<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/finalpaper"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-case-of-whatsapp-group-admins"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/super-cassettes-v-myspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet">
    <title>The noose tightens on freedom of speech on the Internet</title>
    <link>https://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet</link>
    <description>
        &lt;b&gt;A WORRYING trend has emerged in the last few years, where intermediaries around the world are being used as chokepoints to restrict freedom of expression online, and to hold users accountable for content.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Gabey Goh was published by &lt;a class="external-link" href="https://www.digitalnewsasia.com/digital-economy/the-noose-tightens-on-freedom-of-speech-on-the-internet"&gt;Digital News Asia&lt;/a&gt; on March 26, 2015. Jyoti Panday gave her inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“All communication across the Internet is facilitated by intermediaries:  Service providers, social networks, search engines, and more,” said  Electronic Frontier Foundation (EFF) senior global policy analyst Jeremy  Malcolm.&lt;br /&gt; &lt;br /&gt; “These services are all routinely asked to take down content, and their  policies for responding are often muddled, heavy-handed, or  inconsistent.&lt;br /&gt; &lt;br /&gt; “That results in censorship and the limiting of people’s rights,” he told Digital News Asia (DNA) on the sidelines of &lt;a href="https://www.rightscon.org/" target="_blank"&gt;RightsCon&lt;/a&gt;, an Internet and human rights conference hosted in Manila from March 24-25.&lt;br /&gt; &lt;br /&gt; This year, the government of France is moving to &lt;a href="http://www.bloomberg.com/news/articles/2015-01-27/france-seeks-to-sanction-web-companies-for-posts-pushing-terror" target="_blank"&gt;implement regulation&lt;/a&gt; that makes Internet operators ‘accomplices’ of hate-speech offences if they host extremist messages.&lt;br /&gt; &lt;br /&gt;&lt;a href="http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/03/09/icann-copyright-infringement-and-the-public-interest/" target="_blank"&gt;In February&lt;/a&gt;,  the Motion Picture Association of America (MPAA) and the Recording  Industry Association of America (RIAA) urged ICANN (the Internet  Corporation for Assigned Names and Numbers) to ensure that domain name  registries and registrars “investigate copyright abuse complaints and  respond appropriately.”&lt;br /&gt; &lt;br /&gt; Closer to home, the Malaysian Government passed a controversial  amendment to the Evidence Act 1950 – Section 114A – back in 2012.&lt;br /&gt; &lt;br /&gt; Under &lt;a href="http://www.digitalnewsasia.com/digital-economy/govt-stealthily-gazettes-evidence-act-amendment-law-is-now-in-operation" target="_blank"&gt;Section 114A&lt;/a&gt;,  an Internet user is deemed the publisher of any online content unless  proven otherwise. The new legislation also makes individuals and those  who administer, operate or provide spaces for online community forums,  blogging and hosting services, liable for content published through  their services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the potential negative impact on freedom of expression, a roadmap called the &lt;i&gt;&lt;a href="https://www.manilaprinciples.org/" target="_blank"&gt;Manila Principles on Internet Liability&lt;/a&gt;&lt;/i&gt; was launched during RightsCon.&lt;br /&gt; &lt;br /&gt; The EFF, Centre for Internet Society India, Article 19, and other global  partners unveiled the principles, whose framework outlines clear, fair  requirements for content removal requests and details how to minimise  the damage a takedown can do.&lt;br /&gt; &lt;br /&gt; For example, if content is restricted because it’s unlawful in one  country or region, then the scope of the restriction should be  geographically limited as well.&lt;br /&gt; &lt;br /&gt; The principles also urge adoption of laws shielding intermediaries from  liability for third-party content, which encourages the creation of  platforms that allow for online discussion and debate about  controversial issues.&lt;br /&gt; &lt;br /&gt; “Our goal is to protect everyone’s freedom of expression with a  framework of safeguards and best practices for responding to requests  for content removal,” said Malcolm.&lt;br /&gt; &lt;br /&gt; Jyoti Panday from the Centre for Internet and Society India noted that  people ask for expression to be removed from the Internet for various  reasons, good and bad, claiming the authority of myriad local and  national laws.&lt;br /&gt; &lt;br /&gt; “It’s easy for important, lawful content to get caught in the crossfire.  We hope these principles empower everyone – from governments and  intermediaries, to the public – to fight back when online expression is  censored,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Manila Principles can be summarised in six key points:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Intermediaries should be shielded by law from liability for third-party content.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Content must not be required to be restricted without an order by a judicial authority.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Requests for restrictions of content must be clear, be unambiguous, and follow due process.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Laws and content restriction orders and practices must comply with the tests of necessity and proportionality.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Laws and content restriction policies and practices must respect due process.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Transparency and accountability must be built in to laws and content restriction policies and practices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;“Right now, different countries have differing levels of protection when  it comes to intermediary liability, and we’re saying that there should  be expansive protection across all content,” said Malcolm &lt;b&gt;&lt;i&gt;(pic)&lt;/i&gt;&lt;/b&gt;.&lt;br /&gt; &lt;br /&gt; “In addition, there is no logic in distinguishing between intellectual  property (IP) and other forms of content as in the case in the United  States for example, where under Section 230 of the Communications  Decency Act, intermediaries are not liable for third party content but  that doesn’t apply to IP,” he added.&lt;br /&gt; &lt;br /&gt; The Manila Principles have two main targets: Governments and  intermediaries themselves. The coalition, led by EFF, will be  approaching governments to present the document and discuss the  recommendations on how best to establish an intermediary liability  regime.&lt;br /&gt; &lt;br /&gt; This includes immunising intermediaries from liability and requiring a court order before any content can be taken down.&lt;br /&gt; &lt;br /&gt; With intermediaries, the list includes companies such as Facebook,  Twitter and Google, to discuss establishing transparency, responsibility  and accountability in any actions taken.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We recognise that a lot of the time, intermediaries are not waiting for  a court order before taking down content, and we’re telling them to  avoid removing content unless there is a sufficiently good reason and  users have been notified and presented that reason,” said Malcolm.&lt;br /&gt; &lt;br /&gt; The overall aim with the Manila Principles is to influence policy changes for the better.&lt;br /&gt; &lt;br /&gt; Malcolm pointed out that by coincidence, some encouraging developments  have taken place in India. On the same day the principles were released,  the &lt;a href="http://time.com/3755743/india-law-free-speech-section-66a-struck-down/" target="_blank"&gt;Indian Supreme Court struck down&lt;/a&gt; the notorious Section 66A of the country’s Information Technology Act.&lt;br /&gt; &lt;br /&gt; Since 2009, the law had allowed both criminal charges against users and  the removal of content by intermediaries based on vague allegations that  the content was “grossly offensive or has menacing character,” or that  false information was posted “for the purpose of causing annoyance,  inconvenience, danger, obstruction, insult, injury, criminal  intimidation, enmity, hatred or ill will.”&lt;br /&gt; &lt;br /&gt; Calling it a “landmark decision”, Malcolm noted that the case shows why  the establishment and promotion of the Manila Principles are important.&lt;br /&gt; &lt;br /&gt; “Not only is the potential overreach of this provision obvious on its  face, but it was, in practice, misused to quell legitimate discussion  online, including in the case of the plaintiffs in that case – two young  women, one of whom made an innocuous Facebook post mildly critical of  government officials, and the other who ‘liked’ it,” he said.&lt;br /&gt; &lt;br /&gt; The court however, upheld section 69A of the Act, which allows the  Government to block online content; and Section 79(3), which makes  intermediaries such as YouTube or Facebook liable for not complying with  government orders for censorship of content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Gabey Goh reports from RightsCon in Manila at the kind invitation of the South-East Asian Press Alliance or &lt;a href="http://www.seapa.org/" target="_blank"&gt;Seapa&lt;/a&gt;.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet'&gt;https://cis-india.org/internet-governance/news/digital-news-asia-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-27T01:06:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/finalpaper">
    <title>The Making of an Asian City</title>
    <link>https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/finalpaper</link>
    <description>
        &lt;b&gt;Nishant Shah attended the conference on 'Pluralism in Asia: Asserting Transnational Identities, Politics, and Perspectives' organised by the Asia Scholarship Foundation, in Bangkok, where he presented the final paper based on his work in Shanghai. The paper, titled 'The Making of an Asian City', consolidates the different case studies and stories collected in this blog, in order to make a larger analyses about questions of cultural production, political interventions and the invisible processes that are a part of the IT Cities. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p align="center" style="text-align: center;"&gt;&amp;nbsp;&lt;strong&gt;The
Promise of Invisibility: The Making of an Asian IT City&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;
This paper understands that in emerging Asian contexts, the proliferation and adoption
of Internet technologies leads to two distinct changes in the material
(re)construction of the city:&lt;/p&gt;
&lt;p class="MsoListParagraphCxSpFirst"&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;Built Form of the City:&lt;/em&gt;
The physical and material aspects of the city are restructured, redesigned and
realigned to house the infrastructure of Internet Technology economies.&amp;nbsp;&lt;/p&gt;
&lt;p class="MsoListParagraphCxSpLast"&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;em&gt;Governance and Administration&lt;/em&gt;:
The technologies of governance (and also, the governance of technologies) that reconfigure
the city for better control, regulation and containment of the subjects of the
state.&lt;/p&gt;
&lt;p&gt;These
changes are articulated and understood, in contemporary scholarship and discourse,
through the tropes of Access and Transparency, which propose Technology as
neutral. These studies also locate technology as outside of the changing
socio-political transformations that the city undergoes in its attempt to
emerge as an IT City. The framework, by contextualising technology differently
– in larger narratives of continuity and disruption – opens up a dialogue
between cybercultures and social sciences to look at conditions of change It
also shows how the It demonstrates how such an approach to technology studies
enables new and nuanced forms of social sciences inquiry into processes like
Dislocation and Migration, which have never addressed the technology question
as central to the phenomena.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The 21&lt;sup&gt;st&lt;/sup&gt; Century has seen accelerated
urbanisation and spatial restructuration of cities in emerging information
societies around the world. These cities are created as global hubs that shall
not only house the Information and Communication Technology (ICT)
infrastructure, but also embody the aesthetics, politics, practices and
lifestyles that the global cultural revolutions are bringing in. The
technologies are significantly involved in the production of the dominant, the
hegemonic and the coercive, all under the rubric of economic growth and development,
and have affected domains of life, labour and language (Foucault,1998) in
different contexts. It is easy to trace the ways in which lifestyle, cultural
expression (Bagga, 2005), texture of social interaction and mobilisation, and
political and administrative reorganisation (Roy, 2005) have changed in
emerging contexts like India and China.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The efforts at creating
‘global countries’ (Kalam, 2004) that can harness the powers of ICT, have lead
to three distinct forms of changes. These changes can be seen in the built form
of the city, in structures of governance and administration, and in attitudes
and Imagination of technologies as they emerge in popular discourse and
cultural production. Each of these changes is articulated and explained through
the tropes of Transparency and Access. The paper has a specific interest in
looking at sites of dislocation and migration, to illustrate the arguments it
seeks to make. The paper relies on secondary and tertiary literature (often in
translation), unstructured interviews and participant observation to make an
argument about how the aesthetics, mechanics and political &lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
imaginaries of technology are a part of the physically changing and
transforming IT cities in Asia. In order to make the argument, however, a brief
context that explains the material signification of these three kinds of
changes, is necessary to be explicated.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;Beyond the Blogosphere&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;There has been an equal amount of optimism and
scepticism when it comes to talking about the new public spheres that emerge
with the Internet. Clubbed under the short-hand ‘Blogosphere’, both the
evangelists and the critics of the blogosphere, have explored the Habermassian
notion of the engaging public that is crafted with the emergence of new
technologies of literacy, expression and participation. In many ways, the
governance structures that have been discussed earlier, also endorse the
positions taken by these interlocutors. However, much of the discourse,
understands the blogosphere as contained in the digital domains. While a
cause-and-effect model is often posited, the chief interest and focus remains
on the new public, new voices and new spaces within the virtualities of the
World Wide Web. This paper challenges such narrow definitions of the public
sphere, and in fact, goes back to Habermass to locate technologies and public
spaces within a certain historical context. In fact, this paper proposes that
the increasing need for the faith in the blogosphere and the clamour that
surrounds it is symptomatic of how the physical and built public spaces, in
most Asian IT cities, is slowly diminishing.&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;In Shanghai, it is the loss of a political public
space of socialist capital and industry that marks the beginning of this
disappearance. 20 years ago, the announcer on every passenger train entering
Shanghai would introduce the city as “the largest industrial city in China.”
When W. E. B. Du Bois, an African-American writer, visited Shanghai in 1959, he
was particularly invited to visit the balcony of Shanghai Mansion, which sits
at the mouth of the Suzhou River and was the tallest building of its time, to
catch a bird’s eye view of the new urban socialist landscape and the
innumerable factory chimneys that speared the sky (Zhang, 2002).&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Indeed,
an abundant number of factories, warehouses and dockyards cropped up in the
three decades after 1950, and, together with the existing industrial
constructions, made Shanghai a “new metropolis.” Some of them were clustered in
suburban areas, more were scattered in the city area. Some were even squeezed
into &lt;em&gt;Longtangs&lt;/em&gt; (the narrow alleyways
of old Shanghai). The industrial constructions include not only factory
buildings but also workers’ residential buildings in factory-concentrated
areas. The workers’ residential buildings were targeted primarily at the senior
or skilled workers among the industrial population. Life in the residential
buildings became an extension of factory life since neighbours were most
probably co-workers in the same factory. It is precisely the great number of
old and new industrial constructions and the rhythmic life going on in them
that composed the socialist industrial space of Shanghai. Needless to say, it
was the fastest growing space in the forty years after 1949.&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;However, nine out of ten such spaces have been wiped
out during the fifteen-year urban renewal project, which is perhaps embodied in
the restructuring of the Bund as a space of tourist attraction, and eventually
the building of the Pudong skyline that has now become the iconic face of the
city (Yatsko, 1996, pp 59).&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
Factories—let alone warehouses—within the Inner Ring Road have either closed
down or been removed. With the closing of the factories, the workers also have
no place to work anymore. Dr. Wang XiaoMing, in his essay on the changing
public space mentions how, once the factory he worked in “had its signboard
removed in 1997, the workers have no place to work anymore. The inhabitants of
Caoyang New Village have thrown away the signboard off the gate a long time ago
and could barely remember that the place was once called the “Workers New
Village.” Large factories located on the outskirts of the city are mostly shut
down and the places are as quiet as cemeteries” (forthcoming, 2010).&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;As Americanised industrial parks sprout up in places
such as the Pudong District of Shanghai, and Kunshan and Suzhou to the north of
Shanghai, the socialist industrial space is shrinking rapidly both within and
without Shanghai. Another space that has significantly diminished is the public
political space. One of the most important requirements socialism places on
urban space is to be able to facilitate large-scale political rallies and
parades (Kewen 2006 and Liang 1959).&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;Therefore, apart from industrial constructions, the
most eye-catching constructions in Shanghai’s new urban constructions from the
1950s to the 1960s were squares and large meeting halls, which include the People’s
Square, the Sino-Russian Friendship Building, the Cultural Plaza, and so on.&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
Moreover, government agencies of all levels and factories endeavoured to build
conference halls of various sizes for political meetings by transforming
theatre halls or building new ones. In the past, tens of thousands of people
have paraded down the People’s Square to pay tribute to the officials perched
high above on reviewing stands. People rallying in various meeting halls,
changing slogans to express joy, and echoing the instructions from the speakers
on stage, were frequent occurrences. During the Cultural Revolution, the Rebels
staged the final resistance here; in the late 1980s, fervent university
students had swarmed into People’s Square to turn it into a place of revelry (Feuchtwang,
2004).&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;In the blink of an eye, these histories have faded
from the public memory and been completely erased from the city’s architectural
space. Sino-Russia Friendship Building is renamed Shanghai Exhibition Center,
which hosts a constant blur of Expos. After repeated segmentation, People’s
Square is now only a nominal square with a long and narrow driveway and most of
its space has been occupied by new buildings such as the majestic Shanghai
Grand Theatre, the Shanghai Museum, the sunken commercial street and a parking
lot. Cultural Plaza was first transformed into a large flower market which was
later torn down and pushed to a corner to make way for the new “Music Plaza.”
With mass meetings completely eradicated from the life of Shanghai’s residents,
the numerous assembly halls and meeting places of various sizes have naturally
been restructures for other purposes. People participate with zeal in large
assemblies such as concerts, performance competitions, and so on, which have nothing
to do with public politics. It is even possible to say that the audience’s
shrieks in the stadium symbolize the massive decrease of the public political
space in both architectural and spiritual sense (Tang, 2009, pp 327).&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;Another cluster of spaces that have significantly
disappeared are the gossip centres concentrated in areas such as the mouth of
NongTang, Lao Hu Zhao &lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;,
variety store and lane. It is a cultural given that the Shanghainese like to
strike up a conversation with strangers and to engage in gossip; this is indeed
one of the city’s hallmarks. The Shanghainese can always spare time for gossip:
no matter how busy the atmosphere is, there are always some people who loiter
around with hands in pockets; even the working class who work from dawn to dusk
like to exchange a few words with their neighbours after work. It so happened
that the living space was very cramped for the Shanghainese after the 1950s.&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; The
rich can idle away their time in places such as cinemas whereas the low-income
people can only manage to find a free space of leisure near their residences.
The first choice is the mouth of NongTang adjacent to the footpath, from which
all the comings and goings of residents and the traffics on the streets could
be perceived. There will always be a Lao Hu Zhao near the mouth of a big
NongTang, where you can sit for a whole afternoon and exchange hearsays with
neighbours coming for hot water over a cup of tea; or there is a family-run
variety store whose female boss is quite fond of trading rumours and gossip
with customers across the narrow counter. In times of local or national crises,
this is always the first place where the news is spread and gets distorted.&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;Things have now changed. Lao Huo Zhaos are gone.
Variety stores are quickly replaced by different kinds of convenience stores
(Huang, 2004, pp 49-50). Although many similar or even smaller family-run
variety stores are opened at the newly-formed district bordering the city, a
stable communication space cannot form in these stores since the male or female
boss is mostly “non-native population”&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;, who
not only is unable to blend in with the local residents but also may move away
at any time. Although being one of the hallmarks of old Shanghai houses, the
nongtangs have been pulled down in large numbers. Those narrow, winding streets
have been either diverted, or straightened and widened. Shabby houses on both
sides of the streets have disappeared. Also gone are the hustle and bustle, the
interfusion of public and private space, and street gossips, which have been
replaced by heavy traffic with exhaust gas and noise. With the increasingly
neat arrangement of construction space within the city, the influx of transient
population, residents increasingly accustomed to shutting doors to the world and
to their neighbours, the overwhelming clamour in the media, and the young
people’s addiction to internet and game bars, the space where rumours and
gossips are spread via mouths and pointing fingers is naturally contracted
(Yeung, 1996, pp. 78-84).&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;These old spaces of early Shanghainese modernity are
quickly replaced by three new built forms. The first are the various
above-ground, underground, and overhead expressways. Intersecting and
intertwining together, they make the whole city look as if it were trapped in a
python’s nest. The second thing that comes to the mind is commercial space.&lt;a name="_ednref9" href="#_edn9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
Shopping malls&lt;a name="_ednref10" href="#_edn10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
line both the sides of the streets in downtown Shanghai, whereas hypermarkets
cluster at the periphery of the city (Diao, 2006)&lt;a name="_ednref11" href="#_edn11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;. With
the speedy expansion of space (Li, 2006)&lt;a name="_ednref12" href="#_edn12"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;, the
style of constructions are increasingly uniform: nearly all of them name
themselves “squares”;&amp;nbsp; shopping malls are
lined with chain stores on every level; chain supermarkets create mazes of
different sizes with dense goods shelves; in office buildings, glass doors and
plastic boards partition the office into many honeycomb-like cubicles, making
the people working in them increasingly look like worker bees; the hospitality
industry is overwhelmed with chain hotels of similar facilities and styles,
even customers often forget which hotel they stay in last time (Fulong, 1999).
