challenges when addressing cyber security and surveillance: two case studies – Rohan Samarajiva&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;January 15, 2013&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.00-9.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction to day 2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.15-9.45&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Cybersecurity, surveillance and hate speech online – key issues that need to be addressed in governance in order to protect Internet freedom of expession. This session will discuss particular issues that have relevance for both cyber security debates and hate speech issues in greater depth. Four topics that will be addressed are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The question of anonimity (KS Park)&lt;/li&gt;
&lt;li&gt;Cross-border cooperation and other jurisdictional issues in context of cloud computing and crossborder data flows and storage (Aditya Rao)&lt;/li&gt;
&lt;li&gt;Domain Names and registration (Babu Ram Aryal)&lt;/li&gt;
&lt;li&gt;Intermediaries as law enforcers (Suman Pradhan)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Moderator: Shahzad Ahmed&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.45-11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00-13.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;What kind of solutions could a rights-based approach throw up to the challenges raised so far in the meeting?&lt;/p&gt;
&lt;p&gt;Open discussion in groups and plenary, following key note speaker, Bulbul Monjurul Ahsan&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.00-13.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Summing up and thank you&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;13.30-15.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;15:00 – 16:00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Meeting participants move to venue for public meeting, tea/coffee break and arrival of wider public&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00-18.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;PUBLIC EVENT: The Internet and freedom of expression&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed speakers include: Abu Taher, Info Commissioner; Iftekharuzzaman, Executive Director, Transparency International Bangladesh; Sarah Hossain, Lawyer and Honorary Executive Director, BLAST; Shaheen Anam, Executive Director, Manusher Jonno Foundation; Monjurul Ahsan Bulbul, eminent journalist and CEO, Boishakhi Television; and Rohan Samarajiva, Chair and CEO, LIRNEasia.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;List of Participants&lt;/h2&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Aditya Rao, Senior Associate, Amarchand Mangaldas, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ahmed Swapan, Executive Director, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Amrit Pant, General Secretary, Computer Association of Nepal &amp;amp; President, Information Technology Development Society, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Anja Kovacs, Project Director, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Babu Ram Aryal, President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Binaya Guragain, Coordinator of Programs, Equal Access, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bishakha Datta, Wikimedia Foundation Board Member &amp;amp; Co-founder, Point of View, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chinmayi Arun, Assistant Professor, National Law University Delhi &amp;amp; Fellow, Centre for Internet and Society, India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dixie Hawtin, Project Manager for Digital Communications and Freedom of Expression, Global Partners and Associates, UK&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Farhana Rumki, Associate Programme Coordinator, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kailash Prasad Neupane, Chief of Legal Section, Spokesperson, Secretary and Registrar, Nepal Telecommunications Authority, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khairuzzaman Kamal, Founder Secretary General of Bangladesh Manobadhikar Sangbadik Forum &amp;amp; Senior Reporter at Bangladesh Sangbad Sangstha, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Khawaza Mainuddin, Executive Editor, ICE Business Times Magazine, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;K S Park, Executive Director, the PSPD Public Interest Law Center &amp;amp; Professor, Korea University Law School, South Korea&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mariyath Mohamed, Journalist, Minivan News, Maldives&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Nazmuzzaman Bhuian Emon, Associate Professor, Department of Law, University of Dhaka, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mohammad Shahriar Rahman, Assistant Professor, Department of Computer Science and Engineering, University of Asia Pacific &amp;amp; Head, Center for IT Security and Privacy, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Moiyen Zalal Chowdhury, Community Manager, Somewhere.In &amp;amp; Norad Fellow,Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monjurul Ahsan Bulbul, Chair, International Press Institute &amp;amp; Editor-in-chief and CEO,Boiskakhi TV, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pranesh Prakash, Policy Director, Centre for Internet and Society, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prasanth Sunganathan, Counsel, Software Freedom Law Centre, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rezaur Rahman Lenin, Research Fellow, VOICE, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Richa Kaul Padte, Writer, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rohan Samarajiva, Chair and CEO, LIRNEasia, Sri Lanka&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Saleem Samad, Columnist &amp;amp; Correspondent at Reporters without Borders, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Salimullah Khan, Writer and Professor, Stamford University, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sana Saleem, Director, Bolo Bhi, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Santosh Sigdel, Advocate and Vice President, Internet Society, Nepal Chapter, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shahzad Ahmed, Country Director, Bytes for All, Pakistan&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehla Rashid Shora, Project Officer, Internet Democracy Project, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shehnaz Banu, Media and Communication Officer, Alliance for Social Dialogue, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Soheil Zafar, Editor, Unmochan Blog &amp;amp; TV Producer and Researcher, 71 Television, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suman Lal Pradhan, CEO, Websurfer, Nepal&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sushma Luthra, Event Coordinator, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Syeda Fedous Jana, Managing Director and Co-Founder of Somewhere.In, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tahmina Rahman, Director Bangladesh and South Asia Region, Article 19, Bangladesh&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vasana Wickremasena, Executive Director, Centre for Integrated Communication Research and Advocacy, Sri Lanka&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression'&gt;https://cis-india.org/news/third-south-asian-meeting-on-internet-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T07:16:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society">
    <title>No Civil Society Members in the Cyber Regulations Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society</link>
    <description>
        &lt;b&gt;The Government of India has taken our advice and reconstituted the Cyber Regulations Advisory Commitee. But there is no representation of Internet users, citizens, and consumers — only government and industry interests.&lt;/b&gt;
        &lt;p&gt;In multiple op-eds (&lt;a href="http://cis-india.org/internet-governance/blog/india-broken-internet-law-multistakeholderism"&gt;Indian Express&lt;/a&gt; and &lt;a href="http://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act"&gt;Mint&lt;/a&gt;), I have pointed out the need for the government to reconstitute the &amp;quot;Cyber Regulations Advisory Committee&amp;quot; (CRAC) under section 88 of the Information Technology Act. That it be reconstituted along the model of the Brazilian Internet Steering Committee was also &lt;a href="http://docs.google.com/viewer?url=www.iigc.in%2Fhtm%2F2.pdf"&gt;part of the suggestions that CIS sent to the government&lt;/a&gt; after a &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/government-to-hold-talks-with-stakeholders-on-internet-censorship/article3860393.ece"&gt;meeting FICCI had convened along with the government on September 4, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Section 88 requires that people &amp;quot;representing the interests principally affected&amp;quot; by Internet policy or &amp;quot;having special knowledge of the subject matter&amp;quot; be present in this advisory body. The main function of the CRAC is to advise the the Central Government &amp;quot;either generally as regards any rules or for any other purpose connected with this Act&amp;quot;.&lt;/p&gt;
&lt;p&gt;Despite this important function, the CRAC had &amp;mdash; till November 2012 &amp;mdash; only ever met twice, &lt;a href="http://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"&gt;both times in 2001&lt;/a&gt;. The response to an RTI informed us that the body had never provided any advice to the government.&lt;/p&gt;
&lt;h2 id="government-not-serious"&gt;Government Not Serious&lt;/h2&gt;
&lt;p&gt;The increasing pressure on the government for botching up Internet regulations has led it to reconstitute the CRAC. However, the list of members of the committee shows that the government is not serious about this committee representing &amp;quot;the interests primarily affected&amp;quot; by Internet policy.&lt;/p&gt;
&lt;p&gt;Importantly, this goes against the express wish of the Shri Kapil Sibal, the Union Minister for Communications and IT, who has repeatedly stated that he believes that Internet-related policymaking should be an inclusive process. Most recently, at the 2012 Internet Governance Forum he stated that we need systems that are:&lt;/p&gt;
&lt;blockquote&gt;
&amp;quot;collaborative, consultative, inclusive and consensual, for dealing with all public policies involving the Internet&amp;quot;
&lt;/blockquote&gt;

&lt;p&gt;Interestingly, despite the Hon'ble Minster verbally inviting civil society organizations (on November 23, 2012) for a meeting of the CRAC that happened on November 25, 2012, the Department of Electronics and Information Technology refused to send us invitations for the meeting.  This hints at a disconnect between the political and bureaucratic wings of the government, at least at some levels.&lt;/p&gt;
