<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/irc17-call"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/public-consultation-for-the-first-draft-of-government-open-data-use-license-india-announced"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-national-geospatial-policy-draft-v-1-0-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators">
    <title>RBI Directions on Account Aggregators </title>
    <link>https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators</link>
    <description>
        &lt;b&gt;The Reserve Bank of India's (RBI) Directions for account aggregator services in India seem to lay great emphasis on data security by allowing only direct access between institutions and do away with data scraping techniques.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;These days’ people have access to various financial services and manage their finances in a diverse manner while dealing with a large number of financial service providers, each providing one or more services that the user may need such as banking, credit card services, investment services, etc. This multiplicity of financial service providers could make it inconvenient for the users to keep track of their finances since all the information cannot be provided at the same place. This problem is sought to be solved by the account aggregators by providing all the financial data of the user at a single place. Account aggregation is the consolidation of online financial account information (e.g., from banks, credit card companies, etc.) for online retrieval at one site. In a typical arrangement, an intermediary (e.g., a  portal) agrees with a third party service provider to provide the service to consumers, the intermediary would then generally privately label the service and offer consumers access to it at the intermediary’s website.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; There are two major ways in which account aggregation takes place, (i) &lt;i&gt;direct access&lt;/i&gt;: wherein the account aggregator gets direct access to the data of the user residing in the computer system of the financial service provider; and (ii) &lt;i&gt;scraping&lt;/i&gt;: where the user provides the account aggregator the username and password for its account in the different financial service providers and the account aggregator scrapes the information off the website/portal of the different financial service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since account aggregation involves the use and exchange of financial information there could be a number of potential risks associated with it such as (i) loss of passwords; (ii) frauds; (iii) security breaches at the account aggregator, etc. It is for this reason that on the advice of the Financial Stability and Development Council,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; the Reserve Bank of India (“&lt;b&gt;RBI&lt;/b&gt;”) felt the need to regulate this sector and on September 2, 2016 issued the Non-Banking Financial Company - Account Aggregator (Reserve Bank) Directions, 2016 to provide a framework for the registration and operation of Account Aggregators in India (the “&lt;b&gt;Directions&lt;/b&gt;”). The Directions provide that no company shall be allowed to undertake the business of account aggregators without being registered with the RBI as an NBFC-Account Aggregator. The Directions also specify the conditions that have to be fulfilled for consideration of an entity as an Account Aggregator such as:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;the company should have a net owned fund of not less than rupees two crore, or such higher amount as the Bank may specify;&lt;/li&gt;
&lt;li&gt;the company should have the necessary resources and wherewithal to offer account aggregator services;&lt;/li&gt;
&lt;li&gt;the company should have adequate capital structure to undertake the business of an account aggregator;&lt;/li&gt;
&lt;li&gt;the promoters of the company should be fit and proper individuals;&lt;/li&gt;
&lt;li&gt;the general character of the management or proposed management of the company should not be prejudicial to the public interest;&lt;/li&gt;
&lt;li&gt;the company should have a plan for a robust Information Technology system;&lt;/li&gt;
&lt;li&gt;the company should not have a leverage ratio of more than seven;&lt;/li&gt;
&lt;li&gt;the public interest should be served by the grant of certificate of registration; and&lt;/li&gt;
&lt;li&gt;Any other condition that made be specified by the Bank from time to time.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Direction further talk about the responsibilities of the Account Aggregators and specify that the account aggregators shall have the duties such as: (a) Providing services to a customer based on the customer’s explicit consent; (b) Ensuring that the provision of services is backed by appropriate agreements/ authorisations between the Account Aggregator, the customer and the financial information providers; (c) Ensuring proper customer identification; (d) Sharing the financial information only with the customer or any other financial information user specifically authorized by the customer; (e) Having a Citizen's Charter explicitly guaranteeing protection of the rights of a customer.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Account Aggregators are also prohibited from indulging in certain activities such as: (a) Support transactions by customers; (b) Undertaking any other business other than the business of account aggregator; (c) Keeping or “residing” with itself the financial information of the customer accessed by it; (d) Using the services of a third party for undertaking its business activities; (e) Accessing user authentication credentials of customers; (f) Disclosing or parting with any information that it may come to acquire from/ on behalf of a customer without the explicit consent of the customer.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The fact that there is a prohibition on the information accessed from actually residing with the Account Aggregator will ensure greater security and protection of the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent Framework&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions specify that the function of obtaining, submitting and managing the customer’s consent should be performed strictly in accordance with the Directions and that no information shall be retrieved, shared or transferred without the explicit consent of the customer.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; The consent is to be taken in a standardized artefact, which can also be obtained in electronic form,&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; and shall contain details as to (i) the identity of the customer and optional contact information; (ii) the nature of the financial information requested; (iii) purpose of collecting the information; (iv) the identity of the recipients of the information, if any; (v) URL or other address to which notification needs to be sent every time the consent artefact is used to access information; (vi) Consent creation date, expiry date, identity and signature/ digital signature of the Account Aggregator; and (vii) any other attribute as may be prescribed by the RBI.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The account aggregator is required to inform the customer of all the necessary attributes to be contained in the consent artefact as well as the customer’s right to file complaints with the relevant authorities.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The customers shall also be provided an option to revoke consent to obtain information that is rendered accessible by a consent artefact, including the ability to revoke consent to obtain parts of such information.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Comments: While the Directions have specific provisions regarding how the financial data shall be dealt with, it is pertinent to note that the actual consent artefact also has personal information and it is not clear whether Account Aggregators are allowed disclose that information to third parties are not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure and sharing of financial information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Financial information providers such as banks, mutual funds, etc. are allowed to share information with account aggregators only upon being presented with a valid consent artifact and also have the responsibility to verify the consent as well as the credentials of the account aggregator.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; Once the verification is done, the financial information provider shall digitally sign the financial information and transmit the same to the Account Aggregator in a secure manner in real time, as per the terms of the consent.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; In order to ensure smooth flow of data, the Directions also impose an obligation on financial information providers to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;implement interfaces that will allow an Account Aggregator to submit consent artefacts, and authenticate each other, and enable secure flow of financial information;&lt;/li&gt;
&lt;li&gt;adopt means to verify the consent including digital signatures;&lt;/li&gt;
&lt;li&gt;implement means to digitally sign the financial information; and&lt;/li&gt;
&lt;li&gt;maintain a log of all information sharing requests and the actions performed pursuant to such requests, and submit the same to the Account Aggregator.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Comments: The Directions provide that the Account Aggregator will not support any transactions by the customers and this seems to suggest that in case of any mistakes in the information the customer would have to approach the financial information provider and not the Account Aggregator.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Use of Information&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions provide that in cases where financial information has been provided by a financial information provider to an Account Aggregator for transferring the same to a financial information user with the explicit consent of the customer, the Account Aggregator shall transfer the same in a secure manner in accordance with the terms of the consent artefact only after verifying the identity of the financial information user.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Such information, as well as information which may be provided for transferring to the customer, shall not be used or disclosed by the Account Aggregator or the Financial Information user except as specified in the consent artefact.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions specify that the business of an Account Aggregator will be entirely Information Technology (IT) driven and they are required to adopt &lt;b&gt;required IT framework&lt;/b&gt; and interfaces to ensure secure data flows from the financial information providers to their own systems and onwards to the financial information users.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This technology should also be scalable to cover any other financial information or financial information providers as may be specified by the RBI in the future.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; The IT systems should also have adequate safeguards to ensure they are protected against unauthorised access, alteration, destruction, disclosure or dissemination of records and data.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Information System Audit of the internal systems and processes should be in place and be conducted at least once in two years by CISA certified external auditors whose report is to be submitted to the RBI.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; The Account Aggregators are prohibited from asking for or storing customer credentials (like passwords, PINs, private keys) which may be used for authenticating customers to the financial information providers and their access to customer’s information will be based only on consent-based authorisation (for scraping).&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Grievance Redressal&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions require the Account Aggregator to put in place a policy for handling/ disposal of customer grievances/ complaints, which shall be approved by its Board and also have a dedicated set-up to address customer grievances/ complaints which shall be handled and addressed in the manner prescribed in the policy.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The Account Aggregator also has to display the name and details of the Grievance Redressal Officer on its website as well as place of business.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Supervision&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions require the Account Aggregators to put in place various internal checks and balances to ensure that the business of the Account Aggregator does not violate any laws or regulations such as constitution of an Audit Committee, a Nomination Committee to ensure the “fit and proper” status of its Directors, a Risk Management Committee and establishment of a robust and well documented risk management framework.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; The Risk Management Committee is required to (a) give due consideration to factors such as reputation, customer confidence, consequential impact and legal implications, with regard to investment in controls and security measures for computer systems, networks, data centres, operations and backup facilities; and b) have oversight of technology risks and ensure that the organisation’s IT function is capable of supporting its business strategies and objectives.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; Further the RBI also has the power to inspect any Account Aggregator at any time.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions themselves do not provide for any penalties for non compliance, however since the Directions are issued under Section 45JA of the Reserve Bank of India Act, 1934 (“&lt;b&gt;RBI Act&lt;/b&gt;”), this means that any contravention of these directions will be punishable under Section 58B of the RBI Act which provides for an imprisonment of upto 3 years as well as a fine for any contravention of such directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Directions by the RBI provide a number of regulations and checks on Account Aggregators with the view to ensure safety of customer financial data. These Directions appear to be quite trendsetting in the sense that in most other jurisdictions such as the United States or even Europe there are no specific regulations governing Account Aggregators but their activities are mainly being governed under existing privacy or consumer protection legislations.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The entire regulatory regime for Account Aggregators seems to suggest that the RBI wants Account Aggregators to be like funnels to channel information from various platforms right to the customer (or financial information user) and it does not want to take a chance with the information actually residing with the Account Aggregators. Further, by prohibiting Account Aggregators from accessing user authentication credentials, the RBI is trying to eliminate the possibility of this information being leaked or stolen. Although this may make it more onerous for Account Aggregators to provide their services, it is a great step to ensure the safety and security of customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent months the RBI has been trying to actively engage with the various new products being introduced in the financial sector owing to various technological advancements, be it the circular informing the public about the risks of virtual currencies including Bitcoin, the consultation paper on P2P lending platforms or these current guidelines on Account Aggregators. These recent actions of the RBI seem to suggest that the RBI is well aware of various technological advancements in the financial sector and is keeping a keen eye on these technologies and products, but appears to be taking a cautious and weighted approach regarding how to deal with them.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Ann S. Spiotto, &lt;i&gt;Financial Account Aggregation: The Liability Perspective&lt;/i&gt;, Fordham Journal of Corporate &amp;amp; Financial Law, 2006, Volume 8, Issue 2, Article 6, available at &lt;a href="http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1181&amp;amp;context=jcfl"&gt;http://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1181&amp;amp;context=jcfl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=34345"&gt;https://rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=34345&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Clause 4.2.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Clause 5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Clause 5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Clauses 6.1 and 6.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Clause 6.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Clause 6.3 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Clause 6.5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Clause 6.6 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Clauses 7.1 and 7.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Clauses 7.3 and 7.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Clause 7.5 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Clause 7.6.1 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Clause 7.6.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Clause 9(a) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Clause 9(c) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Clause 9(d) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Clause 9(f) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; Clause 9(b) of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Clauses 10.1 and 10.2 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Clause 10.3 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Clauses 12.2, 12.3 and 12.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Clause 12.4 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Clause 15 of the Directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;a href="http://www.canadiancybersecuritylaw.com/2016/07/german-regulator-finds-banks-data-rules-impede-non-bank-competitors/"&gt;http://www.canadiancybersecuritylaw.com/2016/07/german-regulator-finds-banks-data-rules-impede-non-bank-competitors/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators'&gt;https://cis-india.org/internet-governance/blog/rbi-directions-on-account-aggregators&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Banking</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-21T15:25:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/irc17-call">
    <title>Internet Researchers' Conference 2017 (IRC17) - Call for Sessions</title>
    <link>https://cis-india.org/raw/irc17-call</link>
    <description>
        &lt;b&gt;It gives us great pleasure to announce that the second Internet Researchers' Conference (IRC17) will take place in Bengaluru on March 03-05, 2017. It will be organised by the Centre for Internet and Society (CIS) in partnership with the Centre for Information Technology and Public Policy at the International Institute of Information Technology Bangalore (IIIT-B). It is a free and open conference. Sessions must be proposed by teams of two or more members on or before Friday, October 28. All submitted session proposals will go though an open review process, followed by each team that has proposed a session being invited to select ten sessions of their choice to be included in the Conference agenda. Final sessions will be chosen through these votes, and be announced on January 09, 2017.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;IRC17 Call for Sessions: &lt;a href="https://github.com/cis-india/irc/raw/master/IRC17_Call-for-Sessions.pdf"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;h4&gt;IRC17 Selection of Sessions: &lt;a href="http://cis-india.org/raw/irc17-selection"&gt;http://cis-india.org/raw/irc17-selection&lt;/a&gt;&lt;/h4&gt;
&lt;h4&gt;&lt;em&gt;Deadline for submission was Friday, October 28.&lt;/em&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;IRC17: Key Provocations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Two critical questions that emerged from the conversations at the previous edition of the Conference (IRC16) were about the &lt;strong&gt;digital objects of research&lt;/strong&gt;, and the &lt;strong&gt;digital/internet experiences in Indic languages&lt;/strong&gt;. As we discussed various aspects and challenges of 'studying internet in India', it was noted that we have not sufficiently explored how ongoing research methods, assumptions, and analytical frames are being challenged (if at all) by the &lt;strong&gt;becoming-digital&lt;/strong&gt; of the objects of research across disciplines: from various artifacts and traces of human and machinic interactions, to archival entries and sites of ethnography, to practices and necessities of collaboration.&lt;/p&gt;
&lt;p&gt;We found that the analyses of such &lt;strong&gt;digital objects of research&lt;/strong&gt; often tend to assume either an aesthetic and functional &lt;strong&gt;uniqueness&lt;/strong&gt; or &lt;strong&gt;sameness&lt;/strong&gt; vis-à-vis the pre-/proto-digital objects of research, while neither of these positions are discussed in detail. Further, we tend to universalise the English-speaking user's/researcher's experience of working with such digital objects, without sufficiently considering their lives and functions in other (especially, Indic) languages.&lt;/p&gt;
&lt;p&gt;These we take as the key provocations of the 2017 edition of IRC:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How does the &lt;strong&gt;becoming-digital&lt;/strong&gt; of the research objects challenge our current research practices, concerns, and assumptions?&lt;/li&gt;
&lt;li&gt;How do we appreciate, study, and theorise the functioning of and meaning-making by digital objects in &lt;strong&gt;Indic languages&lt;/strong&gt;?&lt;/li&gt;
&lt;li&gt;What &lt;strong&gt;research tools and infrastructures&lt;/strong&gt; are needed to study, document, annotate, analyse, archive, cite, and work with (in general) digital objects, especially those in Indic languages?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Call for Sessions&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We invite teams of two or more researchers and practitioners to propose sessions for IRC17.  We do understand that finding team members for a session you have in mind might be difficult in certain cases. Please feel free to share initial sessions ideas on the &lt;strong&gt;researchers@cis-india&lt;/strong&gt; mailing list &lt;strong&gt;[1]&lt;/strong&gt;. Also, please keep an eye on the list to see what potential topics are being discussed.&lt;/p&gt;
&lt;p&gt;All sessions will be one and half hours long, and will be fully designed and facilitated by the team concerned, including moderation (if any). The sessions are expected to drive conversations on the topic concerned. They may include presentation of research papers  but this is &lt;strong&gt;not at all&lt;/strong&gt; mandatory.&lt;/p&gt;
&lt;p&gt;If you plan to organise a session structured around presentation of research papers, please note that we are exploring potential publication outlets for a collection of full-length research papers. If your session is selected for IRC17, we will notify you of guidelines to be followed for the submission and review of full-length papers prior to the conference. If you are interested in this publication possibility, &lt;strong&gt;please indicate&lt;/strong&gt; that in your session proposal submission.&lt;/p&gt;
&lt;p&gt;Sessions that involve collaborative work (either in group or otherwise), including discussions, interactions, documentation, learning, and making, are &lt;strong&gt;most welcome&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Further, we look forward to sessions conducted in &lt;strong&gt;Indic languages&lt;/strong&gt;. The proposing team, in such a case, should consider how participants who do not understand the language can participate in it. IRC organisers and other participants will play an active role in making such engagements possible.&lt;/p&gt;
&lt;p&gt;The only &lt;strong&gt;eligibility criteria&lt;/strong&gt; for proposing sessions are that they must be proposed by a &lt;strong&gt;team of at least two members&lt;/strong&gt;, and that they must engage with &lt;strong&gt;one (or more) of the three key provocations&lt;/strong&gt; mentioned above. Further, the teams whose sessions are selected for IRC17 must commit to producing at least &lt;strong&gt;one post-conference essay/documentation&lt;/strong&gt; on the topic of their session.&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;deadline&lt;/strong&gt; for submission of sessions proposals for IRC17 is &lt;strong&gt;Friday, October 28&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;To propose a session, please send the following documents (as attached text files) to &lt;strong&gt;raw[at]cis-india[dot]org&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Title and Description of the Session:&lt;/strong&gt; The session should be named in the form of a hashtag (check the IRC16 sessions for reference &lt;strong&gt;[2]&lt;/strong&gt;). The description of the session should clearly state what the key focus of the session is, and which of the three central concerns it will address. The description should be approximately &lt;strong&gt;300 words&lt;/strong&gt; long.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session plan:&lt;/strong&gt; This should describe how the session will be conducted and moderated. Any specific requirements (technical, language support, etc.) of the session should also be noted here. This should not be more than &lt;strong&gt;200 words&lt;/strong&gt; long. If your session plan involves presentation of research papers, please indicate whether you would be interested in having these papers considered for academic publication.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Documentation plan:&lt;/strong&gt; This should indicate how documentation will be done during the session, and more importantly what form the post-conference essay/documentation will take and what issue(s) it will address. This should not be more than &lt;strong&gt;100 words&lt;/strong&gt; long.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Short Abstracts (Only for Sessions with Paper Presentations):&lt;/strong&gt; If your session involves presentation of research papers, please share a &lt;strong&gt;250 words&lt;/strong&gt; abstract for each paper.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Details of the Team:&lt;/strong&gt; Please share brief biographic notes of each member of the session team, and contact details.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;&lt;strong&gt;Session Selection Process&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;October 28:&lt;/strong&gt; Deadline of submission of session proposals.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;October 31:&lt;/strong&gt; All submitted sessions will be posted on the CIS website, along with the names, biographic brief, and contact details of the members of the session teams.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;November 01 - December 24:&lt;/strong&gt; Open review period. All session teams, as well as other interested contributors, may review the submitted proposals and share comments directly with the session teams, or discuss the session on the researchers@cis-india list. The session teams may fully and continuously edit the proposal during this period, including adding/changing session teams.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;December 25:&lt;/strong&gt; Open review ends and voting begins. All session teams will select 10 sessions to be included in the IRC17 programme. The votes will be anonymous, that is which session team has voted for which set of sessions will not be made public.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;January 05:&lt;/strong&gt; Voting ends.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;January 09:&lt;/strong&gt; Announcement of selected sessions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;February 12:&lt;/strong&gt; Deadline for selected session teams to submit a detailed session plan, information about which will be shared later. If a selected session involves presentation of papers, then the draft papers are to be submitted by this date (no need to submit a detailed session plan in that case).&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Venue, Accommodation, and Travel&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The conference will take place at the International Institute of Information Technology Bangalore (IIIT-B) during March 03-05, 2017 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The conference does &lt;strong&gt;not&lt;/strong&gt; have any participation fees. The organisers will cover &lt;strong&gt;all&lt;/strong&gt; costs related to accommodation and hospitality during the conference. We look forward to offer a limited number of (domestic) travel fellowships for students and other deserving applicants. We will also confirm this on &lt;strong&gt;January 02, 2017&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;About the IRC Series&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The Researchers at Work (RAW) programme &lt;strong&gt;[4]&lt;/strong&gt; at the Centre for Internet and Society (CIS) initiated the Internet Researchers' Conference (IRC) series to address these concerns, and to create an annual temporary space in India, for internet researchers to gather and share experiences.&lt;/p&gt;
&lt;p&gt;The IRC series is driven by the following interests:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;creating discussion spaces for researchers and practitioners studying internet in India and in other comparable regions,&lt;/li&gt;
&lt;li&gt;foregrounding the multiplicity, hierarchies, tensions, and urgencies of the digital sites and users in India,
accounting for the various layers, conceptual and material, of experiences and usages of internet and networked digital media in India, and&lt;/li&gt;
&lt;li&gt;exploring and practicing new modes of research and documentation necessitated by new (digital) objects of power/knowledge.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The first edition of the Internet Researchers' Conference series was held in February 2016 &lt;strong&gt;[5]&lt;/strong&gt;. It was hosted by the Centre for Political Studies at Jawaharlal Nehru University &lt;strong&gt;[6]&lt;/strong&gt;, and was supported by the CSCS Digital Innovation Fund &lt;strong&gt;[7]&lt;/strong&gt;. The Conference was constituted by eleven discussion sessions (majority of which were organised around presentation of several papers), four workshop sessions (which involved group discussions, activities, and learnings), a book sprint over three sessions to develop an outline of a (re)sourcebook for internet researchers in India, and a concluding round table. The audio recordings and notes from IRC16 are now being compiled into an online Reader. A detailed reflection note on the IRC16 has already been published &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="https://lists.ghserv.net/mailman/listinfo/researchers"&gt;https://lists.ghserv.net/mailman/listinfo/researchers&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/irc16"&gt;http://cis-india.org/raw/irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://iiitb.ac.in/"&gt;http://iiitb.ac.in/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/"&gt;http://cis-india.org/raw/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/irc16"&gt;http://cis-india.org/raw/irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://www.jnu.ac.in/SSS/CPS/"&gt;http://www.jnu.ac.in/SSS/CPS/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/cscs-digital-innovation-fund"&gt;http://cis-india.org/raw/cscs-digital-innovation-fund&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/raw/iirc-reflections-on-irc16"&gt;http://cis-india.org/raw/iirc-reflections-on-irc16&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/irc17-call'&gt;https://cis-india.org/raw/irc17-call&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Researcher's Conference</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Learning</dc:subject>
    
    
        <dc:subject>IRC17</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-12T13:40:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india">
    <title>Submitted Comments on the 'Government Open Data Use License - India'</title>
    <link>https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india</link>
    <description>