The accelerated standardization process in Shanghai’s space highlights a
tendency to obtain the standard outlook of the imagined “international
metropolis” and an urgency to erase the distinct features inherited from the
past.&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;Thirdly, the office space of governments and state
monopolies expands in a unique sense: although the floor area has increased
significantly&lt;a name="_ednref13" href="#_edn13"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xiii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;,
it is the upgrading and the move towards luxury that marks the change. Since
the early 1990s, luxurious office buildings with halls paved with marble floor,
central air conditioning system, shiny wood floors, CEO office suite with
separate bathroom, were built first by banks, then revenue departments,
telecommunication agencies, newspapers offices, television stations, courts,
and police stations of different levels, and at last governments of municipal,
district and even lower levels.&lt;a name="_ednref14" href="#_edn14"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xiv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Not
only the connotation of “work” has been enriched, but also other business
spaces outside the office have expanded with restaurants, coffee bars, official
reception hotels, training centers and vacation centers located in the office
buildings or on the outskirts of town or other cities (Leaf, 1997, pp. 156-159).
&amp;nbsp;&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;The changes in the built form of the new IT City that
has emerged, are particularly important because they signal the ways in which
certain kinds of populations are made redundant in the city as it grows
physically more hostile to their life in it. The erasure of histories, of
public spaces, of spaces of political negotiation is symptomatic of the new
ideologies, policies and dreams that Shanghai-Pudong embody. Most of the
studies that look at these changes, concentrate only on the physical and
material aspects of it, and ignore the aesthetics, politics, and changes that
Internet technologies are bringing in, not only in the imagination of what
constitutes a city, but also in the material and lived practices of the people
in it (Appadurai, 1990). Government policies that ignore technologies, come to
dead-ends in their intervention, as they fail to recognise the new geographies
and terrains that the technology users navigate through. Interventions by the
Development Sector or the Civil Society Movements often fail to recognise the
structures of governance as informed by internet technologies, thus
perpetrating the very evils that they fight against. Dislocation and Migration,
which are complex issues, get reduced to only geography and physical places –
leading to a simplified structure of rehabilitation, largely propelled by the
vocabulary of the market and the state. Remunerations, economic rights and
livelihood are the only questions addressed. In the process Community rights,
structures of communication and networking, relationships within families and
societies, ineffable ties and bonds that keep the communities coherent – these
affective categories which are dislocated and forced to migrate because of the
presence of technologies, fail to register either in the scholarship or in the
practices in these areas. &lt;strong&gt;&lt;u&gt;&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p class="MsoBodyTextIndent"&gt;This is where the blogosphere needs to be located – as
not merely producing a new space of engagement, but helping in recovering the
lost spaces of public participation and community communication. The blogosphere
is not merely the invention of a technology marked digital native or the
discovery of groups seeking alternative narratives. It is recognition of the
fact that the regular mainstream public discourse, interacts with the social
transformations and politics of our time and depend on the sustenance of public
spheres for the socio-cultural categories like communities, neighbourhoods,
public space, etc. to survive. The blogosphere, in the quickly changing,
hyper-real landscape of Shanghai-Pudong’s geography is the new variety store,
the new location for the Lao Hu Zhao and the space that the labyrinthine
networks of nongtangs are mapped on.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;e-Governance and its discontents&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The change in the
physical reorganisation of the city is not only a pragmatic decision. This disappearance of the public
space of gossip, information dissemination and distortion, of informal
conversations and deliberations tied in closely to the three levels of
government in Shanghai – district government, street office and alley office –
being able to increasingly control the leisure life of the Shanghainese through
administrative planning and organisation (Zhang, 2004). There is a clear link
between the government’s imagination of its own territory, the notion of the
citizen who is to occupy these spaces, and the material practices that happen
in these technology marked spaces (Feuchtwang, 2004). While it is an
acknowledged fact that the Chinese government does not follow the structures
and paradigms that a North-Western Democratic Liberal ideology that has
produced the category of Nation-State in most contemporary discourse, there are
still two specific forms of technology inflected governance structures which
China seems to share with other contexts which might be geo-politically different.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The e-Governance models,
which find resonances in most emerging contexts in the Global South, seem to
develop two simultaneous and often ironically related approaches towards
citizenship and administration, especially in the context of China. With its
already forked governance policies, which treat HongKong – its colonial success
story – differently from the rest of Mainland China (and the added complication
of Taiwan) the governance structures are marked by technology in significant
ways. These structures are suffused with irony, because of the tropes of
transparency and invisibility that they use to articulate their rationale and
processes.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first is the
approach of Rural Development through ICT networks, positing an access based
model of participatory citizenship (Tarlo, 2003) and continuing the Development
rhetoric of uplift and reform of the deprived citizen. This particular kind of
governance structure re-imagines the beneficiary of state/government processes
as existing in a condition of invisibility, and outside of the folds of
technology. The particular emphasis on e-government, while it is located in the
urban settings, is actually intended for reaching the citizen in the remote
parts of the country, who does not have any engagement or direct interaction
with processes of governance. Despite China’s three tiered government
structure, the imagination of e-governance hold a strong currency because it
makes visible, the people, practices and communities which otherwise exist in
the subliminal and grey areas which were hitherto not in the focus of the
government. Fuelling the rhetoric of e-government is the premium on information
dissemination and transparent administration in order to enhance the domains of
life and labour in the rural parts of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This approach draws its
strength from the Development agenda of reform and uplift as it markedly
emphasises the distance between the ‘haves and the have-nots’. However, the
valourisation of transparency goes hand-in-glove with the production of the
invisible (but cognisable) citizen who needs to be reproduced within the
paradigms of technology. The peasant, who has been at the back-bone of China’s
socialist political ideology, under this new articulation of transparency,
becomes invisible – robbed of the historicity, the cultural iconoclasms and the
empowerment that such policies earlier provided. Instead, the peasant becomes a
worker who needs to be rehabilitated into the changing geographies of Pudong,
the new IT city that requires a worker equipped with new skills and lifestyles.
This approach draws its strength from the Developmental agenda of reform and
uplift as it markedly emphasises the distance between the ‘haves and the
have-nots’ (Jaswal, 2005) and offers ICT enabled development as the panacea for
the problems of unemployment, illiteracy, chronic poverty, etc.&amp;nbsp; This approach is made manifest in the
establishment of Telecentre kiosks, rural BPOs, e-literacy schools and mobile
vans, setting up of mobile and internet technology centres, digitisation of the
state’s resources, digital access centres to important data-sets, initiation of
projects like ‘One Home One Computer’, the e-literacy campaigns, and the
building of special economic zones (SEZ) and IT Corridors under the aegis of
e-governance (Hawks, 2009).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second approach is
invested in the massive restructuration of the urban spaces to create
infrastructure that attracts foreign investment and ICT enabled multinational
corporations. This approach uses the language of creating a S.M.A.R.T. (Smart,
Moral, Accountable, Responsive, Transparent) State, modelling the new spaces
and politics around the new models of capital modernity (Appadurai, 1996) like
Singapore, Shanghai, Tokyo and Taipei. This model is nuanced by a vocabulary of
‘global citizenship and globalised economy’ (Abbas, 1997), glorifying the new
economic opportunities, flows of foreign capital, enhancement of lifestyle, and
the promise of hypervisibility in the globalisation networks. The building up
of network-neighbourhoods (Doheny-Farina, 1996), spaces of incessant commercial
consumption, post modern digitalised aesthetics of living and housing,
(Mitchell, 1996) infrastructure for ICT augmented lifestyles, spaces for
sculpting hyperspatial bodies, and recreational zones that offer apolitical
aesthetics of living (Chua, 2000), are all a part of this restructuration.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Contemporary analyses
that deploy both these approaches are often contained within the language and
the universes created by these approaches. Studies on e-governance concentrate
on the processes of infrastructure development, the economic parameters of
efficient administration, questions of rights and transparency and impact
analyses of the public private partnership which is at the basis of most e-governance
projects in India. Urban restructuration has found critique from disciplines
that focus largely upon the promissory implementation of State policies, on the
imbalance in the urban eco-systems, the new patterns of migration in the city,
the cultural and class mobility that the new economies offer, and the emergence
of the new middle class that becomes the figurehead of the IT revolution
(Huang, 2005). Most studies look upon technology as incidental or instrumental;
a tool towards an end. The relationship between ICTs and the State, and the
kind of technosocial evolution they produce are generally zones of silence in
most discourse. Both these discourses produce a certain hyper-visual citizen
subject who is either the champion of the new Information societies or the
victim of the digital divide that has ensued.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ICTs are often posited
as neutral and transparent because they allow us to look at these two kinds of
citizenships on the opposite end of the digital spectrum. It can be argued that
the divides of ICTs are transparent and hence it offers clearly defined spaces
of intervention and uplift. The development sector around the world has
accepted this as a given and hence, along with the Governments, they have also
been urging a blanket development of infrastructure of access to technology for
a particular section of the society, in an attempt to ‘cure’ certain long
standing problems. As in the case of India, China is also fuelled by this
transparency rhetoric, which allows for the production of the power-user versus
the un-networked and has pinned its hopes on the transformative powers of
Internet Technologies. With more than two decades of ICT development in the
country, and especially in spaces like Shanghai-Pudong, behind them, China
seems to be facing a moment of crisis. On the one hand is its promotion and
adoption of internet and digital technologies, which encourages younger users
entering in “schools, colleges, universities and workforces to transform the
economic conditions” (Heng, 2006). On the other hand is the imagination of
these IT forces as transgressive, uncontrollable and in need of constant
supervision in order to retain existing government-citizenship relationships
and power structures. In the middle of this crisis, is another factor that the
obvious suspects and users of technology, who are more under the radar, are not
the people who are deploying technologies for political negotiation and using
technology platforms for political mobilisation. Despite the efforts at
green-washing its technologies and the production of the infamous Great
Fire-wall of China, there has been a sustained use of internet technologies for
resistance and subversion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The spaces for
subversion rises from the fact that with the making of the IT city, there has
been a complex phenomenon of dislocation and migration, as several communities
were made redundant in the logic of the IT City and were removed from the city.
Many people from these communities re-entered the city as the new IT workforce
after going through a ‘rehabilitation’ and ‘skill building’ to not only be a
part of the IT labour groups but also to support the IT industry in the
construction of the physical infrastructure. Moreover, there has been a steady
flow of anonymous ‘outsiders’ who have found homes in the older nontangs and
factories, and are in the subliminal zones of regulation. As the city is
re-formed to make these people invisible (Abbas, 1997), their leisure space and
time shrink and they find themselves increasingly forming the new prosumers of internet
in Shanghai. However, in the transparency discourse that unfolds, these
populations remain invisible and find spaces of resistance and political
negotiation that their invisible status provides them. The promise of
Invisibility that treats them as Wetware (the biological combination of a
network consisting of Software and Hardware), allows for hope in the otherwise
diminishing spaces of political articulation in a growing authoritarian regime
in China.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;em&gt;Invisibility, Transparency and the
Internet&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The paper ends by
re-formulating the relationship between the making of an IT City and the way in
which transparency as a rhetoric and technology-as-instrumental method fail to
account for the different kinds of changes that accompany the restructuring of these
cities. On the one hand, there is shrinkage of physical space and built form,
as new forms of technology infrastructure, global lifestyle and late
capitalistic economies expand to fill up the spaces which were earlier
available for political mobilisation, organisation and inhabitation. On the
other, there is a diminishing political landscape, where, with the integration
of the government with the market, there is a tendency to establish larger
regulation and censorship in order to retain the status quo relationship
between the government and the citizen, in the face of massive governance
transition. Both these conditions are produced by the rise and spread of
Information Technologies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the process, there
are also only two kinds of citizenships that are addressed by the e-governance
structures which work on a double edge: Firstly, they make the direct access
(defined either by abundance or lack of access) citizenships hyper-visual,
robbing them of nuances and looking upon them as implicated only in the discursive
practices of Internet technologies. Second, they render invisible, the other
supporting structures in order to highlight and focus on the economic
development and growth propelled by the rise of the IT industries. In other
words, they make the citizens who are central to the discourse, invisible, by
treating them as embodiments of the new economic markets and aspirations,
removing them from their traditional contexts, histories and spaces. Moreover,
they make invisible/transparent, populations who are not marked by the aura of
the Internet technologies, in order to bring into focus, the extraordinary
changes – both in the physical built form as well as in the realms of
governance – that have been initiated and accomplished with the making of the IT
City Shanghai-Pudong.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abbas, Ackbar. 1997. &lt;em&gt;Hong Kong: Culture and
the Politics of Disappearance&lt;/em&gt;. Hong Kong: Hong Kong University press.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Appadurai, Arjun. 1990. "The Coming
Community." In &lt;em&gt;Global Culture&lt;/em&gt;, edited by Michael Featherstone. London:
Sage.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Feuchtwang, Stephen. 2004. &lt;em&gt;Making Place: State Projects, Globalisation
and Local Responses in China&lt;/em&gt;. New York: Routledge Cavendish&lt;/p&gt;
&lt;p&gt;Hawks, F.L. 2009. &lt;em&gt;A
Short History of Shanghai: Being an account of the growth and development of
the&amp;nbsp; international settlement&lt;/em&gt;.
Beijing: China Intercontinental Press.&lt;/p&gt;
&lt;p&gt;Hiibbard, Peter. 2008. The Bund Shanghai : China Faces
the West. Odyssey Books and Guides.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Huang, Tsung-yi Michelle. 2004. &lt;em&gt;Walking Between Slums and Skyscrapers :
Illusions of open space in HK, Tokyo and Shanghai&lt;/em&gt;. Hong Kong: Hong Kong
University Press.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Leaf, Michael. 1998. ‘Urban planning and urban
reality under Chinese economic reforms’, &lt;em&gt;Journal of Planning Education and
Research.&lt;/em&gt; 18(2): 145–153.&lt;/p&gt;
&lt;p&gt;Li,
Heng. 2006. “Behind the Spectacle of Commercial Real Estate,” &lt;em&gt;Xinmin Weekly&lt;/em&gt;, 3rd issue (2006)&lt;/p&gt;
&lt;p&gt;Mirsky, Jonathan. 2008. &lt;em&gt;The Britannica Guide to Modern China : A comprehensive introduction to
the world’s new economic giant&lt;/em&gt;. London: Constable and Robinson Ltd.&lt;/p&gt;
&lt;p&gt;Diao
Wenjun, “Analysis of the Present situation and Development Trend of
Hypermarkets in Shanghai,” &lt;em&gt;Shanghai
Articles&lt;/em&gt;, 3rd issue (2006)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (STSN)
Shanghai Times Square
Newsletter. 2008. Issue No. 4. Shanghai.&lt;/p&gt;
&lt;p&gt;Shu, Kewen. 2006. “the dynastic History of
Tiananmen Square”, &lt;em&gt;Life Week&lt;/em&gt;, Issue 11. 27&lt;sup&gt;th&lt;/sup&gt; March.&lt;/p&gt;
&lt;p&gt;Sicheng, Liang. 1959. “Tiananmen Square”, &lt;em&gt;Architectural
Journal&lt;/em&gt; Issue 9-10. pp. 12.&lt;/p&gt;
&lt;p&gt;SSY
(&lt;em&gt;Shanghai Statistical Yearbook) 1986&lt;/em&gt;,
Shanghai Statistics Bureau, (September, 1986), p18, p412.&lt;/p&gt;
&lt;p&gt;SSY(a)
(shanghai Statistical Yearbook) 2005. Shanghai Statistics Bureau. China
Statistics Press. August 2005.&lt;/p&gt;
&lt;p&gt;Stanat, Michael. 2005. &lt;em&gt;China’s Generation Y: Understanding the Future Leaders of the World’s
Next Superpower&lt;/em&gt;. NY: Homa and Sekey Books.&lt;/p&gt;
&lt;p&gt;Tang, Shih-che. 2009. ‘The club and the carrot of
China’s globalization.’ &lt;em&gt;Inter-Asia
Cultural Studies.&lt;/em&gt; Volume 10, Number 2. Delhi: Routledge Journals.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Wu, Fulong. 1999. ‘The global and local
dimensions of place-making: remaking Shanghai as a world city’. &lt;em&gt;Urban
Studies&lt;/em&gt;, 37(8): 1359–1377.&lt;/p&gt;
&lt;p&gt;Xixian, Xu and Xu JianRong. 2004.&lt;em&gt; A Changing Shanghai.&lt;/em&gt; Shangai: Shanghai People’s Fine Arts
Publishing House.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Yeung, Yue-man. 1996. &lt;em&gt;Shanghai: Transformation and Modernization Under China's Open Policy.&lt;/em&gt;
Shanghai: &lt;span class="addmd"&gt;Chinese University Press.&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Zhang,
Jishun. , “The Linong of Shanghai: the political mobilization of grass-roots
and the trend of national social integration (1950-1955),” &lt;em&gt;Chinese Social Sciences Today&lt;/em&gt;, 2nd issue, 2004&lt;/p&gt;
&lt;p&gt;Zhang,
Xudong. 2002. “The Construct of Shanghai: Criticism of Urban Idols,
Non-mainstream Writing and the Diminishment of Modern Myths” &lt;em&gt;Literary Review&lt;/em&gt;, the 5th edition&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt;
&lt;hr align="left" size="1" width="33%" /&gt;


&lt;div id="edn1"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[i]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; The project wants to emphasize that it is
not attempting a historiography of the building of the IT City of
Shanghai-Pudong. Instead, by drawing selectively, different ways in which the
technology imaginaries (technopolises, intellectual labour, globally homogenous
geographies and time-lines, bodies marked by technology in their material
practices, etc ) of the Internet, find structure and form in the emerging IT
cities in Asia.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn2"&gt;
&lt;p class="MsoEndnoteText"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Zhang Chunqiao, Secretary
of the Culture and Education Department of the Shanghai Municipal
Committee&amp;nbsp; who accompanied DuBois to
Shanghai Mansion, specially mentioned DuBois’ visit in an article entitled “To
Climb the New Summit of Victory.”.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn3"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In 1994, one Shanghai
government officer stated, “the government plans to remove or close down two
thirds of the factories located within [the range of] 106 square kilometers
from the city centre, namely, within the Inner Ring Road.”.&lt;em&gt; &lt;/em&gt;Due to different reasons (one of
the main reasons is the increase of transferee cost because unsolved problems,
such as the proper placement of a large number of former workers, have been
bundled with the factory buildings and factory land), some factories still
remain in their original places, although most of them have already stopped
manufacturing and the workers dismissed. The industrial life/space has
disappeared with the disappearance of the factories. Ruins of this life/space
become some sort of commodity only because the land under the ruins still has
some value.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn4"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[iv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; On the day (1 October
1949) of the founding of the People’s Republic of China, Mao Zedong suggested
rebuilding Tiananmen Square and making it a “grand and magnificent square.” See
(Kewen, 2006). Liang Sicheng, who always insisted on preserving the old Beijing
and opposed massive makeover, finally realized that the makeover was never
about architecture but about politics: “As for the scale of Tiananmen Square …
apart from considering the scale of man as a biological being and the scale of
construction appropriate to the man’s physiology, we should also take into
account the scale for the great collective requested by the political men in
the new society.” Liang, 1959, pp 12).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn5"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[v]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; The People’s Square,
transformed in 1953 from the original racecourse (which was nationalized in
1951 by the Municipal Military Control Commission), surrounded by woods, and
paved with tiled and cemented floor, is the largest public space in Shanghai
and can accommodate over one million people. The Sino-Russian Friendship
Building, which was built in 1955 and was covering an area of 80,000 square
meters, was the city’s largest building after the liberation of Shanghai and
still ranks top in terms of its indoor space in today’s Shanghai. The Cultural
Plaza, transformed in 1952 from the Greyhound Racecourse, had 12,500 seats and
was the largest indoor hall in Shanghai.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn6"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; It is a unique store that
sells boiled water in Shanghai.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn7"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[vii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Shanghai’s housing
shortage started in the early 20th century instead of the 1950s. The living
space within Shanghai city is 16,100,000 square meters in total but 3.9 square
meters per capita. During the 32 years from 1952 to 1985, 21,720,000 square
meters of housing were built within the city and the registered population
increased from 5,300,000 to 6,980,000. The housing shortage was still serious
since by 1985, the living space had only reached 5.4 square meters per capita.
