<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 101 to 115.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-practices-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-cafe-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/intermediary-due-diligence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-practices-rules">
    <title>CIS Para-wise Comments on Draft Reasonable Security Practices Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/security-practices-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011) in exercise of the powers conferred by Section 87(2)(ob), read with Section 43A of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para-wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. Specific Objections&lt;/h2&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Sensitive personal data or information.— Sensitive personal data or information of a person shall include information collected, received, stored, transmitted or processed by body corporate or intermediary or any person, consisting of :&lt;/p&gt;
&lt;p&gt;Password;&lt;/p&gt;
&lt;p&gt;...&lt;/p&gt;
&lt;p&gt;Call data records;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We suggest that this list be expanded to include information such as sexual orientation, religion and caste. In addition, “electronic communication records” including emails, chat logs and other communications using a computer should be designated sensitive personal information.&lt;/p&gt;
&lt;h3&gt;Rule 4&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Body Corporate to provide policy for privacy and disclosure of information.— (1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle shall provide a privacy policy for handling of or dealing in user information including sensitive personal information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall provide for:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Type of personal or sensitive information collected under sub-rule (ii) of rule 3;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Purpose, means and modes of usage of such information;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Disclosure of information as provided in rule 6&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the privacy policy be made available for view to all individuals to whom the information held by the body corporate pertains. Currently the privacy policy will only be disclosed to the “providers of information” who may not be the individual concerned directly.&lt;/p&gt;
&lt;h3&gt;Rule 5&lt;/h3&gt;
&lt;p&gt;Collection of information.—&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(1) Body corporate or any person on its behalf shall obtain consent of the provider of the information regarding purpose, means and modes of uses before collection of such information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend the substitution of the term “individual to whom the data pertains” instead of the phrase “provider of the information”.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(2) Body corporate or any person on its behalf shall not collect sensitive personal information unless—&lt;/p&gt;
&lt;p&gt;the information is collected for a lawful purpose connected with a function or activity of the agency; and&lt;/p&gt;
&lt;p&gt;the collection of the information is necessary for that purpose.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a blanket prohibition of collection of biometric data unless a heightened security interest is demonstrated.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(3) While collecting information directly from the individual concerned, the body corporate or any person on its behalf shall take such steps as are, in the circumstances, reasonable to ensure that the individual concerned is aware of.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend a simpler phrase like “The body corporate.. shall take reasonable steps to inform the individual concerned” instead of the current complex phrasing. Reasonableness has generally been interpreted by courts contextually. For instance, the Supreme Court has remarked, “`Reasonable’ means prima facie in law reasonable in regard to those circumstances of which the actor, called upon to act reasonably, knows or ought to know. See Gujarat Water Supply and Sewage Board v. Unique Erectors (Guj) AIR 1989 SC 973.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(4) Body corporate or any person on its behalf holding sensitive personal information shall not keep that information for longer than is required for the purposes for which the information may lawfully be used.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that this be converted into a mandatory obligation to delete or anonymise the information collected within a stipulated period (say 6 months) after the expiry of use for which it was collected.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(6) Body corporate or any person on its behalf shall permit the users to review the information they had provided and modify the same, wherever necessary.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Individuals should have the right to review and modify information pertaining to them whether or not they themselves had provided the information to the body corporate. This right should be provided to them wherever the information that pertains to them is incorrect.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(7) Body corporate or any person on its behalf shall provide an option to the provider of the information to opt-in or opt-out.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that the wording be changed to “individual to whom the data pertains” instead of “provider of information”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-practices-rules'&gt;https://cis-india.org/internet-governance/blog/security-practices-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-cafe-rules">
    <title>CIS Para-wise Comments on Cyber Café Rules, 2011 </title>
    <link>https://cis-india.org/internet-governance/blog/cyber-cafe-rules</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Guidelines for Cyber Cafe) Rules, 2011) in exercise of the powers conferred by Section 87(2) (zg), read with Section 79(2) of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. General Objections&lt;/h2&gt;
&lt;p&gt;These rules have no nexus with their parent provision, namely s.79(2).  Section 79(1) provides for exemption from liability for intermediaries.  Section 79(2) thereupon states:&lt;/p&gt;
&lt;blockquote&gt;79. Intermediaries not to be liable in certain cases—&lt;br /&gt;
&lt;blockquote&gt;(2) The provisions of sub-section (1) shall apply if— &lt;br /&gt;
&lt;blockquote&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or &lt;br /&gt;(b) the intermediary does not— &lt;br /&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;(i) initiate the transmission, &lt;br /&gt;(ii) select the receiver of the transmission, and &lt;br /&gt;(iii) select or modify the information contained in the transmission; &lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other guidelines as the Central Government may prescribe in this behalf. &lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;Therefore, by not observing any of the provisions of the Rules, the intermediary opens itself up for liability for actions of its users.  However, the provisions contained in these rules have no rational nexus with due diligence to be observed by the intermediary to absolve itself from liability for third-party actions.&lt;/p&gt;
&lt;p&gt;While the government may have authority to regulate cybercafes, that regulation should not be promulgated as rules under s.79(2).  Doing so would be ultra vires s.79(2) itself.&lt;/p&gt;
&lt;h3&gt;Recommendation&lt;/h3&gt;
&lt;p&gt;These rules should be deleted in toto.&lt;/p&gt;
&lt;h2&gt;B. Specific Objections&lt;/h2&gt;
&lt;p&gt;These specific objections are in addition to the above-stated general objection, and do not detract from out recommendation that these rules should be deleted in their entirety.&lt;/p&gt;
&lt;h3&gt;Rule 2(c)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(c) “Cyber Cafe” means cyber café as defined in clause (na) of sub-section (1) of section 2 of the Act&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;The Act defines a cyber cafe as meaning “any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public”.  This would include internet access provided in airports, in restaurants, and in many other places where the provisions of these rules (such as those about height of partitions, etc.) just will not be practicable.  Thus, this provision will have unintended consequences.&lt;/p&gt;
&lt;h3&gt;Rule 3&lt;/h3&gt;
&lt;blockquote&gt;Agency for issuance of license: Appropriate government will notify an agency to issue license to cyber cafes.&lt;br /&gt;&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 3 requires the issuing of a license for the establishment of a cyber café. We believe this is unwarranted since cybercafes, like most commercial establishments are already subject to registration and licensing under the “Shops and Establishments Acts” which have been enacted in all states. These Acts already specify an elaborate procedure for the application, registration and monitoring of all establishments and there is no need to multiply the levels of permission a cyber café must obtain. The current rules do not specify an application procedure, fee, and a maximum or minimum time frame within which such a license must be granted or denied nor does it specify the criterion on which such license applications will be evaluated. We think that in the absence of such legislative guidance, this provision is likely to be abused.&lt;/p&gt;
&lt;p&gt;Cyber cafes in India contribute greatly to India’s increasing internet penetration and inserting a licensing regime would greatly impede access to the internet.&lt;/p&gt;
&lt;p&gt;We believe that cyber cafes should be allowed to be established in the same manner as other shops and establishments, without the requirement of a special license.&lt;/p&gt;
&lt;h3&gt;Rule 4(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;...When an user cannot establish his/her identify to the satisfaction of the Cyber Café as per sub-rule (1), he/she may be photographed by the Cyber Café using a web camera installed on one of the computers in the Cyber Café for establishing the identity of the user.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Sub-Rule 4 (2) Requires that if an individual is unable to establish identity, their photograph must be taken if they wish to use cyber café facilities. We believe that an individual’s photograph should be taken only as a last resort, where identity has been established.&lt;/p&gt;
&lt;h3&gt;Rule 4(3)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Children without photo identity card shall be accompanied by an adult with any of the documents as prescribed in sub-rule (1).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend that children below 18 years should be specifically exempt from proving their identities to cyber café owners. Children are usually the quickest to adopt technology, and the requirement of possessing a valid identity might prove to be a deterrent to their developing computer skills. Likewise, being accompanied by an adult is also an onerous obligation since children’s access to the internet would depend on the availability of an adult/parent who may be too busy to accompany the child on every occasion the child wishes to access the internet or use a computer.&lt;/p&gt;
&lt;p&gt;To reiterate, we feel that the current provision specially and adversely targets children from poorer classes (since they are most likely to routinely access internet through cyber cafes) and denies them the opportunity of developing their computer skills which are crucial for the growth of the “knowledge economy” that India is trying to head towards.&lt;/p&gt;
&lt;p&gt;In addition, we believe that children are more susceptible to exploitation and consequently have a heightened privacy expectation which must be honoured. We recommend that the current sub-rule be deleted and replaced with a clause which specifically exempts children from proving their identity and forbids taking photographs of them under any circumstance.&lt;/p&gt;
&lt;h3&gt;Rule 5(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;... Log Register: After the identity of the user has been established as per sub-rule (1) of rule 4 above, the Cyber Café shall record and maintain the required information of each user in the log register for a minimum period of one year. Also, Cyber Café may maintain an online version of the log register.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;Rule 5(1) Provides a minimum period of one year that Cyber Cafes must retain their log registers. The rule does not specify the details which the log register must provide. In the interests of minimising threats to privacy, we recommend that these details recorded be confined only to the name and duration of use.&lt;/p&gt;
&lt;p&gt;In addition, we believe that there should also be a coinciding mandatory deletion clause for the log register requiring details to be purged after the minimum retention period.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3&gt;Rules 5(3)and 6(2)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;5(3): “The cyber café owner shall be responsible for storing and maintaining following backups of logs and computer resource records for at least six months for each access or login by any user :&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;·    History of websites accessed using computer resource at cyber cafe&lt;/p&gt;
&lt;p&gt;·    Logs of proxy server installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Mail server logs&lt;/p&gt;
&lt;p&gt;·    Logs of network devices such as router, switches, systems etc. installed at cyber café&lt;/p&gt;
&lt;p&gt;·    Logs of firewall or Intrusion Prevention/Detection systems, if installed.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;6(2): “The screen of all computers, installed other than in Partitions or Cubicles, shall face ‘outward’, i.e. they shall face the common open space of the Cyber Café.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend deletion of this rule since it is an unreasonable intrusion into a person’s privacy and an indirect attempt to censor content which users may wish to access. There are many uses of the internet for which a user may legitimately require privacy: For instance, patients, including HIV patients and those with mental illness, may wish to obtain information about their condition. Similarly sexuality minorities may wish to seek support or reach out to a larger community. Enforcing the architecture stipulated in this rule would discourage their access to such vital information. In addition, this architecture would make it easier for cyber crimes such as identity theft to take place since it would be easier to observe the login details of other users at the cyber café.&lt;/p&gt;
&lt;h3&gt;Rule 7(1)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Inspection of Cyber Café : “An officer, not below the rank of Police Inspector as authorised by the licensing agency, is authorized to check or inspect cyber café and the computer resource or network established therein at any time for the compliance of these rules. The cyber café owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
&lt;p&gt;We recommend this clause be omitted since it confers unfettered and unsupervised powers on any Police Inspector to examine any cyber café premises he may choose without any restriction on time.&lt;/p&gt;
&lt;p&gt;Additionally, the provisions of Shops and Establishments Acts of most states already prescribe a procedure for inspection of establishments and examination of records. The current rules merely add another layer of supervision to the existing laws without adequate safeguards.&lt;/p&gt;
&lt;h3&gt;Comment&lt;/h3&gt;
 
&lt;p&gt;Sub-Rule 5(3) holds cyber café owners responsible for the storage and maintenance of back up logs concerning the following information: history of websites, logs of proxy servers, mail server logs, logs of network devices, logs of firewalls installed. We believe that the maximum length for retention of this data should be defined and a mandatory deletion clause should be inserted requiring cyber café owners to delete these logs periodically. We further believe that access to the history of websites and mail server logs is a serious invasion of a person’s privacy, and should be omitted from the back up logs.&lt;/p&gt;
&lt;p&gt;This is especially so when currently there is no requirement that cyber café owners maintain their logs under conditions of utmost secrecy and confidence.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
 
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-cafe-rules'&gt;https://cis-india.org/internet-governance/blog/cyber-cafe-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-14T10:32:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/intermediary-due-diligence">
    <title>CIS Para-wise Comments  on Intermediary Due Diligence Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/intermediary-due-diligence</link>
    <description>
        &lt;b&gt;On February 7th 2011, the Department of Information Technology, MCIT published draft rules on its website  (The Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011) in exercise of the powers conferred by Section 87(2)(zg), read with Section 79(2) of the Information Technology Act, 2000.  Comments were invited from the public before February 25th 2011.  Accordingly, Privacy India and Centre for Internet and Society, Bangalore have prepared the following para-wise comments for the Ministry’s consideration.&lt;/b&gt;
        &lt;h2&gt;A. General Objections&lt;/h2&gt;
&lt;p&gt;A number of the provisions under these Rules have no nexus with their parent provision, namely s.79(2).&amp;nbsp; Section 79(1) provides for exemption from liability for intermediaries.&amp;nbsp; Section 79(2) thereupon states:&lt;/p&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;79. Intermediaries not to be liable in certain cases—&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(2) The provisions of sub-section (1) shall apply if—&lt;/p&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or&lt;/p&gt;
&lt;p&gt;(b) the intermediary does not—&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(i) initiate the transmission,&lt;/p&gt;
&lt;p&gt;(ii) select the receiver of the transmission, and&lt;/p&gt;
&lt;p&gt;(iii) select or modify the information contained in the transmission;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;p&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes such other guidelines as the Central Government may prescribe in this behalf.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Therefore, by not observing any of the provisions of the Rules, the intermediary opens itself up for liability for actions of its users.&amp;nbsp; However, many of the provisions of the Rules have no rational nexus with due diligence to be observed by the intermediary to absolve itself from liability.&lt;/p&gt;
&lt;h2&gt;B. Specific Objections&lt;/h2&gt;
&lt;h3&gt;Rule 2(b), (c), and (k)&lt;/h3&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;(b) “Blog” means a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Usually blog is a shared on-line journal where users can post diary entries about their personal experiences and hobbies;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;(c) “Blogger” means a person who keeps and updates a blog;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;(k) “User” means any person including blogger who uses any computer resource for the purpose of sharing information, views or otherwise and includes other persons jointly participating in using the computer resource of intermediary&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;It is unclear why it is necessary to specifically target bloggers as users, leaving out other users such as blog commenters, social network users, microbloggers, podcasters, etc.&amp;nbsp; It makes the rules technologically non-neutral.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We recommend that these 3 sub-rules be deleted.&lt;/p&gt;