        &lt;b&gt;The public consultation process of the draft open data license to be used by Government of India has ended yesterday. Here we share the text of the submission by CIS. It was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The following comments on the 'Government Open Data Use License - India' was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay, and submitted through the &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;MyGov portal&lt;/a&gt; on July 25, 2016. The original submission can be found &lt;a href="https://www.mygov.in/sites/default/files/mygov_146946521043358971.pdfh"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I. Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society (“&lt;strong&gt;CIS&lt;/strong&gt;”) &lt;strong&gt;[1]&lt;/strong&gt; on the draft Government Open Data Use License - India (“&lt;strong&gt;the draft licence&lt;/strong&gt;”) &lt;strong&gt;[2]&lt;/strong&gt; by the Department of Legal Affairs.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;This submission is based on the draft licence released on the MyGov portal on June 27, 2016 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS commends the Department of Ministry of Law and Justice, Government of India for its efforts at seeking inputs from various stakeholders prior to finalising its open data licence. CIS is thankful for the opportunity to have been a part of the discussion during the framing of the licence; and to provide this submission, in furtherance of the feedback process continuing from the draft licence.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;II. Overview&lt;/h2&gt;
&lt;ol start="4"&gt;
&lt;li&gt;The Centre for Internet and Society is a non-governmental organisation engaged in research and policy work in the areas of, inter alia, access to knowledge and openness. This clause-by-clause submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. Accordingly, the comments in this submission aim to further these principles and are limited to those clauses that most directly have an impact on them.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;III. Comments and Recommendations&lt;/h2&gt;
&lt;ol start="5"&gt;
&lt;li&gt;&lt;strong&gt;Name of the Licence:&lt;/strong&gt; CIS recommends naming the licence “Open Data Licence - India” to reflect the nomenclature already established for similar licences in other nations like the UK and Canada. More importantly, the inclusion of the word ‘use’ in the original name “Government Open Data Use License” is misleading, since the licence permits use, sharing, modification and redistribution of open data.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Change Language on Permissible Use of Data:&lt;/strong&gt; The draft licence uses the terms “Access, use, adapt, and redistribute,” which are used in UNESCO’s definition of open educational resources, whereas, under the Indian Copyright Act &lt;strong&gt;[4]&lt;/strong&gt;, it should cover “reproduction, issuing of copies,” etc. To resolve this difference, we suggest the following language be used: “Subject to the provisions of section 7, all users are provided a worldwide, royalty-free, non-exclusive licence to all rights covered by copyright and allied rights, for the duration of existence of such copyright and allied rights over the data or information.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Section on the Scope of Applicability of the Licence:&lt;/strong&gt; It will be useful to inform the user of the licence on its applicability. The section may be drafted as: “This licence is meant for public use, and especially by all Ministries, Departments, Organizations, Agencies, and autonomous bodies of Government of India, when publicly disclosing, either proactively or reactively, data and information created, generated, collected, and managed using public funds provided by Government of India directly or through authorized agencies.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause Specifying that the Licence is Agnostic of Mode of Access:&lt;/strong&gt; As part of the section 4 of the draft licence, titled ‘Terms and Conditions of Use of Data,’ a sub-clause should be added that specifies that users may enjoy all the freedom granted under this licence irrespective of their preferred mode of access of the data concerned, say manually downloaded from the website, automatically accessed via an API, collected from a third party involved in re-sharing of this data, accessed in physical/printed form, etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause on Non-Repudiability and Integrity of the Published Data:&lt;/strong&gt; To complement the sub-clause 6.e. that notes that data published under this licence should be published permanently and with appropriate versioning (in case of the published data being updated and/or modified), another sub-clause should be added that states that non-repudiability and integrity of published data must be ensured through application of real/digital signature, as applicable, and checksum, as applicable. This is to ensure that an user who has obtained the data, either in physical or digital form, can effectively identify and verify the the agency that has published the data, and if any parts of the data have been lost/modified in the process of distribution and/or transmission (through technological corruption of data, or otherwise).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Combine Section 6 on Exemptions and Section 7 on Termination:&lt;/strong&gt; Given that the licence cannot reasonably proscribe access to data that has already been published online, it is suggested that it would be better to simply terminate the application of the licence to that data or information that ought not to have been published for grounds provided under section 8 of the RTI Act, or have been inadvertently published. It should also be noted that section 8 of the RTI Act cannot be “violated” (as stated in Section 6.g. of the draft licence), since it only provides permission for the public authority to withhold information, and does not impose an obligation on them (or anyone else) to do so. The combined clause can read: “Upon determination by the data provider that specific data or information should not have been publicly disclosed for the grounds provided under Section 8 of the Right to Information Act, 2005, the data provider may terminate the applicability of the licence for that data or information, and this termination will have the effect of revocation of all rights provided under Section 3 of this licence.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;It will be our pleasure to discuss these submissions with the Department of Legal Affairs in greater detail, supplement these with further submissions if necessary, and offer any other assistance towards the efforts at developing a national open data licence.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf"&gt;https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india'&gt;https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-07-26T09:23:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts">
    <title> Studying Internet in India (2016): Selected Abstracts</title>
    <link>https://cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts</link>
    <description>
        &lt;b&gt;We received some great submissions and decided to select twelve abstracts, and not only ten as we planned earlier. Here are the abstracts.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Abhimanyu Roy&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;The Curious Incidents on Matrimonial Websites in India&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;What is love? Philosophers have argued over it, biologists have researched it and in the age of the internet, innovators have disrupted it. In the west, dating websites such as OKCupid and eHarmony use all manner of algorithms to find its users their optimal match. In India’s conservative society though, dating is fast-tracked or skipped altogether in favor of marriage. This gives rise to a plethora of matrimonial sites such as Jeevansathi.com and Shaadi.com. This is where things get tricky.&lt;/p&gt;
&lt;p&gt;Matrimonial websites are different from other internet-enabled services. The gravity of the decision and the major impact that it has on the lives of users brings in pressure and a range of emotions that are not there on casual transactions such as an Uber ride or a foodpanda order. From outright fraud to online harassment newspaper back pages are filled with nightmare stories that begin on a matrimonial website. So much so, that in November of last year, the Indian government decided to set up a panel to regulate matrimonial sites in order to curb abuse. The essay will analyze India’s social stand on marriage, the role of matrimonial websites in modern day India, the problems this awkward amalgamation of the internet and love gives rise to and the steps authorities and matrimonial companies are taking to prevent these issues from occurring.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Anita Gurumurthy, Nandini Chami, and Deepti Bharthur&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Internet as Sutradhar: The Aesthetics and Politics of Digital Age Counter-power&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The open Internet is now a feeble, wannabe, digital age meme. The despots have grabbed it and capitalism has colonised it. But the network that engulfs its users is also a multi-headed organism; the predictables have to make peace with the unpredictables, both arising as they do with the unruly affordances of the network. The much celebrated public domain of open government data, usually meant for geeks and software gurus dedicated to the brave new 'codeful' future, has meant little for marginal subjects of India's development project. Data on government websites have been critiqued worldwide for often being too clunky to catalyse civic use or too obscure to pin down government efficacy. However, as an instrument of accountable governance, data in the public domain can help hold the line, fuelling vanguard action to foster democracy. Activists engaged in the right to food movement in India had reason to rejoice recently when the Supreme Court of India pulled up the central government for delay in release of funds under the MGNREGA scheme and violating the food security law. The series of actions leading to this victory enjoins deeper examination of the MGNREGS website, the design principles of the MIS that generates reports based on the data, and the truth claims that arose in the contingent context marking this struggle. &lt;em&gt;What were the ingredients of this happy irony; the deployment of the master's tools to disband the master's house? What aesthetics and principles made for a public data structure that allowed citizens to hack into state impunity? And what do such practices around the digital tell us about the performativity of the Internet - not as a grand, open, phenomenon for the network to access the multitude, but as the inane, local, Sutradhar (alchemist who produces the narrative), who allows truths to be told?&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Aishwarya Panicker&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;How Green is the Internet? The Good, the Bad and the Ugly&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Groceries at your doorstep, data on your fingertips, an Uber at the tap of a button and information overload- human negotiations with the internet have definitely changed drastically in the past few decades. Research in the area, too, has transformed to not just the supply of internet to the masses, but has evolved to include innovative and revolutionary ideas in terms of internet infrastructure and governance. With over 3.2 Billion internet users in the world, and over 400 million of these from India, this is no surprise.&lt;/p&gt;
&lt;p&gt;However, while environmental sustainability remains at the forefront of many-a-government, there is little data / debate / analysis / examination of the environmental impact of the internet. This is true especially for India. In 2011, Joel Gombiner wrote an academic paper on the problem of the Internets carbon footprint, with a premise based on the lesser known fact that the ICT industry has been ‘responsible for two to four percent of the global greenhouse gas emissions’- an area that the Climate Group’s Smart 2020 report had focused on back in 2008 as well. Clearly this is a war on the environment that is yet to receive large-scale attention.&lt;/p&gt;
&lt;p&gt;How can we move beyond particular fascinations with the internet and engage holistically with the internet? By moving towards a dimension of internet infrastructure studies, that has large policy and implementation benefits. This paper, then, will seek to elucidate four central issue areas: first, as the third highest country in terms of internet use, what is the current environmental impact of internet usage in India? Second, are there any regulatory provisions that give prescriptive measures to data centres and providers?  Third, do any global standards
exist in this regard and finally, what future steps can be taken (by the government, civil society
and individuals) to address this?&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Deepak Prince&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;One of the most important effects of increasing internet connectivity coupled with universal electronic display screens, multimedia digital objects and supple graphic interfaces, is the proliferation of systems of enunciation. The business letter, typewriter, electric telegraph and radio, each in its own time, transformed how humans make sense in different forms of writing. Some of these survive to this day (forms of address from letters, the abbreviations and ‘cablese’ from telegraph operators etc). Now, we find new spaces of networked sociality emerging at rapid speeds, and everyday, we forget many others that are now outdated, no longer ‘supported’ or desired. How does one study this supple flow of discourse? Deleuze and Guattari’s concept of tracing collective assemblages of enunciation (the structuring structures of discourse) and Gilbert Simondon’s Law of relaxation (where technical elements created by complex ensembles are released into a path of technological evolution where they may or may not crystallize the formation of new ensembles) are two philosophical notions that seek to address this problem. The anthropologist Ilana Gershon suggests that new social media platforms like Facebook have a detrimental effect on sociality because they impose a neo-liberal notion of personhood on its users, through the interface. I take this as my point of departure, and based on ethnographic fieldwork conducted at a new media marketing agency, I attempt to draw out how ‘posting’ is modulated on facebook, about how subjectivity is configured within the complex matrix comprising a constant flow of posts, the economy of ‘liking’, algorithmic sorting and affects that do not cross the threshold of the screen.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Maitrayee Mukerji&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;By some latest estimates, around 35% of the population access the Internet in India using multiple devices. As Indians browse, search, transact and interact online, one can observe the increasing intertwining of the Internet in their everyday lives. But, how much do we know about the influence and impact of the Internet on Indian and in India? Advances in big data technologies provide an exciting opportunity for social science researchers to study the Internet. So, trends can be detected, opinions and sentiments can be calibrated, social networks can be discovered by using technologies for collecting and mining data on people online. But are social science researchers in India equipped enough to do a rigorous and detailed study of the India? Leaving aside debates on epistemology, ontology and methodology of researching Internet using big data analytics, the very first challenge is
limited access to data. A cursory scan of the available research would indicate that the data – tweets, trends, comments, memes etc. have generally been collected manually. The bulk of the data is collected by private companies and available either at a price or by writing programs to access them through APIs. The latter allows only limited extraction of data and more often than not has a learning curve. Access to raw data, through institutional repositories or special permission, if available is only to select few. Legal and ethical issues arise if one considers scrapping websites for data. The essay is an attempt to articulate the challenges in accessing data while making attempts to study the Internet using big data analytics.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Muhammed Afzal P&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Internet Memes as Effective Means of Social and Political Criticism&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;By looking at the user-generated memes posted from the Malayalam Facebook pages “Troll Malayalam” and “International Chalu Union”, this essay argues that political memes function as effective means of social and political criticism in Kerala. In a society where conversations often tend to feature examples from popular films, memes from these pages use images from popular culture including television to respond to current affairs as well as contemporary social and political questions. Often described mistakenly as 'trolls' by the practitioners themselves, a major portion of the memes have a progressive content in terms of discussing questions related to religion, sexuality, nationalism, etc. It won’t be an exaggeration to state that many Malayalis see these memes as instant 'news analysis' of current affairs.  The argument of this essay will be advanced through an analysis of the memes that were produced in relation to contemporary socio-political and cultural questions such as beef ban, the rise of right-wing politics in Kerala, the question of religious conservatism, etc. Through this the essay seeks to investigate how internet memes creatively contribute to social movements and also to see how critical questions in cultural criticism are translated into "the popular.'&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Dr. Ravikant Kisana&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Archetyping the 'Launda' Humor on the Desi Internet&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Humor on the internet has proven a massive social unifying force for young, upper class Indian millennials. The humor is not just consumed via Western (mainly US) humor collectives such as 9GAG, Cracked, etc - the proliferation of 'Indian' humor pages on the Facebook and the countless YouTube comedy channels is testament to the localisation of this content. However, the humor which is seen as a unifying force is largely 'launda' aka. 'heteronormative-upper caste-male' in its sensibilities. Comedy collectives like TVF, with its popular channel 'Q-tiyapa' had to create a separate handle 'Girliyapa' to cater to feminist themes. The idea is that humor by default is male, and 'feminist humor' needs a separate space.&lt;/p&gt;
&lt;p&gt;This essay seeks to study the 'launda'-cultural attributes of online Indian humor. It will seek to document and wean archetypes of comedy tropes which fit this mode. The area of the documentation will be YouTube comedy channels and Facebook humor pages—however, the same can be extended to Twitter handles and the suchlike.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Siddharth Rao and Kiran Kumar&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Chota Recharge and the Chota Internet&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Uniform ​and affordable Internet is emerging as one of the fundamental civil rights in developing countries. However in India, the connectivity is far from uniform across the regions, where the disparity is evident in the infrastructure, the cost of access and telecommunication services to provide Internet facilities among different economic classes. In spite of having a large mobile user base, the mobile Internet are still remarkably slower in some of the developing  countries. Especially in India, it falls below 50% even in comparison with the performance of its  developing counterparts!&lt;/p&gt;
&lt;p&gt;This essay presents a study of connectivity and performance trends based on an exploratory analysis of mobile Internet measurement data from India. In order to assess the state of mobile networks and its readiness in adopting the different mobile standards (2G, 3G, and 4G) for commercial use, we discuss the spread, penetration, interoperability and the congestion trends.&lt;/p&gt;
&lt;p&gt;Based on our analysis, we argue that the network operators have taken negligible measures to scale the mobile Internet. Affordable Internet is definitely for everyone. But, the affordability of the Internet in terms of cost  
does not necessarily imply the rightful access to Internet services. Chota recharge is possibly leading us to chota (shrunken) Internet!&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Smarika Kumar&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Why Mythologies are Crucial to Understand Governance on the Internet: The Case of Online Maps&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;How does one study internet in India? This essay proposes to provide one possible answer to this question through its central argument that internet, like other technologies, is very much a part of a “mythological” or “fictional” narrative of the history of this country, and without an understanding of these mythologies, the development of internet governance in the country cannot be hoped to be understood. This central argument is traced in the essay through the debates and discussions on law and policymaking around online maps. The essay, in its first part, explores what a “mythological” account of the history of India might mean, and what role technological developments play in it. It does so by tracing the narrative of mapmaking in medieval India and its deep ties with magic, secrecy and mythical stories. It then surveys how modern mapping surveys in the colonial period interacted with the idea of the “native”, and argues that such interactions created a dichotomy between “native” sciences, folklore on the one hand, and colonial achievements, national security on the other. It argues that it is this latter strand of a certain “national security” vision of technology which found dominant voice in the regulation
of maps in India post-independence, yet the sense of the unknown, mystical, or “mythological” in such technological deployment as mapmaking requires, survived. The essay finally uses such evidence to trace how even in online
interactions, and internet governance design in India- this aspect of the mystical and the fear of it often sustains, driven by a (repressed?) memory of mythology, through the use of analogies. And it is within this twilight
zone, within this frontier between “mythology” and nation-building, that a governance design for online maps is being presently constructed in India. The essay then argues that it becomes crucial to understand such mythologies around technology generally and internet specifically and the manner they interact with law and policymaking in order to really get a sense of a 21st century India’s experience of the internet.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Sujeet George&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Understanding Reddit: The Indian Context&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Even as social networking sites like Facebook and Twitter seek to carve a niche within the Indian social media landscape, the presence and impact of news aggregator website reddit seems relatively unnoticed. Known for its excessive self­-referentiality and inability to emerge from a restricted pool of informational flow, reddit nevertheless has come to be a major focal point of convergence of news and public opinion, especially in the United States. The web interface, which allows for users with overlapping interests to converge under a common platform namely the “subreddit,” allows the possibility of understanding questions of user taste and the directions in which information and user attention flow.&lt;/p&gt;
&lt;p&gt;This paper seeks to offer a preliminary gesture towards understanding reddit’s usage and breadth in the Indian context. Through an analysis of the “India” subreddit and examining the manner and context in which information and ideas are shared, proposed, and debunked, the paper aspires to formulate a methodology for interrogating sites like reddit that offer the possibilities of social mediation, even as users maintain a limited amount of privacy. At the 
same time, to what extent can such news aggregator sites direct the ways in which opinions and news flows change course as a true marker of information generation responding to user inputs.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Supratim Pal&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;India, being a multilingual country, owes a lot to the Internet for adding words to the vocabulary of everyday use in different languages.&lt;/p&gt;
&lt;p&gt;This paper would critically examine how Net words like "selfie", "wall", "profile" and others have changed the way Indians write or talk. For example, a word like "nijaswi" was not there in Bengali language five years back but is used across several platforms as a translation of "selfie".&lt;/p&gt;
&lt;p&gt;On one hand, computer-mediated communication (CMC) has helped us to express in short messages and on the other, we all have picked up use of punctuation marks like colon or a semicolon to express our emotion - which have got another name, "emoticons".&lt;/p&gt;
&lt;p&gt;The paper would be more practical in approach than theoretical. For example, it would feature chat (another example of CMC) conversations 10 years ago when hardly an emoticon was used, and that of today's when we cannot think of a chat without a "smiley" or a "sticker". Even the linguist, David Crystal, probably could not have thought that in 15 years, the language (not just lingua franca, English) would change worldwide since he first tried to theorize Internet language in 2001.&lt;/p&gt;
&lt;p&gt;Today, a linguist need not to have a proper publication to introduce a word in any language but Netizens can re-invent words like "troll" or "roast" to criticize one or "superlike" to celebrate an achievement or even "unfriend" someone to just relax.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Surfatial&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Surfatial is a trans-local collective that operates through the internet. We use conversations to aid learning outside established structures. We are concerned with enabling disinhibition through the internet, for expressing
what may not be feasible in physical reality. What role does partial or complete anonymity play in this process of seeking “safe” zones of expression? Fake profiles on social media offer such zones, while perhaps also operating to propagate, mislead or troll.&lt;/p&gt;
&lt;p&gt;Our essay would argue:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;That there is a desire to participate in speculative fora in the Indian cultural context and the internet has created space for philosophical questioning among contemporary Indian participants which can develop further, despite common assertions that online spaces are largely uncivil and abusive.&lt;/li&gt;
&lt;li&gt;That anonymous and pseudonymous content production offers a method for exploring and expressing with a certain degree of freedom.&lt;/li&gt;
&lt;li&gt;Spam-like methods used in sub-cultural outreach efforts on social media have proved effective in puncturing filter bubbles.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Our essay would be drawn from experiments via Surfatial’s online engagement platforms (Surfatial’s Study groups and post_writer project) to examine:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Extent of participation.&lt;/li&gt;
&lt;li&gt;Disinhibition facilitation and dialoguing.&lt;/li&gt;
&lt;li&gt;Reach.&lt;/li&gt;
&lt;li&gt;Emergence and development of ideas.&lt;/li&gt;
&lt;li&gt;Creating an archive of internet activity and re-processing it into new forms of presentation.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts'&gt;https://cis-india.org/raw/studying-internet-in-india-2016-selected-abstracts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    

   <dc:date>2016-07-06T06:24:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data">
    <title>CIS Submission to TRAI Consultation on Free Data</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data</link>
    <description>
        &lt;b&gt;The Telecom Regulatory Authority of India (TRAI) held a consultation on Free Data, for which CIS sent in the following comments.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulatory Authority of India (TRAI) asked for &lt;a href="http://trai.gov.in/WriteReadData/ConsultationPaper/Document/CP_07_free_data_consultation.pdf"&gt;public comments on free data&lt;/a&gt;. Below are the comments that CIS submitted to the four questions that it posed.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="question-1"&gt;Question 1
&lt;p&gt;&lt;em&gt;Is there a need to have TSP agnostic platform to provide free data or suitable reimbursement to users, without violating the principles of Differential Pricing for Data laid down in TRAI Regulation? Please suggest the most suitable model to achieve the objective.&lt;/em&gt;&lt;/p&gt;
&lt;/h2&gt;
&lt;h3 id="is-there-a-need-for-free-data"&gt;Is There a Need for Free Data?&lt;/h3&gt;
&lt;p&gt;No, there is no &lt;em&gt;need&lt;/em&gt; for free data, just as there is no &lt;em&gt;need&lt;/em&gt; for telephony or Internet. However, making provisions for free data would increase the amount of innovation in the Internet and telecom sector, and there is a good probability that it would lead to faster adoption of the Internet, and thus be beneficial in terms of commerce, freedom of expression, freedom of association, and many other ways.&lt;/p&gt;
&lt;p&gt;Thus the question that a telecom regulator should ask is not whether there is a &lt;em&gt;need&lt;/em&gt; for TSP agnostic platforms, but whether such platforms are harmful for competition, for consumers, and for innovation. The telecom regulator ought not undertake regulation unless there is evidence to show that harm has been caused or that harm is likely to be caused. In short, TRAI should not follow the precautionary principle, since the telecom and Internet sectors are greatly divergent from environmental protection: the burden of proof for showing that something ought to be prohibited ought to be on those calling for prohibition.&lt;/p&gt;
&lt;h3 id="goal-regulating-gatekeeping"&gt;Goal: Regulating Gatekeeping&lt;/h3&gt;
&lt;p&gt;TRAI wouldn’t need to regulate price discrimination or Net neutrality if ISPs were not “gatekeepers” for last-mile access. “Gatekeeping” occurs when a single entity establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for Internet services to reach their end customers without passing through ISPs (generally telecom networks). The situation is very different in the middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in “transit agreements”, a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and is thus inefficient in a way). However, this multiplicity of routes is generally not possible in the last mile.&lt;a id="fnref1" class="footnoteRef" href="#fn1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications, while harming consumer choice.&lt;/p&gt;
&lt;p&gt;However, the aim of regulation by TRAI cannot be to prevent gatekeeping, since that is not possible as long as there are a limited number of ISPs. For instance, even by the very act of charging money for access to the Internet, ISPs are guilty of “gatekeeping” since they are controlling who can and cannot access an Internet service that way. Instead, the aim of regulation by TRAI should be to “regulate gatekeepers to ensure they do not use their gatekeeping power to unjustly discriminate between similarly situated persons, content or traffic”, as we proposed in our submission to TRAI (on OTTs) last year.&lt;/p&gt;
&lt;h3 id="models-for-free-data"&gt;Models for Free Data&lt;/h3&gt;
&lt;p&gt;There are multiple models possible for free data, none of which TRAI should prohibit unless it would enable OTTs to abuse their gatekeeping powers.&lt;/p&gt;
&lt;h4 id="government-incentives-for-non-differentiated-free-data"&gt;Government Incentives For Non-Differentiated Free Data&lt;/h4&gt;
&lt;p&gt;The government may opt to require all ISPs to provide free Internet to all at a minimum QoS in exchange for exemption from paying part of their USO contributions, or the government may pay ISPs for such access using their USO contributions.&lt;/p&gt;
&lt;p&gt;TRAI should recommend to DoT that it set up a committee to study the feasibility of this model.&lt;/p&gt;
&lt;h4 id="isp-subsidies"&gt;ISP subsidies&lt;/h4&gt;
&lt;p&gt;ISP subsidies of Internet access only make economic sense for the ISP under the following ‘Goldilocks’ condition is met: the experience with the subsidised service is ‘good enough’ for the consumers to want to continue to use such services, but ‘bad enough’ for a large number of them to want to move to unsubsidised, paid access.&lt;/p&gt;
&lt;ol style="list-style-type: decimal;"&gt;
&lt;li&gt;Providing free Internet to all at a low speed.
