<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/malaymail-online-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/order-2011-12-20-mufti-aijaz-arshad-qasmi-v-facebook-and-ors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/draconian-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/chairman-and-members-of-crac"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/killing-the-internet-oped"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/malaymail-online-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-the-internet">
    <title>Noose tightens on freedom of speech on the Internet </title>
    <link>https://cis-india.org/internet-governance/news/malaymail-online-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-the-internet</link>
    <description>
        &lt;b&gt;A worrying trend has emerged in the last few years, where intermediaries around the world are being used as chokepoints to restrict freedom of expression online, and to hold users accountable for content. &lt;/b&gt;
        &lt;div id="stcpDiv" style="text-align: justify; "&gt;
&lt;p&gt;The blog post by Gabey Goh was originally published by &lt;a class="external-link" href="https://www.digitalnewsasia.com/digital-economy/the-noose-tightens-on-freedom-of-speech-on-the-internet"&gt;Digital News Asia&lt;/a&gt; and mirrored in &lt;a class="external-link" href="http://www.themalaymailonline.com/tech-gadgets/article/noose-tightens-on-freedom-of-speech-on-the-internet"&gt;Malaymail Online&lt;/a&gt; on March 26, 2015. Jyoti Panday gave her inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;“All  communication across the Internet is facilitated by intermediaries:  Service providers, social networks, search engines, and more,” said  Electronic Frontier Foundation (EFF) senior global policy analyst Jeremy  Malcolm.&lt;/p&gt;
&lt;p&gt;“These services are all routinely asked to take down content, and their  policies for responding are often muddled, heavy-handed, or  inconsistent.&lt;/p&gt;
&lt;p&gt;“That results in censorship and the limiting of people’s rights,” he told &lt;i&gt;Digital News Asia&lt;/i&gt; (&lt;i&gt;DNA&lt;/i&gt;) on the sidelines of RightsCon, an Internet and human rights conference hosted in Manila from March 24-25.&lt;/p&gt;
&lt;p&gt;This year, the government of France is moving to implement regulation  that makes Internet operators “accomplices” of hate-speech offences if  they host extremist messages.&lt;/p&gt;
&lt;p&gt;In February, the Motion Picture Association of America (MPAA) and the  Recording Industry Association of America (RIAA) urged ICANN (the  Internet Corporation for Assigned Names and Numbers) to ensure that  domain name registries and registrars “investigate copyright abuse  complaints and respond appropriately.”&lt;/p&gt;
&lt;p&gt;Closer to home, the Malaysian Government passed a controversial  amendment to the Evidence Act 1950 – Section 114A – back in 2012.&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p&gt;Under  Section 114A, an Internet user is deemed the publisher of any online  content unless proven otherwise. The new legislation also makes  individuals and those who administer, operate or provide spaces for  online community forums, blogging and hosting services, liable for  content published through their services.&lt;/p&gt;
&lt;p&gt;Due to the potential negative impact on freedom of expression, a  roadmap called the Manila Principles on Internet Liability was launched  during RightsCon.&lt;/p&gt;
&lt;p&gt;The EFF, Centre for Internet Society India, Article 19, and other  global partners unveiled the principles, whose framework outlines clear,  fair requirements for content removal requests and details how to  minimise the damage a takedown can do.&lt;/p&gt;
&lt;p&gt;For example, if content is restricted because it’s unlawful in one  country or region, then the scope of the restriction should be  geographically limited as well.&lt;/p&gt;
&lt;p&gt;The principles also urge adoption of laws shielding intermediaries from  liability for third-party content, which encourages the creation of  platforms that allow for online discussion and debate about  controversial issues.&lt;/p&gt;
&lt;p&gt;“Our goal is to protect everyone’s freedom of expression with a  framework of safeguards and best practices for responding to requests  for content removal,” said Malcolm.&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p&gt;Jyoti  Panday from the Centre for Internet and Society India noted that people  ask for expression to be removed from the Internet for various reasons,  good and bad, claiming the authority of myriad local and national laws.&lt;/p&gt;
&lt;p&gt;“It’s easy for important, lawful content to get caught in the  crossfire. We hope these principles empower everyone – from governments  and intermediaries, to the public – to fight back when online expression  is censored,” she said.&lt;/p&gt;
&lt;p&gt;The Manila Principles can be summarised in six key points:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Intermediaries should be shielded by law from liability for third-party content&lt;/li&gt;
&lt;li&gt;Content must not be required to be restricted without an order by a judicial authority&lt;/li&gt;
&lt;li&gt;Requests for restrictions of content must be clear, be unambiguous, and follow due process&lt;/li&gt;
&lt;li&gt;Laws and content restriction orders and practices must comply with the tests of necessity and proportionality&lt;/li&gt;
&lt;li&gt;Laws and content restriction policies and practices must respect due process&lt;/li&gt;
&lt;li&gt;Transparency and accountability must be built in to laws and content restriction policies and practices&lt;/li&gt;
&lt;/ul&gt;
&lt;div id="stcpDiv"&gt;
&lt;p&gt;“Right  now, different countries have differing levels of protection when it  comes to intermediary liability, and we’re saying that there should be  expansive protection across all content,” said Malcolm.&lt;/p&gt;
&lt;p&gt;“In addition, there is no logic in distinguishing between intellectual  property (IP) and other forms of content as in the case in the United  States for example, where under Section 230 of the Communications  Decency Act, intermediaries are not liable for third party content but  that doesn’t apply to IP,” he added.&lt;/p&gt;
&lt;p&gt;The Manila Principles have two main targets: Governments and  intermediaries themselves. The coalition, led by EFF, will be  approaching governments to present the document and discuss the  recommendations on how best to establish an intermediary liability  regime.&lt;/p&gt;
&lt;p&gt;This includes immunising intermediaries from liability and requiring a court order before any content can be taken down.&lt;/p&gt;
&lt;p&gt;With intermediaries, the list includes companies such as Facebook,  Twitter and Google, to discuss establishing transparency, responsibility  and accountability in any actions taken.&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p&gt;“We  recognise that a lot of the time, intermediaries are not waiting for a  court order before taking down content, and we’re telling them to avoid  removing content unless there is a sufficiently good reason and users  have been notified and presented that reason,” said Malcolm.&lt;/p&gt;
&lt;p&gt;The overall aim with the Manila Principles is to influence policy changes for the better.&lt;/p&gt;
&lt;p&gt;Malcolm pointed out that by coincidence, some encouraging developments  have taken place in India. On the same day the principles were released,  the Indian Supreme Court struck down the notorious Section 66A of the  country’s Information Technology Act.&lt;/p&gt;
&lt;p&gt;Since 2009, the law had allowed both criminal charges against users and  the removal of content by intermediaries based on vague allegations  that the content was “grossly offensive or has menacing character,” or  that false information was posted “for the purpose of causing annoyance,  inconvenience, danger, obstruction, insult, injury, criminal  intimidation, enmity, hatred or ill will.”&lt;/p&gt;
&lt;p&gt;Calling it a “landmark decision,” Malcolm noted that the case shows why  the establishment and promotion of the Manila Principles are important.&lt;/p&gt;
&lt;div id="stcpDiv"&gt;
&lt;p&gt;“Not  only is the potential overreach of this provision obvious on its face,  but it was, in practice, misused to quell legitimate discussion online,  including in the case of the plaintiffs in that case – two young women,  one of whom made an innocuous Facebook post mildly critical of  government officials, and the other who ‘liked’ it,” he said.&lt;/p&gt;
&lt;p&gt;The court however, upheld section 69A of the Act, which allows the  Government to block online content; and Section 79(3), which makes  intermediaries such as YouTube or Facebook liable for not complying with  government orders for censorship of content. — Digital News Asia&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/malaymail-online-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-the-internet'&gt;https://cis-india.org/internet-governance/news/malaymail-online-gabey-goh-march-26-2015-noose-tightens-on-freedom-of-speech-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-27T01:01:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society">
    <title>No Civil Society Members in the Cyber Regulations Advisory Committee</title>
    <link>https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society</link>
    <description>
        &lt;b&gt;The Government of India has taken our advice and reconstituted the Cyber Regulations Advisory Commitee. But there is no representation of Internet users, citizens, and consumers — only government and industry interests.&lt;/b&gt;
        &lt;p&gt;In multiple op-eds (&lt;a href="http://cis-india.org/internet-governance/blog/india-broken-internet-law-multistakeholderism"&gt;Indian Express&lt;/a&gt; and &lt;a href="http://cis-india.org/internet-governance/blog/livemint-opinion-november-28-2012-pranesh-prakash-fixing-indias-anarchic-it-act"&gt;Mint&lt;/a&gt;), I have pointed out the need for the government to reconstitute the &amp;quot;Cyber Regulations Advisory Committee&amp;quot; (CRAC) under section 88 of the Information Technology Act. That it be reconstituted along the model of the Brazilian Internet Steering Committee was also &lt;a href="http://docs.google.com/viewer?url=www.iigc.in%2Fhtm%2F2.pdf"&gt;part of the suggestions that CIS sent to the government&lt;/a&gt; after a &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-newdelhi/government-to-hold-talks-with-stakeholders-on-internet-censorship/article3860393.ece"&gt;meeting FICCI had convened along with the government on September 4, 2012&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Section 88 requires that people &amp;quot;representing the interests principally affected&amp;quot; by Internet policy or &amp;quot;having special knowledge of the subject matter&amp;quot; be present in this advisory body. The main function of the CRAC is to advise the the Central Government &amp;quot;either generally as regards any rules or for any other purpose connected with this Act&amp;quot;.&lt;/p&gt;
&lt;p&gt;Despite this important function, the CRAC had &amp;mdash; till November 2012 &amp;mdash; only ever met twice, &lt;a href="http://cis-india.org/internet-governance/resources/deity-response-to-rti-on-decisions-of-crac"&gt;both times in 2001&lt;/a&gt;. The response to an RTI informed us that the body had never provided any advice to the government.&lt;/p&gt;
&lt;h2 id="government-not-serious"&gt;Government Not Serious&lt;/h2&gt;
&lt;p&gt;The increasing pressure on the government for botching up Internet regulations has led it to reconstitute the CRAC. However, the list of members of the committee shows that the government is not serious about this committee representing &amp;quot;the interests primarily affected&amp;quot; by Internet policy.&lt;/p&gt;
&lt;p&gt;Importantly, this goes against the express wish of the Shri Kapil Sibal, the Union Minister for Communications and IT, who has repeatedly stated that he believes that Internet-related policymaking should be an inclusive process. Most recently, at the 2012 Internet Governance Forum he stated that we need systems that are:&lt;/p&gt;
&lt;blockquote&gt;
&amp;quot;collaborative, consultative, inclusive and consensual, for dealing with all public policies involving the Internet&amp;quot;
&lt;/blockquote&gt;

&lt;p&gt;Interestingly, despite the Hon'ble Minster verbally inviting civil society organizations (on November 23, 2012) for a meeting of the CRAC that happened on November 25, 2012, the Department of Electronics and Information Technology refused to send us invitations for the meeting.  This hints at a disconnect between the political and bureaucratic wings of the government, at least at some levels.&lt;/p&gt;
&lt;p&gt;Interestingly, this isn't the first time this has been pointed out. Na. Vijayashankar was levelling similar criticisms against the CRAC &lt;a href="http://www.naavi.org/cl_editorial/edit_18aug00_1.html"&gt;way back in August 2000&lt;/a&gt; when the original CRAC was constituted.&lt;/p&gt;
&lt;h2 id="breakdown-by-stakeholder-groupings"&gt;Breakdown by Stakeholder Groupings&lt;/h2&gt;
&lt;p&gt;While there is no one universal division of stakeholders in Internet governance, but four goups are widely recognized: governments (national and intergovernmental), industry, technical community, and civil society. Using that division, we get:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Government - 15 out of 22 members&lt;/li&gt;
&lt;li&gt;Industry bodies - 6 out of 22 members&lt;/li&gt;
&lt;li&gt;Technical community / Academia - 1 out of 22 members&lt;/li&gt;
&lt;li&gt;Civil society - 0 out of 22 members.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="list-of-members-of-cyber-regulatory-advisory-committee"&gt;List of Members of Cyber Regulatory Advisory Committee&lt;/h2&gt;
&lt;p&gt;The official notification &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/gazzate(1).pdf"&gt;(G.S.R. 827(E)) is available on the DEIT website&lt;/a&gt; and came into force on November 16, 2012.&lt;/p&gt;
&lt;p&gt;(Note: Names with &lt;del&gt;strikethroughs&lt;/del&gt; have been removed from the CRAC since 2000, and those with &lt;i&gt;emphasis&lt;/i&gt; have been added.)&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Minister, Ministry of Communication and Information Technology - Chairman&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Minister of State, Ministry of Communications and Information Technology - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Communication and Information Technology, Department of Electronics and Information Technology - Member&lt;/li&gt;
&lt;li&gt;Secretary, Department of Telecommunications - Member &lt;br /&gt;&lt;del&gt;Finance Secretary - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Legislative Department - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Secretary, Department of Legal Affairs - Member&lt;/i&gt; &lt;br /&gt;&lt;del&gt;Shri T.K. Vishwanathan, Presently Member Secretary, Law Commission - Member&lt;/del&gt;&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Commerce - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Home Affairs - Member&lt;/li&gt;
&lt;li&gt;Secretary, Ministry of Defence - Member&lt;/li&gt;
&lt;li&gt;Deputy Governor, Reserve Bank of India - Member&lt;/li&gt;
&lt;li&gt;Information Technology Secretary from the states by rotation - Member&lt;/li&gt;
&lt;li&gt;Director, IIT by rotation from the IITs - Member&lt;/li&gt;
&lt;li&gt;Director General of Police from the States by rotation - Member&lt;/li&gt;
&lt;li&gt;President, NASSCOM - Member&lt;/li&gt;
&lt;li&gt;President, Internet Service Provider Association - Member&lt;/li&gt;
&lt;li&gt;Director, Central Bureau of Investigation - Member&lt;/li&gt;
