<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 51 to 65.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/invisible-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act">
    <title>IT Leaders, Lawyers Welcome SC Ruling on 66A of the IT Act</title>
    <link>https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act</link>
    <description>
        &lt;b&gt;The Supreme Court of India has delivered a landmark judgment in scrapping section 66A of the Information Technology Act, which prescribed 'punishment for sending offensive messages through communication service, etc.' and had been branded as grossly 'unconstitutional' by various lawyers and legal advisors.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog past was &lt;a class="external-link" href="http://www.cio.in/news/it-leaders,-lawyers-welcome-sc-ruling-on-66a-of-the-it-act"&gt;published by Cio.in&lt;/a&gt; on March 25, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Here's what 66A of the IT (Amendment) Act, 2008 stated: Any person who  sends, by means of a computer resource or a communication device,(a) any  information that is grossly offensive or has menacing character;(b) any  information which he knows to be false, but for the purpose of causing  annoyance, inconvenience, danger, obstruction, insult, injury, criminal  intimidation, enmity, hatred, or ill will, persistently by making use of  such computer resource or a communication device, or (c) any electronic  mail or electronic mail message for the purpose of causing annoyance or  inconvenience or to deceive or to mislead the addressee or recipient  about the origin of such messages, shall be punishable with imprisonment  for a term which may extend to three years and with fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the study conducted by the Centre for Internet and Society,  Bangalore, intermediaries over-comply and tend to take down even  legitimate information when they receive a takedown notice. There were  also several arrests made as a result. The most recent among which was  when a class XI student from Bareilly was arrested for sharing an  “objectionable” post on Facebook against senior Samajwadi party leader  and state Urban Development Minister, Azam Khan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ruling by the Supreme Court has not only been welcomed by Shreya  Singhal, the young law student who was among the first to challenge it  in the Supreme Court, but also lawyers, legal advisors as well as IT  leaders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a Policy Director with the Centre for Internet and  Society, Bangalore, and a graduate of the National Law School tweeted:  While the case is about 'Internet' censorship, the SC judgment is  against ALL censorship. That's important. #66A&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Pavan Duggal, advocate, Supreme Court of India, Section 66A  symbolized the tyranny of ambiguous vague terms over the purity of  legitimate free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It represented a tool for suppressing bonafide free speech, which was  extensively misused. Sec 66A was a foe more than your friend. In  scrapping Sec 66A, Supreme Court has done a great service to the cause  of free speech of vibrant digital Indians. Digital free speech in India  owes a great deal to the SC ruling," said Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various Indian IT leaders also expressed their satisfaction towards the apex court's ruling, and called it a balanced judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anjani Kumar, CIO, Safexpress says, the ruling is by and large, a  favorable one. “Previously, people who were writing against the  establishment were being harassed. However, with this ruling, the apex  court has protected the constitutional right of freedom of speech,” he  said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There will be freedom of speech and everyone will be able to express  their views openly on social media platforms. It will help maintain an  equilibrium over a period of time,” said T.G Dhandapani, group CIO, TVS  Motors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the general sentiment was fairly positive. Manas Mati, executive  director and technology head, Walt Disney said, “I think the Section  should not have been scrapped. Every person needs to be responsible and  accountable for what they post on social media.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accountable or not, the judgment clearly indicates that's there won't be  any arrests on the subjective interpretation of vague expressions such  as “grossly offensive” and “menacing character” etc. under section 66A  of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“However, the ruling is a very balanced one, with the court stating that  the government has the right to remove objectionable content, but not  arrest the person. The negative can be that some people go overboard on  social media and they need to be checked," Kumar said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act'&gt;https://cis-india.org/internet-governance/news/cio-in-march-25-2015-it-leaders%2C-lawyers-welcome-sc-ruling-on-66a-of-the-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T15:58:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;p&gt;Below is a chart depicting the 69A Draft Rules and the 69A Rules:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There was a lot of structural change between the draft rules and the official rules—many of the draft clauses were shuffled around and combined—but not a lot of change in content. Many of the changes that appear in the official rules serve to clarify parts of the draft rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three definitions were added under clause (2), two to clarify later references to a “designated officer” and a “nodal officer” and the third to indicate a form appended to the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (3) of the official rules then clarifies who shall be named the “designated officer”, which was not done in the draft rules as there was no inclusion of an official title of the officer who would have the responsibilities of the “designated officer”. Interestingly, clause (3) of the draft rules requires the Secretary of the Department of Information Technology, Ministry of Communications &amp;amp; Information Technology, Government of India to name an officer, whereas clause (3) of the official rules states that the “Central Government” shall designate an officer, a change in language that allows for much more flexibility on the government's part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) in the draft rules and clause (4) in the official rules deal with the designation of a Nodal Officer, but omitted in the official rules are responsibilities of the designated officer, which includes acting on the “direction of the indian competent court”. This responsibility does not appear in any part of the official rules. Further, clause (4) of the official rules requires the organizations implicated in the rules to publish the name of the Nodal Officer on their website; this is an addition to the draft rules, and a highly useful one at that. This is an important move towards some form of transparency in this contentious process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) of the official rules significantly clarifies clause (4) of the draft rules by stating that the designated officer may direct any Agency of the Government or intermediary to block access &lt;i&gt;once a request from the Nodal Officer has been received&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (7) of the official rules uses the word “information” instead of “computer resource”, which is used in the corresponding clause (12) in the draft rules, when referring to the offending object. This change in language significantly widens the scope of what can be considered offending under the rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-sections (2), (3) and (4) of clause (9) of the official rules are additions to the draft rules. Sub-section (2) is a significant addition, as it deals with the ability of the Secretary of the Department of Information Technology's ability to block for public access any information or part thereof without granting a hearing to the entity in control of the offending information &lt;i&gt;in a case of emergency nature. &lt;/i&gt;The request for blocking will then be brought before the committee of examination of request &lt;i&gt;within 48 hours of the issue of direction&lt;/i&gt;, meaning that the offending information could be blocked for two days without giving notice to the owner/controller of the information of the reason for the blockage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important clarification has been included in clause (15) of the official rules, which differs from clause (23) of the draft rules through the inclusion of the following phrase: “The Designated Officer shall maintain complete record of the &lt;i&gt;request received and action taken thereof &lt;/i&gt;[...] of the cases of blocking for public access”. This is a significant change from clause (23), which simply states that the “Designated Officer shall maintain complete &lt;i&gt;record&lt;/i&gt; [...] of the cases of blocking”. This could be seen as an important step towards transparency and accountability in the 69B process of blocking information for public access if clause (16) of the official rules did not state that all requests and complaints received and all actions taken thereof must be kept confidential, so the maintenance of records mentioned in clause (15) of the official rules appears to be only for internal record-keeping. However, just the fact that this information is being recording is a significant change from the draft rules, and may, if the sub-rules relating to confidentiality were to be changed, be useful data for the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:10:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">
    <title>Is the new ‘interception’ order old wine in a new bottle?</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</link>
    <description>
        &lt;b&gt;The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in &lt;a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Newslaundry.com&lt;/a&gt; on December 27, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On December 20, 2018, through an &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank"&gt;order&lt;/a&gt; issued by the Ministry of Home Affairs (MHA), 10 security  agencies—including the Intelligence Bureau, the Central Bureau of  Investigation, the Enforcement Directorate and the National  Investigation Agency—were listed as the intelligence agencies in India  with the power to intercept, monitor and decrypt "any information"  generated, transmitted, received, or stored in any computer under Rule 4  of the Information Technology (Procedure and Safeguards for  Interception, Monitoring and Decryption of Information) Rules, 2009,  framed under section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 21, the Press Information Bureau published a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&amp;amp;utm_medium=referral&amp;amp;PRID=1556945" target="_blank"&gt;press release&lt;/a&gt; providing clarifications to the previous day’s order. It said the  notification served to merely reaffirm the existing powers delegated to  the 10 agencies and that no new powers were conferred on them.  Additionally, the release also stated that “adequate safeguards” in the  IT Act and in the Telegraph Act to regulate these agencies’ powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presumably,  these safeguards refer to the Review Committee constituted to review  orders of interception and the  prior approval needed by the Competent  Authority—in this case, the secretary in the Ministry of Home Affairs in  the case of the Central government and the secretary in charge of the  Home Department in the case of the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in  the press release, the government has always had the power to authorise  intelligence agencies to submit requests to carry out the interception,  decryption, and monitoring of communications, under Rule 4 of the  Information Technology (Procedure and Safeguards for Interception,  Monitoring and Decryption of Information) Rules, 2009, framed under  section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering the implications of  this notification, it is important to look at it in the larger framework  of India’s surveillance regime, which is made up of a set of provisions  found across multiple laws and operating licenses with differing  standards and surveillance capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 5(2) of the  Indian Telegraph Act, 1885 allows the government (or an empowered  authority) to intercept or detain transmitted information on the grounds  of a public emergency, or in the interest of public safety if satisfied  that it is necessary or expedient so to do in the interests of the  sovereignty and integrity of India, the security of the State, friendly  relations with foreign states or public order or for preventing  incitement to the commission of an offence. This is supplemented by Rule  419A of the Indian Telegraph Rules, 1951, which gives further  directions for the interception of these messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-  Condition 42 of the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank"&gt;Unified Licence for Access Services&lt;/a&gt;,  mandates that every telecom service provider must facilitate the  application of the Indian Telegraph Act. Condition 42.2 specifically  mandates that the license holders must comply with Section 5 of the same  Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 69(1) of the Information Technology Act and  associated Rules allows for the interception, monitoring, and decryption  of information stored or transmitted  through any computer resource if  it is found to be necessary or expedient to do in the interest of the  sovereignty or integrity of India, defense of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any cognizable offence  relating to above or for investigation of any offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section  69B of the Information Technology Act and associated Rules empowers the  Centre to authorise any agency of the government to monitor and collect  traffic data “to enhance cyber security, and for identification,  analysis, and prevention of intrusion, or spread of computer contaminant  in the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably,  a key difference between the IT Act and the Telegraph Act in the  context of interception is that the Telegraph Act permits interception  for preventing incitement to the commission of an offence on the  condition of public emergency or in the interest of public safety while  the IT Act permits interception, monitoring, and decryption  of any  cognizable offence relating to above or for investigation of any  offence. Technically, this difference in surveillance capabilities and  grounds for interception could mean that different intelligence agencies  would be authorized to carry out respective surveillance capabilities  under each statute. Though the Telegraph Act and the associated Rule  419A do not contain an equivalent to Rule 4—&lt;a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank"&gt;nine Central Government agencies and one State Government agency&lt;/a&gt; have previously been authorized under the Act. The Central Government  agencies authorised under the Telegraph Act are the same as the ones  mentioned in the December 20 notification with the following  differences:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the Telegraph Act, the Research and Analysis  Wing (RAW) has the authority to intercept. However, the 2018  notification more specifically empowers  the Cabinet Secretariat of RAW  to issue requests for interception under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the  Telegraph Act, the Director General of Police, of concerned  state/Commissioner of Police, Delhi for Delhi Metro City Service Area,  has the authority to intercept. However, the 2018 notification  specifically authorises  the Commissioner of Police, New Delhi with the  power to issue requests for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"&gt; IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 &lt;/a&gt;under  69B of the IT Act  contain a provision similar to Rule 4 of the IT  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009 - allowing the government to authorize  agencies that can monitor and collect traffic data.  