<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2171 to 2185.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013">
    <title>The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues </title>
    <link>https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013</link>
    <description>
        &lt;b&gt;The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The author, Divij Joshi is a law student at NLS and is interning with CIS for its privacy project. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What is the Criminal Law (Amendment) Bill, 2013? What will it change?&lt;/b&gt;&lt;br /&gt;The Criminal Law (Amendment) Bill is a bill which is to be introduced in the Indian Parliament, which will replace the Criminal Law (Amendment) Ordinance, 2013&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; currently in force, and aims at amending the existing provisions in criminal law in order to improve the safety of women. The Bill seeks to make changes to the Indian Penal Code, the Code of Criminal Procedure, and the Indian Evidence Act. The Bill will introduce unprecedented provisions in the Indian Penal Code which would criminalise sexual voyeurism and stalking and would amend legal provisions to protect the privacy of individuals, such as discontinuing the practice of examination of the sexual history of the victim of a sexual assault for evidence. With instances of threats to individual privacy on the rise in India, &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; it is high time that the criminal law expands its scope to deal with offences which violate physical privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What threats to privacy will the Act address?&lt;/b&gt;&lt;br /&gt;The Act will address the following violations of physical privacy:&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Stalking&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Draft provision&lt;/b&gt;: The ordinance introduces the offence of stalking under Section 345D of the Indian Penal Code, and makes it punishable by imprisonment of not less than one year, which may extend to three years, and a fine. The provision prescribes that ‘&lt;i&gt;Whoever follows a person and contacts, or attempts to contact such person to foster personal interaction repeatedly, despite a clear indication of disinterest by such person, or whoever monitors the use by a person of the internet, email or any other form of electronic communication, or watches or spies on a person in a manner that results in a fear of violence or serious alarm or distress in the mind of such person, or interferes with the mental peace of such person.’ &lt;/i&gt;Hence, under the new law, constant, unwanted interaction of any one person with another, for any reason, can be made punishable, if the actions results in fear of violence or distress in any person, or interferes with their mental peace.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Current law and need for amendment&lt;/b&gt;: Stalking is generally characterized by unwanted and obsessive harassment or persecution of one person by another. Stalking can be a physical act such as constantly following a person, or can be done through electronic means — usually the internet (known as cyberstalking). Stalking may or may not be an act which physically threatens the security of an individual; however, it can cause mental trauma and fear to the person being stalked. Stalking is a blatant intrusion into an individual’s privacy, where the stalker attempts to establish relationships with their victim which the victim does not consent to and is not comfortable with. The stalker also intrudes into the victim’s private life by collecting or attempting to collect personal information the victim may not want to disclose, such as phone numbers or addresses, and misusing it. If the stalker is left undeterred to continue such actions, it can even lead to a threat to the safety of the victim. Cyber-stalking is a phenomenon which can prove to be even more invasive and detrimental to privacy, as most cyber-stalkers attempt to gain access to private information of the victims so that they can misuse it. Stalking, in any form, degrades the privacy of the victim by taking away their choice to use their personal information in ways they deem fit. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Recognizing stalking as an offence would not only protect the physical privacy rights of the victims, but also nip potentially violent crimes in the bud.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Many nations including Australia, the United States of America and Japan have penal provisions which criminalise stalking. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In India however, there is no appropriate response to stalking as an offence — either in its physical or electronic forms. The Information Technology Act, the legislation purported to deal with instances of cyber-crimes, overlooks instances of breach of online privacy and stalking which does not lead to publication of obscene images or other obvious manifestations of physical or mental threat. The general provision under which victims of stalking can file complaints is Section 509 of the Indian Penal Code (IPC), which states that — ‘&lt;i&gt;Whoever, intending to insult the modesty of any woman, utters any word, makes any sound or gesture, or exhibits any object, intending that such word or sound shall be heard, or that such gesture or object shall be seen, by such woman, or intrudes upon the privacy of such woman, shall be punished with simple imprisonment for a term which may extend to one year, or with fine, or with both.’&lt;/i&gt;There are several problems with using this section as a response to stalking. Without a particular definition of what comes under the scope of ‘intrusion of privacy’ under this section, there is reluctance both for the victim to approach the police and for the police to file the complaint. Usually the offence is coupled with some other form of harassment or violence, and the breach of privacy and trauma is not considered as a separate offence. For example, if a person is continuously following or trying to contact you without your consent or approval, but does not physically threaten or insult you, there is no protection in law against such a person. Hence, as pointed out, there is a need to recognize the breach of privacy as a separate ground of offence, notwithstanding other physical or mental grounds. Secondly, the provisions of this section require the criminal to have the ‘intent of insulting the modesty of a woman’. Aside from the difficulties in adjudging the ‘modesty’ of a woman, the provision limits the scope of harassment to only that which intends to insult the modesty of a woman and excludes any other intention as criminal behaviour. The present law amends these problems by disregarding the reason or intent for the behaviour, and by clearly defining the elements of the offence and making stalking as a stand-alone, punishable offence.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Sexual Voyeurism&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Draft provision&lt;/b&gt;: The Act will add Section 345D to the Indian Penal Code, which reads as follows — ‘&lt;i&gt;Whoever watches, or captures the image of, a woman engaging in a private act in circumstances where she would usually have the expectation of not being observed either by the perpetrator or by any other person at the behest of the perpetrator shall be punished on first conviction with imprisonment of either description for a term which shall not be less than one year, but which may extend to three years, and shall also be liable to fine, and be punished on a second or subsequent conviction, with imprisonment of either description for a term which shall not be less than three years, but which may extend to seven years, and shall also be liable to fine.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Explanation 1.–– For the purposes of this section, “private act” includes an act carried out in a place which, in the circumstances, would reasonably be expected to provide privacy, and where the victim's genitals, buttocks or breasts are exposed or covered only in underwear; or the victim is using a lavatory; or the person is doing a sexual act that is not of a kind ordinarily done in public.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;i&gt;Explanation 2.–– Where the victim consents to the capture of images or any act, but not to their dissemination to third persons and where such image or act is disseminated, such dissemination shall be considered an offence under this section.’&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;The provision seeks to protect victims of voyeurism, who have been watched, or recorded, without their consent and under circumstances where the victim could reasonably expect privacy, and where the victim’s genitals, buttocks or breasts have been exposed. A reasonable expectation of privacy means that in the circumstances, whether in a public or a private place, the victim has a reasonable expectation that she is not being observed engaging in private acts such as disrobing or sexual acts. The test of reasonable expectation of privacy can be derived from similar provisions in voyeurism laws across the world, and also section 66E of the Information Technology Act.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; It is particularly important because voyeurism does not necessarily take place in private places like the victims home, but also in public spaces where there is generally an expectation that exposed parts of one’s body are not viewed by anyone.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Current law and need for amendment&lt;/b&gt;: A ‘voyeur’ is generally defined as "a person who derives sexual gratification from the covert observation of others as they undress or engage in sexual activities." &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Voyeurism is the act of a person who, usually for sexual gratification, observes, captures or distributes the images of another person without their consent or knowledge. With the development in video and image capturing technologies, observation of individuals engaged in private acts in both public and private places, through surreptitious means, has become both easier and more common. Cameras or viewing holes may be placed in changing rooms or public toilets, which are public spaces where individuals generally expect a reasonable degree of privacy, and where their body may be exposed. Voyeurism is an act which blatantly defies reasonable expectations of privacy that individuals have about their bodies, such as controlling its exposure to others.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; Voyeurism is an offence to both the privacy as well as the dignity of a person, by infringing upon the right of individuals to control the exposure of their bodies without their consent or knowledge, either through unwarranted observation of the individual, or through distribution of images or videos against the wishes or without the knowledge of the victim.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Voyeurism is a criminal offence in many jurisdictions across the world such as Australia,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; the United States,&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Canada,&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; and the UK,&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; which criminalise either the capturing of certain images, or observation of individuals, or both. In India, the capturing, distribution and transferring of images of ‘private areas’ of a person’s body, under circumstances where the person would have a reasonable expectation of privacy that their body would not be exposed to public view, is punishable with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both. However, this does not cover instances where a person observes another in places and situations where they do not consent to being observed. The inclusion of voyeurism as an offence in the IPC would close several loopholes in the voyeurism law and hopefully be a precedent for the state to better work towards securing the bodily privacy of its citizens.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Examination of Sexual History and Privacy&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Draft provision: &lt;i&gt; &lt;/i&gt;The amendment to Section 53A of the Indian Evidence Act in the Bill reads, &lt;i&gt;“In a prosecution for an offence under section 354, section 354A, section 354B, section 354C, sub-section (1) or sub-section (2) of section 376, section 376A, section 376B, section 376C, section 376D or section 376E of the Indian Penal Code or for attempt to commit any such offence, where the question of consent is in issue, evidence of the character of the victim or of such person’s previous sexual experience with any person shall not be relevant on the issue of such consent or the quality of consent.”&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;A similar proviso is added to Section 376 of the Indian Evidence Act.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;According to the above provision, in a trial for sexual assault or rape the evidence supplied of a victim’s previous sexual experience or her ‘character’ would not be admissible as relevant evidence to determine the fact of the consent or the quality of the consent.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;Current law and need for amendment: The Indian Evidence Act is the legislation which governs the admissibility of evidence in the different courts. In cases of rape or sexual assault and related crimes, the evidence of consent often considered is not just that of the consent of the woman in the act at that time itself, but rather her previous sexual experience and “promiscuous character”. Even though it has been widely censured by the highest court,&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; such practices continue to dominate and prejudice the justice of victims of sexual assault and harassment.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; The examination of the victim’s sexual history in court is an unwarranted intrusion into their privacy through public disclosure of the sexual history and details of her sexual life, which causes potential embarrassment and sexual stereotyping of the victim, especially in a conservative, patriarchal society like in India. With the new amendments, such evidence will not be permitted in a court of law, hence, it will act as a safeguards against defendants attempting to influence the court's decision through disparaging the ‘character’ of the victim, and will protect the disclosure of intimate, personal details like previous sexual encounters of the victim.&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;br /&gt;&lt;/b&gt;Privacy, crime, and safety of women are intricately linked in any legal system. An essential part of the security of citizens is the safety of their privacy and personal information. If any legal system does not protect the privacy — both of body and of information — of its people, there will always be insecurity in such a system. With the recent debates on women’s safety, several crucial privacy and security issues have been raised, such as the criminalization of voyeurism and stalking, which is a huge boost for privacy rights of citizens in India, and it is hopeful that the government will continue the trend of considering privacy issues along when addressing security concerns for the state.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Update to the Criminal Law Amendment Bill 2013 - Penalising Peeping Toms and other privacy issues&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Criminal Law (Amendment) Bill, 2013, was made into law on April 3, 2013. Several provisions under the Act differ from the provisions in the ordinance. Under the Act, unlike in the Ordinance, the terms or watches or spies on a person in a manner that results in a fear of violence or serious  alarm or distress in the mind of such person, or interferes with the mental peace of such person are not included as a part of the offence  of stalking. Hence, the offence is limited to the physical act of  following or contacting a person, provided that there has been a clear  sign of disinterest, or to monitoring the use by a woman of the internet, email or any other forms of electronic communication.  &lt;br /&gt;&lt;br /&gt;Hence, from the confusing language of the provision, it would seem that the offence of stalking related to monitoring of activities of a woman is restricted to the monitoring of online communications, and not physical acts. The caveat of such monitoring having to cause serious alarm, distress or interference with the mental peace of the victim is also removed. The removal of unwaranted intrusion through watching or spying of a person, and indeed, the removal of any subjective test to determine the effect of stalking is a departure from stalking provisions accross the world, and is a setback for individual privacy, because stalking per se is a privacy offence, relating not only to the physical interference but also the mental harassment it causes to the victims.&lt;br /&gt;&lt;br /&gt;The provision has also increased the puinishment for the crime in the first offence to upto three years, and subsequently to upto five years. Further, the provisions sought to be included within Section 53A and Section 376 of the Indian Evidence Act are now included in Section 146 of the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://mha.nic.in/pdfs/TheCrimnalLaw030413.pdf"&gt;Link to the Criminal Law (Amendment) Act, 2013&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Criminal Law (Amendment) Ordinance, 2013, &lt;i&gt;available at &lt;/i&gt;&lt;a class="external-link" href="http://mha.nic.in/pdfs/criminalLawAmndmt-040213.pdf"&gt;http://mha.nic.in/pdfs/criminalLawAmndmt-040213.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/10nMSTT"&gt;http://bit.ly/10nMSTT&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Anita Gurumurthy and Nivedita Menon, &lt;i&gt;Violence against Women via Cyberspace, &lt;/i&gt;Economic and Political Weekly, 44 (40), 19, (October, 2009).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. For example, see laws listed &lt;a class="external-link" href="http://bit.ly/126hBpO"&gt;http://bit.ly/126hBpO&lt;/a&gt;&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Section 66E, The Information Technology Act, 2000: ‘&lt;i&gt;66E. Punishment for violation of privacy.-&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both.&lt;/i&gt;&lt;/p&gt;