&lt;li&gt;Controller of Certifying Authority - Member&lt;/li&gt;
&lt;li&gt;Representative of CII - Member&lt;/li&gt;
&lt;li&gt;Representative of FICCI - Member&lt;/li&gt;
&lt;li&gt;Representative of ASSOCHAM - Member&lt;/li&gt;
&lt;li&gt;&lt;i&gt;President, Computer Society of India - Member&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Group Coordinator, Department of Electronic and Information Technology - Member Secretary&lt;/li&gt;
&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society'&gt;https://cis-india.org/internet-governance/blog/cyber-regulations-advisory-committee-no-civil-society&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2013-01-09T17:56:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines">
    <title>NHA Data Sharing Guidelines – Yet Another Policy in the Absence of a Data Protection Act</title>
    <link>https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines</link>
    <description>
        &lt;b&gt;In July this year, the National Health Authority (NHA) released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) just two months after publishing the draft Health Data Management Policy.&lt;/b&gt;
        &lt;p&gt;Reviewed and edited by Anubha Sinha&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Launched in 2018, PM-JAY is a public health insurance scheme set to cover 10 crore poor and vulnerable families across the country for secondary and tertiary care hospitalisation. Eligible candidates can use the scheme to avail of cashless benefits at any public/private hospital falling under this scheme. Considering the scale and sensitivity of the data, the creation of a well-thought-out data-sharing document is a much-needed step. However, the document – though only a draft – has certain portions that need to be reconsidered, including parts that are not aligned with other healthcare policy documents. In addition, the guidelines should be able to work in tandem with the Personal Data Protection Act whenever it comes into force. With no prior intimation of the publication of the guidelines, and the provision of a mere 10 days for consultation, there was very little scope for stakeholders to submit their comments and participate in the consultation. While the guidelines pertain to the PM-JAY scheme, it is an important document to understand the government’s concerns and stance on the sharing of health data, especially by insurance companies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Definitions: Ambiguous and incompatible with similar policy documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft guidelines add to the list of health data–related policies that have been published since the beginning of the pandemic. These include three draft health data management policies published within two years, which have already covered the sharing and management of health data. The draft guidelines repeat the pattern of earlier policies on health data, wherein there is no reference to the policies that predated it; in this case, the guidelines fail to refer to the draft National Digital Health Data Management Policy (published in April 2022). To add to this, the document – by placing the definitions at the end – is difficult to read and understand, especially when terms such as ‘beneficiary’, ‘data principal’, and ‘individual’ are used interchangeably. In the same vein, the document uses the terms ‘data principal’ and ‘data fiduciary’, and the definitions of health data and personal data, from the 2019 PDP Bill, while also referring to the IT Act SDPI Rules and its definition of ‘sensitive personal data’. While the guidelines state that the IT Act and Rules will be the legislation to refer to for these guidelines, it is to be noted that the IT Act under the SPDI Rules covers ‘body corporates’, which under Section 43A(1), is defined as “any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;”. It is difficult to add responsibility and accountability to the organisations under the guidelines when they might not even be covered under this definition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With each new policy, civil society organisations have been pointing out the need to have a data protection act before introducing policies and guidelines that deal with the processing and sharing of the data of individuals. Ideally, these policies – even in draft form – should have been published after the Personal Data Protection Bill was enacted, to ensure consistency with the provisions of the law. For example, the guidelines introduce a new category of governance mechanisms under the data-sharing committee headed by a data-sharing officer (DSO). The responsibilities and powers of the DSO are similar to that of the data protection officer under the draft PDP Bill as well as the National Data Health Management Policy (NHDMP). This, in turn, raises the question of whether the DSO and the DPOs under both the PDP Bill and the draft NDMP will have the same responsibilities. Clarity in terms of which of the policies are in force and how they intersect is needed to ensure a smooth implementation. Ideally, having multiple sources of definitions should be addressed at the drafting stage itself.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Guiding Principles: Need to look beyond privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The guidelines enumerate certain principles to govern the use, collection, processing, and transmission of the personal or sensitive personal data of beneficiaries. These principles are accountability, privacy by design, choice and consent, openness/transparency, etc. While these provisions are much needed, their explanation at times misses the mark of why these principles were added. For example, in the case of accountability, the guidelines state that the ‘data fiduciary’ shall be accountable for complying with measures based on the guiding principles However, it does not specify who the fiduciaries would be accountable to and what the steps are to ensure accountability. Similarly, in the case of openness and transparency, the guidelines state that the policies and practices relating to the management of personal data will be available to all stakeholders. However, openness and transparency need to go beyond policies and practices and should consider other aspects of openness, including open data and the use of open-source software and open standards. This again will add to transparency, in that it would specify the rights of the data principal, as the current draft looks at the rights of the data principal merely from a privacy perspective. In the case of purpose limitation as well, the guidelines are tied to the privacy notice, which again puts the burden on the individual (in this case, beneficiary) when the onus should actually be on the data fiduciary. Lastly, under the empowerment of beneficiaries, the guidelines state that the “data principal shall be able to seek correction, amendments, or deletion of such data where it is inaccurate;”. The right to deletion should not be conditional on inaccuracy, especially when entering the scheme is optional and consent-based.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data sharing with third parties without adequate safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The guidelines outline certain cases where personal data can be collected, used, or disclosed without the consent of the individual. One of these cases is when the data is anonymised. However, the guidelines do not detail how this anonymisation would be achieved and ensured through the life cycle of the data, especially when the clause states that the data will also be collected without consent. The guidelines also state that the anonymised data could be used for public health management, clinical research, or academic research. The guidelines should have limited the scope of academic research or added certain criteria to gain access to the data; the use of vague terminology could lead to this data (sometimes collected without consent) being de-anonymised or used for studies that could cause harm to the data principal or even a particular community. The guidelines state that the data can be shared as ‘protected health information’ with a government agency for oversight activities authorised by law, epidemic control, or in response to court orders. With the sharing of data, care should be taken to ensure data minimisation and purpose limitations that go beyond the explanations added in the body of the guidelines. In addition, the guidelines also introduce the concept of a ‘clean room’, which is defined as “a secure sandboxed area with access controls, where aggregated and anonymised or de-identified data may be shared for the purposes of developing inference or training models”. The definition does not state who will be developing these training models; it could be a cause of worry if AI companies or even insurance companies have the potential to use this data to train models that could eventually make decisions based on the results. The term ‘sandbox’ is explained under the now revoked DP Bill 2021 as “such live testing of new products or services in a controlled or test regulatory environment for which the Authority may or may not permit certain regulatory relaxations for a&lt;br /&gt;specified period for the limited purpose of the testing”. Neither the 2019 Bill nor the IT Act/Rules defines ‘sandbox’; the guidelines should have ideally spent more time explaining how the sandbox system in the ‘Clean Room’ works.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The draft Data Sharing Guidelines are a welcome step in ensuring that the entities sharing and processing data have guidelines to adhere to, especially since the Data Protection Bill has not been passed yet. The mention of the best practices for data sharing in annexures, including practices for people who have access to the data, is a step in the right direction, which could be made better with regular training and sensitisation. While the guidelines are a good starting point, they still suffer from the issues that have been highlighted in similar health data policies, including not referring to older policies, adding new entities, and the reliance on digital and mobile technology. The guidelines could have added more nuance to the consent and privacy by design sections to ensure other forms of notice, e.g., notice in audio form in different Indian languages. While PM-JAY aims to reach 10 crore poor and vulnerable families, there is a need to look at how to ensure that consent is given according to the guidelines that are “free, informed, clear, and specific”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines'&gt;https://cis-india.org/internet-governance/blog/nha-data-sharing-guidelines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-09-29T15:17:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad">
    <title>New intermediary guidelines: The good and the bad </title>
    <link>https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad</link>
    <description>
        &lt;b&gt;In pursuance of the government releasing the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021, this blogpost offers a quick rundown of some of the changes brought about the Rules, and how they line up with existing principles of best practices in content moderation, among others. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This article originally appeared in the Down to Earth &lt;a class="external-link" href="https://www.downtoearth.org.in/blog/governance/new-intermediary-guidelines-the-good-and-the-bad-75693"&gt;magazine&lt;/a&gt;. Reposted with permission.&lt;/p&gt;
&lt;p&gt;-------&lt;/p&gt;
&lt;p&gt;The Government of India notified the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021. The operation of these rules would be in supersession of the existing intermediary liability rules under the Information Technology (IT) Act, made back in 2011.&lt;/p&gt;
&lt;p&gt;These IL rules would have a significant impact on our relationships with internet ‘intermediaries’, i.e. gatekeepers and getaways to the internet, including social media platforms, communication and messaging channels.&lt;/p&gt;
&lt;p&gt;The rules also make a bid to include entities that have not traditionally been considered ‘intermediaries’ within the law, including curated-content platforms such as Netflix and Amazon Prime as well as digital news publications.&lt;/p&gt;
&lt;p&gt;These rules are a significant step-up from the draft version of the amendments floated by the Union government two years ago; in this period, the relationship between the government around the world and major intermediaries changed significantly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The insistence of these entities in the past, that they are not ‘arbiters of truth’, for instance, has not always held water in their own decision-makings.&lt;/p&gt;
&lt;p&gt;Both Twitter and Facebook, for instance, have locked the former United States president Donald Trump out of their platforms. Twitter has also resisted to fully comply with government censorship requests in India, spilling into an interesting policy tussle between the two entities. It is in the context of these changes, therefore, that we must we consider the new rules.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What changed for the good?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the immediate standouts of these rules is in the more granular way in which it aims to approach the problem of intermediary regulation. The previous draft — and in general the entirety of the law — had continued to treat ‘intermediaries’ as a monolithic entity, entirely definable by section 2(w) of the IT Act, which in turn derived much of its legal language from the EU E-commerce Directive of 2000.&lt;/p&gt;
&lt;p&gt;Intermediaries in the directive were treated more like ‘simple conduits’ or dumb, passive carriers who did not play any active role in the content. While that might have been the truth of the internet when these laws and rules were first enacted, the internet today looks much different.&lt;/p&gt;
&lt;p&gt;Not only is there a diversification of services offered by these intermediaries, there’s also a significant issue of scale, wielded by a few select players, either by centralisation or by the sheer number of user bases. A broad, general mandate would, therefore, miss out on many of these nuances, leading to imperfect regulatory outcomes.&lt;/p&gt;
&lt;p&gt;The new rules, therefore, envisage three types of entities:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;There are the ‘intermediaries’ within the traditional, section 2(w) meaning of the IT Act. This would be the broad umbrella term for all entities that would fall within the ambit of the rules.&lt;/li&gt;&lt;li&gt;There are the ‘social media intermediaries’ (SMI), as entities, which enable online interaction between two or more users.&lt;/li&gt;&lt;li&gt;The rules identify ‘significant social media intermediaries’ (SSMI), which would mean entities with user-thresholds as notified by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The levels of obligations vary based on these hierarchies of classification. For instance, an SSMI would be obligated with a much higher standard of transparency and accountability towards their users. They would have to fulfill by publishing six-monthly transparency reports, where they have to outline how they dealt with requests for content removal, how they deployed automated tools to filter content, and so on.&lt;/p&gt;
&lt;p&gt;I have previously argued how transparency reports, when done well, are an excellent way of understanding the breadth of government and social media censorships. Legally mandating this is then perhaps a step in the right direction.&lt;/p&gt;