In 2016, the  Central Government &lt;a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank"&gt;authorised&lt;/a&gt; the Indian Computer Emergency Response Team to monitor and collect  traffic data, or information generated, transmitted, received, or stored  in any computer resource. This was an exercise of the power conferred  upon the Central Government by Section 69B(1) of the IT Act. However,  this notification does not reference Rule 4 of the IT Rules, thus it is  unclear if a  similar notification has been issued under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  it is accurate that the order does not confer new powers, areas of  concern that existed with India’s surveillance regime continue to remain  including the question of whether 69(1) and 69B and associated Rules  are &lt;a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank"&gt;constitutionally&lt;/a&gt; valid, the lack of t&lt;a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank"&gt;ransparency&lt;/a&gt; by the government and the prohibition of transparency by service providers, &lt;a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank"&gt;heavy handed &lt;/a&gt;penalties on service providers for non-compliance, and a lack of legal backing and &lt;a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank"&gt;oversight&lt;/a&gt; mechanisms for intelligence agencies. Some of these could be addressed  if the draft Data Protection Bill 2018 is enacted and the Puttaswamy  Judgement fully implemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MHA’s  order and the press release thereafter have served to  publicise and  provide needed clarity with respect to the powers vested in which  intelligence agencies in India under section 69(1) of the IT Act.  This  was previously unclear and could have posed a challenge to ensuring  oversight and accountability of actions taken by intelligence agencies  issuing requests under section 69(1) .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The publishing of the list  has subsequently served to raise questions and create a debate about key  issues concerning privacy, surveillance and state overreach. On &lt;a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank"&gt;December 24&lt;/a&gt;,  the order was challenged by advocate ML Sharma on the grounds of it  being illegal, unconstitutional and contrary to public interest. Sharma  in his contention also stated the need for the order to be tested on the  basis of the right to privacy established by the Supreme Court in  Puttaswamy which laid out the test of necessity, legality, and  proportionality. According to this test, any law that encroaches upon  the privacy of the individual will have to be justified in the context  of the right to life under Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also other  questions that exist. India has multiple laws enabling its surveillance  regime and though this notification clarifies which intelligence  agencies can intercept under the IT Act, it is still seemingly unclear  which intelligence agencies can monitor and collect traffic data under  the 69B Rules. It is also unclear what this order means for past  interceptions that have taken place by agencies on this list or agencies  outside of this list under section 69(1) and associated Rules of the IT  Act. Will these past interceptions possess the same evidentiary value  as interceptions made by the authorised agencies in the order?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2018-12-29T16:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure">
    <title>Is India’s website-blocking law constitutional? – I. Law &amp; procedure</title>
    <link>https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure</link>
    <description>
        &lt;b&gt;Section 69A of the Information Technology Act, 2000, along with its corresponding Rules, set out the procedure for blocking of websites in India. Over two posts, Geetha Hariharan examines the constitutional validity of Section 69A and the Blocking Rules. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Introduction&lt;/span&gt;:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000 (“&lt;strong&gt;IT Act&lt;/strong&gt;”) is no stranger to litigation or controversy. Since its enactment in 2000, the IT Act has come under stringent criticism, both for the alleged Constitutional infirmities of its provisions and Rules, as well as for the way it is implemented. In recent years, Sections 66A (re: criminal liability for offensive, annoying or inconveniencing online communications), 67A (re: obscene 69A (re: website-blocking) and 79 (re: intermediary liability) have all come under attack for these reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Today, these Sections and several others have been challenged before the Supreme Court. A total of ten cases, challenging various Sections of the IT Act, are being heard together by the Supreme Court. This is a welcome occasion, for the IT Act desperately needs judicial review. Nikhil Pahwa over at Medianama provides an &lt;/span&gt;&lt;a href="http://www.medianama.com/2014/12/223-if-a-law-requires-a-person-to-be-careful-it-is-not-violative-of-free-speech-notes-from-the-supreme-court/"&gt;update and the list of cases&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the challenged provisions are Section 66A, Section 79 and Section 69A. Section 66A was and continues to be used wantonly by the State and police. A student was &lt;a href="http://m.thehindu.com/news/national/andhra-pradesh/andhra-pradesh-law-student-arrested-for-facebook-comment-on-cyclone-hudhud/article6544417.ece/"&gt;recently arrested&lt;/a&gt; for a Twitter comment regarding Cyclone Hudhud, while anti-Modi comments led to several arrests earlier in the year (see &lt;a href="http://m.firstpost.com/politics/goa-facebook-user-faces-jail-term-for-anti-modi-comments-1538499.html"&gt;here&lt;/a&gt;, &lt;a href="http://www.hindustantimes.com/india-news/aap-activist-arrested-for-allegedly-forwarding-anti-modi-mms-in-karnataka/article1-1222788.aspx"&gt;here&lt;/a&gt; and &lt;a href="http://indianexpress.com/article/india/india-others/modi-on-negative-faces-list-principal-6-others-booked/"&gt;here&lt;/a&gt;). At CIS, we have previously subjected Section 66A to constitutional analyses. &lt;a href="http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act"&gt;Pranesh Prakash traced&lt;/a&gt; the genealogy of the Section and &lt;a href="http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A"&gt;its import&lt;/a&gt; in targeting offensive, annoying and inconveniencing communications and spam, while &lt;a href="http://cis-india.org/internet-governance/blog/two-arguments-against-the-constitutionality-of-section-66a"&gt;Gautam Bhatia examined&lt;/a&gt; the Section’s overbreadth and vagueness. The casual wording and potential for misuse of Section 79 and the Information Technology (Intermediaries Guidelines) Rules, 2011 &lt;a href="http://cis-india.org/internet-governance/constitutional-analysis-of-intermediaries-guidelines-rules"&gt;led Ujwala Uppaluri&lt;/a&gt; to offer strong arguments regarding their violation of Part III of the Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar infirmities also handicap Section 69A and its Rules. This provision empowers the Central government and officers authorised by it to order the blocking of websites or webpages. Website-blocking is permissible for reasons enumerated in Section 69A, and in accordance with the process laid out in the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public (sic)) Rules, 2009 (“&lt;strong&gt;Blocking Rules&lt;/strong&gt;”). In our view, Section 69A and the Blocking Rules are also unconstitutional, and liable to be declared as such by the Supreme Court. We provide our analysis in this post and the next.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Section 69A, IT Act&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Section 69A and the Blocking Rules provide for website-blocking in accordance with enumerated reasons and process. The Section reads as follows:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;strong&gt;69A.&lt;/strong&gt; &lt;i&gt;Power to issue directions for blocking for public access of any information through any computer resource.- &lt;/i&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;span&gt;(1) Where the Central Government or any of its officer specially authorized by it in this behalf is satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above, it may subject to the provisions of sub-sections (2) for reasons to be recorded in writing, by order direct any agency of the Government or intermediary to block access by the public or cause to be blocked for access by public any information generated, transmitted, received, stored or hosted in any computer resource. &lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;(2) The procedure and safeguards subject to which such blocking for access by the public may be carried out shall be such as may be prescribed. &lt;/span&gt;&lt;/blockquote&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;(3) The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.&lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;As you will notice, the Central government may block any information that is “&lt;i&gt;generated, transmitted, received, stored or hosted&lt;/i&gt;” in any computer. This will extend, clearly, to any webpage available and/or hosted in India. The Government can order website-blocks if it is satisfied of the necessity or expedience for this on the basis of (any of) six reasons. These reasons are:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty and integrity      of India,&lt;/li&gt;
&lt;li&gt;Defense of India,&lt;/li&gt;
&lt;li&gt;Security of the State,&lt;/li&gt;
&lt;li&gt;Friendly relations with      foreign states,&lt;/li&gt;
&lt;li&gt;Public order,&lt;/li&gt;
&lt;li&gt;Preventing incitement to      the commission of any cognizable offence relating to above.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;If the Central government is convinced it has a valid reason, then it must follow the blocking procedure set out in the &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009"&gt;Blocking Rules&lt;/a&gt;&lt;span&gt;, which were notified on 27 October 2009. Before entering into an analysis of the Blocking Rules, let us understand the blocking procedure.&lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;The Blocking Procedure&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;I will explain the blocking procedure in 4 steps: (1) Relevant designations and committees; (2) Procedure to make and examine a blocking request, and issue blocking direction; (3) Blocking in special circumstances; and (4) Review of blocking directions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;(1) Relevant designations and committees:&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Designated Officer (“&lt;strong&gt;DO&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;: The Central government notifies an officer not below the rank of Joint Secretary as the Designated Officer, who will issue the blocking direction ot the relevant intermediary or agency [Rule 3]. By a &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Gazette1_20082010(1).pdf"&gt;notification dated 20 January 2010&lt;/a&gt;, the DO is the Group Coordinator, Cyberlaw Division, Department of Information Technology (DIT). Unfortunately, I was unable to locate the Group Coordinator, Cyberlaw Division &lt;a href="http://deity.gov.in/content/people-and-offices"&gt;on the website&lt;/a&gt; of the Department of Electronics and Information Technology (DeitY, the name to which DIT was renamed in 2012). I am also unable to find a notification updating the designation of the DO. Presumably, Dr. Gulshan Rai, Director General (Cyberlaws &amp;amp; E-security), DeitY, continues to be the DO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Nodal Officer (“&lt;strong&gt;&lt;strong&gt;NO&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Every organization designates one of its officers as a Nodal Officer, who will receive blocking requests and forward them to the DO [Rule 4]. ‘Organisation’ is defined in Rule 2(g) as Ministries or Departments of the Government of India, State governments and Union Territories, and any Agency of the Central government notified in the Official Gazette. I am unable to find &lt;a href="http://deity.gov.in/content/notifications"&gt;on the DeitY website&lt;/a&gt; a notification explaining which government Agencies are ‘organisations’ under Rule 2(g).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Intermediary Contact&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Every intermediary also designates one person to receive and handle blocking directions from the DO [Rule 13].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Committee for Examination of Request (“&lt;strong&gt;&lt;strong&gt;CER&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: The 5-membered CER comprises the DO as Chairman, along with officers not below the rank of Joint Secretary from the Ministries of Law &amp;amp; Justice, Home Affairs, Information &amp;amp; Broadcasting and &lt;a href="http://deity.gov.in/content/indian-computer-emergency-response-team-cert-dpl-rtoi"&gt;CERT-In&lt;/a&gt; [Rule 7]. The CER examines each blocking request, before issuing recommendations to the DO to block or not to block. Regrettably, I am unable to identify the current membership of the CER, as no document is available that gives this information. However, the CER’s composition in 2010 &lt;a href="http://cis-india.org/internet-governance/dit-response-2nd-rti-blocking"&gt;may be gleaned&lt;/a&gt; (see Annexure III).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;Review Committee (“&lt;strong&gt;&lt;strong&gt;RC&lt;/strong&gt;&lt;/strong&gt;”)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;: Rule 2(i) defines the RC as the body set up under Rule 419A, Indian Telegraph Rules, 1951. &lt;a href="http://www.dot.gov.in/sites/default/files/358%20GI-2014%20dated%208.2.2014_6.pdf"&gt;As per Rule 419A(16)&lt;/a&gt;, the Central RC is constituted by the Cabinet Secretary, Secretary to the Government of India (Legal Affairs) and Secretary (Department of Telecom).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Blocking procedure&lt;/strong&gt;&lt;span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Blocking Rules stipulate that the entire blocking procedure, from examining a blocking request to issuing a blocking direction, must be carried out within 7 days from the date on which the DO receives the blocking request from the NO [Rule 11].