&lt;p&gt;Interestingly, this isn't the first time this has been pointed out. Na. Vijayashankar was levelling similar criticisms against the CRAC &lt;a href="http://www.naavi.org/cl_editorial/edit_18aug00_1.html"&gt;way back in August 2000&lt;/a&gt; when the original CRAC was constituted.&lt;/p&gt;
&lt;h2 id="breakdown-by-stakeholder-groupings"&gt;Breakdown by Stakeholder Groupings&lt;/h2&gt;
&lt;p&gt;While there is no one universal division of stakeholders in Internet governance, but four goups are widely recognized: governments (national and intergovernmental), industry, technical community, and civil society. Using that division, we get:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Government - 15 out of 22 members&lt;/li&gt;
&lt;li&gt;Industry bodies - 6 out of 22 members&lt;/li&gt;
&lt;li&gt;Technical community / Academia - 1 out of 22 members&lt;/li&gt;
&lt;li&gt;Civil society - 0 out of 22 members.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="list-of-members-of-cyber-regulatory-advisory-committee"&gt;List of Members of Cyber Regulatory Advisory Committee&lt;/h2&gt;
&lt;p&gt;The official notification &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/gazzate(1).pdf"&gt;(G.S.R. 827(E)) is available on the DEIT website&lt;/a&gt; and came into force on November 16, 2012.&lt;/p&gt;
&lt;p&gt;(Note: Names with &lt;del&gt;strikethroughs&lt;/del&gt; have been removed from the CRAC since 2000, and those with &lt;i&gt;emphasis&lt;/i&gt; have been added.)&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Minister, Ministry of Communication and Information Technology - Chairman&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Minister of State, Ministry of Communications and Information Technology - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Communication and Information Technology, Department of Electronics and Information Technology - Member&lt;/li&gt;
&lt;li&gt;Secretary, Department of Telecommunications - Member &lt;br /&gt;&lt;del&gt;Finance Secretary - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Legislative Department - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Secretary, Department of Legal Affairs - Member&lt;/i&gt; &lt;br /&gt;&lt;del&gt;Shri T.K. Vishwanathan, Presently Member Secretary, Law Commission - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Commerce - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Home Affairs - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Defence - Member&lt;/li&gt;
&lt;li&gt;Deputy Governor, Reserve Bank of India - Member&lt;/li&gt;
&lt;li&gt;Information Technology Secretary from the states by rotation - Member&lt;/li&gt;
&lt;li&gt;Director, IIT by rotation from the IITs - Member&lt;/li&gt;
&lt;li&gt;Director General of Police from the States by rotation - Member&lt;/li&gt;
&lt;li&gt;President, NASSCOM - Member&lt;/li&gt;
&lt;li&gt;President, Internet Service Provider Association - Member&lt;/li&gt;
&lt;li&gt;Director, Central Bureau of Investigation - Member&lt;/li&gt;
&lt;li&gt;Controller of Certifying Authority - Member&lt;/li&gt;
&lt;li&gt;Representative of CII - Member&lt;/li&gt;
&lt;li&gt;Representative of FICCI - Member&lt;/li&gt;
&lt;li&gt;Representative of ASSOCHAM - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;President, Computer Society of India - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Group Coordinator, Department of Electronic and Information Technology - Member Secretary&lt;/li&gt;
&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society'&gt;https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2013-01-09T17:56:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac">
    <title>Response to RTI on Decisions of the Cyber Regulation Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac</link>
    <description>
        &lt;b&gt;The Department of Electronics &amp; Information Technology, Ministry of Communications &amp; Information Technology responded to a right to information (RTI) application filed by Saket Bisani on behalf of the Centre for Internet &amp; Society on July 13, 2012 through notification No. 14(110)/2012-ESD, dated October 3, 2010.&lt;/b&gt;
        &lt;p class="Bodytext21" style="text-align: center; "&gt;&lt;b&gt;No. 14(110)/2012-ESD&lt;/b&gt;&lt;br /&gt;M/o Communiciations &amp;amp; Information Technology &lt;br /&gt; Department of Electronics &amp;amp; Information Technology &lt;br /&gt; Electronics Niketan, 6, CGO Complex &lt;br /&gt; New Delhi-110003&lt;/p&gt;
&lt;p class="Heading11" style="text-align: right; "&gt;&lt;b&gt;Dated:3.10.2012&lt;/b&gt;&lt;/p&gt;
&lt;p class="Heading11" style="text-align: center; "&gt;&lt;b&gt;Subject: RTI application received from Shri Saket Biswani&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;With reference to your RTI application dated 13.7.12 requesting for the following information.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Question&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;a) Please provide me a list of the dates of each meeting of the CRAC held from October 18, 2000 till July 13, 2012?&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;b) Please provide me copies of the minutes of every meeting held by the Cyber Regulation Advisory Committee from October 18, 2000 till July 13, 2012.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;c) Provide me the list of all policy decisions that the CRAC has advised the Central Government on under section 88(3) (a) of the Information Technology.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;d) Provide me a list of all policy decisions that the CRAC has advised the Central Government on under section 88(3)(a) of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: justify; "&gt;The information as received from the custodian of the information is placed below:&lt;/p&gt;
&lt;p class="Bodytext21"&gt;&lt;span&gt;Answer&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext21"&gt;a) The meetings of CRAC were held on 6&lt;sup&gt;th&lt;/sup&gt; March, 2001 and 17-18 March, 2001.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;b) Minutes of these two meetings of CRAC are attached.&lt;/p&gt;
&lt;p class="Bodytext21"&gt;c) No such advice was given by CRAC to DeitY under section 88(3)(a).&lt;/p&gt;
&lt;p class="Bodytext21"&gt;d) Information is attached.&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;&lt;img src="https://cis-india.org/home-images/Sign.png" alt="Kaushik Signature" class="image-inline" title="Kaushik Signature" /&gt;&lt;/p&gt;
&lt;p class="Bodytext21" style="text-align: right; "&gt;(A.K. Kaushik) &lt;br /&gt;Additional Director &amp;amp; CPIO &lt;br /&gt;(E-Security &amp;amp; Cyber Laws)&lt;/p&gt;
&lt;p align="left" class="Bodytext21"&gt;To: Shri Saket Bisani&lt;br /&gt; No. 194, 2&lt;sup&gt;nd&lt;/sup&gt; 'C' Cross, &lt;br /&gt;Domlur 2&lt;sup&gt;nd&lt;/sup&gt; Stage &lt;br /&gt;Bangalore-560 071&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;&lt;b&gt;Minutes of the First Meeting of the Cyber Regulation Advisory Committee (CRAC) held on March 6, 2001, at Electronics Niketan,&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;under&lt;/b&gt;&lt;b&gt; the Chairmanship of Hon’ble Minister* (IT) Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p class="Bodytext31" style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the First Meeting of the Committee. In his opening remarks he hoped that the Committee would play a constructive role in the implementation of the Information Technology Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;While introducing the Agenda (circulated ahead of the meeting), Controller of Certifying Authorities (CCA) made a short presentation on proposed "Regulation.; under section 89 of the IT Act" consisting of 18 proposed Regulations, Smart Card as token carrying Keys, and various suggested Amendments to the IT ACT 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, participants sought some time to study and collate associated inputs from their respective colleagues/specialists before offering any concrete suggestions/recommendations. Chairman agreed to the suggestions and postponed the meeting to 11:00 AM on the March 17, 2001 at the same venue. Based on the recommendation of Secretary (IT), members were requested to forward their inputs, if any, through e-mail within a weeks time to the following:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;For Regulations wider section 89 of IT Act&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;&lt;span&gt;For amendments to IT Act 2000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Shri K.N. Gupta (CCA) &lt;br /&gt;Room No. 4006,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:kgupta@mit.gov.in"&gt;kgupta@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 3073&lt;br /&gt;Fax: 439 5982&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Shri A.B. Saha (Member Secretary)&lt;br /&gt;Room No. 2055,&lt;br /&gt;Electronics Niketan&lt;br /&gt;6 CGO Complex&lt;br /&gt;New Delhi 110003&lt;br /&gt;e-mail:&lt;a class="mail-link" href="mailto:saha@mit.gov.in"&gt;saha@mit.gov.in&lt;/a&gt;&lt;br /&gt;Tele: 436 0958&lt;br /&gt;Fax: 436 2924&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Minutes of the Second Meeting of the Cyber Regulation Advisory Committee (CRAC) held on 17-18 March, 2001 at Electronics Niketan, New Delhi under the Chairmanship of Hon'ble Minister (IT), Shri Pramod Mahajan.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;(&lt;i&gt;List of Participants enclosed as Annexure-A&lt;/i&gt;)&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The chairman welcomed the participants to the second meeting of the Committee to consider further the draft regulations proposed by the Controller of Certifying Authority (CCA).        '    " ~&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;During the ensuing discussions, following general recommendations/decisions were arrived at governing the overall formulation of the regulations that are necessary to bring about infrastructure facilitating activities envisaged under the IT Act 2000:&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;a)  Any regulation to be framed by the Controller draws its authority only from Section 89(2) of the Act. Moreover,    such regulations should complement the Rules already framed under the Section 87 of the Act.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;b) To keep pace with the changing technology and standards, CCA may publicly notify/modify necessary specifications of technology, standards and procedures at regular interval (say, January of every year). Moreover, to adhere to the "principles of minimal governance", if any particular necessity emerges for inclusion of newer manifestations of any existing standard/technology/procedure, Controller should respond within ninety (90) days after receiving any specific request in writing, failing which it will deemed to have obtained his concurrence.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;c) The commercial practices/interests may form the essential pedestal for the certification process. Aspects of cross-certification may preferably be left to the purview of the concerned market forces. However, the necessary interoperability will essentially be "market-driven" and not "authority-driven". This will also ensure that formulated rules and regulations stay in tune with market realities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;d) Strict adherence to open standards should be ensured to avoid emergence of monopoly of any kind.