&lt;p class="normal"&gt;&lt;i&gt;Explanation - For the purposes of this section--&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) “transmit” means to electronically send a visual image with the intent that it be viewed by a person or persons;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(b) “capture”, with respect to an image, means to videotape, photograph, film or record by any means;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(c) “private area” means the naked or undergarment clad genitals, pubic area, buttocks or female breast;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(d) “publishes” means reproduction in the printed or electronic form and making it available for public;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(e) “under circumstances violating privacy” means circumstances in which a person can have a reasonable expectation that--&lt;/i&gt;&lt;i&gt;(i) he or she could disrobe in privacy, without being concerned that an image of his private area was being captured; or&lt;br /&gt;(ii) any part of his or her private area would not be visible to the public, regardless of whether that person is in a public or private place.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Oxford English Dictionary, available at &lt;a class="external-link" href="http://bit.ly/YN2ZvI"&gt;http://bit.ly/YN2ZvI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Lance Rothenberg, &lt;i&gt;Rethinking Privacy: Peeping Toms, Video Voyeurs, and the failure of criminal law to recognize a reasonable expectation of privacy in the public space, &lt;/i&gt;American University Law Review, 49, 1127, (1999).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Section 91J, Crimes Act, 1910: "&lt;i&gt;A person who, for the purpose of obtaining sexual arousal or sexual gratification, observes a person who is engaged in a private act without the consent of the person being observed to being observed for that purpose, and knowing that the person being observed does not consent to being observed for that purpose, is guilty of an offence."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Video Voyeurism Protection Act, 2004.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Section 162, Criminal Code of Canada: " (1) Every one commits an offence who, surreptitiously, observes — including by mechanical or electronic means — or makes a visual recording of a person who is in circumstances that give rise to a reasonable expectation of privacy, if&lt;br /&gt;(a) the person is in a place in which a person can reasonably be expected to be nude, to expose his or her genital organs or anal region or her breasts, or to be engaged in explicit sexual activity;&lt;br /&gt;(b) the person is nude, is exposing his or her genital organs or anal region or her breasts, or is engaged in explicit sexual activity, and the observation or recording is done for the purpose of observing or recording a person in such a state or engaged in such an activity; or&lt;br /&gt;(c) the observation or recording is done for a sexual purpose.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Section 67, Sexual Offences Act, 2003.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. &lt;a class="external-link" href="http://bit.ly/10nNDwg"&gt;http://bit.ly/10nNDwg&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;a class="external-link" href="http://reut.rs/13CIDXU"&gt;http://reut.rs/13CIDXU&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013'&gt;https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-2013-bulletin">
    <title>March 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/march-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) welcomes you to the third issue of its newsletter for the year 2013. In this issue we bring you an overview of our research programs, updates of events organised by us, events we participated in, news and media coverage, and videos of some of our recent events.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt;CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge and Openness), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One of this is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another is for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and many other organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit for Persons with Disabilities&lt;/b&gt;&lt;br /&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Lakshadweep, Meghalaya and Uttar Pradesh:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-lakshadweep-chapter-call-for-comments"&gt;The Lakshadweep Chapter&lt;/a&gt; (by Anandhi Viswanathan, March 25, 2013): The union territory of Lakshadweep has not passed any legislation for persons with disabilities, but implements the provisions under the central laws. The benefits currently available to persons with disabilities in Lakshadweep include disability pension, unemployment allowance and grant for setting up kiosks.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-kit-the-meghalaya-chapter-call-for-comments"&gt;The Meghalaya Chapter&lt;/a&gt; (by Manojna Yeluri, March 25, 2013): Meghalaya is one of the few north-eastern states, which has appointed a Commissioner for Disabilities. Most of the schemes and benefits given to persons with disabilities in Meghalaya are under centrally sponsored schemes. Very few schemes are initiated by the state government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-uttar-pradesh-chapter-call-for-comments"&gt;The Uttar Pradesh Chapter&lt;/a&gt; (by Manojna Yeluri, March 31, 2013): The Government of Uttar Pradesh has established shelter homes and vocational training centres in several parts of the states — most recently in Meerut, Bareilly and Gorakhpur. It has also undertaken to finance nearly 4340 corrective surgeries for polio across nine cities of Uttar Pradesh. It also intends to start several projects in 2013. These include the establishment of a Braille Press in order to produce Braille books, magazines and other study material.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Resources&lt;br /&gt;&lt;/b&gt;We now have a new section on our website which contains all government notifications, RTI applications, and accessibility related resources: cases, statutes, etc. The following were published earlier this month:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/information-about-schemes-for-disabled-haryana"&gt;Information about Schemes for Disabled Persons in Haryana&lt;/a&gt; We received this notification on schemes and policies for persons with disabilities from the Government of Haryana.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/haryana-notification"&gt;Haryana Government Notification&lt;/a&gt; (Hindi version): The notification that we received from the state government was in Hindi. We will put up the English translation soon.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/west-bengal-govt-notifications"&gt;West Bengal (Govt) Notifications&lt;/a&gt;: We received a series of notifications from the West Bengal Government from its various departments such as finance, higher education, transport, health and family welfare, labour, land and land reforms, panchayats and rural development, etc. &lt;a href="https://cis-india.org/accessibility/resources/west-bengal-notifications.zip"&gt;OCR versions&lt;/a&gt; of the same have been published.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/resources/lakshadweep-govt-notifications"&gt;Lakshadweep (Govt) Notifications&lt;/a&gt;: Notifications received from the Lakshadweep Government including guidelines for functioning of KIOSKS, grant of unemployment allowance and special jobs to persons with disabilities, issuing identity card to persons with disabilities for availing government benefits, etc., are published. &lt;a href="https://cis-india.org/accessibility/resources/lakshadweep-ocr-notifications"&gt;OCR versions&lt;/a&gt; have also been put up.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/discussion-on-intercept-between-uncrpd-and-cedaw"&gt;A Discussion on Intercept between UNCRPD &amp;amp; CEDAW&lt;/a&gt; (organized by the Shanta Memorial Institute of Rehabilitation – Odisha, CBR Network and Mitra Jyoti, Bangalore, Karnataka, February 4, 2013): Anandhi Viswanathan participated in this event. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt; and &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. CIS also promotes openness including open government data, open standards, open access, and free/libre/open source software through its Openness programme.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, and one team member &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; who is working from Bangalore office.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Indic Wikipedia Visualisation Project&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/indic-wikipedia-visualisation-project-visualising-basic-parameters"&gt;Visualising Basic Parameters&lt;/a&gt; (by Sajjad Anwar and Sumandro Chattapadhyay, March 26, 2013): Sajjad and Sumandro bring you a visualisation of the growth of Indic Wikipedia in this first post on Indic Wikipedia Visualisation project. They look into the different aspects of the past and present activities of Indic Wikipedias, and divide the visualisation into three different focus areas: (1) basic parameters, (2) geographic patterns of edits, and (3) exploring the topics that receives the greatest number of edits. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikipedia-session-at-bits-goa"&gt;Introductory Wikipedia session at BITS Goa&lt;/a&gt; (organised by CIS, Birla Institute of Technology &amp;amp; Science, Pilani, Goa, March 7, 2013). The Access to Knowledge team was invited by Nikhil Dixit from BITS to organise a Wikipedia editing session. Nitika Tandon led the session on IP editing. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/kannada-wikipedia-workshop"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by CIS, Institution of Engineers, JLB Road, Mysore, March 24, 2013). Dr. U.B. Pavanaja led this workshop.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wiki-womens-day-in-goa"&gt;Wiki Women's Day in Goa&lt;/a&gt; (organised by the Wikimedia India Chapter and CIS, Nirmala Institute of Education, Panaji, Goa, March 8, 2013). Nitika Tandon participated in this workshop held on International Working Women's Day, and shares the developments in this report.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-for-kannada-science-writers"&gt;Wikipedia Workshop for Kannada Science Writers&lt;/a&gt; (organised by Wikimedia India Chapter, Karnataka Rajya Vijnana Parishath and CIS, Karnataka Rajya Vijnana Parishath Conference Hall, Banashankari 2nd Stage, Bangalore, March 17, 2013). Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/telegu-wiki-mahotsavam-2013"&gt;Telugu Wiki Mahotsavam 2013&lt;/a&gt; (co-organised with the Telegu Wikipedia community, Hyderabad, April 9 to 11, 2013). Vishnu Vardhan is participating in this event as a speaker. A public event will be held on April 11 from 5.00 p.m. to 8.00 p.m. at Golden Threshold (Sarojini Naidu's house) in Hyderabad. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-womens-workshop-bangalore-2013"&gt;Wikipedia Women's Workshop Bangalore 2013&lt;/a&gt; (organised by Wikimedia India, Servelots Infotech, Jayanagar, Bangalore, March 8, 2013). The event was covered by Kannada Prabha on March 9, 2013. Dr. U.B. Pavanaja participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wikipedia-at-avenir"&gt;Wikipedia at Avenir&lt;/a&gt; (organised by the Wikipedia community, Netaji Subhash Engineering College, Kolkata, West Bengal, March 11, 2013). CIS supported this event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report from Other Organisations&lt;/b&gt;&lt;br /&gt;Wikipedia Community members helped the Higher Education Innovation and Research Applications Programme (HEIRA) of CSCS Bangalore to organize a day-long workshop on ‘Digital Literacy’ at Ahmednagar College, Ahmednagar, Maharasthra on January 17, 2013. Tanveer Hasan of HEIRA shares with us the developments in &lt;a href="https://cis-india.org/openness/blog/ahmednagar-marathi-wikipedia-workshop-report"&gt;this report&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Other &lt;/b&gt;&lt;a href="https://cis-india.org/openness"&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/a&gt;&lt;b&gt; Updates&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/iraqi-public-data-scenario-workshop"&gt;Iraqi Public Data Scenario Workshop: A Summary&lt;/a&gt; (by Sumandro Chattapadhyay, March 26, 2013): A workshop on public data was conducted by Sunil Abraham and Sumandro Chattapadhyay for the officials of the Government of Iraq. It was organized by UNDP Iraq in Amman, Jordan from October 18 to 23, 2012. Sumandro Chattapadhyay shares with us the developments from the workshop held over five days. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/open-data-camp-2013"&gt;Open DataCamp - 2013&lt;/a&gt; (organized by Open Data Camp, Dharmaram Vidya Kshetram (inside Christ University Campus), Dairy Circle, Bangalore, March 2 and 3, 2013): Sunil Abraham was a panelist.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HasGeek&lt;/b&gt;&lt;br /&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works from the CIS office in Bengaluru.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://pigworkshop.fifthelephant.in/"&gt;Pig Workshop&lt;/a&gt; (organized by HasGeek, Alchemy Solutions, Domlur, Bangalore, 9.00 a.m. to 6.00 p.m.): A workshop on how to use Pig for mining useful information from data. It is open to programmers who have a background in Java programming, some familiarity with Hadoop and MapReduce algorithms, and have worked with large chunks of data.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/fifth-elephant-2013"&gt;The Fifth Elephant 2013&lt;/a&gt; (organized by HasGeek, July 11 to 13, 2013, NIMHANS Convention Centre, Bangalore). &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet Governance programme conducts research around the various social, technical, and political underpinnings of global and national Internet governance, and includes online privacy, freedom of speech, and Internet governance mechanisms and processes. Currently, CIS is doing a project with &lt;b&gt;Privacy International&lt;/b&gt;, London to facilitate research and events around surveillance, and freedom of speech and expression.&lt;/p&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Policy&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"&gt;Draft Human DNA Profiling Bill&lt;/a&gt; (April 2012): High Level Concerns (by Elonnai Hickok, March 12, 2013). The post examines the high level concerns that CIS has with the April 2012 draft of the Bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"&gt;Human DNA Profiling Bill 2012 Analysis&lt;/a&gt; (by Jeremy Gruber, Council for Responsible Genetics, US, March 19, 2013). Jeremy provides an analysis of the Human DNA Profiling Bill, 2012. He says that India’s updated 2012 Human DNA Profiling Bill offers largely superficial changes from its predecessor, the Draft DNA Profiling Bill, 2007.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft"&gt;The Privacy (Protection) Bill 2013: A Citizen's Draft&lt;/a&gt; (by Bhairav Acharya, March 26, 2013).  Bhairav Acharya has drafted the Privacy (Protection) Bill 2013. It contains provisions that speak to data protection, interception, and surveillance and also establishes the powers and functions of the Privacy Commissioner, and lays out offenses and penalties for contravention of the Bill. The Bill represents a citizen's version of possible privacy legislation for India, and will be shared with key stakeholders including civil society, industry, and government.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table"&gt;A Privacy Round Table in Delhi&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, FICCI Federation House, Tansen Marg, New Delhi, April 3, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"&gt;A Privacy Round Table in Bangalore&lt;/a&gt; (organized by CIS and Federation of Indian Chambers of Commerce and Industry, Jayamahal Palace, Jayamahal Road, Bangalore, April 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"&gt;Analyzing the Draft Human DNA Profiling Bill 2012&lt;/a&gt; (organized by the Centre for Internet and Society, Bangalore, March 1, 2013): Maria Xynou shares &lt;a href="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012"&gt;a summary of the workshop&lt;/a&gt; in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/global-partners-meeting-london"&gt;Global Partners Meeting @ London&lt;/a&gt; (organized by Privacy International, London School of Economics and Political Science, March 22 – 25, 2013). Sunil Abraham and Malavika Jayaram participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis"&gt;India’s Civil Liberties Crisis: Of Bans, Blocks, Bullying and Biometrics&lt;/a&gt; (organized by the Center for Global Communication Studies, Annenberg School of Communication, University of Pennsylvania, Philadelphia, March 28, 2013). Malavika Jayaram participated as a speaker.