&lt;p&gt;Some other requirements under this transparency principle include giving notice to users whose content has been disabled, allowing them to contest such removal, etc.&lt;/p&gt;
&lt;p&gt;One of the other rules from the older draft that had raised a significant amount of concern was the proactive filtering mandate, where intermediaries were liable to basically filter for all unlawful content. This was problematic on two counts:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Developments in machine learning technologies are simply not up there to make this a possibility, which would mean that there would always be a chance that legitimate and legal content would get censored, leading to general chilling effect on digital expression&lt;/li&gt;&lt;li&gt;The technical and financial burden this would impose on intermediaries would have impacted the competition in the market.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The new rules seemed to have lessened this burden, by first, reducing it from being mandatory to being best endeavour-basis; and second, by reducing the ambit of ‘unlawful content’ to only include content depicting sexual abuse, child sexual abuse imagery (CSAM) and duplicating to already disabled / removed content.&lt;/p&gt;
&lt;p&gt;This specificity would be useful for better deployment of such technologies, since previous research has shown that it’s considerably easier to train a machine learning tool on corpus of CSAM or abuse, rather than on more contextual, subjective matters such as hate speech.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What should go?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;That being said, it is concerning that the new rules choose to bring online curated content platforms (OCCPs) within the ambit of the law by proposals of a three-tiered self-regulatory body and schedules outlining guidelines about the rating system these entities should deploy.&lt;/p&gt;
&lt;p&gt;In the last two years, several attempts have been made by the Internet and Mobile Association of India (IAMAI), an industry body consisting of representatives of these OCCPs, to bring about a self-regulatory code that fills in the supposed regulatory gap in the Indian law.&lt;/p&gt;
&lt;p&gt;It is not known if these stakeholders were consulted before the enactment of these provisions. Some of this framework would also apply to publishers of digital news portals.&lt;/p&gt;
&lt;p&gt;Noticeably, this entire chapter was also missing from the old draft, and introducing it in the final form of the law without due public consultations is problematic.&lt;/p&gt;
&lt;p&gt;Part III and onwards of the rules, which broadly deal with the regulation of these entities, therefore, should be put on hold and opened up for a period of public and stakeholder consultations to adhere to the true spirit of democratic participation.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The author would like to thank Gurshabad Grover for his editorial suggestions.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad'&gt;https://cis-india.org/internet-governance/blog/new-intermediary-guidelines-the-good-and-the-bad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>TorShark</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2021-03-15T13:52:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/order-2011-12-20-mufti-aijaz-arshad-qasmi-v-facebook-and-ors">
    <title>Mufti Aijaz Arshad Qasmi v. Facebook and Ors (Order dated December 20, 2011)</title>
    <link>https://cis-india.org/internet-governance/resources/order-2011-12-20-mufti-aijaz-arshad-qasmi-v-facebook-and-ors</link>
    <description>
        &lt;b&gt;This is the order passed on December 20, 2011 by Addl. Civil Judge Mukesh Kumar of the Rohini Courts, New Delhi.  All errors of spelling, syntax, logic, and law are present in the original.&lt;/b&gt;
        &lt;p&gt;Suit No 505/11&lt;/p&gt;
&lt;p&gt;Mufti Aijaz Arshad Qasmi&lt;br /&gt;
vs.&lt;br /&gt;
Facebook etc.&lt;/p&gt;
&lt;p&gt;20.12.11&lt;/p&gt;
&lt;p&gt;Fresh suit received by assignment. It be checked and registered.&lt;/p&gt;
&lt;p&gt;Present: Plaintiff in person with Ld. Counsel.&lt;/p&gt;
&lt;p&gt;Ld. Counsel for plaintiff prayed for ex-parte ad-interim injunction. He has filed the present suit for permanent and mandatory injunction against 22 defendants who are running their social networking websites under the name of Facebook, Google India (P) Ltd., Yahoo India (P) Ltd., Microsoft India (P) Ltd., Orkut, Youtube etc as shown in the memo of parties in the plaint.  It is submitted that plaintiff is an active citizen of India and residing at the given address and he believes in Secular, Socialist and Democratic India professing Muslim religion.  It is further submitted that the contents which are uploaded by some of the miscreants through these social networking websites mentioned above are highly objectionable and unacceptable by any set of the society as the contents being published through the aforesaid websites are derogatory, per-se inflammatory and defamatory which cannot be acceptable by any of the society professing any religion.  Even if the same is allowed to be published through these social networking websites and if anybody will take out the print and circulated amongst any of the community whether it is Muslim or Hindu or Sikh, then definitely there would be rioting at mass level which may result into serious law and order problem in the country. Where the miscreants have not even spare any of the religion, even they have created defamatory articles and pictures against the Prophet Mohammad, the Hindu goddess Durga, Laxmi, Lord Ganesha and many other Hindu gods which are being worshiped by the people of Hindu community. It is prayed by the counsel for plaintiff that the defendants may be directed to remove these defamatory and derogatory articles and pictures from their social websites and they should be restrained from publishing the same anywhere through Internet or in any manner.  It is further submitted that the social websites are being utilised by the every person of whatever age of he is whether he is 7 years old or 80 years old.  These defamatory articles will certainly corrupt not only young minds below the 18 years of age but also corrupt the minds of all age group persons. It is further submitted that even the miscreants have not spared the leaders of any political party whether it is BJP, Congress, Shiv Sena or any other political party doing their political activities in India, which may further vitiate the minds of every individual and may result into political rivalry by raising allegations against each other.&lt;/p&gt;
&lt;p&gt;I have gone through the record carefully wherein the plaintiff has also filed a CD containing all the defamatory articles and photographs, plaintiff also wants to file certain defamatory and obscene photographs of the Prophet Mohammad and Hindu Gods and Goddesses.  Photographs are returned to the plaintiff, although, the defamatory written articles are taken on record. Same be kept in sealed cover.&lt;/p&gt;
&lt;p&gt;In my considered opinion, the photographs shown by the plaintiff having content of defamation and derogation against the sentiments of every community. In such circumstances, I am of the view that the plaintiff has a prima facie case in his favour. Moreover, balance of convenience also lies against the defendants and in favour of the plaintiff.  Moreover, if the defendants will not be directed to remove the defamatory articles and contents from their social networking websites, then not only the plaintiff but every individual who is having religious sentiments would suffer irreparable loss and injury which cannot be compensated in terms of money.  Accordingly, in view of the above discussion, taking in consideration the facts and circumstances and nature of the suit filed by the plaintiff where every time these social networking websites are being used by the public at large and there is every apprehension of mischief in the public, the defendants are hereby restrained from publishing the defamatory articles shown by the plaintiff and contained in the CD filed by the plaintiff immediately on service of this order and notice. Defendants are further directed to remove the same from their social networking websites.&lt;/p&gt;
&lt;p&gt;Application under Order 39 Rule 1 &amp;amp; 2 CPC stands allowed and disposed of accordingly.&lt;/p&gt;
&lt;p&gt;Summons be issued to the defendants on filing of PF/RO/Speed Post.  The defendants having their addresses in different places may be served as per the provisions of Order 5 CPC. Reader of this court is directed to keep the documents and CD in a sealed cover.  Plaintiff is directed to get served the defendants along with all the documents. Plaintiff is further directed to ensure the compliance of the provisions under Order 39 Rule 3 CPC and file an affidavit in this regard. Copy of this order be given dasti.&lt;/p&gt;
&lt;p&gt;Put up for further proceedings on 24.12.11.&lt;/p&gt;
&lt;p&gt;Sd/-&lt;br /&gt;
(Mukesh Kumar)&lt;br /&gt;
ACJ-cum-ARC, N-W&lt;br /&gt;
Rohini Courts, Delhi&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/order-2011-12-20-mufti-aijaz-arshad-qasmi-v-facebook-and-ors'&gt;https://cis-india.org/internet-governance/resources/order-2011-12-20-mufti-aijaz-arshad-qasmi-v-facebook-and-ors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Court Case</dc:subject>
    
    
        <dc:subject>Obscenity</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Resources</dc:subject>
    

   <dc:date>2012-02-20T18:02:44Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/draconian-it-rules">
    <title>MPs to be taught ‘draconian’ IT Act Rules as India.net support galvanises for annul motion</title>
    <link>https://cis-india.org/news/draconian-it-rules</link>
    <description>
        &lt;b&gt;The blog post by Prachi Shrivastava was published in Legally India on April 23, 2012.&lt;/b&gt;
        
&lt;p&gt;Rajya Sabha’s member of parliament (MP) from Kerala, P Rajeeve, whose &lt;a class="external-link" href="http://164.100.47.5/newsite/bulletin2/Bull_No.aspx?number=49472"&gt;statutory motion&lt;/a&gt; to annul the IT (Intermediaries Guidelines) Rules 2011 is slated for discussion in Parliament tomorrow, aims to convene a meeting of MPs, internet societies, and bloggers in the first week of May to create awareness against the &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;draconian effect&lt;/a&gt; of the rules.&lt;/p&gt;
&lt;p&gt;“Most of the MPs need to know about this,” Rajeeve told Legally India, explaining that statutory motions are generally not easy to pass. “Actually we are trying to create awareness by organizing a session. The issue will be the IT Rules 2011 and how it is against the constitution, how it is against natural justice, how it is against due process of law.”&lt;br /&gt;&lt;br /&gt;“The motion has been accepted. The committee has allotted time for discussion on the twenty fourth. Thereafter it will come to the house. In this part of the session I am trying to coordinate other MPs to get support”, he said.&lt;/p&gt;
&lt;p&gt;Rajeeve’s motion of 23 March 2012, as first reported by &lt;a href="https://cis-india.org/internet-governance/blog/statutory-motion-against-intermediary-guidelines-rules/" class="external-link"&gt;CIS-India&lt;/a&gt;, was not his first attempt at bringing the IT rules into the spotlight. When the rules were in draft stage, he had made a &lt;a class="external-link" href="http://rajeev.in/pages/..%5CNews%5Ccensorship_Blogs%5CBloggers_Internet.html"&gt;zero hour mention&lt;/a&gt; against them for being in violation of freedom of speech and expression, by over-scrutinising bloggers, over-authorising intermediaries, and letting the government, individuals and institutions by-pass the due process of law.&lt;/p&gt;
&lt;p&gt;Rajeeve was one of the nine panelists in the open discussion on “Resisting Internet Censorship”, organised by the Centre for Internet and Society (CIS) and Foundation for Media Professionals, in Bangalore on Saturday, 21 April. The discussion, addressing an audience of 40, was moderated by veteran journalist Paranjoy Guha Thakurta.&lt;/p&gt;
&lt;p&gt;Other panelists included Mahesh Murthy, founder of digital marketing website Pinstorm, Sudhir Krishnaswamy, founding member of Centre for Law and Policy Research, Na Vijayashankar, director of Cyber Law College, and Siddharth Narain from the Alternative Law Forum.&lt;/p&gt;
&lt;p&gt;Also on the panel were Rishabh Dara,&lt;a class="external-link" href="http://www.google.com/policyfellowship/"&gt; Google policy fellow&lt;/a&gt; who conducted &lt;a href="https://cis-india.org/internet-governance/intermediary-liability-in-india" class="external-link"&gt;a study last year on intermediary liability in India and its chilling effects on free expression&lt;/a&gt;, BG Mahesh, founder of Oneindia.com, Ram Bhat, co-founder of community media collective Maraa, and Pranesh Prakash, programme manager at CIS.&lt;/p&gt;
&lt;p&gt;Prakash said that the discussion brought together different perspectives, even those of the entrepreneur, like BG Mahesh and Mahesh Murthy. “Transparency in the terms of censorship is good. We are not saying all censorship is bad, but that it should be transparent.”&lt;/p&gt;
&lt;p&gt;Prakash told Legally India about the various experiences shared by panelists, of the lack of transparency in the present system of censorship. While one faced harassment by the police over trivial procedural compliances, there was complaint for defamation against an article syndicated by another from a different publication’s press release. “And we read the article over and over and over again but couldn’t find anything which was remotely defamatory.”&lt;br /&gt;&lt;br /&gt;Legal experts on the panel, Kirshnaswamy and Vijayashankar, spoke about the constitutionalism behind free speech provisions. Narain shed light on the fact that while excessive energy has been expended on highlighting which content should not be banned, little has been spent on examining the operative procedures behind censorship.&lt;br /&gt;&lt;br /&gt;Dara spoke about his research and how it not only revealed that content was being frivolously removed on complaints to intermediaries, but also that the people whose content was being removed were not being informed of the same. There was no public notice of the removal.&lt;br /&gt;&lt;br /&gt;Bhat’s discourse drew attention to the history of censorship in India and elicited the fact that the Indian press has in fact been censored in an upsetting manner even since the revolt of 1857.&lt;/p&gt;
&lt;p&gt;Murthy made the observation that statistically speaking, in India the number of internet users exceeds television watchers, which has made social media unfathomably important while the internet is no longer elitist.&lt;br /&gt;&lt;br /&gt;A number of related Indian initiatives have been gathering momentum in recent months, such as&amp;nbsp;&lt;a class="external-link" href="http://softwarefreedom.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=97:campaign-for-freedom-on-the-internet&amp;amp;Itemid=83"&gt; signature campaigns&lt;/a&gt; for &lt;a class="external-link" href="https://www.change.org/petitions/mps-of-india-support-the-annulment-motion-to-protect-internet-freedom-stopitrules"&gt;internet freedom&lt;/a&gt;, and offline protests such as the &lt;a class="external-link" href="http://friendsofinternet.wikispaces.com/"&gt;Free Software Movement in Karnataka&lt;/a&gt; and the &lt;a class="external-link" href="http://kafila.org/2012/04/21/freedom-in-the-cage-22-april-2012/"&gt;Save your Voice in Delhi&lt;/a&gt;, are the order of the day. Other actions include &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;writing to MPs&lt;/a&gt;, asking them to vote in favor of Rajeeve’s statutory motion for annulment of the IT rules.&lt;/p&gt;