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(a) Making a blocking request&lt;/span&gt;&lt;/strong&gt;: Any person may send a request for a website-block to an NO of any ‘organisation’ (“&lt;strong&gt;outside request&lt;/strong&gt;”). Alternatively, the NO may himself raise a blocking request. The organization has to examine each outside request and be satisfied that it meets the requirements of Section 69A(1), IT Act. Once it is satisfied, the NO forwards the blocking request to the DO. Outside requests must be approved by the Chief Secretary of the State or Union Territory, before they are sent to the DO. [See Rule 6 for this procedure]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(b) Examining a blocking request&lt;/span&gt;&lt;/strong&gt;: Once the DO receives a blocking request, he/she places it before the CER. The DO tries to identify the person/intermediary hosting the troubling information, and if identified, issues a notice seeking their representation before the CER. Foreign entities hosting the information are also informed over fax/email. The person/intermediary has 48 hours from the date of receiving the DO’s notice to make its representation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After this, the CER will examine the blocking request. It will “consider whether the request is covered within the scope of Section 69A(1)”, and whether it is justifiable to block [Rule 8(4)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(c) Blocking direction&lt;/span&gt;&lt;/strong&gt;: The DO then places the CER’s recommendation to block or not to block before the Secretary (DeitY) for his/her approval. If and once approval is granted, the DO directs the relevant Agency or intermediary to block the website/page.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Blocking in special circumstances&lt;/strong&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(a) Emergencies [Rule 9]&lt;/span&gt;&lt;/strong&gt;: In an emergency “when no delay is acceptable”, the DO passes over the blocking procedure described above. With written recommendations, the DO directly approaches the Secretary (DeitY) for approval of blocking request. If satisfied, the Secretary (DeitY) issues the blocking direction as an &lt;i&gt;interim measure&lt;/i&gt;. Nevertheless, the DO is required to place the blocking request before the CER at the earliest opportunity (in any case, not later than 48 hours after blocking direction).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;(b) Court orders [Rule 10]&lt;/span&gt;&lt;/strong&gt;: If a court has ordered a website-block, the DO follows a procedure similar to an Emergency situation. He/she submits the certified copy of order to the Secretary (DeitY), and then initiates action as ordered by the court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;(4) &lt;/strong&gt;&lt;strong&gt;Review of blocking directions&lt;/strong&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The RC is to meet once in 2 months to evaluate whether blocking directions issued under the Blocking Rules are in compliance with Section 69A(1) [Rule 14]. No other review or appeal mechanism is provided under the Blocking Rules. Nor are aggrieved parties afforded any further opportunities to be heard. Also note that Rule 16 mandates that all requests and complaints received under the Blocking Rules are to the kept strictly confidential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the next post, I will subject Section 69A and the Blocking Rules to a constitutional analysis.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;span&gt;Blocking procedure poster&lt;/span&gt;:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has produced a poster explaining the blocking procedure (&lt;a href="http://cis-india.org/internet-governance/blog/blocking-websites.pdf/at_download/file"&gt;download PDF&lt;/a&gt;, 2.037MB).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure'&gt;https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2014-12-11T11:02:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/invisible-censorship">
    <title>Invisible Censorship: How the Government Censors Without Being Seen</title>
    <link>https://cis-india.org/internet-governance/invisible-censorship</link>
    <description>
        &lt;b&gt;The Indian government wants to censor the Internet without being seen to be censoring the Internet.  This article by Pranesh Prakash shows how the government has been able to achieve this through the Information Technology Act and the Intermediary Guidelines Rules it passed in April 2011.  It now wants methods of censorship that leave even fewer traces, which is why Mr. Kapil Sibal, Union Minister for Communications and Information Technology talks of Internet 'self-regulation', and has brought about an amendment of the Copyright Act that requires instant removal of content.&lt;/b&gt;
        
&lt;h2&gt;Power of the Internet and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;The Internet, as anyone who has ever experienced the wonder of going online would know, is a very different communications platform from any that has existed before.&amp;nbsp; It is the one medium where anybody can directly share their thoughts with billions of other people in an instant.&amp;nbsp; People who would never have any chance of being published in a newspaper now have the opportunity to have a blog and provide their thoughts to the world.&amp;nbsp; This also means that thoughts that many newspapers would decide not to publish can be published online since the Web does not, and more importantly cannot, have any editors to filter content.&amp;nbsp; For many dictatorships, the right of people to freely express their thoughts is something that must be heavily regulated.&amp;nbsp; Unfortunately, we are now faced with the situation where some democratic countries are also trying to do so by censoring the Internet.&lt;/p&gt;
&lt;h2&gt;Intermediary Guidelines Rules&lt;/h2&gt;
&lt;p&gt;In India, the new &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;'Intermediary Guidelines' Rules&lt;/a&gt; and the &lt;a class="external-link" href="http://mit.gov.in/sites/upload_files/dit/files/GSR315E_10511%281%29.pdf"&gt;Cyber Cafe Rules&lt;/a&gt; that have been in effect since April 2011 give not only the government, but all citizens of India, great powers to censor the Internet.&amp;nbsp; These rules, which were made by the Department of Information Technology and not by the Parliament, require that all intermediaries remove content that is 'disparaging', 'relating to... gambling', 'harm minors in any way', to which the user 'does not have rights'.&amp;nbsp; When was the last time you checked wither you had 'rights' to a joke before forwarding it?&amp;nbsp; Did you share a Twitter message containing the term "#IdiotKapilSibal", as thousands of people did a few days ago?&amp;nbsp; Well, that is 'disparaging', and Twitter is required by the new law to block all such content.&amp;nbsp; The government of Sikkim can run advertisements for its PlayWin lottery in newspapers, but under the new law it cannot do so online.&amp;nbsp; As you can see, through these ridiculous examples, the Intermediary Guidelines are very badly thought-out and their drafting is even worse.&amp;nbsp; Worst of all, they are unconstitutional, as they put limits on freedom of speech that contravene &lt;a class="external-link" href="http://lawmin.nic.in/coi/coiason29july08.pdf"&gt;Article 19(1)(a) and 19(2) of the Constitution&lt;/a&gt;, and do so in a manner that lacks any semblance of due process and fairness.&lt;/p&gt;
&lt;h2&gt;Excessive Censoring by Internet Companies&lt;/h2&gt;
&lt;p&gt;We, at the Centre for Internet and Society in Bangalore, decided to test the censorship powers of the new rules by sending frivolous complaints to a number of intermediaries.&amp;nbsp; Six out of seven intermediaries removed content, including search results listings, on the basis of the most ridiculous complaints.&amp;nbsp; The people whose content was removed were not told, nor was the general public informed that the content was removed.&amp;nbsp; If we hadn't kept track, it would be as though that content never existed.&amp;nbsp; Such censorship existed during Stalin's rule in the Soviet Union.&amp;nbsp; Not even during the Emergency has such censorship ever existed in India.&amp;nbsp; Yet, not only was what the Internet companies did legal under the Intermediary Guideline Rules, but if they had not, they could have been punished for content put up by someone else.&amp;nbsp; That is like punishing the post office for the harmful letters that people may send over post.&lt;/p&gt;
&lt;h2&gt;Government Has Powers to Censor and Already Censors&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Currently, the government can either block content by using section 69A of the Information Technology Act (which can be revealed using RTI), or it has to send requests to the Internet companies to get content removed.&amp;nbsp; Google has released statistics of government request for content removal as part of its Transparency Report.&amp;nbsp; While Mr. Sibal uses the examples of communally sensitive material as a reason to force censorship of the Internet, out of the 358 items requested to be removed from January 2011 to June 2011 from Google service by the Indian government (including state governments), only 8 were for hate speech and only 1 was for national security.&amp;nbsp; Instead, 255 items (71 per cent of all requests) were asked to be removed for 'government criticism'.&amp;nbsp; Google, despite the government in India not having the powers to ban government criticism due to the Constitution, complied in 51 per cent of all requests. That means they removed many instances of government criticism as well.&lt;/p&gt;
&lt;h2&gt;'Self-Regulation': Undetectable Censorship&lt;/h2&gt;
&lt;p&gt;Mr. Sibal's more recent efforts at forcing major Internet companies such as Indiatimes, Facebook, Google, Yahoo, and Microsoft, to 'self-regulate' reveals a desire to gain ever greater powers to bypass the IT Act when censoring Internet content that is 'objectionable' (to the government).&amp;nbsp;&amp;nbsp; Mr. Sibal also wants to avoid embarrassing statistics such as that revealed by Google's Transparency Report. He wants Internet companies to 'self-regulate' user-uploaded content, so that the government would never have to send these requests for removal in the first place, nor block sites officially using the IT Act.&amp;nbsp; If the government was indeed sincere about its motives, it would not be talking about 'transparency' and 'dialogue' only after it was exposed in the press that the Department of Information Technology was holding secret talks with Internet companies.&amp;nbsp; Given the clandestine manner in which it sought to bring about these new censorship measures, the motives of the government are suspect.&amp;nbsp; Yet, both Mr. Sibal and Mr. Sachin Pilot have been insisting that the government has no plans of Internet censorship, and Mr. Pilot has made that statement officially in the Lok Sabha.&amp;nbsp; This, thus seems to be an instance of censoring without censorship.&lt;/p&gt;
&lt;h2&gt;Backdoor Censorship through Copyright Act&lt;/h2&gt;
&lt;p&gt;Further, since the government cannot bring about censorship laws in a straightforward manner, they are trying to do so surreptitiously, through the back door.&amp;nbsp; Mr. Sibal's latest proposed amendment to the Copyright Act, which is before the Rajya Sabha right now, has a provision called section 52(1)(c) by which anyone can send a notice complaining about infringement of his copyright.&amp;nbsp; The Internet company will have to remove the content immediately without question, even if the notice is false or malicious.&amp;nbsp; The sender of false or malicious notices is not penalized. But the Internet company will be penalized if it doesn't remove the content that has been complained about.&amp;nbsp; The complaint need not even be shown to be true before the content is removed.&amp;nbsp; Indeed, anyone can complain about any content, without even having to show that they own the rights to that content.&amp;nbsp; The government seems to be keen to have the power to remove content from the Internet without following any 'due process' or fair procedure.&amp;nbsp; Indeed, it not only wants to give itself this power, but it is keen on giving all individuals this power.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;It's ultimate effect will be the death of the Internet as we know it.&amp;nbsp; Bid adieu to it while there is still time.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/invisible-censorship.pdf" class="internal-link" title="Invisible Censorship (Marathi version)"&gt;The article was translated to Marathi and featured in Lokmat&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/invisible-censorship'&gt;https://cis-india.org/internet-governance/invisible-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-04T08:59:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs">
    <title>Internet Rights and Wrongs</title>
    <link>https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs</link>
    <description>
        &lt;b&gt;With a rise in PIL's for unwarranted censorship, do we need to step back and inspect if it's about time unreasonable trends are checked?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in India Today on September 1, 2016. The original piece &lt;a class="external-link" href="http://indiatoday.intoday.in/story/internet-isp-websites-censorship/1/754038.html"&gt;can be read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last few weeks, there have been a number of cases of egregious censorship of websites in India. Many people started seeing notices that (incorrectly) gave an impression that they may end up in jail if they visited certain websites. However, these notices weren't an isolated phenomenon, nor one that is new. Worryingly, the higher judiciary has been drawn into these questionable moves to block websites as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since 2011, numerous torrent search engines and communities have been blocked by Indian internet service providers (ISPs). Torrent search engines provide the same functionality for torrents that Google provides for websites. Are copyright infringing materials indexed and made searchable by Google? Yes. Do we shut down Google for this reason? No. However, that is precisely what private entertainment companies have done over the past five years in India. Companies hired by the producers of Tamil movies Singham and 3 managed to get video-sharing websites like Vimeo, Dailymotion and numerous torrent search engines blocked even before the movies released, without showing even a single case of copyright infringement existed on any of them. During the FIFA World Cup, Sony even managed to get Google Docs blocked. In some cases, these entertainment companies have abused 'John Doe' orders (generic orders that allow copyright enforcement against unnamed persons) and have asked ISPs to block websites. The ISPs, instead of ignoring such requests as instances of private censorship, have also complied. In other cases (like Sony's FIFA World Cup case), courts have ordered ISPs to block hundreds of websites without any copyright infringement proven against them. High court judges haven't even developed a coherent theory on whether or how Indian law allows them to block websites for alleged copyright infringement. Still they have gone ahead and blocked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, hackers got into Reliance Communications servers and released a list of websites blocked by them. The list contained multiple links that sought to connect Satish Seth-a group MD in Reliance ADA Group-to the 2G scam: a clear case of secretive private censorship by RCom. Further, visiting some of the YouTube links which pertained to Satish Seth showed that they had been removed by YouTube due to dubious copyright infringement complaints filed by Reliance BIG Entertainment. Did the department of telecom, whose licences forbid ISPs from engaging in private censorship, take any action against RCom? No. Earlier this year, Tata Sky filed a complaint against YouTube in the Delhi High Court, noting that there were videos on it that taught people how to tweak their set-top boxes to get around the technological locks that Tata Sky had placed. The Delhi HC ordered YouTube "not to host content that violates any law for the time being in force", presuming that the videos in question did in fact violate Indian law. They cite two sections: Section 65A of the Copyright Act and Section 66 of the Information Technology Act. The first explicitly allows a user to break technological locks of the kind that Tata Sky has placed for dozens of reasons (and allows a person to teach others how to engage in such breaking), whereas the second requires finding of "dishonesty" or "fraud" along with "damage to a computer system, etc", and an intention to violate the law-none of which were found. The court effectively blocked videos on YouTube without any finding of illegality, thus once again siding with censorial corporations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2013, Indore-based lawyer Kamlesh Vaswani filed a PIL in the Supreme Court calling for the government to undertake proactive blocking of all online pornography. Normally, a PIL is only admittable under Article 32 of the Constitution, on the basis of a violation of a fundamental right (which are listed in Part III of our Constitution). Vaswani's petition-which I have had the misfortune of having read carefully-does not at any point complain that the state is violating a fundamental right by not blocking pornography. Yet the petition wants to curb the fundamental right to freedom of expression, since the government is by no means in a position to determine what constitutes illegal pornography and what doesn't.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The larger problem extends to the now-discredited censor board (headed by the notorious Pahlaj Nihalani), as also the self-censorship practised on TV by the private Indian Broadcasters Federation (which even bleeps out words and phrases like 'Jesus', 'period', 'breast cancer' and 'beef'). 'Swachh Bharat' should not mean sanitising all media to be unobjectionable to the person with the lowest outrage threshold. So who will file a PIL against excessive censorship?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs'&gt;https://cis-india.org/internet-governance/blog/india-today-september-1-2016-pranesh-prakash-internet-rights-and-wrongs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2016-09-22T23:36:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion">