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;This naturally discriminates against services and applications such as video streaming, but does not technically bar access to them.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Providing free access to the Internet with other restrictions on quality that aren’t discriminatory with respect to content, services, or applications.&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="rewards-model"&gt;Rewards model&lt;/h4&gt;
&lt;p&gt;A TSP-agnostic rewards platform will only come within the scope of TRAI regulation if the platform has some form of agreement with the TSPs, even if it is collectively. If the rewards platform doesn’t have any agreement with any TSP, then TRAI does not have the power to regulate it. However, if the rewards platform has an agreement with any TSP, it is unclear whether it would be allowed under the Differential Data Tariff Regulation, since the clause 3(2) read with paragraph 30 of the Explanatory Memorandum might disallow such an agreement.&lt;/p&gt;
&lt;p&gt;Assuming for the sake of argument that platforms with such agreements are not disallowed, such platforms can engage in either post-purchase credits or pre-purchase credits, or both. In other words, it could be a situation where a person has to purchase a data pack, engage in some activity relating to the platform (answer surveys, use particular apps, etc.) and thereupon get credit of some form transferred to one’s SIM, or it could be a situation where even without purchasing a data pack, a consumer can earn credits and thereupon use those credits towards data.&lt;/p&gt;
&lt;p&gt;The former kind of rewards platform is not as useful when it comes to encouraging people to use the Internet, since only those who already see worth in using in the Internet (and can afford it) will purchase a data pack in the first place. The second form, on the other hand is quite useful, and could be encouraged. However, this second model is not as easily workable, economically, for fixed line connections, since there is a higher initial investment involved.&lt;/p&gt;
&lt;h4 id="recharge-api"&gt;Recharge API&lt;/h4&gt;
&lt;p&gt;A recharge API could be fashioned in one of two ways: (1) via the operating system on the phone, allowing a TSP or third parties (whether OTTs or other intermediaries) to transfer credit to the SIM card on the phone which have been bought wholesale. Another model could be that of all TSPs providing a recharge API for the use of third parties. Only the second model is likely to result in a “toll-free” experience since in the first model, like in the case of a rewards platform that requires up-front purchase of data packs, there has to be a investment made first before that amount is recouped. This is likely to hamper the utility of such a model.&lt;/p&gt;
&lt;p&gt;Further, in the first case, TRAI would probably not have the powers to regulate such transactions, as there would be no need for any involvement by the TSP. If anti-competitive agreements or abuse of dominant position seems to be taking place, it would be up to the Competition Commission of India to investigate.&lt;/p&gt;
&lt;p&gt;However, the second model would have to be overseen by TRAI to ensure that the recharge APIs don’t impose additional costs on OTTs, or unduly harm competition and innovation. For instance, there ought to be an open specification for such an API, which all the TSPs should use in order to reduce the costs on OTTs. Further, there should be no exclusivity, and no preferential treatment provided for the TSPs sister concerns or partners.&lt;/p&gt;
&lt;h4 id="example-sites"&gt;“0.example” sites&lt;/h4&gt;
&lt;p&gt;Other forms of free data, for instance by TSPs choosing not to charge for low-bandwidth traffic should be allowed, as long as it is not discriminatory, nor does it impose increased barriers to entry for OTTs. For instance, if a website self-certifies that it is low-bandwidth and optimized for Internet-enabled feature phones and uses 0.example.tld to signal this (just as wap.* were used in for WAP sites and m.* are used for mobile-optimized versions of many sites), then there is no reason why TSPs should be prohibited from not charging for the data consumed by such websites, as long as the TSP does so uniformly without discrimination. In such cases, the TSP is not harming competition, harming consumers, nor abusing its gatekeeping powers.&lt;/p&gt;
&lt;h4 id="ott-agnostic-free-data"&gt;OTT-agnostic free data&lt;/h4&gt;
&lt;p&gt;If a TSP decides not to charge for specific forms of traffic (for example, video, or for locally-peered traffic) regardless of the Internet service from which that traffic emanates, as as long as it does so with the end customer’s consent, then there is no question of the TSP harming competition, harming consumers, nor abusing its gatekeeping powers. There is no reason such schemes should be prohibited by TRAI unless they distort markets and harm innovation.&lt;/p&gt;
&lt;h4 id="unified-marketplace"&gt;Unified marketplace&lt;/h4&gt;
&lt;p&gt;One other way to do what is proposed as the “recharge API” model is to create a highly-regulated market where the gatekeeping powers of the ISP are diminished, and the ISP’s ability to leverage its exclusive access over its customers are curtailed. A comparison may be drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure that this doesn’t lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs, and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it doesn’t there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;h2 id="question-2"&gt;Question 2&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether such platforms need to be regulated by the TRAI or market be allowed to develop these platforms?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In many cases, TRAI would have no powers over such platforms, so the question of TRAI regulating does not arise. In all other cases, TRAI can allow the market to develop such platforms, and then see if any of them violates the Discriminatory Data Tariffs Regualation. For government-incentivised schemes that are proposed above, TRAI should take proactive measure in getting their feasibility evaluated.&lt;/p&gt;
&lt;h2 id="question-3"&gt;Question 3&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether free data or suitable reimbursement to users should be limited to mobile data users only or could it be extended through technical means to subscribers of fixed line broadband or leased line?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Spectrum is naturally a scarce resource, though technological advances (as dictated by Cooper’s Law) and more efficient management of spectrum make it less so. However, we have seen that fixed-line broadband has more or less stagnated for the past many years, while mobile access has increased. So the market distortionary power of fixed-line providers is far less than that of mobile providers. However, competition is far less in fixed-line Internet access services, while it is far higher in mobile Internet access. Switching costs in fixed-line Internet access services are also far higher than in mobile services. Given these differences, the regulation with regard to price discrimination might justifiably be different.&lt;/p&gt;
&lt;p&gt;All in all, for this particular issue, it is unclear why different rules should apply to mobile users and fixed line users.&lt;/p&gt;
&lt;h2 id="question-4"&gt;Question 4&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Any other issue related to the matter of Consultation.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;None.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;
&lt;p&gt;In India’s mobile telecom sector, according to a Nielsen study, an estimated 15% of mobile users are multi-SIM users, meaning the “gatekeeping” effect is significantly reduced in both directions: Internet services can reach them via multiple ISPs, and conversely they can reach Internet services via multiple ISPs. &lt;em&gt;See&lt;/em&gt; Nielsen, ‘Telecom Transitions: Tracking the Multi-SIM Phenomena in India’, http://www.nielsen.com/in/en/insights/reports/2015/telecom-transitions-tracking-the-multi-sim-phenomena-in-india.html&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data'&gt;https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    

   <dc:date>2016-07-01T16:04:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/public-consultation-for-the-first-draft-of-government-open-data-use-license-india-announced">
    <title>Public Consultation for the First Draft of 'Government Open Data Use License - India' Announced</title>
    <link>https://cis-india.org/openness/public-consultation-for-the-first-draft-of-government-open-data-use-license-india-announced</link>
    <description>
        &lt;b&gt;The first public draft of the open data license to be used by Government of India was released by the Department of Legal Affairs earlier this week. Comments are invited from general public and stakeholders. These are to be submitted via the MyGov portal by July 25, 2016. CIS was a member of the committee constituted to develop the license concerned, and we contributed substantially to the drafting process.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please read the call for comments &lt;a class="external-link" href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;The PDF version of the draft license document can be accessed &lt;a class="external-link" href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;&lt;em&gt;Comments are to be submitted by July 25, 2016.&lt;/em&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h4 style="text-align: center;"&gt;&lt;strong&gt;Government Open Data Use License - India&lt;/strong&gt;&lt;/h4&gt;
&lt;h4 style="text-align: center;"&gt;&lt;strong&gt;National Data Sharing and Accessibility Policy&lt;/strong&gt;&lt;/h4&gt;
&lt;h4 style="text-align: center;"&gt;&lt;strong&gt;Government of India&lt;/strong&gt;&lt;/h4&gt;
&lt;h2&gt;1. Preamble&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Structured data available in open format and open license for public access and use, usually termed as “Open Data,” is of prime importance in the contemporary world. Data also is one of the most valuable resources of modern governance, sharing of which enables various and non-exclusive usages for both commercial and non-commercial purposes. Licenses, however, are crucial to ensure that such data is not misused or misinterpreted (for example, by insisting on proper attribution), and that all users have the same and permanent right to use the data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The open government data initiative started in India with the notification of the National Data Sharing and Accessibility Policy (NDSAP), submitted to the Union Cabinet by the Department of Science and Technology, on 17th March 2012 &lt;strong&gt;[1]&lt;/strong&gt;. The NDSAP identified the Department of Electronics &amp;amp; Information Technology (DeitY) as the nodal department for the implementation of the policy through National Informatics Centre, while the Department of Science and Technology continues to be the nodal department on policy matters. In pursuance of the Policy, the Open Government Data Platform India &lt;strong&gt;[2]&lt;/strong&gt; was launched in 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While, the appropriate open formats and related aspects for implementation of the Policy has been defined in the “NDSAP Implementation Guidelines” prepared by an inter- ministerial Task Force constituted by the National Informatics Centre &lt;strong&gt;[3]&lt;/strong&gt;, the open license for data sets published under NDSAP and through the OGD Platform remained unspecified till now.&lt;/p&gt;
&lt;h2&gt;2. Definitions&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;a. &lt;strong&gt;“Data”&lt;/strong&gt; means a representation of Information, numerical compilations and observations, documents, facts, maps, images, charts, tables and figures, concepts in digital and/or analog form, and includes metadata &lt;strong&gt;[4]&lt;/strong&gt;, that is all information about data, and/or clarificatory notes provided by data provider(s), without which the data concerned cannot be interpreted or used &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. &lt;strong&gt;“Information”&lt;/strong&gt; means processed data &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. &lt;strong&gt;“Data Provider(s)”&lt;/strong&gt; means person(s) publishing and providing the data under this license.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. &lt;strong&gt;“License”&lt;/strong&gt; means this document.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;e. &lt;strong&gt;“Licensor”&lt;/strong&gt;means any data provider(s) that has the authority to offer the data concerned under the terms of this licence.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;f. &lt;strong&gt;“User”&lt;/strong&gt; means natural or legal persons, or body of persons corporate or incorporate, acquiring rights in the data (whether the data is obtained directly from the licensor or otherwise) under this licence.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;g. &lt;strong&gt;“Use”&lt;/strong&gt; includes lawful distribution, making copies, adaptation, and all modification and representation of the data, subject to the provisions of this License.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;h. &lt;strong&gt;“Adapt”&lt;/strong&gt; means to transform, build upon, or to make any use of the data by itsre-arrangement or alteration &lt;strong&gt;[7]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;strong&gt;“Redistribute”&lt;/strong&gt; means sharing of the data by the user, either in original or in adapted form (including a subset of the original data), accompanied by appropriate attribute statement, under the same or other suitable license.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;j. &lt;strong&gt;“Attribution Statement”&lt;/strong&gt; means a standard notice to be published by all users of data published under this license, that contains the details of the provider, source, and license of the data concerned &lt;strong&gt;[8]&lt;/strong&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;k. &lt;strong&gt;“Personal Information”&lt;/strong&gt; means any Information that relates to a natural person,which, either directly or indirectly, in combination with other Information available or likely to be available with a body corporate, is capable of identifying such person &lt;strong&gt;[9]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;3. Permissible Use of Data&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Subject to the conditions listed under section 7, the user may:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Access, use, adapt, and redistribute data published under this license for all lawful and non-exclusive purposes, without payment of any royalty or fee;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Apply this license worldwide, and in perpetuity;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Access, study, copy, share, adapt, publish, redistribute and transmit the data in any medium or format; and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. Use, adapt, and redistribute the data, either in itself, or by combining it with other data, or by including it within a product/application/service, for all commercial and/or non-commercial purposes.&lt;/p&gt;
&lt;h2&gt;4. Terms and Conditions of Use of Data&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;a. &lt;strong&gt;Attribution:&lt;/strong&gt; The user must acknowledge the provider, source, and license of data by explicitly publishing the attribution statement, including the DOI (Digital Object Identifier), or the URL (Uniform Resource Locator), or the URI (Uniform Resource Identifier) of the data concerned.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. &lt;strong&gt;Attribution of Multiple Data:&lt;/strong&gt; If the user is using multiple data together and/or listing of sources of multiple data is not possible, the user may provide a link to a separate page/list that includes the attribution statements and specific URL/URI of all data used.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt; c. &lt;strong&gt;Non-endorsement:&lt;/strong&gt; The User must not indicate or suggest in any manner that the data provider(s) endorses their use and/or the user.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. &lt;strong&gt;No Warranty:&lt;/strong&gt; The data provider(s) are not liable for any errors or omissions, and will not under any circumstances be liable for any direct, indirect, special, incidental, consequential, or other loss, injury or damage caused by its use or otherwise arising in connection with this license or the data, even if specifically advised of the possibility of such loss, injury or damage. Under any circumstances, the user may not hold the data provider(s) responsible for: i) any error, omission or loss of data, and/or ii) any undesirable consequences due to the use of the data as part of an application/product/service (including violation of any prevalent law).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;e. &lt;strong&gt;Permanent Disclosure and Versioning:&lt;/strong&gt; The data provider(s) will ensure that a data package once published under this license will always remain publicly available for reference and use. If an already published data is updated by the provider, then the earlier appropriate version(s) must also be kept publicly available with accordance with the archival policy of the National Informatics Centre.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;f. &lt;strong&gt;Continuity of Provision:&lt;/strong&gt;The data provider(s) will strive for continuously updating the data concerned, as new data regarding the same becomes available. However, the data provider(s) do not guarantee the continued supply of updated or up-to-date versions of the data, and will not be held liable in case the continued supply of updated data is not provided.&lt;/p&gt;
&lt;h2&gt;5. Template for Attribution Statement&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Unless the user is citing the data using an internationally accepted data citation format &lt;strong&gt;[10]&lt;/strong&gt;, an attribution notice in the following format must be explicitly included:&lt;/p&gt;
&lt;p&gt;“Data has been published by [Name of Data Provider] and sourced from Open Government Data (OGD) Platform of India: [Name of Data]. ([date of Publication: dd/mm/yyyy]) .[DOI / URL / URI]. Published under Open Government Data License - India: [URL of Open Data License – India].”&lt;/p&gt;
&lt;p&gt;For example, “Data has been published by Ministry of Statistics and Programme Implementation and sourced from Open Government Data (OGD) Platform of India: Overall Balance of Payments. (08/09/2015). &lt;a href="https://data.gov.in/catalog/overall-balance-payments"&gt;https://data.gov.in/catalog/overall-balance-payments&lt;/a&gt;. Published under Open Government Data License - India: [URL of Open Data License - India].”&lt;/p&gt;
&lt;h2&gt;6. Exemptions&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The license does not grant the right to access, use, adapt, and redistribute the following kinds of data:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Personal information;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Data that the data provider(s) is not authorised to licence;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Names, crests, logos and other official symbols of the data provider(s);&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. Data subject to other intellectual property rights, including patents, trade-marks and official marks;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;e. Military insignia;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;f. Identity documents; and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;g. Any data publication of which may violate section 8 of the Right to Information Act, 2005 &lt;strong&gt;11&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;7. Termination&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;a. Failure to comply with stipulated terms and conditions will cause the user’s rights under this license to end automatically.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Where the user’s rights to use data have terminated under the aforementioned clauses or any other Indian law, it reinstates:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. automatically, as of the date the violation is cured, provided it is cured within 30 days of the discovery of the violation; or&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. upon express reinstatement by the Licensor.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. For avoidance of doubt, this section does not affect any rights the licensor may have to seek remedies for violation of this license.&lt;/p&gt;
&lt;h2&gt;8. Dispute Redressal Mechanism&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;This license is governed by Indian law, and the copyright of any data shared under this license vests with the licensor, under the Indian Copyright Act.&lt;/p&gt;
&lt;h2&gt;9. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; Ministry of Science and Technology. 2012. National Data Sharing and Accessibility Policy (NDSAP) 2012. Gazette of India. March 17. &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/"&gt;https://data.gov.in/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See section 3.2 of the Implementation Guidelines for National Data Sharing and Accessibility Policy (NDSAP) Version 2.2. &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See section 2.1 of NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See section 2.6 of NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See section 2.7 of NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See section 2 (a) of Indian Copyright Act 1957. &lt;a href="http://copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;http://copyright.gov.in/Documents/CopyrightRules1957.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; The template of the attribution statement is given in section 5 of the license.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See section 2 (i) of Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011. &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt;For example, those listed in the DOI Citation Formatter tool developed by DataCite, CrossRef and others: &lt;a href="http://crosscite.org/citeproc/"&gt;http://crosscite.org/citeproc/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/public-consultation-for-the-first-draft-of-government-open-data-use-license-india-announced'&gt;https://cis-india.org/openness/public-consultation-for-the-first-draft-of-government-open-data-use-license-india-announced&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-06-30T09:41:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior">
    <title>Submission by the Centre for Internet and Society on Revisions to ICANN Expected Standards of Behavior</title>
    <link>https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior</link>
    <description>
        &lt;b&gt;Prepared by Vidushi Marda, with inputs from Dr. Nirmita Narasimhan and Sunil Abraham.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We at the Centre for Internet and Society (“CIS”) are grateful for the opportunity to comment on the proposed revisions to ICANN’s Expected Standards of Behavior (“Standards”).&lt;/p&gt;
&lt;p&gt;Before providing specific comments on the proposed revisions, CIS would like to state for the record our extreme disappointment while noting that there is no indication of the intention to draft and adopt a dedicated anti - harassment policy. We are of the firm opinion that harassment, and particularly sexual harassment, is not only a sensitive topic, but also a deeply complex one. Such a policy should consider scope, procedural questions, redressal and remedies in cases of harassment in general and sexual harassment in particular. A mere change in language to these Standards, however well intentioned, cannot go too far in preventing and dealing with cases of harassment in the absence of a framework within which such instances can be addressed.&lt;/p&gt;
&lt;p&gt;Some of the issues that arose at ICANN55 were confusion surrounding the powers and limits of the Ombudsman’s office in dealing with cases of harassment, the exact procedure to be followed for redressal surrounding such incidents, and the appropriate conduct of parties to the matter. There will be no clarity in these respects, even if these proposed changes are to be adopted.&lt;/p&gt;
&lt;p&gt;Specifically, the proposed language is problematic and completely inadequate for the following reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vague&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Terms like “professional conduct” and “appropriate behavior” mean little in the absence of a definition that entails such conduct. These terms could mean vastly different things to each community member and such language will only encourage a misalignment of expectation of conduct between community members. The “general” definition of harassment is at best, an ineffective placeholder, as it does not encompass exactly what kind of behavior would fall under its definition.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fails to consider important scenarios&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed language fails to consider situations where some attempts or advances at communication, sexual or otherwise, occur. For example, consider a situation in which one community member stalks another online, and catalogues his/her every move. This is most certainly foreseeable, but will not be adequately covered by the proposed language. Further, terms like “speech or behavior that is sexually aggressive or intimidates” &amp;nbsp;could or could not include types of speech such as art, music, photography etc, depending on who you ask. It also does not explain the use of the word behavior - physical, emotional, professional, online behavior are all possible, but the scope of this term would depend on the interpretation one chooses to apply. In part 4 below, we will demonstrate how ICANN has applied a far more detailed framework for harassment elsewhere.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ignores complexity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In discussions surrounding the incident at ICANN55, a number of issues of arose. These included, inter alia, the definition of harassment and sexual harassment, what constituted such conduct, the procedure to be followed in such cases, the appropriate forum to deal with such incidents and the conduct that both parties are expected to maintain. These questions cannot, and have not been answered or addressed in the proposed change to the Standards. CIS emphasizes the need to understand this issue as one that must imbibe differences in culture, expectation, power dynamics, and options for redressal. If ICANN is to truly be a safe space, such issues must be substantively and procedurally fair for both the accused and the victim. This proposed definition is woefully inadequate in this regard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Superficial understanding of harassment, sexual harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed changes do not define harassment, and sexual harassment in an adequate fashion. The change currently reads, “Generally, harassment is considered unwelcome hostile or intimidating behavior -- in particular, speech or behavior that is sexually aggressive or intimidates based on attributes such as race, gender, ethnicity, religion, age, color, national origin, ancestry, disability or medical condition, sexual orientation, or gender identity.” These are subject to broad interpretation, and we have already highlighted the issues that may arise due to this in 1, above. Here, we would like to point to a far more comprehensive definition.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;ICANN’s own Employment Policy includes within the scope of sexual harassment “verbal, physical and visual conduct that creates an intimidating, offensive or hostile working environment, or interferes with work performance.” The policy also states:&lt;/p&gt;
&lt;blockquote&gt;Harassing conduct can take many forms and includes, but is not limited to, the following:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Slurs, jokes, epithets, derogatory comments, statements or gestures;&lt;/li&gt;
&lt;li&gt;Assault, impeding or blocking another’s movement or otherwise physically interfering with normal work;&lt;/li&gt;
&lt;li&gt;Pictures, posters, drawings or cartoons based upon the characteristics mentioned in the first paragraph of this policy.&lt;/li&gt;&lt;/ol&gt;
Sexually harassing conduct includes all of the above prohibited actions, as well as other unwelcome conduct, such as requests for sexual favors, conversation containing sexual comments, and unwelcome sexual advances.”&lt;/blockquote&gt;
&lt;p&gt;This definition is not perfect, it does not comprehensively consider advances or attempts at communication, sexual or otherwise, which are unwelcome by the target. Nonetheless, CIS believes that this is a far more appropriate definition that does not include vague metrics that the proposed changes do. Since it is one ICANN has already adopted, it can act as an important stepping stone towards a comprehensive framework.&lt;/p&gt;
&lt;p&gt;Like ICANN, UNESCO’s organisational approach has been to adopt a comprehensive &lt;a href="http://www.un.org/womenwatch/osagi/UN_system_policies/(UNESCO)Anti-harassment_Policy.pdf"&gt;Anti-Harassment Policy&lt;/a&gt; which lays down details of definition, prevention, complaint procedure, investigations, sanctions, managerial responsibility, etc. Acknowledging the cultural sensitivity of harassment particularly in international situations, the policy also recognizes advances or attempts at communication, sexual or otherwise. Most importantly, it states that for conduct to come within the definition of sexual harassment, it “must be unwelcome, i.e. unsolicited and regarded as offensive or undesirable by the victim.”&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In conclusion, we would like to reiterate the importance of adopting and drafting a dedicated anti-harassment policy and framework. The benefits of safety, certainty and formal redressal mechanisms in cases of harassment cannot be over emphasized.&lt;/p&gt;
&lt;p&gt;Importantly, such measures have already been taken elsewhere. The IETF has adopted an &lt;a href="http://tools.ietf.org/html/rfc7776"&gt;instrument&lt;/a&gt; to address issues of harassment that occur at meetings, mailing lists and social events. This instrument contemplates in detail, problematic behavior, unacceptable conduct, the scope of the term harassment, etc. It further envisages a framework for redressal of complaints, remediation, and even contemplates issues that may arise with such remediation. It is particularly important to note that while it provides a definition of harassment, it also states that "[a]ny definition of harassment prohibited by an applicable law can be subject to this set of procedures, recognising harassment as a deeply personal and subjective experience, and thus encouraging members to take up issues of harassment as per their cultural norms and national laws, which are then considered as per procedures laid down."&lt;/p&gt;
&lt;p&gt;A similar effort within the ICANN community is critical.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior'&gt;https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-30T06:07:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann">
    <title>Jurisdiction: The Taboo Topic at ICANN</title>
    <link>https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann</link>
    <description>
        &lt;b&gt;The "IANA Transition" that is currently underway is a sham since it doesn't address the most important question: that of jurisdiction.  This article explores why the issue of jurisdiction is the most important question, and why it remains unaddressed.&lt;/b&gt;
        &lt;br /&gt;
&lt;p&gt;In March 2014, the &lt;a href="https://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced&lt;/a&gt; that they were going to end the contract they have with ICANN to run the &lt;a href="https://www.iana.org/"&gt;Internet Assigned Numbers Authority&lt;/a&gt; (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;h2 id="why-is-the-u.s.-government-removing-the-ntia-contract"&gt;Why is the U.S. government removing the NTIA contract?&lt;/h2&gt;
&lt;p&gt;The main reason for the U.S. government's action is that it will get rid of a political thorn in the U.S. government's side: keeping the contract allows them to be called out as having a special role in Internet governance (with the Affirmation of Commitments between the U.S. Department of Commerce and ICANN, the IANA contract, and the cooperative agreement with Verisign), and engaging in unilateralism with regard to the operation of the root servers of the Internet naming system, while repeatedly declaring that they support a multistakeholder model of Internet governance.&lt;/p&gt;
&lt;p&gt;This contradiction is what they are hoping to address. Doing away with the NTIA contract will also increase — ever so marginally — ICANN’s global legitimacy: this is something that world governments, civil society organizations, and some American academics have been asking for nearly since ICANN’s inception in 1998. For instance, here are some demands made &lt;a href="https://www.itu.int/net/wsis/docs2/pc3/contributions/sca/hbf-29.doc"&gt;in a declaration by the Civil Society Internet Governance Caucus at WSIS, in 2005&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“ICANN will negotiate an appropriate host country agreement to replace its California Incorporation, being careful to retain those aspects of its California Incorporation that enhance its accountability to the global Internet user community. &amp;quot;ICANN's decisions, and any host country agreement, must be required to comply with public policy requirements negotiated through international treaties in regard to, inter alia, human rights treaties, privacy rights, gender agreements and trade rules. … &amp;quot;It is also expected that the multi-stakeholder community will observe and comment on the progress made in this process through the proposed [Internet Governance] Forum.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In short: the objective of the transition is political, &lt;a href="https://cis-india.org/internet-governance/blog/"&gt;not technical&lt;/a&gt;. In an ideal world, we &lt;em&gt;should&lt;/em&gt; aim at reducing U.S. state control over the core of the Internet's domain name system.&lt;a href="#fn1" class="footnoteRef" id="fnref1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;It is our contention that &lt;strong&gt;U.S. state control over the core of the Internet's domain name system is &lt;em&gt;not&lt;/em&gt; being removed&lt;/strong&gt; by the transition that is currently underway.&lt;/p&gt;