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi"&gt;Future of Privacy in India&lt;/a&gt; (organized by DSCI and ICOMP, Oberoi Hotel, New Delhi, April 5, 2013). Sunil Abraham is a speaker at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Posts&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/hacking-without-borders-the-future-of-artificial-intelligence-and-surveillance"&gt;Hacking without borders: The future of artificial intelligence and surveillance&lt;/a&gt; (by Maria Xynou, March 15, 2013). In this post, Maria looks at some of DARPA´s artificial intelligence surveillance technologies in regards to the right to privacy and their potential future use in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes"&gt;Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes...&lt;/a&gt; (by Maria Xynou, March 26, 2013). Maria examines red light cameras, RFID tags and black boxes used to monitor vehicles in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World&lt;/a&gt; (by Maria Xynou, March 27, 2013). CIS presents Microsoft´s report on law enforcement requests, with a focus on data requested by Indian law enforcement agencies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-criminal-law-amendment-bill-2013"&gt;The Criminal Law Amendment Bill 2013 — Penalising 'Peeping Toms' and Other Privacy Issues&lt;/a&gt; (by Divij Joshi, March 31, 2013). The pending amendments to the Indian Penal Code, if passed in their current format, would be a huge boost for individual physical privacy by criminalising stalking and sexually-tinted voyeurism and removing the ambiguities in Indian law which threaten the privacy and dignity of individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;IT Act&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Featured Blog Post&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules"&gt;CIS Welcomes Standing Committee Report on IT Rules&lt;/a&gt; (by Pranesh Prakash, March 27, 2013). CIS welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act. The post was quoted in: &lt;a href="http://articles.timesofindia.indiatimes.com/2013-03-28/internet/38098800_1_rules-self-regulation-pranesh-prakash"&gt;The Times of India&lt;/a&gt; (March 28, 2013), &lt;a href="http://www.thestatesman.net/index.php?option=com_content&amp;amp;view=article&amp;amp;id=449591&amp;amp;catid=73"&gt;The Statesman&lt;/a&gt; (March 28, 2013), &lt;a href="http://articles.economictimes.indiatimes.com/2013-03-28/news/38099676_1_google-chairman-eric-schmidt-government-pranesh-prakash"&gt;Economic Times&lt;/a&gt; (March 28, 2013),  &lt;a href="http://www.dqindia.com/dataquest/news/186012/cis-welcomes-panels-anti-govt-stand-it-rules"&gt;Data Quest&lt;/a&gt; (March 28, 2013),  and &lt;a href="http://www.thehindu.com/news/national/clarify-and-define-terms-in-it-rules-panel-tells-govt/article4570291.ece"&gt;The Hindu&lt;/a&gt; (April 1, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Submissions&lt;br /&gt;&lt;/b&gt;Bhairav Acharya, on behalf of CIS submitted comments to the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha for the following rules:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"&gt;Comments on the Information Technology (Electronic Service Delivery) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on April 11, 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on April 11, 2011.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011"&gt;Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011&lt;/a&gt;. The Rules were notified by the Central Government in the Gazette of India vide Notification GSR 315(E) on April 11, 2011.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Note: &lt;i&gt;The above rules were submitted earlier but published on our website only recently&lt;/i&gt;.&lt;/p&gt;
&lt;h3&gt;Unique ID Project&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/uid-and-npr"&gt;Unique Identity Number (UID), National Population Register (NPR), and Governance&lt;/a&gt; (organized by CIS and Say No to UID Campaign, TERI, Bangalore, March 2, 2013):  CIS interviewed Usha Ramanathan and Anant Maringanti. Watch the &lt;a href="https://cis-india.org/internet-governance/blog/workshop-on-the-uid-and-npr"&gt;videos&lt;/a&gt; uploaded in this blog post by Maria Xynou. This was covered in &lt;a href="https://cis-india.org/news/newzfirst-march-3-2013-people-should-resist-enforcement-of-uid-scheme-say-experts"&gt;newzfirst&lt;/a&gt; on March 3, 2013 and in the &lt;a href="https://cis-india.org/news/the-hindu-march-3-2013-uid-has-no-legal-sanctity"&gt;Hindu&lt;/a&gt; on March 3, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt;Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance&lt;/a&gt; (by Elonnai Hickok, March 14, 2013). The post examines the UID, NPR and Governance as it exists in India. A video on the UID interview Questions and Answers is published.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;News and Media&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/zdnet-mahesh-sharma-march-14-2013-indian-id-crisis-unveils-aadhar-doubts"&gt;Indian ID crisis unveils Aadhaar doubts&lt;/a&gt; (ZDNet, March 14, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/aeg-india-march-16-2013-new-dollar-one-billion-ric-project-casts-doubts-on-aadhar"&gt;New $1 Billion RIC Project Casts Doubts on Aadhaar&lt;/a&gt; (AEG India, March 16, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"&gt;India's Biometric Identification Programs and Privacy Concerns&lt;/a&gt; (by Divij Joshi, March 31, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Free Speech and Expression&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;News and Media&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/openmagazine-article-business-prashant-reddy-march-2-2013-foreign-funding-of-ngos"&gt;Foreign Funding of NGOs&lt;/a&gt; (by Prashant Reddy, Open Magazine, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban"&gt;Iceland’s proposed porn ban ‘like repression in Iran, N. Korea’ – activists&lt;/a&gt; (RT, March 1, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-march-4-2013-dhanya-ann-thoppil-chidambaram-to-talk-budget-on-google-hangout"&gt;Chidambaram to Talk Budget on Google+ Hangout&lt;/a&gt; (by Dhanya Ann Thoppil, Wall Street Journal, March 4, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/livemint-ruchita-saxena-march-13-2013-responding-to-govt-requests-is-a-challenge-for-online-firms"&gt;Responding to govt requests is a challenge for online firms: Colin Maclay&lt;/a&gt; (LiveMint, March 13, 2013). Colin M. Maclay, managing director of Berkman Center for Internet and Society at Harvard mentioned CIS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/afp-march-18-2013-indian-police-set-up-lab-to-monitor-social-media"&gt;Indian police set up lab to monitor social media&lt;/a&gt; (originally published by &lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1"&gt;AFP&lt;/a&gt;, March 18, 2013, and also carried in &lt;a href="http://www.globalpost.com/dispatch/news/afp/130318/indian-police-set-lab-monitor-social-media"&gt;Global Post&lt;/a&gt; on the same day). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wsj-r-jai-krishna-march-20-2013-namaste-mr-eric-schmidt"&gt;Namaste, Mr. Eric Schmidt&lt;/a&gt; (by R. Jai Krishna, Wall Street Journal, March 20, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws"&gt;Parliament panel blasts govt over ambiguous internet laws&lt;/a&gt; (by Ishan Srivastava, The Times of India, March 28, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days"&gt;What if the Net shut down for a few days&lt;/a&gt; (by Atul Sethi, The Times of India, March 30, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world"&gt;Press controls ‘send wrong message to rest of world’&lt;/a&gt; (by Jerome Starkey from Johannesburg, Francis Elliott from Delhi and David Brown, The Times, UK). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/freedom-song-film-screening-and-discussion"&gt;Freedom Song: Film Screening and Discussion&lt;/a&gt; (IIHS Bangalore City Campus, March 21, 2013). Freedom Song, a documentary film produced by the Public Service Broadcasting Trust and directed by Paranjoy Guha Thakurta and Subi Chaturvedi was screened. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.iijnm.org/iijnmnews-rept.html"&gt;Is Social Media Incredible?&lt;/a&gt; (organized by Indian Institute of Journalism &amp;amp; New Media, Bangalore, March 2, 2013). Snehashish Ghosh participated in a panel discussion. The New Indian Express &lt;a href="https://cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility"&gt;published a post-event report&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/rethinking-the-internet"&gt;Rethinking the Internet: The Way Forward&lt;/a&gt; (organized by Telecom Italia and Financial iTimes, Telecom Italia Future Centre, Italy, March 21 – 22, 2013). Pranesh Prakash participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Others&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/dml-hub-net-dml-2013"&gt;DML 2013: Fourth Annual Conference&lt;/a&gt; (co-organised by CIS and Digital Media &amp;amp; Learning Research Hub Central, Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2013). We had a special track that ran through the conference on "Whose Change Is It Anyway? Futures, Youth, Technology And Citizen Action In The Global South (And The Rest Of The World)". Noopur Raval was one of the 16 presenters that we had selected on the tracks. Nishant Shah was one of the members in the &lt;a href="http://http/dml2013.dmlhub.net/"&gt;Conference Committee&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Blog Posts&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/wgig-8-stock-taking-mapping-and-going-forward"&gt;WGIG+8: Stock-Taking, Mapping, and Going Forward&lt;/a&gt; (Fontenoy Building, conference room # 7, UNESCO Headquarters, Paris, February 27, 2013). Pranesh Prakash was the moderator for the session. A summary of the discussion has been published.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush"&gt;What’s In a Name? — DNS Singularity of ICANN and the Gold Rush&lt;/a&gt; (by Sharath Chandra Ram, March 31, 2013). March 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by ICANN for its new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bensonsamuel-an-introduction-to-bitfilm-and-bitcoin-in-bangalore"&gt;An Introduction to Bitfilm &amp;amp; Bitcoin in Bangalore, India&lt;/a&gt; (by Benson Samuel, March 12, 2013). Video of the event organized by CIS on January 23, 2013 is published in this blog post.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access"&gt;Knowledge Repository on Internet Access&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation is executing a project on Internet Access. It covers the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access and will touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;br /&gt;We are hosting an “Institute on Internet and Society” in collaboration with the Ford Foundation India, which is to be held from June 8, 2013 to June 14, 2013. Call for registration and relevant details will be announced soon on our website.&lt;/p&gt;
&lt;p&gt;The following units have been published:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-protocols"&gt;Internet Protocols&lt;/a&gt; (by Srividya Vaidyanathan, March 18, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/how-email-works"&gt;How email works, how do you get your email? Email Protocols&lt;/a&gt; (SMTP, POP, IMAP), SPAM/Phishing (by Srividya Vaidyanathan, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-corporation-for-assigned-names-and-numbers"&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (by Snehashish Ghosh, March 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/international-telecommunication-union"&gt;ITU sectors — ITU-R, ITU-T, ITU-D, etc&lt;/a&gt;. (by Snehashish Ghosh, March 27, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/knowledge-repository-on-internet-access/wcit-2012"&gt;World Conference on International Telecommunications 2012&lt;/a&gt; (by Snehashish Ghosh, March 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility of telecommunications services and resources and has provided inputs to ongoing policy discussions and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-march-8-2013-are-indias-glory-days-over"&gt;Are India's Glory Days Over?&lt;/a&gt; (by Shyam Ponappa, &lt;a href="http://organizing-india.blogspot.in/2013/03/are-indias-glory-days-over.html"&gt;Organizing India Blogspot&lt;/a&gt;, March 8, 2013, originally published in the &lt;a href="http://www.business-standard.com/article/opinion/are-india-s-glory-days-over-113030600625_1.html"&gt;Business Standard&lt;/a&gt;, March 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/video-vortex-9-net-re-assemblies-of-video"&gt;Video Vortex # 9 Re:assemblies of Video&lt;/a&gt; (organized by the Institute of Network Cultures, Post Media Lab, Moving Image Lab, Leuphana, et.al, February 28 – March 2, 2013). Nishant Shah gave the &lt;a href="http://videovortex9.net/ai1ec_event/reassemblies/?instance_id=292"&gt;key note&lt;/a&gt;. Videos of the event are published.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;From 2012 to 2015, the Researchers @ Work series is focusing on building research clusters in the field of Digital Humanities. We organised the first Habits of Living workshops in Bangalore last year. The next workshop is being held in Brown University&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Event Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-networked-affects-glocal-effects"&gt;Habits of Living: Networked Affects, Glocal Effects&lt;/a&gt; (co-organised with Brown University, March 21 – 23, 2013, Brown University, Rhode Island). Nishant Shah was a &lt;a href="http://www.brown.edu/Conference/Habits/"&gt;speaker&lt;/a&gt; at this event. He made a presentation on network ontologies.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/trans-review-korean-trans-cine-media-in-global-contexts"&gt;Korean Trans Cine-Media in Global Contexts: Asia and the World&lt;/a&gt; (organized by Trans-Asia Screen Culture Institute, Cinema Studies, Korean National University of Arts, Korean Film Archive and Tsubouchi Memorial Theatre Museum, Waseda University, Seoul, March 27 – 29, 2013). Nishant Shah was a speaker at this event. He spoke on "The Asian Intercourse: Reimagining the Inter-Asia moment through ‘net-porn’ in networks".&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Support Us&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-2013-bulletin'&gt;https://cis-india.org/about/newsletters/march-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-04-14T11:45:29Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns">
    <title>India's Biometric Identification Programs and Privacy Concerns</title>
    <link>https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns</link>
    <description>