(SSY, 1986). What needs to be clarified is that the statics of 1949 does not
include the shabby slum houses commonly referred to as “gun di long.”&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn8"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn8" href="#_ednref8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[viii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; This is an increasingly popular
new word in Shanghai over the last 20 years, which refers to the people who
come from other provinces, especially the rural areas, and live in Shanghai but
do not have permanent residence in Shanghai. According to the Shanghai
Statistics Bureau’s report on March 2006, the immigrating labor population in
Shanghai was 3,750,000. 2,840,000 of this population is in the manufacturing,
construction, retail, and catering industry and engaged in low-income manual
work. The immigrating population should be over 4 million if the large number
of people (such as those in the household service business) and their children
be taken into calculation.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn9"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn9" href="#_ednref9"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[ix]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; In Shanghai, the floor
area of shops has increased seven-fold from 4,030,000 square meters in 1990 to
2,857,000 square meters in 2004 and that of hotels has increased three-fold
from 6,580,000 square meters in 1990 to 2,204,000 square meters in 2004. The
increase of commercial space is even greater if that of commercial office
buildings is calculated as well. (SSY(a), 2005, pp. 198)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn10"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn10" href="#_ednref10"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[x]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Take the area around
Zhongshan Park for example, although it was one of the earliest developed
leisure areas in Shanghai, there was only one small department store in the
mid-1980s and the retail business developed slowly. However, within these ten
years, with the completion of Zhongshan Park Station along the subway line 2
and light rail line 3, five multi-story shopping malls have been built, all
within a radius of 500 meters. The newest among them is a 58-storey building
with four levels of basement and nine levels of shopping mall.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn11"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn11" href="#_ednref11"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xi]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; By the end of 2005,
hypermarkets measuring over 5000 square meters within Shanghai have reached 97
and 28 more have chosen their locations and would be opened soon. Because of a
large number of hypermarkets and the intense competition brought about, a
considerable number of them mainly profit from land appreciation rather than
from retail.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn12"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn12" href="#_ednref12"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; By the end of 2005, the
commercial real estate in Shanghai has reached a total of 2,900,000 square
meters with 2.6 square meters per capita, far exceeding Hong Kong’s 1.2 square
meters per capita.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn13"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn13" href="#_ednref13"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xiii]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Barely 6 million square
meters in 1990, the floor area of office buildings in Shanghai reached a total
of 4,012,000 square meters in 2004. See &lt;em&gt;Shanghai
Statistical Yearbook 2005&lt;/em&gt;. Edited by Shanghai Statistics Bureau, published
by China Statistics Press in August 2005, p 198. The statistical material on
the increase of floor area of commercial office building cannot be found for
the present. Even if the material were obtained, it would not be enough since a
large area of commercial office building has been rented by many state-owned
monopoly agencies. However, the expansion of government office space is great
even if it take up only one tenth of the space of office buildings.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="edn14"&gt;
&lt;p style="text-align: justify;" class="MsoEndnoteText"&gt;&lt;a name="_edn14" href="#_ednref14"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;[xiv]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Such phenomenon exists
not only in Shanghai but all over the country, especially in cities and towns
of low economic level. The towering and luxurious government, bank, taxation,
and police buildings create an ironic contrast with the low and shabby
constructions close by.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/finalpaper'&gt;https://cis-india.org/research/grants/the-promise-of-invisibility-technology-and-the-city/finalpaper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Shanghai</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Architecture</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Communities</dc:subject>
    

   <dc:date>2012-08-10T08:33:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act">
    <title>The Last Word: Is there a need to review Information Technology Act?</title>
    <link>https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act</link>
    <description>
        &lt;b&gt;Does the high-handed arrest of two young girls mean it's time to review and revise the IT Act?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Aryaman Sundaram, Pavan Duggal, Pranesh Prakash and Ravi Visvesvaraya Prasad took part in a discussion with Karan Thapar on section 66A of the IT Act. This was aired on CNN-IBN on November 20, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash said that it was just not a history of misuse of section 66A of the IT Act because that presumes that the law is otherwise fine and it has just been applied wrongly. This law is fundamentally flawed. It is unconstitutional. It is like a law in which there is a provision on rape, murder, theft, nuisance, everything put together in a single section with the same punishment being given for all of them. This obviously is not good law making but that is exactly what has been done in this case by taking bits from laws in the UK and from elsewhere and mashing them all up into one omnibust gargantuan monster which is unconstitutional.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash also added that the fact is that if you have bad laws they will be used to harass people. Having good law is one part of that. Apart from that there has been also other laws which have been misapplied in this case. In all these recent cases, section 66A of the IT Act wasn't the only provision used. This particular section has been used in conjunction with some other laws. So section 66A of the IT Act independently is not required. There are other laws in the Indian Penal Code and elsewhere which are usually enough to cover all the things that section 66A of the IT Act is right now covering. It is just an add on provision that really can't justify its existence unless it is really reduced in scope.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://ibnlive.in.com/videos/306519/the-last-word-is-there-a-need-to-review-information-technology-act.html"&gt;Watch the full video that was aired on CNN-IBN&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act'&gt;https://cis-india.org/news/ibnlive-videos-november-20-2012-the-last-word-is-there-a-need-to-review-information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-21T12:10:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship">
    <title>The Internet Has a New Standard for Censorship</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship</link>
    <description>
        &lt;b&gt;The introduction of the new 451 HTTP Error Status Code for blocked websites is a big step forward in cataloguing online censorship, especially in a country like India where access to information is routinely restricted.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the Wire on January 29, 2016. The original can be &lt;a class="external-link" href="http://thewire.in/2016/01/29/the-internet-has-a-new-standard-for-censorship-20386/"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ray Bradbury’s dystopian novel Fahrenheit 451 opens with the declaration, “It was a pleasure to burn.” The six unassuming words offer a glimpse into the mindset of the novel’s protagonist, ‘the fireman’ Guy Montag, who burns books. Montag occupies a world of totalitarian state control over the media where learning is suppressed and censorship prevails. The title alludes to the ‘temperature at which book paper catches fire and burns,’ an apt reference to the act of violence committed against citizens through the systematic destruction of literature. It is tempting to think about the novel solely as a story of censorship. It certainly is. But it is also a story about the value of intellectual freedom and the importance of information.&lt;br /&gt;&lt;br /&gt;Published in 1953, Bradbury’s story predates home computers, the Internet, Twitter and Facebook, and yet it anticipates the evolution of these technologies as tools for censorship. When the state seeks to censor speech, they use the most effective and easiest mechanisms available. In Bradbury’s dystopian world, burning books did the trick; in today’s world, governments achieve this by blocking access to information online. The majority of the world’s Internet users encounter censorship even if the contours of control vary depending on the country’s policies and infrastructure.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Online censorship in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India, information access  blockades have become commonplace and are increasingly enforced across  the country for maintaining political stability, for economic &lt;/span&gt;&lt;a href="http://www.indiantelevision.com/regulators/high-court/delhi-hc-restrains-200-websites-from-illegally-showing-balajis-kyaa-kool-hain-hum-3-160123" target="_blank"&gt;&lt;span&gt;reasons&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, in defence of national security or preserving social values. Last week, the Maharashtra Anti-terror Squad &lt;/span&gt;&lt;a href="http://www.abplive.in/india-news/maharashtra-ats-blocks-94-isis-websites-brainwashing-the-youth-280192"&gt;&lt;span&gt;blocked&lt;/span&gt;&lt;/a&gt;&lt;span&gt; 94 websites that were allegedly radicalising the youth to join the  militant group ISIS. Memorably, in 2015 the NDA government’s ham-fisted &lt;/span&gt;&lt;a href="http://thewire.in/2015/08/03/the-government-does-not-want-you-accessing-porn-on-the-internet-anymore-7782/"&gt;&lt;span&gt;attempts&lt;/span&gt;&lt;/a&gt;&lt;span&gt; at enforcing a ban on online pornography resulted in widespread public  outrage. Instead of revoking the ban, the government issued yet another  vaguely worded and in many senses astonishing order. As reported by &lt;/span&gt;&lt;i&gt;&lt;a href="http://www.medianama.com/2015/08/223-porn-india-ban/"&gt;&lt;span&gt;Medianama&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;&lt;span&gt;,  the revised order delegates the responsibility of determining whether  banned websites should remain unavailable to private intermediaries. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The state’s shifting reasons for  blocking access to information is reflective of its tendentious attitude  towards speech and expression. Free speech in India is messily  contested and normally, the role of the judiciary acts as a check on the  executive’s proclivity for banning. For instance, in 2010 the Supreme  Court &lt;/span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/Supreme-Court-lifts-ban-on-James-Laines-book-on-Shivaji/articleshow/6148410.cms"&gt;&lt;span&gt;upheld&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the Maharashtra High Court’s decision to revoke the ban on the book on  Shivaji by American author James Laine, which, according to the state  government, contained material promoting social enmity. However, in the  context of communications technology the traditional role of courts is  increasingly being passed on to private intermediaries. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The delegation of authority is  evident in the government notifying intermediaries to proactively filter  content for ‘child pornography’ in the revised &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/dot-morality-block-order-2015-07-31/view"&gt;&lt;span&gt;order&lt;/span&gt;&lt;/a&gt;&lt;span&gt; issued to deal with websites blocked as result of its crackdown on  pornography. Such screening and filtering requires intermediaries to  make a determination on the legality of content in order to avoid direct  liability. As international best practices such as the &lt;/span&gt;&lt;a href="https://www.manilaprinciples.org/"&gt;&lt;span&gt;Manila Principles on Intermediary Liability&lt;/span&gt;&lt;/a&gt; &lt;span&gt;point  out, such screening is a slow process and costly and  intermediaries  are incentivised to simply limit access to information. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;Blocking procedures and secrecy&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The constitutional validity of Section 69A of the Information Technology Act, 2008 which grants power to the executive to block access to information unchecked, and in secrecy was challenged in Shreya Singhal v. Union of India. Curiously, the Supreme Court upheld S69A reasoning that the provisions were narrowly-drawn with adequate safeguards and noted that any procedural inconsistencies may be challenged through writ petitions under Article 226 of the Constitution. Unfortunately as past instances of blocking under S69A reveal the provisions are littered with procedural deficiencies, amplified manifold by the authorities responsible for interpreting and implementing the orders.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Problematically, an &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt;&lt;span&gt;opaque&lt;/span&gt;&lt;/a&gt;&lt;span&gt; confidentiality criteria built into the blocking rules mandates secrecy  in requests and recommendations for blocking and places written orders  outside the purview of public scrutiny. As there are no comprehensive  list of blocked websites or of the legal orders, the public has to rely  on ISPs leaking orders, or media reports to understand the censorship  regime in India. RTI applications requesting further information on the  implementation of these safeguards have at best provided&lt;/span&gt; &lt;a href="http://cis-india.org/internet-governance/blog/response-deity.clarifying-procedures-for-blocking.pdf"&gt;&lt;span&gt;incomplete&lt;/span&gt;&lt;/a&gt;&lt;span&gt; information. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Historically, the courts in India have &lt;/span&gt;&lt;a href="http://www.livemint.com/Politics/hDIjjunGikWywOgSRiM7NP/SC-has-set-a-high-threshold-for-tolerance-Lawrence-Liang.html"&gt;&lt;span&gt;held&lt;/span&gt;&lt;/a&gt;&lt;span&gt; that Article 19(1)(a) of the Constitution of India is as much about the  right to receive information as it is to disseminate, and when there is  a chilling effect on speech, it also violates the right to receive  information. Therefore, if a website is blocked citizens have a  constitutional right to know the legal grounds on which access is being  restricted. Just like the government announces and clarifies the grounds  when banning a book, users have a right to know the grounds for  restrictions on their speech online. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Unfortunately, under the&lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/deity-says-143-urls-blocked-in-2015"&gt; &lt;span&gt;present&lt;/span&gt;&lt;/a&gt;&lt;span&gt; blocking regime in India there is no easy way for a service provider to  comply with a blocking order while also notifying users that censorship  has taken place. The ‘&lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;&lt;span&gt;Blocking Rules&lt;/span&gt;&lt;/a&gt;&lt;span&gt;’ require notice “person &lt;/span&gt;&lt;span&gt;or&lt;/span&gt;&lt;span&gt; intermediary” thus implying that notice may be sent to either the  originator or the intermediary. Further, the confidentiality clause &lt;/span&gt;&lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt;&lt;span&gt;raises&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the presumption that nobody beyond the intermediaries ought to know about a block. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Naturally, intermediaries interested in self-preservation and avoiding conflict with the government become complicit in maintaining secrecy in blocking orders. As a result, it is often difficult to determine why content is inaccessible and users often mistake censorship for technical problem in accessing content. Consequently, pursuing legal recourse or trying to hold the government accountable for their censorious activity becomes a challenge. In failing to consider the constitutional merits of the confidentiality clause, the Supreme Court has shied away from addressing the over-broad reach of the executive. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Secrecy in removing or blocking access is a global problem that places limits on the transparency expected from ISPs. Across &lt;/span&gt;&lt;a href="https://books.google.co.in/books?id=s1LBBwAAQBAJ&amp;amp;pg=PA88&amp;amp;lpg=PA88&amp;amp;dq=transparency+and+blocking+orders&amp;amp;source=bl&amp;amp;ots=8kJ5LNJU5s&amp;amp;sig=gB9E01_gQ3QsjwFtnpa5KdIL8oA&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwirzr7ZlMzKAhXEt44KHdxkBxQQ6AEIOzAF#v=onepage&amp;amp;q=transparency%20and%20blocking%20orders&amp;amp;f=false"&gt;&lt;span&gt;many&lt;/span&gt;&lt;/a&gt;&lt;span&gt; jurisdictions intermediaries are legally &lt;/span&gt;&lt;a href="https://books.google.co.in/books?id=s1LBBwAAQBAJ&amp;amp;pg=PA88&amp;amp;lpg=PA88&amp;amp;dq=transparency+and+blocking+orders&amp;amp;source=bl&amp;amp;ots=8kJ5LNJU5s&amp;amp;sig=gB9E01_gQ3QsjwFtnpa5KdIL8oA&amp;amp;hl=en&amp;amp;sa=X&amp;amp;ved=0ahUKEwirzr7ZlMzKAhXEt44KHdxkBxQQ6AEIOzAF#v=onepage&amp;amp;q=transparency%20and%20blocking%20orders&amp;amp;f=false"&gt;&lt;span&gt;prohibited&lt;/span&gt;&lt;/a&gt;&lt;span&gt; from publicising filtering orders as well as information relating to  content or service restrictions. For example in United Kingdom, ISPs are  prohibited from revealing blocking orders related to terrorism and  surveillance. In South Korea, the &lt;/span&gt;&lt;a href="http://www.singo.or.kr/eng/01_introduction/introduction.php"&gt;&lt;span&gt;Korean Communications Standards Commission&lt;/span&gt;&lt;/a&gt;&lt;span&gt; holds public meetings that are open to the public. However, the sheer v&lt;/span&gt;&lt;a href="https://www.eff.org/deeplinks/2011/08/south-korea-only-thing-worse-online-censorship"&gt;&lt;span&gt;olume&lt;/span&gt;&lt;/a&gt;&lt;span&gt; of censorship (i.e. close to 10,000 URLs a month) makes it &lt;/span&gt;&lt;a href="https://www.eff.org/deeplinks/2011/08/south-korea-only-thing-worse-online-censorship"&gt;&lt;span&gt;unwieldy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; for public oversight. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As the Manila Principles &lt;/span&gt;&lt;a href="https://www.eff.org/files/2015/07/08/manila_principles_background_paper.pdf"&gt;&lt;span&gt;note&lt;/span&gt;&lt;/a&gt;&lt;span&gt;,  providing users with an explanation and reasons for placing  restrictions on their speech and expression increases civic engagement.  Transparency standards will empower citizens to demand that companies  and governments they interact with are more accountable when it comes to  content regulation. It is worth noting, for conduits as opposed to  content hosts, it may not always be technically feasible for to provide a  notice when content is unavailable due to filtering. A new standard  helps improve transparency standards for network level intermediaries  and for websites bound by confidentiality requirements. The recently  introduced HTTP code for errors is a critical step forward in  cataloguing censorship on the Internet. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;A standardised code for censorship&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On December 21, 2015, the Internet Engineering Standards Group (IESG) which is the organisation responsible for reviewing and updating the internet’s operating standards approved the publication of 451-’An HTTP Status Code to Report Legal Obstacles’. The code provides intermediaries a standardised way to notify users know when a website is unavailable following a legal order. Publishing the code allows intermediaries to be transparent about their compliance with court and executive orders across jurisdictions and is a huge step forward for capturing online censorship. HTTP code 451 was introduced by software engineer Tim Bray and the code’s name is an homage to Bradbury’s novel Fahrenheit 451. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Bray began developing the code after  being inspired by a blog post by Terence Eden calling for a  censorship  error code. The code’s official status comes after two years of  discussions within the technical community and is a result of  campaigning from transparency and civil society advocates who have been  pushing for clearer labelling of internet censorship. Initially, the  code received pushback from within the technical community for reasons  enumerated by Mark Nottingham, Chair of the IETF HTTP Working Group in  his &lt;/span&gt;&lt;a href="https://www.mnot.net/blog/2015/12/18/451"&gt;&lt;span&gt;blog&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.  However, soon sites began using the code on an experimental and  unsanctioned basis and faced with increasing demand for and feedback,  the code was accepted. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The HTTP code 451 works as a  machine-readable flag and has immense potential as a tool for  organisations and users who want to quantify and understand censorship  on the internet. Cataloguing online censorship is a challenging,  time-consuming and expensive task. The HTTP code 451 circumvents  confidentiality obligations built into blocking or licensing regimes and  reduces the cost of accessing blocking orders. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The code creates a distinction  between websites blocked following a court or an executive order, and  when information is inaccessible due to technical errors. If implemented  widely, Bray’s new code will help &lt;/span&gt;&lt;a href="http://www.theverge.com/2015/12/21/10632678/http-status-code-451-censorship-tim-bray"&gt;&lt;span&gt;prevent&lt;/span&gt;&lt;/a&gt;&lt;span&gt; confusion around blocked sites. The code addresses the issue of the ISP’s misleading and inaccurate usage of &lt;/span&gt;&lt;a href="https://en.wikipedia.org/wiki/HTTP_403"&gt;&lt;span&gt;Error 403&lt;/span&gt;&lt;/a&gt;&lt;span&gt; ‘Forbidden’ (to indicate that the server can be reached and understood  the request, but refuses to take any further action) or 404 ‘&lt;/span&gt;&lt;a href="https://en.wikipedia.org/wiki/HTTP_404"&gt;&lt;span&gt;Not Found&lt;/span&gt;&lt;/a&gt;&lt;span&gt;’ (to indicate that the requested resource could not be found but may be available again in the future). &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Adoption of the new standard is  optional, though at present there are no laws in India that prevent  intermediaries doing so. Implementing a standardised machine-readable  flag for censorship will go a long way in bolstering the accountability  of ISPs that have in the &lt;/span&gt;&lt;a href="http://www.medianama.com/2014/12/223-india-blocks-imgur/"&gt;&lt;span&gt;past&lt;/span&gt;&lt;/a&gt;&lt;span&gt; targeted an entire domain instead of the specified URL. Adoption of the  standard by ISPs will also improve the understanding of the burden  imposed on intermediaries for censoring and filtering content as  presently, there is no clarity on what constitutes compliance.  Of  course, censorious governments may &lt;/span&gt;&lt;a href="https://nakedsecurity.sophos.com/2015/12/23/welcome-to-http-error-code-451-unavailable-for-legal-reasons/"&gt;&lt;span&gt;prohibit&lt;/span&gt;&lt;/a&gt;&lt;span&gt; the use of the code, for example by issuing an order that specifies not  only that a page be blocked, but also precisely which HTTP return code  should be used. Though such sanctions should be &lt;/span&gt;&lt;a href="https://cdt.org/blog/censorship-transparency-comes-to-the-web/"&gt;&lt;span&gt;viewed&lt;/span&gt;&lt;/a&gt;&lt;span&gt; as evidence of systematic rights violation and totalitarian regimes. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India where access to software code repositories such as Github and Sourceforge are routinely &lt;/span&gt;&lt;span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf"&gt;restricted&lt;/a&gt;,&lt;/span&gt;&lt;span&gt; the need for such code is obvious. The use of the code will improve  confidence in blocking practices, allowing  users to understand the  grounds on which their right to information is being restricted.  Improving transparency around censorship is the only way to build trust  between the government and its citizens about the laws and policies  applicable to internet content.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship'&gt;https://cis-india.org/internet-governance/blog/the-wire-jyoti-panday-january-29-2016-internet-has-a-new-standard-for-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-01-30T09:17:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india">