    <title>Internet censorship will continue in opaque fashion</title>
    <link>https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion</link>
    <description>
        &lt;b&gt;A division bench of the Supreme Court has ruled on three sections of the Information Technology Act 2000 - Section 66A, Section 79 and Section 69A. The draconian Section 66A was originally meant to tackle spam and cyber-stalking but was used by the powerful elite to crack down on online dissent and criticism.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sunil Abraham was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bengaluru/Internet-censorship-will-continue-in-opaque-fashion/articleshow/46681490.cms"&gt;Times of India&lt;/a&gt; on March 25, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Section 79 was meant to give immunity to internet intermediaries for  liability emerging from third-party speech, but it had a chilling effect  on free speech because intermediaries erred on the side of caution when  it came to deciding whether the content was legal or illegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Section 69A was the web blocking or internet censorship provision,  but the procedure prescribed did not adhere to the principles of natural  justice and transparency. For instance, when books are banned by  courts, the public is informed of such bans but when websites are banned  in India, there's no clear message from the Internet Service Provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court upheld 69A, so web blocking and internet censorship in  India will continue to happen in an opaque fashion which is worrying.  But on 66A and 79, the landmark judgment protects the right to free  speech and expression. It struck down 66A in entirety, saying the vague  and imprecise language made the provision unconstitutional and it  interfered with "the right of the people to know - the market place of  ideas - which the internet provides to persons of all kinds". However,  it only read down Section 79 saying "unlawful acts beyond what is laid  down" as reasonable restrictions to the right to free speech in the  Constitution "obviously cannot form any part" of the section. In short,  the court has eliminated any additional restrictions for speech online  even though it admitted that the internet is "intelligibly different"  from traditional media and might require additional laws to be passed by  the  Indian Parliament."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion'&gt;https://cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T02:07:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009">
    <title>Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009</title>
    <link>https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009</link>
    <description>
        &lt;b&gt;Rules under section 69(2) of the Information Technology Act, 2008 (after the 2008 amendment).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;G.S.R. 780 (E).— In exercise of the powers conferred by clause (y) of sub-section (2) of section 87, read with sub-section (2) of section 69 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Short title and commencement.&lt;/b&gt;—&lt;/p&gt;
&lt;p&gt;(1) These rules may be called the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p&gt;(2)   They shall come into force on the date of their publication in the Official Gazette.&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Definitions.&lt;/b&gt;— In these rules, unless the context otherwise requires,--&lt;/p&gt;
&lt;p&gt;(a) “Act” means the Information Technology Act, 2000 (21 of 2000);&lt;/p&gt;
&lt;p&gt;(b) “communication” means dissemination, transmission, carriage of information or signal in some manner and include both a direct communication and an indirect communication”;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c)   “communication link” means the use of satellite, microwave, radio, terrestrial line, wire, wireless or any other communication media to inter-connect computer resource;&lt;/p&gt;
&lt;p&gt;(d)   “competent authority” means--&lt;/p&gt;
&lt;p&gt;(i)     the Secretary in the Ministry of Home Affairs, in case of the Central Government; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii)   the Secretary in charge of the Home Department, in case of a State Government or Union territory, as the case may be;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) “computer resource” means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “decryption” means the process of conversion of information in non-intelligible form to an intelligible form via a mathematical formula, code, password or algorithm or a combination thereof;&lt;/p&gt;
&lt;p&gt;(g) “decryption assistance” means any assistance to--&lt;/p&gt;
&lt;p&gt;(i)     allow access, to the extent possible, to encrypted information; or&lt;/p&gt;
&lt;p&gt;(ii)   facilitate conversion of encrypted information into an intelligible form;&lt;/p&gt;
&lt;p&gt;(h) “decryption direction” means a direction issued under Rule (3) in which a decryption key holder is directed to--&lt;/p&gt;
&lt;p&gt;(i)     disclose a decryption key; or&lt;/p&gt;
&lt;p&gt;(ii)   provide decryption assistance in respect of encrypted information&lt;/p&gt;
&lt;p&gt;(i)   “decryption key” means any key, mathematical formula, code, password, algorithm or any other data which is used to--&lt;/p&gt;
&lt;p&gt;(i) allow access to encrypted information; or&lt;/p&gt;
&lt;p&gt;(ii) facilitate the conversion of encrypted information into an intelligible form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “decryption key holder” means any person who deploys the decryption mechanism and who is in possession of a decryption key for purposes of subsequent decryption of encrypted information relating to direct or indirect communications;&lt;/p&gt;
&lt;p&gt;(k) “information” means information as defined in clause (v) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(l)  “intercept” with its grammatical variations and cognate expressions, means the aural or other acquisition of the contents of any information through the use of any means, including an interception device, so as to make some or all of the contents of an information available to a person other than the sender or recipient or intended recipient of that communication, and includes--&lt;/p&gt;
&lt;p&gt;(a) monitoring of any such information by means of a monitoring device;&lt;/p&gt;
&lt;p&gt;(b) viewing, examination or inspection of the contents of any direct or indirect information; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) diversion of any direct or indirect information from its intended destination to any other destination to any other destination;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “interception device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to intercept any information; and any reference to an “interception device” includes, where applicable, a reference to a “monitoring device”;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “intermediary” means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “monitor” with its grammatical variations and cognate expressions, includes to view or to inspect or listen to or record information by means of a monitoring device;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “monitoring device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to view or to inspect or listen to or record any information;&lt;/p&gt;
&lt;p&gt;(q) “Review Committee” means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Direction for interception or monitoring or decryption of any information.&lt;/b&gt;— No person shall carry out the interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub-section (2) of section 69 of the Act, except by an order issued by the competent authority;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that in an unavoidable circumstances, such order may be issued by an officer, not below the rank of Joint Secretary of the Government of India, who has been duly authorised by the competent authority;&lt;/p&gt;
&lt;p&gt;Provided further that in a case of emergency--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i)     in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii)   for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource is not feasible,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;the interception or monitoring of decryption of any information generated, transmitted, received or stored in any computer resource may be carried out with the prior approval of the Head or the second senior most officer of the security and law enforcement agency (hereinafter referred to as the said security agency) at the Central level and the officer authorised in this behalf, not below the rank of the inspector General of Police or an officer of equivalent rank, at the State or Union territory level;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided also that the officer, who approved such interception or monitoring or decryption of information in case of emergency, shall inform in writing to the competent authority about the emergency and of such interception or monitoring or decryption within three working days and obtain the approval of the competent authority thereon within a period of seven working days and if the approval of competent authority is not obtained within the said period of seven working days, such interception or monitoring or decryption shall cease and the information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the competent authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Authorisation of agency of Government.&lt;/b&gt;— The competent authority may authorise an agency of the Government to intercept, monitor or decrypt information generated, transmitted received or stored in any computer resource for the purpose specified in sub-section (1) of section 69 of the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Issue of decryption direction by competent authority.&lt;/b&gt;— The competent authority may, under Rule (3), give any decryption direction to the decryption key holder for decryption of any information involving a computer resource or part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Interception or monitoring or decryption of information by a State beyond its jurisdiction.&lt;/b&gt;— Notwithstanding anything contained in Rule (3), if a State Government or Union territory Administration requires any interception or monitoring or decryption of information beyond its territorial jurisdiction, the Secretary in-charge of the Home Department in that State or Union territory, as the case may be, shall make a request to the Secretary in the Ministry of Home Affairs, Government of India for issuing direction to the appropriate authority for such interception or monitoring or decryption of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Contents for direction.&lt;/b&gt;— Any direction issued by the competent authority under Rule (3) shall contain reasons for such direction and a copy of such direction shall be forwarded to the Review Committee within a period of seven working days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Competent authority to consider alternative means in acquiring information.&lt;/b&gt;— The competent authority shall, before issuing any direction under Rule (3), consider possibility of acquiring the necessary information by other means and the direction under Rule (3) shall be issued only when it is not possible to acquire the information by any other reasonable means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Direction of interception or monitoring or decryption of any specific information.&lt;/b&gt;— The direction of interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource shall be of any information as is sent to or from any person or class of persons or relating to any particular subject whether such information or class of information are received with one or more computer resources, or being a computer resource likely to be used for the generation, transmission, receiving, storing of information from or to one particular person or one or many set of premises, as may be specified or described in the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;b&gt;Direction to specify the name and designation of the officer to whom information to be disclosed.&lt;/b&gt;— Every directions under Rule (3) shall specify the name and designation of the officer of the authorised agency to whom the intercepted or monitored or decrypted or stored information shall be disclosed and also specify that the use of intercepted or monitored or decrypted information shall be subject to the provisions of sub-section (1) of section 69 of the said Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;b&gt;Period within which direction shall remain in force.&lt;/b&gt;— The direction for interception or monitoring or decryption shall remain in force, unless revoked earlier, for a period not exceeding sixty days from the date of its issue and may be renewed from time to time for such period not exceeding the total period of one hundred and eighty days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;b&gt;Authorised agency to designate nodal officer.&lt;/b&gt;— The agency authorised by the competent authority under Rule (4) shall designate one or more nodal officer, not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisition conveying direction issued under Rule (3) for interception or monitoring or decryption to the designated officers of the concerned intermediaries or person in-charge of computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that an officer, not below the rank of Inspector of Police or officer of equivalent rank, shall deliver the requisition to the designated officer of the intermediary.&lt;/p&gt;