        &lt;b&gt;The invasiveness of individual identification coupled with the fallibility of managing big data which biometric identification presents poses a huge risk to individual privacy in India.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Divij Joshi is a 2nd year at NLS. He is interning with the Centre for Internet and Society for the privacy project. &lt;em&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/em&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Biometric technology looks to be the way ahead for the Indian government in its initiatives towards identification. From the Unique Identity Scheme (Aadhaar) to the National Population Register and now to Election ID’s, [1] biometric identification seems to have become the government’s new go-to solution for all kinds of problems. Biometrics prove to be an obvious choice in individual identification schemes – it’s easiest to identify different individuals by their faces and fingerprints, unique and integral aspects of individuals – yet, the unflinching optimism in the use of biometric technology and the collection of biometric data on a massive scale masks several concerns regarding compromises of individual privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;‘Big Data’ and Privacy Issues&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Biometric data is going to be collected under several existing and proposed identification schemes of the government, from the Centralized Identities Data Register of the UID to the draft DNA Profiling Bill which seeks to improve criminal forensics and identification. With the completion of the biometric profiling under the UID, the Indian government will have the largest database of personal biometric data in the world. [3] With plans for the UID to be used for several different purposes — as a ration card, for opening a banking account, for social security and healthcare and several new proposed uses emerging everyday,&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; the creation of ‘Big Data’ becomes possible. ‘Big Data’ is characterized by the volume of information that is produced, the velocity by which data is produced, the variety of data produced and the ability to draw new conclusions from an analysis of the data.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; The UID will generate “Big Data” as it is envisioned that the number will be used in every transaction for any platform that adopts it — for all of the 1.2 billion citizens of India. In this way the UID is different any other identity scheme in India, where the identifier is used for a specific purpose at a specific point of time, by a specific platform, and generates data only in connection to that service. Though the creation of “Big Data” through the UID could be beneficial through analysing data trends to target improved services, for example, at the same time it can be problematic in case of a compromise or breach, or if generated information is analyzed to draw new and unintended conclusions about individuals without their consent, and using information for purposes the individuals did not mean for it to be used.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Biometric ID and Theft of Private Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The government has touted identification schemes such as the UID and NPR as a tool to tackle rural poverty, illegal immigration and national security issues and with this as the premise, the concerns about privacy seem to have been left in the lurch. The optimism driving the programmes also means that its potential fallibility is often overlooked in the process. Biometric technology has been proven time and again to be just as easily jeopardized as any other and the threat of biometric identity theft is as real and common as something like credit card fraud, with fingerprints and iris scans being easily capable of replication and theft without the individual owners consent. [2] In fact, compromise or theft of biometric identity data presents an even greater difficulty than other forms of ID because of the fact that it is unique and intrinsic, and hence, once lost cannot be re-issued or reclaimed like traditional identification like a PIN, leaving the individual victim with no alternative system for identification or authentication. This would also defeat the entire purpose behind any authentication and identification schemes. With the amount of personal data that the government plans to store in databases using biometrics, and without adequate safeguards which can be publicly scrutinized, using this technology would be a premature and unsafe move.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Biometric data and Potential Misuse&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Centralised data storage is problematic not only for the issues with data compromise and identity theft, but the problems of potential third-party misuse in the absence of an adequate legal framework for protecting such personal data, and proper technical safeguards for the same, as has been pointed out by the Standing Committee on Finance in its report on the UIDAI project.&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt; The threat to privacy which these massive centralized databases pose has led to the shelving of similar programmes in England as well as France. [4] Further, concerns have been voiced about data sharing and access to the information contained in the biometric database. The biometric database is to be managed by several contracting companies based in the US. These same companies have legal obligations to share any data with the US government and Homeland Security. [5]&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A second, growing concern over biometric identification schemes is over the use of biometrics for state surveillance purposes. While the UID’s chief concern on paper has been development, poverty, and corruption alleviation, there is no defined law or mandate which restricts the number from being used for other purposes, hence giving rise to concerns of a function creep - a shift in the use of the UID from its original intended purpose. For example, the Kerala government has recently proposed a scheme whereby the UID would be used to track school children.&lt;a name="fr5" href="#fn5"&gt;[5]&lt;/a&gt; Other schemes such as the National Population Register and the DNA Profiling Bill have been specifically set up with security of the State as the mandate and aim.&lt;a name="fr6" href="#fn6"&gt;[6]&lt;/a&gt; With the precise and accurate identification which biometrics offers, it also means that individuals are that much easier to continuously survey and track, for example, by using CCTV cameras with facial recognition software, the state could have real-time surveillance over any activities of any individual.&lt;a name="fr7" href="#fn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With all kinds of information about individuals connected by a single identifier, from bank accounts to residential and voter information, the threat of increased state surveillance, and misuse of information becomes more and more pronounced. By using personal identifiers like fingerprints or iris scans, agencies can potentially converge data collected across databases, and use it for different purposes. It also means that individuals can potentially be profiled through the information provided from their various databases, accessed through identifiers, which leads to concerns about surveillance and tracking, without the individuals knowledge. There are no Indian laws or policies under data collection schemes which address concerns of using personal identifiers for tracking and surveillance.&lt;a name="fr8" href="#fn8"&gt;[8]&lt;/a&gt; Even if such such use is essential for increased national security, the implementation of biometrics for constant surveillance under the present regime ,where individuals are not notified about the kind of data being collected and for what its being used, would be a huge affront on civil liberties, as well as the Right to Privacy, and prove to be a powerful and destructive weapon in the hands of a police state. Without these concerns being addressed by a suitable, publicly available policy, it could pose a huge threat to individual privacy in the country. As was noted by the Deputy Prime Minister of the UK, Nick Clegg, in a speech where he denounced the Identity Scheme of the British government, saying that “This government will end the culture of spying on its citizens. It is outrageous that decent, law-abiding people are regularly treated as if they have something to hide. It has to stop. So there will be no ID card scheme. No national identity register, a halt to second generation biometric passports.” [6]&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Biometric technology has been useful in several programmes and policies where its use has been open to scrutiny and restricted to a specific function, for example, the recent use of facial recognition in Goa to tackle voter fraud, and similar schemes being taken up by the Election Commission. [7] However, with lack of any guidelines or specific legal framework covering the implementation and collection of biometric data schemes, such schemes can quickly turn into ‘biohazards’ for personal liberty and individual privacy, as has been highlighted above and these issues must be brought to light and adequately addressed before the Government progresses on biometric frontiers.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. &lt;a href="http://www.goacom.com/goa-news-highlights/3520-biometric-scanners-to-be-used-for-elections"&gt;http://www.goacom.com/goa-news-highlights/3520-biometric-scanners-to-be-used-for-elections&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. &lt;a href="http://www.wired.com/threatlevel/2008/03/hackers-publish"&gt;http://www.wired.com/threatlevel/2008/03/hackers-publish&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].&lt;a href="https://www.eff.org/deeplinks/2012/09/indias-gargantuan-biometric-database-raises-big-questions"&gt;https://www.eff.org/deeplinks/2012/09/indias-gargantuan-biometric-database-raises-big-questions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. &lt;a href="http://www.informationweek.com/security/privacy/britain-scraps-biometric-national-id-car/228801001"&gt;http://www.informationweek.com/security/privacy/britain-scraps-biometric-national-id-car/228801001&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn5" href="#fr5"&gt;5&lt;/a&gt;]. &lt;a href="http://www.thehindu.com/opinion/op-ed/questions-for-mr-nilekani/article4382953.ece"&gt;http://www.thehindu.com/opinion/op-ed/questions-for-mr-nilekani/article4382953.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn6" href="#fr6"&gt;6&lt;/a&gt;]. &lt;a href="http://news.bbc.co.uk/2/hi/8691753.stm"&gt;http://news.bbc.co.uk/2/hi/8691753.stm&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn7" href="#fr7"&gt;7&lt;/a&gt;]. Supra note 1.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns'&gt;https://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T10:51:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush">
    <title>What’s In a Name? — DNS Singularity of ICANN and The Gold Rush</title>
    <link>https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush</link>
    <description>
        &lt;b&gt;March 2013 being the 28th birthday of the first ever registered Internet domain as well as the exigent launch of the Trademark Clearing House disguised as a milestone in rights protection by the Internet Corporation for Assigned Names and Numbers (ICANN) for it’s new gTLD program, Sharath Chandra Ram, dissects the transitory role of ICANN from being a technical outfit to the Boardroom Big Brother of Internet Governance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a class="external-link" href="http://trademark-clearinghouse.com/"&gt;Click to read&lt;/a&gt; more about the &lt;b&gt;Trademark Clearing House&lt;/b&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As a non-profit organization, established in agreement with the US Department of Commerce in 1998, the current arrangement of ICANN has come under serious questions in recent years, with the United Nations wanting the ITU to oversee Internet Governance while Europe seeking more public participation in the decision making process that currently comprises a majority of private stakeholders as ICANN board members with vested interests. In this post we shall look at a few instances that give room for thought about the regulatory powers and methods adopted by ICANN as well as reparatory measures taken to reaffirm it’s image as an able governing body amidst disputes over trademarks and fair competition that might actually call for a wider and objective inclusion in future. An outline of functional and structural arrangements of ICANN maybe found at the &lt;a class="external-link" href="http://goo.gl/FijE7"&gt;CIS Knowledge Repository page&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Business Model&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Earlier this month, (March 15, 2013) was the 28&lt;sup&gt;th&lt;/sup&gt; birthday of &lt;a href="http://www.symbolics.com"&gt;symbolics.com&lt;/a&gt;, the first ever domain name registered in 1985 through the formal ICANN process. (&lt;a class="external-link" href="http://www.nordu.net/ndnweb/home.html"&gt;nordu.net&lt;/a&gt; being the first domain name created by the registry on January 1, 1985 for the first  root server, nic.nordu.net) Symbolics, that spun-off the MIT AI Lab and specialized in building workstations running LISP finally sold the domain for an undisclosed amount to XY.com, an Internet investment firm that has been proudly boasting about their acquired relic for over three years now. The golden days of fancy one word domain name resale at exorbitant prices are over, as Google’s page ranking crawler now really looks at unique content and backlinks. Nevertheless, those with the same archaic view of a real estate agent still believe that a good domain name does have a high ROI and have managed to find naïve takers who will offer ridiculous amounts. One of many such examples is the plain looking &lt;a href="http://www.business.com"&gt;www.business.com&lt;/a&gt; that was bought initially for $1,50,000 and changed hands twice from $7.5 million to an absurd $345 million of R.H. Donnelley Inc., that soon filed for bankruptcy!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The top level domain market however, is consistently lucrative. A TLD registry on an average receives $5 - $7 per domain registered under it. So the .COM registry run by VeriSign which, as of 2013 has over a 100 million registered domains, receives a revenue of $500 to $700 million per year of which a fraction is paid to ICANN periodically on a per-registration or per-renewal basis. Competing registrars and registries across TLDs, their revenue generation practices as well as the application process for new TLDs gradually began to be regulated by ICANN in mysterious ways, as we will see in the following legal case studies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;VeriSign vs. ICANN&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;VeriSign began to operate the .COM and .NET TLD after taking over Network Solutions Inc. and entering into a contractual agreement with ICANN in 2001. Let’s take a look at some methods used by VeriSign to garner internet traffic and registrant revenue, that were clamped down by the ICANN, which resulted in a lawsuit by plaintiff VeriSign claiming prevention of fair competition and revenue by impeding innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Clamping of Site Finder &amp;amp; WLS&lt;/i&gt;: In September 2003, VeriSign introduced a Wild Card DNS Service called Site Finder for all .com and .net domains. This meant that any user trying to access a non-existent domain name no longer received the 404 Error but were instead redirected to the VeriSign website with adverts and links to affiliate registrars. Often a result of a misspelled domain, in ICANN’s view, the redirection by VeriSign amounted to typo squatting internet users as within a month VeriSign’s traffic rose dramatically moving it to the top 20 most visited websites on the web. As seen below in this archived image of Alexa’s 2003 traffic statistic (Courtesy: &lt;a class="external-link" href="http://cyber.law.harvard.edu/"&gt;cyber.law.harvard.edu&lt;/a&gt;).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_DailyTraffic.png" alt="Daily Traffic" class="image-inline" title="Daily Traffic" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Shortly, in October 2003, ICANN issued a suspension ultimatum pointing Site Finder in violation of the 2001 .Com agreement. This was not the first time ICANN clamped down on VeriSign’s ‘profiteering’ methods. In 2001, ICANN prevented VeriSign’s WLS (Wait Listing Service) that allowed a registrant (through selected participating affiliate registrars of VeriSign) to apply to register an already registered domain in the event that the registration is deleted – a nifty scheme considering the fact that about 25000 domains are deleted everyday!&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The long drawn case of VeriSign Vs. ICANN ended on a reconciliatory note, with ICANN bringing the Site Finder service to a halt at the cost of VeriSign walking away happier with a free 5 year extension on the .COM domain (2007 extended to 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the ingenious Site Finder service did pose a huge problem to spam filters, both the WLS and yet another service that VeriSign launched to allow registration of non-English language SLDs were also met with a cringe by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;However looking closer, one may realize that the act of ICANN permitting a DNS root redirect service such as Site Finder for all TLD operators (with an acceptable template that also carried information about the 404 error besides other marketing options) meant the first step towards paving the way towards a plausible scenario of multiple competing DNS roots across TLDs being able to interact with each other  — a system often argued by network theorists to be the most efficient and competitive model that would reduce the disjoint between the demand and supply of TLDs in a decentralized infrastructure, and that definitely was not in the best interest of ICANN’s monopolistic plan. Hence, this could be seen as a move by ICANN to nip the Site Finder bud while still young&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as brought to public notice in more than one instance (name.Space Vs. ICANN, IOD Vs. ICANN), the vested interests of ICANN board members has come under glaring light. &lt;b&gt;Can the ICANN leadership consisting of members from the very same domain name business industry be able to objectively deal with competing registry services and legal issues?&lt;/b&gt; Conspicuous targets have been chairperson Steve Crocker who owns a consulting firm Shinkuro, whose subtle investor is infact AFILIAS INC which runs the .INFO and .MOBI TLDs, provides backend services to numerous TLDs (.ORG, .ASIA, .AERO (aviation)), has applied for a further 31 new TLDs and has it’s CTO Ram Mohan on the Board of Directors of ICANN. Also ICANN Vice Chariman, Bruce Tonkin is Senior Executive at Australia’s largest domain name provider Melbourne IT, and Peter Thrush former chairman of the ICANN Board of Directors is Executive Chairman of Top Level Domain Holdings,Inc which filed 92 gTLD applications in 2012.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Trademark Protection and Domain Names&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Image Online Design (IOD) is a company that since 1996 has been providing Internet registry services using the trademark .WEB (trademark #3,177,334 including computer accessories) registered with the US Patents and Trademarks Office (USPTO).