&lt;h2 id="why-is-the-transition-happening-now"&gt;Why is the Transition Happening Now?&lt;/h2&gt;
&lt;p&gt;Despite the U.S. government having given commitments in the past that were going to finish the IANA transition by &amp;quot;September 30, 2000&amp;quot;, (the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; states: &amp;quot;The U.S. Government would prefer that this transition be complete before the year 2000. To the extent that the new corporation is established and operationally stable, September 30, 2000 is intended to be, and remains, an 'outside' date.&amp;quot;) and later by &amp;quot;fall of 2006&amp;quot;,&lt;a href="#fn2" class="footnoteRef" id="fnref2"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt; those turned out to be empty promises. However, this time, the transition seems to be going through, unless the U.S. Congress manages to halt it.&lt;/p&gt;
&lt;p&gt;However, in order to answer the question of &amp;quot;why now?&amp;quot; fully, one has to look a bit at the past.&lt;/p&gt;
&lt;p&gt;In 1998, through the &lt;a href="https://www.icann.org/resources/unthemed-pages/white-paper-2012-02-25-en"&gt;White Paper on Management of Internet Names and Addresses&lt;/a&gt; the U.S. government &lt;a href="http://www.icannwatch.org/archive/mueller_icann_and_internet_governance.pdf"&gt;asserted it’s control over the root&lt;/a&gt;, and asserted — some would say arrogated to itself — the power to put out contracts for both the IANA functions as well as the 'A' Root (i.e., the Root Zone Maintainer function that Network Solutions Inc. then performed, and continues to perform to date in its current avatar as Verisign). The IANA functions contract — a periodically renewable contract — was awarded to ICANN, a California-based non-profit corporation that was set up exclusively for this purpose, but which evolved around the existing IANA (to placate the Internet Society).&lt;/p&gt;
&lt;p&gt;Meanwhile, of course, there were criticisms of ICANN from multiple foreign governments and civil society organizations. Further, despite it being a California-based non-profit on contract with the government, domestically within the U.S., there was pushback from constituencies that felt that more direct U.S. control of the DNS was important.&lt;/p&gt;
&lt;p&gt;As Goldsmith and Wu summarize:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;Milton Mueller and others have shown that ICANN’s spirit of “self-regulation” was an appealing label for a process that could be more accurately described as the U.S. government brokering a behind-the-scenes deal that best suited its policy preferences ... the United States wanted to ensure the stability of the Internet, to fend off the regulatory efforts of foreign governments and international organizations, and to maintain ultimate control. The easiest way to do that was to maintain formal control while turning over day-to-day control of the root to ICANN and the Internet Society, which had close ties to the regulation-shy American technology industry.&amp;quot; [footnotes omitted]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;And that brings us to the first reason that the NTIA announced the transition in 2014, rather than earlier.&lt;/p&gt;
&lt;h3 id="icann-adjudged-mature-enough"&gt;ICANN Adjudged Mature Enough&lt;/h3&gt;
&lt;p&gt;The NTIA now sees ICANN as being mature enough: the final transition was announced 16 years after ICANN's creation, and complaints about ICANN and its legitimacy had largely died down in the international arena in that while. Nowadays, governments across the world send their representatives to ICANN, thus legitimizing ICANN. States have largely been satisfied by participating in the Government Advisory Council, which, as its name suggests, only has advisory powers. Further, unlike in the early days, there is &lt;a href="http://www.internetgovernance.org/2012/05/24/threat-analysis-of-itus-wcit-part-1-historical-context/"&gt;no serious push for states assuming control of ICANN&lt;/a&gt;. Of course they grumble about the ICANN Board not following their advice, but no government, as far as I am aware, has walked out or refused to participate.&lt;/p&gt;
&lt;h3 id="laffaire-snowden"&gt;L'affaire Snowden&lt;/h3&gt;
&lt;p&gt;Many within the United States, and some without, believe that the United States not only plays an exceptional role to play in the running of the Internet — by dint of historical development and dominance of American companies — but that &lt;em&gt;it ought to&lt;/em&gt; have an exceptional role because it is the best country to exercise 'oversight' over 'the Internet' (often coming from &lt;a href="http://www.wsj.com/articles/SB10001424052702303563304579447362610955656"&gt;clueless commentators&lt;/a&gt;), and from dinosaurs of the Internet era, like &lt;a href="http://www.circleid.com/posts/20140316_if_the_stakeholders_already_control_the_internet_netmundial_iana/"&gt;American IP lawyers&lt;/a&gt; and &lt;a href="http://www.lawfareblog.com/2014/03/who-controls-the-internet-address-book-icann-ntia-and-iana/"&gt;American 'homeland' security hawks&lt;/a&gt;, Jones Day, who are ICANN's lawyers, and other &lt;a href="http://homepages.wmich.edu/~cooneys/poems/cummings.nextto.html"&gt;jingoists&lt;/a&gt; and those policymakers who are controlled by these narrow-minded interests.&lt;/p&gt;
&lt;p&gt;The Snowden revelations were, in that way, a godsend for the NTIA, as it allowed them a fig-leaf of &lt;a href="http://www.ft.com/cms/s/0/4529516c-c713-11e3-889e-00144feabdc0.html"&gt;international&lt;/a&gt; &lt;a href="https://www.rt.com/usa/nsa-fallout-relinquish-internet-oversight-002/"&gt;criticism&lt;/a&gt; &lt;a href="https://twitter.com/carolinegreer/status/454253411576598528"&gt;with which&lt;/a&gt; to counter these domestic critics and carry on with a transition that they have been seeking to put into motion for a while. The Snowden revelations led Dilma Rousseff, President of Brazil, to state in September 2013, at the 68th U.N. General Assembly, that Brazil would &amp;quot;present proposals for the establishment of a &lt;a href="https://gadebate.un.org/sites/default/files/gastatements/68/BR_en.pdf"&gt;civilian multilateral framework for the governance and use of the Internet&lt;/a&gt;&amp;quot;, and as &lt;a href="https://icannwiki.com/Diego_Canabarro"&gt;Diego Canabarro&lt;/a&gt; points out this catalysed the U.S. government and the technical community into taking action.&lt;/p&gt;
&lt;p&gt;Given this context, a few months after the Snowden revelations, the so-called &lt;a href="https://www.apnic.net/community/ecosystem/i*orgs"&gt;I* organizations&lt;/a&gt; met — seemingly with the blessing of the U.S. government&lt;a href="#fn3" class="footnoteRef" id="fnref3"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt; — in Montevideo, and put out a &lt;a href="https://www.apnic.net/publications/news/2013/montevideo-statement-on-future-of-internet-cooperation"&gt;'Statement on the Future of Internet Governance'&lt;/a&gt; that sought to link the Snowden revelations on pervasive surveillance with the need to urgently transition the IANA stewardship role away from the U.S. government. Of course, the signatories to that statement knew fully well, as did most of the readers of that statement, that there is no linkage between the Snowden revelations about pervasive surveillance and the operations of the DNS root, but still they, and others, linked them together. Specifically, the I* organizations called for &amp;quot;accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.&amp;quot;&lt;/p&gt;
&lt;p&gt;One could posit the existence of two other contributing factors as well.&lt;/p&gt;
&lt;p&gt;Given political realities in the United States, a transition of this sort is probably best done before an ultra-jingoistic President steps into office.&lt;/p&gt;
&lt;p&gt;Lastly, the ten-yearly review of the World Summit on Information Society was currently underway. At the original WSIS (as seen from the civil society quoted above) the issue of US control over the root was a major issue of contention. At that point (and during where the 2006 date for globalization of ICANN was emphasized by the US government).&lt;/p&gt;
&lt;h2 id="why-jurisdiction-is-important"&gt;Why Jurisdiction is Important&lt;/h2&gt;
&lt;p&gt;Jurisdiction has a great many aspects. &lt;em&gt;Inter alia&lt;/em&gt;, these are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal sanctions applicable to changes in the root zone (for instance, what happens if a country under US sanctions requests a change to the root zone file?)&lt;/li&gt;
&lt;li&gt;Law applicable to resolution of contractual disputes with registries, registrars, etc.&lt;/li&gt;
&lt;li&gt;Law applicable to labour disputes.&lt;/li&gt;
&lt;li&gt;Law applicable to competition / antitrust law that applies to ICANN policies and regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to disputes regarding ICANN decisions, such as allocation of gTLDs, or non-renewal of a contract.&lt;/li&gt;
&lt;li&gt;Law applicable to consumer protection concerns.&lt;/li&gt;
&lt;li&gt;Law applicable to financial transparency of the organization.&lt;/li&gt;
&lt;li&gt;Law applicable to corporate condition of the organization, including membership rights.&lt;/li&gt;
&lt;li&gt;Law applicable to data protection-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to trademark and other speech-related policies &amp;amp; regulations.&lt;/li&gt;
&lt;li&gt;Law applicable to legal sanctions imposed by a country against another.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Some of these, but not all, depend on where bodies like ICANN [the policy-making body], the IANA functions operator [the proposed &amp;quot;Post-Transition IANA&amp;quot;], and the root zone maintainer are incorporated or maintain their primary office, while others depend on the location of the office [for instance, Turkish labour law applies for the ICANN office in Istanbul], while yet others depend on what's decided by ICANN in contracts (for instance, the resolution of contractual disputes with ICANN, filing of suits with regard to disputes over new generic TLDs, etc.).&lt;/p&gt;
&lt;p&gt;However, an issue like sanctions, for instance, depends on where ICANN/PTI/RMZ are incorporated and maintain their primary office.&lt;/p&gt;
&lt;p&gt;As &lt;a href="http://content.netmundial.br/contribution/roadmap-for-globalizing-iana-four-principles-and-a-proposal-for-reform-a-submission-to-the-global-multistakeholder-meeting-on-the-future-of-internet-governance/96"&gt;Milton Mueller notes&lt;/a&gt;, the current IANA contract &amp;quot;requires ICANN to be incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;He further notes that:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;While it is common to assert that the U.S. has never abused its authority and has always taken the role of a neutral steward, this is not quite true. During the controversy over the .xxx domain, the Bush administration caved in to domestic political pressure and threatened to block entry of the domain into the root if ICANN approved it (Declaration of the Independent Review Panel, 2010). It took five years, an independent review challenge and the threat of litigation from a businessman willing to spend millions to get the .xxx domain into the root.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Thus it is clear that even if the NTIA's role in the IANA contract goes away, jurisdiction remains an important issue.&lt;/p&gt;
&lt;h2 id="u.s.-doublespeak-on-jurisdiction"&gt;U.S. Doublespeak on Jurisdiction&lt;/h2&gt;
&lt;p&gt;In March 2014, when NTIA finally announced that they would hand over the reins to “the global multistakeholder community”. They’ve laid down two procedural condition: that it be developed by stakeholders across the global Internet community and have broad community consensus, and they have proposed 5 substantive conditions that any proposal must meet:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Support and enhance the multistakeholder model;&lt;/li&gt;
&lt;li&gt;Maintain the security, stability, and resiliency of the Internet DNS;&lt;/li&gt;
&lt;li&gt;Meet the needs and expectation of the global customers and partners of the IANA services; and,&lt;/li&gt;
&lt;li&gt;Maintain the openness of the Internet.&lt;/li&gt;
&lt;li&gt;Must not replace the NTIA role with a solution that is government-led or an inter-governmental organization.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In that announcement there is no explicit restriction on the jurisdiction of ICANN (whether it relate to its incorporation, the resolution of contractual disputes, resolution of labour disputes, antitrust/competition law, tort law, consumer protection law, privacy law, or speech law, and more, all of which impact ICANN and many, but not all, of which are predicated on the jurisdiction of ICANN’s incorporation), the jurisdiction(s) of the IANA Functions Operator(s) (i.e., which executive, court, or legislature’s orders would it need to obey), and the jurisdiction of the Root Zone Maintainer (i.e., which executive, court, or legislature’s orders would it need to obey).&lt;/p&gt;
&lt;p&gt;However, Mr. Larry Strickling, the head of the NTIA, in his &lt;a href="https://www.youtube.com/watch?v=8v-yWye5I0w&amp;amp;feature=youtu.be"&gt;testimony before the U.S. House Subcommittee on Communications and Technology&lt;/a&gt;, made it clear that,&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“Frankly, if [shifting ICANN or IANA jurisdiction] were being proposed, I don't think that such a proposal would satisfy our criteria, specifically the one that requires that security and stability be maintained.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Possibly, that argument made sense in 1998, due to the significant concentration of DNS expertise in the United States. However, in 2015, that argument is hardly convincing, and is frankly laughable.&lt;a href="#fn4" class="footnoteRef" id="fnref4"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Targetting that remark, in ICANN 54 at Dublin, we asked Mr. Strickling:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;So as we understand it, the technical stability of the DNS doesn't necessarily depend on ICANN's jurisdiction being in the United States. So I wanted to ask would the US Congress support a multistakeholder and continuing in the event that it's shifting jurisdiction.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Mr. Strickling's response was:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;quot;No. I think Congress has made it very clear and at every hearing they have extracted from Fadi a commitment that ICANN will remain incorporated in the United States. Now the jurisdictional question though, as I understand it having been raised from some other countries, is not so much jurisdiction in terms of where ICANN is located. It's much more jurisdiction over the resolution of disputes.&lt;/p&gt;
&lt;p&gt;&amp;quot;And that I think is an open issue, and that's an appropriate one to be discussed. And it's one I think where ICANN has made some movement over time anyway.&lt;/p&gt;
&lt;p&gt;&amp;quot;So I think you have to ... when people use the word jurisdiction, we need to be very precise about over what issues because where disputes are resolved and under what law they're resolved, those are separate questions from where the corporation may have a physical headquarters.&amp;quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As we have shown above, jurisdiction is not only about the jurisdiction of &amp;quot;resolution of disputes&amp;quot;, but also, as Mueller reminds us, about the requirement that ICANN (and now, the PTI) be &amp;quot;incorporated in, maintain a physical address in, and perform the IANA functions in the U.S. This makes IANA subject to U.S. law and provides America with greater political influence over ICANN.&amp;quot;&lt;/p&gt;
&lt;p&gt;In essence, the U.S. government has essentially said that they would veto the transition if the jurisdiction of ICANN or PTI's incorporation were to move out of the U.S., and they can prevent that from happening &lt;em&gt;after&lt;/em&gt; the transition, since as things stand ICANN and PTI will still come within the U.S. Congress's jurisdiction.&lt;/p&gt;
&lt;h2 id="why-has-the-icg-failed-to-consider-jurisdiction"&gt;Why Has the ICG Failed to Consider Jurisdiction?&lt;/h2&gt;
&lt;p&gt;Will the ICG proposal or the proposed new ICANN by-laws reduce existing U.S. control? No, they won't. (In fact, as we will argue below, the proposed new ICANN by-laws make this problem even worse.) The proposal by the names community (&amp;quot;the CWG proposal&amp;quot;) still has a requirement (in Annex S) that the Post-Transition IANA (PTI) be incorporated in the United States, and a similar suggestion hidden away as a footnote. Further, the proposed by-laws for ICANN include the requirement that PTI be a California corporation. There was no discussion specifically on this issue, nor any documented community agreement on the specific issue of jurisdiction of PTI's incorporation.&lt;/p&gt;
&lt;p&gt;Why wasn't there greater discussion and consideration of this issue? Because of two reasons: First, there were many that argued that the transition would be vetoed by the U.S. government and the U.S. Congress if ICANN and PTI were not to remain in the U.S. Secondly, the ICANN-formed ICG saw the US government’s actions very narrowly, as though the government were acting in isolation, ignoring the rich dialogue and debate that’s gone on earlier about the transition since the incorporation of ICANN itself.&lt;/p&gt;
&lt;p&gt;While it would be no one’s case that political considerations should be given greater weightage than technical considerations such as security, stability, and resilience of the domain name system, it is shocking that political considerations have been completely absent in the discussions in the number and protocol parameters communities, and have been extremely limited in the discussions in the names community. This is even more shocking considering that the main reason for this transition is, as has been argued above, political.&lt;/p&gt;
&lt;p&gt;It can be also argued that the certain IANA functions such as Root Zone Management function have a considerable political implication. It is imperative that the political nature of the function is duly acknowledged and dealt with, in accordance with the wishes of the global community. In the current process the political aspects of the IANA function has been completely overlooked and sidelined. It is important to note that this transition has not been a necessitated by any technical considerations. It is primarily motivated by political and legal considerations. However, the questions that the ICG asked the customer communities to consider were solely technical. Indeed, the communities could have chosen to overlook that, but they did not choose to do so. For instance, while the IANA customer community proposals reflected on existing jurisdictional arrangements, they did not reflect on how the jurisdictional arrangements should be post-transition , while this is one of the questions at the heart of the entire transition. There were no discussions and decisions as to the jurisdiction of the Post-Transition IANA: the Accountability CCWG's lawyers, Sidley Austin, recommended that the PTI ought to be a California non-profit corporation, and this finds mention in a footnote without even having been debated by the &amp;quot;global multistakeholder community&amp;quot;, and subsequently in the proposed new by-laws for ICANN.&lt;/p&gt;
&lt;h2 id="why-the-by-laws-make-things-worse-why-work-stream-2-cant-address-most-jurisdiction-issues"&gt;Why the By-Laws Make Things Worse &amp;amp; Why &amp;quot;Work Stream 2&amp;quot; Can't Address Most Jurisdiction Issues&lt;/h2&gt;
&lt;p&gt;The by-laws could have chosen to simply stayed silent on the matter of what law PTI would be incorporated under, but instead the by-law make the requirement of PTI being a California non-profit public benefit corporation part of the &lt;em&gt;fundamental by-laws&lt;/em&gt;, which are close to impossible to amend.&lt;/p&gt;
&lt;p&gt;While &amp;quot;Work Stream 2&amp;quot; (the post-transition work related to improving ICANN's accountability) has jurisdiction as a topic of consideration, the scope of that must necessarily discount any consideration of shifting the jurisdiction of incorporation of ICANN, since all of the work done as part of CCWG Accountability's &amp;quot;Work Stream 1&amp;quot;, which are now reflected in the proposed new by-laws, assume Californian jurisdiction (including the legal model of the &amp;quot;Empowered Community&amp;quot;). Is ICANN prepared to re-do all the work done in WS1 in WS2 as well? If the answer is yes, then the issue of jurisdiction can actually be addressed in WS2. If the answer is no ­— and realistically it is — then, the issue of jurisdiction can only be very partially addressed in WS2.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we recommended specific changes in the by-laws, all of which were rejected by CCWG's lawyers.&lt;/p&gt;
&lt;h2 id="the-transition-plan-fails-the-netmundial-statement"&gt;The Transition Plan Fails the NETmundial Statement&lt;/h2&gt;
&lt;p&gt;The &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial Multistakeholder Document&lt;/a&gt;, which was an outcome of the NETmundial process, states:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders extending beyond the ICANN community&lt;/p&gt;
&lt;p&gt;[...]&lt;/p&gt;
&lt;p&gt;It is expected that the process of globalization of ICANN speeds up leading to a truly international and global organization serving the public interest with clearly implementable and verifiable accountability and transparency mechanisms that satisfy requirements from both internal stakeholders and the global community.&lt;/p&gt;
&lt;p&gt;The active representation from all stakeholders in the ICANN structure from all regions is a key issue in the process of a successful globalization.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As our past analysis has shown, the IANA transition process and the discussions on the mailing lists that shaped it &lt;a href="https://cis-india.org/internet-governance/blog/cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"&gt;were neither global nor multistakeholder&lt;/a&gt;. The DNS industry represented in ICANN is largely US-based. 3 in 5 registrars are from the United States of America, whereas less than 1% of ICANN-registered registrars are from Africa. Two-thirds of the Business Constituency in ICANN is from the USA. While ICANN-the-corporation has sought to become more global, the ICANN community has remained insular, and this will not change until the commercial interests involved in ICANN can become more diverse, reflecting the diversity of users of the Internet, and a TLD like .COM can be owned by a non-American corporation and the PTI can be a non-American entity.&lt;/p&gt;
&lt;h2 id="what-we-need-jurisdictional-resilience"&gt;What We Need: Jurisdictional Resilience&lt;/h2&gt;
&lt;p&gt;It is no one's case that the United States is less fit than any other country as a base for ICANN, PTI, or the Root Zone Maintainer, or even as the headquarters for 9 of the world's 12 root zone operators (Verisign runs both the A and J root servers). However, just as having multiplicity of root servers is important for ensuring technical resilience of the DNS system (and this is shown in the uptake of Anycast by root server operators), it is equally important to have immunity of core DNS functioning from political pressures of the country or countries where core DNS infrastructure is legally situated and to ensure that we have diversity in terms of legal jurisdiction.&lt;/p&gt;
&lt;p&gt;Towards this end, we at CIS have pushed for the concept of &amp;quot;jurisdictional resilience&amp;quot;, encompassing three crucial points:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal immunity for core technical operators of Internet functions (as opposed to policymaking venues) from legal sanctions or orders from the state in which they are legally situated.&lt;/li&gt;
&lt;li&gt;Division of core Internet operators among multiple jurisdictions&lt;/li&gt;
&lt;li&gt;Jurisdictional division of policymaking functions from technical implementation functions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Of these, the most important is the limited legal immunity (akin to a greatly limited form of the immunity that UN organizations get from the laws of their host countries). This kind of immunity could be provided through a variety of different means: a host-country agreement; a law passed by the legislature; a U.N. General Assembly Resolution; a U.N.-backed treaty; and other such options exist. We are currently investigating which of these options would be the best option.&lt;/p&gt;
&lt;p&gt;And apart from limited legal immunity, distribution of jurisdictional control is also valuable. As we noted in our submission to the ICG in September 2015:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Following the above precepts would, for instance, mean that the entity that performs the role of the Root Zone Maintainer should not be situated in the same legal jurisdiction as the entity that functions as the policymaking venue. This would in turn mean that either the Root Zone Maintainer function be taken up Netnod (Sweden-headquartered) or the WIDE Project (Japan-headquartered) [or RIPE-NCC, headquartered in the Netherlands], or that if the IANA Functions Operator(s) is to be merged with the RZM, then the IFO be relocated to a jurisdiction other than those of ISOC and ICANN. This, as has been stated earlier, has been a demand of the Civil Society Internet Governance Caucus. Further, it would also mean that root zone servers operators be spread across multiple jurisdictions (which the creation of mirror servers in multiple jurisdictions will not address).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;However, the issue of jurisdiction seems to be dead-on-arrival, having been killed by the United States government.&lt;/p&gt;
&lt;p&gt;Unfortunately, despite the primary motivation for demands for the IANA transition being those of removing the power the U.S. government exercises over the core of the Internet's operations in the form of the DNS, what has ended up happening through the IANA transition is that these powers have not only not been removed, but in some ways they have been entrenched further! While earlier, the U.S. had to specify that the IANA functions operator had to be located in the U.S., now ICANN's by-laws themselves will state that the post-transition IANA will be a California corporation. Notably, while the Montevideo Declaration speaks of &amp;quot;globalization&amp;quot; of ICANN and of the IANA functions, as does the NETmundial statement, the NTIA announcement on their acceptance of the transition proposals speaks of &amp;quot;privatization&amp;quot; of ICANN, and not &amp;quot;globalization&amp;quot;.&lt;/p&gt;
&lt;p&gt;All in all, the &amp;quot;independence&amp;quot; that IANA is gaining from the U.S. is akin to the &amp;quot;independence&amp;quot; that Brazil gained from Portugal in 1822. Dom Pedro of Brazil was then ruling Brazil as the Prince Regent since his father Dom João VI, the King of United Kingdom of Portugal, Brazil and the Algarves had returned to Portugal. In 1822, Brazil declared independence from Portugal (which was formally recognized through a treaty in 1825). Even after this &amp;quot;independence&amp;quot;, Dom Pedro continued to rule Portugal just as he had before indepedence, and Dom João VI was provided the title of &amp;quot;Emperor of Brazil&amp;quot;, aside from being King of the United Kingdom of Portugal and the Algarves. The &amp;quot;indepedence&amp;quot; didn't make a whit of a difference to the self-sufficiency of Brazil: Portugal continued to be its largest trading partner. The &amp;quot;independence&amp;quot; didn't change anything for the nearly 1 million slaves in Brazil, or to the lot of the indigenous peoples of Brazil, none of whom were recognized as &amp;quot;free&amp;quot;. It had very little consequence not just in terms of ground conditions of day-to-day living, but even in political terms.&lt;/p&gt;
&lt;p&gt;Such is the case with the IANA Transition: U.S. power over the core functioning of the Domain Name System do not stand diminished after the transition, and they can even arguably be said to have become even more entrenched. Meet the new boss: same as the old boss.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;&lt;p&gt;It is an allied but logically distinct issue that U.S. businesses — registries and registrars — dominate the global DNS industry, and as a result hold the reins at ICANN.&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn2"&gt;&lt;p&gt;As Goldsmith &amp;amp; Wu note in their book &lt;em&gt;Who Controls the Internet&lt;/em&gt;: &amp;quot;Back in 1998 the U.S. Department of Commerce promised to relinquish root authority by the fall of 2006, but in June 2005, the United States reversed course. “The United States Government intends to preserve the security and stability of the Internet’s Domain Name and Addressing System (DNS),” announced Michael D. Gallagher, a Department of Commerce official. “The United States” he announced, will “maintain its historic role in authorizing changes or modifications to the authoritative root zone file.”&lt;a href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn3"&gt;&lt;p&gt;Mr. Fadi Chehadé revealed in an interaction with Indian participants at ICANN 54 that he had a meeting &amp;quot;at the White House&amp;quot; about the U.S. plans for transition of the IANA contract before he spoke about that when &lt;a href="http://articles.economictimes.indiatimes.com/2013-10-22/news/43288531_1_icann-internet-corporation-us-centric-internet"&gt;he visited India in October 2013&lt;/a&gt; making the timing of his White House visit around the time of the Montevideo Statement.&lt;a href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li id="fn4"&gt;&lt;p&gt;As an example, &lt;a href="https://www.nlnetlabs.nl/projects/nsd/"&gt;NSD&lt;/a&gt;, software that is used on multiple root servers, is funded by a Dutch foundation and a Dutch corporation, and written mostly by European coders.&lt;a href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann'&gt;https://cis-india.org/internet-governance/blog/jurisdiction-the-taboo-topic-at-icann&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IANA</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    

   <dc:date>2016-06-29T07:51:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities">
    <title>Smart City Policies and Standards: Overview of Projects, Data Policies, and Standards across Five International Smart Cities </title>
    <link>https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities</link>
    <description>
        &lt;b&gt;This blog post aims to review five Smart Cities across the globe, namely Singapore, Dubai, New York City, London and Seoul, the Data Policies and Standards adopted. Also, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the brief: &lt;a href="http://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Smart City as a concept is evolutionary in nature, and the key elements like Information and Communication Technology (ICT), digitization of services, Internet of Things (IoT), open data, big data, social innovation, knowledge, etc., would be intrinsic to defining a Smart City &lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Smart City, as a “system of systems”, can potentially generate vast amounts of data, especially as cities install more sensors, gain access to data from sources such as mobile devices, and government and other agencies make more data accessible. Consequently, Big Data techniques and concepts are highly relevant to the future of Smart Cities. It was noted by Kenneth Cukier, Senior Editor of Digital Products at The Economist, that Big Data techniques can be used to enhance a number of processes essential to cities - for example, big data can be used to spot business trends, determine quality of research, prevent diseases, tack legal citations, combat crime, and determine real-time roadway traffic conditions &lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;. Having said this, data is deemed to be the lifeblood of a Smart City and its availability, use, cost, quality, analysis, associated business models and governance are all areas of interest for a range of actors within a smart city &lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog reviews five Smart Cities namely Singapore, Dubai, New York City, London and Seoul. In doing so, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions. To achieve this, the research reviews:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The definition of a Smart City in a given context or project (if any).&lt;/li&gt;
&lt;li&gt;Existing policy/regulations around data or notes the lack thereof.&lt;/li&gt;