&lt;h3&gt; Rule 3(2)&lt;/h3&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;3. &lt;strong&gt;Due Diligence observed by intermediary&lt;/strong&gt;.— The intermediary shall observe following due diligence while discharging its duties.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(2) The intermediary shall notify users of computer resource not to use, display, upload, modify, publish, transmit, update, share or store any information that : —&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;(a) belongs to another person;&lt;/p&gt;
&lt;p&gt;(b) is harmful, threatening, abusive, harassing,&amp;nbsp; blasphemous, objectionable, defamatory, vulgar, obscene, pornographic, paedophilic, libellous, invasive of another’s privacy, hateful, or racially, ethnically or otherwise objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;&lt;/p&gt;
&lt;p&gt;(c) harm minors in any way;&lt;/p&gt;
&lt;p&gt;(d) infringes any patent, trademark, copyright or other proprietary rights;&lt;/p&gt;
&lt;p&gt;(e) violates any law for the time being in force;&lt;/p&gt;
&lt;p&gt;(f) discloses sensitive personal information of other person or to which the user does not have any right to;&lt;/p&gt;
&lt;p&gt;(g) causes annoyance or inconvenience or deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;&lt;/p&gt;
&lt;p&gt;(h) impersonate another person;&lt;/p&gt;
&lt;p&gt;(i) contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer resource;&lt;/p&gt;
&lt;p&gt;(j) threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states, or or public order or&amp;nbsp; causes incitement to the commission of any cognizable offence or prevents investigation of any offence or is insulting any other nation.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Firstly, such ‘standard’ terms of use [1] might make sense for one intermediary, but not for all.&amp;nbsp; For instance, an intermediary such as site with user-generated content (e.g., Wikipedia) would need different terms of use from an intermediary such as an e-mail provider (e.g., Hotmail), because the kind of liability they accrue are different.&amp;nbsp; This is similar to how the liability that a newspaper publisher accrues is different from that accrued by the post office.&amp;nbsp; However, forcing standard terms of use negates this difference.&amp;nbsp; Thus, these are impractical.&lt;/p&gt;
&lt;p&gt;Secondly, read with the legal obligation of the intermediary to remove such information (contained in rule 3(3)), they vest an extraordinary power of censorship in the hands of the intermediary, which could easily lead to the stifling of the constitutionally guaranteed freedom of speech online.&amp;nbsp; Analogous restrictions do not exist in other fields, e.g., against the press in India or against courier companies, and there is no justification to impose them on content posted online. Taken together, these provisions make it impossible to publish critical views about anything without the risk of being summarily censored.&lt;/p&gt;
&lt;p&gt;Thirdly, while it is possible to apply Indian law to intermediaries, it is impracticable to require all intermediaries (whether in India or not) to have in their terms of use India-specific clauses such as rule 3(2)(j).&amp;nbsp; Instead, it is better to merely require them to ask their users to follow all relevant laws.&lt;/p&gt;
&lt;p&gt;Individual instances of how these rules are overly broad are contained in an appendix to this submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We strongly recommend the deletion of this sub-rule, except clause (e).&lt;/p&gt;
&lt;h3&gt;Rule 3(3)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(3) The intermediary shall not itself host or publish or edit or store any information or shall not initiate the transmission, select the receiver of transmission, and select or modify the information contained in the transmission as specified in sub-rule (2).&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This sub-rule is ultra vires s.79 of the IT Act, which does not require intermediaries not to “host or publish or edit or store any information”.&amp;nbsp; If fact, s.79(2) merely states that by violating the provisions of s.79(2), the intermediary loses the protection of s.79(1).&amp;nbsp; It does not however make it unlawful to violate s.79(2), as rule 3(3) does.&amp;nbsp; This makes rule 3(3) ultra vires the Act.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This sub-rule should be deleted.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Rule 3(4)&lt;/strong&gt;&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(4) The intermediary upon obtaining actual knowledge by itself or been brought to actual knowledge by an authority mandated under the law for the time being in force in writing or through email signed with electronic signature about any such information as mentioned in sub-rule (2) above, shall act expeditiously to work with user or owner of such information to remove access to such information that is claimed to be infringing or to be the subject of infringing activity. Further the intermediary shall inform the police about such information and preserve the records for 90 days&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This rule is also ultra vires s.69A of the IT Act as well as the Constitution of India.&amp;nbsp; Section 69A states all the grounds on which an intermediary may be required to restrict access to information [2].&amp;nbsp; It does not allow for expansion of those grounds, because it has been carefully worded to maintains its constitutional validity vis-a-vis Articles 19(1)(a) and 19(2) of the Constitution of India.&amp;nbsp; The rules framed under s.69A prescribe an elaborate procedure before such censorship may be ordered. The rules under s.69A will be rendered nugatory if any person could get content removed or blocked under s.79(2).&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This rule requires an intermediary to immediately take steps to remove access to information merely upon receiving a written request from “any authority mandated under the law”. Thus, for example, any authority can easily immunize itself from criticism on the internet by simply sending a written notice to the intermediary concerned. This is directly contrary to, and completely subverts the legislative intent expressed in Section 69B which lays down an elaborate procedure to be followed before any information can be lawfully blocked.&lt;/p&gt;
&lt;p&gt;If any person is aggrieved by information posted online, they may seek their remedies—including the relief of injunction—from courts of law, under generally applicable civil and criminal law.&amp;nbsp; Inserting a rule such as this one would take away the powers of the judiciary in India to define the line dividing permissible and impermissible speech, and vest it instead in the whims of each intermediary.&amp;nbsp; This can only have a chilling effect on debates in the public domain (of which the Internet is a part) which is the foundation of any democracy.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This rule should modified so that an intermediary is obliged to take steps towards removal of content only when (a) backed by an order from a court or (b) a direction issued following the procedure prescribed by the rules framed under Section 69A.&lt;/p&gt;
&lt;h3&gt;Rule 3(5) &amp;amp; (7) &amp;amp; (8) &amp;amp; (10)&lt;/h3&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;(5) The Intermediary shall inform its users that in case of non-compliance with terms of use of the services and privacy policy provided by the Intermediary, the Intermediary has the right to immediately terminate the access rights of the users to the site of Intermediary;&lt;/p&gt;
&lt;p&gt;(7) The intermediary shall not disclose sensitive personal information;&lt;/p&gt;
&lt;p&gt;(8) Disclosure of information by intermediary to any third party shall require prior permission or consent from the provider of such information, who has provided such information under lawful contract or otherwise;&lt;/p&gt;
&lt;p&gt;(10) The information collected by the intermediary shall be used for the purpose for which it has been collected.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;These sub-rules have no nexus with intermediary liability or non-liability under s.79(2).&amp;nbsp; For instance, it is unreasonable to say that an intermediary may be held liable for the actions of its users if it does not inform its users about its right to terminate access by the user to its services.&amp;nbsp; Furthermore, not all intermediaries need be websites, as sub-rule 5 assumes.&amp;nbsp; An intermediary can even be an “internet service provider” or a “cyber cafe” or a “telecom service provider”, as per rule 2(j) read with s.2(1)(w) of the IT Act.&lt;/p&gt;
&lt;p&gt;The requirements under sub-rules (7), (8), and (10) are rightfully the domain of s.43A and the rules made thereunder, and not s.79(2) nor these rules.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;These sub-rules should be deleted, and sub-rules (7), (8), and (10) may placed instead in the rules made under s.43A.&lt;/p&gt;
&lt;h3&gt;Rule 3(9)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(9) Intermediary shall provide information to government agencies who are lawfully authorised for investigative, protective, cyber security or intelligence activity. The information shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a written request stating clearly the purpose of seeking such information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;This provision is ultra vires ss.69 and 69B.&amp;nbsp; Rules have already been issued under ss.69 and 69B which stipulate the mechanism and procedure to be followed by the government for interception, monitoring or decrypting information in the hands of intermediaries. Thus under the Interception Rules 2009 framed under Section 69, permission must first be obtained from a “competent authority” before an intermediary can be directed to provide access to its records and facilities. The current rule completely removes the safeguards contained in s.69 and its rules, and would make intermediaries answerable to virtually any request from any government agency. This is contrary to the legislative intent expressed in Section 69.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendation&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We recommend this sub-rule be deleted.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Rule 3(12)&lt;/strong&gt;&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(12) The intermediary shall report cyber security incidents and also share cyber security incidents related information with the Indian Computer Emergency Response Team.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;The rules relating to how and when the Indian Computer Emergency Response Team may request for information from intermediaries is rightfully the subject matter of s.70B(5) [3] and the rules made thereunder by virtue of the rule making power granted by s.87(2)(yd).&amp;nbsp; The subject matter of rule 3(12) is not liability of intermediaries for third-party actions, hence there is no nexus between the rule-making power, and the rule.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;We recommend that this sub-rule be deleted.&lt;/p&gt;
&lt;h3&gt;Rule 3(14)&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;(14) The intermediary shall publish on its website the designated agent to receive notification of claimed infringements.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;It is unclear what “infringements” are being referred to in this sub-rule.&amp;nbsp; Neither s.79 nor these rules provide for “infringements”.&amp;nbsp; The same reasoning applied for rule 3(4) would also apply here.&amp;nbsp; It would be better to require the intermediary to publish on its website a method of providing judicial notice.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Delete, and replace with a requirement for the intermediary to publish on its website a method of providing judicial notice.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;Footnotes &lt;br /&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;For instance, the Section B(1) of the World of Warcraft&amp;nbsp; Code of Conduct “When engaging in Chat, you may not: (i) Transmit or post any content or language which, in the sole and absolute discretion of Blizzard, is deemed to be offensive, including without limitation content or language that is unlawful, harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, hateful, sexually explicit, or racially, ethnically or otherwise objectionable.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;It is only “in the interest of sovereignty and integrity of India. defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above” that intermediaries may be issued directions to block access to information.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;70B(5) sates that the&amp;nbsp; The manner of performing functions and duties of the agency referred to in sub-section (1) shall be such as may be prescribed.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/intermediary-due-diligence'&gt;https://cis-india.org/internet-governance/blog/intermediary-due-diligence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2012-07-11T10:27:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act">
    <title>Breaking Down Section 66A of the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</link>
    <description>
        &lt;b&gt;Section 66A of the Information Technology Act, which prescribes 'punishment for sending offensive messages through communication service, etc.'  is widely held by lawyers and legal academics to be unconstitutional. In this post Pranesh Prakash explores why that section is unconstitutional, how it came to be, the state of the law elsewhere, and how we can move forward.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Back in February 2009 (after the IT Amendment Act, 2008 was hurriedly passed on December 22, 2008 by the Lok Sabha, and a day after by the Rajya Sabha&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; but before it was &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/act301009.pdf"&gt;notified on October 27, 2009&lt;/a&gt;) I had written that &lt;a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act" class="external-link"&gt;s.66A&lt;/a&gt; is "patently in &lt;a href="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008/" class="external-link"&gt;violation of Art. 19(1)(a) of the Constitution of India&lt;/a&gt;":&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Section 66A which punishes persons for sending offensive messages is overly broad, and is patently in violation of Art. 19(1)(a) of our Constitution. The fact that some information is "grossly offensive" (s.66A(a)) or that it causes "annoyance" or "inconvenience" while being known to be false (s.66A(c)) cannot be a reason for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). It must be stated here that many argue that John Stuart Mill's harm principle provides a better framework for freedom of expression than Joel Feinberg's offence principle. The latter part of s.66A(c), which talks of deception, is sufficient to combat spam and phishing, and hence the first half, talking of annoyance or inconvenience is not required. Additionally, it would be beneficial if an explanation could be added to s.66A(c) to make clear what "origin" means in that section. Because depending on the construction of that word s.66A(c) can, for instance, unintentionally prevent organisations from using proxy servers, and may prevent a person from using a sender envelope different from the "from" address in an e-mail (a feature that many e-mail providers like Gmail implement to allow people to send mails from their work account while being logged in to their personal account). Furthermore, it may also prevent remailers, tunnelling, and other forms of ensuring anonymity online. This doesn't seem to be what is intended by the legislature, but the section might end up having that effect. This should hence be clarified.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;I stand by that analysis. But given that it is quite sparse, in this post I will examine s.66A in detail.&lt;/p&gt;
&lt;p class="visualClear" style="text-align: justify; "&gt;Here's what s. 66A of the IT (Amendment) Act, 2008 states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;66A. Punishment for sending offensive messages through communication service, etc.,&lt;br /&gt;&lt;/b&gt;Any person who sends, by means of a computer resource or a communication device,—&lt;br /&gt;(a) any information that is grossly offensive or has menacing character;&lt;br /&gt;(b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience,     danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;(c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages&lt;br /&gt;&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;&lt;br /&gt;Explanation: For the purposes of this section, terms "electronic mail" and "electronic mail message" means a message or information created or transmitted or received on a computer, computer system, computer resource or communication device including attachments in text, images, audio, video and any other electronic record, which may be transmitted with the message.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;A large part of s.66A can be traced back to s.10(2) of the UK's Post Office (Amendment) Act, 1935:&lt;/p&gt;
&lt;p align="JUSTIFY" class="callout"&gt;If any person —&lt;br /&gt;(a)  sends any message by telephone which is grossly offensive or of an indecent, obscene, or menacing character; or&lt;br /&gt;(b) sends any message by telephone, or any telegram, which he knows to be false, for the purpose of causing annoyance, inconvenience, or needless anxiety to any other person; or&lt;br /&gt;(c) persistently makes telephone calls without reasonable cause and for any such purposes as aforesaid;&lt;br /&gt;he shall be liable upon summary conviction to a fine not exceeding ten pounds, or to imprisonment for a term not exceeding one month, or to both such fine and imprisonment.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Section 66A bears a striking resemblance to the three parts of this law from 1935, with clauses (b) and (c) being merged in the Indian law into a single clause (b) of s.66A, with a whole bunch of new "purposes" added. Interestingly, the Indian Post Office Act, 1898, was never amended to add this provision.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The differences between the two are worth exploring.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Term of Punishment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first major difference is that the maximum term of imprisonment in the 1935 Act is only one month, compared to three years in s.66A of the IT Act. It seems the Indian government decided to subject the prison term to hyper-inflation to cover for the time. If this had happened for the punishment for, say, criminal defamation, then that would have a jail term of up to 72 years!  The current equivalent laws in the UK are the Communications Act, 2003 (s. 127) and the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; 1988 (s.1) for both of which the penalty is up to 6 months' imprisonment or to a maximum fine of £5000 or both. What's surprising is that in the Information Technology (Amendment) Bill of 2006, the penalty for section 66A was up to 2 years, and it was changed on December 16, 2008 through an amendment moved by Mr. A. Raja (the erstwhile Minister of Communications and IT) to 3 years. Given that parts of s.66A(c) resemble nuisance, it is instructive to note the term of punishment in the Indian Penal Code (IPC) for criminal nuisance: a fine of Rs. 200 with no prison term.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;"Sending" vs. "Publishing"&lt;/h3&gt;