&lt;p&gt;13. &lt;b&gt;Intermediary to provide facilities, etc.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The officer issuing the requisition conveying direction issued under Rule (3) for interception or monitoring or decryption of information shall also make a request in writing to the designated officers of intermediary or person in-charge of computer resources, to provide all facilities, co-operation and assistance for interception or monitoring or decryption mentioned in the directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) On the receipt of request under sub-rule (1), the designated officers of intermediary or person in-charge of computer resources, shall provide all facilitates, co-operation and assistance for interception or monitoring or decryption of information mentioned in the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Any direction of decryption of information issued under Rule (3) to intermediary shall be limited to the extent the information is encrypted by the intermediary or the intermediary has control over the decryption key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;b&gt;Intermediary to designate officers to receive and handle.&lt;/b&gt;— Every intermediary or person in-charge of computer resource shall designate an officer to receive requisition, and another officer to handle such requisition, from the nodal officer for interception or monitoring or decryption of information generation, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;b&gt;Acknowledgement of instruction.&lt;/b&gt;— The designated officer of the intermediary or person in-charge of computer resources shall acknowledge the instructions received by him through letters or fax or e-mail signed with electronic signature to the nodal officer of the concerned agency within two hours on receipt of such intimation or direction for interception or monitoring or decryption of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;b&gt;Maintenance of records by designated officer.&lt;/b&gt;— The designated officer of intermediary or person in-charge of computer resource authorised to intercept or monitor or decrypt any information shall maintain proper records mentioning therein, the intercepted or monitored or decrypted information, the particulars of persons, computer resource, e-mail account, website address, etc. whose information has been intercepted or monitored or decrypted, the name and other particulars of the officer or the authority to whom the intercepted or monitored or decrypted information has been disclosed, the number of copies, including corresponding electronic records of the intercepted or monitored or decrypted information made and the mode of the method by which such copies, including corresponding electronic records are made, the date of destruction of the copies, including corresponding electronic record and the duration within which the directions remain in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;b&gt;Decryption key holder to disclose decryption key or provide decryption assistance.&lt;/b&gt;— If a decryption direction or a copy thereof is handed to the decryption key holder to whom the decryption direction is addressed by the nodal officer referred to in Rule (12), the decryption key holder shall within the period mentioned in the decryption direction--&lt;/p&gt;
&lt;p&gt;(a) disclose the decryption key; or&lt;/p&gt;
&lt;p&gt;(b) provide the decryption assistance,&lt;/p&gt;
&lt;p&gt;specified in the decryption direction to the concerned authorised person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;b&gt;Submission of the list of interception or monitoring or decryption of information.&lt;/b&gt;—                             &lt;br /&gt;(1) The designated officers of the intermediary or person in-charge of computer resources shall forward in every fifteen days a list of interception or monitoring or decryption authorisations received by them during the preceding fortnight to the nodal officers of the agencies authorised under Rule (4) for confirmation of the authenticity of such authorisations.                                                                     &lt;br /&gt;(2) The list referred to in sub-rule (1) shall include details, such as the reference and date of orders of the concerned competent authority including any order issued under emergency cases, date and time of receipt of such order and the date and time of implementation of such order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;b&gt;Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information.&lt;/b&gt;— The intermediary or the person in-charge of the computer resource so directed under Rule (3), shall provide technical assistance and the equipment including hardware, software, firmware, storage, interface and access to the equipment wherever requested by the agency authorised under Rule (4) for performing interception or monitoring or decryption including for the purposes of--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) the installation of equipment of the agency authorised under Rule (4) for the purposes of interception or monitoring or decryption or accessing stored information in accordance with directions by the nodal officer; or&lt;/p&gt;
&lt;p&gt;(ii) the maintenance, testing or use of such equipment; or&lt;/p&gt;
&lt;p&gt;(iii) the removal of such equipment; or&lt;/p&gt;
&lt;p&gt;(iv) the performance of any action required for accessing of stored information under the direction issued by the competent authority under Rule (3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;b&gt;Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall put in place adequate and effective internal checks to ensure the unauthorised interception of information does not take place and extreme secrecy is maintained and utmost care and precaution shall be taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary and no other person of the intermediary or person in-charge of computer resources shall have access to such intercepted or monitored or decrypted information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;b&gt;Responsibility of intermediary.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall be responsible for any action of their employees also and in case of violation pertaining to maintenance of secrecy and confidentiality of information or any unauthorised interception or monitoring or decryption of information, the intermediary or person in-charge of computer resources shall be liable for any action under the relevant provisions of the laws for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. &lt;b&gt;Review of directions of competent authority.&lt;/b&gt;— The Review Committee shall meet at least once in two months and record its findings whether the directions issued under Rule (3) are in accordance with the provisions of sub-section (2) of section 69 of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issues order for destruction of the copies, including corresponding electronic record of the intercepted or monitored or decrypted information.&lt;/p&gt;
&lt;p&gt;23. &lt;b&gt;Destruction of records of interception or monitoring or decryption of information&lt;/b&gt;.—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Every record, including electronic records pertaining to such directions for interception or monitoring or decryption of information and of intercepted or monitored or decrypted information shall be destroyed by the security agency in every six months except in a case where such information is required, or likely to be required for functional requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as otherwise required for the purpose of any ongoing investigation, criminal complain or legal proceedings, the intermediary or person in-charge of computer resources shall destroy records pertaining to directions for interception of information within a period of two months of discontinuance of the interception or monitoring or decryption of such information and in doing so they shall maintain extreme secrecy.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;24. &lt;b&gt;Prohibition of interception or monitoring or decryption of information without authorisation.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Any person who intentionally or knowingly, without authorisation under Rule (3) or Rule (4), intercepts or attempts to intercept, or authorises or assists any other person to intercept or attempts to intercept any information in the course of its occurrence or transmission at any place within India, shall be proceeded against and punished accordingly under the relevant provisions of the laws for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any interception, monitoring or decryption of information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, may be undertaken in course of his duty relating to the services provided by that intermediary, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with the following matters, namely--&lt;/p&gt;
&lt;p&gt;(i) installation of computer resource or any equipment to be used with computer resource; or&lt;/p&gt;
&lt;p&gt;(ii) operation or maintenance of computer resource; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) installation of any communication link or software either at the end of the intermediary or subscriber, or installation of user account on the computer resource of intermediary and testing of the same for its functionality;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) accessing stored information from computer resource relating to the installation, connection or maintenance of equipment, computer resource or a communication link or code; or&lt;/p&gt;
&lt;p&gt;(v) accessing stored information from computer resource for the purpose of--&lt;/p&gt;
&lt;p&gt;(a) implementing information security practices in the computer resource;&lt;/p&gt;
&lt;p&gt;(b) determining any security breaches, computer contaminant or computer virus;&lt;/p&gt;
&lt;p&gt;(c) undertaking forensic of the concerned computer resource as a part of investigation or internal audit; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) accessing or analysing information from a computer resource for the purpose of tracing a computer resource of any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The intermediary or the person in-charge of computer resource and its employees shall maintain strict secrecy and confidentiality of information while performing the actions specified under sub-rule (2).&lt;/p&gt;
&lt;p&gt;25. &lt;b&gt;Prohibition of disclosure of intercepted or monitored decrypted information.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The contents of intercepted or monitored or stored or decrypted information shall not be used or disclosed by intermediary or any of its employees or person in-charge of computer resource to any person other than the intended recipient of the said information under Rule (10).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The contents of intercepted or monitored or decrypted information shall not be used or disclosed by the agency authorised under Rule (4) for any other purpose, except for investigation or sharing with other security agency for the purpose of investigation or in judicial proceedings before the competent court in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Save as otherwise provided in sub-rule (2), the contents of intercepted or monitored or decrypted information shall not be disclosed or reported in public by any means, without the prior order of the competent court in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Save as otherwise provided in sub-rule (2), strict confidentiality shall be maintained in respect of direction for interception, monitoring or decryption issued by concerned competent authority or the nodal officers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009'&gt;https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-06T01:51:58Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009">
    <title>Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009</title>
    <link>https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009</link>
    <description>
        &lt;b&gt;Draft Rules under section 69B of the Information Technology (Amendment) Act, 2008 as notified by the Central Government. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;G.S.R. 782 (E).&lt;/b&gt;—&lt;b&gt; &lt;/b&gt;In exercise of the power conferred y clause (za) of sub-section (2) of section 87, read with sub-section (3) of section 69B of the Information Technology Act 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:—&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Short title and commencement.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) These rules may be called the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) They shall come into force on the date of their publication in the Official Gazette.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Definitions.&lt;/b&gt;— In these rules, unless the context otherwise requires,—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) “Act” means the Information Technology Act, 2000 (21 of 2000);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) “communication” means dissemination, transmission, carriage of information or signal in come manner and include both a direct communication and an indirect communication;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) “communication link” means the use of satellite, microwave, radio, terrestrial line, wire, wireless or any other communication media to inter-connect computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) “competent authority” means the Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology;&lt;/p&gt;
&lt;p&gt;(e) “computer resource” means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service/disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) “cyber security breaches” means unauthorised acquisition or unauthorised use by a person of data or information that compromises the confidentiality, integrity or availability of information maintained in a computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) “information” means information as defined in clause (v) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) “information security practices” means implementation of security policies and standards in order to minimize the cyber security incidents and breaches;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “intermediary” means an intermediary as defined by clause (w) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(k) “monitor” with its grammatical variations and cognate expressions, includes to view or inspect or to record or collect traffic data or information generated, transmitted, received or stored in a computer resource by means of a monitoring device;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(l) “monitoring device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to view or inspect or record or collect traffic data or information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “port” or “application port” means a set of software rules which identifies and permits communication between application to application, network to network, computer to computer, computer system to computer system;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “Review Committee” means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “security policy” means documented business rules and processes for protecting information and the computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “traffic data” means traffic data as defined in &lt;i&gt;Explanation (ii) &lt;/i&gt;to section 69B of the Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Directions for monitoring.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) No directions for monitoring and collection of traffic data or information under sub-section (3) of section 69B of the Act shall be issued, except by an order made by the competent authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The competent authority may issue directions for monitoring for any or all of the following purposes related to cyber security, namely:-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) forecasting of imminent cyber incidents;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) identification and determination of viruses or computer contaminant;&lt;/p&gt;