&lt;p&gt;Kerala-based advocate Shojan Jacob filed the f&lt;a class="external-link" href="http://www.legallyindia.com/201203062622/Bar-Bench-Litigation/read-first-writ-challenging-censorious-it-act-intermediaries-rules-in-kerala"&gt;irst ever writ challenging the rules&lt;/a&gt; in the Kerala High Court last month.&lt;/p&gt;
&lt;p&gt;The rules enable any individual or public or private institution to get content removed from websites, in most cases simply by notifying the website owners or intermediaries such as Google, Yahoo and others.&lt;/p&gt;
&lt;p&gt;Takedown requests can be based on any of &lt;a class="external-link" href="http://www.legallyindia.com/201201182502/Legal-opinions/sopa-blackout-day-bah-wheres-the-kolaveri-about-indias-it-act-intermediaries-rules"&gt;15 vaguely drafted parameters&lt;/a&gt;, without stating any reasons or requiring any judicial or quasi-judicial order in support.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.legallyindia.com/Social-lawyers/mps-to-be-taught-draconian-it-act-rules-as-indianet-support-galvanises-for-annul-motion"&gt;Click&lt;/a&gt; to read the original.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/draconian-it-rules'&gt;https://cis-india.org/news/draconian-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    

   <dc:date>2012-04-25T10:39:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests">
    <title>Mixed signals? Supreme Court notices to states on Facebook arrests </title>
    <link>https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests</link>
    <description>
        &lt;b&gt;In wake of the recent arrests of UP-based scholar Kanwal Bharti and Andhra-based PUCL activist Jaya Vindhyala over their Facebook posts, NDTV aired a discussion on the grey areas of the IT Act. Pranesh Prakash, Shreya Singhal and Faizal Farooqui&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The video was&lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/mixed-signals-supreme-court-notices-to-states-on-facebook-arrests/287157?vod-related"&gt; published by NDTV on August 16, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The NDTV anchor asked Pranesh that this notice — the indicator coming from the government is that nobody seems to really know what section 66A is all about...and at the end of the day we are going to make a case by case decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh said that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This not just about 66A. This is actually about rule of law. We see that the arrest of Kanwal Bharti is actually a legal arrest. It goes against a judgment of the Allahabad High Court saying that routine arrests shouldn't be made in cases where the imprisonment term is less than 7 years. He actually hasn't been charged under 66A, he was charged under the IPC. It is not just about Internet censorship. It also very much about the rule of law and that completely breaking down in India and ... people's persectives and government's perspectives many times  are withering away when it comes offensive content or what they deem offensive or communal content being posted online...and if  something like what  Kanwal Bharti posted is actually deemed to be illegal under those provisions then lots of statements that the Prime Minister  of India has said should also be deemed to be equally illegal."&lt;/p&gt;
&lt;p&gt;Watch the full video below:&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/oeN5HCvTCF8" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests'&gt;https://cis-india.org/news/ndtv-the-social-network-mixed-signals-supreme-court-notices-to-states-on-facebook-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-08-28T08:42:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech">
    <title>Live Chat: Win for Free Speech </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech</link>
    <description>
        &lt;b&gt;Join us for a live chat at 5.30 pm on SC striking down the Section 66A of the IT Act which had permitted the arrest of people for posting "offensive content" on the internet. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://www.thehindu.com/news/national/live-chat-hope-for-free-speech/article7028037.ece"&gt;live chat transcript&lt;/a&gt; was published in the Hindu on March 24, 2015. Geetha Hariharan participated in the live chat.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p class="body" style="text-align: justify; "&gt;In a victory for proponents of free speech, the Supreme Court today  struck down Section 66 A of the IT Act, which had permitted the arrest  of people for posting “offensive content” on the internet. However, the  Court upheld Section 69A, which allows the government to block websites  based on a set of rules.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What are your views on this ruling? Join us for a live chat today at 5.30 pm with:&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia, a practicing lawyer and author of "Offend, shock or  disturb: Free Speech under the constitution" forthcoming in OUP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan, a Programme Officer at Centre for Internet and  Society, focusing on Internet governance and freedom of expression.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang, Lawyer and researcher at Alternative Law Forum working on free speech.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;and G Ananth Krishnan, Coordinating Editor with The Hindu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Hi all, welcome to the live chat on the Supreme Court's  much-celebrated decision to strike down Section 66 A of the IT Act.  There are caveats of course: For instance, the Court has upheld Section  69A, which allows the government to block websites based on a set of  rules.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:30&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Welcome to Gautam Bhatia, a practicing lawyer and author of  "Offend, shock or disturb: Free Speech under the constitution"  forthcoming in OUP.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:31&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Geetha Hariharan, a Programme Officer at Centre for Internet  and Society, focusing on Internet governance and freedom of expression.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:31&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Lawrence Liang, Lawyer and researcher at Alternative Law Forum working on free speech.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;and&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;G Ananth Krishnan, Coordinating Editor with The Hindu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:33&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From shraddha&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This is landmark judgement,though.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:34&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Mystiquethinker&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I would like to ask you one thing was that necessary to abolish Sec66 A completely.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: Yes, in my opinion it was. The terms of S. 66A - such as  "grossly offensive" - went beyond what is constitutionally permitted by  Article 19(2). It was impossible to "sever" these terms from the rest of  the section. In such cases, the Court has no alternative but to strike  down the section in its entirety.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:34&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Rohan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I'm particularly interested in the relevance of Sec 66 A in West Bengal.  Over the last few years the TMC government has massively curbed freedom  of speech. Do you think this will deter the ruling party?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:35&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Gautam, Geetha and Lawrence would you like to respond?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:35&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: typing&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:37&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From kc&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;so does this mean its okay for anyone to say anything over the internet?  Does the internet need separate rules? Anything that cant be said over a  microphone or using any media shouldn't be said over the internet  either.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: No, the standard penal laws - against defamation, hate  speech (S. 153A), religious incitement (S. 295A) continue to apply. Yes,  the argument that the internet needs separate rules when it comes to  the *content* of speech was precisely what was rejected by the Court.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:38&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Jai&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I would like to ask what when people cross the boundary of decency when they post comments on social network?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:38&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: So the court goes into this question of whether 66A  needed to go in its entirely or could it be saved. The ASG suggested  that it could be read down by the courts, and offered a range of ways it  coudl have been done. But the court responded to say that the  restrictions in 19(2) are clear, and if the impugned law does not fall  within it, then to ask for a reading that incorporates other principles  only in order to save it would be to do violence to the language of Sec.  66A&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In para 49 they say&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What the learned Additional Solicitor General is asking us to do is not  to read down Section 66A – he is asking for a wholesale substitution of  the provision which is obviously not possible.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:38&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: @Mystiquethinker: Section 66A makes it a criminal  offense to make any post on the Internet, that might “grossly offend” or  be “menacing”. If you happen to post false information (like a spoof),  with the purpose of annoying, inconveniencing, criminally intimidating  or causing hatred, you can be criminalized for that, too. However, the  terms "annoyance, inconvenience, hatred, ill-will", etc. are vague.  Section 66A does not define them. Applying the law to misuse it becomes  extremely easy then - and this has happened.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:38&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Supreme Court has struck a delicate balance&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:39&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From neerulal&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It's a great step on part of judiciary. Infact it's the judicial  activism that washed much of the waste created by legislature. Hope it  was as experienced and sensible as judiciary..&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:39&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From shraddha&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;according to me it's imp to important to amend it completely... coz it  directly infringes the article19(a) right to freedom of speech and  expression.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:40&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Danish Sheikh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;why do you think the Court is so sparse in its analysis of the website blocking rules as opposed to 66A?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:40&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Jai - The boundaries of decency will be determined by  our existing penal laws - Sections 295A, 153A and the rest.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:40&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: @gananth would you like to respond to the last one?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:41&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: on 69A&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Despite striking down Section 66A, Article 19(2) provides sufficient  grounds for the government to protect public peace. It is comprehensive  and is applicable to all media. Therefore, in a way, Section 66A was not  required at all.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:42&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: Danish, you are right. One wishes that the court had  paid as much attention to the Blocking orders as they did 66A. I feel  they have gone on a technical reading of the procedures established to  conclude that it is at least not as arbitrary as 66A, but fail to  acknowledge that the ways the orders have been operationalised  completely lack transparency and are hence arbitrary&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:42&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Eric&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I would say yes. The best and most practical control of social media  comes from the maturity of its users. We can make a useful presumption  that useless content will simply not be shared substantially. Instead of  making laws, we need to make mature citizens and users of social media.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:42&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From saurav&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;what are the others instruments available with govt. to curb cyber crimes ???&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:42&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Guest - True, but you still need a *law* that would  authorise the police and other agencies to implement the restrictions  under Article 19(2) in specific situations. That is why we have speech  regulating provisions in the Indian Penal Code.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:43&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From shashi&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;I think sec 66A should be amended and specific definition of "offence"  must be brought in, because there needs to reasonable restrictions under  article 19(2). But having such vague clauses shows how it can be  misused by people in power.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:44&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: @saurav: As Gautam said, the IPC's provisions such as  Sections 153A and 295A are available to the government as limitations on  speech. In addition, there are other offences in the IT Act (Sections  66B to 67B).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:44&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Mystiquethinker&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In my point of view there should be few limitation . You cannot say  anything to anybody. I am afraid what will be its result in future.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:45&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Shashi The Supreme Court has held before - in S.  Rangarajan's case - that causing offence doe not fall within Article  19(2). In fact, quoting the European Court of Human Rights, the Supreme  Court said that the freedom of speech is nothing without the freedom to  "offend, shock or disturb." That's actually why 19(2) is so specifically  worded, and restricts itself to "public order", "decency or morality",  "incitement to an offence", "defamation" etc.