    <title>The Humpty-Dumpty Censorship of Television in India</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india</link>
    <description>
        &lt;b&gt;The Modi government’s attack on Sathiyam TV is another manifestation of the Indian state’s paranoia of the medium of film and television, and consequently, the irrational controlling impulse of the law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published in the Wire on September 8, 2015 was also mirrored on the website &lt;a class="external-link" href="http://notacoda.net/2015/09/09/the-humpty-dumpty-censorship-of-television-in-india/"&gt;Free Speech/Privacy/Technology&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is tempting to think of the Ministry of Information and Broadcasting’s (MIB) &lt;a href="http://www.livelaw.in/i-b-ministrys-warning-to-channel-for-comments-on-pm-modi-delhi-hc-seeks-reply/" target="_blank"&gt;attack on Sathiyam TV&lt;/a&gt; solely as another authoritarian exhibition of Prime Minister Narendra  Modi’s government’s intolerance of criticism and dissent. It certainly  is. But it is also another manifestation of the Indian state’s paranoia  of the medium of film and television, and consequently, the irrational  controlling impulse of the law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sathiyam TV’s transgressions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sathiyam’s transgressions began more than a year ago, on May 9, 2014,  when it broadcast a preacher saying of an unnamed person: “Oh Lord!  Remove this satanic person from the world!” The preacher also allegedly  claimed this “dreadful person” was threatening Christianity. This, the  MIB reticently claims, “appeared to be targeting a political leader”,  referring presumably to Prime Minister Modi, to “potentially give rise  to a communally sensitive situation and incite the public to violent  tendencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MIB was also offended by a “senior journalist” who, on the same  day, participated in a non-religious news discussion to allegedly claim  Modi “engineered crowds at his rallies” and used “his oratorical skills  to make people believe his false statements”. According to the MIB, this  was defamatory and “appeared to malign and slander the Prime Minister  which was repugnant to (his) esteemed office”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these two incidents, Sathiyam was served a show-cause notice on  16 December 2014 which it responded to the next day, denying the MIB’s  claims. Sathiyam was heard in-person by a committee of bureaucrats on 6  February 2015. On 12 May 2015, the MIB handed Sathiyam an official &lt;a href="http://www.scribd.com/doc/277493911/Warning-Sathiyam-TV-Channel-12th-May-2015" target="_blank"&gt;an official “Warning”&lt;/a&gt; which appears to be unsupported by law. Sathiyam moved the Delhi High Court to challenge this.&lt;/p&gt;
&lt;p&gt;As Sathiyam sought judicial protection, the MIB issued the channel a &lt;a href="http://www.catchnews.com/india-news/now-airing-the-hounding-of-a-tv-channel-for-showing-modi-in-bad-light-1441303238.html" target="_blank"&gt;second warning&lt;/a&gt; August  26, 2016 citing three more objectionable news broadcasts of: a child  being subjected to cruelty by a traditional healer in &lt;a href="http://www.ndtv.com/india-news/newborn-forced-to-walk-by-witch-doctor-in-assam-village-as-fever-cure-764554" target="_blank"&gt;Assam&lt;/a&gt;; a gun murder inside a government hospital in &lt;a href="https://www.youtube.com/watch?v=m2V4B2elMjo" target="_blank"&gt;Madhya Pradesh&lt;/a&gt;; and, a self-immolating man rushing the dais at a BJP rally in &lt;a href="https://www.youtube.com/watch?v=ECDV5AieD4g" target="_blank"&gt;Telangana&lt;/a&gt;. All three news items were carried by other news channels and websites.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governing communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most news providers use multiple media to transmit their content  and suffer from complex and confusing regulation. Cable television is  one such medium, so is the Internet; both media swiftly evolve to follow  technological change. As the law struggles to keep up, governmental  anxiety at the inability to perfectly control this vast field of speech  and expression frequently expresses itself through acts of overreach and  censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the newly-liberalised media landscape of the early 1990s, cable  television sprang up in a legal vacuum. Doordarshan, the sole  broadcaster, flourished in the Centre’s constitutionally-sanctioned  monopoly of broadcasting which was only broken by the Supreme Court in  1995. The same year, Parliament enacted the Cable Television Networks  (Regulation) Act, 1995 (“Cable TV Act”) to create a licence regime to  control cable television channels. The Cable TV Act is supplemented by  the Cable Television Network Rules, 1994 (“Cable Rules”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The state’s disquiet with communications technology is a recurring  motif in modern Indian history. When the first telegraph line was laid  in India, the colonial state was quick to recognize its potential for  transmitting subversive speech and responded with strict controls. The  fourth iteration of the telegraph law represents the colonial  government’s perfection of the architecture of control. This law is the  Indian Telegraph Act, 1885, which continues to dominate communications  governance in India today including, following a directive in 2004,  broadcasting.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague and arbitrary law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cable TV Act requires cable news channels such as Sathiyam to  obey a list of restrictions on content that is contained in the Cable  Rules (“&lt;a href="http://mib.nic.in/WriteReadData/documents/pc1.pdf" target="_blank"&gt;Programme Code&lt;/a&gt;“).  Failure to conform to the Programme Code can result in seizure of  equipment and imprisonment; but, more importantly, creates the momentum  necessary to invoke the broad powers of censorship to ban a programme,  channel, or even the cable operator. But the Programme Code is littered  with vague phrases and undefined terms that can mean anything the  government wants them to mean.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By its first warning of May 12, 2015, the MIB claimed Sathiyam  violated four rules in the Programme Code. These include rule 6(1)(c)  which bans visuals or words “which promote communal attitudes”; rule  6(1)(d) which bans “deliberate, false and suggestive innuendos and  half-truths”; rule 6(1)(e) which bans anything “which promotes  anti-national attitudes”; and, rule 6(1)(i) which bans anything that  “criticises, maligns or slanders any…person or…groups, segments of  social, public and moral life of the country” &lt;i&gt;(sic).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of the Programme Code is no less imprecise. It proscribes  content that “offends against good taste” and “reflects a slandering,  ironical and snobbish attitude” against communities. On the face of it,  several provisions of the Programme Code travel beyond the permissible  restrictions on free speech listed in Article 19(2) of the Constitution  to question their validity. The fiasco of implementing the vague  provisions of the erstwhile section 66A of the Information Technology  Act, 2000 is a recent reminder of the dangers presented by  poorly-drafted censorship law – which is why it was struck down by the  Supreme Court for infringing the right to free speech. The Programme  Code is an older creation, it has simply evaded scrutiny for two  decades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arbitrariness of the Programme Code is amplified manifold by the  authorities responsible for interpreting and implementing it. An  Inter-Ministerial Committee (IMC) of bureaucrats, supposedly a  recommendatory body, interprets the Programme Code before the MIB takes  action against channels. This is an executive power of censorship that  must survive legal and constitutional scrutiny, but has never been  subjected to it. Curiously, the courts have shied away from a proper  analysis of the Programme Code and the IMC.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Judicial challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a single judge of the Delhi High Court in the &lt;a href="http://indiankanoon.org/doc/132453/" target="_blank"&gt;&lt;i&gt;Star India&lt;/i&gt;&lt;/a&gt; case (2011) was asked to examine the legitimacy of the IMC as well as  four separate clauses of the Programme Code including rule 6(1)(i),  which has been invoked against Sathiyam. But the judge neatly  sidestepped the issues. This feat of judicial adroitness was made  possible by the crass indecency of the content in question, which could  be reasonably restricted. Since the show clearly attracted at least one  ground of legitimate censorship, the judge saw no cause to examine the  other provisions of the Programme Code or even the composition of the  IMC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This judicial restraint has proved detrimental. In May 2013, another  single judge of the Delhi High Court, who was asked by Comedy Central to  adjudge the validity of the IMC’s decision-making process, relied on &lt;i&gt;Star India&lt;/i&gt; (2011) to uphold the MIB’s action against the channel. The channel’s  appeal to the Supreme Court is currently pending. If the Supreme Court  decides to examine the validity of the IMC, the Delhi High Court may put  aside Sathiyam’s petition to wait for legal clarity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it happens, in the &lt;a href="http://indiankanoon.org/doc/110813550/"&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt;&lt;/a&gt; case (2015) that struck down section 66A of the IT Act, the Supreme  Court has an excellent precedent to follow to demand clarity and  precision from the Programme Code, perhaps even strike it down, as well  as due process from the MIB. On the accusation of defaming the Prime  Minister, probably the only clearly stated objection by the MIB, the  Supreme Court’s past law is clear: public servants cannot, for  non-personal acts, claim defamation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Censorship by blunt force&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond the IMC’s advisories and warnings, the Cable TV Act contains  two broad powers of censorship. The first empowerment in section 19  enables a government official to ban any programme or channel if it  fails to comply with the Programme Code or, “if it is likely to promote,  on grounds of religion, race, language, caste or community or any other  ground whatsoever, disharmony or feelings of enmity, hatred or ill-will  between different religious, racial, linguistic or regional groups or  castes or communities or which is likely to disturb the public  tranquility.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second empowerment is much wider. Section 20 of the Cable TV Act  permits the Central Government to ban an entire cable television  operator, as opposed to a single channel or programmes within channels,  if it “thinks it necessary or expedient so to do in public interest”. No  reasons need be given and no grounds need be considered. Such a blunt  use of force creates an overwhelming power of censorship. It is not a  coincidence that section 20 resembles some provisions of  nineteenth-century telegraph laws, which were designed to enable the  colonial state to control the flow of information to its native  subjects.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A manual for television bans&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.frontline.in/arts-and-culture/cinema/cut-and-thrust/article5185915.ece" target="_blank"&gt;Film&lt;/a&gt; and television have &lt;a href="http://thebigindianpicture.com/2013/03/the-heart-of-censorship/" target="_blank"&gt;always&lt;/a&gt; attracted political attention and state censorship. In 1970, &lt;a href="http://indiankanoon.org/doc/1719619/" target="_blank"&gt;Justice Hidayatullah&lt;/a&gt; of the Supreme Court explained why: “It has been almost universally  recognised that the treatment of motion pictures must be different from  that of other forms of art and expression. This arises from the instant  appeal of the motion picture… The motion picture is able to stir up  emotions more deeply than any other product of art.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this historical narrative of censorship, television regulation is relatively new. &lt;a href="http://www.indiantelevision.com/television/programming/tv-channels/regulations/ib-ministry-dictates-channels-to-follow-the-programme" target="_blank"&gt;Past governments&lt;/a&gt; have also been quick to threaten censorship for attacking an incumbent  Prime Minister. There seems to be a pan-governmental consensus that  senior political leaders ought to be beyond reproach, irrespective of  their words and deeds.&lt;/p&gt;
&lt;p&gt;But on what grounds could the state justify these bans? Lord Atkins’ celebrated war-time dissent in &lt;a href="https://en.wikipedia.org/wiki/Liversidge_v_Anderson" target="_blank"&gt;&lt;i&gt;Liversidge&lt;/i&gt;&lt;/a&gt; (1941) offers an unlikely answer:&lt;/p&gt;
&lt;p&gt;“When I use a word,’ Humpty Dumpty said in rather a scornful tone,  ‘it means just what I choose it to mean – neither more nor less.’”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india'&gt;https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-11-29T08:37:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;https://cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate">
    <title>The freedom of expression debate: The State must mend fences with The Web</title>
    <link>https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate</link>
    <description>
        &lt;b&gt;A fortnight after her arrest, Renu Srinivasan spends her free time singing Ashley Tisdale's number Suddenly. The lyrics - Suddenly people know my name, suddenly, everything has changed - resonate with the story of her life ever since she 'liked' and 'shared' her friend, Shaheen Dhada's, 21, controversial post regarding Shiv Sena chief Bal Thackeray's funeral on Facebook on November 18 and got arrested for it.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Rahul Jayaram was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/renu-srinivasan-shaheen-dhada-arrest-facebook/1/238397.html"&gt;published in India Today&lt;/a&gt; on December 18, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;She's now flooded with "hundreds" of messages on FB; some congratulatory, others abusive and gets at least a dozen friend requests on the social networking site. When Renu went to the doctor last week, two constables accompanied her.&lt;br /&gt;&lt;br /&gt;"All of a sudden, there's too much attention on me," says the Botany graduate from Dandekar College and a budding singer who is making new friends in the virtual world. There's, however, a word from caution from her father P.A. Srinivasan: "Don't comment on controversial issues you don't understand."&lt;br /&gt;&lt;br /&gt;Bloggers are careful. Krish Ashok, a well-known blogger is disappointed with the government's lack of engagement with India's surging online community. In a blog post in August 2010, he made fun of the Ramayana and the fact that women couldn't enter the Sabarimala temple in Kerala. A group called Hindu Janajagruti Samiti threatened to take him to court. Ashok spoke to his lawyer.&lt;br /&gt;&lt;br /&gt;"I was amazed. She said no individual could take action against me. But a group or organisation could," he says. Since then, he has become more aware of his Internet rights.&lt;br /&gt;&lt;br /&gt;Gursimran Khamba, who has over 30,000 followers on Twitter, kept his cool during Thackeray's death and funeral. When all the media went gaga over him, televising his family photo albums, Khamba, re-tweeted reports and accounts of the Shiv Sena's role during the Mumbai riots of 1992-93. "In my head, I am not courageous to say anything about it myself," he says. He didn't want to incite. He'd rather help his followers get a more nuanced picture of a venerated leader.&lt;br /&gt;&lt;br /&gt;Palghar and after, has made Ashok think. "I would reduce the number of provocative posts I might make," he says. Khamba says he will stick to comedy and doesn't believe in offence for the sake of offending although "taking offence is our national sport."&lt;br /&gt;&lt;br /&gt;It is a shame, for the Internet is growing in India like nobody's business. It's the medium of the age.&lt;br /&gt;&lt;br /&gt;According to comScore, a company that measures Internet trends, India is the fastest growing online market in the last 12 months among BRIC nations. There were 44.5 million unique visitors in July 2011 and in July 2012 there were 62.6 million unique visitors. That is, a growth of 44 per cent in one year. The total Internet usage of 124.7 million users in July 2012, that is, a 41 per cent growth from last year (July 2011).&lt;br /&gt;&lt;br /&gt;With 124 million users as of July 2012, India has an Internet penetration of 10 per cent. 75 per cent of India's online users are below the age of 35 making it one of the youngest Net-connected populations. 39.3 per cent of India's Internet population consists of females. It has the highest growth seen among 15 to 24 male and female segments. India has 56.2 million Facebook users and 4.1 million Twitter users. Facebook had 35.3 million users in July 2011 and it jumped to 52.1 million in July 2012. That's a growth of 47% in just one year!&lt;br /&gt;&lt;br /&gt;Growth of the Internet is one thing. Freedom of the Internet is another. Freedom House, an American organisation that tracks political and civil liberties worldwide, is blunt in its assessment. India is third in terms of Internet penetration, after the United States and China. Before November 2008, government control over the Internet was limited. All that changed after the November 2008 Mumbai attacks.&lt;br /&gt;&lt;br /&gt;Since then it says, "The need, desire, and ability of the Indian government to monitor, censor, and control the communication sector have grown. Given the range of security threats facing the country, many Indians feel that the government should be allowed to monitor personal communications such as telephone calls, email messages, and financial transactions. It is in this context that Parliament passed amendments to the Information Technology Act (ITA) in 2008, expanding censorship and monitoring capabilities. This trend continued in 2011 with the adoption of regulations increasing surveillance in cyber cafes. Meanwhile, the government and non-state actors have intensified pressure on intermediaries, including social media applications, to remove upon request a wide range of content vaguely defined as "offensive" and potentially pre-screen user-generated content. Despite new comprehensive data protection regulations adopted in 2011, the legal framework and oversight surrounding surveillance and interception remains weak, and several instances of abuse have emerged in recent years."&lt;br /&gt;&lt;br /&gt;Over this year we have had the cases of cartoonist Aseem Trivedi being put in jail and later released in September. In April, Ambikesh Mahaptra of Jadavpur University in Kolkata was arrested for a cartoon poking fun at West Bengal chief minister Mamta Banerjee and Railway Minister Mukul Roy. In October, Ravi, owner of plastic packaging material factory was arrested and let off on bail for joking about Finance Minister P. Chidambaram's son, Karti. The list gets longer. The Web and the State are at loggerheads. Why?&lt;br /&gt;&lt;br /&gt;Lawyers and bloggers haul up Internet laws. And for such a community, we have laws like Section 66 (A) of the Information Technology Act of 2000. The law states that "any person who sends by means of a computer resource or a communication device, any information that is grossly offensive or has menacing character," can be booked for online crime.&lt;br /&gt;&lt;br /&gt;Legal experts think Section 66 (A) and the whole of the IT Act of 2000, needs revisiting. According to cyber lawyer Pavan Duggal, Section 66 (A) "is a vanilla provision that can be used for anything online."&lt;br /&gt;&lt;br /&gt;Section 66(A) seeks to empower the police and the complainant. "The words 'grossly offensive' and 'menacing character' of Section 66 (A) have no definition given. Normal, legitimate bona fide conversation between boyfriend and girlfriend at noble times online is fine. Once relationship sours, and they are gone."&lt;br /&gt;&lt;br /&gt;"It's not clear what the purpose of Section 66A is.  It's like having a single provision covering murder, assault, intimidation, and nuisance, and prescribing the same penalty for all of them," says Pranesh Prakash of the Center for Internet and Society, Bangalore. Terminology and the law's purpose are massive concerns.&lt;br /&gt;&lt;br /&gt;"The extent of the ambiguity of Section 66A is worrying. Laws need to be very clear about what they want to achieve. If it is murder, then it must say murder. If its attempted murder, it must be clear it is attempted murder. Section 66 A is trying to do too many things at the same time. Its canvas is too vast," says Rajeev Chandrasekar.&lt;br /&gt;&lt;br /&gt;As a country, we look to imitate the West, and often copy it badly. Some wonder if we need to mime the West. Pranesh Prakash thinks the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional').&lt;br /&gt;&lt;br /&gt;Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Article 19(2).&lt;br /&gt;&lt;br /&gt;Rajeev Chandrasekar thinks the Brits got it right. During the London riots of June 2011, "the UK government kept a tab on social media networking sites so as to check incitement, he says. It was a good example of clear legislation and effective execution, in an extreme scenario." To defuse online paranoia he wants the government to have a multi-stakeholder arrangement in fixing IT laws. This must involve users, IT companies, cyber cafe owners and the government. The State must mend fences with the Web.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate'&gt;https://cis-india.org/news/india-today-rahul-jayaram-december-18-2012-the-freedom-of-expression-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-07T10:30:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-case-of-whatsapp-group-admins">
    <title>The Case of Whatsapp Group Admins</title>