&lt;p&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Any direction issued by the competent authority under sub-rule (2) shall contain reasons for such direction and a copy of such direction shall be forwarded to the Review Committee withing a period of seven working days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The direction of the competent authority for monitoring and collection of traffic data or information may include the monitoring and collection of traffic data or information from any person or class of persons or relating to any particular subject whether such traffic data or information, or class of traffic data of information, are received with one or more computer resources, being a computer resource likely to be used for generation, transmission, receiving, storing of traffic data or information from or to one particular person or one or many set of premises.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Authorised agency of government for monitoring and collection of traffic data or information.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The competent authority may authorise any agency of the government for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The agency authorised by the competent authority under sub-rule (1) shall designated one or more nodal officer, not below the rank of Deputy Secretary to the Government of India, for the purpose to authenticate and send the requisition conveying direction issued under rule 3 to the designated officers of the concerned intermediary or person in-charge of computer resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The requisition under sub-rule (2) shall specify the name and designation of the officer or the agency to whom the monitored or collected traffic data or information is to be disclosed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The intermediaries or person in-charge of computer resource shall designate one or more officers to receive requisition and to handle such requisition from the nodal officer for monitoring or collection of traffic data or information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The requisition conveying directions for monitoring shall be conveyed to the designated officers of the intermediary or person in-charge of computer resources, in writing through letter or fax by the nodal officer or delivered, (including delivery by email signed with electronic signature), by an officer not below the rank of Under Secretary or officer of the equivalent rank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) The nodal officer issuing the requisition conveying directions for monitoring under sub=rule (2) shall also make a request in writing to the designated officer of intermediary or person in-charge of computer resource for monitoring in accordance with the format indicated in such requisition and report the same to the officer designated under sub-rule (3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The nodal officer shall also make a request to the officer of intermediary or person in-charge of computer resource designated under sub-rule (4) to extend all facilities, co-operation and assistance in installation, removal and testing of equipment and also enable online access or to secure and provide online access to the computer resource for monitoring and collecting traffic data or information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(8) On receipt of requisition under sub-rule (2) conveying the direction issued under sub-rule (2) of rule 3 the designated officer of the intermediary or person in-charge of computer resource designated under sub-rule (4) shall acknowledge the receipt of requisition by way of letter or fax or electronically signed e-mail to the nodal officer within a period of two hours from the time of receipt of such requisition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(9) The officer of the intermediary or person in-charge of computer resource designed under sub-rule (4) shall maintain proper records of the requisitions received by him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(10) The designated officer of the intermediary or person in-charge of computer resource shall forward in every fifteen days a list of requisition conveying direction for monitoring or collection of traffic data or information to the nodal officer which shall include details such as the reference and date of requisition conveying direction of the concerned competent authority.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Intermediary to ensure effective check in handling monitoring or collection of traffic data or information.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall put in place adequate and effective internal checks to ensure that unauthorised monitoring or collection of traffic data or information does not take place and extreme secrecy is maintained and utmost care and precaution is taken in the matter of monitoring or collection of traffic data or information as it affects privacy of citizens and also that this matter is handled only by the designated officer of the intermediary or person in-charge of computer resource.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Responsibility of intermediary.&lt;/b&gt;— The intermediary or person in-charge of computer resource shall be responsible for the actions of their employees also, and in case of violation of the provision of the Act and rules made thereunder pertaining to maintenance of secrecy and confidentiality of information or any unauthorised monitoring or collection of traffic data or information, the intermediary or person in-charge of computer resource shall be liable for any action under the relevant provision of the laws for the time being in force.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. Review of directions of competent authority.&lt;/b&gt;— The Review Committee shall meet at least once in two months and record its finding whether the directions issued under sub-rule (2) of rule 3 are in accordance with the provisions of sub-section (3) of section 69B of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue order for destruction of the copies, including corresponding electronic record of the monitored or collected traffic data or information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;8. Destruction of records.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Every record, including electronic records pertaining to such directions for monitoring or collection of traffic data shall be destroyed by the designated officer after the expiry of a period of nine months from the receipt of direction or creation of record, whichever is later, except in a case where the traffic data or information is, or likely to be, required for functional requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as otherwise required for the purpose of any ongoing investigation, criminal complaint or legal proceedings the intermediary or the person in-charge of computer resource shall destroy records pertaining to directions for monitoring or collection of information within a period of six months of discontinuance of the monitoring or collection of traffic data and in doing so they shall maintain extreme secrecy.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. Prohibition of monitoring or collection of traffic data or information without authorisation.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Any person who, intentionally or knowingly, without authorisation under sub-rule (2) of rule 3 or sub-rule (1) of rule 4, monitors or collects traffic data or information, or attempts to monitor or collect traffic data or information, or authorises or assists any person to monitor or collect traffic data or information in the course of its occurrence or transmission at any place within India, shall be proceeded against, punished accordingly under the relevant provisions of the law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) the monitoring or collection of traffic data or information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, may be undertaken in course of his duty relating to the services provided by that intermediary, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with the following matters, namely:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) installation of computer resource or any equipment to be used with computer resource; or&lt;/p&gt;
&lt;p&gt;(ii) operation or maintenance of computer resource; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) installation of any communication link or software either at the end of the intermediary or subscriber, or installation of user account on the computer resource of intermediary and testing of the same for its functionality;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) accessing stored information from computer resource relating to the installation, connection or maintenance of equipment, computer resource or a communication link or code; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) accessing stored information from computer resource for the purpose of--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) implementing information security practices in the computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) determining any security breaches, computer contaminant or computer virus;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) undertaking forensic of the concerned computer resource as a part of investigation or internal audit; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) accessing or analysing information from a computer resource for the purpose of tracing a computer resource of any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The intermediary or the person in-charge of computer resource and its employees shall maintain strict secrecy and confidentiality of information while performing the actions as specified under sub-rule (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The details of monitored or collected traffic data or information shall not be used or disclosed by intermediary or person in-charge of computer resource or any of its employees to any person other than the intended recipient of the said information under sub-rule (2) of rule 4. Any intermediary or its employees of person in-charge of computer resource who contravenes the provisions of this rule shall be proceeded against and punished accordingly under the relevant provisions of the Act or any other law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. Prohibition of disclosure of traffic data or information by authorised agency.&lt;/b&gt;— The details of monitored or collected traffic data or information shall not be used or disclosed by the agency authorised under sub-rule (1) of rule 4 for any other purpose, except for forecasting imminent cyber threats or general trend of port-wise traffic on Internet, or general analysis of cyber incidents, or for investigation or in judicial proceedings before the competent court in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. Maintenance of confidentiality.&lt;/b&gt;— Save as otherwise provided in rule 10, strict confidentiality shall be maintained in respect of directions for monitoring or collection of traffic data or information issued by the competent authority under these rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009'&gt;https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-25T04:49:05Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts">
    <title>Indian Court Strikes Down Section of Law Punishing Offensive Posts</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts</link>
    <description>
        &lt;b&gt;The Indian Supreme Court on Tuesday struck down a section of a law that allowed the authorities to jail people for offensive online posts, in a judgment that was regarded as a landmark ruling on free speech in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nida Najar and Suhasini Raj was published on the website of &lt;a class="external-link" href="http://www.ndtv.com/india-news/indian-court-strikes-down-section-of-law-punishing-offensive-posts-749401"&gt;NDTV&lt;/a&gt; on March 25, 2015. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The law stipulated that a person could be jailed for up to three years  for any communication online that was, among other things, "grossly  offensive," "menacing" or "false," and for the purpose of causing  "annoyance," "inconvenience" or "injury." The provisions, which led to  highly publicized arrests in recent years, had been roundly criticised  by legal experts who called them vague and argued that they had been  used in some cases to stifle dissent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calling the wording so vague that "virtually any opinion on any subject  would be covered by it," the court said "if it is to withstand the test  of constitutionality, the chilling effect on free speech would be  total."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of the Center for Internet &amp;amp;  Society, which is based in Bangalore, called the decision "amazing."&lt;br /&gt; "It is in continuation of a great tradition in India: that of apex  courts consistently, over the years, protecting the citizens of India  from violations of human rights," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is considered by some to be one of the world's most freewheeling  democracies, but the law reflected the ambivalence with which Indian  officials have sometimes treated freedom of expression, occasionally  citing the Constitution's allowance of "reasonable restrictions" on free  speech in order to ban books, movies and other material about subjects  like sex, politics and religion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government recently blocked the screening in India of the BBC  documentary "India's Daughter," about the Delhi gang rape in 2012 that  made international news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law, the Information Technology (Amendment) Act, was passed by  parliament shortly after the three-day terrorist attacks on Mumbai in  2008. It granted the authorities more expansive powers to monitor  electronic communications for reasons of national security. That section  was not a part of the court case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past, critics have been particularly worried that the section of  the law that was struck down was ripe for misuse at the hands of police  officials often beholden to political parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, a young man in the northern Indian state of Uttar Pradesh  became one of the latest people to be arrested under the law when the  police said he incorrectly attributed a polarizing statement to the  lawmaker Azam Khan on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other highly publicized cases include the arrest in 2012 of a professor  accused of sharing cartoons mocking the chief minister of West Bengal  state on Facebook and the arrest of two young women after one shared a  Facebook post criticizing the virtual shutdown of Mumbai following the  death of a revered right-wing political leader there. The professor is  still contesting his case in court, while the case against the two young  women was dropped in 2013, according to the Press Trust of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a separate part of the Supreme Court judgment, the justices made it  harder to force websites to take down content, although a legal expert  said it remained to be seen how much of an impediment the ruling would  be to blocking content.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts'&gt;https://cis-india.org/internet-governance/news/ndtv-nida-najar-and-suhasini-raj-march-25-2015-indian-court-strikes-down-section-of-law-punishing-offensive-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T15:40:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism">