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;e) Considering cost sensitiveness of the requisite digital signature certificate, families of technologies varying in convenience, reliability, availability, robustness, etc. may be allowed to inter-operate. However, CCA may undertake public awareness campaign to promote desirable best practices from time to time.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;f)  The minimal regulations facilitating activities envisaged in the Act is desirable. Some of the proposed provisions can also be ensured in the form of "terms &amp;amp; conditions" governing the operations of Certifying Authorities.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;g)   Emergence of guidelines governing smooth functioning may be better left to publications brought out by industry associations, public-minded professionals etc. Formulating rules and regulations in these regards should be minimal.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;3. After framing the draft compilation of the requisite regulations in accordance with the conventional legal form in terms of content as well as structure with the assistance of the Ministry of Law, the regulations may be brought to the Ministry of Information Technology for approval.&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;4 The Committee considered the 18 regulations proposed in Agenda Item No.1 and the statement reproduced below contains the decision taken against each proposal.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;SI&lt;/th&gt;&lt;th&gt;Item&lt;/th&gt;&lt;th&gt;Conclusions &lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;Regulation 1&lt;br /&gt;Standardising on two key-pairs for PKI in the country.&lt;br /&gt;Key-pair generation for subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Regulation not required. &lt;br /&gt;Encryption Key pair not part of the IT Act. &lt;br /&gt;Already covered under Rule 3, 4 &amp;amp; 5 of notified CA Rules.&lt;br /&gt;Subscriber should be at liberty to bring his key pair that CA may verify before acceptance. (Section 40 of the Act)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;Regulation 2&lt;br /&gt;Encryption key-pair of subscribers to be maintained by CAs in a database and made available to enforcement and law agencies under directions of the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;IT Act is silent regarding encryption.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Regulation 3&lt;br /&gt;Disclosure Record of CA.&lt;/td&gt;
&lt;td&gt;Disclosure may be done every six months. &lt;br /&gt;Necessary format for disclosure may be notified from time to time. (Para 2(f) above)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Regulation 4&lt;br /&gt;Encryption Key Pair of CA to be made available to the Controller.&lt;/td&gt;
&lt;td&gt;Regulation not required in accordance to conclusions against 1 &amp;amp; 2 above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Regulation 5&lt;br /&gt;Cross-Certification with foreign CAs.&lt;/td&gt;
&lt;td&gt;As per recommendation 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Regulation 6&lt;br /&gt;Terms and Conditions subject to which license shall be issued by the Controller to the prospective CAs.&lt;/td&gt;
&lt;td&gt;Can be merged with regulation 11.&lt;br /&gt;As per the recommendation mentioned in 2(c) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Regulation 7&lt;br /&gt;Standards that may be considered for different activities associated with the CAs functions including standardization of contents of the Certificates to be issued by CAs and standardization of the Certificate Revocation List.&lt;/td&gt;
&lt;td&gt;As per the recommendation 2(b) above.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Regulation 8&lt;br /&gt;Information to be made publicly available by a CA on its website.&lt;br /&gt;Notice of suspension or revocation of license.&lt;/td&gt;
&lt;td&gt;CA must harness all form of networks and other practical media, and not only Internet, for disclosure to its subscriber and other interested parties.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Regulation 9&lt;br /&gt;Standardisation of Certificate Practice Statement.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Regulation 10&lt;br /&gt;Compromise of subscribers Digital Signature Key-Pair&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Regulation 11 &lt;br /&gt; Description of classes of Certificates.&lt;/td&gt;
&lt;td&gt;Shall be merged with regulation 6 above. &lt;br /&gt;In addition to 3 classes of certificates as identified by international bodies, the regulation should be open to additional classes of certificates, if required.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Regulation 12 &lt;br /&gt;Cross-Certification of CAs.&lt;/td&gt;
&lt;td&gt;It should be market-driven. (Recommendation 2(c) above).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;Regulation 13&lt;br /&gt;Incorporation of Controllers Public Key Certificate as the "root” in all web browsers in the country.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Need for integrating Controller's root key in&lt;br /&gt;the browsers may not be feasible.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;Regulation 14&lt;br /&gt;Minimum key length for CAs and subscribers.&lt;/td&gt;
&lt;td&gt;Agreed for the provision of 1024 bits for subscriber/end-user and 2048 bits for CAs key pair.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;Regulation 15&lt;br /&gt;Audit of applicants to include manpower audit as well.&lt;br /&gt;Liability of CAs towards subscribers on account of their negligence.&lt;/td&gt;
&lt;td&gt;Regulation not required.&lt;br /&gt;Audit provision has already been covered&lt;br /&gt;under Rule 31 of CA rules notified by MIT.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16&lt;/td&gt;
&lt;td&gt;Regulation 16&lt;br /&gt;Storage of Key-Pairs of CAs. &lt;br /&gt;Distribution of Key-Pairs / Certificates of subscribers by CAs.&lt;/td&gt;
&lt;td&gt;Not to be regulated. &lt;br /&gt;Recommendation 2(e) above shall be followed.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17&lt;/td&gt;
&lt;td&gt;Regulation 17&lt;br /&gt;Documents to be submitted to the Controller along with the application for obtaining license to operate as CA.&lt;/td&gt;
&lt;td&gt;Already covered under rule 10 of CA rules notified by MIT. Any additional information can be sought through the recourse of public notices from time to time.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18&lt;/td&gt;
&lt;td&gt;Regulation 18&lt;br /&gt;Upon acceptance of PKC by a subscriber, the PKC shall be published by the CA as required under the IT Act for access by the subscribers and relying parties.&lt;br /&gt;The CA will ensure the transmission of PKC and CRLs to the National Repository to be maintained by the Controller.&lt;/td&gt;
&lt;td&gt;Agreed.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;Meeting ended with a vote of thanks to the Chair.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" class="Bodytext1"&gt;&lt;span style="text-decoration: underline;"&gt;&lt;span&gt;Annexure - A&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of the second meeting of the “Cyber Regulation Advisory Committee” held on 17th March 2001 to consider adjourned agenda of the first meeting held on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.S.C Jain , Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimini Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M. G. Datar, Addl.D.G, IT, Army HQ, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10. Sh.S.R-Mittal,Adviser,DIT, Reserve Bank of India&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11. Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Sh. Qamar Ahmed. Addl.C.P/Crime, DG Police by rotation from the States&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;20.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt; &lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: left; "&gt;&lt;span&gt;First sitting of  the second meeting of the “Cyber Regulation Advisory Committee” held on  18th March 2001 to consider adjourned agenda of the first meeting held  on 6ft March 2001&lt;/span&gt;&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: center; "&gt;&lt;span&gt;&lt;i&gt;&lt;span style="text-decoration: underline;"&gt;List of Participants&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sh Pramod Mahajan, Minister, Information Technology                  - Chairman&lt;/li&gt;
&lt;li&gt;Sh.N.L. Meenu, Jt. Secretary, Legislative Department&lt;/li&gt;
&lt;li&gt;Sh Vinay Kohli, Secretary, Ministry of Information Technology&lt;/li&gt;
&lt;li&gt;Sh. N. Parameswaran, DDG(LR), Department of Telecommunications&lt;/li&gt;
&lt;li&gt;Dr. Jaimoni Bhagwati, Ministry of Finance&lt;/li&gt;
&lt;li&gt;Maj.Gen. M G Datar, Ministry of Defence&lt;/li&gt;
&lt;li&gt;Sh Mukesh Mittal, Dy Secy, Ministry of Home Affairs&lt;/li&gt;
&lt;li&gt;Sh T A Khan, Sr. Dir, NIC, Ministry of Commerce&lt;/li&gt;
&lt;li&gt;Sh. K.R Ganapathy,CGM-IC,RBI&lt;/li&gt;
&lt;/ol&gt;
&lt;p align="left" class="Bodytext1"&gt;10.  Sh Dewang Mehta, President, NASSCOM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;11.  Sh Amitabh Singhal, President, Internet Service Providers Association&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;12. Sh LN Behra, DIG, Director, Central Bureau of Investigation&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;13. Sh K N Gupta, Controller of Certifying Authority&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;14. Sh. Dinesh Bhatt, Dy. Police Commissioner, Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;15. Prof. R S Sirohi. I1T Delhi, Director, IIT Delhi&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;16. Sh.Sanjay Dhawan, ExecDirector,KPMG, Representing CII&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;17. Sh. M.A.J.Jeyaseelan, Secretary, FICCI&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;18. Sh. Subimal Bhattacharjee, Vice President ARGUS, Representing ASSOCHAM&lt;/p&gt;
&lt;p align="left" class="Bodytext1"&gt;19.  Sh A B Saha, Senior Director, Ministry of IT                        - Member Convener&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;div&gt;&lt;/div&gt;
&lt;span&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac'&gt;https://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-09T15:26:26Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds">
    <title>Clash of the cyberworlds </title>
    <link>https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds</link>
    <description>