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:45&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: @Mystiquethinker To add to the previous point, the court  also did consider whether they could apply the doctrine of severability  but concluded that because "The present is a case where, as has been  held above, Section 66A does not fall within any of the subject matters  contained in Article 19(2) and the possibility of its being applied for  purposes outside those subject matters is clear. We therefore hold that  no part of Section 66A is severable and the provision as a whole must be  declared unconstitutional."&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:47&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Ashish&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;is it means??Now morphed girls photo posting ,revealing individual secret to harm him/her physcologicaly is allowed publicly.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: Not at all. There are still other laws including  obscenity laws and privacy laws under the IT act that deal with this&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:47&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: What happens to all the cases already booked? Is the verdict retrospective?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:48&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Ashish No. There is the Indecent Representation of  Women Act, which prohibits that. There are also laws against blackmail  and criminal intimidation under the IPC.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:48&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Cherry&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A remarkable judgement to free their speeches n voices&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: absolutely, an important first step towards a free jurisprudence of the 21st century&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sarpanch&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;66A declared unconstitutional - good. But, a religious hate-filled reaction will it still attract 295 IPC.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: yes and 153A of the IPC amongst others&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Geek&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If this is all about facebook, remove it and everyhing is fine!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: sorry, but thats no longer an option after this judgment :)&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:49&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ TheHindu: to the best of my knowledge, no. A judgment is not ordinarily retrospective. Subject to correction.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:49&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Neel&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Doesn't the line of reasoning adopted by the SC throw open the possibility of other restrictive laws being questioned too?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Eric&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There is plenty of scope for an independent regulator including  representatives of social media and internet users to regulate the  restrictions under Art 19(2). Giving the police or any other  governmental agency the power to prosecute potential offenders involves  the unnecessary risk of political bias which underlies the SC's  judgment. Clearly, severing the provision would have been messy.  Moreover, the judgment is an unapologetic thrust in the direction of  protecting fundamental rights.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From shashi&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Gautam one must not forget how social media can be used to incite  violence against a perticular community and force exodus (as happened in  Bangalore few years back). So, there has to be reasonable restrictions.  Else the government would look helpless in such incidents&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:50&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Cherry&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;i agree with the comment of mystiquethinker&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:50&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Panky&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Excellent decision from Court!!!!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:51&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Gautam, a question for you from Shashi&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:51&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Neel Yes, it does. For instance, crucial to the Supreme  Court's reasoning is a distinction between incitement and advocacy, and  a need for proximity between speech and the 19(2) restrictions. Now if  you look at the cases where the Supreme Court upheld 295A (1957) and  sedition (1962), it did so on the specific understanding that there was  no need for proximity - a mere "tendency" was enough. But in this case,  the Supreme Court specifically says that the tendency must be to  *imminent public disorder*. Now that severely undermines the foundation  of 295A and especially sedition, because it's really hard to argue that  spreading disaffection against the government has an imminent  relationship with public disorder. So yes - I think it might just be  time to try and have some of those old judgments reviewed!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:51&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Shanmukh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@ Eric. Social censorship works in a society where everybody is educated  and mature. India isn't quite there yet. But this 66A was abused and  it's good that it is going away.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: We perhaos need to be careful about the argument of  whether India is ready. That was the same logic that colonial  authorities use to introduce a number of speech regulating laws. Worth  having a look at Lala Lajpat Rai's reply to the Indian Cinematograph  Committee&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:52&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Shashi Yes, I agree. But 66A went far beyond those  reasonable restrictions. The Constitution allows for reasonable  restrictions in the interests of public order, and we have a long series  of cases interpreting what that means. I think that would speak to your  concern.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:53&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Shanmukh: See also the arguments that Raja Rammohun Roy  made as fas back as 1823 about the freedom of the press, when the  colonial authorities were using the same argument about Indians not  being ready.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:53&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The government has Section 69A to prevent mass exodus type situations. Am I right?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: Yes, and that is an important concern but you must note  that even during the NE exodus, the government exceeded its brief and  even blocked websites that were trying to quell rumous&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Sam&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Yesterday's column from readers editor had some suggestions on stopping  rumors being spread via SM. I think, those kind of methods will go a  long way in stopping falsehoods being spread than banning content and  sections like 66A&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:54&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Eric&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Lawrence Liang. Precisely. One has to be cautious of underestimating or  belittling the input from regular users of the subject. Giving more  deliberative platforms can only encourage participation and education of  its users.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:54&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A case will be governed by the law applicable on the date the offence  was committed, unless otherwise stated. Therefore, I think the ruling  will be prospective only&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:55&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Neel&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What is the weight that precedent has in our legal system? For instance  what will it take for a judge to say the previous judgements on sedition  are too restrictive?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: We are totally a precedent based system, but preedents  can be enabling and restrictive, so the way it develops is through slow  processes of comparing and distinguishing&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:55&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Neel&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What is the weight that precedent has in our legal system? For instance  what will it take for a judge to say the previous judgements on sedition  are too restrictive?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:55&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Guest Yes, I think that's correct.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:55&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Shiva&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;What does the judgement imply for posting adult/sexually explicit/pornographic content online?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: It does not affect that: We have obscenity laws under  the IPC as well as special obscenity provisions within the IT act that  deal with it&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:56&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Utkarsh&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;SC proves how powerful our democracy is. It is good that citizens are  free to post anything they want now, but shouldn't we try to teach the  people their responsibilty with this freedom?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:56&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Geetha your thoughts on that?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:56&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Vikas&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Rather debating we should demand action on such people who in real sense  do the offending act via speech and social media, arresting some body  who has just shared some views is not right.....&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:56&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @Neel It's a hard question. I don't think a Supreme Court  bench will be able to directly overrule the sedition case. That was  decided by a five-judge bench, and so you;d need a seven-judge bench to  actually overturn it. I think what we can try and argue is that in the  50 years since the Court upheld sedition, the foundations of that  decision have been so greatly undermined by succeeding cases, that at  least in 2015, sedition is unconstitutional. It's a hard argument to  pull off, but I think it's worth a shot.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:57&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The population has moral responsibility to not spread rumours over SM  &amp;amp; the citizens need to be mature enough to not take everything too  personally. You have the choice of ignoring what you deem offensive. If  any of the above fail, it is because the society has failed, not the  legal system.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From zenmist&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;what if i get cyber bullied ! Do I have any recourse now ?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;5:59&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From kkamal&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;implementation still a matter of concern&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: Certainly, and esp for the intermediary guidelines.  Often when a court reads down a provision, rather than striking it down,  there is a gap between the law and enforcement&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Zeminist yes - for instance, under criminal intimidation provisions in the IPC.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:00&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Can we not issue guidelines for social sites like facebook twitter and  others to filters such content from being posted(I think it'll show some  pop-up in general.?)&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:00&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: @Utkarsh: Perhaps. However, the freedoms enshrined in  out Constitution say our freedom of speech and expression can be  restricted by the government only under specific circumstances: see  http://indiankanoon.org/doc.... The _government's_ restrictions on  speech must abide by these - whether they teach citizens what is  (morally) right to speak or not is different from what we have a right  to say. As Gautam has mentioned before, Article 19(1)(a) gives us the  right to "offend, shock or disturb".&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:00&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Guest - the problem with filters are that they are *invariably* over-inclusive.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:01&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Vibhu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;This decision once again upheld citizen's belief in the constitution and  the Supreme Court. But this power also comes with an added  responsibility to the citizens to be sensitive towards the emotions of  communities and other sections of the country.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @Vibhu Absolutely. This is why it's important to make a  distinction between two important ideas - the fact that it is your  *right* to do or speak in a certain manner doesn't always mean that you  *ought* to speak in that manner.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:02&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Negi Gaurav&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Striking down 66A is good for democratic values and citizenry  expression. It will enhance the power of common mass and will affect  political procedure. Free speech is fundamental right of Indian citizen ,  However judicious use of right is necessary to check hate crime.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:03&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Guest&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;We appreciate the verdict... It was much needed but there still is a  question still unanswered, why do we need judicial activism to strike  all those laws that are pushing us back by several decades. If such laws  are always have to be decided by Supreme court, what do we have  legislature for?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:03&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Pankaj&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A welcome judgement by SC today. Section 66(A) was indeed an  uncontitutional provision which accounted for few arrests considering  the arbitrary and vague terminologies. But, certainly regulation of  speech over internet should be regulated in a more robust and  comprehensive manner&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:04&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @ Guest To be fair to our parliaments, legislatures all  over the world restrict speech, and it falls to the Court to correct  them. Legislatures are composed of human beings like us, and often,  because of the position they are in, they tend to overestimate the  dangers of free speech, and underestimate its importance. But that's why  we have a constitutional court. :)&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: If taken to its logical extreme, does the SC verdict mean that anything goes on the internet?