&lt;p align="JUSTIFY"&gt;J. Sai Deepak, a lawyer, has made an interesting point that &lt;a class="external-link" href="http://thedemandingmistress.blogspot.in/2012/11/does-section-66a-of-information.html"&gt;the IT Act uses "send" as part of its wording, and not "publish"&lt;/a&gt;. Given that, only messages specifically directed at another would be included. While this is an interesting proposition, it cannot be accepted because: (1) even blog posts are "sent", albeit to the blog servers — s.66A doesn't say who it has to be sent to; (2) in the UK the Communications Act 2003 uses similar language and that, unlike the Malicious Communication Act 1988 which says "sends to another person", has been applied to public posts to Twitter, etc.; (3) The explanation to s.66A(c) explicitly uses the word "transmitted", which is far broader than "send", and it would be difficult to reconcile them unless "send" can encompass sending to the publishing intermediary like Twitter.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Part of the narrowing down of s.66A should definitely focus on making it applicable only to directed communication (as is the case with telephones, and with the UK's Malicious Communication Act), and not be applicable to publishing.&lt;/p&gt;
&lt;h3 align="JUSTIFY"&gt;Section 66A(c)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(c) was also inserted through an amendment moved by Mr. Raja on December 16, 2008, which was passed by the Lok Sabha on December 22, 2008, and a day after by the Rajya Sabha. (The version introduced in Parliament in 2006 had only 66A(a) and (b).) This was done in response to the observation by the Standing Committee on Information Technology that there was no provision for spam. Hence it is clear that this is meant as an anti-spam provision. However, the careless phrasing makes it anything but an anti-spam provision. If instead of "for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages" it was "for the purpose of causing annoyance and inconvenience and to deceive and to mislead the addressee or recipient about the origin of such messages", it would have been slightly closer to an anti-spam provision, but even then doesn't have the two core characteristics of spam: that it be unsolicited and that it be sent in bulk. (Whether only commercial messages should be regarded as spam is an open question.) That it arise from a duplicitous origin is not a requirement of spam (and in the UK, for instance, that is only an aggravating factor for what is already a fine-able activity).&lt;br /&gt;&lt;br /&gt;Curiously, the definitional problems do not stop there, but extend to the definitions of "electronic mail" and "electronic mail message" in the 'explanation' as well.  Those are so vast that more or less anything communicated electronically is counted as an e-mail, including forms of communication that aren't aimed at particular recipients the way e-mail is.&lt;br /&gt;&lt;br /&gt;Hence, the anti-spam provision does not cover spam, but covers everything else. This provision is certainly unconstitutional.&lt;/p&gt;
&lt;h3 class="visualClear" style="text-align: justify; "&gt;Section 66A(b)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 66A(b) has three main elements: (1) that the communication be known to be false; (2) that it be for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will; (3) that it be communicated persistently. The main problem here is, of course, (2). "Annoyance" and "inconvenience", "insult", "ill will" and "hatred" are very different from "injury", "danger", and "criminal intimidation".  That a lawmaker could feel that punishment for purposes this disparate belonged together in a single clause is quite astounding and without parallel (except in the rest of the IT Act). That's akin to having a single provision providing equal punishment for calling someone a moron ("insult") and threatening to kill someone ("criminal intimidation"). While persistent false communications for the purpose of annoying, insulting, inconveniencing, or causing ill will should not be criminalised (if need be, having it as a civil offence would more than suffice), doing so for the purpose of causing danger or criminal intimidation should. However, the question arises whether you need a separate provision in the IT Act for that. Criminal intimidation is already covered by ss. 503 and 506 of the IPC. Similarly, different kinds of causing danger are taken care of in ss.188, 268, 283, 285, 289, and other provisions. Similarly with the other "purposes" listed there, if, for instance, a provision is needed to penalise hoax bomb threats, then the provision clearly should not be mentioning words like "annoyance", and should not be made "persistent". (At any rate, s. 505(1) of the IPC suffices for hoax bomb threats, so you don't need a separate provision in the IT Act).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I would argue that in its current form this provision is unconstitutional, since there is no countervailing interest in criminalising false and persistent "insults", etc., that will allow those parts of this provision to survive the test of 'reasonableness' under Art.19(2). Furthermore, even bits that survive are largely redundant. While this unconstitutionality could be cured by better, narrower wording, even then one would need to ensure that there is no redundancy due to other provisions in other laws.&lt;/p&gt;
&lt;h3&gt;Section 66A(a)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In s.66A(a), the question immediately arises whether the information that is "grossly offensive" or "menacing" need to be addressed at someone specific and be seen as "grossly offensive" or "menacing" by that person, or be seen by a 'reasonable man' test.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the term "grossly offensive" will have to be read in such a heightened manner as to not include merely causing offence.  The one other place where this phrase is used in Indian law is in s.20(b) of the Indian Post Office Act (prohibiting the sending by post of materials of an indecent, obscene, seditious, scurrilous, threatening, or grossly offensive character).  The big difference between s.20(b) of the IPO Act and s.66A of the IT Act is that the former is clearly restricted to one-to-one communication (the way the UK's Malicious Communication Act 1988 is).  Reducing the scope of s.66A to direct communications would make it less prone to challenge.&lt;br /&gt;&lt;br /&gt;Additionally, in order to ensure constitutionality, courts will have to ensure that "grossly offensive" does not simply end up meaning "offensive", and that the maximum punishment is not disproportionately high as it currently is.  Even laws specifically aimed at online bullying, such as the UK's Protection from Harassment Act 1997, can have unintended effects. As George Monbiot notes, the "first three people to be prosecuted under [the Protection from Harassment Act] were all peaceful protesters".&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutional Arguments in Importing Laws from the UK&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The plain fact is that the Indian Constitution is stronger on free speech grounds than the (unwritten) UK Constitution, and the judiciary has wide powers of judicial review of statutes (i.e., the ability of a court to strike down a law passed by Parliament as 'unconstitutional'). Judicial review of statutes does not exist in the UK (with review under its EU obligations being the exception) as they believe that Parliament is supreme, unlike India. Putting those two aspects together, a law that is valid in the UK might well be unconstitutional in India for failing to fall within the eight octagonal walls of the reasonable restrictions allowed under Art.19(2). That raises the question of how they deal with such broad wording in the UK.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Genealogy of UK Law on Sending 'Indecent', 'Menacing', 'Grossly Offensive' Messages&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Quoting from the case of DPP v. Collins [2006] UKHL 40 [6]:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The genealogy of [s. 127(1) of the Communication Act] may be traced back to s.10(2)(a) of the Post Office (Amendment) Act, 1935, which made it an offence to send any message by telephone which is grossly offensive or of an indecent, obscene or menacing character. That subsection was reproduced with no change save of punctuation in s.66(a) of the Post Office Act 1953. It was again reproduced in s.78 of the Post Office Act 1969, save that "by means of a public telecommunication service" was substituted for "by telephone" and "any message" was changed to "a message or other matter". Section 78 was elaborated but substantially repeated in s.49(1)(a) of the British Telecommunications Act 1981 and was re-enacted (save for the substitution of "system" for "service") in s.43(1)(a) of the Telecommunications Act 1984. Section 43(1)(a) was in the same terms as s.127(1)(a) of the 2003 Act, save that it referred to "a public telecommunication system" and not (as in s.127(1)(a)) to a "public electronic communications network". Sections 11(1)(b) of the Post Office Act 1953 and 85(3) of the Postal Services Act 2000 made it an offence to send certain proscribed articles by post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the above quotation talks about s.127(1) it is equally true about s.127(2) as well. In addition to that, in 1988, the &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt;&lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;&lt;/a&gt; (s.1) was passed to prohibit one-to-one harassment along similar lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UK's Post Office Act was eclipsed by the Telecommunications Act in 1984, which in turn was replaced in 2003 by the Communications Act. (By contrast, we still stick on to the colonial Indian Post Office Act, 1898.)  Provisions from the 1935 Post Office Act were carried forward into the Telecommunications Act (s.43 on the "improper use of public telecommunication system"), and subsequently into s.127 of the Communications Act ("improper use of public electronic communications network").  Section 127 of the Communications Act states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;127. Improper use of public electronic communications network&lt;br /&gt;(1) A person is guilty of an offence if he — &lt;br /&gt;(a) sends by means of a public electronic communications network a message or other matter that is grossly offensive or of an indecent, obscene or menacing character; or&lt;br /&gt;(b) causes any such message or matter to be so sent.&lt;br /&gt;(2) A person is guilty of an offence if, for the purpose of causing annoyance, inconvenience or needless anxiety to another, he —&lt;br /&gt;(a) sends by means of a public electronic communications network, a message that he knows to be false,&lt;br /&gt;(b) causes such a message to be sent; or&lt;br /&gt;(c) persistently makes use of a public electronic communications network.&lt;br /&gt;(3) A person guilty of an offence under this section shall be liable, on summary conviction, to imprisonment for a term not exceeding six months or to a fine not exceeding level 5 on the standard scale, or to both.&lt;br /&gt;(4) Subsections (1) and (2) do not apply to anything done in the course of providing a programme service (within the meaning of the Broadcasting Act 1990 (c. 42)).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in the UK there are calls for repeal of s.127. In a separate blog post I will look at how the UK courts have 'read down' the provisions of s.127 and other similar laws in order to be compliant with the European Convention on Human Rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Comparison between S. 66A and Other Statutes&lt;/h3&gt;
&lt;p&gt;Section 144, IPC, 1860&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Power to issue order in urgent cases of nuisance or  apprehended danger&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;...&lt;b&gt;obstruction, annoyance or injury&lt;/b&gt; to any person lawfully employed, or &lt;b&gt;danger &lt;/b&gt;to human life, health or safety,  or a disturbance of the public tranquillity&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Babulal Parate v. State of Maharastra and Ors. [1961 AIR SC 884] (Magistrates order under s. 144 of the Cr. PC, 1973 was in violation of Art.19(1)(a) of the Constitution).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;A special thanks is due to Snehashish Ghosh for compiling the below table.&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Section&lt;/th&gt;&lt;th&gt;Term(s)/phrase(s) used in 66A&lt;/th&gt;&lt;th&gt;Term(s)/ phrase(s) used in similar sections&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A (heading)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Punishment for sending offensive messages through communication service, etc&lt;/td&gt;
&lt;td&gt;Section 127, CA, 2003, "Improper use of public electronic communications network"&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Any person who sends, by means of a computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 1(1), MCA 1988, "Any person who sends to another person..."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Grossly offensive&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(i), MCA 1988; &lt;br /&gt;Section 127(1)(a),CA, 2003; &lt;br /&gt;Section 10(2)(a), Post Office (Amendment) Act, 1935*; &lt;br /&gt;Section 43(1)(a), Telecommunications Act 1984*;&lt;br /&gt; Section 20, India Post Act 1898&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(a)&lt;/td&gt;
&lt;td&gt;Menacing character&lt;/td&gt;
&lt;td&gt;Section127(1)(a),CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(b)&lt;/td&gt;
&lt;td&gt;Any information which he knows to be false&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 1(1)(a)(iii), MCA 1988 "information which is false and known or believed to be false by the sender"; &lt;br /&gt;Section 127(2)(a), CA, 2003, "a message that he knows to be false"&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;Section 66A(b)  “purpose of...” &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Causing annoyance&lt;/td&gt;
&lt;td&gt;Section127(2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Inconvenience&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 127 (2), CA, 2003&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Danger&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Insult&lt;/td&gt;
&lt;td&gt;Section 504, IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Injury&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Section 44 IPC, 1860, "The word 'injury' denotes any harm whatever illegally caused to any person, in body, mind, reputation or property."&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Criminal intimidation&lt;/td&gt;
&lt;td&gt;Sections 503 and 505 (2), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Enmity, hatred or ill-will&lt;/td&gt;
&lt;td&gt;Section 153A(1)(a), IPC, 1860&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Persistently by making use of such computer resource or a communication device&lt;/td&gt;
&lt;td&gt;Section 127(2)(c), CA, 2003, "persistently makes use of a public electronic communications network."&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Section 66A(c)&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Deceive or to mislead&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;-&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;br /&gt;MCA 1988: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1"&gt;Malicious Communications Act&lt;/a&gt; (s.1)&lt;br /&gt;CA: &lt;a class="external-link" href="http://www.legislation.gov.uk/ukpga/2003/21/section/127"&gt;Communications Act 2003&lt;/a&gt; (s.127)&lt;br /&gt;*Replaced by Communications Act 2003&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Information Technology (Amendment) Bill, 2008, was one amongst the eight bills that were passed in fifteen minutes on December 16, 2008.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Inserted vide Information Technology Amendment Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was re-posted in &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283149"&gt;Outlook &lt;/a&gt;(November 28, 2012)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act'&gt;https://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2012-12-14T09:51:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites">
    <title>Blocked websites: Where India flawed</title>
    <link>https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites</link>
    <description>
        &lt;b&gt;Apart from not giving 48 hours response time, the Indian government has blocked some websites which don't exist or don't have web addresses, says an analyst.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.ciol.com/News/News-Reports/Blocked-websites-Where-India-flawed/165165/0/"&gt;CIOL&lt;/a&gt; on August 23, 2012. Pranesh Prakash's analysis is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India is threatening to block Twitter as the latter has allegedly failed to respond to the government's order to remove some inflammatory posts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That has come to light as it is being widely covered in media, but there are hundreds of websites which have already been shut, apparently without due notice to the owners.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from Facebook, Twitter and YouTube accounts, the blocked websites include which are sympathetic to Hindu and Muslim radical groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an &lt;a href="http://www.ciol.com/News/News-Reports/Blocked-websites-Where-India-flawed/165165/0/%28http:/cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism%29" shape="rect" target="_self"&gt;analysis of 309 websites&lt;/a&gt; blocked in the wake of exodus of North eastern people from Bangalore, Pranesh Prakash of the Centre for Internet and Society (CIS), says the government has blocked these sites under the Information Technology Act, but it failed to provide the mandatory 48 hours to respond (under Rule 8 of the Information Technology Procedure and Safeguards for Blocking for Access of Information by Public, Rules 2009).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He writes in his post: "The persons and intermediaries hosting the content should have been notified. Even if the emergency provision (Rule 9) was used, the block issued on August 18, 2012, should have been introduced before the "Committee for Examination of Request" by August 20, 2012 (within 48 hours), and that committee should have notified the persons and intermediaries hosting the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internet censorship is acceptable as long as it is in the purview of the law and doesn't encroach one's freedom. In this case, some people and posts debunking rumours have been blocked, says Pranesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He points to some discrepancies in the way the websites are blocked:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Some of the items are not even web addresses (e.g., a few HTML img tags were included). Some of the items they have tried to block do not even exist (e.g., one of the Wikipedia URLs).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An entire domain was blocked on Sunday, and a single post on that domain was blocked on Monday.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For some YouTube videos, the 'base' URL of YouTube videos is blocked, but for other the URL with various parameters (like the "&amp;amp;related=" parameter) is blocked. That means that even nominally 'blocked' videos will be freely accessible.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;He concludes: "All in all, it is clear that the list was not compiled with sufficient care."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites'&gt;https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T03:00:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>https://cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate">
    <title>At the end of the niche optical pirate</title>
    <link>https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate</link>
    <description>
        &lt;b&gt;In this blog post, Siddharth Chaddha goes enquiring into the modus operandi of a video pirate / film lover / businessman in Bangalore's famed National Market.&lt;/b&gt;
        &lt;h3&gt;&lt;strong&gt;Getting to the National Market&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Wading through Majestic Bus Stand,
Flea Markets, Private Bus Stops and vehicles going around in circles,
you could almost miss this board outside one of the shopping plazas.