        &lt;b&gt;In an increasingly digital world, the issue of Internet freedom and governance has become hugely contested. Censorship and denial of access occur across the political spectrum of nations, even in liberal democracies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Latha Jishnu, Dinsa Sachan and Moyna was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/clash-cyberworlds?page=0,0"&gt;Down to Earth magazine's January 15, 2013 issue&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In run-up to the just-concluded World Conference on International Telecommunications in Dubai, there was a frenzied campaign to ensure that governments kept their hands off the Internet. It was feared the International Telecommunications Union, a UN body, was aiming to take control of the Internet. That hasn’t happened. But the outcome in Dubai has highlighted once again the double speak on freedom by countries that claim to espouse it and by corporations interested in protecting their interests, says Latha Jishnu, who warns that the major threat to the Internet freedom comes from the wide-ranging surveillance measures that all governments are quietly adopting. Dinsa Sachan speaks to institutions and officials to highlight the primacy of cyber security for nations, while Moyna tracks landmark cases that will have a bearing on how free the Net remains in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For months now a little-known UN agency, the International Telecommunication Union (ITU), has been looming large in cyberspace, portrayed as an evil force plotting to take over the Internet and threatening to destroy its freedom by rewriting archaic regulations. ITU, set up in 1865, is primarily a technical body that administers a 24-year-old treaty, International Telecommunication Regulations (ITRs), which are basic principles that govern the technical architecture of the global communication system.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ITU.png" alt="ITU" class="image-inline" title="ITU" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;How did the 193-nation ITU, which regulates radio spectrum, assigns satellite orbits and generally works to improve telecom infrastructure in the developing world, turn into everyone’s favourite monster in the digital world? The provocation was ITU’s World Conference on International Telecommunications (WCIT) in Dubai, where ITRs were proposed to be revised. Leaked documents of the proposals made to ITU had shown that statist countries like Russia and China, known for their crackdown on Internet freedom, had put forward proposals to regulate digital “crime” and “security” aspects that are currently not regulated at the global level for want of consensus on balancing enforcement with protection of individual rights. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other proposals were about technical coordination and the setting up of  standards that enable all the devices, networks and software across the  Internet to communicate and connect with one another. Although ITU  secretary general Hamadoun I Touré had emphasised that the Dubai WCIT  was primarily attempting to chart “a globally agreed-upon roadmap that  offers future connectivity to all, and ensures sufficient communications  capacity to cope with the exponential growth in voice, video and data”,  there was widespread scepticism among developed countries.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;Online subversion in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;AT the seventh annual meeting of the Internet Governance  Forum in Baku, Azerbaijan, last November, Minister for Communications  and Information Technology Kapil Sibal was a star turn. He made an  elevating speech about the need to put in place a “collaborative,  consultative, inclusive and consensual” system for dealing with policies  involving the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, with 125 million Internet users—a number that “is  likely to grow to about half a billion over the next few years”—would be  a key player in the cyberworld of tomorrow, he promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the minister, Internet governance was an  oxymoron because the concept of governance was for dealing with the  physical world and had no relevance in cyberspace. These were high  sounding words that crashed against the reality of India’s paranoia over  online subversion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For starters, Sibal flew into a media blitz over Google’s  transparency Report which ranked India second globally in accessing  private details of its citizens. Even if it was a far second behind the  US, it was an embarrassing revelation for the government which appears  to have been rather enthusiastic in seeking information on the users of  its various services. Such user data would include social networking  profiles, complete gmail accounts and search terms used. In the first  half of 2012, India made 2,319 requests related to 3,467 users compared  with 7,969 requests by the US. Globally, Google clocked a total of  20,938 requests for user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few days down the line there was a public explosion  over the arrest of two young women in Palghar, near Mumbai, for posting a  prosaic comment on Facebook over Bal Thackeray’s death. Thanks to the  deliberately vague wording of Section 66A of the IT Act, such arrests  have become common and Rajya Sabha devoted a whole afternoon to discuss  the impugned legislation and seek its withdrawal. Sibal’s response has  been to issue guidelines on the use of this Section which civil society  organisations say will do nothing to sort out matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there are the IT (Intermediaries Guidelines) Rules,  2011, issued under Section 79 of the IT Act, which have been used  indiscriminately by business interests to shut down websites, resulting  in unbridled censorship of the Internet time and again. Although a  motion for its annulment was moved in Parliament by Rajya Sabha member P  Rajeeve, it was withdrawn after Sibal promised to talk to all  stakeholders. A host of MPs have termed the rules a violation of right  to freedom of speech besides going against the laws of natural justice.  The promised meeting of stakeholders has not yielded any results and  censorship on grounds of possible online piracy continues. In this  regard, India is more restrained than the US which has pulled down huge  numbers of domains on the ground they were violating intellectual  property by selling pirated goods.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/userdata.png" alt="User Data" class="image-inline" title="User Data" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Western global powers, behemoth Internet companies, private telecom corporations and almost the entire pack of civil liberties organisations came together in a frenzied campaign to ensure that ITU kept its hands off the Internet. Massive online petitions were launched, backed by Internet companies such as search engine Google and social networking service Facebook. The Internet, they said, should not become an ITU remit because it would change the multi-stakeholder approach, which currently marks the way the Internet is governed, and replace it with government control that would curb digital freedom. Not only did the US administration oppose the revision of ITRs, the US Congress also passed a rare unanimous resolution against the WCIT proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, it was an anti-climax: nothing much came of these proposals. Although WCIT was marked by high drama—a walkout by the US and six European countries, a show of hands on a contested but innocuous resolution and an unexpected vote—the “final acts” (&lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf&lt;/a&gt;) or the changes in ITRs make no mention of the I word. Not once. The 30-page document states at the outset that “these regulations do not address the content-related aspects of telecommunications” —an indirect reference to the Internet.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/32_20130115.jpg" alt="World Internet Usage" class="image-inline" title="World Internet Usage" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Ultimately, it was a triumph of the US-led position even if 89 of the 144 eligible countries signed it. Most of the developed countries refused to sign it. Nor, unexpectedly, did India, and thereby hangs a curious tale. Officials who were privy to the negotiations told Down To Earth that India was all set to sign the new ITRs when its delegation got last-minute instructions from Delhi not to endorse them. “It was unexpected and a let-down for India and our global allies,” confesses an official of the Ministry of Communications &amp;amp; IT. “There was nothing in the final document that we had objections to.” According to the grapevine, Minister for Communications and Information Technology Kapil Sibal was facing pressure from two sides: the US Administration and domestically from civil society, Internet service providers and the private telecom players who had objected to India’s proposals on ITRs. The US is known to be keeping a close eye on what India decides to do on the new treaty which it can still ratify.&lt;/p&gt;
&lt;p&gt;In the Dubai treaty, the only ITR that does impinge on the Net is (Article 5B) on unsolicited bulk electronic communications or spam. But even here, what it merely states is that member-states should endeavour to take necessary measures to prevent the “propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In many ways, what took place during the hectic days before and during the December 3-14 WCIT was in a broad sense a replay of the Cold War scenario of the good (freedom-loving countries) versus evil (authoritarian or autocratic regimes), although alliance may have shifted in the two blocs. What is clear is that a larger geopolitical fight is playing out with the Internet as disputed terrain. American analysts themselves have pointed out that the “US got most of what it wanted. But then it refused to sign the document and left in a huff.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the innocuous Article 5A, which calls on members “to ensure the security and robustness of international telecommunication networks”, was interpreted by US delegation head Terry Kramer as a means that could be used by some governments to curb free speech!&lt;br /&gt;&lt;br /&gt;As an outraged Saudi delegate said, “It is unacceptable that one party to the conference gets everything they want and everybody else must make concessions. And after having made many concessions, we are then asked to suppress the language which was agreed to. I think that that is dangerous. We are on a slippery slope.” The final outcome: all the contentious issues were relegated to resolutions, which have no legal basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the US has managed to get its way on most issues: protecting the mammoth profits of its Internet companies and ensuring that control of the Internet address system, now done by a group based in the US, will not be shared with other ITU members. And, the likes of Google (2011 profit: $37.9 billion) and Facebook will not have to pay telecom companies for use of their networks to deliver content.