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:07&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Serendipity&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@The Hindu: Free Speech is not absolute. There are always restrictions. It depends on how the law is drafted.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Vibhu&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;@Hindu. No not anything goes on the internet. All elements like  pornography, abuse, etc which are illegal in general sense also applies  to the internet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:08&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: @TheHindu No. The SC expressly says that speech which  bears a proximate relationship to any of the 19(2) categories may  legitimately be restricted. Many of the speech-regulating provisions of  the IPC do just that. These provisions are agnostic towards the medium -  for instance, defamation will be punishable whether it happens offline,  or over the internet.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:08&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From charan malhotra&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;our Sc lifted great barricade in the freedom of speech.. but even if any  one explicit n posts the images of others n morphing ? then what could  be the next step to take an action on those convicts?&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: @charan: Other provisions are still in operation under  the IT Act and IPC that can be used. For example: Section 66D (cheating  by personation), 66E , etc. I would urge you to look at Section 67, 67A  and 67B of IT Act as well.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From manoharan&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;right to experss includes right to go online in thought&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:11&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: @TheHindu: No. Restrictions placed under one or more  of the conditions under Article 19(2) of the Constitution are legitimate  (online and offline). Also, offences under the IPC (Sections 153A,  295A, 292) continue to apply. As also the offences under the IT Act,  which target online speech (Sections 66E, 67, 67A and 67B, for  instance).&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:11&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: By the way, as an aside, I'd like to add - this judgment  is extremely lucid and accessible, and really eloquent at times. Do read  it. 123 pages sounds like a lot, but it's easy reading - shouldn't take  more than an hour.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:09&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Lawrence Liang: @The Hindu Not at all, we still have all of the good old  speech restrictive laws including in the IPC, it is important to  remember that even in the past 66A cases, they have rarely been filed in  islation, and are usually accompanied by 124A, 153A or 295A of the IPC&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:09&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Comment From Dhruv&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A Great Decision to uphold Free Speech. We do not want to be Police  State like CHINA but our Indian legislators are slowly taking the  country far from Democracy and denying civil rights to civilians. Great  decision from Supreme Court. This is a lesson for the indian politicians  who think they can play with our fundamental rights and impose their  narrow mindset on us.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: Thank you all so much for joining the chat.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:14&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: The panellists and readers!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:15&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Geetha Hariharan: Thanks!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:15&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Gautam Bhatia: Thank you!&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;6:15&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Hindu: And for making this a lively and informative debate. Watch this space for more live chats on emerging issues.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech'&gt;https://cis-india.org/internet-governance/news/the-hindu-march-24-2015-live-chat-win-for-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T16:07:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/chairman-and-members-of-crac">
    <title>List of Chairman and Members of CRAC</title>
    <link>https://cis-india.org/internet-governance/resources/chairman-and-members-of-crac</link>
    <description>
        &lt;b&gt;Notification on the constitution of the "Cyber Regulation Advisory Committee"&lt;/b&gt;
        &lt;p align="center"&gt;LIST OF CHAIRMAN AND MEMBERS OF CYBER REGULATION ADVISORY COMMITTEE&lt;/p&gt;
&lt;p align="center"&gt;NOTIFICATION&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p align="right"&gt;17th October, 2000&lt;/p&gt;
&lt;p&gt;&lt;i&gt;In exercise of the powers conferred by section 88 of the Information Technology Act, 2000 (21 of 2000) the Central Government hereby constitute the “Cyber Regulation Advisory Committee”, consisting of the following, namely: – &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;1.      &lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;[Minister, Communication and Information Technology] -  Chairman&lt;/p&gt;
&lt;p&gt;2.      Secretary, Legislative Department - Member&lt;/p&gt;
&lt;p&gt;3.      Secretary, &lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;[Ministry of Communication and Information Technology, Department of Information Technology] - Member&lt;/p&gt;
&lt;p&gt;4.      Secretary, Department of Telecommunications - Member&lt;/p&gt;
&lt;p&gt;5.      Finance Secretary - Member&lt;/p&gt;
&lt;p&gt;6.      Secretary, Ministry of Defence - Member&lt;/p&gt;
&lt;p&gt;7.      Secretary, Ministry of Home Affairs - Member&lt;/p&gt;
&lt;p&gt;8.      Secretary, Ministry of Commerce - Member&lt;/p&gt;
&lt;p&gt;9.      Deputy Governor, Reserve Bank of India - Member&lt;/p&gt;
&lt;p&gt;10.  Shri T.K. Vishwanathan, Presently Member Secretary, Law Commission - Member [&lt;i&gt;sic&lt;/i&gt;]&lt;/p&gt;
&lt;p&gt;11.  President, NASSCOM -  Member&lt;/p&gt;
&lt;p&gt;12.  President, Internet Service Provider Association - Member&lt;/p&gt;
&lt;p&gt;13.  Director, Central Bureau of Investigation - Member&lt;/p&gt;
&lt;p&gt;14.  Controller of Certifying Authority - Member&lt;/p&gt;
&lt;p&gt;15.  Information Technology Secretary by rotation from the States -  Member&lt;/p&gt;
&lt;p&gt;16.  Director General of Police by rotation from the States - Member&lt;/p&gt;
&lt;p&gt;17.  Director, IIT by rotation from the IITs - Member&lt;/p&gt;
&lt;p&gt;18.  Representative of CII - Member&lt;/p&gt;
&lt;p&gt;19.  Representative of FICCI - Member&lt;/p&gt;
&lt;p&gt;20.  Representative of ASSOCHAM - Member&lt;/p&gt;
&lt;p&gt;21.  &lt;a href="#_ftn4"&gt;[4]&lt;/a&gt;[Scientist “6”, Department of Information Technology] - Member Secretary&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;2. Travelling Allowance/Dear Allowance, as per the Central Government rules, for non-official members shall be borne by the Ministry of Communication and Information Technology, Department of Information Technology.&lt;/p&gt;
&lt;p&gt;3. The Committee may co-opt any person as member based on specific meetings&lt;/p&gt;
&lt;p align="center"&gt;_______________________&lt;/p&gt;
&lt;p&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Vide &lt;/i&gt;G.S.R. 790(E), dated 17th October, 2000&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2"&gt;[2]&lt;/a&gt; Subs. by G.S.R. 839(E), dated 23rd December, 2004 for “Minister, Information Technology”.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3"&gt;[3]&lt;/a&gt; Subs. by G.S.R. 839(E), dated 23rd December, 2004 for “Minister, Information Technology”.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4"&gt;[4]&lt;/a&gt; Subs. by G.S.R. 839(E), dated 23rd December, 2004 for “Senior Director, Ministry of Information Technology”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/chairman-and-members-of-crac'&gt;https://cis-india.org/internet-governance/resources/chairman-and-members-of-crac&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>snehashish</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-12-02T06:22:25Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/killing-the-internet-oped">
    <title>Killing the Internet Softly with Its Rules</title>
    <link>https://cis-india.org/internet-governance/blog/killing-the-internet-oped</link>
    <description>
        &lt;b&gt;While regulation of the Internet is a necessity, the Department of IT, through recent Rules under the IT Act, is guilty of over-regulation. This over-regulation is not only a bad idea, but is unconstitutional, and gravely endangers freedom of speech and privacy online.&lt;/b&gt;
        
&lt;div class="visualClear"&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;A slightly modified version of this blog entry was published as &lt;/span&gt;&lt;a class="external-link" href="http://www.indianexpress.com/story-print/787789/"&gt;an op-ed in the Indian Express on May 9, 2011&lt;/a&gt;&lt;span class="Apple-style-span"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h2&gt;Over-regulation of the Internet&lt;br /&gt;&lt;/h2&gt;
&lt;div class="visualClear"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;Regulation of the Internet, as with
regulation of any medium of speech and commerce, is a balancing act.
Too little regulation and you ensure that criminal activities are
carried on with impunity; too much regulation and you curb the
utility of the medium.  This is especially so with the Internet, as
it has managed to be the impressively vibrant space it is due to a
careful choice in most countries of eschewing over-regulation. 
India, however, seems to be taking a different turn with a three sets
of new rules under the Information Technology Act.&lt;/p&gt;
&lt;p&gt;These rules deal with the liability of
intermediaries (i.e., a large, inclusive, group of entities and
individuals, that transmit and allow access to third-party content),
the safeguards that cybercafes need to follow if they are not to be
held liable for their users' activities, and the practices that
intermediaries need to follow to ensure security and privacy of
customer data.&lt;/p&gt;
&lt;h3&gt;Effect of not following the rules&lt;/h3&gt;
&lt;p&gt;By not observing any of the provisions
of these Rules, the intermediary opens itself up for liability for
actions of its users.  Thus, if a third-party defames someone, then
the intermediary can be held liable if he/she/it does not follow the
stringent requirements of the Rules.&lt;/p&gt;
&lt;p&gt;The problem, however is that, many of
the provisions of the Rules have no rational nexus with the due
diligence to be observed by the intermediary to absolve itself from
liability.&lt;/p&gt;
&lt;h3&gt;What does the Act require?&lt;/h3&gt;
&lt;p&gt;Section 79 of the IT Act states that
intermediaries are generally not liable for third party information,
data, or communication link made available or hosted.  It qualifies
that by stating that they are not liable if they follow certain
precautions (basically, to show that they are &lt;em&gt;real&lt;/em&gt;
intermediaries).  They observe 'due diligence' and don't exercise an
editorial role; they don't help or induce  commission of the unlawful
act; and upon receiving 'actual knowledge', or on being duly notified
by the appropriate authority, the intermediary takes steps towards
some kind of action.&lt;/p&gt;
&lt;p&gt;So, rules were needed to clarify what
'due diligence' involves (i.e., to state that no active monitoring is
required of ISPs), what 'actual knowledge' means, and to clarify what
happens in happens in case of conflicts between this provision and
other parts of IT Act and other Acts.&lt;/p&gt;
&lt;h3&gt;Impact on freedom of speech and privacy&lt;/h3&gt;
&lt;p&gt;However, that is not what the rules do.
 The rules instead propose standard terms of service to be notified
by all intermediaries.  This means everyone from Airtel to Hotmail to
Facebook to Rediff Blogs to Youtube to organizations and people that
allow others to post comments on their website.  What kinds of terms
of service?  It will require intermediaries to bar users from
engaging in speech that is disparaging', It doesn't cover only
intermediaries that are public-facing.  So this means that your
forwarding a joke via e-mail, which "belongs to another person
and to which the user does not have any right" will be deemed to
be in violation of the new rules.&amp;nbsp; While gambling (such as betting on
horses) isn’t banned in India and casino gambling is legal in Goa,
for example, under these Rules, all speech ‘promoting gambling’
is prohibited.&lt;/p&gt;
&lt;p&gt;The rules are very onerous on
intermediaries, since they require them to act within 36 hours to
disable access to any information that they receive a complaint
about.  Any 'affected person' can complain.  Intermediaries will now
play the role that judges have traditionally played. Any affected
person can bring forth a complaint about issues as diverse as
defamation, blasphemy, trademark infringement, threatening of
integrity of India, 'disparaging speech', or the blanket 'in
violation of any law'.  It is not made mandatory to give the actual
violator an opportunity to be heard, thus violating the cardinal
principle of natural justice of 'hearing the other party' before
denying them a fundamental right.  Many parts of the Internet are in
fact public spaces and constitute an online public sphere.  A law
requiring private parties to curb speech in such a public sphere is
unconstitutional insofar as it doesn't fall within Art.19(2) of the
Constitution.&lt;/p&gt;
&lt;p&gt;Since intermediaries would lose
protection from the law if they don't take down content, they have no
incentives to uphold freedom of speech of their users.  They instead
have been provided incentives to take down all content about which
they receive complaints without bothering to apply their minds and
coming to an actual conclusion that the content violates the rules.&lt;/p&gt;
&lt;h3&gt;Cybercafe rules&lt;/h3&gt;
&lt;p&gt;The cybercafe rules require all
cybercafe customers be identified with supporting documents, their
photographs taken, all their website visit history logged, and these
logs maintained for a year.  Compare this to the usage of public
pay-phones.  Anyone can use a pay-phone without their details being
logged.  Indeed, such logging allows for cybercafe owners to
blackmail their users if they find some embarrassing websites in the
history logs—which could be anything from medical diseases to
sexual orientation to the fact that you're a whistleblower.&lt;/p&gt;
&lt;p&gt;The cybercafe rules also require that
all of them install "commercially available safety or filtering
software" to prevent access to pornography.  In two cases along
these lines in the Madras High Court (&lt;em&gt;Karthikeyan R.&lt;/em&gt; v. &lt;em&gt;Union
of India&lt;/em&gt;) and the Bombay High Court (&lt;em&gt;Janhit Manch &lt;/em&gt;v.