&lt;li&gt;The cities adherence to the International standards and providing an update on the current status of the Smart City programme.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Singapore&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation programme in Singapore was launched on 24th November, 2014. The programme is being driven by the Infocomm Development Authority of Singapore, through which Singapore seeks to harness ICT, networks and data to support improved livelihoods, stronger communities and creation of new opportunities for its residents &lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; According to the IDA, a Smart Nation is a city where &lt;em&gt;“people and businesses are empowered through increased access to data, more participatory through the contribution of innovative ideas and solutions, and a more anticipatory government that utilises technology to better serve citizens’ needs”&lt;/em&gt; &lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;. The Smart Nation programme is driven by a designated Office in the Prime Minister’s Office &lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;. As a core component to the Smart Nation Programme, the Smart Nation Platform has been developed as the technical architecture to support the Programme. This Platform enables greater pervasive connectivity, better situational awareness through data collection, and efficient sharing and access to collected sensor data, allowing public bodies to use such data to develop policy and practical interventions &lt;a href="#_ftn7"&gt;[7]&lt;/a&gt; Such access would allow for anticipatory governance - a goal of the Smart Nation Programme as noted by Dr. Yaacob Ibrahim, Minister for Communications and Information stating “Insights gained from this data would enable us to better anticipate citizens’ needs and help in better delivery of services” &lt;a href="#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation Programme is an ongoing initiative, being built on the past programme Intelligent Nation 2015 (iN2015 masterplan). The plan involves putting in place the infrastructure, policies, ecosystem and capabilities to enable a Smart Nation, by adopting a people-centric approach &lt;a href="#_ftn9"&gt;[9]&lt;/a&gt;. A number of co-creating solutions adopted by the Government include:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Development of Mobile Apps to facilitate communication between the public and the providers of public services.&lt;/li&gt;
&lt;li&gt;Organization of Hackathons by government agencies or corporations in collaboration with schools and industry partners to ideate and develop solutions to tackle real-world challenges.&lt;/li&gt;
&lt;li&gt;Adopt measure for smart mobility to create a more seamless transport experience and providing greater access to real-time transport information so that citizens can better plan their journeys.&lt;/li&gt;
&lt;li&gt;Smart technologies are also being introduced to the housing estates &lt;a href="#_ftn10"&gt;[10]&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation plan derives its legitimacy from the constitution of Singapore, holding the Prime Minister responsible to take charge of the subject ‘Smart Nation’ blueprint under the Statutory body of ‘Smart Nation’ Programme Office &lt;a href="#_ftn11"&gt;[11]&lt;/a&gt;. Singapore has a comprehensive data protection law – the Personal Data Protection Act 2012, rules governing the collection, use, disclosure and care of personal data. The Personal Data Protection Commission of Singapore has committed to work closely with the private sector, and also to support the Smart Nation vision on data privacy and cyber security ecosystem &lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Towards achieving the Smart Nation vision the government has also promoted the use of open data. In 2015 the Department of Statistics has made a vast amount of data available (across multiple themes say transport, infocomm, population, etc.) for free to the public in order to encourage innovation and facilitate the Smart Nation &lt;a href="#_ftn14"&gt;[14]&lt;/a&gt;. Prior to this initiative, the government had adopted the Open Data Policy in 2011, enabling public data for analysis, research and application development &lt;a href="#_ftn15"&gt;[15]&lt;/a&gt;. The concept of Virtual Singapore, which is a part of the Smart Nation Initiative, has been developed to adopt and simulate solutions on a virtual platform using big data analytics &lt;a href="#_ftn16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC). It specifies three types of Internet of Things (IoT) Standards – sensor network standards (TR38 - for public areas &amp;amp; TR40 - for homes), IoT foundational standards (common set of guidelines for IoT requirements and architecture, information and service interoperability, security and data integrity) and domain-specific standards (healthcare, mobility, urban living, etc.) &lt;a href="#_ftn17"&gt;[17]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Singapore is part of ISO/IEC JTC 1/WG7 Sensor Networks and ISO/IEC JTC 1/WG10 Internet of Things (IoT) &lt;a href="#_ftn18"&gt;[18]&lt;/a&gt;. &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc.Singapore is a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9 - Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Dubai, United Arab Emirates&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Dubai Smart City strategy was launched as part of the Dubai Plan 2021 vision, in the year 2015 &lt;a href="#_ftn19"&gt;[19]&lt;/a&gt;. Dubai Plan 2021 describes the future of Dubai evolving through holistic and complementary perspectives, starting with the people and the society and places the government as the custodian of the city’s development. Within the Plan, the smart city theme envisions a platform that is fully connected and integrated infrastructure that enables easy mobility for all residents and tourists, and provides easy access to all economic centers and social services, in line with the world’s best cities &lt;a href="#_ftn20"&gt;[20]&lt;/a&gt;. Center to the smart city platform is data and data analytics, particularly cross functional data and big data techniques to give a complete view of the city &lt;a href="#_ftn21"&gt;[21]&lt;/a&gt; As envisioned, the Dubai Data portal would provide a gateway to empower relevant stakeholders to understand the nuances of the city and pursue questions that will result in the greatest impact from the city’s data &lt;a href="#_ftn22"&gt;[22]&lt;/a&gt;. The platform will be based on current data and existing services, initiatives, and networks to identify opportunities for a smart city &lt;a href="#_ftn23"&gt;[23]&lt;/a&gt;. The Smart City Plan also includes a framework for aligning districts of Dubai with the Smart City vision and dimensions &lt;a href="#_ftn24"&gt;[24]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Smart Dubai roadmap 2015 provides a consolidated report and planned smart city services, its status and the stage of its implementation, for e.g. Smart Grid, Mobile Payment, Smart Water, Health applications, Public Wi-Fi, Municipality, E-Traffic solutions, etc &lt;a href="#_ftn25"&gt;[25]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Dubai strategy is envisioned to be completed by the year 2020, and currently it’s ongoing. The first phase of Smart Dubai masterplan is expected to end by 2016. Between 2017 and 2019, the plan aims to deliver new initiatives and services. The second phase of the masterplan is expected to be completed by the year 2020 &lt;a href="#_ftn26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart City Plan is being driven by the &lt;strong&gt;Dubai Smart City Office&lt;/strong&gt; – which has been established under Law No. (29) of 2015 on the establishment of Dubai Smart City Office; Law No. (30) of 2015 on the establishment of Dubai Smart City Establishment; Decree No. (37) of 2015 on the formation of the Board of the Dubai Smart City Office; and Decree No (38) of 2015- appointing a Director General for the Office, which will develop overall policies and strategic plans, supervise the smart transformation process and approve joint initiatives, projects and services &lt;a href="#_ftn27"&gt;[27]&lt;/a&gt;. Also, an open data law called &lt;strong&gt;Dubai Open Data Law&lt;/strong&gt; was issued to complete the legislative framework for transforming Dubai into a Smart City &lt;a href="#_ftn28"&gt;[28]&lt;/a&gt;. This law will enable the sharing of non-confidential data between public entities and other stakeholders.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In 2015 the Smart Dubai Executive Committee has collaborated through an agreement with the International Telecommunications Union (ITU) adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators &lt;a href="#_ftn29"&gt;[29]&lt;/a&gt;. The Focus Group is working towards identifying global best practices for the development of smart cities &lt;a href="#_ftn30"&gt;[30]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;New York City, United States of America&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ‘One New York Plan’ announced in the year 2015 is a comprehensive plan for a sustainable and resilient city. It includes the adoption of digital technology and considers the importance of the role of data in transforming every aspect of the economy, communications, politics, and individual and family life &lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;. Furthermore, through a publication on '&lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;Building a Smart+Equitable City&lt;/a&gt;', the Mayor’s Office of Technology and Innovation (MOTI) describes efforts to leverage new technologies to build Smart city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Accordingly, the plan seeks to establish better lives through establishing principles and strategic frameworks to guide connected device and Internet of Things (IoT) implementation; MOTI serving as the coordinating entity for new technology and IoT deployments across all City agencies; collaborating with academia and the private sector on innovative pilot projects, and partnering with municipal governments and organizations around the world to share best practices and leverage the impact of technological advancements &lt;a href="#_ftn32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;OneNYC represents a unified vision for a sustainable, resilient, and equitable city developed with cross-cutting interagency collaboration, public engagement, and consultation with leading experts in their respective fields. The Mayor’s Office of Sustainability oversees the development of OneNYC and now shares responsibility with the Mayor’s Office of Recovery and Resiliency for ensuring its implementation &lt;a href="#_ftn33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As per the Local Law 11 of 2012, each City entity must identify and ultimately publish all of its digital public data for citywide aggregation and publication by 2018. In adherence to this law, there exists a NYC Open Data Plan which requires annual data updation &lt;a href="#_ftn34"&gt;[34]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The LinkNYC initiative, one of the key projects to make New York a ‘smart’ city, aims to connect everyone through a city wide wi-fi network. The LinkNYC initiative will retrofit payphones with kiosks to provide high-speed WiFi hotspots and charging stations for increased connectivity &lt;a href="#_ftn35"&gt;[35]&lt;/a&gt;. Data Privacy in the initiative is addressed through the customer first privacy policy, which considers user’s privacy on priority and will not sell any personal information or share with third parties for their own use. LinkNYC will use anonymized, aggregate data to make the system more efficient and to develop insights to improve your Link experience &lt;a href="#_ftn36"&gt;[36]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ANSI Network on Smart and Sustainable Cities (ANSSC) is a forum for information sharing and coordination on voluntary standards, conformity assessment and related activities for smart and sustainable cities in the US &lt;a href="#_ftn37"&gt;[37]&lt;/a&gt;. The US is a signatory of the ISO/ITU defined standards on smart cities &lt;a href="#_ftn38"&gt;[38]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;London, United Kingdom&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan was unveiled in the year 2013 by the Mayor of London. The plan is being driven through the Greater London Authority, with the advice of the Smart London Board. The Smart London Plan envisions &lt;em&gt;‘Using the creative power of new technologies to serve London and improve Londoner’s lives&lt;/em&gt;’ &lt;a href="#_ftn39"&gt;[39]&lt;/a&gt;. ‘Smart London’ is about harnessing new technology and data so that businesses, Londoners and visitors experience the city in a better way, and do not face bureaucratic hassle and congestion. Smart London seeks to improve the city as a whole and focuses on city macro functions that result from the interplay between city subsystems - such as local labour markets to financial markets, from local government to education, healthcare, transportation and utilities. According to strategy documents, a smarter London recognises and employs data as a service and will leverage data to enable informed decision making and the design of new activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This project is currently ongoing. Since its formation in March 2013, the Smart London Board has been advising the Greater London Authority.The Plan sits within the overarching framework of the Mayor’s Vision 2020 &lt;a href="#_ftn40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan incorporates the existing open data platform called ‘London DataStore’. The rules and guidelines for this platform are defined by the Greater London Authority, which includes working with public and private sector organisations to create, maintain and utilise it, enabling common data standards, identify and prioritise which data are needed to address London’s growth challenges, establish a Smart London Borough Partnership to encourage boroughs to free up London’s local level data. Also, privacy is protected and there is transparent use of data - to ensure data use is managed in the best interests of the public rather than private enterprise.&lt;sup&gt;42&lt;/sup&gt; The Smart London Plan aims to build on this existing datastore to identify and publish data that addresses specific growth challenges, with an emphasis on working with companies and communities to create, maintain, and use this data &lt;a href="#_ftn41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Open Data White Paper, issued by the Office of Paymaster General, seeks to build a transparent society by releasing public data through open data platforms and leveraging the potential of emerging technologies &lt;a href="#_ftn42"&gt;[42]&lt;/a&gt;. The Greater London Authority processes personal data in accordance with the Data Protection Act 1998 &lt;a href="#_ftn43"&gt;[43]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same &lt;a href="#_ftn44"&gt;[44]&lt;/a&gt;. The following standards and publications help address various issues for a city to become a smart city:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The development of a standard on &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;Smart city terminology (PAS 180)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;Smart city framework standard (PAS 181)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;Data concept model for smart cities (PAS 182)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8100-smart-cities-overview/"&gt;Smart city overview document (PD 8100)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;Smart city planning guidelines document (PD 8101)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BS 8904 Guidance for community sustainable development provides a decision-making framework that will help setting objectives in response to the needs and aspirations of city stakeholders&lt;/li&gt;
&lt;li&gt;BS 11000 Collaborative relationship management&lt;/li&gt;
&lt;li&gt;BSI BIP 2228:2013 Inclusive urban design - A guide to creating accessible public spaces.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further, the Smart London Plan incorporates open data standards in accordance with London DataStore &lt;a href="#_ftn45"&gt;[45]&lt;/a&gt;. Various government reports – Smart Cities background paper, Open Data White Paper, etc., have suggested the use of standards related to Internet of Things (IoT), open data standards, etc &lt;a href="#_ftn46"&gt;[46]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Seoul, Korea&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Smart Seoul 2015 was announced in June 2011 by the Seoul Metropolitan Government, which envisions integrating IT services into every field, including administration, welfare, industry and living. Through this, the Seoul Metropolitan Government plans to create a Seoul that uses smart technologies by 2015 &lt;a href="#_ftn47"&gt;[47]&lt;/a&gt;. Towards this, the Seoul Metropolitan Government plans to make use of Big Data in policy development, and through scientific analytics, will provide customized administrative services and reduce wasteful spending. Also, the government is utilising Big Data to analyse trends emerging from existing services &lt;a href="#_ftn48"&gt;[48]&lt;/a&gt;. Examples of projects that leverage big data that the government has undertaken include the Taxi Matchmaking Project – analyzes the data related to taxi stands and passengers, the Owl Bus &lt;a href="#_ftn49"&gt;[49]&lt;/a&gt; - maps the bus routes, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Building on the Smart Seoul 2015, the Seoul Metropolitan Government plans to establish 'Global Digital Seoul 2020 – New Connections, Different Experiences' vision in next five-years. In this multi-objective plan, it aims to establish a ’Big Data campus’ providing win-win cooperation among public, private, industry and university &lt;a href="#_ftn50"&gt;[50]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The Smart Seoul 2015 aims to create a ‘Seoul Data Mart’, which will be an open platform that makes public information available for data processing &lt;a href="#_ftn51"&gt;[51]&lt;/a&gt;. Furthermore, Seoul has opened the Seoul Open Data Plaza &lt;a href="#_ftn52"&gt;[52]&lt;/a&gt;, an online channel to share and provide citizens with all of Seoul’s public data, such as real-time bus operation schedules, subway schedules, non-smoking areas, locations of public Wi-Fi services, shoeshine shops, and facilities for disabled people, and the information registered in Seoul Open Data Plaza is provided in the open API format.&lt;sup&gt;45&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;South Korea has a comprehensive law governing data privacy – Personal Information Protection Act, 2011. The law includes data protection rules and principles, including obligations on the data controller and the consent of data subjects, rights to access personal data or object to its collection, and security requirements. It also covers cookies and spam, data processing by third parties and the international transfer of data &lt;a href="#_ftn53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The smart city standards are adopted in the development of smart cities in Korea &lt;a href="#_ftn54"&gt;[54]&lt;/a&gt;. Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities. Korea also has one working group developing city indicators and another working group developing metrics for smart community infrastructures &lt;a href="#_ftn55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The smart city projects studied are at different levels of implementation and have both similarities and differences. Below is an analysis of some of the key similarities and differences between smart city projects, a comparison of these points to India’s 100 Smart City Mission, and a summary of best practices around the development of smart city frameworks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Nodal Agency&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;All cities studied have nodal agencies driving the smart city initiatives and many have policies in place backing these initiatives. For example, while the Smart Nation programme in Singapore is being driven by the Infocomm Development Authority, in London the smart city project is governed by the Great London Authority. The Smart Seoul Project in Korea is governed by the Seoul Metropolitan Government and New York has the Mayor’s Office of Technology and Innovation serving as the coordinating entity for new technology and IoT deployments across all City agencies. In India, the nodal agency driving the 100 Smart Cities Project is the Ministry of Urban Development under the Indian Government. In India, the implementation of the Mission at the City level will be done by a Special Purpose Vehicle (SPV), which will be a limited company and will plan, appraise, approve, release funds, implement, manage, operate, monitor and evaluate the Smart City development projects.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Policies&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Many of the cities had open data policies and data protection policies that pertain to the Smart City initiatives. In Dubai, an open data law called Dubai Open Data Law has been issued to complete the legislative framework for transforming Dubai into a Smart City and the Smart City Establishment will develop policies for the project. New York also has an Open Data Plan in place and LinkNYC will use anonymized, aggregate data to address data privacy of users. In London, the Smart London Plan incorporates the existing open data platform called ‘London DataStore’, the rules for which are defined by the Greater London Authority, which also ensures privacy and transparent use of data by processing personal data in accordance with the Data Protection Act 1998. For regulation of data in Seoul, a ‘Seoul Data Mart’ will be established to make public information available for data processing and the Seoul Open Data Plaza is an existing online channel to share and provide citizens with all of Seoul’s public data. South Korea has a comprehensive law governing data privacy in place as well. In Singapore, the Personal Data Protection Commission has committed to work and support the Smart Nation vision on data privacy and cyber security ecosystem. To achieve the vision of the project, the government has also promoted the use of open data. It can be said the these countries , with clearly laid out policies to support and guide the project, have well planned ecosystem for regulation and governance of systems, technologies and cities. All cities have incorporated open data into smart cities and many have developed guidelines for its use. All cities have similar goals of enhancing the lives of citizens and developing anticipatory regulation, however, there appears to be little discussion on the need to amend existing law or enable new law around privacy and data protection in light of data collection through smart cities. In India, no enabling legislation or policy has been formulated by the Government, apart from releasing “Mission Statement and Guidelines”, which provides details about the Project and vision, excluding a definition of a ‘smart city’ or the relevant applicable laws and policies. No information is publicly available regarding deployment of open data, use of specific technologies like cloud, big data, etc., the relevant policies and applicability of laws. Unlike India, all cities recognize the importance of big data techniques in enabling smart city visions, technology and policies. On the lines of these cities, India must work towards addressing the need for an open data framework in light of the 100 Smart Cities Mission to enable the sharing of non-confidential data between public entities and other stakeholders. This requires co-ordination to incorporate, enable and draw upon open data architecture in the cities by the Government with the existing open data framework in India, like the National Data Sharing and Accessibility Policy, 2012. Use of technology in the form of IoT and Big Data entails access to open data, bringing another policy area in its ambit which needs consideration. Also, identification and development of open standards for IoT must be looked at. Also, as data in smart cities will be generated, collected, used, and shared by both the public and private sector. It is essential that India’s existing data protection standards and regime must be amended to extend the data regulation beyond a body corporate and oversee the collection and use of data by the Government, and its agencies.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In Singapore, the Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC)and the &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc. The Country is also a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9- Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities. In Dubai, the Smart Dubai Executive Committee with the International Telecommunications Union (ITU) to adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators. For the purpose of standards, the ANSI Network on Smart and Sustainable Cities (ANSSC) in New York is a forum smart and sustainable cities, along with US being a signatory of the ISO/ITU defined standards on smart cities. Also, The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same and the Smart London Plan incorporates open data standards in accordance with London DataStore. For development of smart cities, Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities and also has one working group developing city indicators and another working group developing metrics for smart community infrastructures. However, in India, the Bureau of Indian Standards (BIS) has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area. Also, The Global Cities Institute (GCI) has undertaken a mission in the year 2015 to align with the Bureau of Indian Standards regarding development of standards of smart cities and also to forge relationships with Indian cities in light of ISO 37120. It can be said that India has currently not yet adopted international standards, but is in the process of developing national standards and adopting key international standards. Unlike other cities,which are adopting standards - national, ISO, or ITU, Indian cities are yet to adopt standards for regulation of the future smart cities.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Notes for India&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;India is in the nascent stages of developing smart cities across the country. Drawing from the practices adopted by cities across the world, smart cities in India should adopt strong regulatory and governance frameworks regarding technical standards, open data and data security and data protection policies. These policies will be essential in ensuring the sustainability and efficiency of smart cities while safeguarding individual rights. Some of these policies are already in place - such as India’s Open Data Policy and India’s data protection standards under section 43A of the ITA. It will be important to see how these policies are adopted and applied to the context of smart cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Smart Cities and Transparent Evolution, &lt;a href="http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf"&gt;http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; "Data, Data Everywhere." The Economist, February 25, 2010. Accessed March 17, 2016, &lt;a href="http://www.economist.com/node/15557443"&gt;http://www.economist.com/node/15557443&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; "Smart Cities." ISO. 2015. Accessed March 17, 2016, &lt;a href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november"&gt;http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Smart Nation Vision, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision"&gt;https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Smart Nation Platform, &lt;a href="https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf"&gt;https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/"&gt;https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;[11]&lt;/a&gt; Constitution of the Republic of Singapore (Responsibility of the Prime Minister) Notification 2015, &lt;a href="http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes"&gt;http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;[12]&lt;/a&gt; Personal Data Protection Singapore-Annual Report 2014-15, &lt;a href="https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf"&gt;https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;[13]&lt;/a&gt; Balancing Innovation and Personal Data Protection, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection"&gt;https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;[14]&lt;/a&gt; Department of Statistics Singapore- Free Access to More Data on the SingStat Website from 1 March 2015, &lt;a href="http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf"&gt;http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;[15]&lt;/a&gt; Singapore Marks 50th Birthday With Open Data Contest, &lt;a href="https://blog.hootsuite.com/singapore-open-data/"&gt;https://blog.hootsuite.com/singapore-open-data/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;[16]&lt;/a&gt; Virtual Singapore - a 3D city model platform for knowledge sharing and community collaboration, &lt;a href="http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx"&gt;http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;[17]&lt;/a&gt; Internet of Things (IoT) Standards Outline to Support Smart Nation Initiative Unveiled, &lt;a href="http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx"&gt;http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;[18]&lt;/a&gt; Information Technology Standards Committee, &lt;a href="https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc"&gt;https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc&lt;/a&gt; and &lt;a href="https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf"&gt;https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;[19]&lt;/a&gt; Government of Dubai-2021 Dubai Plan-Purpose, &lt;a href="http://www.dubaiplan2021.ae/the-purpose/"&gt;http://www.dubaiplan2021.ae/the-purpose/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20"&gt;[20]&lt;/a&gt; Government of Dubai-2021 Dubai Plan, &lt;a href="http://www.dubaiplan2021.ae/dubai-plan-2021/"&gt;http://www.dubaiplan2021.ae/dubai-plan-2021/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;[21]&lt;/a&gt; Smart Dubai, &lt;a href="http://www.smartdubai.ae/foundation_layers.php"&gt;http://www.smartdubai.ae/foundation_layers.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;[22]&lt;/a&gt; The Internet of Things: Connections for People’s happiness, &lt;a href="http://www.smartdubai.ae/story021002.php"&gt;http://www.smartdubai.ae/story021002.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;[23]&lt;/a&gt; Smart Dubai - Current State, &lt;a href="http://www.smartdubai.ae/current_state.php"&gt;http://www.smartdubai.ae/current_state.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;[24]&lt;/a&gt; Smart Dubai - District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;[25]&lt;/a&gt; See; &lt;a href="http://roadmap.smartdubai.ae/search-services-public.php"&gt;http://roadmap.smartdubai.ae/search-services-public.php&lt;/a&gt; and &lt;a href="http://roadmap.smartdubai.ae/search-initiatives-public.php"&gt;http://roadmap.smartdubai.ae/search-initiatives-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;[26]&lt;/a&gt; Smart Dubai-Smart District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;[27]&lt;/a&gt; Dubai Ruler issues new laws to further enhance the organisational structure and legal framework of Dubai Smart City, &lt;a href="https://www.wam.ae/en/news/emirates/1395288828473.html"&gt;https://www.wam.ae/en/news/emirates/1395288828473.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;[28]&lt;/a&gt; See: &lt;a href="http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439"&gt;http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439&lt;/a&gt; and &lt;a href="http://www.smartdubai.ae/dubai_data.php"&gt;http://www.smartdubai.ae/dubai_data.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;[29]&lt;/a&gt; Dubai first city to trial ITU key performance indicators for smart sustainable cities, &lt;a href="http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU"&gt;http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;[30]&lt;/a&gt; Smart Dubai Benchmark Report 2015 Executive Summary, &lt;a href="http://smartdubai.ae/bmr2015/methodology-public.php"&gt;http://smartdubai.ae/bmr2015/methodology-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;[31]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf"&gt;http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;[32]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;http://www1.nyc.gov/site/forward/innovations/smartnyc.page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;[33]&lt;/a&gt; One New York: The Plan for a Strong and Just City, &lt;a href="http://www1.nyc.gov/html/onenyc/about.html"&gt;http://www1.nyc.gov/html/onenyc/about.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;[34]&lt;/a&gt; Open Data for All, &lt;a href="http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf"&gt;http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;[35]&lt;/a&gt; 7 public projects that are turning New York into a “smart city”, &lt;a href="http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub"&gt;http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;[36]&lt;/a&gt; LinkNYC, &lt;a href="https://www.link.nyc/faq.html#privacy"&gt;https://www.link.nyc/faq.html#privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;[7]&lt;/a&gt; ANSI Network on Smart and Sustainable Cities, &lt;a href="http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3"&gt;http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;[38]&lt;/a&gt; IoT-Enabled Smart City Framework, &lt;a href="http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf"&gt;http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;[39]&lt;/a&gt; Smart London (UK) Plan: Digital Technologies, London and Londoners, &lt;a href="http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf"&gt;http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;[40]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;[41]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;[42]&lt;/a&gt; Open Data White Paper, &lt;a href="https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf"&gt;https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;[43]&lt;/a&gt; London Datastore-Privacy, &lt;a href="http://data.london.gov.uk/about/privacy/"&gt;http://data.london.gov.uk/about/privacy/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;[44]&lt;/a&gt; Future Cities Standards Centre in London, &lt;a href="https://eu-smartcities.eu/commitment/5937"&gt;https://eu-smartcities.eu/commitment/5937&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;[45]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;[46]&lt;/a&gt; Smart Cities background paper, October 2013, &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf"&gt;https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;[47]&lt;/a&gt; Presentation of 2015 Blueprint of Seoul as ‘State-of-the-art Smart City’, &lt;a href="http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/"&gt;http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;[48]&lt;/a&gt; “Policy Where There is Demand,” Seoul Utilizes Big Data, &lt;a href="http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/"&gt;http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;[49]&lt;/a&gt; Seoul’s “Owl Bus” Based on Big Data Technology, &lt;a href="http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf"&gt;http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;[50]&lt;/a&gt; Seoul Launches “Global Digital Seoul 2020”, &lt;a href="http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/"&gt;http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;[51]&lt;/a&gt; Smart Seoul 2015, &lt;a href="http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf"&gt;http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;[52]&lt;/a&gt; Disclosing public data through the Seoul Open Data Plaza, &lt;a href="http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/"&gt;http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;[53]&lt;/a&gt; Data protection in South Korea: overview, &lt;a href="http://uk.practicallaw.com/2-579-7926"&gt;http://uk.practicallaw.com/2-579-7926&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;[54]&lt;/a&gt;Smart Cities Seoul: a case study, &lt;a href="https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf"&gt;https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;[55]&lt;/a&gt; Smart Cities-ISO, &lt;a href="http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764"&gt;http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities'&gt;https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Kiran A. B., Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-11T13:29:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-national-geospatial-policy-draft-v-1-0-2016">