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Challenges of securing cyberworld&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;E-commerce in India, where every tenth person is online, is on the rise—and, consequently, crime on the Internet. In 2011, the country’s nodal agency for handling cyber crime, Indian Computer Emergency Response Team, tackled 13,301 incidences of security breach. The incidents ran the gamut from website intrusions, phishing to network probing and virus attacks. Further, in 2009, 2010, 2011 and 2012 (until October), there were 201, 303, 308 and 294 cyber attacks respectively on sites owned by the Indian government. Most notably, hacker group Anonymous defaced the website of Union Minister of Communications and Information Technology, Kapil Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To beef up cyber security, the Union ministry plans to pump in Rs 45 crore in 2012-13. It also put up a draft cyber security policy for public comments in 2011. Currently, cases involving cyber security and crime are handled under the IT Act of 2000 (Amendment 2008) and the Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But will the government go about its business of securing the Net in a responsible manner? There is scepticism. Section 69 of the Act gives any government agency the right to “intercept, monitor or decrypt” information online. Chinmayi Arun, assistant professor of law at National Law University in Delhi, said at the Internet Governance Conference held at FICCI in October that crimes like defamation are not on the same page as cyber terrorism, and “we have to question whether they warranty invasion of privacy”. She added that the workings of the surveillance system has to be made more open to build public trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS) in Bengaluru, draws attention to a fundamental flaw in the section. “Government is allowed to wire tap under the Telegraph Act, 1885. But the Act lays out specific guidelines for such an action. For example, you can only tap phones in the case of a ‘public emergency’ or ‘public safety’ situation. The IT Act does not put such limitations on interception of information,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber security and ITU&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few months prior to the controversial World Conference on International Telecommunications in Dubai, countries, including Russia and Arab states, had proposed measures that would, through International Telecommunication Union (ITU), grant disproportional power to countries to control the Internet in the name of security measures. Several proposals, most notably those of India and Arab States, explicitly stated in the proposed Article 5A that countries should be able to “undertake appropriate measures, individually or in cooperation with other Member States” to tackle issues relating to “confidence and security of telecommunications/ICTs”. It raised alarm among civil society. US-based think tank Center for Democracy and Technology (CDT) said in its report dated September, 2012, that cyber security does not fall under the ambit of International Telecom Regulations, and some countries would misuse such privileges for “intrusive or repressive measures”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposal by African member states recommended that nations should “harmonise their laws” on data retention. In other words, intermediaries would have to retain public data for a long period so that governments can access it whenever they please. With regard to this, CDT noted, “Not only do national laws on data retention vary greatly, but there is ongoing controversy about whether governments should impose data retention mandates at all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A clause in the Arab proposal on routing said, “A Member State has the right to know how its traffic is routed.” Currently, the way Internet works, senders and recipients do not know how data between their computers travels or is routed. However, enabling countries to have control over routing has its dangers. CDT notes, “(This) would simply not work and could fundamentally disrupt the operation of the Internet.” Internet traffic travels over an IP network. While travelling, it is fragmented into small packets. Packets generally take a different path across interconnected networks in many different countries before reaching the recipient’s computer. CDT notes providing routing information to countries would require “extensive network engineering changes, not only creating huge new costs, but also threatening the performance benefits and network efficiency of the current system”. Although routing was not part of India’s proposal, Ram Narain, deputy director general at the department of telecommunications, told Down To Earth it was one of the country’s concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, to civil society’s partial relief, such draconian cyber security clauses were not adopted in the new itr treaty. Two clauses added to the treaty, Article 5A and 5B, address some cyber security concerns. Titled “Security and robustness of networks”, Article 5A urges countries to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks”. Article 5B talks about keeping tabs on spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers, says while he would have preferred that the two clauses were kept out of the new treaty, they do not seem harmful. “They are a much toned down version of what Arab states and Russia had suggested,” he says.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is one reason India, Brazil and other democracies from the developing world also want a change in ITRs. They want the Internet behemoths to pay for access to their markets so that such revenues can be used to build their own Internet infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the furious debate on keeping the Net free of international control even hawk-eyed civil society organisations prefer to ignore the monetary aspects of Net control. Some analysts believe that maintaining the status quo is not so much about protecting the values of the Internet as about safeguarding interests, both monetary and hegemonistic. Such an assessment may not be wide of the mark if one joins the dots. Google, says a Bloomberg report of December 10, “avoided about $2 billion in worldwide income taxes in 2011 by shifting $9.8 billion in revenues into a Bermuda shell company, almost double the total from three years before”. It also said that the French, Italian, British and Australian governments are probing Google’s tax avoidance in its borderless operations.&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Top10Internet.png" alt="Top 10 Internet" class="image-inline" title="Top 10 Internet" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;What is clear, however, is that a number of countries for reasons springing from different motivations, appear determined to undermine America’s control of the outfits that now define how the Internet works. Although the US maintains that ICANN (Internet Corporation for Assigned Names and Numbers) is a private, non-profit corporation, it is overseen by the US Commerce Department. According to People’s Daily, what the US spouts about Net freedom is so much humbug. In an August 2012 report, the leading Chinese daily claimed the US “controls and owns all cyberspaces in the world, and other countries can only lease Internet addresses and domain names from the US, leading to American hegemonic monopoly over the world’s Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also highlighted a fact that has slipped below the radar. During the Iraq invasion, the US government asked ICANN to terminate services to Iraq’s top-level domain name “.iq” and thereafter all websites with the domain name “.iq” disappeared overnight. It charges the US with having “taken advantage of its control over the Internet to launch an invisible war against disobedient countries and to intimidate and threaten other countries”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this may be true, the irony is that China, with its great firewall of censorship, is in no shape to position itself as a champion of freedom. Like other authoritarian countries, it will do everything to police the Net and control it.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The right of countries and peoples to access the Net was highlighted in Dubai when some African countries raised the issue of US control of the global Internet. Some of these, such as Sudan, have long been complaining about Washington’s sanctions that entail denial of Internet services. ITU officials point out that Resolution 69, first passed in the 2008 meeting, invoked again in 2010 and dusted off once again for the WCIT negotiations, invoked “human rights” to argue for “non-discriminatory access to modern telecom/ ICT facilities, services and applications”. Says Paul Conneally, head of Communications &amp;amp; Partnership Promotion at ITU, “The real target of these resolutions are US sanctions imposed on nations that are deemed bad actors. These sanctions mean that people in those countries—not just the government, mind you, but everyone, innocent and guilty alike—are denied access to Internet services such as Google, Sourceforge, domain name registrars such as GoDaddy, software and services from Oracle, Windows Live Messenger, etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The catalogue of Sudan’s complaints shows at least 27 instances in 2012 when companies from Google to Microsoft and Paypal to Oracle cut off their services to the African country. This might explain why major companies would be opposed to the resolution on a right to access Internet services. Such a right would allow countries to use ITRs to compel them to provide services they might otherwise have preferred not to. But so far all such sanctions appear to have been a decision of the US Administration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of the digital divide, in fact, did not get the headlines it should have. Africa accounts for just 7 per cent of the 2.4 billion people who use the Net worldwide and penetration in the region is just 15.6 per cent of the population. Compare this with North America where over 78 per cent are linked to the digital world and Touré’s logic about the ITU’s mandate appears reasonable.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;When Apple censors the drone war&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NETIZENS know that the Internet suffers from the  depredations of government, hackers and viruses. But not many are aware  that companies are as prone to taking legitimate stuff off the Net on  the flimsiest grounds. In the case of Apple it could have been misplaced  patriotism or plain business sense that prompted it to block an app  which monitors drone strike locations in November last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img align="left" alt="image" class="standalone-image" height="279" src="http://www.downtoearth.org.in/dte/userfiles/images/36_20130115.jpg" width="141" /&gt;The  App Store rejected the product, calling it “objectionable and crude”.  