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s registry services however, were not through the primary DNS root server maintained by ICANN, but through an alternate DNS root that required prospective users to manually make changes in their browser settings in order to resolve .WEB domains registered through IOD. Despite not running the primary DNS root server for. WEB, by the year 2000 IOD had acquired about 20,000 registered .WEB customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The beacon of ‘hope’ arrived upon IOD in mid-2000 as ICANN (on advise of supporting organization GNSO) opened a call for proposals for registrations of new TLDs, with a non-refundable deposit of $50,000 for an application to be considered. By then the importance of the .WEB TLD for e-commerce was well known amongst ICANN board members with Louis Touton lobbying for his preferred applicant AFILIAS INC to be given the .WEB TLD, with others raising concerns about IOD’s preregistration of .WEB domains. One of the founding fathers of the internet, Vinton Cerf, the then Chairman of ICANN took a benevolent stance-- &lt;i&gt;"I'm still interested in IOD," he repeated over Touton's objections. "They've worked with .WEB for some time. To assign that to someone else given that they're actually functioning makes me uneasy," he said, prompting board member Linda Wilson to chime in, "I agree with Vint."&lt;/i&gt; (&lt;a href="http://goo.gl/d1v6X"&gt;http://goo.gl/d1v6X&lt;/a&gt; , &lt;a href="http://goo.gl/eV9Jd"&gt;http://goo.gl/eV9Jd&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally amidst all the contention, no one was offered the .WEB domain and ICANN announced that all applications not selected will remain pending and those who submitted will have the option of being re-considered when additional TLD selections are made in future. And the future being, 2012, when ICANN invited a new round of TLD applicants, this time with the non-refundable deposit of whopping $185,000 for a single application (1 TLD/application as opposed to the $50,000 in the year 2000 that allowed multiple TLD requests within the same application) to be considered. While 7 new applicants for the .WEB TLD registered their interest, IOD considered their application to be still pending and did not join the new pool that included AFILIAS INC. and GOOGLE.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The litigation of IOD Vs ICANN ended in Feb 2013, with IOD claiming weak causes of action under “Trademark Infringement” and “Breach of Contract” &amp;amp;“Fair Dealing” hinging on the fact that the initial $50,000 application was still pending and never was officially rejected by ICANN. Further, there was not enough room to make a valid trademark infringement, as there was no substantial room for consumer confusion in the .WEB case.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Remarks and Submissions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The IOD Vs. ICANN case not only increased concerns globally, over the uncertainty associated with the ICANN application process for generic TLDs along with questions regarding the objectivity of its board members, but at the same time has alerted ICANN to take the necessary big sister steps to ensure that it’s well in the game.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact of the matter is that the USPTO does not provide trademark protection services for the Top level Domain industry citing the reason that TLDs trademarks do not provide a distinct service mark that can identify or differentiate the service of an applicant from others, and further cannot be used to ascertain the source of an applicant’s services.  This view is flawed, as by looking at a TLD, say BBC.com, an informed person can easily say that VeriSign INC manages the service of directing a user to a correct location on the .COM registry. With introduction of new gTLDs, perhaps BBC would shift it’s content to BBC.news, where the source may be an abstracted Registrar and the nature of service being quite evident. And to those registered trademarks, especially those that shall result in substantial brand confusion to the customer if infringed, granting a TLD like .ibm or .bbc may well be granted to the owner of the trademark who may then outsource registry services to a service provider. This shall invert the current model by relegating the role of a TLD registry holder to that of a contracted service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;So the question is, should have the US Department of Commerce, who contracted ICANN in the first place, mediated with USPTO to place the business of a registrar on par with other trades and businesses, and modify it’s trademark infringement policies? And more importantly, will ICANN view this as introducing yet another key stakeholder to the gTLD assignment process?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The answer to the latter is already clear as ICANN being in the top of it’s game decided to take matters into its own hands and on March 26, 2013) launched&lt;/b&gt; &lt;a href="http://trademark-clearinghouse.com/"&gt;&lt;b&gt;http://trademark-clearinghouse.com/&lt;/b&gt;&lt;/a&gt;&lt;b&gt; with a new set of guidelines for accepted trademarks and a mechanism that allows trademark holders to submit their application to a central repository.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Accepted trademark holders shall be given priority to register gTLDs during the ‘sunrise’ period. Deloitte Enterprise Risk Services have been assigned the responsibility of evaluating submitted trademarks while IBM shall maintain the actual database of trademarks by the later half of 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The tip of the iceberg is well in scope of view. ICANN46 is currently being hosted in Beijing, at the China Internet Network Information Centre (CINIC) from April 7 to 11, 2013 while hopefully parallel discussions will happen on all other global forums to hopefully re-consider a future of multiple competing DNS root servers towards healthy competition that is decentralized.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt; Key References&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="http://www.icann.org/en/news/litigation"&gt;http://www.icann.org/en/news/litigation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cyber.law.harvard.edu/tlds/"&gt;http://cyber.law.harvard.edu/tlds/&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Lynn, S. [2001] “Discussion Draft: A Unique, Authoritative Root for the DNS” Internet Corporation for Assigned Names and Numbers, 28 May, 2001.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Internet Architecture Board [2000] “IAB Technical Comment on the Unique DNS Root.” RFC 2826, Internet Society, May 2000.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush'&gt;https://cis-india.org/internet-governance/blog/dns-singularity-of-icann-and-the-gold-rush&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-03-31T05:35:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days">
    <title>What if the Net shut down for a few days</title>
    <link>https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days</link>
    <description>
        &lt;b&gt;When spammers attacked Spamhaus, a European spam-fighting group in what was billed as the "biggest cyber attack in history", they managed to temporarily slow down the internet. But what if dedicated attackers succeeded in shutting down the internet for a longer time, maybe a few days? What would be the potential impact of such a scenario in a world where crucial data is stored on emails, most financial transactions have shifted online and an entire generation has grown up not realising what life without the web could be like?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Atul Sethi was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-03-30/internet/38144585_1_internet-blackout-cyber-attack-internet-and-society"&gt;published in the Times of India&lt;/a&gt; on March 30, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"The thought itself is frightening," says Vijay Mukhi, president of the  Foundation of Information Security and Technology and co-founder of the  Internet Users Community of India. "Most people use their email or cloud  computing to store their data. What happens when you can't access your  crucial information? Also, financial activity in the absence of the  internet will come to a standstill since there would be no money flow  happening between banks or transactions in the stock market. The  implications are huge. And I'm not even thinking of the withdrawal  symptoms that many youngsters are going to go through when they can't  log on. "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, contrary to the horror that this situation might elicit  from those whose lives revolve around the web, the impact on India, at  least, should not be much, says Sunil Abraham, director of the  Bangalore-based Centre for Internet and Society. "An internet blackout  in India can at most be compared to a bandh. Life becomes uncomfortable  but it still goes on. This is because in India, the internet is used by  just about 20% of the population. At the most, one can argue that since  this 20% also constitutes the elite of the country - bureaucrats,  politicians, businessmen, media, etc, any disruption in their work could  also affect the remaining 80% of the country indirectly."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even  though complete shutdown of the internet is believed to be virtually  impossible - since it is made up of thousands of interconnections which  ensure its infallibility - hackers haven't stopped trying as the latest  cyber attack shows. Internet security consultant Ankit Fadia points out  that the only way somebody can bring down the internet is if a few  million hackers combine together as part of a sustained project. "Even  then, it's a remote possibility that they can pull it off," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If it does happen, though, remember to polish up your letter-writing  skills and go over to your friend's house if you want to chat.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days'&gt;https://cis-india.org/news/times-of-india-atul-sethi-march-30-2013-what-if-the-net-shut-down-for-a-few-days&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-04-03T11:01:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table">
    <title>A Privacy Round Table in Delhi</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the FICCI Federation House in Tansen Marg, New Delhi on April 13, 2013, from 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable.pdf" class="internal-link"&gt;Click to download the invite&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the “Report of the Group of Experts on Privacy” by the Justice AP Shah Committee, and the text of the Citizens’ Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30  &lt;br /&gt;11.30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview of Justice AP Shah report: Purpose, principles, and framework&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;12.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.00 &lt;br /&gt;13.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion on the Citizens’ Privacy Protection Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;13.00 &lt;br /&gt;14.00&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.00  &lt;br /&gt;16.00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth explanation and discussions regarding the Citizens’ Privacy Protection Bill 2013 (time for review and comments)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.00&lt;br /&gt;16.30&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the first New Delhi Roundtable on &lt;b&gt;April 13, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Friday &lt;b&gt;April 5, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees submit a brief introduction about themselves and their interest in the topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table'&gt;https://cis-india.org/internet-governance/events/privacy-round-table&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-12T09:33:46Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws">
    <title>Parliament panel blasts govt over ambiguous internet laws</title>
    <link>https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws</link>
    <description>
        &lt;b&gt;The Parliamentary Standing Committee on Subordinate Legislation has come out with a report in which it has lambasted the government and asked it to make changes to IT rules that govern internet-related cases in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Ishan Srivastava was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Parliament-panel-blasts-govt-over-ambiguous-internet-laws/articleshow/19249667.cms"&gt;published in the Times of India&lt;/a&gt; on March 28, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;It said in the report that  multiple clauses in the laws had inherent ambiguity and that  discrepancies exist in the government's stand on whether some rules are  mandatory or only of advisory nature.&lt;/span&gt;&lt;span id="advenueINTEXT"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The committee said that  inherent ambiguity of words like 'blasphemy' and `disparaging', among  others, could lead to harassment of people as has happened with Section  66A of the IT Act repeatedly in recent times. Incidents include the  arrest of two girls over 'liking' a  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; post and a defamation case against an individual for an 'offensive'  tweet. It has also been used by multiple politicians to suppress voices  of dissent by branding them as 'defamatory'.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;These ambiguous  terms are used in the Intermediary Guidelines rules, passed in April  2011, which the committtee said could lead to legitimate speech being  removed. Also, the Standing Committee noted that many categories of  speech prohibited by the Intermediary Guidelines rules were not  prohibited by any statute, and hence could not be prohibited by the  government through these rules. The Standing Committee has asked the  government to ensure that "no new category of crimes or offences is  created" by these rules.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The committee also said that  discrepancies exist in the nature of implementation of these laws. While  the government's stand is that Intermediary Guidelines are only "of  advisory nature and self-regulation" and that "it is not mandatory for  the Intermediary to disable the information", the wording of the laws  suggest otherwise. In many of the laws, terms like "shall act" within 36  hours are used. The committee said that there was a "need for clarity  on the aforesaid contradiction" and "safeguards to protect against any  abuse" since it could lead to censorship.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;"The government has  told the Committee that the rules are for "self-regulation", but they in  fact aren't. The rules dictate what content cannot be hosted. And our  research found that intermediaries react to fake takedown requests too,  just to avoid being liable for their users' content. This is not  self-regulation, but government-mandated private censorship," said  Pranesh Prakash, policy director at the Centre for Internet and Society  (CIS). CIS is a Bangalore-based non-profit body looking at issues of  public accountability, privacy, free expression, and openness, and has  consistently argued that many parts of the IT Act are unconstitutional. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The committee also suggested that all evidence relating to foreign  websites refusing to honour Indian laws should be made public and a  public debate should be encouraged as the internet is a global  phenomena. Recently there have been instances of issues between the  &lt;a href="http://timesofindia.indiatimes.com/topic/Indian-Government"&gt;Indian government&lt;/a&gt; and tech giants like Facebook and  &lt;a href="http://timesofindia.indiatimes.com/topic/Google"&gt;Google&lt;/a&gt; related to censorship and taking down of 'offensive' and 'defamatory' content.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;While the government's stand is that Intermediary Guidelines are only  "of advisory nature and self-regulation" and that "it is not mandatory  for the Intermediary to disable the information," the wording of the  laws suggest otherwise.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws'&gt;https://cis-india.org/news/times-of-india-ishan-srivastava-march-28-2013-parliament-panel-blasts-govt-over-ambiguous-internet-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-28T08:37:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies">
    <title>Microsoft releases its first report on data requests by law enforcement agencies around the world</title>
    <link>https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies</link>
    <description>