NATIONAL MARKET, the famed "pirate market" at the heart of
the city. Most of the business here is illegal and the local police
raid the thirty odd shops selling goods, which within the purview of
any multilateral agreement under WIPO or TRIPS regime would be an
infringement of copyright, at least once a
month. The shops run shutter to shutter, each one five by four feet.
Crowded with sellers and customers, all pirate markets typically
smell the same. Pirated DVDs, DVD players, Chinese mobile phones and
PDAs, even VHS players of the yore, smuggled MP3 music systems, fake
Ray-Bans and Police sunglasses, gaming consoles. You name it, and
National Market has it.&lt;/p&gt;
&lt;h3&gt;Meet the Pirate&lt;/h3&gt;
&lt;p&gt;Tall and sporting a stubble, Sooraj
(name changed) is a Malayali who has been in the trade for over 8
years. "Earlier, I used to have the best English Movie
collection ever. But now, its all going away. Most people have
shifted from DVD's to Digital Storage and Bit Torrents", says
Sooraj.  A family comes across the counter. A middle aged man
accompanied by two women in a burqua, one of them carrying a young
baby boy in their hand. "Tom and Jerry!", says the man and
Sooraj's helper brings out a carton full of animated Hollywood films.
Finding Nemo, The Lion King, Madagascar, its all there. "No Tom
and Jerry. This doesn't have Tom and Jerry", growls the stout
customer. Sooraj jumps into the action, hunts out a DVD from a stack
and puts it on the table. "Tom and Jerry Tales - 13 episodes",
reads the the outside with a classic Tom chasing Jerry picture on the
cover. Satisfied, the family puts it aside and goes on to explore
other popular cartoon series. In the end, the man calls for
Maharathi, a recent Bollywood flick. He looks at the cover
intriguingly and I decide to butt in, "Amazing movie. Just saw
it last week. Great plot." The deal is seized and after a bout
of bargaining over the price. As the family dissolves into the market,
Sooraj turns back and says to me, "A lot of customers bargain. I
get a headache. And my shop is the first one in the market, inside
people operate on margins of 5-10 rupees. That just ruins everything
for us. They don't think of the amount of the risk involved."&lt;/p&gt;
&lt;h3&gt;The Business of Piracy&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Sooraj explains to me how Chennai is the biggest market of
the South. "Chennai is a sea. You will get everything there.
Once you take a dive in that ocean, it's all there." When I ask
him of the chain of distribution, he says, "No one will say that
I print the covers of fake DVDs or I copy prints. For me, I just
call my distributor and everything comes from Chennai. I don't ask
beyond that. The stock comes in the price range of 25-35-40 Rupees.
Now, there is only one quality of stock. The market is dying. No one
has good stock. Earlier, we used to sell DVDs for Rs.70-80. Now,
there is no demand. Even the wholesale business is at a low.'' I ask
him, "So what are you going to do, now that soon DVDs will be
gone?" Sooraj is not flustered. "We will shut this and start
a new business," he says. I quietly step back, as another
customer comes asking for audio CDs. He doesn't deal in those.&lt;/p&gt;
&lt;h3&gt;Enforcement Threat&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;When the customer is gone, I ask him,
"How often does the police raid this market?" He smiles and
replies, "Not often anymore. The business is almost dead. But
yes, they come sometimes. Then you are taken away and a case ensues."
I decide to ask him candidly, "How many times have you been
booked?" He smiles again. "5-7 times. I have a few cases
pending, dates that I have to go and visit the court. They arrest you
for a day but that's all they can do. After all this is not a big
crime." He continues dealing with customers who have various
demands for music and films. Some he sells to, he guides others to
the inside shops. "I sell about a 1000 DVDs everyday. Earlier,
the figure used to be much higher. Mostly English. Hindi, Tamil and
Telugu too. No Kannada," he volunteers. I probe further, "Why
no Kannada?" He says that that he supports protection for their
own industry. "And the market price for Kannada films is
appropriate. Some are Rupees 60, 90, 110. That's reasonable. We do not
need to pirate it."&lt;/p&gt;
I ask him for Tamil titles. He asked if
I wanted &lt;em&gt;Ghajani&lt;/em&gt;. “I saw it when it released. Give me something
that's worth watching.” He picks out two. &lt;em&gt;Saroja&lt;/em&gt; and &lt;em&gt;Subramaniya
Puram&lt;/em&gt;. He doesn't make a profit in this deal but something tells me
that he is happy to spread the love of good films. "Can I click
a picture?" He refuses, saying it would not be a good idea. I
shake his hand. Until next time.


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate'&gt;https://cis-india.org/a2k/blogs/at-the-end-of-the-niche-optical-pirate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>siddharth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    

   <dc:date>2011-08-04T04:44:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A">
    <title>Arbitrary Arrests for Comment on Bal Thackeray's Death</title>
    <link>https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A</link>
    <description>
        &lt;b&gt;Two girls have been arbitrarily and unlawfully arrested for making comments about the late Shiv Sena supremo Bal Thackeray's death.  Pranesh Prakash explores the legal angles to the arrests.&lt;/b&gt;
        &lt;h2 id="facts-of-the-case"&gt;Facts of the case&lt;/h2&gt;
&lt;p&gt;This morning, there was &lt;a href="http://www.mumbaimirror.com/article/2/2012111920121119043152921e12f57e1/In-Palghar-cops-book-21yearold-for-FB-post.html"&gt;a short report in the Mumbai Mirror&lt;/a&gt; about two girls having been arrested for comments one of them made, and the other 'liked', on Facebook about Bal Thackeray:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Police on Sunday arrested a 21-year-old girl for questioning the total shutdown in the city for Bal Thackeray’s funeral on her Facebook account. Another girl who ‘liked’ the comment was also arrested.&lt;/p&gt;
&lt;p&gt;The duo were booked under Section 295 (a) of the IPC (for hurting religious sentiments) and Section 64 (a) of the Information Technology Act, 2000. Though the girl withdrew her comment and apologised, a mob of some 2,000 Shiv Sena workers attacked and ransacked her uncle’s orthopaedic clinic at Palghar.&lt;/p&gt;
&lt;p&gt;“Her comment said people like Thackeray are born and die daily and one should not observe a bandh for that,” said PI Uttam Sonawane.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="what-provisions-of-law-were-used"&gt;What provisions of law were used?&lt;/h2&gt;
&lt;p&gt;There's a small mistake in Mumbai Mirror's reportage as there is no section "64(a)"&lt;sup&gt;&lt;a class="footnoteRef" href="#fn1" id="fnref1"&gt;1&lt;/a&gt;&lt;/sup&gt; in the Information Technology (IT) Act, nor a section "295(a)" in the Indian Penal Code (IPC). They must have meant &lt;a href="https://cis-india.org/internet-governance/resources/section-295a-indian-penal-code"&gt;section 295A of the IPC&lt;/a&gt; ("outraging religious feelings of any class") and &lt;a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act"&gt;section 66A of the IT Act&lt;/a&gt; ("sending offensive messages through communication service, etc."). (Update: The Wall Street Journal's Shreya Shah has confirmed that the second provision was section 66A of the IT Act.)&lt;/p&gt;
&lt;p&gt;Section 295A of the IPC is cognizable and non-bailable, and hence the police have the powers to arrest a person accused of this without a warrant.&lt;sup&gt;&lt;a class="footnoteRef" href="#fn2" id="fnref2"&gt;2&lt;/a&gt;&lt;/sup&gt; Section 66A of the IT Act is cognizable and bailable.&lt;/p&gt;
&lt;p&gt;Update: Some news sources claim that &lt;a href="http://www.vakilno1.com/bareacts/indianpenalcode/s505.htm"&gt;section 505(2) of the IPC&lt;/a&gt; ("Statements creating or promoting enmity, hatred or ill-will between classes") has also been invoked.&lt;/p&gt;
&lt;h2 id="was-the-law-misapplied"&gt;Was the law misapplied?&lt;/h2&gt;
&lt;p&gt;This is clearly a case of misapplication of s.295A of the IPC.&lt;sup&gt;&lt;a class="footnoteRef" href="#fn3" id="fnref3"&gt;3&lt;/a&gt;&lt;/sup&gt; This provision has been frivolously used numerous times in Maharashtra. Even the banning of James Laine's book &lt;i&gt;Shivaji: Hindu King in Islamic India&lt;/i&gt; happened under s.295A, and the ban was subsequently held to have been unlawful by both the Bombay High Court as well as the Supreme Court. Indeed, s.295A has not been applied in cases where it is more apparent, making this seem like a parody news report.&lt;/p&gt;
&lt;p&gt;Interestingly, the question arises of the law under which the friend who 'liked' the Facebook status update was arrested. It would take a highly clever lawyer and a highly credulous judge to make 'liking' of a Facebook status update an act capable of being charged with electronically "sending ... any information that is grossly offensive or has menacing character" or "causing annoyance or inconvenience", or under any other provision of the IT Act (or, for that matter, the IPC).&lt;sup&gt;&lt;a class="footnoteRef" href="#fn4" id="fnref4"&gt;4&lt;/a&gt;&lt;/sup&gt; That 'liking' is protected speech under Article 19(1)(a) is not under question in India (unlike in the USA where that issue had to be adjudicated by a court), since unlike the wording present in the American Constitution, the Indian Constitution clearly protects the 'freedom of speech &lt;b&gt;and expression&lt;/b&gt;', so even non-verbal expression is protection.&lt;/p&gt;
&lt;h2 id="role-of-bad-law-and-the-police"&gt;Role of bad law and the police&lt;/h2&gt;
&lt;p&gt;In this case the blame has to be shared between bad law (s.66A of the IT Act) and an abuse of powers by police. The police were derelict in their duty, as they failed to provide protection to the Dhada Orthopaedic Hospital, run by the uncle of the girl who made the Facebook posting. Then they added insult to injury by arresting Shaheen Dhada and the friend who 'liked' her post. This should not be written off as a harmless case of the police goofing up. Justice Katju is absolutely correct in &lt;a href="http://www.hindustantimes.com/India-news/NewDelhi/Katju-demands-action-against-Mumbai-cops-for-arresting-woman/Article1-961478.aspx"&gt;demanding that such police officers should be punished&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="rule-of-law"&gt;Rule of law&lt;/h2&gt;
&lt;p&gt;Rule of law demands that laws are not applied in an arbitrary manner. When tens of thousands were making similar comments in print (Justice Katju's article in the Hindu, for instance), over the Internet (countless comments on Facebook, Rediff, Orkut, Twitter, etc.), and in person, how did the police single out Shaheen Dhada and her friend for arrest?&lt;sup&gt;&lt;a class="footnoteRef" href="#fn5" id="fnref5"&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="social-media-regulation-vs.-suppression-of-freedom-of-speech-and-expression"&gt;Social Media Regulation vs. Suppression of Freedom of Speech and Expression&lt;/h2&gt;
&lt;p&gt;This should not be seen merely as "social media regulation", but as a restriction on freedom of speech and expression by both the law and the police. Section 66A makes certain kinds of speech-activities ("causing annoyance") illegal if communicated online, but legal if that same speech-activity is published in a newspaper. Finally, this is similar to the Aseem Trivedi case where the police wrongly decided to press charges and to arrest.&lt;/p&gt;
&lt;p&gt;This distinction is important as it being a Facebook status update should not grant Shaheen Dhada any special immunity; the fact of that particular update not being punishable under s.295 or s.66A (or any other law) should.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;
&lt;p&gt;Section 64 of the IT Act is about "recovery of penalty" and the ability to suspend one's digital signature if one doesn't pay up a penalty that's been imposed.&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn2"&gt;
&lt;p&gt;The police generally cannot, without a warrant, arrest a person accused of a bailable offence unless it is a cognizable offence. A non-bailable offence is one for which a judicial magistrate needs to grant bail, and it isn't an automatic right to be enjoyed by paying a bond-surety amount set by the police.&lt;a href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn3"&gt;
&lt;p&gt;Section 295A of the IPC has been held not to be unconstitutional. The first case to &lt;a href="http://ibnlive.in.com/generalnewsfeed/news/pil-to-declare-sec-66a-as-unconstitutional-filed/1111666.html"&gt;challenge the constitutionality of section 66A of the IT Act&lt;/a&gt; was filed recently in front of the Madurai bench the Madras High Court.)&lt;a href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn4"&gt;
&lt;p&gt;One can imagine an exceptional case where such an act could potentially be defamatory, but that is clearly exceptional.&lt;a href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn5"&gt;
&lt;p&gt;This is entirely apart from the question of how the Shiv Sena singled in on Shaheen Dhada's Facebook comment.&lt;a href="#fnref5"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;This blog entry has been re-posted in the following places&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283033"&gt;Outlook&lt;/a&gt; (November 19, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://kafila.org/2012/11/19/social-media-regulation-vs-suppression-of-freedom-of-speech-pranesh-prakash/"&gt;KAFILA&lt;/a&gt; (November 19, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A'&gt;https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IPC</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-02T03:42:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii">
    <title>Analyzing the Latest List of Blocked Sites (Communalism and Rioting Edition) Part II</title>
    <link>https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii</link>
    <description>
        &lt;b&gt;Snehashish Ghosh does a further analysis of the leaked list of the websites blocked by the Indian Government from August 18, 2012 till August 21, 2012 (“leaked list”). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Unnecessary Blocks and Mistakes:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;http://hinduexistance.files.wordpress.com/..., which appears on the leaked list, does not exist because the URL is incorrect. However, the correct URL does contain an image which, in my opinion, can be considered to be capable of inciting violence. It has not been blocked due to a spelling error in the order. Instead of blocking hinduexist&lt;b&gt;&lt;i&gt;e&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/... the DoT has ordered the blocking of hinduexist&lt;b&gt;&lt;i&gt;a&lt;/i&gt;&lt;/b&gt;nce.wordpress.com/..., which does not exist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Two URLs in the block order are from the website of the High Council for Human Rights, Judiciary of the Islamic Republic of Iran. The reason for blocking these two links from this particular website is unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The website of the Union of NGOs of the Islamic World was blocked. Again, the reason for blocking this website remains unclear.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;URLs such as, http://farazahmed.com/..., mumblingminion.blogspot.com, were blocked. The content on these URLs was in fact debunking the fake photographs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Certain blocked Facebook pages did not have any bearing on the North East exodus which was the main reason behind the blocks. For example, Facebook link leading to United States Institute for Peace page was blocked.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Duration of the Block&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Department of Telecommunications (DoT) did not specify the period for which the block has been implemented in its orders. As a result of which certain URLs still remain blocked while a majority of the links in the leaked list can be accessed. Lack of clear directions from the DoT has resulted in haphazard blocking and certain internet service providers (ISPs) have lifted the block on certain links whereas some other ISPs have continued with a complete block.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How have the intermediaries reacted to the block orders?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by the leaked list of websites blocked by DoT, it issued the block orders to ‘all internet service licensees’. Intermediaries that do not fall in the category of 'internet service licensees’ were also sent  a separate set of requests for taking down third party content. However, it is unclear under which provision of the law such request was made by the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Service Licensees&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;img src="https://cis-india.org/home-images/chart_1.png" alt="Implementation of the order at the ISP level" class="image-inline" title="Implementation of the order at the ISP level" /&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The internet service licensee or the ISPs have not followed any uniform system to notify that a particular URL or website in the leaked list is blocked according to DoT’s orders. The lack of transparency in the implementation of the block orders, have a chilling effect on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For instance, BSNL returns the following messages:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Telecommunications" or “This site has been blocked as per instructions from Department of Telecom (DOT).”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, these messages are not uniform across all the URLs/websites in the leaked list. BSNL does not generate any response for the majority of the URLs in the leaked list. This results in ‘invisible censorship’ as the person who is trying to access the blocked URL does not have any means to know whether a particular URL is unavailable or certain sites are blocked by government orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lack of notification does not only infringes upon the fundamental right  to freedom of speech and expression but also violates the fundamental  right to a constitutional remedy guaranteed under Article 32 of our  Constitution. The person aggrieved by such block orders cannot approach  the Court for a remedy because there is no means to figure out:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Description of the content blocked?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Who  has issued the block order/request?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) Under which provision of the law such  block order/request has been issued?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Who has  implemented the block order/request? and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) What was the reason for the block?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intermediaries should provide with the above notification details while implementing a block order issued by the Government. &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediaries hosting third party content: &lt;/b&gt;&lt;/p&gt;