Drones+ (see photo) is an application that simply adds a location to a  map every time a drone strike is reported in the media and added to a  database maintained by the UK’s Bureau of Investigative Journalism. Josh  Begley, a graduate student at New York University, who developed the  app, says it shows no visuals of war or classified information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All it does is to keep its users informed about when and  where drone attacks are taking place in Pakistan and Afghanistan. “This  is behavior I would expect of a company in a repressive country like  China, not an iconic American company in the heart of Silicon Valley,”  says a petition to the company CEO. Did Apple’s censorship have anything  to do with the fact that it received huge contracts from the Pentagon?  US legislators have joined the protests against Apple.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most brazen act of corporate censorship occurred in  August 2012 with NASA’s livestream coverage of the Curiosity rover’s  landing on Mars in the space agency’s $2.5 billion mission. A news  agency, Scripps, coolly claimed as its own the public domain video  posted on NASA’s official YouTube channel that documented the epic  landing (see our opening visuals). “This video contains content from  Scripps Local News, who has blocked it on copyright grounds. Sorry about  that,” said a message on NASA’s blackened screen. So much for the  strict US laws aimed at curbing online piracy!&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Touré noted that the revised ITRs would see greater transparency in global roaming charges, lead to “more investment in broadband infrastructure” and help those with disabilities. But he was hopeful that the new treaty signed in Dubai would make it possible for the 4.5 billion people still offline to be connected. “When all these people come online, we hope they will have enough infrastructure and connectivity so that traffic will continue to flow freely,” Touré said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But should ITU govern the Net? Not in its entirety, according to experts. For one, ITU until the Dubai meeting was far from being transparent and does not allow participation of civil society or other stakeholders in its negotiations unless they are part of the official delegation of the member-states. In fact, even critics of the current system, who think the system is lopsided and hypocritical, believe ITU needs to reform itself and confine to the carrier/infrastructure layer of the Internet. Nor should it get into laying down standards which is done by Internet Engineering Task Force (IETF) and the naming and numbering that is managed by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Conneally counters this by asking what would happen if the US decided to deny domain name root zone to Iran because of its bad human rights record. “Suppose it ordered Verisign to remove .IR from the DNS root and make it non-functional. Would we want ICANN/the Internet governance regime to be used as a political/strategic tool to reform Iran? What happens to global interoperability when the core infrastructure gets used in that way?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Who then should ensure that the Internet is run in a free and open manner? Should it be the Internet Governance Forum (IGF)? But IGF is to be an open consultative forum that cannot by itself govern. It brings in participation for any or all Internet-related policy processes but it by itself was never supposed to do policy or governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parminder Jeet Singh, executive director of ItforChange, says whoever governs is the government for that purpose. “This truism is significant in the present context, because there is an attempt by those who really control/ govern the Internet at present, largely through illegitimate and often surreptitious ways, to confuse issues around Internet governance in all ways possible, including through abuse of established language and political principles and concepts.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITforChange is a Bengaluru institution working on information society theory and practice, especially from the standpoint of equity, social justice and gender equality, and it is that perspective which informs Singh’s suggestions. “What we need are safeguards as, for instance, with media regulation. The Internet, of course, is much more than media. It is today one of the most important factors that can and will influence distribution of economic, social and political power. Without regulation it will always be that those who currently dominate it will take away the biggest pie.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;Surveillance club&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Eight Indian companies are among the 700 members of  European Telecommunications Standards Institute. The group works with  government and law enforcement agencies to integrate surveillance  capabilities into communications infrastructure. It also hosts regular  meetings on lawful interception&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt; Wipro Technologies &lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt; Associate Service Providers&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;•  HCL Technologies Limited&lt;/td&gt;
&lt;td&gt;• Associate Consultancy for Co./Partnership&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Accenture Services Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Observers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• CEWiT&lt;/td&gt;
&lt;td&gt;• Associate Research Body&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Saankhya Labs Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Sasken Communication&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Technologies&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• SmartPlay Technologies&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Associate Consultancy for Co./Partnership&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• TEJAS NETWORKS LTD&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other critics of the current system concede that bringing governments on board, especially authoritarian and statist powers which the digital world threatens, would give them perverse incentives to control it. But this threat should be met not by insisting that the Internet needs no governance or regulation, but by safeguards that ensure equitable access and benefits, Singh stresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the jury is out on the question whether the new ITRs will make any material difference to the way, and if at all, the Net will come under added government oversight and intervention, developments elsewhere show that ITU is not the main threat to digital freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The irony is that while cyber security is contentious in ITU, other international organisations, such as the UN Office on Drugs and Crime (UNODC) and a clutch of influential telecom industry associations, are pushing for surveillance programmes that ensure policing of a high order with sophisticated infrastructure to monitor online communications. A host of countries already have such systems in place and are pressuring countries like India to fall in line.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A UNODC report, titled ‘The use of the Internet for terrorist purposes’, has detailed how countries can and should use new technology for online surveillance—all in the name of anti-terrorism. The report discusses sensitive issues such as blocking websites and using spyware to bypass encryption and also urges countries to cooperate on an agreed framework for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, powerful industry bodies, such as ATIS (Alliance for Telecommunications Industry Solutions) and the European Telecommunications Standards Institute (ETSI), are reported to be working with government and law enforcement agencies to integrate surveillance capabilities into communications infrastructure, according to Future Tense, a project which looks at emerging technologies and how these affect society, policy and culture. It says India is under pressure from another industry organisation, the Telecommunications Industry Association (TIA), “to adopt global standards for surveillance”, calling on the country’s government to create a “centralized monitoring system” and “install state-of-the-art legal intercept equipment”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TIA is a Washington-based trade group which brings together companies such as Nokia, Siemens Networks and Verizon Wireless, and is focused on issues related to electronic surveillance and is developing standards for intercepting VOIP and data retention alongside with ETSI and ATIS. At least seven Indian companies are members of ETSI, which is said to hold international meetings on data interception thrice a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Add to this chilling list the International Chamber of Commerce. It is reported to be seeking the establishment of surveillance centre hubs of several countries to help governments intercept communications and obtain data that is stored in cloud servers in foreign jurisdictions. Given this backdrop why are the US and its cohorts creating a ruckus on ITRs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also mean that by focusing on ITRs and ITU as a major threat to Internet freedom civil society may be jousting at windmills.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Malice and freedom of speech&lt;/h2&gt;