    <link>https://cis-india.org/internet-governance/blog/the-case-of-whatsapp-group-admins</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Censorship laws in India have now roped in group administrators of chat groups on instant messaging platforms such as Whatsapp (&lt;i&gt;group admin(s)&lt;/i&gt;) for allegedly objectionable content that was posted by other users of these chat groups. Several incidents&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn1"&gt;[1]&lt;/a&gt; were reported this year where group admins were arrested in different parts of the country for allowing content that was allegedly objectionable under law. A few reports mentioned that these arrests were made under Section 153A&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn2"&gt;[2]&lt;/a&gt; read with Section 34&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn3"&gt;[3]&lt;/a&gt; of the Indian Penal Code (&lt;i&gt;IPC&lt;/i&gt;) and Section 67&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn4"&gt;[4]&lt;/a&gt; of the Information Technology Act (&lt;i&gt;IT Act&lt;/i&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Targeting of a group admin for content posted by other members of a chat group has raised concerns about how this liability is imputed. Whether a group admin should be considered an intermediary under Section 2 (w) of the IT Act? If yes, whether a group admin would be protected from such liability?&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Group admin as an intermediary&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whatsapp is an instant messaging platform which can be used for mass communication by opting to create a chat group. A chat group is a feature on Whatsapp that allows joint participation of Whatsapp users. The number of Whatsapp users on a single chat group can be up to 100. Every chat group has one or more group admins who control participation in the group by deleting or adding people. &lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn5"&gt;[5]&lt;/a&gt; It is imperative that we understand that by choosing to create a chat group on Whatsapp whether a group admin can become liable for content posted by other members of the chat group.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Section 34 of the IPC provides that when a number of persons engage in a criminal act with a common intention, each person is made liable as if he alone did the act. Common intention implies a pre-arranged plan and acting in concert pursuant to the plan. It is interesting to note that group admins have been arrested under Section 153A on the ground that a group admin and a member posting content on a chat group that is actionable under this provision have common intention to post such content on the group. But would this hold true when for instance, a group admin creates a chat group for posting lawful content (say, for matchmaking purposes) and a member of the chat group posts content which is actionable under law (say, posting a video abusing Dalit women)? Common intention can be established by direct evidence or inferred from conduct or surrounding circumstances or from any incriminating facts.&lt;/span&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;We need to understand whether common intention can be established in case of a user merely acting as a group admin. For this purpose it is necessary to see how a group admin contributes to a chat group and whether he acts as an intermediary.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;We know that parameters for determining an intermediary differ across jurisdictions and most global organisations have categorised them based on their role or technical functions.&lt;/span&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn7"&gt;[7]&lt;/a&gt;&lt;span&gt; Section 2 (w) of the Information Technology Act, 2000 (&lt;/span&gt;&lt;i&gt;IT Act&lt;/i&gt;&lt;span&gt;) defines an intermediary as &lt;/span&gt;&lt;i&gt;any person, who on behalf of another person, receives, stores or transmits messages or provides any service with respect to that message&lt;/i&gt;&lt;span&gt; &lt;/span&gt;&lt;i&gt;and includes the telecom services providers, network providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online marketplaces and cyber cafés&lt;/i&gt;&lt;span&gt;. Does a group admin receive, store or transmit messages on behalf of group participants or provide any service with respect to messages of group participants or falls in any category mentioned in the definition? Whatsapp does not allow a group admin to receive, or store on behalf of another participant on a chat group. Every group member independently controls his posts on the group. However, a group admin helps in transmitting messages of another participant to the group by allowing the participant to be a part of the group thus effectively providing service in respect of messages. A group admin therefore, should be considered an intermediary. However his contribution to the chat group is limited to allowing participation but this is discussed in further detail in the section below.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the Organisation for Economic Co-operation and Development (OECD), in a 2010 report&lt;/span&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn8"&gt;[8]&lt;/a&gt;&lt;span&gt;, an internet intermediary brings together or facilitates transactions between third parties on the Internet. It gives access to, hosts, transmits and indexes content, products and services originated by third parties on the Internet or provide Internet-based services to third parties. A Whatsapp chat group allows people who are not on your list to interact with you if they are on the group admins’ contact list. In facilitating this interaction, according to the OECD definition, a group admin may be considered an intermediary.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Liability as an intermediary&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 79 (1) of the IT Act protects an intermediary from any liability under any law in force (for instance, liability under Section 153A pursuant to the rule laid down in Section 34 of IPC) if an intermediary fulfils certain conditions laid down therein. An intermediary is required to carry out certain due diligence obligations laid down in Rule 3 of the Information Technology (Intermediaries Guidelines) Rules, 2011 (&lt;i&gt;Rules&lt;/i&gt;). These obligations include monitoring content that infringes intellectual property, threatens national security or public order, or is obscene or defamatory or violates any law in force (Rule 3(2)).&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn9"&gt;[9]&lt;/a&gt; An intermediary is liable for publishing or hosting such user generated content, however, as mentioned earlier, this liability is conditional. Section 79 of IT Act states that an intermediary would be liable only if it initiates transmission, selects receiver of the transmission and selects or modifies information contained in the transmission that falls under any category mentioned in Rule 3 (2) of the Rules. While we know that a group admin has the ability to facilitate sharing of information and select receivers of such information, he has no direct editorial control over the information shared. Group admins can only remove members but cannot remove or modify the content posted by members of the chat group. An intermediary is liable in the event it fails to comply with due diligence obligations laid down under rule 3 (2) and 3 (3) of the Rules however, since a group admin lacks the authority to initiate transmission himself and control content, he can’t comply with these obligations. Therefore, a group admin would be protected from any liability arising out of third party/user generated content on his group pursuant to Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It is however relevant to note whether the ability of a group admin to remove participants amounts to an indirect form of editorial control.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Other pertinent observations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span&gt; &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In several reports&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn10"&gt;[10]&lt;/a&gt; there have been discussions about how holding a group admin liable makes the process convenient as it is difficult to locate all the users of a particular group. This reasoning may not be correct as the Whatsapp policy&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn11"&gt;[11]&lt;/a&gt; makes it mandatory for a prospective user to provide his mobile number in order to use the platform and no additional information is collected from group admins which may justify why group admins are targeted. Investigation agencies can access mobile numbers of Whatsapp users and gain more information from telecom companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It is also interesting to note that the group admins were arrested after a user or someone familiar to a user filed a complaint with the police about content being objectionable or hurtful. Earlier this year, the apex court had ruled in the case of &lt;/span&gt;&lt;i&gt;Shreya Singhal v. Union of India&lt;/i&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftn12"&gt;[12]&lt;/a&gt;&lt;span&gt; that an intermediary needed a court order or a government notification for taking down information. With actions taken against group admins on mere complaints filed by anyone, it is clear that the law enforcement officials have been overriding the mandate of the court.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span style="text-align: justify; "&gt;According to a study conducted by a global research consultancy, TNS Global, around 38 % of internet users in India use instant messaging applications such as Snapchat and Whatsapp on a daily basis, Whatsapp being the most widely used application. These figures indicate the scale of impact that arrests of group admins may have on our daily communication.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It is noteworthy that categorising a group admin as an intermediary would effectively make the Rules applicable to all Whatsapp users intending to create groups and make it difficult to enforce and would perhaps blur the distinction between users and intermediaries.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The critical question however is whether a chat group is considered a part of the bundle of services that Whatsapp offers to its users and not as an independent platform that makes a group admin a separate entity. Also, would it be correct to draw comparison of a Whatsapp group chat with a conference call on Skype or sharing a Google document with edit rights to understand the domain in which censorship laws are penetrating today?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Valuable contribution by Pranesh Prakash and Geetha Hariharan&lt;/i&gt;&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref1"&gt;[1]&lt;/a&gt; &lt;a href="http://www.nagpurtoday.in/whatsapp-admin-held-for-hurting-religious-sentiment/06250951"&gt;http://www.nagpurtoday.in/whatsapp-admin-held-for-hurting-religious-sentiment/06250951&lt;/a&gt; ;  &lt;a href="http://www.catchnews.com/raipur-news/whatsapp-group-admin-arrested-for-spreading-obscene-video-of-mahatma-gandhi-1440835156.html"&gt;http://www.catchnews.com/raipur-news/whatsapp-group-admin-arrested-for-spreading-obscene-video-of-mahatma-gandhi-1440835156.html&lt;/a&gt; ; &lt;a href="http://www.financialexpress.com/article/india-news/whatsapp-group-admin-along-with-3-members-arrested-for-objectionable-content/147887/"&gt;http://www.financialexpress.com/article/india-news/whatsapp-group-admin-along-with-3-members-arrested-for-objectionable-content/147887/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref2"&gt;[2]&lt;/a&gt; Section 153A. “Promoting enmity between different groups on grounds of religion, race, place of birth, residence, language, etc., and doing acts prejudicial to maintenance of harmony.— (1) Whoever— (a) by words, either spoken or written, or by signs or by visible representations or otherwise, promotes or attempts to promote, on grounds of religion, race, place of birth, residence, language, caste or community or any other ground whatsoever, disharmony or feelings of enmity, hatred or ill-will between different reli­gious, racial, language or regional groups or castes or communi­ties…” or 2) Whoever commits an offence specified in sub-section (1) in any place of worship or in any assembly engaged in the performance of religious wor­ship or religious ceremonies, shall be punished with imprisonment which may extend to five years and shall also be liable to fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref3"&gt;[3]&lt;/a&gt; Section 34. Acts done by several persons in furtherance of common intention – When a criminal act is done by several persons in furtherance of common intention of all, each of such persons is liable for that act in the same manner as if it were done by him alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref4"&gt;[4]&lt;/a&gt; Section 67 Publishing of information which is obscene in electronic form. -Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref5"&gt;[5]&lt;/a&gt; https://www.whatsapp.com/faq/en/general/21073373&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref6"&gt;[6]&lt;/a&gt; Pandurang v. State of Hyderabad AIR 1955 SC 216&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref7"&gt;[7]&lt;/a&gt;&lt;a href="https://www.eff.org/files/2015/07/08/manila_principles_background_paper.pdf"&gt;https://www.eff.org/files/2015/07/08/manila_principles_background_paper.pdf&lt;/a&gt;;  &lt;a href="http://unesdoc.unesco.org/images/0023/002311/231162e.pdf"&gt;http://unesdoc.unesco.org/images/0023/002311/231162e.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref8"&gt;[8]&lt;/a&gt; http://www.oecd.org/internet/ieconomy/44949023.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref9"&gt;[9]&lt;/a&gt; Rule 3(2) (b) of the Rules&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref10"&gt;[10]&lt;/a&gt;&lt;a href="http://www.thehindu.com/news/national/other-states/if-you-are-a-whatsapp-group-admin-better-be-careful/article7531350.ece"&gt;http://www.thehindu.com/news/national/other-states/if-you-are-a-whatsapp-group-admin-better-be-careful/article7531350.ece&lt;/a&gt;; http://www.newindianexpress.com/states/tamil_nadu/Social-Media-Administrator-You-Could-Land-in-Trouble/2015/10/10/article3071815.ece;  &lt;a href="http://www.medianama.com/2015/10/223-whatsapp-group-admin-arrest/"&gt;http://www.medianama.com/2015/10/223-whatsapp-group-admin-arrest/&lt;/a&gt;; &lt;a href="http://www.thenewsminute.com/article/whatsapp-group-admin-you-are-intermediary-and-here%E2%80%99s-what-you-need-know-35031"&gt;http://www.thenewsminute.com/article/whatsapp-group-admin-you-are-intermediary-and-here%E2%80%99s-what-you-need-know-35031&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref11"&gt;[11]&lt;/a&gt; https://www.whatsapp.com/legal/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/HP/Desktop/Whatsapp%20group%20admins.docx#_ftnref12"&gt;[12]&lt;/a&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf&lt;/p&gt;
&lt;div&gt;
&lt;div id="ftn12"&gt;&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-case-of-whatsapp-group-admins'&gt;https://cis-india.org/internet-governance/blog/the-case-of-whatsapp-group-admins&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-12-08T10:25:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads">
    <title>The block heads</title>
    <link>https://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads</link>
    <description>
        &lt;b&gt;An entire government department is on the job, but can it really take down ‘offending’ online content?&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Sibi Arasu was &lt;a class="external-link" href="http://www.thehindubusinessline.com/features/blink/know/bl-ink-the-task-of-blocking-and-unblocking-websites/article7064563.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on April 3, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Department of Electronics and Information Technology’s (Deity)  offices are as layered as its official website. From inside ‘Electronics  Niketan’ at the Central Government Offices (CGO) complex in south  Delhi, Deity’s army of director-generals, joint secretaries, department  heads, scientists, clerks and staff of various grades and ranks keep an  eye on how the country engages with the world wide web.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;One set of cubicles is dedicated to the Computer Emergency Response Team  (CERT), the nodal agency meant to combat hacking, phishing and  generally fortify the internet in India. This includes the task of  blocking and unblocking websites. A rather complicated job in a country  where, according to one senior government official, “it’s technically  infeasible to completely block content. If it’s at the gateway level,  then we can filter it out. But for videos and other similar content, it  is just not possible to completely block them.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;No bandwidth&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Be it the AIB roasts that were taken down from YouTube or the  controversial documentary India’s Daughter, which was blocked within  eight hours of going online, the CERT and other allied departments have  been kept busy over the past few months.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In a classic example of how blocking can go wrong, more than 36 websites  were taken down in December last year to “prevent the spread of ISIS  propaganda” only to be unblocked within weeks. Like elsewhere in the  world, the attempt to “protect” citizens had unwittingly ended up  hurting legitimate websites, including video sharing sites vimeo.com,  dailymotion.com and the reference site archive.org. It was  embarrassingly similar to the Chinese government’s actions in 2010 when  it blocked all images of empty chairs, stools and tables as it attempted  to staunch discussions about Liu Xiabo, the Nobel Peace Prize winner  that year, who was missing from the awards ceremony as he was  incarcerated in China.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Terming such government actions as dangerous and Orwellian, Apar Gupta, a  cyber law specialist in Delhi who appeared for the People’s Union for  Civil Liberties (PUCL) in the PIL against Section 66A of the IT Act,  says, “Any piece of content is contained within several file formats and  obscured through technical devices like encryption, making its complete  removal and eradication impossible.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Internet freedom campaigners have maintained that Section 66A, which  prescribed “punishment for sending offensive messages through a  communication service”, was created solely to muzzle dissent and  differences of opinion.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Although Section 66A was recently struck down, the law authorising  blocking of content — namely, Section 69A — remains intact. The Central  Government can block content it believes threatens the security of the  State; the sovereignty, integrity or defence of India; friendly  relations with foreign States; public order; or incites committing a  cognisable offence related to any of the above. The government must,  however, adhere to a set of procedures and safeguards, known as Blocking  Rules.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Larger, overbroad technical blocks can impede the functioning of the  internet,” says internet policy analyst Raman Chima. “When a large  website ‘blacklist’ and internet filter was proposed for Australia in  2009-10, research established that it would likely result in  double-digit reductions in the internet’s speed and efficiency in that  country.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The ‘Streisand effect’, named after the Hollywood actress, is another  common consequence of blocking. As Chima says, “Specific bans tend to be  counterproductive and, more often than not, result in more awareness  and interest in the banned content.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;b&gt;Political manoeuvres&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;‘Ethical hacktivist’ and Hackers Hat founder Satish Ashwin sees banning and blocking as purely vote bank politics.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Technically anything can be blocked or banned and it’s not a big deal,  but the sheer volume of data uploaded makes it next to impossible to  monitor and censor,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;To those heralding the striking down of 66A as a victory for free  speech, Sunil Abraham, executive director of the Bengaluru-based Centre  for Internet and Society, points to the larger picture. “Nobody is  really aware of the scale of censorship in India. Thousands of websites  are blocked under Section 69A, mostly due to the maximalist enforcement  of Intellectual Property Rights (IPR). While 66A is gone, there are many  other provisions within the IT Act that still regulate speech online.  It is important to have quality laws drafted through an open,  participatory process, where all stakeholders are consulted and  responded to before bills are introduced in Parliament."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads'&gt;https://cis-india.org/internet-governance/news/hindu-businessline-april-3-2015-sibi-arasu-the-block-heads&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-05-07T11:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking">
    <title>Text of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;CIS had filed a request under the Right to Information Act with the government, asking a number of questions relating to blocking of content under the IT Act.  We have reproduced below the response we got from the government.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Government of India&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Ministry of Communications &amp;amp; Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;Department of Information Technology&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Electronics Niketan, 6 CGO Complex,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;New Delhi-110003&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No: 14(12)/2011-ESD&lt;br /&gt;10.6.2011&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Shri Pranesh Prakash,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Centre for Internet and Society,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;194, 2C Cross, Domlur Stage II,&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;Bangalore - 560071&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Subject: Request for information under RTI Act, 2005.&lt;/p&gt;
&lt;p&gt;Sir,&lt;br /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Reference your request dated 13 May 2011, which was received in this office on 18.5.2011 on the above subject.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;The information as received from the custodian of information is attached herewith (Annexure-I, II and III).&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&amp;nbsp; &amp;nbsp;Yours faithfully,&lt;br /&gt;&amp;nbsp;&amp;nbsp; (A.K.Kaushik)&lt;br /&gt;&amp;nbsp; &amp;nbsp;Additional Director &amp;amp; CPIO&lt;br /&gt;&amp;nbsp; &amp;nbsp;Cyber Laws &amp;amp; E-Security Division&lt;br /&gt;&amp;nbsp; &amp;nbsp;Tel: 011-24364803&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&amp;nbsp;Annexure I&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;strong&gt;Reply to Shri Pranesh Prakash&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;ol&gt;&lt;li&gt;How many orders have been issued for blocking of computer resources prior to the coming into force of the Information Technology (Amendment) Act, 2008 (i.e., before October 27, 2009) under the Information Technology Act, 2000, or any other law for the time being in force.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Five orders were issued for blocking access to web content.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the websites for which the DIT has issued blocking orders and the dates on which each website was blocked.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The following websites have been blocked pursuant to court orders&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Sl&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of issuing&amp;nbsp;direction by designated&amp;nbsp;officer&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.zone.h.org/"&gt;www.zone-h.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.03.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://donotdiall00.webs.com"&gt;http://donotdiall00.webs.com&amp;nbsp;&lt;/a&gt;&amp;nbsp;(IP 216.52.115.50)&lt;/td&gt;