&lt;p align="right" style="text-align: justify; "&gt;More than 100 out of the 309 blocks are Facebook (http and https) URLs. Facebook has not informed its users about the reasons behind unavailability of certain pages or content. This is another instance of invisible censorship. However, YouTube, a Google service, has maintained certain level of transparency, and informs the user that the content has been blocked as per ‘government removal request’. It is interesting to note that certain YouTube user accounts were terminated as well. It is unclear whether this was as a result of the block order. Furthermore, links associated with blogger.com, which is another service provided by Google, have been removed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="right" style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.medianama.com/2012/09/223-analyzing-the-latest-list-of-blocked-sites-communalism-rioting-edition-part-ii/"&gt;re-posted&lt;/a&gt; by Medianama on September 26, 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii'&gt;https://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2012-09-27T10:42:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism">
    <title>Analysing Latest List of Blocked Sites (Communalism &amp; Rioting Edition)</title>
    <link>https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism</link>
    <description>
        &lt;b&gt;Pranesh Prakash does preliminary analysis on a leaked list of the websites blocked from August 18, 2012 till August 21, 2012 by the Indian government.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Note&lt;/b&gt;: This post will be updated as more analysis is done. Last update: 23:59 on August 22, 2012. This is being shared under a &lt;a href="http://creativecommons.org/licenses/by-nc/3.0/"&gt;Creative Commons Attribution-NonCommercial licence&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;img src="https://docs.google.com/spreadsheet/oimg?key=0AqefbzxbW_b_dE5rTG9XbkRab0cxWFdoOEgyN01YcWc&amp;amp;oid=1&amp;amp;zx=dskyfic7thzd" /&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;b&gt;How many items have been blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There   are a total of 309 specific items (those being URLs, Twitter accounts,   img tags, blog posts, blogs, and a handful of websites) that have been   blocked. This number is meaningless at one level, given that it doesn't   differentiate between the blocking of an entire website (with dozens  or  hundreds of web pages) from the blocking of a single webpage.  However,  given that very few websites have been blocked at the  domain-level, that  number is still reasonably useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please   also note, we currently only have information related to what telecom   companies and Internet Service Providers (ISPs) were asked to block  till  August 21, 2012. We do not have information on what individual web   services have been asked to remove. That might take the total count  much  higher.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why have these been blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As far   as I could determine, all of the blocked items have content (mostly   videos and images have been targeted, but also some writings) that are related to communal issues and rioting. (Please note: I am not calling the content itself "communal" or "incitement to rioting", just that the   content relates to communal issues and rioting.) This has been done in the context of the recent riots in Assam, Mumbai, UP, and the mass   movement of people from Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There   were reports of parody Twitter accounts having been blocked.  Preliminary  analysis on the basis of available data show that parody  Twitter  accounts and satire sites have &lt;i&gt;not&lt;/i&gt; been targetted solely  for  being satirical. For instance, very popular parody Twitter  accounts,  such as @DrYumYumSingh are not on any of the four orders  circulated by  the Department of Telecom. (I have no information on  whether such parody  accounts are being taken up directly with Twitter  or not: just that  they aren't being blocked at the ISP-level. Media  reports indicate &lt;a href="http://goo.gl/GI9jP"&gt;six accounts have been taken up with Twitter&lt;/a&gt; for being similar to the Prime Minister's Office's account.)&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Are the blocks legitimate?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The   goodness of the government's intentions seem, quite clearly in my   estimation, to be unquestionable. Yet, even with the best intentions,   there might be procedural illegalities and over-censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There   are circumstances in which freedom of speech and expression may   legitimately be limited. The circumstances that existed in Bangalore   could justifiably result in legitimate limitations on freedom of speech.   For instance, I believe that temporary curbs — such as temporarily   limiting SMSes &amp;amp; MMSes to a maximum of five each fifteen minutes for   a period of two days — would have been helpful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However   it is unclear whether the government has exercised its powers   responsibly in this circumstance. The blocking of many of the items on   that list are legally questionable and morally indefensible, even while a   some of the items ought, in my estimation, to be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the   government has blocked these sites under s.69A of the Information   Technology Act ("Power to Issue Directions for Blocking for Public   Access of Any Information through any Computer Resource"), the persons   and intermediaries hosting the content should have been notified   provided 48 hours to respond (under Rule 8 of the Information Technology   (Procedure and Safeguards for Blocking for Access of Information by   Public) Rules 2009). Even if the emergency provision (Rule 9) was used,   the block issued on August 18, 2012, should have been introduced before   the "Committee for Examination of Request" by August 20, 2012 (i.e.,   within 48 hours), and that committee should have notified the persons   and intermediaries hosting the content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly,   even though many of the items on that list are repugnant and do  deserve  (in my opinion) to be removed, ordering ISPs to block them is  largely  ineffectual. The people and companies hosting the material  should have  been asked to remove it, instead of ordering Internet  service providers  (ISPs) to block them. All larger sites have clear  content removal  policies, and encouraging communal tensions and hate  speech generally  wouldn't be tolerated. That this can be done without  resort to the  dreadful Intermediary Guidelines Rules (which were passed  last year)  shows that those Rules are unnecessary. It is our belief  that &lt;a href="https://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"&gt;those Rules are also unconstitutional&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Are there any egregious mistakes?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Yes, there are numerous such examples of egregious mistakes.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Most importantly, some even &lt;b&gt;people and posts      debunking rumours have been blocked&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some   of the Twitter accounts are of prominent      people who write for the   mainstream media, and who have written similar      content offline. If   their online content is being complained about, their      offline   content should be complained about too.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Quite  a  number of the links include articles      published and reports   broadcast in the mainstream media (including a Times      Now report, a   Telegraph picture gallery, etc.), and in print, making the      blocks   suspect. Only the online content seems to have been targeted for        censorship.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;There are numerous mistakes and inconsistencies that make blocking pointless and ineffectual.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Some of the items are not even web addresses      (e.g., a few HTML img tags were included).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some of the items they have tried to block do not      even exist (e.g., one of the Wikipedia URLs).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An entire domain was blocked on Sunday, and a      single post on that domain was blocked on Monday.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For   some Facebook pages, the secure version      (https://facebook.com/...)   is listed, for others the non-secure version        (http://facebook.com/...) is listed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For   some YouTube videos, the 'base' URL of      YouTube videos is blocked,   but for other the URL with various parameters      (like the   "&amp;amp;related=" parameter) is blocked. That means that      even   nominally 'blocked' videos will be freely accessible.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;All in all, it is clear that the list was not compiled with sufficient care.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite   a clear warning by the DIT that "above URLs only" should be blocked,   and not "the main websites like www.facebook.com, www.youtube.com,   www.twitter.com, etc.", it has been seen that some ISPs (like Airtel) &lt;a href="http://www.labnol.org/india/india-blocks-youtube/25028/"&gt;have gone overboard in their blocking&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why haven't you put up the whole list?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given   the sensitivity of the issue, we felt it would be premature to share  the  whole list. However, we strongly believe that transparency should  be an  integral part of all censorship. Hence, this analysis is an  attempt to  provide some much-needed transparency. We intend to make the  entire list  public soon, though. (Given how porous such information  is, it is  likely that someone else will procure the list, and release  it sooner  than us.)&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Why can I still access many items that are supposed to be blocked?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One   must keep in mind that fresh orders have been issued on a day-by-day   basis, that there are numerous mistakes in the list making it difficult   to apply (some of these mistakes have been mentioned above), and the   fact that that this order has to be implemented by hundreds of ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Your   ISP probably has not have got around to enforcing the blocks yet. At the   time of this writing, most ISPs don't seem to be blocking yet. This   analysis is based on the orders sent around to ISPs, and not on the   basis of actual testing of how many of these have actually been blocked   by Airtel, BSNL, Tata, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally,   if you are using Twitter through a client (on your desktop, mobile,   etc.) instead of the web interface, you will not notice any of the   Twitter-related blocks.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So you are fine with censorship?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;No. I   believe that in some cases, the government has the legal authority to   censor. Yet, exercising that legal authority is usually not productive,   and in fact there are other, better ways of limiting the harms caused  by  speech and information than censorship. Limiting speech might even   prove harmful in situations like these, if it ends up restricting   people's ability to debunk false rumours. In a separate blog post (to be   put up soon), I am examining how all of the government's responses  have  been flawed both legally and from the perspective of achieving the   desired end.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;So what should the government have done?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given   that the majority of the information it is targeting is on Facebook,   Youtube, and Twitter, the government could have chosen to fight &lt;i&gt;alongside&lt;/i&gt; those services to get content removed expeditiously, rather than fight &lt;i&gt;against&lt;/i&gt; them. (There are &lt;a href="http://www.firstpost.com/videos/govt-to-use-social-media-to-prevent-misuse-of-technology-sibal-426231.html"&gt;some indications&lt;/a&gt; that the government might be working with these services, but it certainly isn't doing enough.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For   instance, it could have asked all of them to expedite their complaints   mechanism for a few days, by ensuring that the complaints mechanism is   run 24x7 and that they respond quickly to any complaint submitted about   communal incitement, spreading of panic, etc. This does not need the   passing of an order under any law, but requires good public relations   skills and a desire not to treat internet services as enemies. The   government could have encouraged regular users to flag false rumours and   hate speech on these sites. On such occasions, social networking sites   should step up and provide all lawful assistance that the government  may  require. They should also be more communicative in terms of the  help  they are providing to the government to curtail panic-inducing  rumours  and hate speech. (Such measures should largely be reactive, not   proactive, to ensure legitimate speech doesn't get curtailed.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The   best antidote for the rumours that spread far and wide and caused a mass   movement of people from Bangalore to the North-Eastern states would   have been clear debunking of those rumours. Mass outreach to people in   the North-East (very often the worried parents) and in Bangalore using   SMSes and social media, debunking the very specific allegations and   rumours that were floating around, would have been welcome. However,   almost no government officials actually used social media platforms to   reach out to people to debunk false information and reassure them. Even a   Canadian interning in our organization got a reassuring SMS from the   Canadian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is indeed a pity that the government &lt;a href="https://cis-india.org/internet-governance/resources/citizen-engagement-framework-for-e-governance-projects-and-framework-and-guidelines-for-use-of-social-media-by-government-agencies"&gt;notified a social media engagement policy today&lt;/a&gt;, when the need for it was so very apparent all of the past week.&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;And what of all this talk of cybersecurity failure and cyber-wars?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Cybersecurity   is indeed a cause of concern for India, but only charlatans and the   ignorant would make any connection between India's cybersecurity and   recent events. The role of Pakistan deserves a few words. Not many   Pakistani websites / webpages have been blocked by the Indian   government. Two of the Pakistani webpages that have been blocked are   actually pages that debunk the fake images that have been doing the   rounds in Pakistan for at least the past month. Even Indian websites &lt;a href="http://kafila.org"&gt;like Kafila&lt;/a&gt; have noted these fake images long ago, and &lt;a href="http://kafila.org/2012/08/05/national-contestation-not-religion-responsible-for-the-plight-of-myanmars-rohingyas-ayesha-siddiqa/"&gt;Ayesha Siddiqa wrote about this on August 5, 2012&lt;/a&gt;, and &lt;a href="http://kafila.org/2012/08/13/how-to-start-a-riot-out-of-facebook-yousuf-saeed/"&gt;Yousuf Saeed wrote about it on August 13, 2012&lt;/a&gt;.   Even while material that may have been uploaded from Pakistan, it  seems  highly unlikely they were targeted at an Indian audience, rather  than a  Pakistani or global one.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Domain&lt;/th&gt;&lt;th&gt;Total Number of Entries&lt;/th&gt;&lt;th&gt;Tuesday, August 21, 2012&lt;/th&gt;&lt;th&gt;Monday, August 20, 2012&lt;/th&gt;&lt;th&gt;Sunday, August 19, 2012&lt;/th&gt;&lt;th&gt;Saturday, August 18, 2012&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ABC.net.au&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AlJazeera.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AllVoices.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;WN.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;AtjehCyber.net&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;BDCBurma.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bhaskar.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blogspot.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blogspot.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;7&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Catholic.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CentreRight.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ColumnPK.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Defence.pk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;EthioMuslimsMedia.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Facebook.com (HTTP)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;75&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;36&lt;/td&gt;