&lt;p&gt;&lt;i&gt;Two suits highlight the challenge of treading between the two&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the many legal cases in India related to the use and misuse of the world wide web, two stand out for involving web giants and provoking sharp reaction. These are the cases registered in Delhi district courts in December 2011, objecting to chunks of content—portraying prominent political figures and religious places among others in a certain light—hosted on websites. One was filed by a Delhi journalist, Vinai Rai, requesting the court to press criminal charges against 21 web agencies, including Google, Facebook and Yahoo! India. The other, filed by a social activist, M A A Qasmi, was a civil suit requesting action against 22 web agencies. Both mentioned that the content on the websites was inflammatory, threat to national integrity, unacceptable, and created enmity, hatred and communal discord.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Source: Google Transparency Report" height="233" src="http://www.downtoearth.org.in/dte/userfiles/images/37_20130115.jpg" title="Source: Google Transparency Report" width="457" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year on, tangible impact has not been much. The number of accused in the civil case has come down to seven web agencies and in the criminal case the government is yet to issue summons to the companies concerned (see ‘The case so far’). However, these litigations are seen as landmarks in the recent history of the Internet and its interaction with societies and governments. The cases—especially off-the-record comments by the judiciary suggesting blanket ban and pre-screening of all content—provoked a debate on the freedom of expression and Indian cyber laws.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The case so far &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 13, 2012:&lt;/b&gt; Delhi High Court dismisses petition by Google and Facebook asking to be absolved of criminal charges filed in district court&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 20:&lt;/b&gt; High Court asks for reply from Delhi Police in response to plea by Yahoo! India challenging district court summons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FEBRUARY 16:&lt;/b&gt; Court refuses to stay proceedings against Facebook and Google but allows them to be  represented by counsel&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MARCH:&lt;/b&gt; Court dismisses  criminal charges against Yahoo! India  and Microsoft but says the charges  can be revived if new evidence comes  to light. Sets aside summons&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Malicious content exists on the web and may even need to be taken down, but the laws used to remove malicious content can also be used to curb political speech, thus, infringing on the right to freedom of expression, says Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some like Pranesh Prakash of non-profit Centre for Internet and Society believe the IT Rules are at odds with the IT Act and give powers for censorship. He explains that the IT Act, 2000, provides for protection of intermediaries; web browsers, social networking sites and websites cannot be held responsible for what a third party publishes on their forums—“similar to the way in which we cannot sue a telephone agency or a post office for someone else making use of these platforms to harass or defame another person”. But the IT rules of 2011 watered down this protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and cyber law expert Pavan Duggal explains how. The Act states once a complaint is made against certain content, the web agency hosting it must notify the person who put up the content, verify the content and judge whether it needs to be removed. But the rules state that once the web agency is notified it must remove the content within 36 hours or it could be prosecuted for not acting on the complaint. The rules have gone beyond the Act’s scope, especially vis-a-vis privacy and data protection, leaving no scope for hearing out the accused, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disjunct between the Act and the rules is being contested in  various spheres, including Parliament. But there is a bright side too.  Duggal believes the cases have brought pertinent issues, like free  speech and privacy concerns, into the public domain. Ramanjeet Chima,  policy adviser for Google, says freedom of expression is paramount for  Google but the recognition of local sentiments is also being given equal  weightage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Sidharth Luthra, who was representing Facebook in the  Delhi High Court, wonders whether the existing Indian laws are in tune  with the ever-changing online world. Unwilling to comment on the case,  he says the law is limited in its scope, while technology is not.  Refusing to comment on the cases, the Google adviser emphasised the need  to use the existing provisions of big web agencies to address  grievances regarding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet “is not the wild wild west”; all content, users and  viewers can be traced, Duggal cautions. Since the Internet can impact  political issues government is increasingly looking for ways to control  it. “There is no ideal solution but it is evident that some monitoring  and regulation are required, and in all parts of the world all regimes  are in the process of addressing this,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds'&gt;https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-15T06:57:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu">
    <title>Panel Discussion on E-Commerce at NLSIU</title>
    <link>https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist at this event held at the National Law School of India University on January 7, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Suswagata Roy &lt;a class="external-link" href="http://www.coolage.in/2013/01/19/panel-discussion-on-e-commerce-at-nlsiu/"&gt;posted a report of this event&lt;/a&gt; in Cool Age on January 19, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;E-Commerce in India has brought about a revolution and has changed the way businesses are conducted. In a short period of time, E-Commerce has seen tremendous growth and has been able to generate a market for itself. This definitely seems to be just the beginning and a bright future awaits it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that E-Commerce is a hot topic and has already given rise to some  pertinent legal issues, the Law and Technology Committee of National Law  School of India University held a panel discussion on the same on 7&lt;sup&gt;th&lt;/sup&gt; Jan, 2013 at 4 PM in the Training Centre, NLSIU Campus. The Panel,  which consisted of Mr. Stephen Mathias (Partner, Kochhar and Co.), Mr.  Pranesh Prakash (Policy Director, Centre for Internet and Society) and  Mr. N. Vijayashankar (founder Chairman of Digital Society Foundation),  focused on three issues in order to bring forth their key points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issues that were highlighted through the discussion were:&lt;br /&gt; &lt;br /&gt; &lt;b&gt;1.&lt;/b&gt; &lt;b&gt;E-Commerce and Privacy&lt;/b&gt;: Privacy and  the internet has been an important issue with which the legal community  has been grappling for a long time. There are no specific legislations  in India which protect privacy especially in relation to the internet.  Protecting private and confidential information of the users is a  primary concern of E-Commerce websites which also highlights the related  issue of data protection. The customers' financial information is in  special need of protection. While dealing with this issue questions like  who is responsible for such protection, what data can be shared and  what usage will it be put to use will have to be looked at? While  dealing with privacy how the government will create a balance between  protecting confidential information and providing information to the  regulators to ensure no sham transactions, money laundering and tax  evasion is being carried on needs to be addressed.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;2.&lt;/b&gt; &lt;b&gt;E-Commerce and its compatibility with other laws: the need for a separate Act:&lt;/b&gt;E-Commerce  has definitely given rise to a new form of transaction. Thus, related  laws such as law of contracts, law of evidence, taxation will all have  to evolve to accommodate the new form of legal dealing. Contracts will  have to evolve to validate such online transactions while law of  evidence will have to evolve in order to sustain disputes based on such  transactions. Many pertinent questions relating to intellectual property  rights also arise especially in the area of copyrights. While minor  amendments have been made to the Indian Evidence Act and to the  Information Technology Act, they are not sufficient to handle this  advanced method of conducting business. Moreover, the Information  Technology Act is an enabling Act and this complicates matters even  more. These issues give rise to the obvious question of needing a  separate Act to regulate E-Commerce. An E-Commerce bill was drafted in  1998 which has never been given any attention and which may not be  relevant anymore after the changes that technology has undergone over  more than a decade.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;3.&lt;/b&gt; &lt;b&gt;E-Commerce and Cyber Crimes&lt;/b&gt;:  E-Commerce has opened new avenues of dealing with consumers in the  virtual world and thus, has opened new modes of proliferation of cyber  crimes. It has resulted in an increased need to secure the laws in  relation to fraud prevention, money laundering and phishing. It is  imperative to look at the cyber laws in India and whether they are  sufficient to deal with such issues in the wake of E-Commerce. How  should the law deal with such issues and what regulatory compliances are  required for E-Commerce websites in order to deal with these issues?&lt;br /&gt; &lt;br /&gt; Thus, though E-Commerce is on the rise and is a welcome way of  conducting business and has entranced many consumers, its effective  utilizations and growth is viable only if a sturdy legal framework is in  place. The panel discussion brought forth such issues and discussed the  solutions for the same.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu'&gt;https://cis-india.org/news/panel-discussion-on-e-commerce-at-nlsiu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-03T10:37:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs">
    <title>Cool Jobs | Parmesh Shahani, Head, Godrej India Culture Lab</title>
    <link>https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs</link>
    <description>