&lt;td&gt;&amp;nbsp;08.08.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;www.bloggernews.net/124029&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;15.11.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba"&gt;http://www.google.co.in/#hl=en&amp;amp;source=hp&amp;amp;biw=-1276&amp;amp;bih=843&amp;amp;=dr+babasaheb+ambedkar+wallpaper&amp;amp;aq=4&amp;amp;aqi=gl0&amp;amp;aql=&amp;amp;oq=dr+babas&amp;amp; gs_ rfai=&amp;amp;fp=e791fe993fa412ba&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html"&gt;http://www.cinemahd.net/desktopenhancements/wallpaper/23945-wallpapers-beautiful-girl-wallpaper.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.chakpak.com/find/images/kamasutra-hindi-movie"&gt;http://www.chakpak.com/find/images/kamasutra-hindi-movie&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html"&gt;http://www.submitlink.khatana.net/2010/09/jennifer-stano-is-engaged-to.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html"&gt;http://www.result.khatana.net/2010/11/im-no-panty-girl-yana-gupta-wardrobe.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;20.12.2010&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076"&gt;http://www.facebook.com/pages/I-Hate-Ambedkar/172025102828076&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;25.02.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.&lt;/td&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.indvbav.org/"&gt;&amp;nbsp;&lt;/a&gt;&lt;a class="external-link" href="http://www.indybay.org/"&gt;www.indybay.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.arizona.indymedia.org/"&gt;www.arizona.indymedia.org&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;17.03.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Please provide a list of all the persons to whom such orders were issued.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - The directions were issued to Department of Telecommunications.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all the requests for blocking of information that have been received by the Designated Officer under the Information Technology (Procedures and Safeguards for Blocking Access of Information by Public) Rules, 2009 ("Rules").&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide a list of all persons/authorities from whom the Designated Officer under the Rules has received requests for blocking of information and the dates these requests were received.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 4 &amp;amp; 5&lt;/strong&gt; - The details are given in Annexure-II.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been rejected,&amp;nbsp;including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that have been&amp;nbsp;accepted, including file noting.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide the files on all the complaints and requests that are still being&amp;nbsp;processed (e.g. more information has been sought on the request), including file notings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 6,7 &amp;amp; 8&lt;/strong&gt; - Files are available in section and can be viewed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of the minutes of all meetings held by the Committee for&amp;nbsp;Examination of Requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide copies of all the recommendations of the Committee for Examination&amp;nbsp;of requests under Rule 8(4) of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 9 &amp;amp; 10&lt;/strong&gt; - &amp;nbsp;Copy of the minutes/recommendation of the meeting of the Committee is&amp;nbsp;at Annexure III.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us the dates and copies of the minutes of all meetings held by the&amp;nbsp;Review Committee under Rule 14 of the Rules to periodically review the blocked&amp;nbsp;resources.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Please provide us copies of all the findings of the Review Committee.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the Review Committee has not met, please provide us the reason for the meetings&amp;nbsp;not happenings as per the requirement of Rule 14 of the Rules.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply 11, 12 &amp;amp; 13&lt;/strong&gt; - This meeting is coordinated by Department of Telecommunications&amp;nbsp;and DIT is not in possession of details.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does "intermediary" in Rule 13 include intermediaries not located in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; -&amp;nbsp;Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Has any block ordered by the DIT ever been revoked by the DIT or any other&amp;nbsp;governmental authority?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such questions are not permitted under RTI Act as per DOPT OM No. 1 /7/2009&amp;nbsp;IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;On what basis does the DIT decide whether the appropriate intermediary is the person&amp;nbsp;who has put up content, the web host, or the different Internet service providers in India?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not permitted under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Does Rule 16 of the Rules override the Right to Information Act?&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If the answer to the previous question is yes, please provide any correspondence with any legal officer who provided the DIT advice that it could override the Right to Information Act through delegated legislation.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reply&lt;/strong&gt; - Such type of information is not admissible under RTI Act as per DOPT OM No. 1/7/2009 - IR dated 1st June 2009.&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2&gt;Annexure II&lt;/h2&gt;
&lt;h3&gt;&amp;nbsp;&lt;span class="Apple-style-span"&gt;Request received by Designated Officer&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Website&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Date of receipt of request &lt;/strong&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Request by&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/www.tamil.net.in" class="external-link"&gt;www.tamil.net.in&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;29.03.2010&lt;/td&gt;
&lt;td&gt;Secretary Public (Law &amp;amp; Order) Deptt.&lt;br /&gt;Secretariat, Chennai 600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;28.06.2010&lt;/td&gt;
&lt;td&gt;Sr. Inspector, Cyber Crime Cell, &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;http://www.youtube.com/ch?&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;wat&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="https://www.youtube.com/watch?v=tHUNESaC0E4"&gt;v=tHUNESaC0E4&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;
&lt;td&gt;05.07.2010&lt;/td&gt;
&lt;td&gt;Jt. Commissioner of Police (Crime), &lt;br /&gt;Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ulaginazhagiyamuthalpenn.blogspot.com"&gt;http://ulaginazhagiyamuthalpenn.blogspot.com&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;21.07.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary, &lt;br /&gt;IT Department, &lt;br /&gt;Chennai–600 009&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/en.wikipedia.org/Wiki/Sukhbir Singh Badal" class="external-link"&gt;en.wikipedia.org/Wiki/Sukhbir Singh Badal&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;11.08.2010&lt;/td&gt;
&lt;td&gt;Principal Secretary to Govt. of Punjab, &lt;br /&gt;Dept. of IT, &lt;br /&gt;Chandigarh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://www.exbii.com"&gt;http://www.exbii.com&lt;/a&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.topix.net/"&gt;http://www.topix.net&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;05.10.2010&lt;/td&gt;
&lt;td&gt;Commissioner, &lt;br /&gt;Maharashtra State, &lt;br /&gt;Colaba, Mumbai–400 001&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a class="external-link" href="http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html"&gt;http://ashsyumul.blogspot.com/2009/12/penginaan-terhadap-islam.html&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;20.08.2010&lt;/td&gt;
&lt;td&gt;Shri Haneef Ali, &lt;br /&gt;State President, &lt;br /&gt;Bharatiya Janata Minority Morcha, &lt;br /&gt;Andhra Pradesh&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.angelsofindia.com/"&gt;http://www.angelsofindia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.adult-gals.com/"&gt;http://www.adult-gals.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianangels.net/"&gt;http://www.indianangels.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.arabexposed.com/"&gt;http://www.arabexposed.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiamafia.com/"&gt;http://indiamafia.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianasfuckers.com/"&gt;http://www.indianasfuckers.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpronvideos.in/"&gt;http://www.indianpronvideos.in/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporntube.com/"&gt;http://www.peterporntube.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywood-sex.net/"&gt;http://www.bollywood-sex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianworldsex.com/"&gt;http://www.indianworldsex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianhomevideo.com/"&gt;http://indianhomevideo.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-pakistani-girls.com/"&gt;http://indian-pakistani-girls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianvidz.com/"&gt;http://indianvidz.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianparadise.net/"&gt;http://indianparadise.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodscandals.net/"&gt;http://bollywoodscandals.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpics.net/"&gt;http://indiansexpics.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-hardcore-movies.com/"&gt;http://www.indian-hardcore-movies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodnudesex.net/"&gt;http://www.bollywoodnudesex.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bangmyindianwife.com/"&gt;http://www.bangmyindianwife.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-angel-teens.com/"&gt;http://www.indian-angel-teens.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://south-indian-sex.com/"&gt;http://south-indian-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianseduction.com/"&gt;http://www.indianseduction.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexuniversity.com/"&gt;http://www.indiansexuniversity.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpassion.com/"&gt;http://www.indianpassion.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://fuckmyindianass.com/"&gt;http://fuckmyindianass.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiansexwebcams.com/"&gt;http://indiansexwebcams.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://exoticpics4u.com/"&gt;http://exoticpics4u.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianfreesexmovies.com/"&gt;http://www.indianfreesexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindiansexmovies.com/"&gt;http://www.newsindiansexmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.peterporn.net/"&gt;http://www.peterporn.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindianmovies.com/"&gt;http://www.3xindianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.amateur-indian-girls.com/"&gt;http://www.amateur-indian-girls.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.bollywoodhardcore.net/"&gt;http://www.bollywoodhardcore.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexpost.com/"&gt;http://www. indiansexpost.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.desi-amateurs.com/"&gt;http://www.desi-amateurs.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xasianmovies.com/"&gt;http://www.3xasianmovies.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://allindiansex.com/"&gt;http://allindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indiapornmovies.com/"&gt;http://www.indiapornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.3xindiansex.com/"&gt;http://www.3xindiansex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianxclips.com/"&gt;http://www.indianxclips.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indiansexvideos.org/"&gt;http://indiansexvideos.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pureindianporn.com/"&gt;http://www.pureindianporn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indian-porn-sex.com/"&gt;http://indian-porn-sex.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.newsindianpornmovies.com/"&gt;http://www.newsindianpornmovies.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://juicyindiangirls.com/"&gt;http://juicyindiangirls.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www/hardcoreindiansex.net/"&gt;http://www/hardcoreindiansex.net&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://bollywoodboobs.com/"&gt;http://bollywoodboobs.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://indianmovietgp.com/"&gt;http://indianmovietgp.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.365indian.com/"&gt;http://www.365indian.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-hoes.com/"&gt;http://www.indian-sex-hoes.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-photos.net/"&gt;http://www.indian-sex-photos.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-free-sex.com/"&gt;http://www.indian-free-sex.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indian-sex-movies.org/"&gt;http://www.indian-sex-movies.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://ww.tamil-sex-movies.net/"&gt;http://ww.tamil-sex-movies.net/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianteens.org/"&gt;http://www.indianteens.org/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://secredir.com/?sov=rook-sexyindianbooty.com"&gt;http://www.sexyindianbooty.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianposing.com/"&gt;http://www.indianposing.com&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.pornhub.com/"&gt;http://www.pornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;&lt;a class="external-link" href="http://www.indianpornhub.com/"&gt;http://www.indianpornhub.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;a class="external-link" href="http://www.exvideos.com"&gt;http://www.exvideos.com&amp;nbsp;&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;25.11.2010&lt;/td&gt;
&lt;td&gt;Jt.Commissioner of Police (Crime), Mumbai&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;Annexure III&lt;/h2&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Minutes of the meeting held on 24-08-2010 for the request for blocking of website &lt;a class="external-link" href="http://www.betfair.com/"&gt;www.betfair.com&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;A meeting of "Committee for examination of request"&amp;nbsp;constituted under the provisions of Information Technology&amp;nbsp;(Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009&amp;nbsp;under section 69A of the Information Technology Act, 2000 was held on 24.08.2010 at&amp;nbsp;Electronics Niketan. New Delhi to examine the Request sent by Government of Maharashtra to block the website&amp;nbsp;&lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. The meeting was participated by the following members:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;Dr. Gulshan Rai, Group Coordinator, Department of Information Technology&lt;/li&gt;&lt;li&gt;Shri Dharmendra Sharma, Joint Secretary, Ministry of Home Affairs&lt;/li&gt;&lt;li&gt;Shri Arvind Kumar, Joint Secretary, Ministry of Information &amp;amp; Broadcasting&lt;/li&gt;&lt;li&gt;Shri Ashok C. Prakash, Additional L.A., Department of Legal Affairs&lt;/li&gt;&lt;li&gt;Shri B.J. Srinath, Sr. Director, CERT-In&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;The Committee discussed the case and observed that Govt. of Maharashtra has requested for blocking of website &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt; on the grounds of "public order". The Committee also noted the reply from Cyber Crime Cell, Mumbai that no case has been registered against &lt;a class="external-link" href="http://www.betfair.com"&gt;www.betfair.com&lt;/a&gt;. Further, no details suggesting the "impact" of the said site on public order has been made available by the State Government.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Keeping in view the directions of the Hon'ble High Court to dispose the application strictly as per law, the Committee assessed that based on the data/facts/details provided by Government of Maharashtra and Cyber Crime Cell, Mumbai, violation of section 69A of the Information Technology Act, 2000 is not being established.&amp;nbsp;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;Download a scanned version of the letter received from the DIT office &lt;a href="https://cis-india.org/internet-governance/request-for-website-blocking.pdf" class="internal-link" title="Request for Blocking of Websites"&gt;here&lt;/a&gt; &lt;/strong&gt;[PDF, 1.74 MB]&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-10-28T14:37:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress">
    <title>Tata Photon unblocks Wordpress.com </title>
    <link>https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress</link>
    <description>
        &lt;b&gt;As of yesterday, the Tata Photon service of the Internet service provider (ISP) Tata Teleservices seems to have lifted the block it had put on the Wordpress.com domain for over a week.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The post was &lt;a class="external-link" href="http://tech2.in.com/news/services/tata-photon-unblocks-wordpresscom/403112"&gt;published&lt;/a&gt; in tech2 on August 30, 2012. Pranesh Prakash is quoted in it.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Tech2 had reported on Saturday that the free platform of &lt;b&gt;&lt;a href="http://tech2.in.com/news/services/some-isps-block-wordpress-domain-across-india/392092" target="_blank" title="Some ISPs block Wordpress domain across India"&gt;Wordpress was put under a blanket ban across India by the ISP&lt;/a&gt;&lt;/b&gt; following government orders to block around 309 URLs carrying disruptive or inflammatory content. Directives issued by the Department of Telecommunications (DoT) to ISPs between August 18 and 21 state that only the URLs mentioned be blocked, not entire domains. Users could neither view Wordpress blogs nor edit or post new content on them, the first instance of which was noticed by us on August 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our repeated efforts to contact Tata Teleservices' officials drew a blank. Numerous users who contacted customer service did not receive any replies or resolution. Through the course of the blockade, the ISP did not even display any message to Wordpress visitors that the domain was blocked, nor did it notify the owners of Wordpress blogs about it. Puzzled users tried resetting their Internet connections, clearing DNS caches, and calling the customer service helpline only to realise that they were experiencing an ISP-level block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reactions of Wordpress users ranged from annoyance to distress. Human rights activist and lawyer Kamayani Bali Mahabal commented on Tech2, &lt;i&gt;"Yes, my wordpress blog is blocked and I have 4 blogs...have also written to TATA. I can access through [an] anonymous browser but I cannot log in, edit and do admin functions, I can do about 50 percent work on my blog. Dashboard not accessible[,] barely manage to post, will be suing TATA soon"&lt;/i&gt;. In a &lt;b&gt;&lt;a href="http://kractivist.wordpress.com/2012/08/29/tatadocomo-censorship-on-wordpress-step-by-step-guide-foe/" target="_blank" title="TATADOCOMO #censorship on wordpress- step by step guide #FOE"&gt;blog post&lt;/a&gt;&lt;/b&gt;, she has described her experience of the block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Blogger Shantanu Adhicary who goes by the &lt;i&gt;nom de blog&lt;/i&gt; Tantanoo says, &lt;i&gt;"My blogs are self-hosted [on Wordpress] so I was not affected. But it was annoying that I was unable to access, read or comment on other Wordpress blogs, especially in the absence of any message whatsoever that this site has been blocked".&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move by Tata Teleservices is being seen as ham handed; around 25 million Wordpress blogs were made inaccessible to deal with a few rotten eggs. Blogger and social media consultant Prateek Shah opines, &lt;i&gt;"Blanket bans on domains because content on some of their pages is objectionable are akin to jailing a certain section of society just because some people from the community broke the law. Wordpress plays an extremely important role on the Internet and if such a site were to go down even for a few hours, it would mean mayhem for bloggers as well as readers who count on the platform to get the latest updates and information. ISPs need to mature and grow up to the fact that one can't put millions of people in jeopardy when apparently trying to protect the interests of some".&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, the Madras High Court had granted relief to netizens in India by urging that there be no more John Doe orders. &lt;i&gt;“The order of interim injunction dated 25/04/2012 is hereby clarified that the interim injunction is granted only in respect of a particular URL where the infringing movie is kept and not in respect of the entire website. Further, the applicant is directed to inform about the particulars of URL where the interim movie is kept within 48 hours.”&lt;i&gt; &lt;/i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, Policy Director at Centre for Internet and Society (CIS), agrees the move was wrong but shares insights about the position of the ISPs. He says, &lt;i&gt;"It was obviously wrong. It contravenes the government's orders to not block the base URL but individual pages. Action should be taken against them for causing inconvenience to users. This is not the first time an ISP has gone overboard in implementing censorship, be it copyright issues, piracy or inflammatory content. In 2006, the government had &lt;/i&gt;&lt;b&gt;&lt;i&gt;&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=18954" target="_blank" title="DoT orders Internet Service Providers to block only the specified webpages/websites"&gt;chastised ISPs&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;i&gt; for over-censoring content and blocking unintended websites and pages. Having said that, ISPs have numerous grouses against the government. They do not possess the technical capabilities to implement the government's orders, at times, whether about surveillance or censorship". &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISPs that are also telecom services providers, find themselves &lt;b&gt;&lt;a href="http://articles.economictimes.indiatimes.com/2012-08-25/news/33385182_1_isps-text-messages-smses" target="_blank" title="Blocking Twitter: How Internet Service Providers &amp;amp; telcos were caught between tweets and tall egos"&gt;unable to decipher government notifications&lt;/a&gt;&lt;/b&gt; about shutting off content on the Internet or introducing curbs on mobile communication. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism" target="_blank" title="Analysing Latest List of Blocked Sites (Communalism &amp;amp; Rioting Edition)"&gt;Prakash's analysis&lt;/a&gt;&lt;/b&gt; of the 300-odd URLs blocked by the Indian government reveals glaring mistakes in the government directives &lt;i&gt;"that made blocking pointless and effectual"&lt;/i&gt;. When asked to opine about what ISPs and telcos should do when the orders from the government were not crystal clear, Prakash said, &lt;i&gt;"They should ask for clarifications from the government. The operators sought clarifications from the Ministry of Telecommunications about the recent orders to ban bulk text messages and MMSes. The ministry was unable to resolve them, and in turn, sought further clarifications from the Home Ministry. The government should coordinate better"&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices was not the only ISP guilty of throwing the baby out with the bathwater. Sify too reportedly imposed a blanket block on the Wordpress domain. Airtel went overboard by temporarily blocking Youtu.be URLs last week citing orders by the court or the DoT.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress'&gt;https://cis-india.org/news/tech-2-in-com-aug-30-2012-tata-photon-unblocks-wordpress&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-03T01:53:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act">
    <title>Supreme Court Strikes Down Section 66A Of IT Act</title>
    <link>https://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act</link>
    <description>
        &lt;b&gt;In a major boost to freedom of speech online in India, the Supreme Court on Tuesday struck down Section 66A of the Information Technology Act, reading down a draconian law that was poorly conceived, tragically worded and caused ordinary citizens to be jailed for so much as a comment on Facebook that annoyed just about anyone. &lt;/b&gt;
        &lt;p&gt;The article by Indrani Basu and Betwa Sharma &lt;a class="external-link" href="http://www.huffingtonpost.in/2015/03/24/section-66-a_n_6928864.html"&gt;published in the Huffington Post &lt;/a&gt;on March 24, 2015 quotes Sunil Abraham.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In its &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf" target="_hplink"&gt;122-page judgment&lt;/a&gt;, the court struck down the entire section, refusing to heed the government's plea that it will not be misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The apex courts in India have consistently protected the rights of its  citizens. And the Supreme Court has once again upheld that great  tradition with this decision. There are constitutional exceptions to  free speech that exist.&lt;/p&gt;
&lt;blockquote class="pullquote"&gt;But this judgment will protect against the abuse  of this vague and badly drafted law," said Sunil Abraham, executive  director at the Centre for Internet and Society.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The section was passed without discussion in Parliament by the UPA  government in 2008, adding an amendment to the original 2002 Act. While  Narendra Modi supported the repealing of the Act during his prime  ministerial campaign, after the BJP came to power, the government  defended the provision, &lt;a href="http://timesofindia.indiatimes.com/india/Sec-66A-draconian-but-is-needed-Govt/articleshow/46125733.cms" target="_hplink"&gt;even while admitting it was draconian&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government argued that the provision was necessary to prevent people  from posting inflammatory content offending religious or political  sentiments, leading to violence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I''m so happy with the decision. They have completely struck down the  whole section. This is a victory for the country," said Shreya Singhal,  the 24-year-old law student on whose petition the Supreme Court was  hearing the case. "I don't have a political agenda — both the Congress  government and the BJP have misused the section earlier. Section 66A was  a blanket provision which was very vague. There are many IPC sections  that could be used in its place."&lt;/p&gt;
&lt;p&gt;"No one should fear putting anything up on the internet. It is very important for us to protect this right today," she said.&lt;/p&gt;
&lt;p&gt;But there are sections in the Indian Penal Code that can deal with such situations.&lt;/p&gt;