&lt;td style="text-align: right; "&gt;7&lt;/td&gt;
&lt;td style="text-align: right; "&gt;18&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Facebook.com (HTTPS)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;27&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;23&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Farazahmed.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;5&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Firstpost.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HaindavaKerelam.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HiddenHarmonies.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;HinduJagruti.org&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hotklix.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HumanRights-Iran.ir&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Intichat.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Irrawady.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;IslamabadTimesOnline.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Issuu.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;JafriaNews.com&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;JihadWatch.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;KavkazCenter&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MwmJawan.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;My.Opera.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Njuice.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OnIslam.net&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PakAlertPress.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Plus.Google.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;4&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;4&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reddit.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rina.in&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SandeepWeb.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SEAYouthSaySo.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sheikyermami.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;StormFront.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Telegraph.co.uk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheDailyNewsEgypt.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheFaultLines.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ThePetitionSite.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;TheUnity.org&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TimesofIndia.Indiatimes.com    &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TimesOfUmmah.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Tribune.com.pk&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter.com (HTTP)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter.com (HTTPS)&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;11&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td style="text-align: right; "&gt;10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Twitter account&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;18&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;16&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TwoCircles.net&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;2&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;2&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Typepad.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vidiov.info&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wikipedia.org&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;3&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;3&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: right; "&gt;
&lt;td style="text-align: left; "&gt;Wordpress.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;8&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;YouTube.com&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;85&lt;/b&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;18&lt;/td&gt;
&lt;td style="text-align: right; "&gt;39&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;td style="text-align: right; "&gt;14&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;YouTu.be&lt;/td&gt;
&lt;td style="text-align: right; "&gt;&lt;b&gt;1&lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: right; "&gt;1&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Totals&lt;/th&gt;&lt;th style="text-align: right; "&gt;309&lt;/th&gt;&lt;th style="text-align: right; "&gt;65&lt;/th&gt;&lt;th style="text-align: right; "&gt;88&lt;/th&gt;&lt;th style="text-align: right; "&gt;80&lt;/th&gt;&lt;th style="text-align: right; "&gt;75&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The analysis has been cross-posted/quoted in the following places:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.livemint.com/2012/09/04231942/Need-a-standard-strategy-to-de.html"&gt;LiveMint&lt;/a&gt; (September 4, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-the-hindu-aug-26-v-sridhar-regulating-the-internet-by-fiat" class="external-link"&gt;The Hindu&lt;/a&gt; (August 26, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/08/25/opinion-indias-clumsy-twitter-gamble/"&gt;Wall Street Journal&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/tech2-in-com-som-isps-block-wordpress-domain-across-india" class="external-link"&gt;tech 2&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-china-post-aug-24-2012-india-threatens-action-against-twitter-for-ethnic-violence-rumors" class="external-link"&gt;China Post&lt;/a&gt; (August 25, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/article3812819.ece"&gt;The Hindu&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.livemint.com/2012/08/23210529/How-ISPs-block-websites-and-wh.html?atype=tp"&gt;LiveMint&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://globalvoicesonline.org/2012/08/24/india-strong-reactions-to-social-media-censorship/"&gt;Global Voices&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/in-reuters-com-david-lalmalsawma-aug-24-2012-indias-social-media-crackdown-reveals-clumsy-govt-machinery" class="external-link"&gt;Reuters&lt;/a&gt; (August 24, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/PZN75N"&gt;Outlook&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/epic-fail-how-india-compiled-its-banned-list-of-websites-427522.html"&gt;FirstPost.India&lt;/a&gt; (August 23, 2012) &lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://ibnlive.in.com/news/haphazard-censorship-leaked-list-of-blocked-sites/284592-11.html"&gt;IBN Live&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://newsclick.in/india/analysing-latest-list-blocked-sites-communalism-rioting-edition"&gt;News Click&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.medianama.com/2012/08/223-india-internet-blocks/"&gt;Medianama&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://kafila.org/2012/08/23/an-analysis-of-the-latest-round-of-internet-censorship-in-india-communalism-and-rioting-edition-pranesh-prakash/"&gt;KAFILA&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/www-ciol-com-aug-23-2012-blocked-websites" class="external-link"&gt;CIOL&lt;/a&gt; (August 23, 2012)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism'&gt;https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-09-06T11:52:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine">
    <title>Accessing pirated content might lead to prison term &amp; Rs 3-lakh fine</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine</link>
    <description>
        &lt;b&gt;India puts onus of downloading and viewing pirated content on individuals.

&lt;/b&gt;
        &lt;p align="justify"&gt;The article by Alnoor Peermohammed was published in the &lt;a href="http://www.business-standard.com/article/technology/accessing-pirated-content-might-lead-to-prison-term-rs-3-lakh-fine-116082201042_1.html"&gt;Business Standard&lt;/a&gt; on August 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr align="justify" size="2" width="100%" /&gt;
&lt;div align="justify"&gt;The central government is putting the onus of downloading and viewing  of copyrighted content from sites it has blocked (with the help of  internet service providers) on users.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;Visiting torrent (a particular type of files) websites while on Tata  Communications’ network recently had users being shown a message that  viewing or downloading content on those sites could land them in prison  for up to three years and a fine of up to Rs 3 lakh.&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;“There is not enough room in our prisons to keep these infringers and  enough time in our courts to try them. It might sound very exciting as a  message to put out but, essentially, they’re trying to scare people  into good behaviour,” said Sunil Abraham, executive director at research  firm Centre for Internet and Society.
&lt;div id="div-gpt-ad-1466593210966-0"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div align="justify"&gt;&lt;/div&gt;
&lt;div align="justify"&gt;There has been no change to the Copyright Act of 1957 or the  Information Technology Act of 2000 for the updated notice being shown to  users upon visiting blocked sites. Under these provisions, visiting a  site, which is blocked is not illegal, unless it is child pornography.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;“Copyright infringement happens all the time and even in developed  countries, the rates are very high. Crackdowns on individuals and  consumers are never going to solve the problem,” added Abraham.&lt;/div&gt;
&lt;div&gt;Experts say the most the government could do is prosecute a couple of  people and make examples of them, to dissuade others. This practice is  followed globally. There are no examples, though, in India of  prosecution for copyright infringement of online content.&lt;br /&gt; &lt;br /&gt;
&lt;div&gt;The recent alteration of the statement seen by users on Tata networks  was done on the directives of the Bombay High Court, after the company  appealed that showing individual messages for why each website was  blocked was not feasible. The resulting message sparked media frenzy  that visitors of blocked websites could now be imprisoned.&lt;/div&gt;
&lt;div&gt;Other media reports revealed that the recent blocking of websites by  internet service providers was prompted by court orders to prevent  piracy of &lt;i&gt;Dishoom&lt;/i&gt;, the Bollywood movie. &lt;br /&gt; &lt;br /&gt; &lt;span class="p-content"&gt;Globally, there’s been a move to clamp on  torrent websites which host pirated content, aided by large information  technology entities such as Apple or Facebook. Last month, the US  authorities arrested Kickass Torrents’ founder, Arten Vaulin, and  blocked all the domains of the website, only to have it resurface a day  later.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine'&gt;https://cis-india.org/internet-governance/news/business-standard-august-22-2016-accessing-pirated-content-might-lead-to-prison-term-and-rs-3-lakh-fine&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2016-08-23T02:47:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act">
    <title>A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicatory Officers under the IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act</link>
    <description>
        &lt;b&gt;Tribunals and quasi-judicial bodies are a regular feature of the Indian judicial system, as they provide for easier and less onerous methods for dispute resolution, especially disputes which relate to technical areas and often require technical knowledge and familiarity with specialised factual scenarios.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Further, quasi-judicial bodies do not have the same procedural restrictions as proper courts, which makes the adjudication of disputes easier. The Information Technology Act of India, which regulates several important aspects of electronic information, including the regulation of private electronic transactions as well as detailing civil and criminal offences relating to computers and electronic information, contemplates a specialised dispute resolution mechanism for disputes relating to the offences detailed under the Act. The Act provides for the establishment of quasi-judicial bodies, namely adjudicating officers under S.46, to hear disputes arising out of Chapter IX of the Act, namely, offences of a civil nature under S.43, 43A, 44 and 45 of the Act, as well as criminal offences described under Chapter XI of the Act. The adjudicating officer has the power to both award compensation as damages in a civil remedy, as well as impose penalties for the contravention of the Act,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and therefore has powers of both civil and criminal courts. The first appellate body provided in the Act, i.e. the authority that any party not satisfied by the decision of the adjudicating officer can appeal to, is the Cyber Appellate Tribunal, consisting of a Chairperson and any other members so prescribed by the Central Government.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;The second appeal, if a party is aggrieved by the decision of the Cyber Appellate Tribunal, may be filed before the High Court having jurisdiction, within 60 days from the date of communication of the order.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Functioning of the Offices of the State Adjudicating Officers and the Cyber Appellate Tribunal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The office of the adjudicating officer is established under S.46 of the IT Act, which provides that the person appointed to such a post must be a government officer of a rank not below that of a Director or an equivalent rank, and must have experience both in the field of Information Technology as well as legal or judicial experience.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In most cases, the appointed adjudicating officer is the Principle Secretary to the Department of Information Technology in the state.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; The decisions of these adjudicating officers determine the scope and meaning of several provisions of the IT Act, and are instrumental in the development of the law in this field and filling a lacuna regarding the interpretation of these important provisions, particularly in areas such as data protection and privacy.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;However, despite the large number of cyber-crime cases being registered across the country,&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;there is a lack of available judgements on the adjudication of disputes under Sections 43, 43A, 44 and 45 of the Act. Of all the states, only the websites of the Departments of Information Technology in Maharashtra,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, Tamil Nadu&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;, New Delhi&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;, and Haryana&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;have reported judgements or orders of the Adjudicating Officers.  The adjudicating officer in Maharasthra, Rajesh Aggarwal, has done a particularly commendable job, having disposed of 51 cases under the IT Act, with 20 cases still pending.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first Cyber Appellate Tribunal set up by the Central Government is located at New Delhi. Although a second branch of the Tribunal was to be set up in Bangalore, no efforts seem to have been made in this regard.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the position of the Chairperson of the Appellate Tribunal, has been left vacant since 2011, after the appointed Chairperson attained the age of superannuation and retired. Although judicial and technical members have been appointed at various points, the tribunal cannot hold hearings without a chairperson. A total of 17 judgements have been passed by the Cyber Appellate Tribunal prior to the retirement of the chairperson, while the backlog of cases is continuously growing.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;Despite a writ petition being filed before the Karnataka High Court and the secretary of the Department of IT coming on record to state that the Chairperson would be appointed within 6 months (of September 2013), no action seems to have been taken in this regard, and the lacunae in the judicial mechanism under the IT Act continues. The proper functioning of adjudicating officers and the Cyber Appellate Tribunal is particularly necessary for the functioning of a just judicial system in light of the provisions of the Act (namely, Section 61) which bar the jurisdiction of ordinary civil courts in claims below the amount of Rs. 5 Crores, where the adjudicating officer or the CAT is empowered.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Analysis of Cases Filed under Section 43A&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 43A of the Information Technology Act was inserted by the 2008 Amendment, and is the principle provision governing protection of information held by intermediaries under the Act. Section 43A provides that “body corporates” handling “sensitive personal data” must implement reasonable security practices for the protection of this information. If it is negligent in providing or maintaining such reasonable security practices, the body corporate is to be held liable and must pay compensation for the loss occurred.&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;Rule 3 of the Draft Reasonable Security Practices Rules, defines sensitive personal data as including – passwords, user details as provided at the time of registration or thereafter, information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users, physiological and mental health conditions, medical records and history, biometric information, information received by body corporate for processing, stored or processed under lawful contract or otherwise and call data records.