        &lt;b&gt;In this post, the Centre for Internet and Society presents Microsoft´s report on law enforcement requests, with a focus on data requested by Indian law enforcement agencies.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, Microsoft released its first report with data on the number of requests received from law enforcement agencies around the world relating to Microsoft online and cloud services. Microsoft´s newly released &lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;2012 Law Enforcement Requests Report &lt;/a&gt;depicts the company's willingness to join the ranks of Google, Twitter and other Web businesses that publish transparency reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As of 30 June 2012, &lt;/span&gt;&lt;a href="http://www.internetworldstats.com/asia.htm#in"&gt;137 million&lt;/a&gt;&lt;span&gt; Indians are regular Internet users, many of which use Microsoft services including Skype, Hotmail, Outlook.com, SkyDrive and Xbox Live. Yet, until recently, it was unclear whether Indian law enforcement agencies were requesting data from our Skype calls, emails and other Microsoft services. Thus, Microsoft's release of a report on law enforcement requests is a decisive step in improving transparency in regards to how many requests for data are made by law enforcement agencies and how many requests are granted by companies. Brad Smith, an executive vice president and Microsoft´s general counsel, wrote in his &lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt;blog post&lt;/a&gt;&lt;span&gt;:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;“As we continue to move forward, Microsoft is committed to respecting human rights, free expression and individual privacy.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;h2&gt;&lt;b&gt;Microsoft 2012 Law Enforcement Requests&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Democratic countries requested the most data during 2012, according to &lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt;Microsoft´s report&lt;/a&gt;&lt;span&gt;. The law enforcement agencies in the United States, the United Kingdom, Germany, France and Turkey accounted for 69 percent of the 70, 665 requests Microsoft (excluding Skype) received last year. Although India did not join the rank of the countries which made the fewest requests from Microsoft, it did not join the&lt;/span&gt;&lt;a href="http://www.itpro.co.uk/data-protection/19488/microsoft-opens-collaboration-law-enforcement-agencies"&gt; top-five league&lt;/a&gt;&lt;span&gt; which accounted for the most requests, despite the country having &lt;/span&gt;&lt;a href="https://opennet.net/research/profiles/india"&gt;one of the world´s highest number of Internet users&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of the&lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt; 70,665 requests&lt;/a&gt;&lt;span&gt; to Microsoft by law enforcement agencies around the world, only about 0.6 percent of the requests were made by Indian law enforcement agencies. These 418 requests specified 594 accounts and users, which is significantly low in comparison to the top-five and other countries, such as Taiwan, Spain, Mexico, Italy, Brazil and Australia. Indian law enforcement requests accounted for about 0.5 percent of the total 122, 015 accounts and user data that was requested by law enforcement agencies around the world.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt;Content data&lt;/a&gt;&lt;span&gt; is defined by Microsoft as what customers create, communicate and store on or through their services, such as words in an e-mail or photographs and documents stored on SkyDrive or other cloud offerings. &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html?_r=1&amp;amp;"&gt;Non-content data&lt;/a&gt;&lt;span&gt;, on the other hand, refers to basic subscriber information, such as the e-mail address, name, location and IP address captured at the time of registration. According to Microsoft´s 2012 report, the company did not disclose any content data to Indian law enforcement agencies. In fact, only &lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt;2.2 percent &lt;/a&gt;&lt;span&gt;of requests from law enforcement agencies around the world resulted in the disclosure of content data, &lt;/span&gt;&lt;a href="http://www.engadget.com/2013/03/21/microsoft-posts-its-first-law-enforcement-requests-report/"&gt;99 percent of which were in response to warrants from courts in the United States&lt;/a&gt;&lt;span&gt;. Microsoft may have not disclosed any of our content data, but&lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt; 370 requests&lt;/a&gt;&lt;span&gt; from Indian law enforcement agencies resulted in the disclosure of our non-content data. In other words, 88.5 percent of the requests by India resulted in the disclosure of e-mail addresses, IP addresses, names, locations and other subscriber information.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Out of the 418 requests made to Microsoft by Indian law enforcement agencies, &lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt;only 4 were rejected &lt;/a&gt;&lt;span&gt;(1 percent) and no data was found for 44 requests (10.5 percent). In total, Microsoft rejected the disclosure of 1.2 percent of the requests made by law enforcement agencies around the world, while data was not found for 16.8 percent of the international requests. Thus, the outcome of the data shows that the majority of the requests by Indian law enforcement agencies resulted in the disclosure of non-content data, while very few requests were rejected by Microsoft (excluding Skype). The following table summarizes the requests by Indian law enforcement agencies and their outcome:&lt;/span&gt;&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Total   number of requests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;418   (0.6%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accounts/Users   specified in requests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;594   (0.5%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure   of content&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0   (0%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure   of non-content data&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;370   (88.5%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;No   data found&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;44   (10.5%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Requests   rejected&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4   (1%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;span&gt;Skype 2012 Law Enforcement Requests&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt;Microsoft acquired Skype&lt;/a&gt; towards the end of 2011 and the integration of the two companies advanced considerably over the course of 2012. According to the&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt; Microsoft 2012 report&lt;/a&gt;, Indian law enforcement agencies made 53 requests for Skype user data and 101 requests for specified accounts on Skype. In other words, out of the total 4,715 requests for Skype user data by law enforcement agencies around the world, the requests by Indian law enforcement accounted for about 0.1 percent. 15,409 international requests were made for specified accounts on Skype, but Indian law enforcement requests only accounted for about 0.6 percent of those.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The&lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt; report &lt;/a&gt;&lt;span&gt;appears to be extremely reassuring, as it states that Skype did&lt;/span&gt;&lt;i&gt; not &lt;/i&gt;&lt;span&gt;disclose any content data to any law enforcement agencies around the world. That essentially means that, according to the report, that all the content we created and communicated through Skype during 2012 was kept private from law enforcement. Although Microsoft claims to not have disclosed any of our content data, it did &lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt;disclose &lt;/a&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt;&lt;i&gt;non-content data&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, such as SkypeID, name, email account, billing information and call detail records if a user subscribed to the Skype In/Online service, which connects to a telephone number. However, Microsoft did not report how many requests the company received for non-content data, nor how much data was disclosed and to which countries.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Microsoft &lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/#FAQs1"&gt;reported &lt;/a&gt;&lt;span&gt;that data was not found for 47 of India´s law enforcement requests, which represents 88.6 percent of the requests. In total, Microsoft reported that data was not found for about half the requests made by law enforcement agencies on an international level. Out of the 53 requests, Microsoft provided guidance to Indian law enforcement agencies for 10 requests. In particular, such guidance was provided either in response to a rejected request or general questions about the process for obtaining Skype user data. Yet, the amount of rejected requests for Skype user data was not included in the report and the guidance provided remains vague. The following table summarizes the requests by Indian law enforcement agencies for Skype user data and their outcome:&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Total   of requests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;53   (0.1%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Accounts/identifiers   specified in requests&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;101   (0.6%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Requests   resulting in disclosure of content&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;0   (0%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;No   data found&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;47   (88.6%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Provided   guidance to law enforcement&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10   (18.8%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Centre for Internet and Society (CIS) supports the publication of &lt;/span&gt;&lt;a href="http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/"&gt;Microsoft´s 2012 Law Enforcement Requests Report&lt;/a&gt;&lt;span&gt; and encourages Microsoft (including Skype) to continue releasing such reports which can provide an insight on how much user data is being shared with law enforcement agencies around the world. In order to ensure that such reports adequately provide transparency, they should be broadened in the future to include more data, such as the amount of non-content data requests disclosed by Skype, the type of guidance provided to law enforcement agencies and the amount of requests rejected by Skype. Nonetheless, this report is a decisive first step in increasing transparency and further, more detailed reports are strongly encouraged.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies'&gt;https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T12:19:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules">
    <title>CIS Welcomes Standing Committee Report on IT Rules</title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society welcomes the report by the Standing Committee on Subordinate Legislation, in which it has lambasted the government and has recommended that the government amend the Rules it passed in April 2011 under section 79 of the Information Technology Act.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.prsindia.org/uploads/media/IT%20Rules/IT%20Rules%20Subordinate%20committee%20Report.pdf"&gt;Click to read&lt;/a&gt; the Parliamentary Standing Committee Report on the IT Rules. A modified version was &lt;a class="external-link" href="http://www.ciol.com/ciol/news/185991/cis-welcomes-panels-anti-govt-stand-it-rules"&gt;published in CiOL&lt;/a&gt; on March 27, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;These rules have been noted by many, including CIS, Software Freedom Law Centre, and Society for Knowledge Commons, and many eminent lawyers, as being unconstitutional. The Standing Committee, noting this, has asked the government to make changes to the Rules to ensure that the fundamental rights to freedom of speech and privacy are safeguarded, and that the principles of natural justice are respected when a person’s  freedom of speech or privacy are curtailed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Ambiguous and Over-reaching Language&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee has noted the inherent ambiguity of words like "blasphemy", "disparaging", etc., which are used in the Intermediary Guidelines Rules, and has pointed out that unclear language can lead to harassment of people as has happened with Section 66A of the IT Act, and can lead to legitimate speech being removed.  Importantly, the Standing Committee recognizes that many categories of speech prohibited by the Intermediary Guidelines Rules are not prohibited by any statute, and hence cannot be prohibited by the government through these Rules.  Accordingly, the Standing Committee has asked the government to ensure "no new category of crimes or  offences is created" by these Rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government Confused Whether Rules Are Mandatory or Advisory&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee further notes that there is a discrepancy in the government’s stand that the Intermediary Guidelines Rules are not mandatory, and are only "of advisory nature and self-regulation", and that "it is not mandatory for the Intermediary to disable the information, the rule does not lead to any kind of censorship". The Standing Committee points out the flaw in this, and notes that the language used in the rules is mandatory language (“shall act” within 36 hours). Thus, it rightly notes that there is a "need for clarity on the aforesaid contradiction".  Further, it also notes that there is "there should be safeguards to protect against any abuse", since this is a form of private censorship by intermediaries."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Evidence Needed Against Foreign Websites&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The government has told the Standing Committee that "foreign websites repeatedly refused to honour our laws", however, it has not provided any proof for this assertion.  The government should make public all evidence that foreign web services are refusing to honour Indian laws, and should encourage a public debate on how we should tackle this problem in light of the global nature of the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Cyber Cafes Rules Violate Citizens’ Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee also pointed out that the Cyber Cafe Rules violated citizens’ right to privacy in requiring that "screens  of the computers installed other than in partitions and  cubicles should face open space of the cyber café".  Unfortunately, the Standing Committee did not consider the privacy argument against retention of extensive and intrusive logs. Under the Cyber Cafe Rules, cyber cafes are required to retain (for a minimum of one year) extensive logs, including that of "history of websites accessed using computer resource at cyber café" in such a manner that each website accessed can be linked to a person. The Committee only considered the argument that this would impose financial burdens on small cybercafes, and rejected that argument.  CIS wishes the Committee had examined the provision on log maintenance on grounds of privacy as well."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Government’s Half-Truths&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In one response, the government notes that "rules under Section 79 in particular have undergone scrutiny by High Courts in the country. Based on the Rules, the courts have given reliefs to a number of individuals and organizations in the country. No provision of the Rules notified under Sections 43A and 79 of the IT  Act, 2000 have been held &lt;i&gt;ultra vires&lt;/i&gt;."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What the government says is a half-truth.  So far, courts have not struck down any of the IT Rules. But that is because none of the High Court cases in which the vires of the Rules have been challenged has concluded. So it is disingenuous of the government to claim that the Rule have "undergone scrutiny by High Courts".  And in those cases where relief has been granted under the Intermediary Guidelines, the cases have been ex-parte or have been cases where the vires of the Rules have not been challenged.  The government, if it wants to defend the Rules, should point out to any case in which the vires of the Rules have been upheld.  Not a single court till date has declared the Rules to be constitutional when that question was before it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of Representation of Stakeholders in Policy Formulation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the Standing Committee noted that it is not clear whether the Cyber Regulatory Advisory Committee (CRAC), which is responsible for policy guidance on the IT Act, has "members representing the interests of  principally affected or having special knowledge of the  subject matter as expressly stipulated in Section 88(2) of the  IT Act".  This is a problem that we at CIS also noted in November 2012, when the CRAC was reconstituted after having been defunct for more than a decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS hopes that the government finally takes note of the view of legal experts, the Standing Committee on Delegated Legislation, the Parliamentary motion against the Rules, and numerous articles and editorials in the press, and withdraws the Intermediary Guidelines Rules and the Cyber Cafe Rules, and instead replaces them with rules that do not infringe our constitutional rights.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness, and engages in academic research on digital natives and digital humanities.  It was among the organizations that submitted evidence to the Standing Committee on Subordinate Legislation on the IT Rules&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-standing-committee-report-on-it-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-04-03T10:54:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes">