&lt;em&gt;Union of India&lt;/em&gt;), the High Courts refused to direct the
government to take proactive steps to curb access to Internet
pornography stating that such matters require case-by-case analysis
to be constitutionally valid under Art.19(1)(a) [Right to freedom of
speech and expression].&lt;/p&gt;
&lt;p&gt;Such software tends to be very
ineffective—non-pornographic websites also get wrongly filtered,
and not all pornographic websites get filtered—and the High Courts
were right in being wary of any blanket ban. They preferred for
individual cases to be registered.  If the worry is that our children
are getting corrupted, it is up to parents to provide supervision,
and not for the government to insist that software do the parenting
instead.&lt;/p&gt;
&lt;p&gt;Given that all of these were pointed
out by both civil society organizations, news media, and industry
bodies, when the draft rules were released, it smacks of governmental
high-handedness that almost none of the changes suggested by the
public have been incorporated in the final rules.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/killing-the-internet-oped'&gt;https://cis-india.org/internet-governance/blog/killing-the-internet-oped&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2011-08-20T12:51:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act">
    <title>IT Leaders, Lawyers Welcome SC Ruling on 66A of the IT Act</title>
    <link>https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act</link>
    <description>
        &lt;b&gt;The Supreme Court of India has delivered a landmark judgment in scrapping section 66A of the Information Technology Act, which prescribed 'punishment for sending offensive messages through communication service, etc.' and had been branded as grossly 'unconstitutional' by various lawyers and legal advisors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog past was &lt;a class="external-link" href="http://www.cio.in/news/it-leaders,-lawyers-welcome-sc-ruling-on-66a-of-the-it-act"&gt;published by Cio.in&lt;/a&gt; on March 25, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Here's what 66A of the IT (Amendment) Act, 2008 stated: Any person who  sends, by means of a computer resource or a communication device,(a) any  information that is grossly offensive or has menacing character;(b) any  information which he knows to be false, but for the purpose of causing  annoyance, inconvenience, danger, obstruction, insult, injury, criminal  intimidation, enmity, hatred, or ill will, persistently by making use of  such computer resource or a communication device, or (c) any electronic  mail or electronic mail message for the purpose of causing annoyance or  inconvenience or to deceive or to mislead the addressee or recipient  about the origin of such messages, shall be punishable with imprisonment  for a term which may extend to three years and with fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the study conducted by the Centre for Internet and Society,  Bangalore, intermediaries over-comply and tend to take down even  legitimate information when they receive a takedown notice. There were  also several arrests made as a result. The most recent among which was  when a class XI student from Bareilly was arrested for sharing an  “objectionable” post on Facebook against senior Samajwadi party leader  and state Urban Development Minister, Azam Khan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling by the Supreme Court has not only been welcomed by Shreya  Singhal, the young law student who was among the first to challenge it  in the Supreme Court, but also lawyers, legal advisors as well as IT  leaders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a Policy Director with the Centre for Internet and  Society, Bangalore, and a graduate of the National Law School tweeted:  While the case is about 'Internet' censorship, the SC judgment is  against ALL censorship. That's important. #66A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Pavan Duggal, advocate, Supreme Court of India, Section 66A  symbolized the tyranny of ambiguous vague terms over the purity of  legitimate free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It represented a tool for suppressing bonafide free speech, which was  extensively misused. Sec 66A was a foe more than your friend. In  scrapping Sec 66A, Supreme Court has done a great service to the cause  of free speech of vibrant digital Indians. Digital free speech in India  owes a great deal to the SC ruling," said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various Indian IT leaders also expressed their satisfaction towards the apex court's ruling, and called it a balanced judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anjani Kumar, CIO, Safexpress says, the ruling is by and large, a  favorable one. “Previously, people who were writing against the  establishment were being harassed. However, with this ruling, the apex  court has protected the constitutional right of freedom of speech,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There will be freedom of speech and everyone will be able to express  their views openly on social media platforms. It will help maintain an  equilibrium over a period of time,” said T.G Dhandapani, group CIO, TVS  Motors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the general sentiment was fairly positive. Manas Mati, executive  director and technology head, Walt Disney said, “I think the Section  should not have been scrapped. Every person needs to be responsible and  accountable for what they post on social media.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accountable or not, the judgment clearly indicates that's there won't be  any arrests on the subjective interpretation of vague expressions such  as “grossly offensive” and “menacing character” etc. under section 66A  of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“However, the ruling is a very balanced one, with the court stating that  the government has the right to remove objectionable content, but not  arrest the person. The negative can be that some people go overboard on  social media and they need to be checked," Kumar said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act'&gt;https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T15:58:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;p&gt;Below is a chart depicting the 69A Draft Rules and the 69A Rules:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There was a lot of structural change between the draft rules and the official rules—many of the draft clauses were shuffled around and combined—but not a lot of change in content. Many of the changes that appear in the official rules serve to clarify parts of the draft rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three definitions were added under clause (2), two to clarify later references to a “designated officer” and a “nodal officer” and the third to indicate a form appended to the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (3) of the official rules then clarifies who shall be named the “designated officer”, which was not done in the draft rules as there was no inclusion of an official title of the officer who would have the responsibilities of the “designated officer”. Interestingly, clause (3) of the draft rules requires the Secretary of the Department of Information Technology, Ministry of Communications &amp;amp; Information Technology, Government of India to name an officer, whereas clause (3) of the official rules states that the “Central Government” shall designate an officer, a change in language that allows for much more flexibility on the government's part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) in the draft rules and clause (4) in the official rules deal with the designation of a Nodal Officer, but omitted in the official rules are responsibilities of the designated officer, which includes acting on the “direction of the indian competent court”. This responsibility does not appear in any part of the official rules. Further, clause (4) of the official rules requires the organizations implicated in the rules to publish the name of the Nodal Officer on their website; this is an addition to the draft rules, and a highly useful one at that. This is an important move towards some form of transparency in this contentious process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) of the official rules significantly clarifies clause (4) of the draft rules by stating that the designated officer may direct any Agency of the Government or intermediary to block access &lt;i&gt;once a request from the Nodal Officer has been received&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (7) of the official rules uses the word “information” instead of “computer resource”, which is used in the corresponding clause (12) in the draft rules, when referring to the offending object. This change in language significantly widens the scope of what can be considered offending under the rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-sections (2), (3) and (4) of clause (9) of the official rules are additions to the draft rules. Sub-section (2) is a significant addition, as it deals with the ability of the Secretary of the Department of Information Technology's ability to block for public access any information or part thereof without granting a hearing to the entity in control of the offending information &lt;i&gt;in a case of emergency nature. &lt;/i&gt;The request for blocking will then be brought before the committee of examination of request &lt;i&gt;within 48 hours of the issue of direction&lt;/i&gt;, meaning that the offending information could be blocked for two days without giving notice to the owner/controller of the information of the reason for the blockage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important clarification has been included in clause (15) of the official rules, which differs from clause (23) of the draft rules through the inclusion of the following phrase: “The Designated Officer shall maintain complete record of the &lt;i&gt;request received and action taken thereof &lt;/i&gt;[...] of the cases of blocking for public access”. This is a significant change from clause (23), which simply states that the “Designated Officer shall maintain complete &lt;i&gt;record&lt;/i&gt; [...] of the cases of blocking”. This could be seen as an important step towards transparency and accountability in the 69B process of blocking information for public access if clause (16) of the official rules did not state that all requests and complaints received and all actions taken thereof must be kept confidential, so the maintenance of records mentioned in clause (15) of the official rules appears to be only for internal record-keeping. However, just the fact that this information is being recording is a significant change from the draft rules, and may, if the sub-rules relating to confidentiality were to be changed, be useful data for the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:10:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">
    <title>Is the new ‘interception’ order old wine in a new bottle?</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</link>
    <description>
        &lt;b&gt;The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in &lt;a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Newslaundry.com&lt;/a&gt; on December 27, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On December 20, 2018, through an &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank"&gt;order&lt;/a&gt; issued by the Ministry of Home Affairs (MHA), 10 security  agencies—including the Intelligence Bureau, the Central Bureau of  Investigation, the Enforcement Directorate and the National  Investigation Agency—were listed as the intelligence agencies in India  with the power to intercept, monitor and decrypt "any information"  generated, transmitted, received, or stored in any computer under Rule 4  of the Information Technology (Procedure and Safeguards for  Interception, Monitoring and Decryption of Information) Rules, 2009,  framed under section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 21, the Press Information Bureau published a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&amp;amp;utm_medium=referral&amp;amp;PRID=1556945" target="_blank"&gt;press release&lt;/a&gt; providing clarifications to the previous day’s order. It said the  notification served to merely reaffirm the existing powers delegated to  the 10 agencies and that no new powers were conferred on them.  Additionally, the release also stated that “adequate safeguards” in the  IT Act and in the Telegraph Act to regulate these agencies’ powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presumably,  these safeguards refer to the Review Committee constituted to review  orders of interception and the  prior approval needed by the Competent  Authority—in this case, the secretary in the Ministry of Home Affairs in  the case of the Central government and the secretary in charge of the  Home Department in the case of the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in  the press release, the government has always had the power to authorise  intelligence agencies to submit requests to carry out the interception,  decryption, and monitoring of communications, under Rule 4 of the  Information Technology (Procedure and Safeguards for Interception,  Monitoring and Decryption of Information) Rules, 2009, framed under  section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering the implications of  this notification, it is important to look at it in the larger framework  of India’s surveillance regime, which is made up of a set of provisions  found across multiple laws and operating licenses with differing  standards and surveillance capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 5(2) of the  Indian Telegraph Act, 1885 allows the government (or an empowered  authority) to intercept or detain transmitted information on the grounds  of a public emergency, or in the interest of public safety if satisfied  that it is necessary or expedient so to do in the interests of the  sovereignty and integrity of India, the security of the State, friendly  relations with foreign states or public order or for preventing  incitement to the commission of an offence. This is supplemented by Rule  419A of the Indian Telegraph Rules, 1951, which gives further  directions for the interception of these messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-  Condition 42 of the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank"&gt;Unified Licence for Access Services&lt;/a&gt;,  mandates that every telecom service provider must facilitate the  application of the Indian Telegraph Act. Condition 42.2 specifically  mandates that the license holders must comply with Section 5 of the same  Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 69(1) of the Information Technology Act and  associated Rules allows for the interception, monitoring, and decryption  of information stored or transmitted  through any computer resource if  it is found to be necessary or expedient to do in the interest of the  sovereignty or integrity of India, defense of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any cognizable offence  relating to above or for investigation of any offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section  69B of the Information Technology Act and associated Rules empowers the  Centre to authorise any agency of the government to monitor and collect  traffic data “to enhance cyber security, and for identification,  analysis, and prevention of intrusion, or spread of computer contaminant  in the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably,  a key difference between the IT Act and the Telegraph Act in the  context of interception is that the Telegraph Act permits interception  for preventing incitement to the commission of an offence on the  condition of public emergency or in the interest of public safety while  the IT Act permits interception, monitoring, and decryption  of any  cognizable offence relating to above or for investigation of any  offence. Technically, this difference in surveillance capabilities and  grounds for interception could mean that different intelligence agencies  would be authorized to carry out respective surveillance capabilities  under each statute. Though the Telegraph Act and the associated Rule  419A do not contain an equivalent to Rule 4—&lt;a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank"&gt;nine Central Government agencies and one State Government agency&lt;/a&gt; have previously been authorized under the Act. The Central Government  agencies authorised under the Telegraph Act are the same as the ones  mentioned in the December 20 notification with the following  differences:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the Telegraph Act, the Research and Analysis  Wing (RAW) has the authority to intercept. However, the 2018  notification more specifically empowers  the Cabinet Secretariat of RAW  to issue requests for interception under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the  Telegraph Act, the Director General of Police, of concerned  state/Commissioner of Police, Delhi for Delhi Metro City Service Area,  has the authority to intercept. However, the 2018 notification  specifically authorises  the Commissioner of Police, New Delhi with the  power to issue requests for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"&gt; IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 &lt;/a&gt;under  69B of the IT Act  contain a provision similar to Rule 4 of the IT  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009 - allowing the government to authorize  agencies that can monitor and collect traffic data.  