    <title>India: Social Media Censorship to Contain ‘Cyber-Terrorism'?</title>
    <link>https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism</link>
    <description>
        &lt;b&gt;This is the second post in the 2-part series about the perceived role of social media in the wake of the Assam clashes that spilled across the country and threatened to upset the nation's peace.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Written by Aparna Ray. &lt;a class="external-link" href="http://globalvoicesonline.org/2012/08/24/india-strong-reactions-to-social-media-censorship/"&gt;This post&lt;/a&gt; was published in GlobalVoices on August 24, 2012. Pranesh Prakash's analysis is quoted in this. The first post can be found &lt;a class="external-link" href="http://globalvoicesonline.org/2012/08/23/india-social-media-blamed-for-fueling-unrest/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As the Indian government sought to block bulk SMS, MMS, webpages and specific social media urls, justifying its step as an attempt to control viral rumor-mongering and “cyber-terrorism”, there was a lot of discussion on the mainstream media (MSM) about how social media was fast becoming a “&lt;a href="http://articles.timesofindia.indiatimes.com/2012-08-21/social-media/33302561_1_social-media-india-pages-twitter"&gt;double-edged sword&lt;/a&gt;” and how the recent events brought out the “&lt;a href="http://www.thehindu.com/news/national/article3781473.ece"&gt;mischief potential of social media in full play&lt;/a&gt;“. These MSM opinions, some of which offered tacit support the idea of reigning in social media, did not go unnoticed by netizens. For example, Media Crooks &lt;a href="http://www.mediacrooks.com/2012/08/assam-azad-maidan-how-msm-sibalises.html#.UDXXsNUe62V"&gt;asked&lt;/a&gt;:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;So what’s with the rant against the Twitterati and social media by these media celebs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://globalvoicesonline.org/wp-content/uploads/2012/08/twitter-block.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Blogger Amrit Hallan at Writing Cave wondered if the MSM had an underlying motive for creating a hype around the ‘dangers' of social media. He &lt;a href="http://writingcave.com/india-becoming-blockistan/"&gt;wrote&lt;/a&gt;:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;People in the mainstream media have always been at loggerheads with the free spirit of social networking websites that empowers everybody to express opinions and spread ideas…(they) have been gleefully recommending the curtailment (of social media). Social networking and blogging continuously make their job hard. The moment they try to spread some misinformation, it is countered by Twitter or blogs with factually correct information, often posted by people close to the ground.&lt;/p&gt;
&lt;p&gt;Tweets too expressed similar concerns and sentiments:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/james_priya/status/237777638712811520"&gt;Priya James&lt;/a&gt; (@james_priya): I think by now, MSM coverage volumes of 'social media terrorism' has now surpassed even their basic coverage of Assam situation!&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/gauravsabnis/statuses/236586562576596993"&gt;Gaurav Sabnis&lt;/a&gt; (@gauravsabnis): Politician-MSM nexus in India so blatantly clear with blame for NE rumors laid squarely at social media's doors.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/rajeevnagpal/statuses/237885476080582656"&gt;Rajeev Nagpal&lt;/a&gt; (@rajeevnagpal): In #India the #MSM can't tolerate any one challenging their hold. No wonder they support censoring social media #HandsOffTwitter&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things have been moving very quickly. The ISPs have been sent &lt;a href="http://kafila.org/2012/08/23/full-text-the-indian-governments-recent-orders-to-internet-service-providers-to-block-websites-webpages-and-twitter-accounts/"&gt;official communication&lt;/a&gt; to block webpages and twitter handles, including those of&lt;a href="http://timesofindia.indiatimes.com/tech/news/internet/Govt-blocks-Twitter-accounts-of-some-journalists/articleshow/15612767.cms"&gt;some journalists &lt;/a&gt;plus &lt;a href="http://www.watblog.com/2012/08/22/the-indian-government-asks-isps-to-block-fake-and-parody-pmo-twitter-accounts/"&gt;fake profiles &lt;/a&gt;created with the purpose of lampooning the Indian Prime Minister. Curiously, the Pakistani blogger Faraz Ahmed Siddiqui, who was the first to break the news about the morphed photos being used to incite communal tensions, also came under the ambit of censorship and his &lt;a href="http://blogs.tribune.com.pk/story/12867/social-media-is-lying-to-you-about-burmas-muslim-cleansi/"&gt;post&lt;/a&gt; was &lt;a href="http://tribune.com.pk/story/425161/india-blocks-tribune-blog-exposing-burma-muslim-killings/"&gt;inaccessible&lt;/a&gt; on some ISPs.&lt;/p&gt;
&lt;p&gt;AEIdeas, a blog from the American Enterprise Institute &lt;a href="http://www.aei-ideas.org/2012/08/shooting-the-messenger-in-india/"&gt;commented&lt;/a&gt; on the issue:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The Indian government ought to have given Mr. Siddiqui a medal for his investigative work. Instead it has blocked his post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media users in India have been following the government actions closely and there is much&lt;a href="http://www.iphoneeinstein.com/2012/08/21/india-debates-misuse-of-social-media/"&gt;debate&lt;/a&gt; and &lt;a href="http://www.socialsamosa.com/2012/08/twitter-users-speak-out-on-isp-indian-government-blocking-twitter-accounts/"&gt;discussion&lt;/a&gt; about whether the crack down on social media is censorship of free speech in the guise of rumor control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some have termed the government's action as &lt;a href="http://uberdesi.com/blog/2012/08/23/indian-government-enters-new-era-of-censorship/?utm_source=rss&amp;amp;utm_medium=rss&amp;amp;utm_campaign=rss"&gt;Orwellian&lt;/a&gt;/&lt;a href="https://twitter.com/kiranmanral/status/238479576538423296"&gt;dystopian&lt;/a&gt;. Others have seen &lt;a href="http://www.livemint.com/2012/08/23212045/Views--India8217s-Net-nann.html?h=E"&gt;merit&lt;/a&gt; in the government's ‘intent' to curb inflammatory content but have been disappointed with the ineffective way the government went about the task - acting as “Net nannies” and “blocking communications, curbing speech, and banning websites”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At CIS India, Pranesh Prakash did an &lt;a href="https://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt;analysis&lt;/a&gt; of the social media content blocked in India since August 18, 2012. Here are the results:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://globalvoicesonline.org/wp-content/uploads/2012/08/social-media-375x243.jpg" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Strong reactions are pouring in on Twitter via trending hashtags such as &lt;a href="https://twitter.com/#%21/search/%23GOIBlocks"&gt;#GOIBlocks&lt;/a&gt;, &lt;a href="https://twitter.com/#%21/search/Indiablocks"&gt;#IndiaBlocks&lt;/a&gt;,&lt;a href="https://twitter.com/#%21/search/Emergency2012"&gt;#Emergency2012&lt;/a&gt; etc. [There is some debate over the use of the word ‘Emergency' and the attempt to draw parallels between the present block and the &lt;a href="http://en.wikipedia.org/wiki/The_Emergency_%28India%29"&gt;state of emergency&lt;/a&gt; of 1975, which saw suspension of civil liberties and persecution of journalists in the name of battling threat to national security].&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/reBel1857/status/238480394780024832"&gt;Indian Rebellion&lt;/a&gt; (@reBel1857): today they r blocking ur twitter account, tomorrow ur bank account and then will lock u in ur home … #GOIBlocks #Emergency2012&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/pranesh_prakash/status/238366067196588032"&gt;Pranesh Prakash&lt;/a&gt; (@pranesh_prakash): If you oppose #censorship, more power to you! I do too. But calling this #Emergency2012 is ridiculous! #IndiaBlocks #netfreedom&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/madversity/status/238492384210599936"&gt;Madhavan Narayanan&lt;/a&gt; @madversity): Social media is a modern challenge and a modern opportunity. Government attempts to police it smacks of outdated feudal style #GOIblocks&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/Raheelk/status/238491665944412160"&gt;Raheel Khursheed&lt;/a&gt;(@Raheelk):  Everything ██ is █████ ████ ████ fine ███ █ ████ love. ████ █████ the ███ UPA ███ ████ Government ██ #GOIBlocks #Twitter&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/NonExistingMan/status/238535017658208256"&gt;Sunanda Vashisht&lt;/a&gt; (@sunandavashisht): First they ignored us, then they argued with us, then they blocked us #emergency2012&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/6a6ar/status/238680491073626112"&gt;Babar &lt;/a&gt;(@6a6ar): The only thing left for us to do is block all media and Govt. handles in protest. Let's start a #VirtualRevolution #IndiaBlocks&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/abhijitmajumder/status/237986621411168256"&gt;Abhijit Majumdar&lt;/a&gt; (@abhijitmajumder): Govt of #India is just testing #socialmedia waters by blocking spoof PMO accounts. Prepare for greater censorship on #Twitter and #Facebook&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/labnol/status/238659912488599553"&gt;Amit Agarwal&lt;/a&gt; (@labnol): The Indian govt can force ISPs to block individual Twitter profiles but everything will still be available through web apps like Tweetdeck&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Humour and sarcasm too weren't in short supply. For example:&lt;/p&gt;
&lt;p class="callout"&gt;&lt;a href="https://twitter.com/maheshmurthy/status/238171725320314880"&gt;Mahesh Murthy&lt;/a&gt; (@maheshmurthy): Now that Govt has solved North East crisis by limiting SMS, it will fight malnutrition by banning food pics on Instagram&lt;/p&gt;
&lt;p class="callout"&gt;&lt;a href="https://twitter.com/itzkallyhere/status/238691084748869632"&gt;Kalyan Varadarajan&lt;/a&gt; (@itzkallyhere): My nose blocked. But I didn't poke my nose in Govt matters! My nose isnt a handle. Damn! #GOI&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a href="https://twitter.com/rameshsrivats/status/237433006111993857"&gt;Ramesh Srivats&lt;/a&gt; (@rameshsrivats): I've a few SMSs to spare from today's quota. If you mail me recipient's number, message &amp;amp; a cheque, I can send an SMS for you.#BusinessIdea&lt;/p&gt;
&lt;p&gt;However, not everyone is amused. Amrit Hallan &lt;a href="http://writingcave.com/india-becoming-blockistan/"&gt;asks&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are we going to follow the footsteps of Pakistan and China and turn into a Blockistan? No matter how much it makes some of the English-speaking mainstream journalists happy, blocking isn’t possible, at least sustained blocking. The Internet has empowered the silent majority and there is going to be a big backlash if the government, or another agency tries to take this power back. In what form this backlash is going to manifest? It remains to be seen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a guest post on &lt;a href="http://trak.in/"&gt;Trak.In&lt;/a&gt;, blogger Prasant Naidu &lt;a href="http://trak.in/tags/business/2012/08/21/government-ban-social-media/"&gt;suggests how &lt;/a&gt;the government could use social media positively.  He says:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;instead of banning social media, the government can use it in its favor controlling the crisis of NE. The virality feature that our politicians are scared of can be used for killing rumors. Can’t the government get in touch with Facebook and Google India to find out ways to use social media in a better way? Can’t the Government start a social media campaign to&lt;b&gt; &lt;/b&gt;&lt;b&gt;“Save NE and Save India”?&lt;/b&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Twitter is one of the tools that the government can use. A brilliant example is how Nirupama Rao, India’s Foreign Secretary &lt;a href="http://economictimes.indiatimes.com/news/politics/nation/nirupama-rao-breaks-barrier-tweets-on-libya-and-other-crises/articleshow/7611382.cms"&gt;used Twitter during the evacuation of Indians at the time of the Libyan crisis&lt;/a&gt;.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Social Media is not rocket science; it is about communicating with humans and for that you need to have the will to evolve and change. Banning social networks is not a solution to combat rumors but it is a half backed measure to cover the lid on the growing tensions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government, on it's part, &lt;a href="http://web2asia.blognhanh.com/2012/08/indian-government-issues-social-media.html"&gt;issued social media guidelines&lt;/a&gt; to be followed by government agencies. It remains to be seen how the situation develops on the ground and what impact the current stand-off between government and social media has on cyber-control policies in the days to come.&lt;/p&gt;
&lt;p&gt;&lt;s&gt; &lt;/s&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism'&gt;https://cis-india.org/news/global-voices-online-org-aparna-ray-aug-24-2012india-social-media-censorship-to-contain-cyber-terrorism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-27T03:36:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests">
    <title>India’s Supreme Court strikes down law that led to Facebook arrests</title>
    <link>https://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests</link>
    <description>
        &lt;b&gt;India’s Supreme Court on Tuesday struck down a provision of a law that made it illegal to spread “offensive messages” on electronic devices and resulted in arrests over posts on Facebook and other social media.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Annie Gowen was published in &lt;a class="external-link" href="http://www.washingtonpost.com/world/indias-supreme-court-strikes-down-law-that-led-to-facebook-arrests/2015/03/24/9ca54e3c-608f-46d7-a32a-57918fdd9c35_story.html"&gt;Washington Post&lt;/a&gt; on March 24, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a decision hailed as a victory for free speech, Judge Rohinton Fali  Nariman ruled that Section 66A of the Information Technology Act was  unconstitutional, writing that the vaguely worded legislation had  wrongly swept up innocent people and had a “chilling” effect on free  speech in the world’s most populous democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Section 66A is cast so widely that virtually any opinion on any subject  would be covered by it,” the judge wrote. “If it is to withstand the  test of constitutionality, the chilling effect on free speech would be  total.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India passed the Information Technology Act in 2000, and an amendment that &lt;a href="http://www.washingtonpost.com/world/indias-new-internet-rules-criticized/2011/07/27/gIQA1zS2mI_story.html"&gt;went into effect in 2009&lt;/a&gt; gave authorities broad powers to arrest those who post content deemed  “grossly offensive” or false. The offense was punishable by up to three  years in jail and a fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of the Centre for Internet and  Society in Bangalore, said that the provision was originally intended to  protect citizens from electronic spam but that it was used much more  broadly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Politicians who didn’t like what people were saying about them used it to crack down on online criticism,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The section has resulted in more than 20 high-profile arrests, including  that of a professor who posted an unflattering cartoon of a state  political leader and an artist who drew cartoons lampooning the  government and Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most well-known was the case of two young women arrested in the  western town of Palghar after one of them posted a comment on Facebook  that said Mumbai should not have been shut down for the funeral of a  famous conservative leader. A friend who merely “liked” the post also  was arrested. After much outcry, the two were released on bail and the  charges eventually dropped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of the “Palghar Girls” inspired a young law student, Shreya  Singhal, to take on the law. Singhal became the chief petitioner for the  case, joined by other free speech advocates and an Indian information  technology firm.&lt;/p&gt;