    <title>Comments on the National Geospatial Policy (Draft, V.1.0), 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-national-geospatial-policy-draft-v-1-0-2016</link>
    <description>
        &lt;b&gt;The Department of Science and Technology published the first public draft of the National Geospatial Policy (v.1.0) on May 05, 2016, and invited comments from the public. CIS submitted the following comments in response. The comments were authored by Adya Garg, Anubha Sinha, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. Preliminary&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (&lt;strong&gt;"CIS"&lt;/strong&gt;) on the proposed draft of the National Geospatial Policy 2016 (&lt;strong&gt;"the draft Policy / the draft NGP"&lt;/strong&gt;) &lt;strong&gt;[1]&lt;/strong&gt;. This submission is based on Version 1.0 of the draft Policy released by the Department of Science and Technology (&lt;strong&gt;"DST"&lt;/strong&gt;) on May 5, 2016.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the DST under the aegis of the Ministry of Science and Technology, Government of India, for its efforts at seeking inputs from various stakeholders to draft a National Geospatial Policy. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h2&gt;2. The Centre for Internet and Society&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, &lt;strong&gt;[2]&lt;/strong&gt; is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2.2.&lt;/strong&gt; This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and the various kinds of public goods that can emerge from greater availability of open (geospatial) data created by both public and private agencies and crucially, by the citizens. The submission is  limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h2&gt;3. Comments and Recommendations&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.&lt;/strong&gt; The draft policy should make references to five policies applicable to geospatial data, products, services, and solutions&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes that the draft policy lists the key policies related to geospatial information and sharing of government data, namely the National Map Policy 2005, the Civil Aviation Requirement 2012, the Remote Sensing Data Policy 2011 and 2012, and the National Data Sharing and Accessibility Policy 2012 (“NDSAP”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, Geospatial Data,Products, Services and Solutions (“GDPSS”) are also intricately linked to concepts of “open standards,” “open source software,” “open API,” “right to information,” and prohibited places” These concepts are governed by specific acts and policies, and are applicable to geospatial data, as follows:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Adoption of Open Standards: CIS observes that the draft policy captures the importance of open standards in the section 1.4 of the draft policy. It states that “A very high resolution and highly accurate framework to function as a national geospatial standard for all geo-referencing activity through periodically updated National Geospatial Frame [NGF] and National Image Frame [NIF] by ensuring open standards based seamless interoperable geospatial data.”&lt;br /&gt;&lt;br /&gt;CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[3]&lt;/strong&gt; which establishes the Guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[4]&lt;/strong&gt; listing two key open standards for geospatial data - KML and GML, should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;CIS recommends that the final version of the NGP embrace open standards as a key principle of all software projects and infrastructures within the purview of the Policy. This is essential for easier sharing and reuse of open (geospatial) data.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Adoption of Open Source Software:  The Policy on Adoption of Open Source Software for Government of India states that the “Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organisations, as a preferred option in comparison to Closed Source Software” &lt;strong&gt;[5]&lt;/strong&gt;. As the draft policy proposed to guide the development of GDPSS being developed and implemented both by the Government of India and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Implementation of Open APIs: To actualise the stated principle to “[e]nable promotion, adoption and implementation of emerging / state of the art technologies”  as well as to ensure the “[a]vailability of all geospatial data collected through public funded mechanism to all users,” CIS suggests that final version of the NGP must refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[6]&lt;/strong&gt;. This will ensure that the openly available geospatial data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act 2005: The framework for reactive disclosure of information and data collected and held by the Government of India, as well as the basis for proactive disclosure of the same, is enshrined in the Right to Information Act 2005 &lt;strong&gt;[7]&lt;/strong&gt;. The draft NGP, CIS proposes, should refer to this Act, and ensure that whenever an Indian citizen request for such government data and/or information that is of geospatial in nature, and the requested data and/or information is both shareable and non-sensitive, the citizen must be provided with the geospatial data and/or information in an open standard and under open license, as applicable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Refer to Official Secrets Act, 1923: The Official Secrets Act defines “Prohibited Places” and prohibits all activities involving “sketch, plan, model, or note which is calculated to be or might be or is intended to be, directly; or indirectly, useful to an enemy or (c) obtains collects, records or publishes or communicates to any other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy” &lt;strong&gt;[8]&lt;/strong&gt;. This provides the fundamental legal basis for regulation, expunging, and stopping circulation of geospatial data containing information about Vulnerable Points and Vulnerable Areas. CIS submits that this Act should be referred to in this context of ensuring non-publication of sensitive geospatial data (that is geospatial data related to Prohibited Places).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;3.2. Grant adequate permissions to the public to re-use geospatial data&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; CIS observes that section 1.4 of the draft policy states that, “Geospatial data of any resolution being disseminated through agencies and service providers, both internationally and nationally be treated as unclassified and made available and accessible by Indian Mapping and imaging agencies.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS recommends the abovementioned section be broadened to include not only availability and accessibility of geospatial data, but also its re-use. Further, such accessibility, availability and re-use should not be only limited to public and private entities such as Indian mapping and imaging agencies, but as well as  to Indian people in general.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; CIS further submits that section 1.4 be revised as  “[g]eospatial data of any resolution being disseminated through agencies and service providers, both internationally and nationally be treated as unclassified and made available, accessible, and reusable by Indian mapping and imaging agencies in particular, and by the people of India in general.”&lt;/p&gt;
&lt;h3&gt;3.3. Ensure Open Access to shareable and non-sensitive geospatial data&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; CIS observes that the draft policy directs all “geospatial data generating agencies” to classify their data into “open access,” “registered access,” and “restricted access.” The document, however, neither defines “geospatial data generating agencies”, nor does it clarify what conditions the data must satisfy to be classified as one of the three types. Without a listing of such conditions (at least necessary, and not sufficient, conditions), nothing restricts the agencies from classifying all generated geospatial data as “restricted.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, CIS observes that the draft policy aims to provide geospatial data acquired through public funded mechanism to be made available to the public at free of cost. It is submitted that the policy should not only be made available for free of cost, but it should also be made available in open standard format under an open license.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.3.&lt;/strong&gt; As defined in the section 1.3, the National Data Sharing and Accessibility Policy (“NDSAP”) applies to “all shareable non-sensitive data available either in digital or analog forms but generated using public funds” &lt;strong&gt;[9]&lt;/strong&gt;. Clearly all shareable &lt;strong&gt;[10]&lt;/strong&gt; and non-sensitive &lt;strong&gt;[11]&lt;/strong&gt; geospatial data, either in digital or analog forms, and generated using public funds should be proactively disclosed by the government agency concerns in accordance to the NDSAP. CIS recommends that the draft policy makes an explicit reference to NDSAP when discussing the topic of Open Access geospatial data, and re-iterates the mandate of proactive publication of shareable and non-sensitive government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.4.&lt;/strong&gt; Further, the process for defining an open government data license to be applied to all open government data sets being published under the NDSAP, and through the Open Government Data Platform India, is in progress. Given this, it is absolutely crucial important that the draft NGP takes this into consideration, and mandates that Open Access geospatial data must be published using the open government data license to be defined by the Implementation Guidelines of the NDSAP, when applicable.&lt;/p&gt;
&lt;h3&gt;3.4. Lack of clarity regarding the clearances and permits required for data acquisition and dissemination, and the procedures thereof&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; Section 1.8 of the draft policy states that “[a]ll clearances / permits, as necessary, for data acquisition and dissemination be through a single window, online portal. These clearances be provided within a time span of 30 days of filing the online request.” CIS observes that the draft policy does not specify the kind of clearances/permits needed before a public or private entity, or an individual, can undertake acquisition and dissemination of geospatial data. It neither clarifies under what circumstances and conditions application for such clearance / permits would be required for users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; Since the recently published draft Geospatial Information Regulation Bill (“GIRB”) 2016, directly addresses this topic of clearance / permit required to acquire and share geospatial information &lt;strong&gt;[12]&lt;/strong&gt;, it will be effective if the NGP can refer to this Bill and provide an overall governance framework for the same. Further, CIS noted that the time span of 30 days mentioned in the draft policy is inconsistent with the time period specified in the GIRB (which is 90 days).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; CIS recommends that the draft policy also be amended suitably to include the circumstances and conditions under which required permissions shall be issued. Accordingly, the draft policy should reference the standardised and time bound security vetting process envisaged in the GIRB.&lt;/p&gt;
&lt;h3&gt;3.5. Clarification Needed regarding “Cybersecurity is to be ensured through … use of Digital Watermarks for authentication of GDPSS”&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; CIS submits that the draft policy does not elaborate on the use of  “Digital Watermarks” to ensure cybersecurity, neither it is explained who will authenticate GDPSS, under what conditions, and for what reasons. CIS recommends that the draft policy be amended suitably to specify the same.&lt;/p&gt;
&lt;h3&gt;3.6. Remove Classification of Non-Public (at Present) Satellite / Aerial Imagery as Restricted by Default&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; CIS observes that the draft policy recommends that “[s]atellite/aerial images of resolution other than those currently made available on websites” should all be “classified for restricted access.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.2.&lt;/strong&gt; CIS submits that blanket categorisation of all satellite / aerial imagery of resolution that is not currently available through a public website (for whatever reason it might be) as “restricted access” should be re-evaluated, given the immense importance of such imagery to mapping agencies and industry participants using GDPSS.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.6.3.&lt;/strong&gt; CIS recommends that the section be revised to define clear principles for defining satellite /aerial imagery as “open,” “registered,” and “restricted.”&lt;/p&gt;
&lt;h3&gt;3.7. Governance of User-contributed Geospatial Data&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; A key resource and feature of contemporary geospatial industry in particular, and the digital economy in general, is the proliferation of user-contributed and user-generated geospatial data and information. CIS observes that this crucial topic, as well as the unique governance concerns that it raises, has not been addressed in the draft policy at all. CIS requests the DST to consider this matter with due attention to the specific nature and values of such user-contributed and user-generated in the digital economy on one hand, and in emergency contexts such as natural disasters on the other, and prepare a framework for its appropriate governance as part of the NGP itself.&lt;/p&gt;
&lt;h3&gt;3.8. Protect Geospatial Privacy of Citizens by Defining Sensitive Personal Geospatial Data and Information&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; CIS observes that the draft policy lacks rules for collection, use, storage, and distribution of geospatial data from an individual’s privacy standpoint. Further, neither does the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 address these concerns &lt;strong&gt;[13]&lt;/strong&gt;. Section 3 of the Rules define “Sensitive personal data or information”, which do not include geospatial information.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; The argument of violation of constitutional right to privacy was pleaded  in a case against Google and other private mapping agencies in 2008 &lt;strong&gt;[14]&lt;/strong&gt;. In the judgment, Madras HIgh Court noted that there existed no legislation/guidelines to prohibit mapping programmes from conducting their activities indiscriminately, and the lack of one thereof prevented the Court from injuncting such activities. Thus, there exists a judicial ambiguity on the aspect of collection and use of geospatial data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.3.&lt;/strong&gt; CIS submits that the draft policy may be suitably amended to ensure that collection, processing and dissemination of geospatial information is in consonance with the constitutionally protection of an individual’s privacy.&lt;/p&gt;
&lt;h3&gt;3.9. Clarification Needed regarding “Mechanisms to be put in place to evaluate / audit GDPSS creation, consumption and distribution”&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; The draft policy suggests that “mechanisms to be put in place to evaluate/audit GDPSS creation, consumption and distribution” without clarifying the scope, purpose, and purview of this mechanism, and most crucially it does not describe what exactly will be evaluated / audited. CIS submits that this section is revised and expanded.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; The same section also identifies the need for a “framework to be put in place to assess the data collection versus its utilization towards government program and socio-economic development.” CIS observes that this is a very promising and much welcome gesture by the DST, but this section must be developed as a separate and detailed mandate. At the least, the NGP may suggest that a more detailed guideline document regarding this framework will be developed in near future.&lt;/p&gt;
&lt;h3&gt;3.10.  Data Taxation and Geospatial Cess&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; The draft policy refers to imposition of “data taxation (geospatial cess)” and use of “licensing” of geospatial data to raise money for geospatial activities of the Government of India. CIS is of the opinion will severely affect the geospatial industry in the country in particular, and will raise the monetary barrier to public use of geospatial data and maps in general; and hence must be strictly avoided.&lt;/p&gt;
&lt;h3&gt;3.11. Data Dissemination Cell&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; CIS submits that instead of development of a separate Data Dissemination Cell within all government agencies to operationalise the mandate of the NGP, the Chief Data Officers within all government agencies identified under the implementation process of the NDSAP be given this complementary responsibility. This would ensure effective channelisation of human and financial resources to take forward the joint mandate of NGP and NDSAP towards greater public availability and use of (shareable and non-sensitive) government data.&lt;/p&gt;
&lt;h3&gt;3.12. Special Infrastructure for Governance, Management, and Publication of Real-time Geospatial Data&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.12.1.&lt;/strong&gt; A key term that the draft policy does not talk about is “big data.” The static or much-slowly-changing geospatial data such as national boundaries and details of Vulnerable Points and Vulnerable Areas are really a very small part of of the global geospatial information. The much larger and crucial part is the real-time (that is continuously produced, stored, analysed, and used in almost real-time) big geospatial data – from geo-referenced tweets, to GPS systems of cars, to mobile phones moving through the cities and regions. Addressing such networked data systems, where all data collected by digital devices can quite easily be born-georeferenced, and the security and privacy concerns that are engendered by them, should be the ultimate purpose of, and challenge for, a future-looking NGP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.2.&lt;/strong&gt; Further, with increasing number of government assets being geo-referenced for the purpose of more effective and real-time management, especially in the transportation sector, the corresponding agencies (which are often not mapping agencies) are acquiring a vast amount of high-velocity geospatial data, which needs to be analysed and (sometimes) published in the real-time. CIS submits a sincere request to DST to highlight the crucial need for special infrastructure for such data, as well as its governance, and identify the key principles concerned in the next version of the draft NGP.&lt;/p&gt;
&lt;h3&gt;3.13. Sincere Request for Preparation and Circulation of a Second Public Draft of the National Geospatial Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.13.1.&lt;/strong&gt; CIS commends the DST for publishing the draft policy, and facilitating a consultation process inviting stakeholders and civil society to submit feedback. The NGP envisages to address crucial concepts of privacy, licensing, intellectual property rights, liability, national security, open data, which cut across and impact various technology platforms, industries and the citizens.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.2.&lt;/strong&gt; In view of the multifarious issues highlighted that arise at the intersection of various legal and ethical concepts, CIS respectfully requests the DST to conduct another round of consultation after the publication of the second draft of the NGP. Multiple rounds of consultation and feedback would contribute to the robustness of the lawmaking process and ensure that the final policy safeguards the general public interest, and the interests and rights of various stakeholders involved.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.13.3.&lt;/strong&gt; CIS is thankful to DST for the opportunity to provide comments, and would be privileged to provide further assistance on the matter to DST.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://www.dst.gov.in/sites/default/files/Draft-NGP-Ver%201%20ammended_05May2016.pdf"&gt;http://www.dst.gov.in/sites/default/files/Draft-NGP-Ver%201%20ammended_05May2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;,  sections 2(d) and 3(b).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP.pdf"&gt;https://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See section 2.11 of NDSAP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; See section 2.10 of NDSAP.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; See: &lt;a href="http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf"&gt;http://mha.nic.in/sites/upload_files/mha/files/GeospatialBill_05052016_eve.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511%281%29.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; J. Mohanraj v (1) Secretary To Government, Delhi; (2) Indian Space Research Organisation, Bangalore; (3) Google India Private Limited, Bangalore, 2008 Indlaw MAD 3562.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-national-geospatial-policy-draft-v-1-0-2016'&gt;https://cis-india.org/openness/comments-on-the-national-geospatial-policy-draft-v-1-0-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Geospatial Data</dc:subject>
    
    
        <dc:subject>National Geospatial Policy</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-06-30T09:40:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016">
    <title> Call for Essays: Studying Internet in India</title>
    <link>https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016</link>
    <description>
        &lt;b&gt;As Internet makes itself comfortable amidst everyday lives in India, it becomes everywhere and everyware, it comes in 40 MBPS Unlimited and in chhota recharges – though no longer in zero flavour – the Researchers at Work (RAW) programme at the Centre for Internet and Society invites abstracts for essays that explore how do we study internet in India today. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Submission deadline extended to &lt;strong&gt;Sunday, July 03&lt;/strong&gt;.&lt;/h3&gt;
&lt;hr /&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/img/RAW_Morpheus-Meme-Digital-Genre.png" alt="What if I told you memes are a new digital genre?" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h6&gt;Source: &lt;a href="http://leonardoflores.net/blog/new-digital-genres-writing-for-social-media/"&gt;Leonardo Flores&lt;/a&gt;.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;How do we move beyond a fascination with new digital things and interfaces that we engage with on the internet, which are increasingly becoming the objects and sites of our research and creative practices? How do we engage with these on their own terms, and perhaps also against the grain? What "new" is being brought in, performed, and afforded by these digital artefacts in our daily lives? How can our concerns and practices benefit from developing an awareness of their aesthetics, functions, and politics?&lt;/p&gt;
&lt;p&gt;This call is for researchers, workers, and others interested in closely – or from a distance – commenting on these topics and questions.&lt;/p&gt;
&lt;p&gt;Please send abstracts (200 words) to &lt;a href="mailto:raw@cis-india.org"&gt;raw@cis-india.org&lt;/a&gt; by &lt;strong&gt;Sunday, July 03, 2016&lt;/strong&gt;. The subject of the email should be 'Studying Internet in India.'&lt;/p&gt;
&lt;p&gt;We will select up to 10 abstracts and announce them on &lt;strong&gt;Tuesday, July 05, 2016&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The selected authors will be asked to submit the final longform essay (3,000-4,000 words) by &lt;strong&gt;Sunday, July 31, 2016&lt;/strong&gt;. The final essays will be published on the RAW Blog. The authors will be offered an honourarium of Rs. 6,000.&lt;/p&gt;
&lt;p&gt;We understand that not all essays can be measured in words. The authors are very much welcome to work with text, images, sounds, videos, code, and other mediatic forms that the internet offers. We will not be running a Word Count on the final 'essay.' The basic requirement is that the 'essay' must offer an &lt;em&gt;argument&lt;/em&gt; – through text, or otherwise.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016'&gt;https://cis-india.org/raw/call-for-essays-studying-internet-in-india-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Notices</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2016-07-04T12:48:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms">
    <title>Comments on Department of Industrial Policy and Promotion Discussion Paper on Standard Essential Patents and their Availability on Frand Terms</title>
    <link>https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society gave its comments to the Department of Industrial Policy and Promotion. The comments were prepared by Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané.&lt;/b&gt;
        &lt;p&gt;&lt;strong&gt;&lt;a href="https://cis-india.org/a2k/blogs/dipp-comments.pdf" class="external-link"&gt;Download the PDF &lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;To access other submissions to the DIPP Discussion Paper on SEP and FRAND, please &lt;a class="external-link" href="http://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms"&gt;click here&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Authors &lt;a name="_ftnref1"&gt;&lt;/a&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;I. PRELIMINARY&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;1. &lt;/strong&gt; This submission presents comments by the Centre for Internet and Society, India ("&lt;strong&gt;CIS&lt;/strong&gt;") on the	&lt;i&gt;Discussion Paper on Standard Essential Patents and their Availability on FRAND Terms&lt;/i&gt; (dated 01 March, 2016), released by the Department of Industrial Policy and Promotion ("&lt;strong&gt;the&lt;/strong&gt; &lt;strong&gt;DIPP&lt;/strong&gt;"), Ministry of Commerce and Industry, Government of India ("	&lt;strong&gt;the discussion paper/ discussion paper&lt;/strong&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;2. &lt;/strong&gt; CIS commends the DIPP for its efforts at seeking inputs from various stakeholders on this important and timely issue. CIS is thankful for the opportunity 	to put forth its views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;3. &lt;/strong&gt; This submission is divided into three main parts. The &lt;i&gt;first &lt;/i&gt;part, 'Preliminary', introduces the document; the &lt;i&gt;second&lt;/i&gt; part, 'About CIS', 	is an overview of the organization; and, the &lt;i&gt;third &lt;/i&gt;part, 'Submissions on the Issues', answers the questions raised in the discussion paper. A list 	of annexures and their URLs is included at the end of the document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;II. ABOUT CIS&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;4. &lt;/strong&gt; CIS is a non-profit organisation	&lt;a name="_ftnref2"&gt;&lt;/a&gt; that undertakes 	interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for 	persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open 	standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, 	intermediary liability, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;5. &lt;/strong&gt; CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these 	values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles. In addition, the comments are in line with the aims of the Make in India&lt;a name="_ftnref3"&gt;&lt;/a&gt; and Digital India	&lt;a name="_ftnref4"&gt;&lt;/a&gt; initiatives of the 	Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;III. SUBMISSION ON THE ISSUES FOR RESOLUTION&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;6. &lt;/strong&gt; The following sections provide CIS' views and recommendations on the issues enumerated in section 11 of the discussion paper:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; a) 		&lt;i&gt; Whether the existing provisions in the various IPR-related legislations, especially the Patents Act, 1970 and antitrust legislations, are adequate 			to address the issues related to SEPs and their availability on FRAND terms? If not, then can these issues &lt;/i&gt; &lt;i&gt;be addressed through appropriate amendments to such IPR-related legislations? If so, what changes should be affected?&lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A.1. &lt;/strong&gt; The issues related to Standard Essential Patents ("&lt;strong&gt;SEPs&lt;/strong&gt;") and their licensing on a fair, reasonable and non-discriminatory ("&lt;strong&gt;FRAND&lt;/strong&gt;") basis lie at the intersection of intellectual property ("&lt;strong&gt;IP&lt;/strong&gt;") law and competition law	&lt;a name="_ftnref5"&gt;&lt;/a&gt;. As such, in India, the 	Patents Act, 1970 ("&lt;strong&gt;the Patents Act&lt;/strong&gt;") and, the Competition Act, 2002 ("&lt;strong&gt;the Competition Act&lt;/strong&gt;") are the relevant legislations to be studied. These have been recently discussed, most recently, by Justice Bakhru in his comprehensive order in&lt;i&gt;Telefonaktiebolaget LM Ericsson (Publ)&lt;/i&gt; v. &lt;i&gt;Competition Commission of India and Another.&lt;/i&gt; &lt;a name="_ftnref6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A.2. &lt;/strong&gt; It is our submission that at the moment, amendments to the Patents Act and the Competition Act may not be preferred. As Justice Bakhru has noted in the 	aforesaid decision,&lt;a name="_ftnref7"&gt;&lt;/a&gt; there 	is no conflict between the remedies in the Patents Act and in the Competition Act, and, the pursuit of rights and remedies under one of these legislations 	does not bar a party from pursuing rights and remedies in the other. Further, under both legislations, there are scenarios for the respective authorities - the Controller General of Patents, Designs and Trademarks ("&lt;strong&gt;the Controller&lt;/strong&gt;") and the Competition Commission of India ("	&lt;strong&gt;the CCI&lt;/strong&gt;") for the Patents Act and for the Competition Act respectively - to seek inputs from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A.3. &lt;/strong&gt; We also note that the CCI is a fairly nascent regulator; one whose jurisdiction is not yet a settled matter of law. While the judgment in the Ericsson-CCI 	case&lt;a name="_ftnref8"&gt;&lt;/a&gt; is indeed a good 	beginning, we do not believe that the matter has been conclusively decided. Accordingly, given the complex legal questions involved, over not just the 	interpretation of the Patents Act and the Competition Act, but also constitutional issues around the jurisdiction of regulators and the power of judicial 	review of the courts,&lt;a name="_ftnref9"&gt;&lt;/a&gt; we 	believe that it would be prudent to examine the ruling of the courts on these issues in some detail, before considering amendments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A.4. &lt;/strong&gt; In addition, we are of the opinion that our IP law, and, our competition law, fully honor our international commitments, including the requirements under 	the TRIPS Agreement.