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the decisions of appointed adjudicators are available for an analysis of Section 43A are from the adjudicating officer in Maharashtra, Mr. Rajesh Tandon, who despite having no judicial experience, has very cogent analysis and knowledge of legal issues involved in the cases, which is commendable for a quasi-judicial officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One class of cases, constituting a major chunk of the claims, is where the complainant is claiming against a bank for the fraudulent transfer of funds from the claimants account to another account. In most of these cases, the adjudicating officer examined the compliance of the bank with “Know Your Customer” norms and guidelines framed by the Reserve Bank of India for prevention of banking fraud and, where such compliance was found to be lacking and information which allowed the bank accounts of the complainant was allowed to be accessed by fraudsters, the presumption is that the bank was negligent in the handling of “sensitive personal information”,&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;by failing to provide for reasonable security practices and consequently was liable for compensation under S.43A, &lt;i&gt;notwithstanding &lt;/i&gt;that the complainant also contributed to compromising certain personal information by responding to phishing mails,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; or divulging information to other third parties.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;These instances clearly fall within the scope of Section 43A, which protects “information related to financial information such as Bank account/ credit card /debit card /other payment instrument details of the users” as sensitive personal data from negligent handling by body corporates. The decisions of the adjudicating officer must be applauded for placing a higher duty of care on banks to protect informational privacy of its customers, given that they are in a position where they ought to be well equipped to deal with intimate financial information and holding them accountable for lack of proper mechanisms to counter bank fraud using stolen information, which reflects in the compensation which the banks have been liable to pay, not only as indemnification for losses, but also punitive damages.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Nirmalkumar Bhagerwal v IDBI Bank and Meenal Bhagerwal, &lt;/i&gt;the sensitive financial information of the complainant, namely, the bank statement, had been accessed by the complainants wife. In holding the bank to be liable for divulging the same, and that access to personal information by a spouse is also covered under S.43A, the officer seems to have imputed the loss of privacy on account of such negligence as ‘wrongful loss’ which deserves compensation. One anomalous decision of the officer was where the operator of an ATM was held liable for fraudulent credit card transactions in that Machine, due to “reasonable security practices” such as security personnel or CCTV footage, and therefore causing the loss of “sensitive personal data”. However, it is difficult to see how ATM operators can be held liable for failing to protect sensitive information from being divulged, when the case is simply of a person fraudulently using a credit card.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another class of cases, generally linked with the above cases, is complaints against cell phone providers for divulging information through falsely procured Sim Cards. In such instances, the officer has held that by negligently allowing the issuance of duplicate sim cards, the phone company has &lt;i&gt;led to the access of sensitive personal data and thus caused wrongful loss to the complainant.&lt;/i&gt; This interpretation of Section 43A is somewhat confusing. The officer seems to have interpreted the provisions of Section 43A to include &lt;i&gt;carriers&lt;/i&gt; of the information which was originally sent through the computer resource of the banking companies. In this way, they are imputed the status of “handlers” of sensitive personal information, and their communications infrastructure through which the information is sent is the “computer resource” which it operates for the purpose of the Act. Therefore, through their negligence, they are &lt;i&gt;abetting &lt;/i&gt;the offence under 43A.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, in the case of &lt;i&gt;Sanjay Govind Dhandhe v ICICI and Vodafone, &lt;/i&gt;the officer remarked that –“&lt;i&gt;A SIM card is a veritable key to person’s sensitive financial and personal information. Realizing this, there are clear guidelines issued by the DOT regarding the issuance of SIM cards. The IT Act also intends to ensure that electronic personal and sensitive data is kept secured and reasonable measures are used to maintain its confidentiality and integrity. It is extremely crucial that Telecom companies actively follow strict security procedures while issuing SIM cards, especially in wake of the fact that mobiles are being increasingly used to undertake financial transactions. In many a case brought before me, financial frauds have been committed by fraudsters using the registered mobile numbers of the banks’ account holders.&lt;/i&gt;” Therefore, intermediaries such as telecom companies, which peripherally handle the data, are also liable under the same standards for ensuring its privacy. The adjudicating officer has also held telephone companies liable for itemized phone bills as Call Data Records negligently divulged by them, which again clearly falls under the scope of the Reasonable Security Practices Rules.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;Credentek v Insolutions (&lt;a href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf" target="_blank"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_Credentek_Vs_Insolutions-28012014.pdf&lt;/a&gt;) . This case&lt;/i&gt; holds  that banks and the National Payments Corporation of India were liable  under S. 43A for divulging information relating to transactions by their  customers to a software company which provides services to these banks  using the data, without first making them sign non-disclosure  agreements. The NCPI was fined a nominal amount of Rs. 10,000."&lt;/p&gt;
&lt;div&gt;
&lt;div class="h5"&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Section 46, Information Technology Act, 2000.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 48 and 49 of the Information Technology Act, 2000 (Amended as of 2008).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Section 62, IT Act. However, The High Court may extend this period if there was sufficient cause for the delay.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. S. 46(3), Information Technology Act, &lt;i&gt;“No person shall be appointed as an adjudicating officer unless he possesses such experience in the field of Information Technology and Legal or Judicial experience as may be prescribed by the Central Government.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. From whatever data is available, the adjudicating officers in the states of Maharashtra, New Delhi, Haryana, Tamil Nadu and Karnataka are all secretaries to the respective state departments relating to IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;See http://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/i&gt;; Also &lt;i&gt;see &lt;/i&gt;the decision of the Karnataka adjudicating officer which held that body corporates are not persons under S.43 of the IT Act, and thus cannot be liable for compensation or even criminal action for offences under that Section, &lt;i&gt;available at&lt;/i&gt; &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf"&gt;http://www.naavi.org/cl_editorial_13/adjudication_gpl_mnv.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Maharashtra Leads in War Against Cyber Crime&lt;/i&gt;, The Times of India, &lt;i&gt;available at &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms"&gt;http://timesofindia.indiatimes.com/city/mumbai/Maharashtra-leads-in-war-against-cyber-crime/articleshow/30579310.cms&lt;/a&gt;. &lt;/i&gt;(18&lt;sup&gt;th&lt;/sup&gt; February, 2014).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="https://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;https://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="http://www.tn.gov.in/documents/atoz/J"&gt;http://www.tn.gov.in/documents/atoz/J&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer"&gt;http://www.delhi.gov.in/wps/wcm/connect/DoIT_IT/doit_it/it+home/orders+of+adjudicating+officer&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. &lt;a class="external-link" href="http://haryanait.gov.in/cyber.htm"&gt;http://haryanait.gov.in/cyber.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;i&gt;Bangalore Likely to host southern chapter of Cyber Appellate Tribunal, &lt;/i&gt;The Hinduk &lt;a class="external-link" href="http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece"&gt;http://www.thehindu.com/news/national/karnataka/bangalore-is-likely-to-host-southern-chapter-of-cyber-appellate-tribunal/article3381091.ece&lt;/a&gt; (2&lt;sup&gt;nd&lt;/sup&gt; May, 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;a class="external-link" href="http://catindia.gov.in/Judgement.aspx"&gt;http://catindia.gov.in/Judgement.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Section 61 of the IT Act – ‘No court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which an adjudicating officer appointed under this Act or the Cyber Appellate Tribunal constituted under this Act is empowered by or under this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act. Provided that the court may exercise jurisdiction in cases where the claim for injury or damage suffered by any person exceeds the maximum amount which can be awarded under this Chapter.&lt;i&gt;’&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 43A, Information Technology Act, 2000&lt;i&gt; – ‘&lt;/i&gt;Compensation for failure to protect data (Inserted vide ITAA 2006) Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected. (Change vide ITAA 2008)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Explanation: For the purposes of this section (i) "body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities (ii) "reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorized access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. (iii) "sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Draft Reasonable Security Practices Rules under Section 43A of the IT Act, available at &lt;a class="external-link" href="http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf"&gt;http://www.huntonfiles.com/files/webupload/PrivacyLaw_Reasonable_Security_Practices_Sensitive_Personal_Information.pdf&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013.PDF&lt;/a&gt;. &lt;i&gt;Ram Techno Pack v State Bank of India&lt;/i&gt;, &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RamTechno_Vs_SBI-22022013.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Srinivas Signs v IDBI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SreenivasSigns_Vs_IDBI-18022014.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Pravin Parkhi v SBI Cards, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PravinParkhi_Vs_SBICardsPayment-30122013.PDF&lt;/a&gt;&lt;i&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. &lt;i&gt;Sourabh Jain v ICICI, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;amp;Idea-22022013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_SourabhJain_Vs_ICICI&amp;amp;Idea-22022013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. &lt;i&gt;Poona Automobiles v Punjab National Bank,&lt;/i&gt; &lt;a class="external-link" href="https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF"&gt;https://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_PoonaAuto_Vs_PNB-22022013.PDF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. &lt;i&gt;Amit Patwardhan v Bank of Baroda, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudicaton_AmitPatwardhan_Vs_BankOfBaroda-30122013.PDF&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. &lt;i&gt;Ravindra Gunale v Bank of Maharashtra,&lt;/i&gt; &lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;amp;Vodafone_20022013"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RavindraGunale_Vs_BoM&amp;amp;Vodafone_20022013&lt;/a&gt;; &lt;i&gt;Raju Dada Raut v ICICI Bank, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RajuDadaRaut_Vs_ICICIBank-13022013.pdf&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. &lt;i&gt;Rohit Maheshwari v Vodafone, &lt;/i&gt;&lt;a class="external-link" href="http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;amp;ors-04022014.PDF"&gt;http://it.maharashtra.gov.in/Site/Upload/ACT/DIT_Adjudication_RohitMaheshwari_Vs_Vodafone&amp;amp;ors-04022014.PDF&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act'&gt;https://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-03T05:43:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a">
    <title>66A DEAD. LONG LIVE 66A!</title>
    <link>https://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a</link>
    <description>
        &lt;b&gt;Last Tuesday, Twitter CEO Dick Costolo walked into Prime Minister Narendra Modi's office. India's most compulsive and most-followed tweeter, Modi, as Gujarat chief minister, had protested when the Manmohan Singh government blocked the micro-blogging site of a few journalists. Modi had blacked out his own Twitter profile and tweeted: “May God give good sense to everyone.”&lt;/b&gt;
        &lt;p&gt;The article by Soni Mishra was published in the &lt;a class="external-link" href="http://week.manoramaonline.com/cgi-bin/MMOnline.dll/portal/ep/theWeekContent.do?contentId=18627255&amp;amp;programId=1073755753&amp;amp;tabId=13&amp;amp;BV_ID=@@@&amp;amp;categoryId=-226161"&gt;Week&lt;/a&gt; on March 28, 2015. T. Vishnu Vardhan gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Today, with 11 million followers on Twitter, and 27.6 million likes on Facebook, Modi rules the virtual world and India. He received Costolo warmly and told him how Twitter could help his Clean India, girl child and yoga campaigns. Impressed, Costolo told Modi how Indian youth were innovating on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, the greatest and the most fundamental boost for all social media in India was being effected a few minutes drive away from the PMO. Ironically, in the Supreme Court of India, Modi's lawyers were defending a law made by the United Progressive Alliance government—section 66A of the Information Technology Act, which curbed free speech on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anything posted on the internet can go viral worldwide and reach millions in no time, argued Additional Solicitor General Tushar Mehta. While the traditional media is ruled by licences and checks, social media has nothing, he said. Finally, Mehta made an impassioned plea that the government meant well. Section 66A will be administered reasonably and will not be misused, he assured the court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It seemed he, and the government, had forgotten an old saying: if there is a bad law, someone will use it. Luckily for India, and its liberal democracy, the judges saw a bad law and struck it down. “If section 66A is otherwise invalid, it cannot be saved by an assurance from the learned additional solicitor general,” said the bench comprising Justice Rohinton Nariman and Justice J. Chelameswar.&lt;br /&gt;&lt;br /&gt;The fact is that 66A was knee-jerk legislation. Almost as thoughtless and compulsive as a netizen's derisive tweet. On December 22, 2008, the penultimate day of the winter session, the UPA government had got seven bills passed in seven minutes in the Lok Sabha; the opposition BJP had played along.&lt;br /&gt;&lt;br /&gt;One of the bills was to amend the IT Act. It went to the Rajya Sabha the next day, when members were hurrying to catch their trains and flights home for the year-end vacation. They just okayed the bill and hurried home.&lt;br /&gt;&lt;br /&gt;The argument then was that there was no need to discuss the bill as it had been examined by a standing committee of Parliament. Indeed, it had been. But, the committee, headed by Nikhil Kumar of the Congress, had met only for 23 hours and five minutes. Nine of its 31 members had not attended a single meeting. Ravi Shankar Prasad, the current Union minister for IT, was one among the 31.&lt;br /&gt;&lt;br /&gt;Apparently, everyone wanted the bill, so did not bother to apply their minds. Only a CPI(M) member, A. Vijayaraghavan, had a few dissenting suggestions to the committee report. No one else bothered to mull over a law that was “unconstitutional, vague” and which would have a “chilling effect” on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once the law was made, it was constable raj across India. Shaheen Dhada from Palghar simply commented on Facebook about a Shiv Sena bandh on the death of Bal Thackeray. Her friend Rinu Srinivasan liked it. The two teenagers were bundled into a police station. Rinu still remembers with a chill how “a mob of about 200 people gathered outside the police station that day.” This was when the Congress was ruling Maharashtra.&lt;br /&gt;&lt;br /&gt;Jadavpur University professor Ambikesh Mahapatra was picked up by the police in Trinamool Congress-ruled West Bengal in April 2012, for posting a cartoon ridiculing Chief Minister Mamata Banerjee. “I was thrashed several times in police custody,” said the professor, who got relief from the West Bengal Human Rights Commission.&lt;br /&gt;&lt;br /&gt;Vickey Khan, 22, was arrested in Rampur, UP, for a Facebook post on Samajwadi Party leader Azam Khan. Rampur is, of course, Khan's pocket borough. The Uttar Pradesh Police, controlled by the Samajwadi Party government, also arrested dalit writer Kanwal Bharti from Rampur for criticising the UP government's suspension of IAS officer Durga Shakti Nagpal in 2013.&lt;br /&gt;&lt;br /&gt;At least 30 people in AIADMK-ruled Chennai have been booked under 66A; four of them this year. Ravi Srinivasan, general secretary of the Aam Aadmi Party in Puducherry, was picked up in October 2012 for his tweets on Karti Chidambaram, son of then Union home minister P. Chidambaram. “He was not even in India when I tweeted,” said Ravi. “He sent the complaint by fax from abroad and everything happened [fast] as Puducherry is a Union Territory and can be controlled by the home ministry.”