    <title>Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes...</title>
    <link>https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at red light cameras, RFID tags and black boxes used to monitor vehicles in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;How many times in your life have you heard of people been involved in car accidents and of pedestrians being hit by red-light-running vehicles? What if there could be a solution for all of this? Well, several countries, including the United States, the United Kingdom and Singapore, have &lt;a href="http://www.thenewspaper.com/rlc/docs/syn310.pdf"&gt;already adopted measures&lt;/a&gt; to tackle vehicle accidents and fatalities, some of which include traffic enforcement cameras and other security measures. India is currently joining the league by not only installing red light cameras, but by also including radio frequency identification (RFID) tags on vehicles´ number plates, as well as by installing electronic toll collection systems and black boxes in some automobiles. Although such measures could potentially increase our safety, &lt;a href="http://arstechnica.com/tech-policy/2012/09/your-car-tracked-the-rapid-rise-of-license-plate-readers/2/"&gt;privacy concerns&lt;/a&gt; have arisen as it remains unclear how data collected will be used.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Red light cameras&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Last week, the Chennai police announced that it plans&lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2011-05-12/chennai/29535601_1_red-light-camera-system-red-light-cameras-traffic-signals"&gt; to install traffic enforcement cameras&lt;/a&gt;&lt;span&gt;, otherwise known as red light cameras, at 240 traffic signals over the next months, in order to put an end to car thefts in the city. Red light cameras, which capture images of vehicles entering an intersection against a red traffic light, have been installed in Bangalore since &lt;/span&gt;&lt;a href="http://www.traffictechnologytoday.com/news.php?NewsID=2767"&gt;early 2008&lt;/a&gt;&lt;span&gt; and a&lt;/span&gt;&lt;a href="http://ibnlive.in.com/news/study-finds-red-light-cameras-cuts-crashes/142065-57-132.html"&gt; study&lt;/a&gt;&lt;span&gt; indicates that they have reduced the traffic violation rates. A &lt;/span&gt;&lt;a href="http://www.thenewspaper.com/rlc/docs/syn310.pdf"&gt;2003 report by the National Cooperative Highway Research Programme (NCHRP)&lt;/a&gt;&lt;span&gt; examined studies from the previous 30 years in the United States, the United Kingdom, Australia and Singapore and concluded that red light cameras ´improve the overall safety of intersections when they are used´.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;However, how are traffic violation rates even measured? According to &lt;/span&gt;&lt;a href="http://blogs.wsj.com/numbersguy/seeing-red-1208/"&gt;Barbara Langland Orban&lt;/a&gt;&lt;span&gt;, an associate professor of health policy and management at the University of South Florida:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;“Safety is measured in crashes, in particular injury crashes, and violations are not a proxy for injuries. Also, violations can be whatever number an agency chooses to report, which is called an ‘endogenous variable’ in research and not considered meaningful as the number can be manipulated. In contrast, injuries reflect the number of people who seek medical care, which cannot be manipulated by the reporting methods of jurisdictions.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Last year,  the Bombay state government informed the High Court that the &lt;/span&gt;&lt;a href="http://www.indianexpress.com/news/cctvs-not-fit-to-detect-traffic-violations-state-to-hc/910392"&gt;100 CCTV cameras&lt;/a&gt;&lt;span&gt; installed at traffic junctions in 2006-2007 were unsuitable for traffic enforcement because they lacked the capacity of automatic processing. Nonetheless, red light cameras, which are capable of monitoring speed and intersections with stop signals, are currently being proliferated in India. Yet, questions remain: Do red light cameras adequately increase public safety? Do they serve financial interests? Do they violate driver´s &lt;/span&gt;&lt;a href="http://www.thehindu.com/opinion/op-ed/of-constitutional-due-process/article436586.ece"&gt;due-process rights&lt;/a&gt;&lt;span&gt;?&lt;/span&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;RFID tags and Black Boxes&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A communication revolution is upon us, as Maharashtra state transport department is currently including radio &lt;/span&gt;&lt;a href="http://www.dnaindia.com/mumbai/report_maharashtra-rto-spy-to-breathe-down-drivers-neck_1625521"&gt;frequency identification (RFID) tags on each and every number plate of vehicles&lt;/a&gt;&lt;span&gt;. This ultimately means that the state will be able to monitor your vehicle´s real-time movement and track your whereabouts. RFID tags are not only supposedly used to increase public safety by tracking down offenders, but to also streamline public transport timetables. Thus, the movement of buses and cars would be precisely monitored and would provide passengers minute-to-minute information at bus stops. Following the &lt;/span&gt;&lt;a href="http://www.hsrpdelhi.com/Rule50.pdf"&gt;2001 amendment of Rule 50 of the Central Motor Vehicles Rules&lt;/a&gt;&lt;span&gt;, 1989, new number plates with RFID tags have been made mandatory for all types of motor vehicles throughout India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;RFID technology has also been launched at Maharashtra´s &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-08-18/mumbai/33261046_1_rfid-stickers-border-check-posts"&gt;state border check-posts&lt;/a&gt;&lt;span&gt;. Since last year, the state government has been circulating RFID stickers to trucks, trailers and tankers, which would not only result in heavy goods vehicles not having to wait in long queues for clearance at check-posts, but would also supposedly put an end to corruption by RTO officials.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;By &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2013-03-07/mumbai/37530519_1_plazas-on-national-highways-toll-plazas-toll-collection"&gt;31 March 2014&lt;/a&gt;&lt;span&gt;, it is estimated that RFID-based electronic toll collection (ETC) systems will be installed on all national highways in India. According to &lt;/span&gt;&lt;a href="http://netindian.in/news/2013/03/05/00023379/electronic-toll-collection-all-national-highways-march-2014-joshi"&gt;Dr. Joshi&lt;/a&gt;&lt;span&gt;, the Union Minister for Road Transport and Highways:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized" style="text-align: justify; "&gt;&lt;i&gt;“&lt;/i&gt;&lt;i&gt;The RFID technology&lt;/i&gt;&lt;i&gt; shall expedite the clearing of traffic at toll plazas and the need of carrying cash shall also be eliminated when toll plazas shall be duly integrated with each other throughout India.”&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Although Dr. Joshi´s mission to create a quality highway network across India and to increase the transparency of the system seems rational, the ETC system raises privacy concerns, as it &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2013-03-07/mumbai/37530519_1_plazas-on-national-highways-toll-plazas-toll-collection"&gt;uniquely identifies each vehicle&lt;/a&gt;&lt;span&gt;, collects data and provides general vehicle and traffic monitoring. This could potentially lead to a privacy violation, as India currently lacks adequate statutory provisions which could safeguard the use of our data from potential abuse. All we know is that our vehicles are being monitored, but it remains unclear how the data collected will be used, shared and retained, which raises concerns.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The cattle and pedestrians roaming the streets in India appear to have increased the need for the installation of an &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/article3636417.ece"&gt;Event Data Recorder (EDR)&lt;/a&gt;&lt;span&gt;, otherwise known as a black box, which is a device capable of recording information related to crashes or accidents. The purpose of a black box is to record the speed of the vehicle at the point of impact in the case of an accident and whether the driver had applied the brakes. This would help insurance companies in deciding whether or not to entertain insurance claims, as well as to determine whether a driver is responsible for an accident.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Black boxes for vehicles are already being designed, tested and installed in some vehicles in India at an affordable cost. In fact, manufacturers in India have recommended that the government make it &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/article3636417.ece"&gt;mandatory for cars&lt;/a&gt;&lt;span&gt; to be fitted with the device, rather than it being optional. But can we have privacy when our cars are being monitored? This is essentially a case of proactive monitoring which has not been adequately justified yet, as it remains unclear how information would be used, who would be authorised to use and share such information, and whether its use would be accounted for to the individual.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Are monitored cars safer?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The trade-off is clear: the privacy and anonymity of our movement is being monitored in exchange for the provision of safety. But are we even getting any safety in return? According to a &lt;/span&gt;&lt;a href="http://www.fhwa.dot.gov/publications/research/safety/05049/05049.pdf"&gt;2005 Federal Highway Administration study&lt;/a&gt;&lt;span&gt;, although it shows a decrease in  front-into-side crashes at intersections with cameras, an increase in rear-end crashes has also been proven. Other&lt;/span&gt;&lt;a href="http://www.techdirt.com/articles/20091218/1100537428.shtml"&gt; studies&lt;/a&gt;&lt;span&gt; of red light cameras in the US have shown that more accidents have occurred since the installation of traffic enforcement cameras at intersections. Although no such research has been undertaken in India yet, the effectiveness, necessity and utility of red light cameras remain ambiguous.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Furthermore, there have been &lt;/span&gt;&lt;a href="http://www.usatoday.com/story/news/nation/2013/03/08/speed-camera-ruling/1974369/"&gt;claims&lt;/a&gt;&lt;span&gt; that the installation of red light cameras, ETCs, RFID tags, black boxes and other technologies do not primarily serve the purpose of public security, but financial gain. A huge debate has arisen in the United States on whether such monitoring of vehicles actually improves safety, or whether its primary objective is to serve financial interests. Red light cameras have already generated about $1.5 million in fines in the Elmwood village of Ohio, which leads critics to believe that the installation of such cameras has more to do with revenue enhancement than safety. The same type of question applies to India and yet a clear-cut answer has not been reached.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Companies which manufacture &lt;/span&gt;&lt;a href="http://dir.indiamart.com/impcat/vehicle-tracking-systems.html"&gt;vehicle tracking systems&lt;/a&gt;&lt;span&gt; are widespread in India, which constitutes the monitoring of our cars a vivid reality. Yet, there is a lack of statutory provisions in India for the privacy of our vehicle´s real-time movement and hence, we are being monitored without any safeguards. Major privacy concerns arise in regards to the monitoring of vehicles in India, as the following questions have not been adequately addressed: What type of data is collected in India through the monitoring of vehicles? Who can legally authorize access to such data? Who can have access to such data and under what conditions? Is data being shared between third parties and if so, under what conditions?How long is such data being retained for?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;And more importantly: Why is it important to address the above questions? Does it even matter if the movement of our vehicles is being monitored? How would that affect us personally? Well, the monitoring of our cars implies a huge probability that it´s not our vehicles per se which are under the microscope,&lt;/span&gt;&lt;a href="http://www.farnish.plus.com/amatterofscale/mirrors/omni/surveillance.htm"&gt; but us&lt;/a&gt;&lt;span&gt;. And while the tracking of our movement might not end us up arrested, interrogated, tortured or imprisoned tomorrow...it might in the future. As long as we are being monitored,&lt;/span&gt;&lt;a href="http://www.samharris.org/blog/item/the-trouble-with-profiling"&gt; we are all suspects&lt;/a&gt;&lt;span&gt; and we may potentially be treated as any other offender who is suspected to have committed a crime. The current statutory omission in India to adequately regulate the use of traffic enforcement cameras, RFID tags, black boxes and other technologies used to track and monitor the movement of our vehicles can potentially violate our due process rights and infringe upon our right to privacy and other human rights. Thus, the collection, access, use, analysis, sharing and retention of data acquired through the monitoring of vehicles in India should be strictly regulated to ensure that we are not exposed to our defenceless control.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Maneuvering our monitoring&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Nowadays, surveillance appears to be the quick-fix solution for everything related to public security; but that does not need to be the case.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Instead of installing red light cameras monitoring our cars´ movements and bombarding us with fines, other ´simple´ measures could be enforced in India, such as&lt;/span&gt;&lt;a href="http://d2dtl5nnlpfr0r.cloudfront.net/tti.tamu.edu/documents/0-4196-2.pdf"&gt; increasing the duration of the yellow light&lt;/a&gt;&lt;span&gt; between the green and the red, &lt;/span&gt;&lt;a href="http://www.motorists.org/red-light-cameras/alternatives"&gt;re-timing lights&lt;/a&gt;&lt;span&gt; so drivers will encounter fewer red ones or increasing the visibility distance of the traffic lights so that it is more likely for a driver to stop. Such measures should be enforced by governments, especially since the monitoring of our vehicles is not adequately justified.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Strict laws regulating the use of all technologies monitoring vehicles in India, whether red light cameras, RFID tags or black boxes, should be enacted now. Such regulations should clearly specify the terms of monitoring vehicles, as well as the conditions under which data can be collected, accessed, shared, used, processed and stored. The enactment of regulations on the monitoring of vehicles in India could minimize the potential for citizens´ due process rights to be breached, as well as to ensure that their right to privacy and other human rights are legally protected. This would just be another step towards preventing ubiquitous surveillance and if governments are interested in protecting their citizens´ human rights as they claim they do, then there is no debate on the necessity of regulating the monitoring of our vehicles. The question though which remains is:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;i&gt;Should we be monitored at all?&lt;/i&gt;&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes'&gt;https://cis-india.org/internet-governance/blog/driving-in-the-surveillance-society-cameras-rfid-black-boxes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:26:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft">
    <title>The Privacy (Protection) Bill 2013: A Citizen's Draft </title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, Bhairav Acharya has drafted the Privacy (Protection) Bill 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Privacy (Protection) Bill 2013 contains  provisions that speak to data protection, interception, and  surveillance. The Bill also establishes the powers and functions of the  Privacy Commissioner, and lays out offenses and penalties for  contravention of the Bill. The Bill represents a citizen's version of a  possible privacy legislation for India, and will be shared with key  stakeholders including civil society, industry, and government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="internal-link"&gt;Click&lt;/a&gt; to download a full draft of the Privacy (Protection) Bill, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:50:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi">
    <title>Future of Privacy in India</title>
    <link>https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi</link>
    <description>