&lt;p class="interstitial-link" style="text-align: justify; "&gt;&lt;i&gt;[&lt;a href="http://www.washingtonpost.com/blogs/worldviews/wp/2012/12/01/when-and-where-posting-the-wrong-thing-to-facebook-can-get-you-arrested/"&gt;When — and where — posting the wrong thing to Facebook can get you arrested&lt;/a&gt;]&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s  a big victory,” Singhal said after the ruling. “The Internet is so  far-reaching and so many people use it now, it’s very important for us  to protect this right.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, Singhal and other petitioners had argued that a section  of the Information Technology Act that allowed the government to block  Web sites containing questionable material also was unconstitutional.  The court disagreed, however, saying there was a sufficient review  process in place to avoid misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free speech is  enshrined in the Indian constitution but has its limits. Books and  movies are often banned or censored out of consideration for the  sentiments of religious and minority groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, a conservative Hindu group &lt;a href="http://www.washingtonpost.com/world/asia_pacific/the-ban-man-indias-self-appointed-book-censor-wields-real-clout/2014/06/23/6f71eca2-b73f-4102-96e0-21d5a52e59a7_story.html"&gt;persuaded Penguin India to withdraw a book&lt;/a&gt; on Hinduism by Wendy Doniger, a professor of religion at the University  of Chicago, from the Indian market. And, more recently, the government  halted the planned television debut of a documentary on a 2012 gang rape  called “India’s Daughter.”&lt;/p&gt;
&lt;p class="interstitial-link" style="text-align: justify; "&gt;&lt;i&gt;[&lt;a href="http://www.washingtonpost.com/world/asia_pacific/indian-government-blocks-film-about-2012-new-delhi-rape-case/2015/03/04/caa166cc-c28a-11e4-a188-8e4971d37a8d_story.html"&gt;India blocks film about 2012 New Delhi rape case&lt;/a&gt;]&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  government, whose attorney had argued in court that the legislature was  in the best position to understand the needs of the people, also  welcomed the decision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The government is committed to free  speech. India is a democratic country, and free flow of ideas should be  respected. We do not seek to curtail any rights,” said Ravi Shankar  Prasad, the minister of communications and information technology. He  cautioned, however, that social media users and platforms should show  self-restraint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In recent years, other nations also have sharply increased monitoring of and crackdowns on Web posts perceived as insulting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across the Persian Gulf Arab states, dozens of activists have been  arrested for social media posts considered insulting to the countries’  rulers or damaging to the national image. In January 2014, an American  national was allowed to leave the United Arab Emirates after serving  more than eight months in prison for posting a YouTube video spoofing  the UAE’s youth culture.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Brian Murphy in Washington contributed to this report. Picture: &lt;span class="pb-caption"&gt;(Indranil Mukherjee/AFP/Getty Images)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests'&gt;https://cis-india.org/internet-governance/news/washington-post-annie-gowen-march-24-2015-indias-sc-strikes-down-law-that-led-to-fb-arrests&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-27T00:29:08Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts">
    <title>India’s Supreme Court strikes down law that led to arrests over Facebook posts</title>
    <link>https://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts</link>
    <description>
        &lt;b&gt;Judge rules that section of the information technology law was unconstitutional, had wrongly swept up innocent people and had a ‘chilling’ effect on free speech.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Annie Gowen was published in &lt;a class="external-link" href="http://www.thestar.com/news/world/2015/03/24/indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts.html"&gt;'The Star.com' &lt;/a&gt;on March 25, 2015. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court in India struck down a section of its country’s information technology act Tuesday that had made it illegal to spread “offensive messages” on electronic devices and resulted in arrests over posts on Facebook and other social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court Judge Rohinton Fali Nariman wrote in the ruling that the section of the law, known as 66A, was unconstitutional, saying the vaguely worded legislation had wrongly swept up innocent people and had a “chilling” effect on free speech in the world’s most populous democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Section 66A is cast so widely that virtually any opinion on any subject would be covered by it,” the judge wrote. “If it is to withstand the test of constitutionality, the chilling effect on free speech would be total.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India had first passed its Information Technology Act in 2000, but stricter provisions were added in 2008 and ratified in 2009 that gave police sweeping authority to arrest citizens for their personal posts on social media, a crime punishable for up to three years in jail and a fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of the Centre for Internet and  Society in Bangalore, said the section was originally intended to  protect citizens from electronic spam, but it &lt;a href="http://www.thestar.com/news/world/2012/02/06/google_india_facebook_remove_offensive_content.html"&gt;did not turn out that way&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Politicians who didn’t like what people were saying about them used it to crack down on online criticism,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, there were more than 20 high-profile arrests, including a professor who posted an unflattering cartoon of a state political leader and another artist who drew a set of cartoons lampooning the government and Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most well-known was the case of two young women arrested in the western town of Palghar after one of them posted a comment on Facebook that argued the city of Mumbai should not have been shut down for the funeral of a famous conservative leader. A friend, who merely “liked” the post, was also arrested. After much outcry, the two were released on bail and the charges eventually dropped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case of the “Palghar Girls” inspired a young law student, Shreya Singhal, to take on the government’s law. Singhal became the chief petitioner for the case, along with other free speech advocates and an Indian information technology firm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It’s a big victory,” Singhal said after the ruling. “The Internet is so far-reaching and so many people use it now, it’s very important for us to protect this right.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Singhal and other petitioners had also argued that another section of India’s technology act that allowed the government to block websites containing questionable material were also unconstitutional, but the court disagreed, saying there was a sufficient review process in place to avoid misuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free speech in India is enshrined in the country’s constitution but has its limits. Books and movies are often &lt;a href="http://www.thestar.com/opinion/commentary/2014/02/16/dark_days_for_the_creative_class_in_india_siddiqui.html"&gt;banned or censored&lt;/a&gt; out of consideration for religious and minority groups.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2014, a conservative Hindu group persuaded Penguin India to &lt;a href="http://www.thestar.com/news/world/2014/02/13/hindu_history_book_yanked_from_shelves_under_pressure_from_india_nationalists.html"&gt;withdraw a book&lt;/a&gt; about Hinduism by Wendy Doniger, a professor of religion at the  University of Chicago, from the Indian market. And more recently, the  government of India blocked a planned television debut of a &lt;a href="http://www.thestar.com/news/world/2015/03/06/bbc-doc-examines-2012-fatal-gang-rape-of-student-in-new-delhi.html"&gt;documentary film&lt;/a&gt; on a 2012 gang rape case, &lt;i&gt;India’s Daughter&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts'&gt;https://cis-india.org/internet-governance/news/the-star-march-25-2015-annie-gowen-indias-supreme-court-strikes-down-law-that-led-to-arrests-over-facebook-posts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T01:49:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain">
    <title>India's Supreme Court Axes Online Censorship Law, But Challenges Remain </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain</link>
    <description>
        &lt;b&gt;The Supreme Court of India took a remarkable step to protect free expression on March 24, 2015, striking down controversial section 66A of the IT Act that criminalized “grossly offensive” content online. In response to a public interest litigation filed by Indian law student Shreya Singhal, the court made this landmark judgement calling the section “vague”, “broad” and “unconstitutional”. Since Tuesday's announcement, the news has trended nationally on Twitter, with more than 50,000 tweets bearing the hashtags #Sec66A and #66A.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry by Subhashish Panigrahi was originally published by &lt;a class="external-link" href="http://globalvoicesonline.org/2015/03/25/indias-supreme-court-axes-online-censorship-law-but-challenges-remain/"&gt;Global Voices Online&lt;/a&gt; on March 25, 2015. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Section 66A allowed police to arrest any person who sent online  communications deemed “grossly offensive” or known to be false. This has  enabled the government &lt;a href="http://www.hindustantimes.com/india-news/facebook-trouble-people-arrested-under-sec-66a-of-it-act/article1-1329883.aspx" target="_blank"&gt;take down many websites&lt;/a&gt; with allegedly objectionable content. Among various cases since the law  was updated in 2008, two people were arrested for making comments on  Facebook regarding India's prime minister Narendra Modi and one man was  arrested for commenting on public service closures following the death  of political leader Bal Thakrey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The now-defunct Section 66A reads as follows:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;66-A. Punishment for sending offensive messages through communication service, etc.&lt;br /&gt; —Any person who sends, by means of a computer&lt;br /&gt; resource or a communication device,—&lt;br /&gt; (a) any information that is grossly offensive or has menacing character; or&lt;br /&gt; (b) any information which he knows to be false, but for the purpose of  causing annoyance, inconvenience, danger, obstruction, insult, injury,  criminal&lt;br /&gt; intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device; or&lt;br /&gt; (c) any electronic mail or electronic mail message for the purpose of  causing annoyance or inconvenience or to deceive or to mislead the  addressee or&lt;br /&gt; recipient about the origin of such messages, shall be punishable with  imprisonment for a term which may extend to three years and with fine.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Internet rights advocate and lawyer Pranesh Prakash, who works with the  Center for Internet and Society in Bangalore, has been one of the law's &lt;a href="http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act" target="_blank"&gt;most outspoken critics&lt;/a&gt; in recent years. Immediately following the ruling, he tweeted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweet.png" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nikhil Pahwa, independent journalist and founder of the MeddiaNama blog, &lt;a href="http://www.medianama.com/2015/03/223-section-66a-unconstritutional/"&gt;offered his take&lt;/a&gt; on the ruling:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;This is a great decision for freedom of speech in India…66A is far too  vague, and lends itself to arbitrary implementation by the police,  especially phrases like “grossly offensive”, annoyance, inconvenience,  ill will. Remember that even the right to offend is an integral part of  free speech.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Journalist and author Sagarika Ghose sarcastically wondered if the  government of India would retroactively offer recompense for all of the  actions taken against citizens for violating 66A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/sagarika.png" alt="Sagarika" class="image-inline" title="Sagarika" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some were playful in their response to the decision. Siddharth Sing set out to “test” the efficacy of the ruling with a tweet mocking prominent public figures in Indian politics:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Siddharth.png" alt="Siddharth" class="image-inline" title="Siddharth" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69, which provides authorities with the power to censor websites  that “create communal disturbance, social disorder, or affect India's  relationship with other countries” was upheld however. The Court has yet  to clarify this decision. CIS India's Pranesh Prakash tweeted:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Unfortunately 69A (website blocking) has been  upheld despite many issues, incl lack of transparency. Need to read full  judgment to see why.&lt;/p&gt;
&lt;p&gt;— Pranesh Prakash (@pranesh_prakash) &lt;a href="https://twitter.com/pranesh_prakash/status/580239299641135105"&gt;March 24, 2015&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Tuesday's decision comes after the government of India was &lt;a href="http://advocacy.globalvoicesonline.org/2015/01/06/indian-netizens-criticize-online-censorship-of-jihadi-content/" target="_blank"&gt;heavily criticized&lt;/a&gt; in January 2015 for blocking 32 websites in the country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain'&gt;https://cis-india.org/internet-governance/blog/global-voices-march-25-2014-subhashish-panigrahi-indias-supreme-court-axes-online-censorship-law-but-challenges-remain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-27T02:38:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