&lt;p&gt;And the broad and vague wording of 66A meant that it effectively became a tool that muzzled all speech online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, Shaheen Dada, a 21-year old Mumbai girl, posted on Facebook comments about Shivsena leader Bal Thackerey. Annoyed &lt;a href="http://www.bbc.com/news/world-asia-india-20490823" target="_hplink"&gt;party members went to the cops and Dada was arrested&lt;/a&gt;. Her friend Rinu Srinivasan, who had 'liked' the comment on Facebook, was also arrested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The same year, &lt;a href="http://www.hindustantimes.com/india-news/professor-arrested-for-poking-fun-at-mamata/article1-839847.aspx" target="_hplink"&gt;Jadavpur University professor Ambikesh Mahapatra&lt;/a&gt; was arrested for sharing a cartoon poking fun at West Bengal chief minister Mamata Banerjee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mumbai cartoonist &lt;a href="http://www.ndtv.com/india-news/outrage-over-cartoonist-aseem-trivedis-arrest-on-sedition-charges-for-mocking-the-constitution-498901" target="_hplink"&gt;Aseem Trivedi was also arrested&lt;/a&gt; under the provision for his cartoons during the Anna Hazare anti-corruption agitation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here is what the section said:&lt;/p&gt;
&lt;blockquote class="quoted"&gt;66A. Punishment for sending offensive messages through communication service, etc.&lt;br /&gt;Any person who sends, by means of a computer resource or a communication device,—&lt;br /&gt;(a) any information that is grossly offensive or has menacing character; or&lt;br /&gt;(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act'&gt;https://cis-india.org/internet-governance/news/huffington-post-indrani-basu-betwa-sharma-march-24-2015-supreme-court-strikes-down-section-66a-of-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-03-25T16:43:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/super-cassettes-v-myspace">
    <title>Super Cassettes v. MySpace (Redux)</title>
    <link>https://cis-india.org/a2k/blogs/super-cassettes-v-myspace</link>
    <description>
        &lt;b&gt;The latest judgment in the matter of Super Cassettes v. MySpace is a landmark and progressive ruling, which strengthens the safe harbor immunity enjoyed by Internet intermediaries in India. It interprets the provisions of the IT Act, 2000 and the Copyright Act, 1957 to restore safe harbor immunity to intermediaries even in the case of copyright claims. It also relieves MySpace from pre-screening user-uploaded content, endeavouring to strike a balance between free speech and censorship. CIS was one of the intervenors in the case, and has been duly acknowledged in the judgment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;On 23rd December 2016, Justice Ravindra Bhat and Justice Deepa Sharma of the Delhi High Court delivered a decision overturning the 2012 order in the matter of Super Cassettes Industries Limited v. MySpace. The 2012 order was heavily criticized, for it was agnostic to the technological complexities of regulating speech on the Internet and cast unfathomable burdens on MySpace. In the following post I summarise the decision of the Division Bench. Click &lt;a class="external-link" href="http://lobis.nic.in/ddir/dhc/SRB/judgement/24-12-2016/SRB23122016FAOOS5402011.pdf"&gt;here&lt;/a&gt; to read the judgment.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Brief Facts&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;In 2007, Super Cassettes Industries Limited (SCIL) filed a suit against MySpace, a social networking platform, alleging copyright infringement against MySpace. The platform allowed users to upload and share media files,
&lt;em&gt;inter alia&lt;/em&gt;, and it was discovered that users were sharing SCIL’s copyrighted works sans authorisation. SCIL promptly proceeded to file a civil suit against MySpace for primary infringement under section 51(a)(i)
of the Copyright Act as well as secondary infringement under section 51(a)(ii).&lt;/p&gt;
&lt;p&gt; The 2012 order was extremely worrisome as it had turned the clock several decades back on concepts of internet intermediary liability. The  court had held MySpace liable for copyright infringement despite it having shown no knowledge about specific instances of infringement; that it removed infringing content upon complaints; and that Super Cassettes had failed to submit songs to MySpace's song ID database. The most impractical burden of duty that the court pronounced was that MySpace was required to pre-screen content, rather than relying on post-infringement measures to remove infringing content. This was a result of interpreting due diligence to include pre-screening.&lt;/p&gt;
&lt;p&gt;The court injuncted MySpace from permitting any uploads of SCIL's copyrighted content, and directed to expeditiously execute content removal requests. To read CIS' analysis of the Single Judge's interim order, click &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/super-cassettes-v-my-space"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In the instant judgment, the bench limited their examination to MySpace’s liability for secondary infringement, and left the direct infringement determination to the Single Judge at the subsequent trial stage. In doing so, the court answered the following three questions:&lt;/p&gt;
&lt;h4&gt;1) Whether MySpace could be said to have knowledge of infringement so as to attract liability for
secondary infringement under Section 51(a)(ii)?&lt;/h4&gt;
&lt;p&gt;No. According to the Court, in the case of internet intermediaries, section 51(a)(ii) contemplates actual knowledge and not general awareness.&lt;/p&gt;
&lt;p&gt;Elaborating re the circumstances of the case, the Court held that to attract liability for secondary infringement, MySpace should have had actual knowledge and not mere awareness of the infringement. Appreciating the difference between virtual and physical worlds, the judgment stated “&lt;em&gt;the nature of internet media is such that the interpretation of knowledge cannot be the same as that is used for a physical premise.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;As per the court, the following facts only amounted to a general awareness, which was not sufficient to establish secondary liability:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Existence of user agreement terms which prohibited users from unauthorised uploading of content;&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;Operation of post-infringement mechanisms instituted by MySpace to identify and remove content;&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;SCIL sharing a voluminous catalogue of 100,000 copyrighted songs with MySpace, expecting the latter to monitor and quell any infringement;&lt;br /&gt;
&lt;/li&gt;&lt;li&gt;Modifying videos to insert ads in them: SCIL contended that MySpace invited users to share and upload content which it would use to insert ads and make revenues – and this amounted to knowledge. The Court found that video modification for ad insertion only changed the format of the video and not the content; further, it was a pure automated process and there was no human intervention.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Additionally, no constructive knowledge could be attributed to MySpace to demonstrate reasonable ground for believing that infringement had occurred.  A reasonable belief could emerge only after MySpace had perused all the content uploaded and shared on its platform – a task that was impossible to perform due to the voluminous catalogue
handed to it and existing technological limitations.&lt;/p&gt;
&lt;p&gt;The Court imposed a duty on SCIL to specify the works in which it owned copyright &lt;em&gt;and &lt;/em&gt;being shared
without authorisation on MySpace. It held that merely giving names of all content it owned without expressly pointing out the infringing works was contrary to the established principles of copyright law. Further, MySpace contended and the judge agreed, that in many instances the works were legally shared by distributors and performers – and often users created remixed works which only bore semblance to the title of the copyright work.&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;&lt;em&gt;In such cases it becomes even more important for a plaintiff such as 
MySpace to provide specific titles, because while an intermediary may 
remove the content fearing liability and damages, an authorized 
individual’s license and right to fair use will suffer or stand negated.
 (Para 38 in decision)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Thus, where as MySpace undoubtedly permitted a place of profit for communication of infringing works uploaded by users, it did not have specific knowledge, nor reasonable belief of the infringement.&lt;/p&gt;
&lt;h4&gt;2) Does proviso to Section 81 override the "safe harbor" granted to intermediaries under Section 79 of the IT Act, 2000?&lt;/h4&gt;
&lt;p&gt;and&lt;/p&gt;
&lt;h4&gt;3) Whether it was possible to harmoniously read and interpret Sections 79 and 81 of the IT Act, and Section 51 of the Copyright Act?&lt;/h4&gt;
&lt;p&gt;No, the proviso does not override  the safe harbor, i.e. the safe harbor
 defence cannot be denied to the intermediary in the case of copyright 
actions.The three sections have to be read harmoniously, indeed.&lt;/p&gt;
&lt;p&gt;
The judgment referred to the Parliamentary Standing Committee report as a relevant tool in interpreting the two provisions, declaring that the rights conferred under the IT Act, 2000 are supplementary and not in derogation of the Patents Act or the Copyright Act. The proviso was inserted only to permit copyright owners to demand action
against intermediaries who may themselves post infringing content – the safe harbor only existed for circumstances when content was third party/user generated.&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;&lt;em&gt;Given the supplementary nature of the provisions- one where infringement
 is defined and traditional copyrights are guaranteed and the other 
where digital economy and newer technologies have been kept in mind, the
only logical and harmonious manner to interpret the law would be to read
 them together. Not doing so would lead to an undesirable situation 
where intermediaries would be held liable irrespective of their due 
diligence. (Para 49 in decision)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Regarding section 79, the court reiterated that the section only granted a limited immunity to intermediaries by granting a &lt;em&gt;measured privilege to an intermediary&lt;/em&gt;, which was in the nature of an affirmative defence and not a blanket immunity to avoid liability. The very purpose of section 79 was to regulate and limit this liability; where as the Copyright Act granted and controlled rights of a copyright owner.&lt;/p&gt;
&lt;p&gt;The Court found Judge Whyte’s decision in Religious Technology Centre v. Netcom Online Communication Services (1995), to be particularly relevant to the instant case, and agreed with its observations. To recall, &lt;em&gt;Netcom&lt;/em&gt; was the landmark US ruling which established that when a subscriber was responsible for direct infringement, and the service providers did nothing more than setting up and operating tech systems which were
necessary for the functioning of the Internet, it was illogical to impute liability  on the service provider.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;On MySpace Complying with Safe Harbor Requirements under Section 79 of the IT Act, 2000 (and Intermediary Rules, 2011)&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The court held that MySpace's operations were in compliance with section 79(2)(b). The content transmission was initiated at the behest of the users, the recipients were not chosen by MySpace, neither was there modification of content. On the issue of modification, the court reasoned that since modification was an automated process (MySpace was inserting ads) which changed the format only, without MySpace's tacit or expressed control or knowledge, it was in compliance of the legislative requirement.&lt;/p&gt;
&lt;p class="callout"&gt;&lt;strong&gt;&lt;em&gt;Despite several safeguard tools and notice and take down regimes, 
infringed videos find their way. The remedy here is not to target 
intermediaries but to ensure that infringing material is removed in an 
orderly and reasonable manner. A further balancing act is required which
 is that of freedom of speech and privatized censorship. If an 
intermediary is tasked with the responsibility of identifying infringing
 content from non-infringing one, it could have a chilling effect on 
free speech; an unspecified or incomplete list may do that.
(Para 62 in decision)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
On the second aspect of due-diligence, the court held that Mypace complied with the due diligence procedure specified in the Rules - it published rules, regulations, privacy policy and user agreement for access of usage. Reading Rule 3(4) with section 79(2)(c), the court held that it due diligence required MySpace to remove content within 36 hours of gaining actual knowledge or receiving knowledge by another person of the infringing content. &lt;strong&gt;If MySpace failed to take infringing content down accordingly, then only will safe harbour be denied to MySpace.&lt;/strong&gt;
&lt;p&gt;This liberal interpretation of due diligence is a big win for internet intermediaries in India.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Additional Issues Considered by the Court&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;MySpace also tried to defend its activities by claiming the shield of the fair dealing section of the Indian Copyright Act. However, the Court refused, stating that the fair dealing defence was inapplicable to the case as the provisions protected transient and incidental storage. Whereas, in the instant circumstances, the content in question was stored/hosted permanently.&lt;/p&gt;
&lt;p&gt;MySpace also contended that the Single Judge's injunction order was vague and general and had foisted unimplementable duties on MySpace, disregarding the way the Internet functioned. If MySpace had to strictly comply with the order, it would have to shut its business in India. &lt;strong&gt;The Court said that the Single Judge's order, if enforced, would create a system of unwarranted private censorship, running contrary to the principles of a free speech regime, devoid of considerations of peculiarities of the internet intermediary industry. &lt;/strong&gt;Private censorship would also invite upon the ISP the legal risk of wrongfully terminating a user account.&lt;/p&gt;
&lt;p&gt;Finally, the Court urged MySpace to explore and innovate techniques to protect the interests of traditional copyright holders in a more efficient manner.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Relief Granted&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Setting aside the Single Judge's order aside, the Court directed SCIL to provide a specific catalogue of infringing works which also pointed to the URL of the files. Upon receiving such specific knowledge, MySpace has been directed to remove the content within 36 hours of the issued notice. MySpace will also keep an account of the removals, and the revenues earned from ads placed for calculating damages at the trial stage.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/super-cassettes-v-myspace'&gt;https://cis-india.org/a2k/blogs/super-cassettes-v-myspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2017-01-18T14:31:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015">
    <title>Summary Report Internet Governance Forum 2015 </title>
    <link>https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS), India participated in the Internet Governance Forum (IGF) held at Poeta Ronaldo Cunha Lima Conference Center, Joao Pessoa in Brazil from 10 November 2015 to 13 November 2015. The theme of IGF 2015 was ‘Evolution of Internet Governance: Empowering Sustainable Development’. Sunil Abraham, Pranesh Prakash &amp; Jyoti Panday from CIS actively engaged and made substantive contributions to several key issues affecting internet governance at the IGF 2015. The issue-wise detail of their engagement is set out below. &lt;/b&gt;
        
&lt;p align="center" style="text-align: left;"&gt;&lt;strong&gt;INTERNET
GOVERNANCE&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
I. The
Multi-stakeholder Advisory Group to the IGF organised a discussion on
&lt;em&gt;&lt;strong&gt;Sustainable
Development Goals (SDGs) and Internet Economy&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
the Main Meeting Hall from 9:00 am to 12:30 pm on 11 November, 2015.
The
discussions at this session focused on the importance of Internet
Economy enabling policies and eco-system for the fulfilment of
different SDGs. Several concerns relating to internet
entrepreneurship, effective ICT capacity building, protection of
intellectual property within and across borders were availability of
local applications and content were addressed. The panel also
discussed the need to identify SDGs where internet based technologies
could make the most effective contribution.  Sunil
Abraham contributed to the panel discussions by addressing the issue
of development and promotion of local content and applications. List
of speakers included:&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Lenni
	Montiel, Assistant-Secretary-General for Development, United Nations&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO LIRNEasia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sergio
	Quiroga da Cunha, Head of Latin America, Ericsson&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Raúl
	L. Katz, Adjunct Professor, Division of Finance and Economics,
	Columbia Institute of Tele-information&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jimson
	Olufuye, Chairman, Africa ICT Alliance (AfICTA)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lydia
	Brito, Director of the Office in Montevideo, UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Rudiantara, Minister of Communication &amp;amp; Information Technology,
	Indonesia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Daniel
	Sepulveda, Deputy Assistant Secretary, U.S. Coordinator for
	International and Communications Policy at the U.S. Department of
	State &amp;nbsp;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Deputy
	Minister Department of Telecommunications and Postal Services for
	the republic of South Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, Executive Director, Centre for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	H.E.
	Junaid Ahmed Palak, Information and Communication Technology
	Minister of Bangladesh&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jari
	Arkko, Chairman, IETF&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Rabello, President, Rio Film Trade Association&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gary
	Fowlie, Head of Member State Relations &amp;amp; Intergovernmental
	Organizations, ITU&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;igf&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;2015-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;main&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;sessions&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2327-2015-11-11-internet-economy-and-sustainable-development-main-meeting-room&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Internet
economy and Sustainable Development here
&lt;a href="https://www.youtube.com/watch?v=D6obkLehVE8"&gt;https://www.youtube.com/watch?v=D6obkLehVE8&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;II.
Public
Knowledge organised a workshop on &lt;em&gt;&lt;strong&gt;The
Benefits and Challenges of the Free Flow of Data &lt;/strong&gt;&lt;/em&gt;at
Workshop Room
5 from 11:00 am to 12:00 pm on 12 November, 2015. The discussions in
the workshop focused on the benefits and challenges of the free flow
of data and also the concerns relating to data flow restrictions
including ways to address
them. Sunil
Abraham contributed to the panel discussions by addressing the issue
of jurisdiction of data on the internet. The
panel for the workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Vint
	Cerf, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Lawrence
	Strickling, U.S. Department of Commerce, NTIA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Richard
	Leaning, European Cyber Crime Centre (EC3), Europol&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Marietje
	Schaake, European Parliament&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nasser
	Kettani, Microsoft&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshops&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2467-2015-11-12-ws65-the-benefits-and-challenges-of-the-free-flow-of-data-workshop-room-5&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link https://www.youtube.com/watch?v=KtjnHkOn7EQ&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;III.
Article
19 and
Privacy International organised a workshop on &lt;em&gt;&lt;strong&gt;Encryption
and Anonymity: Rights and Risks&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 1 from 11:00 am to 12:30 pm on 12 November, 2015.
The
workshop fostered a discussion about the latest challenges to
protection of anonymity and encryption and ways in which law
enforcement demands could be met while ensuring that individuals
still enjoyed strong encryption and unfettered access to anonymity
tools. Pranesh
Prakash contributed to the panel discussions by addressing concerns
about existing south Asian regulatory framework on encryption and
anonymity and emphasizing the need for pervasive encryption. The
panel for this workshop included the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	David
	Kaye, UN Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Juan
	Diego Castañeda, Fundación Karisma, Colombia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Edison
	Lanza, Organisation of American States Special Rapporteur&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Ted
	Hardie, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Elvana
	Thaci, Council of Europe&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Professor
	Chris Marsden, Oxford Internet Institute&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alexandrine
	Pirlot de Corbion, Privacy International&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&lt;a name="_Hlt435412531"&gt;&lt;/a&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;://&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;www&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;intgovforum&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;.&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;org&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;cms&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;worksh&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;o&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;ps&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;/&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;list&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;of&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;published&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;workshop&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;-&lt;/a&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;proposals&lt;/a&gt;&lt;u&gt;
&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2407-2015-11-12-ws-155-encryption-and-anonymity-rights-and-risks-workshop-room-1&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here https://www.youtube.com/watch?v=hUrBP4PsfJo&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;IV.
Chalmers
&amp;amp; Associates organised a session on &lt;em&gt;&lt;strong&gt;A
Dialogue on Zero Rating and Network Neutrality&lt;/strong&gt;&lt;/em&gt;
at the Main Meeting Hall from 2:00 pm to 4:00 pm on 12 November,
2015. The Dialogue provided access to expert insight on zero-rating
and a full spectrum of diverse
views on this issue. The Dialogue also explored alternative
approaches to zero rating such as use of community networks. Pranesh
Prakash provided
a
detailed explanation of harms and benefits related to different
approaches to zero-rating. The
panellists for this session were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Jochai
	Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Igor
	Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dušan
	Caf, Chairman, Electronic Communications Council, Republic of
	Slovenia&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Silvia
	Elaluf-Calderwood, Research Fellow, London School of Economics,
	UK/Peru&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Belinda
	Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Helani
	Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Anka
	Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Kevin
	Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, Policy Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Steve
	Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dhanaraj
	Thakur, Research Manager, Alliance for Affordable Internet, USA/West
	Indies&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Yoo, Professor of Law, Communication, and Computer &amp;amp; Information
	Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/igf2015-main-sessions" target="_top"&gt;http://www.intgovforum.org/cms/igf2015-main-sessions&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2457-2015-11-12-a-dialogue-on-zero-rating-and-network-neutrality-main-meeting-hall-2&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;V.