&lt;a name="_ftnref10"&gt;&lt;/a&gt; As 	such, we would urge the Government of India to not enter into free trade agreements including, &lt;i&gt;inter alia,&lt;/i&gt; the Regional Comprehensive Economic 	Partnership,&lt;a name="_ftnref11"&gt;&lt;/a&gt; that 	threaten our use of TRIPS flexibilities, and, impose 'TRIPS-plus' obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;A.5. &lt;/strong&gt; We also urge the Government of India to adopt a balanced National IPR Policy, and, a National Competition Policy, both of which has been in abeyance for a 	considerable amount of time. We believe that these policies are crucial to realize the objectives of the Make in India and Digital India initiatives. At 	the same time, we submit that these policies be balanced, taking into account the interests of all stakeholders, developed through an extensive 	consultative process, and, suitably modified based on feedback.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; b) What should be the IPR policy of Indian Standard Setting Organizations in developing Standards for Telecommunication sector and other sectors in 			India where Standard Essential Patents are used? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.1.&lt;/strong&gt; The discussion paper identifies four Standard Setting Organizations ("&lt;strong&gt;SSOs&lt;/strong&gt;") in India, namely, the Telecom Standards Development Society of India ("&lt;strong&gt;TSDSI&lt;/strong&gt;"), the Telecommunication Engineering Center ("&lt;strong&gt;TEC&lt;/strong&gt;"), the Bureau of Indian Standards ("	&lt;strong&gt;BIS&lt;/strong&gt;"), the Global ICT Standardization Forum for India ("&lt;strong&gt;GISFI&lt;/strong&gt;"), and, the Development Organization of Standards for 	Telecommunications in India ("&lt;strong&gt;DOSTI&lt;/strong&gt;"). Comments on each of their policies have been made in the following paragraphs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.2.&lt;/strong&gt; The BIS does not have an intellectual property rights ("&lt;strong&gt;IPR&lt;/strong&gt;") policy of its own. The BIS Act, 2016	&lt;a name="_ftnref12"&gt;&lt;/a&gt; does not include one 	either. As the discussion paper notes, the BIS refers to the IPR policies of the relevant international SSO in the context of technology implemented in 	India, that is the same or equivalent to the ones developed or maintained by the respective SSOs.We recommend that BIS adopt an IPR policy at the earliest, 	factoring in India specific requirements differences: a large and exponentially growing mobile device market makes it possible for manufacturers, patent 	owners and implementers alike to achieve financial gains even with a low margin ("&lt;strong&gt;India specific requirements&lt;/strong&gt;"). In addition, our comments 	on the IPR policy of the TSDSI in paragraph &lt;strong&gt;B.4.&lt;/strong&gt; of this submission (below), may also be considered for the content of the BIS' future 	policy on IPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.3&lt;/strong&gt; . According to the discussion paper, the TEC considers the IPR policies of the International Telecommunication Union. We recommend that like the BIS, the 	TEC also adopt its own IPR policy, factoring in the India specific requirements detailed above. In addition, our comments on the IPR policy of the TSDSI in 	paragraph &lt;strong&gt;B.4.&lt;/strong&gt; of this submission (below), may also be considered for the content of the BIS' future policy on IPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.4. &lt;/strong&gt; The TSDSI, a relatively new standards body, has defined an IPR policy	&lt;a name="_ftnref13"&gt;&lt;/a&gt;. In respect of this policy, the following observations are presented. &lt;i&gt;First, &lt;/i&gt;this policy notes that IPR owners should be adequately and fairly rewarded.&lt;i&gt;Second, &lt;/i&gt;it requires members to disclose essential IPRs in a "timely fashion."	&lt;a name="_ftnref14"&gt;&lt;/a&gt; &lt;i&gt;Third, &lt;/i&gt;as per its policy, the TSDSI can request the owner of an essential IPR to undertake, within three months, to license it irrevocably on FRAND terms.	&lt;a name="_ftnref15"&gt;&lt;/a&gt; At the same time, the policy also states that the (aforesaid) ask may be subject to the condition that licensees agree to reciprocate.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; Should such an undertaking not be forthcoming, the TSDSI may suspend work on the standard or technical specification in question, or, adopt another course of action.	&lt;a name="_ftnref17"&gt;&lt;/a&gt; &lt;i&gt;Fourth, &lt;/i&gt;the policy identifies two scenarios for the non availability of licences prior to publication,	&lt;a name="_ftnref18"&gt;&lt;/a&gt; based on the existence, 	or, the lack thereof, of alternative technologies. In the event of a lack of alternative technology, the policy requires a member to disclose in writing 	its reasons for not licensing its patents. Following this, it is submitted that there is no clarity on the concrete steps that the TSDSI would adopt in 	case the efforts to convince a member to license their essential IPRs, fail. The policy only states that "the TSDSI shall take further action as deemed 	fit."&lt;a name="_ftnref19"&gt;&lt;/a&gt; The same is also true where the IPR owner is not a member of the TSDSI.	&lt;a name="_ftnref20"&gt;&lt;/a&gt; &lt;i&gt;Fifth, &lt;/i&gt;the policy also envisages a scenario of non-availability post publication.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; The procedure for 	dealing with this is akin to the one detailed above, with the TSDSI asking for a written explanation, considering further action, including the possible 	withdrawal of the standard or technical specification in question. &lt;i&gt;Sixth, &lt;/i&gt;it is observed that the policy does not require a commitment from its 	members to refrain from seeking injunctive relief. &lt;i&gt;Seventh, &lt;/i&gt;it is accordingly recommended that the policy be suitably modified (a) to include 	India specific requirements discussed above; (b) to require a commitment from its members, that they refrain from seeking injunctive relief; (c) to delete 	the condition where FRAND negotiations may be subject to a condition of reciprocity; (d) to identify in detail the procedure to be followed in case of 	patent 'hold-ups' and patent 'hold-outs'; (e) to identify in detail the procedure to be followed in case of refusal to license by TSDSI members, and, 	non-members, both; and, (f) to include a detailed process on the declassification of a standard or technical specification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.5. &lt;/strong&gt; The IPR policy of GISFI&lt;a name="_ftnref22"&gt;&lt;/a&gt;, 	is substantially similar to the IPR policy of the TSDSI, discussed in paragraph &lt;strong&gt;B.4.&lt;/strong&gt; of this submission (above). &lt;i&gt;Inter alia, &lt;/i&gt; GISFI's IPR policy also does not indicate the specific steps to be taken in case an IPR owner refuses to license essential IPRs for which no alternative technology is available. This is true in the cases both, where the refusal is by a member, and, by a non-member.	&lt;a name="_ftnref23"&gt;&lt;/a&gt;Our recommendations on 	the IPR policy of the TSDSI in paragraph &lt;strong&gt;B.4.&lt;/strong&gt; of this submission (above), may also be considered for the GISFI's IPR policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.6. &lt;/strong&gt; According to the discussion paper, the IPR policy of the DOSTI resembles that of the GIFSI. It is submitted that these policies are similar in the context 	of refusal to license by a member or non-member, and, like the TSDSI and the GISFI, the DOSTI also requires the patent holder to license its IPR 	irrevocably on FRAND terms. Accordingly, we reiterate our comments on the IPR policy of the TSDSI in paragraph &lt;strong&gt;B.4.&lt;/strong&gt; of this submission 	(above). The aforesaid recommendations may also be considered to be relevant for the DOSTI's IPR policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;B.7.&lt;/strong&gt; We are also of the opinion that it would be useful for Indian SSOs to consider recommending the use of royalty-free licenses for IPRs. Illustratively, the World Wide Web Consortium ("&lt;strong&gt;W3C&lt;/strong&gt;")	&lt;a name="_ftnref24"&gt;&lt;/a&gt; and the Open Mobile Alliance ("&lt;strong&gt;OMA&lt;/strong&gt;")	&lt;a name="_ftnref25"&gt;&lt;/a&gt; encourage royalty-free 	licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; c) Whether there is a need for prescribing guidelines on working and operation of Standard Setting Organizations by Government of India? If so, 			what all areas of working of SSOs should they cover? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;C.1. &lt;/strong&gt; In our opinion, in a milieu where instances of SEP litigation are becoming increasingly complex, and, there is a tangible threat of the abuse of the FRAND 	process, it might be useful for the Government of India to make suggestions on the working of Indian SSOs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;C.2. &lt;/strong&gt; It is suggested that the Government of India develop Model Guidelines that may be adopted by Indian SSOs, taking into account India specific requirements, 	including the ones detailed in paragraph &lt;strong&gt;B.2.&lt;/strong&gt; of this submission (above). We believe that this measure will also enable the fulfilment of 	the objectives of the Make in India and Digital India initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;C.3. &lt;/strong&gt; We recommend that various stakeholders, including IP holders, potential licensees and users of IP, civil society organizations, academics, and, government 	bodies, including the the Indian Patent Office ("&lt;strong&gt;IPO&lt;/strong&gt;"), the Department of Telecommunications, the DIPP, TRAI, and, the CCI be consulted in 	the creation of these Model Guidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;C.4.&lt;/strong&gt; In our opinion, the Model Guidelines may cover (a) the composition of the SSO; (b) the process of admitting members; (c) the process of the determination 	of a standard or technical specification; (d) the process of declassification of a standard or technical specification; (e) the IPR Policy; (f) resolution 	of disputes; (g) applicable law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; d) Whether there is a need for prescribing guidelines on setting or fixing the royalties in respect of Standard Essential Patents and defining 			FRAND terms by Government of India? If not, which would be appropriate authority to issue the guidelines and what could be the possible FRAND 			terms? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;D.1. &lt;/strong&gt; In light of the inadequacies in the IPR policies (discussed above) of various SSOs in India, as well the the spate of ongoing patent infringement lawsuits 	around mobile technologies, we recommend that the Government of India intervene in the setting of royalties and FRAND terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;D.2. &lt;/strong&gt; We propose that the Government of India initiate the formation of a patent pool of critical mobile technologies and apply a compulsory license with a five 	per cent royalty&lt;a name="_ftnref26"&gt;&lt;/a&gt;. 	Further details of this proposal have been enumerated in answer to question 'f' of the discussion paper (below).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;D.3.&lt;/strong&gt; Our motivations for this proposal are many-fold.&lt;i&gt; &lt;/i&gt;In our opinion, it is near-impossible for potential licensees to avoid inadvertent patent infringement. As a part of our ongoing research on technical standards applicable to mobile phones sold in India, we have found nearly 300 standards so far	&lt;a name="_ftnref27"&gt;&lt;/a&gt;. It is submitted that 	carrying out patent searches for all the standards would be extremely expensive for potential licensees. Further, even if such searches were to be carried 	out, different patent owners, SSOs and potential licensees disagree on valuation, essentiality, enforceability, validity, and coverage of patents. In 	addition, some patent owners are non-practising entities ("&lt;strong&gt;NPEs&lt;/strong&gt;") and may not be members of SSOs. The patents held by them are not likely 	to be disclosed. More importantly, home-grown manufacturers that have no patents to leverage and may be new entrants in the market would be especially 	disadvantaged by such a scenario. Budget phone manufacturers, standing to incur losses either as a result of heavy licensing fees, or, potential 	litigation, may close down. Alternatively, they may pass on their losses to consumers, driving the now-affordable phones out of their financial reach. With 	the objectives of Make in India and Digital India in sight, it is essential that Indian consumers continue to have access to devices within their 	purchasing power.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; e) On what basis should the royalty rates in SEPs be decided? Should it be based on Smallest Saleable Patent Practicing Component (SSPPC), or on 			the net price of the Downstream Product, or some other criterion? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;E.1. &lt;/strong&gt; It is our submission that royalty rates for SEPs should be based on the smallest saleable patent practising component ("&lt;strong&gt;SSPPC&lt;/strong&gt;"). Most 	modern telecommunication and IT devices are complex with numerous technologies working in tandem. Different studies indicate that the number of patents in the US applicable to smartphones is between 200,000 and 250,000.	&lt;a name="_ftnref28"&gt;&lt;/a&gt; A comprehensive patent landscape of mobile device technologies conducted by CIS reveals that nearly 4,000 patents are applicable to mobile phones sold in India.	&lt;a name="_ftnref29"&gt;&lt;/a&gt; It is thus extremely 	difficult to quantify the exact extent of interaction and interdependence between technologies in any device, in such a way that the exact contribution of 	the patented technology to the entire device can be determined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;E.2. &lt;/strong&gt; The net cost of the device is almost always several times that of the chipset that implements the patented technology. Armstrong et al	&lt;a name="_ftnref30"&gt;&lt;/a&gt; have found that the 	cost of a 4G baseband chip costs up to $20 including royalties in a hypothetical $400 phone sold in the US. One of the litigating parties in the ongoing 	patent infringement lawsuits in India has stated that one of the reasons for preferring to leverage its patents as downstream as possible in the value chain is that it will earn the company more royalties	&lt;a name="_ftnref31"&gt;&lt;/a&gt;. In instances where 	patent exhaustion occurs much earlier in the value chain, such as in the case of the company's cross-licenses with Qualcomm (another company that owns 	patents to chip technologies), the company does not try to obtain royalties from the selling prices of devices for the cross-licensed technologies. It is 	submitted that such market practices could be detrimental to the government's objectives such as providing a mobile handset to every Indian by 2020 as a part of the Digital India programme	&lt;a name="_ftnref32"&gt;&lt;/a&gt;. It is also worth 	noting in this context that the mobile device is the first and only medium of access to the Internet and telecom services for a large number of Indians, and, consequently, the only gateway to access to knowledge, information and critical services, including banking.	&lt;a name="_ftnref33"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;E.3. &lt;/strong&gt; The discussion paper notes that J. Gregory Sidak, having studied the proceedings before the Delhi High Court, approved of the manner in which the court 	determined royalties.&lt;a name="_ftnref34"&gt;&lt;/a&gt; In 	his paper, Sidak(2015)&lt;a name="_ftnref35"&gt;&lt;/a&gt; notes that in determining royalties, the court relied, &lt;i&gt;inter alia, &lt;/i&gt;on the decision of &lt;i&gt;CSIRO&lt;/i&gt; v.&lt;i&gt;Cisco&lt;/i&gt; ("&lt;strong&gt;the CSIRO case&lt;/strong&gt;"), a 2015 decision of the US Court of Appeals for the Federal Circuit. 2015.	&lt;a name="_ftnref36"&gt;&lt;/a&gt; We humbly disagree with 	the opinion of the Delhi High Court on the manner of determining royalties, and, with Sidak's approval of the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;E.4.&lt;/strong&gt; It is our submission that the CSIRO case	&lt;a name="_ftnref37"&gt;&lt;/a&gt; relied on a previous 	judgment, which we disagree with. The decision, a 2014 district court judgment, analogises the determination of royalties on SEPs to the determination of 	royalties on a copyrighted book. The court notes, "[b]asing a royalty solely on chip price is like valuing a copyrighted book based only on the costs of 	the binding, paper, and ink needed to actually produce the physical product. While such a calculation captures the cost of the physical product, it 	provides no indication of its actual value." In our opinion, this analogy is flawed. While a book is a distinct product as a whole, a mobile phone is a 	sum-total of its parts. If at all, a mobile phone could be compared with a book with several authors, as multiple technologies belonging to several patent 	holders are implemented in it. This judgement bases valuation for one set of technologies on the whole device, thus awarding compensation to the licensor 	even for those technologies implemented in the device that are not related to the licensed technologies. In our opinion, charging royalty on the net 	selling price of a device for one technology or one set of technologies is thus more like a referral scheme and less like actual compensation for the value 	added. Accordingly, royalties must be charged on the SSPPC principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; f) Whether total payment of royalty in case of various SEPs used in one product should be capped? If so, then should this limit be fixed by 			Government of India or some other statutory body or left to be decided among the parties? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.1. &lt;/strong&gt; CIS has proposed a compulsory licensing fee of five per cent on a patent pool of critical mobile technologies. The rationale for this figure is the royalty 	cap imposed by India in the early 1990s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.2.&lt;/strong&gt; As part of regulating foreign technology agreements, the (former) Department of Industrial Development (later merged with the DIPP) capped royalty rates in 	the early 1990s. Payment of royalties was capped at either a lump sum payment of $2 million, or, 5 percent on the royalty rates charged for domestic sale, and, 8 percent for export of goods pertaining to "high priority industries".	&lt;a name="_ftnref38"&gt;&lt;/a&gt; Royalties higher than 5 	percent or 8 percent, as the case may be, required securing approval from the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.3.&lt;/strong&gt; While the early 1990s (specifically, 1991) was too early for the mobile device manufacturing industry to be listed among high priority industries, the 	public announcement by the government covered computer software, consumer electronics, and electrical and electronic appliances for home use. The cap on royalty rates was lifted by the DIPP in 2009.	&lt;a name="_ftnref39"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.4.&lt;/strong&gt; It is submitted in the case of mobile device technology, we are witnessing a situation similar to that of the 1990s. In this sphere, most of the patent 	holders are multinational corporations which results in large royalty amounts leaving India. At the same time, in our opinion, litigation over patent 	infringement in India has limited the manufacture and sale of mobile devices of homegrown brands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.5.&lt;/strong&gt; We believe that the aforementioned developments are detrimental to the Make in India and Digital India initiatives of the Government of India, and, the 	government's aim of encouraging local manufacturing, facilitating indigenous innovation, as well as strengthening India's intellectual property regime. It 	is our submission, therefore, that the payment of royalties on SEPs be capped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.6.&lt;/strong&gt; We submit that such a measure is particularly important, given the nature of SEP litigation in India. While SEP litigation in India is indeed comparable to 	international SEP litigation on broader issues raised, specifically competition law concerns, but differs crucially where the parties are concerned. 	International SEP litigation is largely between multinational corporations with substantial patent portfolios, capable of engaging in long drawn out 	litigations, or engaging in other strategies including setting off against each other's patent portfolios. Dynamics in the Indian market differ - with a larger SEP holder litigating against smaller manufacturers, many of whom are indigenous, home-grown.	&lt;a name="_ftnref40"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.7.&lt;/strong&gt; In June, 2013, we had recommended to the erstwhile Hon'ble Minister for Human Resource Development	&lt;a name="_ftnref41"&gt;&lt;/a&gt; that a patent pool of 	essential technologies be established, with the compulsory licensing mechanism. Subsequently, in February, 2015, we reiterated this request to the Hon'ble 	Prime Minister.&lt;a name="_ftnref42"&gt;&lt;/a&gt; We propose that the Government of India initiate the formation of a patent pool of critical mobile technologies and mandate a five percent compulsory license.	&lt;a name="_ftnref43"&gt;&lt;/a&gt; As we have stated in 	our request to the Hon'ble Prime Minister, we believe that such a pool would "possibly avert patent disputes by ensuring that the owners' rights are not 	infringed on, that budget manufacturers are not put out of business owing to patent feuds, and that consumers continue to get access to inexpensive mobile 	devices. Several countries including the United States issue compulsory licenses on patents in the pharmaceutical, medical, defence, software, and engineering domains for reasons of public policy, or to thwart or correct anti-competitive practices."	&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;F.8.&lt;/strong&gt; We believe that such a measure is not in breach of our international obligations under the TRIPS Agreement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;g) Whether the practice of Non-Disclosure Agreements (NDA) leads to misuse of dominant position and is against the FRAND terms?&lt;/i&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.1.&lt;/strong&gt; The issue of Non Disclosure Agreements ("&lt;strong&gt;NDAs&lt;/strong&gt;") in SEP/FRAND litigation is a contentious one. Patent holders argue that they are essential 	to the license negotiation process to protect confidential information, whereas potential licensees submit that NDAs result in the imposition of onerous 	conditions.&lt;a name="_ftnref45"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.2.&lt;/strong&gt; In India's SEP litigation, the use of NDAs has been raised as an issue in at least two cases - separately by Intex&lt;a name="_ftnref46"&gt;&lt;/a&gt; and by iBall	&lt;a name="_ftnref47"&gt;&lt;/a&gt;, in their cases against 	Ericsson. Intex and iBall have both claimed that the NDAs that Ericsson asked them to sign were onerous, and favoured Ericsson.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.3.&lt;/strong&gt; According to Intex, the NDA in question would result in high legal costs for Intex, and, would render it unable to disclose crucial information to its vendors (who had agreed to supply to Intex on the condition that Intex was not infringing on any patents).	&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.4.&lt;/strong&gt; According to iBall, the parties had agreed to enter a global patent license agreement ("&lt;strong&gt;GPLA&lt;/strong&gt;") but Ericsson insisted on an NDA. Upon 	receiving the terms of the NDA, iBall claimed before the CCI that Ericsson's refusal to identify the allegedly infringed SEPs; the threat of patent 	infringement proceedings; the attempt to coax iBall to enter into a "one-sided and onerous NDA"; the tying and bundling patents irrelevant to iBall's 	products by way of a GPLA; demanding unreasonably high royalties by way of a certain percentage value of handset as opposed to the cost of actual patented technology used all constituted abuse of Ericsson's dominant position under Section 4 of the Competition Act.	&lt;a name="_ftnref49"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.5.&lt;/strong&gt; In India, the law on misuse (abuse) of dominant position by an 'enterprise' is found primarily in Section 4 of the Competition Act (read with Section 2(h) of the Competition Act, which defines 'enterprise'). In its recent decision in the Ericsson-CCI case	&lt;a name="_ftnref50"&gt;&lt;/a&gt;, the Delhi High Court 	has found Ericsson to be an 'enterprise' for the purposes of the Competition Act, and hence subject to an inquiry under Section 4 of the same legislation. 	In the same decision, the court has also recognised the jurisdiction of the CCI to examine Ericsson's conduct for abuse of behaviour, based on complaints 	by Micromax and Intex. The use of NDAs is one of the grounds on which the parties have complained to the CCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;G.6.&lt;/strong&gt; Pending a final determination by the CCI (and subsequent appeals), it would be premature to make an absolute claim on whether the use of NDAs results in an 	abuse of dominant position in &lt;i&gt;all&lt;/i&gt; instances. However, the following submissions are made: &lt;i&gt;First, &lt;/i&gt;the determination of misuse/abuse of dominant position is influenced by a number of factors	&lt;a name="_ftnref51"&gt;&lt;/a&gt;, i.e., such a 	determination should be made on a case to case basis. &lt;i&gt;Second, &lt;/i&gt;the market regulator, the CCI, is best situated to determine (a) abuse of dominance, 	and (b) whether the use of NDAs by an enterprise constitutes an abuse of its dominance. &lt;i&gt;Third, &lt;/i&gt;the question of whether the use of NDAs constitutes 	misuse of dominance needs to be addressed in two parts - (a) whether the use of the NDA &lt;i&gt;itself &lt;/i&gt;is abusive, irrespective of its terms and, (b) 	whether the use of certain specific terms renders the NDA abusive. &lt;i&gt;Fourth, &lt;/i&gt;NDAs could potentially lead to the patent owner abusing its dominant 	position in the market, as well as result in an invalidation of FRAND commitments and terms. NDAs make it impossible to determine if a patent holder is 	engaging in discriminatory licensing practices. &lt;i&gt;Fifth, &lt;/i&gt;NDAs are especially harmful in the case of NPEs-- companies that hold patents and monetise 	them but don't build or manufacture the components or devices that implement the technology associated with the patents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; h) What should be the appropriate mode and remedy for settlement of disputes in matters related to SEPs, especially while deciding FRAND terms? 			Whether Injunctions are a suitable remedy in cases pertaining to SEPs and their availability on FRAND terms? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;H.1.&lt;/strong&gt; The licensing of SEPs on FRAND terms requires the parties to negotiate "reasonable" royalty rates in good faith, and apply the terms uniformly to all 	willing licensees. It is our submission that if the parties cannot agree to FRAND terms, they may enter into binding arbitration. Further, if all efforts 	fail, there exist remedies under the Patents Act and the Competition Act, 2002 to address the issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;H.2.&lt;/strong&gt; Section 115 of the Patents Act empowers the court to appoint an independent scientific adviser " 	&lt;i&gt; to assist the court or to inquire and report upon any such question of fact or of opinion (not involving a question of interpretation of law) as it may 		formulate for the purpose. &lt;/i&gt; "&lt;a name="_ftnref52"&gt;&lt;/a&gt; Such an independent 	adviser may inform the court on the technical nuances of the matter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;H.3. &lt;/strong&gt; Further&lt;strong&gt;, &lt;/strong&gt;under the Patents Act, pending the decision of infringement proceedings the Court may provide interim relief, if the plaintiff proves &lt;i&gt;first, &lt;/i&gt;a prima facie case of infringement; &lt;i&gt;second, &lt;/i&gt;that the balance of convenience tilts in plaintiff's favour; and,	&lt;i&gt;third, &lt;/i&gt;that if an injunction is not granted the plaintiff shall suffer irreparable damage. &lt;strong&gt;H.4. &lt;/strong&gt;However, it is our suggestion 	that courts adopt a more cautious stance towards granting injunctions in the field of SEP litigation. &lt;i&gt;First, &lt;/i&gt;in our opinion, injunctions may prove 	to be a deterrent to arrive at a FRAND commitment, in particular, egregiously harming the willing licensee. &lt;i&gt;Second, &lt;/i&gt;especially in the Indian 	scenario, where litigating parties operate in vastly different price segments (thereby targeting consumers with different purchasing power), it is 	difficult to establish that "irreparable damage" has been caused to the patent owner on account of infringement. &lt;i&gt;Third, &lt;/i&gt;we note the approach of 	the European Court of Justice, which prohibited the patent holder from enforcing an injunction provided a willing licensee makes an offer for the price it wishes to pay to use a patent under the condition that it deposited an amount in the bank as a security for the patent holder.	&lt;a name="_ftnref53"&gt;&lt;/a&gt; &lt;i&gt;Fourth, &lt;/i&gt;we 	also note the approach of the Federal Trade Commission in the USA, which only authorizes patent holders to seek injunctive relief against potential 	licensees who have either stated that they will not license a patent on any terms, or refuse to enter into a license agreement on terms that have been set in the final ruling of a court or arbitrator.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Further, as Contreras 	(2015)&lt;a name="_ftnref55"&gt;&lt;/a&gt; observes, that 	the precise boundaries of what constitutes as an unwilling licensee remains to be seen. We observe a similar ambiguity in Indian jurisprudence, and 	accordingly submit that courts should carefully examine the conduct of the licensee to injunct them from the alleged infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;i) What steps can be taken to make the practice of Cross-Licensing transparent so that royalty rates are fair &amp;amp; reasonable?&lt;/i&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;I.1.&lt;/strong&gt; The Patents Act requires patentees and licensees to submit a statement on commercial working of the invention to the Controller every year.	&lt;a name="_ftnref56"&gt;&lt;/a&gt; Form 27 under section 	146(2) of the Act lists the details necessary to be disclosed for compliance of the requirement of "working". A jurisprudential analysis reveals the 	rationale and objective behind this mandatory requirement. Undeniably, the scheme of the Indian patent regime makes it amply clear that "working" is a very important requirement, and the public as well as competitors have a right to access this information in a timely manner, without undue hurdles.	&lt;a name="_ftnref57"&gt;&lt;/a&gt; Indeed, as the decision in &lt;i&gt;Natco Pharma&lt;/i&gt; v. &lt;i&gt;Bayer Corporation&lt;/i&gt; &lt;a name="_ftnref58"&gt;&lt;/a&gt; reveals, the 	disclosures in Form 27 were crucial to determining the imposition of a compulsory license on the patentee. Thus, broadly, Form 27 disclosures can 	critically enable willing licensees to access patent "working" information in a timely manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;I.2.&lt;/strong&gt; However, there has been little compliance of this requirement by the patentees, despite the IPO reiterating the importance of compliance through the issuance of multiple public notices	&lt;a name="_ftnref59"&gt;&lt;/a&gt; (suo motu and in response to a public interest litigation filed in 2011	&lt;a name="_ftnref60"&gt;&lt;/a&gt;), and, reminding the patentees that non-compliance is punishable with a heavy fine.	&lt;a name="_ftnref61"&gt;&lt;/a&gt; Findings of research submitted by one of the parties&lt;a name="_ftnref62"&gt;&lt;/a&gt; in the writ of the&lt;a&gt;&lt;/a&gt;&lt;a&gt;&lt;/a&gt;&lt;a&gt;2011&lt;/a&gt;&lt;a name="_msoanchor_1"&gt;&lt;/a&gt;&lt;a name="_msoanchor_2"&gt;&lt;/a&gt;&lt;a name="_msoanchor_3"&gt;&lt;/a&gt; public interest litigation&lt;i&gt;Shamnad Basheer &lt;/i&gt;v. &lt;i&gt;Union of India and others&lt;/i&gt;&lt;a name="_ftnref63"&gt;&lt;/a&gt; reveal as follows.	&lt;i&gt;First, &lt;/i&gt;a large number of Form 27s are unavailable for download from the website of the IPO. This possibly indicates that the forms have either not 	been filed by the patentees with the IPO, or have not been uploaded (yet) by the IPO. &lt;i&gt;Second, &lt;/i&gt;a large number of filings in the telecom sector 	remain incomplete.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;I.3. &lt;/strong&gt; In 2015, CIS queried the IPO website for Form 27s of nearly 4,400 patents. CIS' preliminary research (ongoing and unpublished) echoes findings	&lt;a name="_ftnref64"&gt;&lt;/a&gt; similar to the ones 	disclosed in the case discussed in paragraph &lt;strong&gt;I.2.&lt;/strong&gt; of this submission (above).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;I.4.&lt;/strong&gt; In view of the submissions above, CIS makes the following recommendations to make the practice of cross-licensing transparent so that royalty rates are 	fair &amp;amp; reasonable: &lt;i&gt;first, &lt;/i&gt;that there be a strict enforcement of the submission of Form 27s on a regular and timely basis by the patentees; 	and, &lt;i&gt;second, &lt;/i&gt;that guidelines may be drawn up on whether it was discriminatory to charge no royalties (whether on the SSPPU or on the whole device) 	for a patent holder in a cross-licensing arrangement with another, when it charges royalty on the selling price of the device from a non-cross-licensor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;i&gt;j) What steps can be taken to make the practice of Patent Pooling transparent so that royalty rates are fair &amp;amp; reasonable?&lt;/i&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;J.1.&lt;/strong&gt; Patent pools can be understood as an agreement between two or more patent owners to license one or more of their patents to one another or to third 	parties.