In 2016, the  Central Government &lt;a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank"&gt;authorised&lt;/a&gt; the Indian Computer Emergency Response Team to monitor and collect  traffic data, or information generated, transmitted, received, or stored  in any computer resource. This was an exercise of the power conferred  upon the Central Government by Section 69B(1) of the IT Act. However,  this notification does not reference Rule 4 of the IT Rules, thus it is  unclear if a  similar notification has been issued under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  it is accurate that the order does not confer new powers, areas of  concern that existed with India’s surveillance regime continue to remain  including the question of whether 69(1) and 69B and associated Rules  are &lt;a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank"&gt;constitutionally&lt;/a&gt; valid, the lack of t&lt;a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank"&gt;ransparency&lt;/a&gt; by the government and the prohibition of transparency by service providers, &lt;a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank"&gt;heavy handed &lt;/a&gt;penalties on service providers for non-compliance, and a lack of legal backing and &lt;a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank"&gt;oversight&lt;/a&gt; mechanisms for intelligence agencies. Some of these could be addressed  if the draft Data Protection Bill 2018 is enacted and the Puttaswamy  Judgement fully implemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MHA’s  order and the press release thereafter have served to  publicise and  provide needed clarity with respect to the powers vested in which  intelligence agencies in India under section 69(1) of the IT Act.  This  was previously unclear and could have posed a challenge to ensuring  oversight and accountability of actions taken by intelligence agencies  issuing requests under section 69(1) .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The publishing of the list  has subsequently served to raise questions and create a debate about key  issues concerning privacy, surveillance and state overreach. On &lt;a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank"&gt;December 24&lt;/a&gt;,  the order was challenged by advocate ML Sharma on the grounds of it  being illegal, unconstitutional and contrary to public interest. Sharma  in his contention also stated the need for the order to be tested on the  basis of the right to privacy established by the Supreme Court in  Puttaswamy which laid out the test of necessity, legality, and  proportionality. According to this test, any law that encroaches upon  the privacy of the individual will have to be justified in the context  of the right to life under Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also other  questions that exist. India has multiple laws enabling its surveillance  regime and though this notification clarifies which intelligence  agencies can intercept under the IT Act, it is still seemingly unclear  which intelligence agencies can monitor and collect traffic data under  the 69B Rules. It is also unclear what this order means for past  interceptions that have taken place by agencies on this list or agencies  outside of this list under section 69(1) and associated Rules of the IT  Act. Will these past interceptions possess the same evidentiary value  as interceptions made by the authorised agencies in the order?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2018-12-29T16:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure">
    <title>Is India’s website-blocking law constitutional? – I. Law &amp; procedure</title>
    <link>https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure</link>
    <description>
        &lt;b&gt;Section 69A of the Information Technology Act, 2000, along with its corresponding Rules, set out the procedure for blocking of websites in India. Over two posts, Geetha Hariharan examines the constitutional validity of Section 69A and the Blocking Rules. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Introduction&lt;/span&gt;:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000 (“&lt;strong&gt;IT Act&lt;/strong&gt;”) is no stranger to litigation or controversy. Since its enactment in 2000, the IT Act has come under stringent criticism, both for the alleged Constitutional infirmities of its provisions and Rules, as well as for the way it is implemented. In recent years, Sections 66A (re: criminal liability for offensive, annoying or inconveniencing online communications), 67A (re: obscene 69A (re: website-blocking) and 79 (re: intermediary liability) have all come under attack for these reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Today, these Sections and several others have been challenged before the Supreme Court. A total of ten cases, challenging various Sections of the IT Act, are being heard together by the Supreme Court. This is a welcome occasion, for the IT Act desperately needs judicial review. Nikhil Pahwa over at Medianama provides an &lt;/span&gt;&lt;a href="http://www.medianama.com/2014/12/223-if-a-law-requires-a-person-to-be-careful-it-is-not-violative-of-free-speech-notes-from-the-supreme-court/"&gt;update and the list of cases&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the challenged provisions are Section 66A, Section 79 and Section 69A. Section 66A was and continues to be used wantonly by the State and police. A student was &lt;a href="http://m.thehindu.com/news/national/andhra-pradesh/andhra-pradesh-law-student-arrested-for-facebook-comment-on-cyclone-hudhud/article6544417.ece/"&gt;recently arrested&lt;/a&gt; for a Twitter comment regarding Cyclone Hudhud, while anti-Modi comments led to several arrests earlier in the year (see &lt;a href="http://m.firstpost.com/politics/goa-facebook-user-faces-jail-term-for-anti-modi-comments-1538499.html"&gt;here&lt;/a&gt;, &lt;a href="http://www.hindustantimes.com/india-news/aap-activist-arrested-for-allegedly-forwarding-anti-modi-mms-in-karnataka/article1-1222788.aspx"&gt;here&lt;/a&gt; and &lt;a href="http://indianexpress.com/article/india/india-others/modi-on-negative-faces-list-principal-6-others-booked/"&gt;here&lt;/a&gt;). At CIS, we have previously subjected Section 66A to constitutional analyses. &lt;a href="http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act"&gt;Pranesh Prakash traced&lt;/a&gt; the genealogy of the Section and &lt;a href="http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A"&gt;its import&lt;/a&gt; in targeting offensive, annoying and inconveniencing communications and spam, while &lt;a href="http://cis-india.org/internet-governance/blog/two-arguments-against-the-constitutionality-of-section-66a"&gt;Gautam Bhatia examined&lt;/a&gt; the Section’s overbreadth and vagueness. The casual wording and potential for misuse of Section 79 and the Information Technology (Intermediaries Guidelines) Rules, 2011 &lt;a href="http://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"&gt;led Ujwala Uppaluri&lt;/a&gt; to offer strong arguments regarding their violation of Part III of the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar infirmities also handicap Section 69A and its Rules. This provision empowers the Central government and officers authorised by it to order the blocking of websites or webpages. Website-blocking is permissible for reasons enumerated in Section 69A, and in accordance with the process laid out in the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public (sic)) Rules, 2009 (“&lt;strong&gt;Blocking Rules&lt;/strong&gt;”). In our view, Section 69A and the Blocking Rules are also unconstitutional, and liable to be declared as such by the Supreme Court. We provide our analysis in this post and the next.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Section 69A, IT Act&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Section 69A and the Blocking Rules provide for website-blocking in accordance with enumerated reasons and process. The Section reads as follows:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;strong&gt;69A.&lt;/strong&gt; &lt;i&gt;Power to issue directions for blocking for public access of any information through any computer resource.- &lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;span&gt;(1) Where the Central Government or any of its officer specially authorized by it in this behalf is satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above, it may subject to the provisions of sub-sections (2) for reasons to be recorded in writing, by order direct any agency of the Government or intermediary to block access by the public or cause to be blocked for access by public any information generated, transmitted, received, stored or hosted in any computer resource. &lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;(2) The procedure and safeguards subject to which such blocking for access by the public may be carried out shall be such as may be prescribed. &lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;(3) The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;As you will notice, the Central government may block any information that is “&lt;i&gt;generated, transmitted, received, stored or hosted&lt;/i&gt;” in any computer. This will extend, clearly, to any webpage available and/or hosted in India. The Government can order website-blocks if it is satisfied of the necessity or expedience for this on the basis of (any of) six reasons. These reasons are:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty and integrity      of India,&lt;/li&gt;
&lt;li&gt;Defense of India,&lt;/li&gt;
&lt;li&gt;Security of the State,&lt;/li&gt;
&lt;li&gt;Friendly relations with      foreign states,&lt;/li&gt;
&lt;li&gt;Public order,&lt;/li&gt;
&lt;li&gt;Preventing incitement to      the commission of any cognizable offence relating to above.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If the Central government is convinced it has a valid reason, then it must follow the blocking procedure set out in the &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;Blocking Rules&lt;/a&gt;&lt;span&gt;, which were notified on 27 October 2009. Before entering into an analysis of the Blocking Rules, let us understand the blocking procedure.&lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;The Blocking Procedure&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;I will explain the blocking procedure in 4 steps: (1) Relevant designations and committees; (2) Procedure to make and examine a blocking request, and issue blocking direction; (3) Blocking in special circumstances; and (4) Review of blocking directions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;(1) Relevant designations and committees:&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Designated Officer (“&lt;strong&gt;DO&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;: The Central government notifies an officer not below the rank of Joint Secretary as the Designated Officer, who will issue the blocking direction ot the relevant intermediary or agency [Rule 3]. By a &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Gazette1_20082010(1).pdf"&gt;notification dated 20 January 2010&lt;/a&gt;, the DO is the Group Coordinator, Cyberlaw Division, Department of Information Technology (DIT). Unfortunately, I was unable to locate the Group Coordinator, Cyberlaw Division &lt;a href="http://deity.gov.in/content/people-and-offices"&gt;on the website&lt;/a&gt; of the Department of Electronics and Information Technology (DeitY, the name to which DIT was renamed in 2012). I am also unable to find a notification updating the designation of the DO. Presumably, Dr. Gulshan Rai, Director General (Cyberlaws &amp;amp; E-security), DeitY, continues to be the DO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Nodal Officer (“&lt;strong&gt;&lt;strong&gt;NO&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Every organization designates one of its officers as a Nodal Officer, who will receive blocking requests and forward them to the DO [Rule 4]. ‘Organisation’ is defined in Rule 2(g) as Ministries or Departments of the Government of India, State governments and Union Territories, and any Agency of the Central government notified in the Official Gazette. I am unable to find &lt;a href="http://deity.gov.in/content/notifications"&gt;on the DeitY website&lt;/a&gt; a notification explaining which government Agencies are ‘organisations’ under Rule 2(g).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Intermediary Contact&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Every intermediary also designates one person to receive and handle blocking directions from the DO [Rule 13].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Committee for Examination of Request (“&lt;strong&gt;&lt;strong&gt;CER&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: The 5-membered CER comprises the DO as Chairman, along with officers not below the rank of Joint Secretary from the Ministries of Law &amp;amp; Justice, Home Affairs, Information &amp;amp; Broadcasting and &lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert-dpl-rtoi"&gt;CERT-In&lt;/a&gt; [Rule 7]. The CER examines each blocking request, before issuing recommendations to the DO to block or not to block. Regrettably, I am unable to identify the current membership of the CER, as no document is available that gives this information. However, the CER’s composition in 2010 &lt;a href="http://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"&gt;may be gleaned&lt;/a&gt; (see Annexure III).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Review Committee (“&lt;strong&gt;&lt;strong&gt;RC&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Rule 2(i) defines the RC as the body set up under Rule 419A, Indian Telegraph Rules, 1951. &lt;a href="http://www.dot.gov.in/sites/default/files/358%20GI-2014%20dated%208.2.2014_6.pdf"&gt;As per Rule 419A(16)&lt;/a&gt;, the Central RC is constituted by the Cabinet Secretary, Secretary to the Government of India (Legal Affairs) and Secretary (Department of Telecom).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Blocking procedure&lt;/strong&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Blocking Rules stipulate that the entire blocking procedure, from examining a blocking request to issuing a blocking direction, must be carried out within 7 days from the date on which the DO receives the blocking request from the NO [Rule 11].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(a) Making a blocking request&lt;/span&gt;&lt;/strong&gt;: Any person may send a request for a website-block to an NO of any ‘organisation’ (“&lt;strong&gt;outside request&lt;/strong&gt;”). Alternatively, the NO may himself raise a blocking request. The organization has to examine each outside request and be satisfied that it meets the requirements of Section 69A(1), IT Act. Once it is satisfied, the NO forwards the blocking request to the DO. Outside requests must be approved by the Chief Secretary of the State or Union Territory, before they are sent to the DO. [See Rule 6 for this procedure]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(b) Examining a blocking request&lt;/span&gt;&lt;/strong&gt;: Once the DO receives a blocking request, he/she places it before the CER. The DO tries to identify the person/intermediary hosting the troubling information, and if identified, issues a notice seeking their representation before the CER. Foreign entities hosting the information are also informed over fax/email. The person/intermediary has 48 hours from the date of receiving the DO’s notice to make its representation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, the CER will examine the blocking request. It will “consider whether the request is covered within the scope of Section 69A(1)”, and whether it is justifiable to block [Rule 8(4)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(c) Blocking direction&lt;/span&gt;&lt;/strong&gt;: The DO then places the CER’s recommendation to block or not to block before the Secretary (DeitY) for his/her approval. If and once approval is granted, the DO directs the relevant Agency or intermediary to block the website/page.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Blocking in special circumstances&lt;/strong&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(a) Emergencies [Rule 9]&lt;/span&gt;&lt;/strong&gt;: In an emergency “when no delay is acceptable”, the DO passes over the blocking procedure described above. With written recommendations, the DO directly approaches the Secretary (DeitY) for approval of blocking request. If satisfied, the Secretary (DeitY) issues the blocking direction as an &lt;i&gt;interim measure&lt;/i&gt;. Nevertheless, the DO is required to place the blocking request before the CER at the earliest opportunity (in any case, not later than 48 hours after blocking direction).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(b) Court orders [Rule 10]&lt;/span&gt;&lt;/strong&gt;: If a court has ordered a website-block, the DO follows a procedure similar to an Emergency situation. He/she submits the certified copy of order to the Secretary (DeitY), and then initiates action as ordered by the court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(4) &lt;/strong&gt;&lt;strong&gt;Review of blocking directions&lt;/strong&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The RC is to meet once in 2 months to evaluate whether blocking directions issued under the Blocking Rules are in compliance with Section 69A(1) [Rule 14]. No other review or appeal mechanism is provided under the Blocking Rules. Nor are aggrieved parties afforded any further opportunities to be heard. Also note that Rule 16 mandates that all requests and complaints received under the Blocking Rules are to the kept strictly confidential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the next post, I will subject Section 69A and the Blocking Rules to a constitutional analysis.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Blocking procedure poster&lt;/span&gt;:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has produced a poster explaining the blocking procedure (&lt;a href="http://cis-india.org/internet-governance/blog/blocking-websites.pdf/at_download/file"&gt;download PDF&lt;/a&gt;, 2.037MB).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure'&gt;https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2014-12-11T11:02:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