        &lt;b&gt;The man behind Mumbai’s most original ideas space on being a cross-pollinator &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The following interview was &lt;a class="external-link" href="http://www.livemint.com/Leisure/ZRt3AxEo6ZC0qqxfbpPkLJ/Cool-Jobs--Parmesh-Shahani-Head-Godrej-India-Culture-Lab.html"&gt;published in LiveMint&lt;/a&gt; on January 4, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Parmesh621x414.jpg" alt="Parmesh" class="image-inline" title="Parmesh" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Vikhroli catalyst &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Parmesh%20Shahani"&gt;Parmesh Shahani&lt;/a&gt;&lt;/span&gt;, a former editorial director of &lt;i&gt;Verve&lt;/i&gt; magazine, thought up the Godrej India Culture Lab, a cultural ideas  platform, after becoming a TED Fellow in 2009, realizing then that  Mumbai, or India, has no space that encourages cross-pollination of  ideas around contemporary society, anthropology and culture.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shahani, the author of &lt;i&gt;Gay Bombay: Globalization, Love And (Be)Longing in Contemporary India, &lt;/i&gt;has earlier managed research for Massachusetts Institute of Technology (MIT) think tank related to media convergence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever  since Godrej’s Nisa Godrej took up his idea, the Godrej India Culture  Lab has hosted a conference called Urban (Re)imagination—which it  launched in 2011—talks by Japanese architect Tadao Ando, and MIT  economist Abhijit Banerjee, film screenings and book readings on themes  as diverse as Calcutta jazz and &lt;i&gt;jugaad&lt;/i&gt;. Shahani says he works on weekends and looks forward to Monday mornings. Edited excerpts from an interview:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What exactly does your work involve?&lt;/b&gt;&lt;br /&gt;My  work involves identifying interesting people and ideas and then  connecting them to each other—either through public talks, conferences,  salons or other means of interaction. There are certain themes I am  interested in exploring, such as what it means to be modern and Indian  today, what it means to be young or urban, and to be connected through  technology. My work often feeds directly into the larger Godrej group  efforts. We have a campaign called Godrej LOUD—Live Out Ur Dreams—on MBA  campuses across India with excellent results.&lt;/p&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;What is the best part of your job?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415NiD" style="text-align: justify; "&gt;It  doesn’t feel like a job. It feels like a calling, a mission, and is an  incredible adventure. Each day is different—and fun. It enables me to  use all the different aspects of my mind, and tap into my global  networks to focus on how we are looking at the changes taking place in  contemporary India. I love meeting other people who are on the same  mission—the people at Gateway House, India’s first foreign policy think  tank, or the Centre for Internet and Society in Bangalore, or people  like Rikin Gandhi from Digital Green that trains farmers to use cameras  to record their best practices and share it with each other.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What are your challenges and what more do you want to bring into the Lab?&lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U19041934944150L" style="text-align: justify; "&gt;At  this moment we are more of a sandbox and catalyst. I’d like us to start  producing original research soon by having full-time experts on board.  We have recorded videos of all our talks of the past two years; they  will go up on our website, which is under development. Finally, I’d like  to attract more audiences to our events and efforts. We’ve already put  our Godrej campus at Vikhroli, Mumbai, on the cultural map of the city.&lt;/div&gt;
&lt;div class="p" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;/div&gt;
&lt;div class="p"&gt;&lt;b&gt;&lt;br /&gt;What has been your favourite project here? &lt;/b&gt;&lt;/div&gt;
&lt;div class="p" id="U1904193494415u0E" style="text-align: justify; "&gt;My favourite project has got to be the recent &lt;i&gt;Museum of Memories&lt;/i&gt; that I curated in an abandoned 60,000 sq. ft Godrej warehouse on 15  December 2012, in collaboration with other city organizations like  Junoon, Visual Disobedience, Brown Paper Bag, as well as loads of  performers, artists and musicians from the city. It was a pop-up one-day  only event with performances, music, theatre, tea, yoga, live art,  graffiti, videos, dance, robots, alternate reality games, and more. The  event bridged different spaces and it will remain very special.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs'&gt;https://cis-india.org/news/livemint-january-4-2013-sanjukta-sharma-cool-jobs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-17T05:55:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/mobile-india-2013">
    <title>Mobile Broadband: Leveraging for Business Transformation </title>
    <link>https://cis-india.org/news/mobile-india-2013</link>
    <description>
        &lt;b&gt; Mobile India 2013 is being held at the Chancery Pavillion, Bangalore on 9 January 2013. Sunil Abraham is speaking at this event.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Mobile India 2013  is the one of the first premier conferences and will be the curtain raiser for Mobile Broadband revolution in the country. It is associated with The Fifth International Conference on COMmunication Systems NETworkS (COMSNETS), the world’s premier international conference on networking and communications technology innovation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Keynote Speeches&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Keynote - 1: Prof. Bhaskar Ramamurthi &lt;/b&gt;, Director, IIT     Madras will deliver the joint keynote speech for COMSNETS 2013 and     Mobile India 2013.     &lt;br /&gt; &lt;b&gt; Keynote - 2 : &lt;a href="http://comsnets.org/mobile_session1.html#1"&gt;Sanjay Nayak &lt;/a&gt; &lt;/b&gt;, Chief Executive Officer &amp;amp; Managing Director, Tejas     Networks.&lt;a href="http://www.tejasnetworks.com/"&gt; Tejas Networks&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile India 2013 will try to unravel the mysteries in the       following sessions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 1: Enterprises on the move&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/enterprises-on-the-move/"&gt; http://yourstory.in/2012/12/enterprises-on-the-move/ &lt;/a&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises are exploring ways to leverage the power of smart       devices, the cloud, and broadband to be agile, flexible, and       productive. The IT managers in organizations are challenged to       support variety of devices (viz. BYOD) within the organization, at       the same time providing the required organizational security and       performance support to the employees. This session will deliberate       on the challenges and opportunities of today's networked world for       enterprises on the move.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session1_2.html#1"&gt; Ashvin           Vellody &lt;/a&gt;, Director - Management Consulting, KPMG India; &lt;a href="http://comsnets.org/mobile_session1_2.html#2"&gt; Dr. K.K.           Ramakrishnan &lt;/a&gt;, Distinguished Member of the Technical         Staff, AT&amp;amp;T Labs Research, USA; &lt;a href="http://comsnets.org/mobile_session1.html#5"&gt; Puneet           Gupta &lt;/a&gt;, AVP and Head of Mobility Research, Infosys SET         Labs; Sai Pratyush, Head-Enterprise Products, Tata Teleservices;         &lt;a href="http://comsnets.org/mobile_session1.html#4"&gt; E.           Manikandan &lt;/a&gt;, Head-Channels and Alliances, Ramco Systems;         &lt;a href="http://comsnets.org/mobile_session1.html#3"&gt; Umesh           Sachdev &lt;/a&gt;, Co-founder and CEO, Uniphore ; &lt;a href="http://comsnets.org/mobile_session1_3.html#4"&gt; Yathish,           L, N. &lt;/a&gt;, CTO, Huawei Technologies &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session1.html#2"&gt; Swami           Krishnan &lt;/a&gt;, VP and Head-Marketing, Sasken Communication         Technologies &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 2: Massively Open Online Education&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;"For a preview, read &lt;a href="http://yourstory.in/2012/12/massively-open-online-education/"&gt; http://yourstory.in/2012/12/massively-open-online-education/ &lt;/a&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online and Internet based education has permeated in to schools       and colleges today. Massively Open On-line Course (MOOC)       initiatives such as National Programme on Technology Enhanced       Learning (NPTEL) in India and those by leading institutions such       as MIT and Stanford in the US are democratizing education and       making it available globally over the Internet. In India, the       Government has been an early adopter and both academia and       industry have begun taking this initiative further. However,       limited access to wired broadband and computers have restricted       reach for providing online education. Can the ubiquitous mobile       solve this problem? &lt;br /&gt; In this session, experts will deliberate in detail on the       opportunities and challenges in providing education through mobile       networks and wireless devices. Are these scalable and monetizable?       What are the implications for traditional educational       methodologies? What are the transformations this will bring to the       publishing industry?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://comsnets.org/mobile_session2.html#3"&gt; Dr. Gautam           Shroff &lt;/a&gt;, VP and Chief Scientist, TCS; &lt;a href="http://comsnets.org/mobile_session2.html#2"&gt;Srikanth B.           Iyer &lt;/a&gt;, COO, Pearson Education Services; &lt;a href="http://comsnets.org/mobile_session2.html#4"&gt; Rohit Kumar &lt;/a&gt;, MD, Elsevier India; Sunil Abraham, Executive Director,         Centre for Internet and Civil Society; &lt;a href="http://comsnets.org/mobile_session1_2.html#3"&gt; Arun           Prabhudesai &lt;/a&gt;, CTO, myopencourses.com &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session2.html#1"&gt; Prof. D.           Manjunath &lt;/a&gt;, Professor, IIT Bombay &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Session 3: Innovation Workshop&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the concluding session of the day, a workshop on mobile       innovations will be conducted wherein several start-up firms will       show case their unique innovations in the mobile space and share       their experiences on ideation, fund mobilization, monetization       models, and scale-up for sustainability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Panelists: &lt;a href="http://www.mintm.com/"&gt; MintM &lt;/a&gt; (&lt;a href="http://comsnets.org/mobile_session3.html#2"&gt; Sachin Garg &lt;/a&gt;, Founder); &lt;a href="http://www.robots-alive.com/"&gt; Robots           Alive &lt;/a&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#3"&gt; Abheek Bose &lt;/a&gt;, Founder); &lt;a href="http://www.twaang.com/"&gt;Twaang &lt;/a&gt; &lt;br /&gt;(&lt;a href="http://comsnets.org/mobile_session3.html#4"&gt; Vishnu           Raned &lt;/a&gt;, Founder);&lt;a href="http://www.janacare.com/"&gt; JanaCare &lt;/a&gt;, (&lt;a href="http://comsnets.org/mobile_session3.html#5"&gt; Sidhant           Jena &lt;/a&gt;, Co-founder), &lt;a href="http://www.astralpad.com/"&gt;AstralPad &lt;/a&gt;(Rahul Singh) &lt;br /&gt; Moderator: &lt;a href="http://comsnets.org/mobile_session3.html#1"&gt; Madanmohan Rao &lt;/a&gt;, Director-Research, &lt;a href="http://comsnets.org/Yourstory.in"&gt; Yourstory.in &lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Event Chairs&lt;/h2&gt;
&lt;p&gt;Dr. V. Sridhar (&lt;a class="mail-link" href="mailto:sridhar.varadharajan@sasken.com"&gt;sridhar.varadharajan@sasken.com&lt;/a&gt;), Sasken Communication Technologies, India &lt;br /&gt;S.R. Raja (&lt;a class="mail-link" href="mailto:rajaraghavan.setlur@sasken.com"&gt;rajaraghavan.setlur@sasken.com&lt;/a&gt;)&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://in.eregnow.com/ticketing/register/mobileindia2013"&gt;Register here for Mobile India 2013 &lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/mobile-india-2013'&gt;https://cis-india.org/news/mobile-india-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T08:40:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