&lt;br /&gt;&lt;br /&gt;Whistleblower A. Shankar of Chennai was pulled up by the Madras High Court for the content on his blog, Savukku. The Orissa Police, controlled by the Biju Janata Dal (BJD) government, took Facebook to court in 2011 asking who created a Facebook page in the name of Chief Minister Naveen Patnaik. It is another thing that the page had no content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, there had been stray political voices opposing the law. In Parliament, the CPI(M)'s P. Rajeeve, the BJD's Jay Panda and independent MP Rajeev Chandrasekhar pushed several times for scrapping 66A. Panda moved a private members bill, and Rajeeve moved a resolution. “I only wish we in Parliament had heeded the people's voice and repealed it, instead of yet again letting the judiciary do our work for us,” Panda said after the law was scrapped.&lt;br /&gt;&lt;br /&gt;Finally, it was left to a young law student, Shreya Singhal, to move the Supreme Court on behalf of the Palghar girls. Singhal pointed out that several provisions in 66A violated fundamental rights guaranteed by article 19(1)(a)—the right to freedom of speech and expression. Several more cases followed and, finally, the court heard them together.&lt;br /&gt;&lt;br /&gt;Indeed, Justices Nariman and Chelameswar have been extremely restrained in their comments. But, the fact that Parliament had not applied its mind comes through in the judgment.&lt;br /&gt;&lt;br /&gt;The court “had raised serious concerns with the manner in which section 66A of the IT Act has been drafted and implemented across the country,” pointed out Supreme Court lawyer Shivshankar Panicker. Added Kiran Shanmugam, a cyber forensic expert and CEO of ECD Global Bengaluru: “The law lacked foresight in estimating the magnitude of the way the electronic media would grow.”&lt;br /&gt;&lt;br /&gt;Apparently the government, too, knew it was defending the indefensible, and tried to win the case highlighting the benign nature of the democratic state. But, the court was not impressed. “Governments may come and governments may go, but section 66A goes on forever,” the judges noted. “An assurance from the present government, even if carried out faithfully, would not bind any successor government.”&lt;br /&gt;&lt;br /&gt;Clearly, Mehta was defending the indefensible, a law that, the court found, would have a “chilling effect on free speech”. Moreover, as the judges found out, the new law did not provide even the safeguards that the older Criminal Procedure Code had provided. “Safeguards that are to be found in sections 95 and 96 of the CrPC are also absent when it comes to section 66A,” the judges said. For example, according to the CrPC, a book or document that contained objectionable matter could be seized by the police, but it also allowed the publisher to move court. The new law did not provide even such a cushion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All the same, the court was careful and did not overturn the entire law. It scrapped section 66A, and section 118(D) of the Kerala Police Act, but upheld section 69A and section 79 of the IT Act, which too had been questioned by the litigants (see box on page 45).&lt;br /&gt;&lt;br /&gt;The judgment has set the cyberworld rocking. “I am so happy now, I do not know how to express it,” said Rinu, now an audio-engineering student in Kerala. Shaheen is married and lives in Bengaluru. Vickey Khan is relieved. “Some people had told me that I could be jailed for three years,” he said. But, Azam Khan took it out on the media and said it “favours criminals”.&lt;br /&gt;&lt;br /&gt;Karti, who claims to be a votary of free speech, however, wants “some protection” against defamation. “I filed a complaint in an existing provision of law,” he said. “If that provision is not available, then I will have to seek other provisions to safeguard my reputation.”&lt;br /&gt;&lt;br /&gt;Mahapatra is still apprehensive. “The government will still try to harass me,” he said. “But I know that in the end I will win.” Shankar of Chennai called it “a huge relief for people like me, who are active on social media.” Ravi Srinivasan, who locked horns with Karti, said he felt “relieved and happy”.&lt;br /&gt;&lt;br /&gt;The hard rap on the knuckles for their legislative laxity has sobered the political class. The Congress, the progenitor of 66A, admitted that the vagueness of the law was its undoing. “If in a particular area, the local constabulary took action to stifle dissent, it was never the purpose of the act,” said Congress spokesperson Abhishek Manu Singhvi. The Modi government officially welcomed the judgment, and its spokespersons are blaming the UPA for the law.&lt;br /&gt;&lt;br /&gt;Apparently, the scrapped law was made after a series of grossly offensive posts appeared on the social media five years ago. “If such content is not blocked online, it would immediately lead to riots,” said a law ministry official, who said the posts had been shown to the court, too. He said the government would take some time to draft a new law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, is a new law required? Opinion is still divided. What if someone is defamed on the net? “There are defamation laws which can deal with these,” said T. Vishnuvardhan, programme director, Centre for Internet and Society, Bengaluru. “Also, the IT Act has various provisions. If somebody misuses your picture on social media, you can report it to the website immediately. The website is liable to take action on it within 36 hours.”&lt;br /&gt;&lt;br /&gt;Smarika Kumar of Bengaluru-based Alternative Law Forum said the scrapping of 66A does not mean one can post anything online. “The Supreme Court has said that speech can be censored when it falls under the restrictions provided under article 19(2) of the Constitution,” she said. “But, if you prevent speech on any other ground, it is going to be unconstitutional.”&lt;br /&gt;&lt;br /&gt;But, even critics of 66A think a replacement law is needed. Said Rajeev Chandrasekhar: “The government needs to act quickly and create a much more contemporaneous Act, via multi-stakeholder consultations, general consensus and collaboration, so that there is less ambiguity and freedom of expression is preserved.”&lt;br /&gt;&lt;br /&gt;Senior Supreme Court advocate Pravin H. Parekh said, “As the cyberworld is growing day by day and there is increase in the number of social media users, we do require a proper mechanism which can regulate the expression of views on the internet.”&lt;br /&gt;&lt;br /&gt;The government is putting forth the argument of national security. “If the security establishment says the present act is not sufficient, we will look into it. The government will consider it, but only with adequate safeguards,” said Ravi Shankar Prasad.&lt;br /&gt;&lt;br /&gt;That will call for a legislative process undertaken in a cool and calm house, and not hurried through when the members are ready to hurry home.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="contentEng" id="textId"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sound judgment&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Thumbs down&lt;/b&gt;&lt;br /&gt;The Supreme Court set aside section &lt;b&gt;66A of the IT act,&lt;/b&gt; which says any person who sends offensive, menacing or false  information to cause annoyance, inconvenience, danger, obstruction,  insult, injury, criminal intimidation, enmity, hatred or ill will, or  uses email to trouble its recipient or deceive him/her about the origin  of such messages, can be punished with a jail term up to three years and  a fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court also struck down section &lt;b&gt;118(d) of the Kerala Police Act,&lt;/b&gt; which says any person who makes indecent comments by calls, mails,  messages or any such means causing grave violation of public order or  danger can be punished with imprisonment up to three years or a fine not  exceeding Rs10,000, or  both.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Thumbs up&lt;br /&gt;&lt;/b&gt;The Supreme Court upheld section &lt;b&gt;69A of the IT act,&lt;/b&gt; which allows the government to block the public's access to information  in national interest and penalise intermediaries [telecom or internet  service providers and web hosting services] who fail to comply with the  government's directives.&lt;/p&gt;
&lt;p&gt;Section &lt;b&gt;79 of the IT Act,&lt;/b&gt; which deals with intermediaries' exemption from liability in certain cases, too, was upheld.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;With R. Prasanan, Mini P. Thoma, Ajay Uprety, Lakshmi Subramanian, Rabi Banerjee and Sharmista Chaudhury&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a'&gt;https://cis-india.org/internet-governance/news/the-week-march-28-2015-soni-mishra-66a-dead-long-live-66a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-01T02:11:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job">
    <title>66A ‘cut &amp; paste job’</title>
    <link>https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job</link>
    <description>
        &lt;b&gt;The controversial Section 66A of the Information Technology Act has borrowed words out of context from British and American laws, according to lawyers here who are calling it a “poor cut-and-paste job”.&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;GS Mudur's article was &lt;a class="external-link" href="http://www.telegraphindia.com/1121203/jsp/frontpage/story_16268138.jsp#.UMbCXaxWGZR"&gt;published in the Telegraph&lt;/a&gt; on December 3, 2012. Pranesh Prakash and Snehashish Ghosh are quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Section 66A, passed by Parliament in December 2008, draws on laws passed in the UK in 1988 and 2003 and the US in 1996. But some lawyers say that, unlike 66A, those foreign laws impose only reasonable restrictions on freedom of speech.&lt;br /&gt;&lt;br /&gt;"The text of 66A seems to be the result of a cut-and-paste job done without applying the mind," said Snehashish Ghosh, a lawyer with the Centre for Internet and Society (CIS), a non-government organisation in Bangalore.&lt;br /&gt;&lt;br /&gt;Some of the language in Section 66A is taken from Britain’s Malicious Communications Act (MCA) of 1988, which begins with the words: "Any person who sends to another person...."&lt;br /&gt;&lt;br /&gt;This provision in MCA 1988, Ghosh said, is intended to curb malicious messages from one person to another. "It does not cover a post on a social website or an electronic communication broadcast to the world."&lt;br /&gt;&lt;br /&gt;Section 66A has also borrowed words from Britain’s Communications Act of 2003 which, Ghosh said, is intended to prevent abuse of public communication services and does not directly deal with messages sent by individuals.&lt;br /&gt;&lt;br /&gt;Government officials have said that 66A has also plucked language from the US Telecommunications Act of 1996.&lt;br /&gt;&lt;br /&gt;This was a landmark legislation that overhauled America’s telecommunication law by taking into account the emergence of the Internet and changing communications technologies. Among other things, it made illegal the transmission of obscene or indecent material to minors via computers.&lt;br /&gt;&lt;br /&gt;"Section 66A in its current form fails to define a specific category (context) as defined in the laws from where it has borrowed words," Ghosh said. "This is what has led to its inconsistent and arbitrary applications."&lt;br /&gt;&lt;br /&gt;Ghosh and his colleagues say that 66A, through an "absurd" combination of borrowed and ambiguous language, curbs freedom of expression and threatens people with three years’ imprisonment for certain offences that would otherwise, under existing Indian Penal Code (IPC) provisions, draw a fine of only Rs 200.&lt;br /&gt;&lt;br /&gt;Section 66A(b), for example, clubs together the offences of persistently repeated communications that might lead to "annoyance", "inconvenience", "danger", "insult", "injury", "criminal intimidation", "enmity", "hatred", and "ill-will".&lt;br /&gt;&lt;br /&gt;This is "astounding and unparalleled", said Pranesh Prakash, policy director at the CIS, who has posted an analysis of Section 66A on the NGO’s institutional blog.&lt;br /&gt;&lt;br /&gt;"We do not have such a provision anywhere but in India’s information technology law."&lt;br /&gt;&lt;br /&gt;This is “akin to... providing equal punishment for calling someone a moron (insult) and threatening to kill someone (criminal intimidation),” Prakash wrote in the blog, where he has listed existing IPC provisions that can deal with the offences that 66A seeks to cover.&lt;br /&gt;&lt;br /&gt;Lawyers have also questioned 66A’s effect of criminalising what the existing IPC would label as civil offences. For example, Prakash said, while the punishment under IPC for criminal nuisance is Rs 200, the penalty imposed by 66A is jail for up to three years.&lt;br /&gt;&lt;br /&gt;Several sections in the IPC, they said, can effectively address offences that 66A attempts to address exclusively for electronic communications. For example, the IPC has sections for defamation (499 and 500), outraging religious sentiments (295) and obscenity (292).&lt;br /&gt;&lt;br /&gt;"We do not require extraordinary laws when existing laws suffice," Ghosh said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job'&gt;https://cis-india.org/news/telegraphindia-december-3-2012-gs-mudur-66a-cut-and-paste-job&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-11T05:43:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried">
    <title>"All Indian Enterprises should Be Very Worried": Centre for Internet and Society</title>
    <link>https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried</link>
    <description>
        &lt;b&gt;The DoT’s CERT team has successfully censored more than 70 URLs that didn’t particularly contain praises of IIPM. Amusingly, a URL containing a public notice issued by the University Grants Commission (UGC) in July 2012 was also blocked. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Shubhra Rishi was&lt;a class="external-link" href="http://www.computerworld.in/feature/%E2%80%9Call-indian-enterprises-should-be-very-worried%E2%80%9D-centre-internet-and-society-75742013"&gt; published&lt;/a&gt; in Computer World on February 25, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The chairman of the Indian Institute of Planning and Management (IIPM) is having a Barbara Streisand moment.&lt;br /&gt;&lt;br /&gt;The American entertainer Barbra Streisand, in 2003, attempted to suppress photographs of her residence, involuntarily and indirectly fuelling further publicity. Arindam Chaudhuri’s order from a Gwalior Court has unfortunately resulted in more or less the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DoT’s CERT team has successfully censored more than 70 URLs that didn’t particularly contain praises of IIPM. Amusingly, a URL containing a public notice issued by the University Grants Commission (UGC) in July 2012 was also blocked. The UGC notice said that IIPM cannot be recognized as a university according to the provisions of a particular section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while this issue has managed to hold our attention, it has also fervently highlighted the misappropriation of section 69 of India’s Information Technology (IT) Act 2000. According to this act, if the Director of Controller is satisfied that it is necessary or expedient so, he/she may order or direct any agency of the Government to intercept any information transmitted through any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, intercepting or blocking is counter-productive in today’s scenario and is often seen as a direct infringement of people’s online freedom. “The Constitution of India does not put so many restrictions on the freedom of speech and expression that IT Act puts under a particular section,” says cyber law expert, Pavan Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal experts are also of the opinion that several provisions of the IT Act are unconstitutional. “It does not have built-in safeguards, especially transparency-related ones, around surveillance and censorship. Censorship in India, especially under the IT (Intermediary Guidelines) Rules 2011, is completely opaque and results in invisible censorship, meaning that we don't even get to find out that censorship has happened and thus cannot challenge it,” says Pranesh Prakash, policy director, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;In the past, independent activists such as Binayak Sen, Assem Trivedi, and Arundhati Roy, or even commoners such as Shaheen Dhadha have come under fire of the said Act.&lt;br /&gt;&lt;br /&gt;Frankly, if this loophole in the IT Act is not addressed, even Indian corporations could face a similar problem.&lt;br /&gt;&lt;br /&gt;“I believe all intermediaries (websites that host user content, and networks that carry user traffic among others) are threatened now. Their executives can be dragged to court without any protection; thanks to the broad wording of the IT (Intermediary Guidelines) Rules 2011, despite the IT Act itself granting them some protections. This is dangerous, and all Indian enterprises should be very worried,” says Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CorporateIndiawill have to tighten its belts. Despite the fact that the entire IT Act needs to be overhauled and employees need to be sensitized, currently, the first thing that corporate India needs to do is ensure that its operations in electronic format comply with the IT Act and its rules. “There's a lack of awareness about compliances in the corporate sector. Any kind of “jugaad” may not help a company get out of a potential exposure under the IT Act. An effective implementation of these compliances will relieve companies of the IT Act’s potential liabilities, both civil and criminal,” advises Duggal.&lt;br /&gt;&lt;br /&gt;So the Streisand effect in the IIPM case will slowly wear off, but the potential threat of the IT Act will continue to haunt enterprises.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried'&gt;https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-28T09:21:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