&lt;a name="_ftnref65"&gt;&lt;/a&gt; Thus, the 	creation of a patent pool makes use of the legal instrument of licensing, similar to the practice of cross-licensing. Insofar, we reiterate our 	recommendations made in paragraph &lt;strong&gt;I.3. &lt;/strong&gt;of this submission (above), which apply to the answer to the instant question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;J.2.&lt;/strong&gt; In furtherance of the recommendation above, we also propose the alteration of the Form 27 template	&lt;a name="_ftnref66"&gt;&lt;/a&gt; to include more 	disclosures. Presently, patentees are required to to declare number of licensees and sub-licensees. We specifically propose that the format of Form 27 	filings be modified to include patent pool licenses, with an explicit declaration of the names of the licensees and not just the number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;J.3. &lt;/strong&gt; It is also our submission that patent pools be required to offer FRAND licenses on the same terms to both members and non-members of the pool.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; k) How should it be determined whether a patent declared as SEP is actually an Essential Patent, particularly when bouquets of patents are used in 			one device? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;K.1.&lt;/strong&gt; We submit that several studies on the essentiality of SEPs indicate that only a small percentage of SEPs are actually essential. A study conducted by&lt;i&gt;Goodman &lt;/i&gt;and &lt;i&gt;Myers &lt;/i&gt;(2004) showed that only 21% of SEPs pertaining to the 3G standard in the US were deemed to be actually essential.	&lt;a name="_ftnref67"&gt;&lt;/a&gt; Another study conducted by the same authors in 2009 for WCDMA patents showed that 28% SEPs were essential.	&lt;a name="_ftnref68"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;K.2.&lt;/strong&gt; In our opinion, &lt;i&gt;first, &lt;/i&gt;the methodology adopted by &lt;i&gt;Goodman &lt;/i&gt;and &lt;i&gt;Myers&lt;/i&gt; &lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;could be 	replicated to determine the "essential" nature of an SEP. &lt;i&gt;Second, &lt;/i&gt;while adopting their methodology, it would be useful to address some of the issues over which these studies were critiqued.	&lt;a name="_ftnref70"&gt;&lt;/a&gt; Accordingly, we suggest 	that (a) laboratory tests may be conducted by an outside expert or by a commercial testing laboratory, and not at an in-house facility owned by either 	parties, so as to eliminate in the lab results; and, (b) expert opinions may be considered in order to determine essentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; l) Whether there is a need of setting up of an independent expert body to determine FRAND terms for SEPs and devising methodology for such purpose? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;L.1.&lt;/strong&gt; In our opinion, there is no need for an independent expert body to determine FRAND terms for SEPs and devising the methodology for such a purpose. The 	existing legal and regulatory framework is reasonably equipped to determine FRAND terms. A more detailed submission on the existing framework and suggested 	changes has been made in our answer to question 'a' of the discussion paper (above).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;L.2.&lt;/strong&gt; However, we observe that Indian courts, tribunals and the CCI are yet to endorse a methodology for making FRAND determinations. The judgments of the Delhi High Court do not provide a conclusive rationale or methodology for the imposition of royalty rates in the respective matters.	&lt;a name="_ftnref71"&gt;&lt;/a&gt; &lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;L.3. &lt;/strong&gt; We submit that&lt;strong&gt; &lt;/strong&gt;in the absence of definitive Indian jurisprudence for determination of FRAND terms, American jurisprudence provides certain 	guidance. Contreras&lt;a name="_ftnref72"&gt;&lt;/a&gt; (2015) informs us about the various case law American courts and regulators have developed and adhered to whilst making such determinations.The dominant 	analytical framework for determining "reasonable royalty" patent damages in the United States today was set out in 1970 by the District Court for the 	Southern District of New York in &lt;i&gt;Georgia-Pacific Corp. &lt;/i&gt;v. 	&lt;i&gt; U.S. Plywood Corp		&lt;a name="_ftnref73"&gt;&lt;/a&gt; &lt;/i&gt; . While this may be used as a guiding framework, the question of methodology remains far from settled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;i&gt; m) If certain Standards can be met without infringing any particular SEP, for instance by use of some alternative technology or because the patent 			is no longer in force, what should be the process to declassify such a SEP? &lt;/i&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;M.1. &lt;/strong&gt; In our opinion, if a standard can be met without infringing a patent declared to be "essential" to it, then the patent is not actually "essential". In this 	instance, the methods suggested in response to question 'k' of the discussion paper (above) could be used to declassify the SEP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;M.2. &lt;/strong&gt; We further submit that if a patent is no longer in force, that is, if it has expired, then it ceases to be patent, and therefore an SEP. The process to 	declassify such an SEP could be simply to declare it an expired patent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;M.3. &lt;/strong&gt; In addition, if it is possible to implement a certain standard by using an alternative technology, then the SEP for such a standard is not actually an SEP. 	However, the scale of operations and that of mass manufacturing and compatibility requirements in devices and infrastructure mean that it is unlikely to 	have different methods of implementing the same standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;M.4.&lt;/strong&gt; In general, it is our submission that an Indian SSO could maintain a publicly accessible database of SEPs found to be invalid or non-essential in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;7. &lt;/strong&gt; We reiterate our gratitude to the DIPP for the opportunity to make these submissions. In addition to our comments above, we have shared some of our 	research on this issue, in the 'Annexures', below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;8. &lt;/strong&gt; It would be our pleasure and privilege to discuss these comments with the DIPP; and, supplement these with further submissions if necessary. We also offer 	our assistance on other matters aimed at developing a suitable policy framework for SEPs and FRAND in India, and, working towards the sustained innovation, 	manufacture and availability of mobile technologies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;On behalf of the Centre for Internet and Society, 22 April, 2016&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anubha Sinha - &lt;a&gt;anubha@cis-india.org&lt;/a&gt; | Nehaa Chaudhari - &lt;a&gt;nehaa@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané - &lt;a&gt;rohini@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;___________________________________________________________________________&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;___________________________________________________________________________&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;ANNEXURES&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;___________________________________________________________________________&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Anubha Sinha, Fuelling the Affordable Smartphone Revolution in India, available at 	&lt;a href="http://cis-india.org/a2k/blogs/digital-asia-hub-the-good-life-in-asias-21-st-century-anubha-sinha-fueling-the-affordable-smartphone-revolution-in-india"&gt; http://cis-india.org/a2k/blogs/digital-asia-hub-the-good-life-in-asias-21-st-century-anubha-sinha-fueling-the-affordable-smartphone-revolution-in-india &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Nehaa Chaudhari, Standard Essential Patents on Low-Cost Mobile Phones in India: A Case to Strengthen Competition Regulation?, available at 	&lt;a href="http://www.manupatra.co.in/newsline/articles/Upload/08483340-C1B9-4BA4-B6A9-D6B6494391B8.pdf"&gt; http://www.manupatra.co.in/newsline/articles/Upload/08483340-C1B9-4BA4-B6A9-D6B6494391B8.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Nehaa Chaudhari, Pervasive Technologies:Patent Pools, available at	&lt;a href="http://cis-india.org/a2k/blogs/patent-pools"&gt;http://cis-india.org/a2k/blogs/patent-pools&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Nehaa Chaudhari, The Curious Case of the CCI:Competition Law and SEP Regulation in India, presented at the 4th Global Congress on Intellectual 	Property and the Public Interest, &lt;span&gt;available &lt;/span&gt;at 	&lt;a href="http://cis-india.org/a2k/blogs/the-curious-case-of-the-cci-competition-law-and-sep-regulation-in-india"&gt; http://cis-india.org/a2k/blogs/the-curious-case-of-the-cci-competition-law-and-sep-regulation-in-indi &lt;/a&gt; &lt;a href="http://cis-india.org/a2k/blogs/the-curious-case-of-the-cci-competition-law-and-sep-regulation-in-india"&gt;a&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Nehaa Chaudhari, Letter for Establishment of Patent Pool for Low Cost Access Devices through Compulsory Licences, available at 	&lt;a href="http://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"&gt; http://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Prof Jorge L. Contreras and Rohini Lakshané, Patents and Mobile Devices in India: An Empirical Survey, available at	&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486&lt;/a&gt; (last accessed 22 	April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, CIS, List of technical standards and IP types (Working document), available at 	&lt;a href="https://drive.google.com/file/d/0B8SgjShAjhbtaml5eW50bS01d2s/view?usp=sharing"&gt; https://drive.google.com/file/d/0B8SgjShAjhbtaml5eW50bS01d2s/view?usp=sharing &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, Open Letter to Prime Minister Modi, February 2015, available at	&lt;a href="http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi&lt;/a&gt; (last 	accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, FAQ: CIS' proposal to form a patent pool of critical mobile technology, September 2015, available at 	&lt;a href="http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies"&gt; http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, Joining the dots in India's big-ticket mobile phone patent litigation, May 2015, last updated October 2015, available at 	&lt;a href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt; http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, Compilation of Mobile Phone Patent Litigation Cases in India, March 2015, last updated April 2016, available at 	&lt;a href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt; http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india &lt;/a&gt; , (last accessed April 22, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Rohini Lakshané, Patent landscaping in the Indian Mobile Device Marketplace, presented at the 4th Global Congress on Intellectual Property and Public Interest, December 2015, available at	&lt;a href="https://drive.google.com/open?id=0B8SgjShAjhbtME45N245SmowOGs"&gt;https://drive.google.com/open?id=0B8SgjShAjhbtME45N245SmowOGs&lt;/a&gt; (last accessed 22 	April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;● Vikrant Narayan Vasudeva, Patent Valuation and Licence Fee Determination in the Context of Patent Pools, available at 	&lt;a href="http://cis-india.org/a2k/blogs/patent-valuation-and-license-fee-determination-in-context-of-patent-pools"&gt; http://cis-india.org/a2k/blogs/patent-valuation-and-license-fee-determination-in-context-of-patent-pools &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;************&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr size="1" width="33%" align="left" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; This submission has been authored by (alphabetically) Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané, on behalf of the Centre for Internet 			and Society, India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; See The Centre for Internet and Society, available at &lt;a href="http://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt; (last accessed 22 April, 2016) for 			details of the organization, and, our work.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Make in India, available at &lt;a href="http://www.makeinindia.com/home"&gt;http://www.makeinindia.com/home&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Digital India, available at &lt;a href="http://www.digitalindia.gov.in/"&gt;http://www.digitalindia.gov.in/&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; See Nehaa Chaudhari, The Curious Case of the CCI:Competition Law and SEP Regulation in India, presented at the 4th Global Congress on Intellectual 			Property and the Public Interest, available at 			&lt;a href="http://cis-india.org/a2k/blogs/the-curious-case-of-the-cci-competition-law-and-sep-regulation-in-india"&gt; http://cis-india.org/a2k/blogs/the-curious-case-of-the-cci-competition-law-and-sep-regulation-in-india &lt;/a&gt; (last accessed 21 April, 2016) for further details on relevant provisions.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; In the High Court of Delhi, W.P.(C) 464/2014 &amp;amp; CM Nos. 911/2014 &amp;amp; 915/2014, judgment delivered on 30 March, 2016. Hereafter referred to as 			the Ericsson-CCI judgment.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Under Articles 226 and 227 of the Constitution of India, and, under Article 32 of the Constitution of India, for the High Courts and the Supreme 			Court, respectively.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Agreement on Trade-Related Aspects of Intellectual Property Rights, available at			&lt;a href="https://www.wto.org/english/tratop_e/trips_e/t_agm0_e.htm"&gt;https://www.wto.org/english/tratop_e/trips_e/t_agm0_e.htm&lt;/a&gt; (last accessed 22 			April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; KEI Staff, 2015 October 15 version: RCEP IP Chapter, available at &lt;a href="http://keionline.org/node/2472"&gt;http://keionline.org/node/2472&lt;/a&gt; (last 			accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; BIS Act, 2016, available at &lt;a href="http://www.bis.org.in/bs/bsindex.asp"&gt;http://www.bis.org.in/bs/bsindex.asp&lt;/a&gt; (last accessed 21 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; TSDSI, Intellectual Property Rights Policy, available at 			&lt;a href="http://www.tsdsi.org/media/Help/2014-12-17/TSDSI-PLD-40-V1.0.0-20141217.pdf"&gt; http://www.tsdsi.org/media/Help/2014-12-17/TSDSI-PLD-40-V1.0.0-20141217.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Id at Clause 3.1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Id at Clause 5.1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Id at Clause 5.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Id at Clause 5.5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Id at Clauses 7.1. and 7.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; Id at Clause 7.2.1.a (iii).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Id at Clause 7.2.1.b(iii).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Id at Clause 7.3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; GISFI, Intellectual Property Rights Policy, available at 			&lt;a href="http://www.gisfi.org/ipr_policy/gisfi_intellectual_property_righ.htm"&gt; http://www.gisfi.org/ipr_policy/gisfi_intellectual_property_righ.htm &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Id at Clauses 6.2.1.a(iii) and 6.2.1.b(iii).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; See W3C, Patent Policy, available at			&lt;a href="https://www.w3.org/Consortium/Patent-Policy-20040205/"&gt;https://www.w3.org/Consortium/Patent-Policy-20040205/&lt;/a&gt; (last accessed 22 April, 			2016) for more details on their royalty-free licences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; See OMA, Use Agreement, available at 			&lt;a href="http://openmobilealliance.org/about-oma/policies-and-terms-of-use/use-agreement/"&gt; http://openmobilealliance.org/about-oma/policies-and-terms-of-use/use-agreement/ &lt;/a&gt; (last accessed 22 April, 2016) for more details on their royalty-free licences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; See Rohini Lakshané, Open Letter to PM Modi, available at			&lt;a href="http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi&lt;/a&gt; (last accessed 22 April, 2016) for further details of CIS' proposal.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Rohini Lakshané, CIS, List of Technical Standards and IP Types (Working document), available at 			&lt;a href="https://drive.google.com/file/d/0B8SgjShAjhbtaml5eW50bS01d2s/view?usp=sharing"&gt; https://drive.google.com/file/d/0B8SgjShAjhbtaml5eW50bS01d2s/view?usp=sharing &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; Mark Lemley and Carl Shapiro, Patent Holdup and Royalty Stacking,&lt;i&gt; 85 Tex. L. Rev. at 2015&lt;/i&gt;; See also, for e.g., RPX Corporation, Amendment 			No. 3 to Form S-l, 11 Apr. 2011, at 59, available at 			&lt;a href="http://www.sec.gov/Archives/edgar/data/1509432/000119312511101007/ds1a.htm"&gt; http://www.sec.gov/Archives/edgar/data/1509432/000119312511101007/ds1a.htm &lt;/a&gt; (last accessed 22 April, 2016), quoting -			&lt;i&gt;"Based on our research, we believe there are more than 250,000 active patents relevant to today's smartphones…"&lt;/i&gt;.; See further Steve 			Lohr, Apple- Samsung Case Shows Smartphone as Legal Magnet,&lt;i&gt; &lt;/i&gt;New York Times, 25 Aug. 2012, available at 			&lt;a href="http://www.nytimes.com/2012/08/26/technology/apple-samsung-case-shows-smartphone-as-lawsuit-magnet.html"&gt; http://www.nytimes.com/2012/08/26/technology/apple-samsung-case-shows-smartphone-as-lawsuit-magnet.html &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; Jorge L. Contreras and Rohini Lakshané, Patents and Mobile Devices in India: An Empirical Survey, available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756486&lt;/a&gt; (last accessed 			22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; Ann Armstrong, Joseph J. Mueller and Timothy D. Syrett, The Smartphone- Royalty Stack:Surveying Royalty Demands for the Components Within Modern 			Smartphones, available at 			&lt;a href="https://www.wilmerhale.com/uploadedFiles/Shared_Content/Editorial/Publications/Documents/The-Smartphone-Royalty-Stack-Armstrong-Mueller-Syrett.pdf"&gt; https://www.wilmerhale.com/uploadedFiles/Shared_Content/Editorial/Publications/Documents/The-Smartphone-Royalty-Stack-Armstrong-Mueller-Syrett.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; Florian Mueller,&lt;i&gt; &lt;/i&gt;Ericsson Explained Publicly why it Collects Patent Royalties from Device (Not Chipset) Makers, available at 			&lt;a href="http://www.fosspatents.com/2014/01/ericsson-explained-publicly-why-its.html"&gt; http://www.fosspatents.com/2014/01/ericsson-explained-publicly-why-its.html &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; Romit Guha and Anandita Singh Masinkotia, PM Modi's Digital India Project:Government to Ensure that Every Indian has a Smartphone by 2019, 			available at 			&lt;a href="http://articles.economictimes.indiatimes.com/2014-08-25/news/53205445_1_digital-india-india-today-financial-services"&gt; http://articles.economictimes.indiatimes.com/2014-08-25/news/53205445_1_digital-india-india-today-financial-services &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; Nehaa Chaudhari,&lt;i&gt; &lt;/i&gt;Standard Essential Patents on Low-Cost Mobile Phones in India: A Case to Strengthen Competition Regulation?, available at 			&lt;a href="http://www.manupatra.co.in/newsline/articles/Upload/08483340-C1B9-4BA4-B6A9-D6B6494391B8.pdf"&gt; http://www.manupatra.co.in/newsline/articles/Upload/08483340-C1B9-4BA4-B6A9-D6B6494391B8.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; See part 10.2.2. of the Discussion Paper, at page 25.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; J.Gregory Sidak, FRAND in India:The Delhi High Court's Emerging Jurisprudence on Royalties for Standard-Essential Patents, available at 			&lt;a href="http://jiplp.oxfordjournals.org/content/early/2015/06/11/jiplp.jpv096.full"&gt; http://jiplp.oxfordjournals.org/content/early/2015/06/11/jiplp.jpv096.full &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; Appeal from the United States District Court for the Eastern District of Texas in No. 6:11-cv-00343-LED, decided on 03 December, 2015, available 			at. 			&lt;a href="http://www.cafc.uscourts.gov/sites/default/files/opinions-orders/15-1066.Opinion.12-1-2015.1.PDF"&gt; http://www.cafc.uscourts.gov/sites/default/files/opinions-orders/15-1066.Opinion.12-1-2015.1.PDF &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; Kumkum Sen, News on Royalty Payments Brings Cheer in New Year, available at 			&lt;a href="http://www.business-standard.com/article/economy-policy/news-on-royalty-payment-brings-cheer-in-new-year-110010400044_1.html"&gt; http://www.business-standard.com/article/economy-policy/news-on-royalty-payment-brings-cheer-in-new-year-110010400044_1.html &lt;/a&gt; (last accessed 21 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; See Sanjana Govil, Putting a Lid on Royalty Outflows- How the RBI Can Help Reduce India's IP Costs&lt;i&gt;, &lt;/i&gt;available at			&lt;a href="http://cis-india.org/a2k/blogs/lid-on-royalty-outflows"&gt;http://cis-india.org/a2k/blogs/lid-on-royalty-outflows&lt;/a&gt; (last accessed 21 			April, 2016), for a discussion on the introduction of royalty caps in the early 1990s, and its success in reducing the flow of money out of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; Supra note 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Nehaa Chaudhari, Letter for Establishment of Patent Pool for Low-cost Access Devices through Compulsory Licenses, available at 			&lt;a href="http://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices"&gt; http://cis-india.org/a2k/blogs/letter-for-establishment-of-patent-pool-for-low-cost-access-devices &lt;/a&gt; &lt;span&gt; &lt;/span&gt; (last accessed 21 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; Supra note 26.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Rohini Lakshané, FAQ: CIS' proposal to form a patent pool of critical mobile technology, September 2015, available at 			&lt;a href="http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies"&gt; http://cis-india.org/a2k/blogs/faq-cis-proposal-for-compulsory-licensing-of-critical-mobile-technologies &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; See the Ericsson-CCI case, supra note 6, for Intex's submissions as discussed by Justice Bakhru.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; Rohini Lakshané, Compilation of Mobile Phone Patent Litigation Cases in India, available at 			&lt;a href="http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india"&gt; http://cis-india.org/a2k/blogs/compilation-of-mobile-phone-patent-litigation-cases-in-india &lt;/a&gt; (last accessed 21 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; See the Ericsson-CCI case, supra note 6, at paragraph 19.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; Supra note 47.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; See the Ericsson-CCI judgment, supra note 6, at paragraphs 88-105.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; Section 19(4) of the Competition Act. See also &lt;i&gt;Competition Commission of India&lt;/i&gt; v. &lt;i&gt;Steel Authority of India and Another&lt;/i&gt;, (2010) 10 			SCC 744.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; Section 115 of the Patents Act, 1970.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; &lt;i&gt;Huawei Technologies Co. Ltd &lt;/i&gt; v.&lt;i&gt; ZTE Corp. and ZTE Deutschland&lt;/i&gt;, Judgment of the Court (Fifth Chamber) of 16 July 2015 in GmbH C-170/13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; Third Party United States Fed. Trade Commission's Statement on the Public Interest,			&lt;i&gt;In re Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof&lt;/i&gt;, U.S. Int'l 			Trade Comm'n, Inv. No. 337-TA-745 (Jun. 6, 2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Jorge L. Contreras, A Brief History of FRAND: Analyzing Current Debates in Standard Setting and Antitrust Through a Historical Lens&lt;i&gt;,&lt;/i&gt; 80 Antitrust Law Journal 39 (2015), available at &lt;span&gt;h&lt;/span&gt;&lt;a href="http://ssrn.com/abstract=2374983"&gt;ttp://ssrn.com/abstract=2374983&lt;/a&gt;&lt;span&gt; or&lt;/span&gt; &lt;a href="http://dx.doi.org/10.2139/ssrn.2374983"&gt;http://dx.doi.org/10.2139/ssrn.2374983&lt;/a&gt;&lt;a href="http://dx.doi.org/10.2139/ssrn.2374983"&gt; &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Section 146(2) of the Patents Act, 1970..&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Sai Vinod, Patent Office Finally Takes Form 27s Seriously, available at 			&lt;a href="http://spicyip.com/2013/02/patent-office-finally-takes-form-27s.html"&gt; http://spicyip.com/2013/02/patent-office-finally-takes-form-27s.html &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Order No. 45/2013 (Intellectual Property Appellate Board, Chennai), available at			&lt;a href="http://www.ipab.tn.nic.in/045-2013.htm"&gt;http://www.ipab.tn.nic.in/045-2013.htm&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Intellectual Property India, Public Notice, available at			&lt;a href="http://www.ipindia.nic.in/iponew/publicNotice_Form27_12Feb2013.pdf"&gt;http://www.ipindia.nic.in/iponew/publicNotice_Form27_12Feb2013.pdf&lt;/a&gt; (last accessed 22 April, 2016) &lt;i&gt;and&lt;/i&gt; Intellectual Property India, Public Notice, available at			&lt;a href="http://ipindia.nic.in/iponew/publicNotice_24December2009.pdf"&gt;http://ipindia.nic.in/iponew/publicNotice_24December2009.pdf&lt;/a&gt; (last 			accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; Supra note 57.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; See research findings available at 			&lt;a href="http://spicyip.com/wp-content/uploads/2015/05/FORM-27-WP-1R-copy.pdf"&gt; http://spicyip.com/wp-content/uploads/2015/05/FORM-27-WP-1R-copy.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; In the High Court of Delhi, W.P.(C) 5590/2015. This litigation is currently ongoing. See, illustratively, Mathews P. George,			&lt;i&gt;Patent Working in India: Delhi HC issues notice in Shamnad Basheer &lt;/i&gt;v&lt;i&gt;. Union of India &amp;amp; Ors. - I&lt;/i&gt;, available at 			&lt;a href="http://spicyip.com/2015/09/patent-working-in-india-delhi-hc-issues-notice-in-shamnad-basheer-v-union-of-india-ors-i.html"&gt; http://spicyip.com/2015/09/patent-working-in-india-delhi-hc-issues-notice-in-shamnad-basheer-v-union-of-india-ors-i.html &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; In response to an RTI request made to the IPO in Mumbai for forms unavailable on the website, CIS received a reply stating, "As thousand [sic] of 			Form -27 are filed in this office, it is very difficult to segregate Form-27 for the patent numbers enlisted in your RTI application as it needs 			diversion of huge official staff/ manpower and it will affect day to day [sic] work of this office." This research is ongoing and unpublished. 			Please contact us for a copy of the RTI application and the response received.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; WIPO Secretariat&lt;i&gt;, &lt;/i&gt;Patent Pools and Antitrust - A Comparative Analysis, available at 			&lt;a href="https://docs.google.com/viewer?url=http%3A%2F%2Fwww.wipo.int%2Fexport%2Fsites%2Fwww%2Fip-competition%2Fen%2Fstudies%2Fpatent_pools_report.pdf"&gt; https://docs.google.com/viewer?url=http%3A%2F%2Fwww.wipo.int%2Fexport%2Fsites%2Fwww%2Fip-competition%2Fen%2Fstudies%2Fpatent_pools_report.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; Form 27, The Patents Act, available at 			&lt;a href="http://ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20-%20html/Forms/Form-27.pdf"&gt; http://ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20-%20html/Forms/Form-27.pdf &lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; David J. Goodman and Robert A. Myers, 3G Cellular Standards and Patents, available at			&lt;a href="http://patentlyo.com/media/docs/2009/03/wirelesscom2005.pdf"&gt;http://patentlyo.com/media/docs/2009/03/wirelesscom2005.pdf&lt;/a&gt; (last 			accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Darien CT, Review of Patents Declared as Essential to WCDMA through December, 2008, available at			&lt;a href="http://www.frlicense.com/wcdma1.pdf"&gt;http://www.frlicense.com/wcdma1.pdf&lt;/a&gt; (last accessed 22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Supra note 67.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Donald L. Martin and Carl De Meyer, Patent Counting, a Misleading Index of Patent Value: A Critique of Goodman &amp;amp; Myers and its Uses, available 			at &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=949439"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=949439&lt;/a&gt; (last accessed 			22 April, 2016).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;h5&gt;&lt;a name="h.b6s0l5evilsq"&gt;&lt;/a&gt; &lt;a name="_ftn71"&gt;&lt;/a&gt; Rohini Lakshané, Joining the Dots in India's Big-Ticket Mobile Phone Patent Litigation&lt;i&gt;,&lt;/i&gt; available at 			&lt;a href="http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation"&gt; http://cis-india.org/a2k/blogs/joining-the-dots-in-indias-big-ticket-mobile-phone-patent-litigation &lt;/a&gt; (last accessed 22 April, 2016). See also supra note 47 for more details.&lt;/h5&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; Supra note 55.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; 318 F. Supp. 1116, 1120 (S.D.N.Y. 1970), modified and aff'd, 446 F. 2d 295 (2d Cir. 1971), cert. denied, 404 U.S. 870 (1971).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr size="1" width="33%" align="left" /&gt;
&lt;div&gt;
&lt;div id="_com_1"&gt;&lt;a name="_msocom_1"&gt;&lt;/a&gt;
&lt;p&gt;2015&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div id="_com_2"&gt;&lt;a name="_msocom_2"&gt;&lt;/a&gt;
&lt;p&gt;They filed it in 2011&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div id="_com_3"&gt;&lt;a name="_msocom_3"&gt;&lt;/a&gt;
&lt;p&gt;The 2011 filing only includes pharma, BTW: http://spicyip.com/docs/Form%2027s.pdf. Also, this writ is from May 2015: 				http://spicyip.com/wp-content/uploads/2015/05/FORM-27-WP-1R-copy.pdf Anyway, I'll leave it as it is.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms'&gt;https://cis-india.org/a2k/blogs/comments-on-department-of-industrial-policy-and-promotion-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anubha Sinha, Nehaa Chaudhari and Rohini Lakshane</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    
    
        <dc:subject>Competition</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    

   <dc:date>2016-05-03T02:30:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms">
    <title>Responses to the DIPP's Discussion Paper on SEPs and their Availability on FRAND Terms</title>
    <link>https://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms</link>
    <description>
        &lt;b&gt;The Department of Industrial Policy and Promotion (DIPP), Government of India, requested comments through its "Discussion Paper on Standard Essential Patents and Their Availability on FRAND Terms" on March 1, 2016. This post is a compilation of various comments submitted in response to it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet &amp;amp; Society (CIS) commends the DIPP for its efforts at seeking inputs from various stakeholders on this important and timely issue. CIS is thankful for the opportunity to put forth its views. The submission is divided in 3 main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part, ‘Submissions on the Issues’, answers the questions raised in the discussion paper. A list of annexures and their URLs is included at the end of the document. The submission to the DIPP was prepared by Anubha Sinha, Nehaa Chaudhari and Rohini Lakshané.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/a2k/blogs/dipp-comments.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h3 style="text-align: justify; "&gt;Download&lt;/h3&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms" class="internal-link"&gt;&lt;span style="text-decoration: underline;"&gt;Discussion Paper on Standard Essential Patents and their Availability on Frand Terms&lt;/span&gt;&lt;/a&gt; (Government of India, Department of Industrial Policy and Promotion, Ministry of Commerce and Industry, March 1, 2016)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/dipp-comments.pdf" class="internal-link"&gt;Centre for Internet and Society&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2769239"&gt;Centre for Internet and Society (hosted on Social Science Research Network)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2768496"&gt;Prof. Jorge L. Contreras&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/aba-comments.pdf" class="internal-link"&gt;Joint Comments of the American Bar Association (ABA) Sections of Anti-Trust Law, Intellectual Property Law, International Law, and Science &amp;amp; Technology Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/g-mason-dipp-response" class="internal-link"&gt;Global Antitrust Institute, George Mason University School of Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/a2k/blogs/cmai-tema" class="internal-link"&gt;CMAI-TEMA (Communication Multimedia and Infrastructure Association of India - Telecom Equipment Manufacturers Association of India)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://sflc.in/comments-on-dipp-discussion-paper-on-standard-essential-patents-and-their-availability-on-frand-terms/"&gt;Software Freedom Law Centre (SFLC)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2779696"&gt;Yogesh Pai&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms'&gt;https://cis-india.org/a2k/blogs/responses-to-the-dipps-discussion-paper-on-seps-and-their-availability-on-frand-terms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anubha Sinha, Nehaa Chaudhari, and Rohini Lakshané</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DIPP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2016-07-07T16:24:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