The
Internet &amp;amp; Jurisdiction Project organised a workshop on
&lt;em&gt;&lt;strong&gt;Transnational
Due Process: A Case Study in MS Cooperation&lt;/strong&gt;&lt;/em&gt;
at Workshop Room
4 from 11:00 am to 12:00 pm on 13 November, 2015. The
workshop discussion focused on the challenges in developing an
enforcement framework for the internet that guarantees transnational
due process and legal interoperability. The discussion also focused
on innovative approaches to multi-stakeholder cooperation such as
issue-based networks, inter-sessional work methods and transnational
policy standards.  The panellists for this discussion were the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Anne
	Carblanc  Head of Division, Directorate for Science, Technology and
	Industry, OECD&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Eileen
	Donahoe Director Global Affairs, Human Rights Watch&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Byron
	Holland President and CEO, CIRA (Canadian ccTLD)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Christopher
	Painter Coordinator for Cyber Issues, US Department of State&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham Executive Director, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Alice
	Munyua Lead dotAfrica Initiative and GAC representative, African
	Union Commission&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudsen Senior Advisor for International Policy, Google&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Dunja
	Mijatovic Representative on Freedom of the Media, OSCE&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Thomas
	Fitschen Director for the United Nations, for International
	Cooperation against Terrorism and for Cyber Foreign Policy, German
	Federal Foreign Office&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Hartmut
	Glaser Executive Secretary, Brazilian Internet Steering Committee&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Matt
	Perault, Head of Policy Development Facebook&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2475-2015-11-13-ws-132-transnational-due-process-a-case-study-in-ms-cooperation-workshop-room-4&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link Transnational
Due Process: A Case Study in MS Cooperation available here&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=M9jVovhQhd0"&gt;https://www.youtube.com/watch?v=M9jVovhQhd0&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;VI.
The Internet Governance Project organised a meeting of the
&lt;em&gt;&lt;strong&gt;Dynamic
Coalition on Accountability of Internet Governance Venues&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 2 from 14:00
– 15:30 on
12 November, 2015. The coalition
brought together panelists to highlight the
challenges in developing an accountability
framework
for internet governance
venues that include setting up standards and developing a set of
concrete criteria. Jyoti Panday provided the perspective of civil
society on why acountability is necessary in internet governance
processes and organizations. The panelists for this workshop included
the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Robin
	Gross, IP Justice&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jeanette
	Hofmann, Director
	&lt;a href="http://www.internetundgesellschaft.de/"&gt;Alexander
	von Humboldt Institute for Internet and Society&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	 Farzaneh
	Badiei, 
	Internet Governance Project&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Erika
	Mann,
	Managing
	Director Public PolicyPolicy Facebook and Board of Directors
	ICANN&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Paul
	Wilson, APNIC&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Izumi
	Okutani, Japan
	Network Information Center (JPNIC)&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Keith
	Drazek , Verisign&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jyoti
	Panday,
	CIS&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Jorge
	Cancio,
	GAC representative&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the workshop is available here
&lt;a href="http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c23/dynamic-coalition-on-accountability-of-internet-governance-venues?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link https://www.youtube.com/watch?v=UIxyGhnch7w&lt;/p&gt;
&lt;p&gt;&amp;nbsp;VII.
Digital
Infrastructure
Netherlands Foundation organized an open forum at
Workshop Room 3
from 11:00
– 12:00
on
10
November, 2015. The open
forum discussed the increase
in government engagement with “the internet” to protect their
citizens against crime and abuse and to protect economic interests
and critical infrastructures. It
brought
together panelists topresent
ideas about an agenda for the international protection of ‘the
public core of the internet’ and to collect and discuss ideas for
the formulation of norms and principles and for the identification of
practical steps towards that goal.
Pranesh Prakash participated in the e open forum. Other speakers
included&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p&gt;
	Bastiaan
	Goslings AMS-IX, NL&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Pranesh
	Prakash CIS, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Marilia
	Maciel (FGV, Brasil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;
	Dennis
	Broeders (NL Scientific Council for Government Policy)&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;
Detailed
description of the open
forum is available here
&lt;a href="http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf"&gt;http://schd.ws/hosted_files/igf2015/3d/DINL_IGF_Open%20Forum_The_public_core_of_the_internet.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=joPQaMQasDQ"&gt;https://www.youtube.com/watch?v=joPQaMQasDQ&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
VIII.
UNESCO, Council of Europe, Oxford University, Office of the High
Commissioner on Human Rights, Google, Internet Society organised a
workshop  on hate speech and youth radicalisation at Room 9 on
Thursday, November 12. UNESCO shared the initial outcome from its
commissioned research on online hate speech including practical
recommendations on combating against online hate speech through
understanding the challenges, mobilizing civil society, lobbying
private sectors and intermediaries and educating individuals with
media and information literacy. The workshop also discussed how to
help empower youth to address online radicalization and extremism,
and realize their aspirations to contribute to a more peaceful and
sustainable world. Sunil Abraham provided his inputs. Other speakers
include&lt;/p&gt;
&lt;p&gt;
	1.
Chaired by Ms Lidia Brito, Director for UNESCO Office in Montevideo&lt;/p&gt;
&lt;p&gt;
	2.Frank
La Rue, Former Special Rapporteur on Freedom of Expression&lt;/p&gt;
&lt;p&gt;
	3.
Lillian Nalwoga, President ISOC Uganda and rep CIPESA, Technical
community&lt;/p&gt;
&lt;p&gt;
	4.
Bridget O’Loughlin, CoE, IGO&lt;/p&gt;
&lt;p&gt;
	5.
Gabrielle Guillemin, Article 19&lt;/p&gt;
&lt;p&gt;
	6.
Iyad Kallas, Radio Souriali&lt;/p&gt;
&lt;p&gt;
	7.
Sunil Abraham executive director of Center for Internet and Society,
Bangalore, India&lt;/p&gt;
&lt;p&gt;
	8.
Eve Salomon, global Chairman of the Regulatory Board of RICS&lt;/p&gt;
&lt;p&gt;
	9.
Javier Lesaca Esquiroz, University of Navarra&lt;/p&gt;
&lt;p&gt;
	10.
Representative GNI&lt;/p&gt;
&lt;p&gt;
	11.
Remote Moderator: Xianhong Hu, UNESCO&lt;/p&gt;
&lt;p&gt;
	12.
Rapporteur: Guilherme Canela De Souza Godoi, UNESCO&lt;/p&gt;
&lt;p&gt;
Detailed
description of the workshop
is available here
&lt;a href="http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no"&gt;http://igf2015.sched.org/event/4c1X/ws-128-mitigate-online-hate-speech-and-youth-radicalisation?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;
Video
link to the panel is available here
&lt;a href="https://www.youtube.com/watch?v=eIO1z4EjRG0"&gt;https://www.youtube.com/watch?v=eIO1z4EjRG0&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;INTERMEDIARY
LIABILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
IX.
Electronic
Frontier Foundation, Centre for Internet Society India, Open Net
Korea and Article 19 collaborated to organize
a workshop on the &lt;em&gt;&lt;strong&gt;Manila
Principles on Intermediary Liability&lt;/strong&gt;&lt;/em&gt;
at Workshop Room 9 from 11:00 am to 12:00 pm on 13 November 2015. The
workshop elaborated on the Manila
Principles, a high level principle framework of best practices and
safeguards for content restriction practices and addressing liability
for intermediaries for third party content. The
workshop
saw particpants engaged in over lapping projects considering
restriction practices coming togetehr to give feedback and highlight
recent developments across liability regimes. Jyoti
Panday laid down the key details of the Manila Principles framework
in this session. The panelists for this workshop included the
following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Kelly
	Kim Open Net Korea,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Jyoti
	Panday, CIS India,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gabrielle
	Guillemin, Article 19,&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Rebecca
	McKinnon on behalf of UNESCO&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Giancarlo
	Frosio, Center for Internet and Society, Stanford Law School&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nicolo
	Zingales, Tilburg University&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Will
	Hudson, Google&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2423-2015-11-13-ws-242-the-manila-principles-on-intermediary-liability-workshop-room-9&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video link available here &lt;a href="https://www.youtube.com/watch?v=kFLmzxXodjs"&gt;https://www.youtube.com/watch?v=kFLmzxXodjs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;ACCESSIBILITY&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
X.
Dynamic
Coalition
on Accessibility and Disability and Global Initiative for Inclusive
ICTs organised a workshop on &lt;em&gt;&lt;strong&gt;Empowering
the Next Billion by Improving Accessibility&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;
&lt;/em&gt;at
Workshop Room 6 from 9:00 am to 10:30 am on 13 November, 2015. The
discussion focused on
the need and ways to remove accessibility barriers which prevent over
one billion potential users to benefit from the Internet, including
for essential services. Sunil
Abraham specifically spoke about the lack of compliance of existing
ICT infrastructure with well established accessibility standards
specifically relating to accessibility barriers in the disaster
management process. He discussed the barriers faced by persons with
physical or psychosocial disabilities.  The
panelists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Francesca
	Cesa Bianchi, G3ICT&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Cid
	Torquato, Government of Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Carlos
	Lauria, Microsoft Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Derrick
	L. Cogburn, Institute on Disability and Public Policy (IDPP) for the
	ASEAN(Association of Southeast Asian Nations) Region&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	H. F. Botelho, F123 Consulting&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Gunela
	Astbrink, GSA InfoComm&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2438-2015-11-13-ws-253-empowering-the-next-billion-by-improving-accessibility-workshop-room-3&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
Link Empowering
the next billion by improving accessibility&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=7RZlWvJAXxs"&gt;https://www.youtube.com/watch?v=7RZlWvJAXxs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;strong&gt;OPENNESS&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
XI.
A
workshop on &lt;em&gt;&lt;strong&gt;FOSS
&amp;amp; a Free, Open Internet: Synergies for Development&lt;/strong&gt;&lt;/em&gt;
was organized at Workshop Room 7 from 2:00 pm to 3:30 pm on 13
November, 2015. The discussion was focused on the increasing risk to
openness of the internet and the ability of present &amp;amp; future
generations to use technology to improve their lives. The panel shred
different perspectives about the future co-development
of FOSS and a free, open Internet; the threats that are emerging; and
ways for communities to surmount these. Sunil
Abraham emphasised the importance of free software, open standards,
open access and access to knowledge and the lack of this mandate in
the draft outcome document for upcoming WSIS+10 review and called for
inclusion of the same. Pranesh Prakash further contributed to the
discussion by emphasizing the need for free open source software with
end‑to‑end encryption and traffic level encryption based
on open standards which are decentralized and work through federated
networks. The
panellists for this discussion were the following.&lt;/p&gt;
&lt;ol&gt;
	&lt;li&gt;
&lt;p align="justify"&gt;
	Satish
	Babu, Technical Community, Chair, ISOC-TRV, Kerala, India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Judy
	Okite, Civil Society, FOSS Foundation for Africa&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Mishi
	Choudhary, Private Sector, Software Freedom Law Centre, New York&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Fernando
	Botelho, Private Sector, heads F123 Systems, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Sunil
	Abraham, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Pranesh
	Prakash, CIS
	India&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Nnenna
	Nwakanma- WWW.Foundation&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Yves
	MIEZAN EZO, Open Source strategy consultant&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Corinto
	Meffe, Advisor to the President and Directors, SERPRO, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Frank
	Coelho de Alcantara, Professor, Universidade Positivo, Brazil&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="justify"&gt;
	Caroline
	Burle, Institutional and International Relations, W3C Brazil Office
	and Center of Studies on Web Technologies&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;
Detailed
description of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals" target="_top"&gt;http://www.intgovforum.org/cms/workshops/list-of-published-workshop-proposals&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Transcript
of the workshop is available here
&lt;u&gt;&lt;a href="http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7" target="_top"&gt;http://www.intgovforum.org/cms/187-igf-2015/transcripts-igf-2015/2468-2015-11-13-ws10-foss-and-a-free-open-internet-synergies-for-development-workshop-room-7&lt;/a&gt;&lt;/u&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
Video
link available here &lt;a href="https://www.youtube.com/watch?v=lwUq0LTLnDs"&gt;https://www.youtube.com/watch?v=lwUq0LTLnDs&lt;/a&gt;&lt;/p&gt;
&lt;p align="justify"&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015'&gt;https://cis-india.org/internet-governance/blog/summary-report-internet-governance-forum-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Civil Society</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-11-30T10:47:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel">
    <title>Stop Press Carousel </title>
    <link>https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel</link>
    <description>
        &lt;b&gt;The silent blocking of URLs by the DoT assaults freedom of expression.&lt;/b&gt;
        &lt;hr /&gt;
&lt;div class="fsptext" id="divouterfullstorytext" style="text-align: justify; "&gt;
&lt;div id="ctl00_cphpagemiddle_reparticle_ctl00_divfullstorytext"&gt;
&lt;div&gt;
&lt;p&gt;Arindam Mukherjee's article was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?284011"&gt;published&lt;/a&gt; in the Outlook on February 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Five Questions&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On what grounds did the DoT ask for a ban on the &lt;a href="http://www.outlookindia.com/article.aspx?283960" target="_blank"&gt;55 Facebook URLs&lt;/a&gt; pertaining to Afzal Guru?&lt;/li&gt;
&lt;li&gt;Why did the Gwalior court rush into blocking of &lt;a href="http://www.outlookindia.com/article.aspx?283938" target="_blank"&gt;73 URLs related to IIPM &lt;/a&gt;even though the content was very old and clearly some  of it was even prima facie non-defamatory?&lt;/li&gt;
&lt;li&gt;Why is the Gwalior court order not being made public?&lt;/li&gt;
&lt;li&gt;Why doesn’t DoT keep the whole process transparent by putting up  all its block orders on its website, giving reasons in each case?&lt;/li&gt;
&lt;li&gt;How many URLs in all has the DoT asked for a ban on so far?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: center; "&gt;***&lt;/p&gt;
&lt;p&gt;It’s the perfect recipe for a potboiler—a sudden, mysterious and  arbitrary blocking of web pages, sparked off by an irate ‘educationist’;  several upset publications (&lt;i&gt;Outlook&lt;/i&gt; included); a government  department with a blocked web page; a ministry trying to figure out how  to react to a court order that is at the root of all the action, but  which no one has been able to see.&lt;/p&gt;
&lt;p&gt;As the cliche goes, truth is often stranger than fiction—as the  affected parties discovered on February 15. That’s when it became known  that the government had sought to block 78 web pages, reportedly  following an order from a court in Gwalior. Around 73 of these articles  sought to be blocked are on the controversial Indian Institute of  Planning and Management (IIPM), promoted by self-styled management guru  Arindam Chaudhuri.&lt;/p&gt;
&lt;p&gt;What has taken everyone by surprise is how the blocks were  executed­—in a clandestine manner, without informing the affected  parties, without serving them a notice or a copy of the order, or giving  them a chance to react or defend themselves. The enormity of the ban is  evident from the list of websites targeted, which include &lt;i&gt;The Economic Times, The Indian Express, The Wall Street Journal, FirstPost, Careers360, Rediff.com&lt;/i&gt; and &lt;i&gt;Caravan&lt;/i&gt;. When it came to &lt;i&gt;Outlook&lt;/i&gt;,  there was a clear case of overreach, as not just the web pages, but the  entire blogs area was blocked for more than eight hours (see Jump Cut).&lt;/p&gt;
&lt;p&gt;What is even more surprising is the smokescreen that is being  maintained over the Gwalior court order that has caused this  consternation on the Internet. At the time of going to print, no one—the  affected websites, auth­ors, lawyers or activists—had access to the  order or had seen it, and the government was evading media queries on  details of the order and the case. Despite repeated requests, the head  of the Computer Emergency Response Team (CERT), Gulshan Rai, did not  speak to &lt;i&gt;Outlook&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;So, in the absence of the order, no one even knows who the  complainant is. Sig­nificantly, IIPM’s Chaudhuri has said that one of  his ‘channel partners’ app­roached the court, though he clearly is the  chief beneficiary of the episode. What this entire episode serves up is a  blatant use of the law to muzzle press criticism while the government  and official machinery have been willy-nilly forced to become mute  players.&lt;/p&gt;
&lt;p&gt;This surreal, Kafkaesque scenario continues apace at &lt;i&gt;Outlook&lt;/i&gt;’s  website, where on protesting the block on its blogs, the ISP said, “As  only some of the URLs are mentioned in the DoT letter, we have  reactivated the website and requested you to delete the mentioned  contents,” adding that they had “att­ached the DoT instructions  alongwith”. What they had attached was not one but two DoT orders, both  dated February 14. One was, of course, the order about the 78 URLs. The  other order came as news: an order on 55 Facebook URLs on Afzal Guru  that the DoT wanted blocked.&lt;/p&gt;
&lt;p&gt;As expected, internet activists and advocates of freedom of speech are livid. Shivam Vij, founder of &lt;i&gt;kafila.org&lt;/i&gt;,  one of the blogs that was blocked in the IIPM matter, says, “We were  never given a chance to defend or explain. If only the DoT had put up  the notice on their website, there would have been a healthier debate on  regulation or censorship. But this was done in an opaque and arbitrary  manner. If a book is banned, everyone gets to know. Why was there so  much secrecy here?”&lt;/p&gt;
&lt;p&gt;The arbitrariness of the twin government action also stems from the  new IT Act which authorises the gov­ernment or a competent authority to  block or take down content considered “harmful”. And, according to the  law, there is no obligation on the auth­orities’ part to inform the  defendants. Cyber law expert Apar Gupta says, “Under the blocking rules,  there is nothing that says that a copy of the court order has to be  given to the aff­ected parties. The rules also do not talk about the  authors being given a chance to explain. It permits ad int­erim  injunction to block content.”&lt;/p&gt;
&lt;p&gt;Says Nikhil Pahwa, internet activist and editor of &lt;i&gt;Medianama&lt;/i&gt;,  which first reported about the IIPM blocks, “It is not clear why the  DoT has taken this cloak-and-dagger approach. These are legitimate  issues being raised by people regarding IIPM and its students. This is  an infringement on the freedom of speech and expression. The DoT should  have executed the blocks in a transparent manner by sending the affected  parties a copy of the court order and making it public.”&lt;/p&gt;
&lt;p&gt;That’s important, because legal exp­erts feel that full facts may not  have been considered in the IIPM case. “For this kind of a blocking  order, the content should have come to the notice of the plaintiff  recently. In this case, most of the content was much older. But  sometimes plaintiffs also do not provide full details in a case,” says  Gupta. Lawyers also feel that the Gwalior court may not be equipped to  deal with litigation on new technologies.&lt;/p&gt;
&lt;p&gt;There are other issues. In the IIPM case, the issue is primarily of  defamation. But it is not clear whether defamation was established in  all the articles that were sought to be taken down, especially a  University Grants Commission (UGC) notice. Thus, the evidence that was  presented to the court is important. Once again, till the court order  becomes public, no one will know who the complainant was or what  evidence was presented. The temporary ban on UGC’s web page is  particularly surprising—and this has been noted by Shashi  Tharoor—considering it is an independent regulator. “The regulatory  body’s job is to regulate and nobody considers its notice as  defamatory,” says Parminder Jeet Singh of IT for Change, an organisation  dealing with internet issues.&lt;/p&gt;
&lt;p&gt;The real purpose of such exercises, say experts, is to create a scare  and embroil people in the legal process so that the process itself  becomes a punishment and acts as a deterrent to others to engage in such  writing. And that is why such cases are filed in remote and unusual  destinations like Gwalior, Silchar, Dehradun and Guwahati. “There is a  concept of forum shopping and forum shifting where cases are filed at  remote destinations and by asking for huge damages, an attempt is made  to scare people away from free speech. There are also many bullies who  use defamation to create a scare effect. IIPM seems to have pioneered  forum shopping in India,” says Sunil Abraham, executive director of the  Bangalore-based Centre for Internet and Society (CIS).&lt;/p&gt;
&lt;p&gt;The problem, everyone agrees, stems from the faulty nature of the  Information Technology Act, which is open to interpretation and misuse.  Says Singh, “The law tries to cover everything under a single head. It  does not look specifically at the nuances of new media and give an  appropriate response. So it is misused.” It is time that DoT became  transparent and stopped its arbitrary, covert war against freedom of  expression.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel'&gt;https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-06T04:27:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