        &lt;b&gt;DSCI and ICOMP are organizing a meet on Privacy at the Oberoi Hotel in New Delhi on April 5, 2013. Sunil Abraham will be participating in this event as a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In recent years, there has been an increasing deployment of ICT in the collection of personal information by both private sector and state agencies. Data is a reason for empowerment for both commercial and public purposes. The prolific use of the Internet for search, social networking cloud computing and e-commerce transactions places increasing amounts of personal information and Internet history in hands of dominant private sector players. Data is undeniably the capital of the Internet.  While technology has evolved to be able to collect, store and mine increasing amounts of data for improved public services or for commercial purposes, there are understandable concerns over the lack of accountability for the purposes and limits of the use of personal data. These concerns demand an appropriate regulatory framework for Privacy.&lt;br /&gt;&lt;br /&gt;As an important step toward formulating the privacy bill, an Expert Group headed by Justice A P Shah provides inputs based on a study of the international landscape of privacy laws, along with the predominant privacy concerns ensuing from technological advancements. The Committee’s report, submitted in Oct 2012 has recommended Nine Principles as the cornerstone for privacy legislation. While the Privacy Act is under development, DSCI and iCOMP are organizing a meet focusing on the following areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Outline an appropriate Indian context for privacy: the nine principles&lt;/li&gt;
&lt;li&gt;Presentation of the state of play on privacy in key markets (practices, Issues, regulatory interventions)&lt;/li&gt;
&lt;li&gt;Analyse the scope and implications of data collection by public agencies in India.&lt;/li&gt;
&lt;li&gt;Analyse privacy challenges and risks related to  commercial use of data collected on the Internet by private players&lt;/li&gt;
&lt;li&gt;Consider how India can address these challenges and enshrine privacy principles in legislation&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Key Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Gulshan Rai, DG, CERT-In*&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Simon Davis, London School of Economics&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Manoj Joshi, JS, DOPT*&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Kanta Roy, CEO, NeGD*&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Dr. Kamlesh Bajaj, CEO, DSCI&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Mr. Sunil Abraham, ED, CIS&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;* &lt;i&gt;To be confirmed&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Event Flow&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Opening Remark by Mr. S V Divvaakar, Executive Director, ICOMP&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Framework for Privacy Regulation in India, By Dr. Kamlesh Bajaj, CEO, DSCI&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Keynote Address&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;‘Privacy :The International state of play’, by Mr. Simon Davis, London School of Economics&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Panel Discussion 1: Context of Privacy in India&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;th&gt;Panel Discussion 2: Business responsibility in the age of ‘data driven’ transformations&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Date: &lt;/b&gt;April 5, 2013&lt;br /&gt;&lt;b&gt;Time: &lt;/b&gt;9.00 a.m. to 1.00 p.m.&lt;br /&gt;&lt;b&gt;Venue:&lt;/b&gt; Oberoi Hotel, Nilgiri Room, New Delhi&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi'&gt;https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-26T05:14:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world">
    <title>Press controls ‘send wrong message to rest of world’</title>
    <link>https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world</link>
    <description>
        &lt;b&gt;Britain could trigger an international media crackdown if the Government goes ahead with plans for a Royal Charter to introduce a new Press regulator, free speech campaigners warned yesterday. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the article written by Jerome Starkey from Johannesburg, Francis Elliott from Delhi and David Brown. It was &lt;a class="external-link" href="http://www.thetimes.co.uk/tto/news/medianews/article3718732.ece"&gt;published in the Times&lt;/a&gt; on March 21, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Oppressive regimes will use the example of the planned regulation in  Britain to justify tighter controls on their own media, it was claimed.  Campaigners from across the Commonwealth are preparing to urge the Queen  not to approve the Royal Charter when it is presented by the Privy  Council on May 8. Senior journalists and campaigners in Africa and Asia  accused Britain of “chilling media freedom” by legitimising state  interference in the media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Phenyo Butale, the director of South Africa’s &lt;a href="http://fxi.org.za/home/" target="_blank"&gt;Freedom of Expression Institute&lt;/a&gt;,  said: “African governments have shown they are uncomfortable with free  press acting as a watchdog, holding them to account. A move to statutory  regulation in the UK would really be a gift for them.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Somalia, one of the most dangerous countries in the  world to be a journalist, reporters said that they were alarmed by the  British plans. “It’s alarming that the British Government is regulating  the freedom of its press,” said Mohammed Ibrahim, secretary-general of  the Somali Union of Journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, director of the Centre for Internet and Society, a Bangalore-based organisation that campaigns against the Indian Government’s often heavy-handed attempts to regulate online content, said that the UK had surrendered the moral high ground in an important international debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The UK has traditionally made free speech an important component of their foreign policy and when their own internal actions contradict their external position . . . they no longer have any influence on the Indian situation,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Editorial Board of The New York Times wrote that the proposed regulation would “do more harm than good”, adding: “It is worth keeping in mind that journalists at newspapers like The Guardianand The [New York] Times, not the police, first brought to light the scope and extent of hacking by British tabloids. It would be perverse if regulations . . . ended up stifling the kind of hard-hitting investigative journalism that brought it to light in the first place.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mumsnet, one of the most popular blogging sites, has sought a guarantee from the Government that it would not be caught by the regulations. The Department for Culture, Media and Sport told the website that it “will ultimately be for the court to decide on the definition of a ‘relevant publisher’ ” covered by the new regulations “but our view is that Mumsnet would not be covered by the new regime”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justine Roberts, the website’s founder, has asked to be specifically included in the list of exempted websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The House of Lords will vote on Monday on the definition of “relevant publisher” when peers consider new amendments to the Crime and Courts Bill. Some of Britain’s major newspaper and magazine publishers have indicated that they will not join the new regulator.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world'&gt;https://cis-india.org/news/the-times-uk-jerome-starkey-francis-elliott-david-brown-march-21-2013-press-controls-send-wrong-message-to-rest-of-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-26T04:51:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis">
    <title>India’s Civil Liberties Crisis: Of Bans, Blocks, Bullying and Biometrics</title>
    <link>https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis</link>
    <description>
        &lt;b&gt;Malavika Jayaram will be a speaker at this event which is organized by the Center for Global Communication Studies and will be held at Annenberg School of Communication, University of Pennslyvania, Philadelphia, on March 28, 2013, from 12 p.m. to 1.30 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read &lt;a class="external-link" href="http://www.global.asc.upenn.edu/events.html"&gt;about the event&lt;/a&gt; on the website of the Center for Global Communication Studies.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Unlike the US First Amendment, the first amendment to the Constitution of India actually strengthened state regulation over freedom of speech. Irony aside, the amendment that is considered by many scholars as the first media crisis in post-colonial India has increasing relevance today. Its prioritization of sovereignty and national security over democratic rights and institutions has resulted in a zone of contestation between nation building and free speech. This is playing out through a series of battles involving website blocking, book banning, biometric databases and bullying of all kinds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last few months, an all-girl rock band in Kashmir was silenced, a village in Bihar banned women and girls from using mobile phones, and we had yet another Salman Rushdie controversy. Movies were blocked. Facebook and Google were taken to court for hosting objectionable content. Paintings were removed from an art gallery at the “suggestion” of the police because they depicted Hindu deities as semi-nude. At the same time, there was a drive to digitize governance and to build biometric databases to enumerate and record every individual. The impacts on free speech, anonymity, and privacy were considered fair game in the drive towards progress, inclusion, and maintenance of public order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The relationship between the citizen and the state is undergoing a radical transformation mediated by the marriage of welfare schemes and commercial interests. The privacy of one’s body and identity is challenged by initiatives to capture fingerprints, irises, faces, and transactions. The heckler’s vote is increasingly powerful in silencing free expression. Civil society is under siege for resisting the onslaught of draconian legislation, arbitrary restrictions, and the banning of various forms of cultural output. Narratives are being constructed that attribute all civic engagement with “western values” and with being mouthpieces of foreign interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this talk, I will give an overview of the strands of discord that are forming the fabric of India’s latest crisis of democracy. I will unpack some of the rhetoric behind the government’s drive to grasp the individual, and make the citizen visible to the state in an unprecedented manner. I will also discuss my experiences working with civil society in India, and the tools and techniques used to engage with policy formation and to adapt to the future of advocacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A dual-qualified lawyer, &lt;b&gt;Malavika Jayaram&lt;/b&gt; spent eight years in London - with global law firm Allen &amp;amp; Overy in the Communications, Media &amp;amp; Technology group, and then with Citigroup. She relocated to India in 2006, and wears 3 hats as a practising lawyer, a Fellow at the Centre for Internet and Society (CIS) and a PhD scholar. As a partner at Jayaram &amp;amp; Jayaram, Bangalore, she focuses on corporate/tech transactions and has a special interest in new media and the arts. At CIS, Malavika collaborates on projects that study legislative and policy changes in the internet governance and privacy domains. As a PhD scholar, she is looking at data protection and privacy in India, with a special focus on e-governance schemes and the new biometric ID project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A graduate of the National Law School of India, she has an LL.M. from Northwestern University, Chicago. She is on the advisory board of the Indian Journal of Law &amp;amp; Technology and is the author of the India chapter for the Data Protection &amp;amp; Privacy volume in the Getting the Deal Through series, launched this year. She is one of 10 Indian lawyers featured in “The International Who's Who of Internet e- Commerce &amp;amp; Data Protection Lawyers 2012” directory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is currently running a research project for Internews, studying internet policy in India. This will produce a landscape overview and interviews with various stakeholders in this domain.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis'&gt;https://cis-india.org/news/global-asc-upenn-events-indias-civil-liberties-crisis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-25T10:39:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency">
    <title>Internet Censorship, Surveillance, and Corporate Transparency</title>
    <link>https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency</link>
    <description>
        &lt;b&gt;Google’s Dorothy Chou will be in conversation with international experts Annenberg School of Communication, St., Philadelphia, on April 3, 2013, from 4.30 p.m. to 6.00 p.m. Malavika Jayaram is participating in the event as a panelist. The event is organised by Center for Global Communication Studies and Annenberg School for Communication, University of Pennsylvania.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read full details of the event was&lt;a class="external-link" href="http://www.global.asc.upenn.edu/events.html"&gt; published&lt;/a&gt; on the website of Center for Global Communication Studies.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Since mid 2010 Google has been publishing data about the requests it receives from governments to remove content or hand over user data. This regularly updated Transparency Report reveals alarming trends: Government surveillance is on the rise, everywhere. Even worse, a large number of government censorship and surveillance requests are of dubious legality even according to the host countries’ own laws.  In a world where citizens increasingly rely on digital products and services owned and operated by private corporations for their civic and political lives, the implications for human rights and democracy around the world are troubling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dorothy Chou, Senior Policy Analyst who leads Google's efforts to increase transparency about how it responds to government censorship and surveillance demands, will discuss Google's Transparency Report with Rebecca MacKinnon, Senior Fellow at the New America Foundation and an international panel of experts:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Ronald Lemos, &lt;/b&gt;the                                                           Director of                                                           the Center for                                                           Technology and                                                           Society at the Fundação Getúlio Vargas                                                           (FGV) School                                                           of Law in Rio                                                           de Janeiro,                                                           Brazil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Hu                                                           Yong&lt;/b&gt;,                                                           Associate                                                           Professor,                                                           Peking                                                           University                                                           School of                                                           Journalism and                                                           Communication&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; &lt;b&gt;Malavika                                                           Jayaram&lt;/b&gt;,                                                           Fellow, Center                                                           for Internet                                                           and Society,                                                           Bangalore and                                                           Annenberg                                                           CGCS;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; Gregory Asmolov,&lt;/b&gt; PhD Candidate, London School of                                                           Economics;                                                           Global Voices                                                           "RuNet Echo" contributor and Russian                                                           social media                                                           expert.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This event is part of the cross-disciplinary, university-wide “&lt;a href="http://cgcs.asc.upenn.edu/cgi-bin/projects.cgi?id=105&amp;amp;p=main"&gt;New Technologies, Human Rights, and Transparency&lt;/a&gt;”  project funded by the university’s Global Engagement Fund and hosted by  Annenberg’s Center for Global Communications Studies in partnership  with Wharton, PennLaw, Engineering, and the School of Arts and  Sciences.  The project aims to examine the relationship between  government and corporate power in today’s digitally networked world,  bringing together research partners from across the university and  around the world to develop a methodology to evaluate and compare the  policies and practices of Information and Communication Technology (ICT)  companies as they affect Internet users’ freedom expression and privacy  in a human rights context.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency'&gt;https://cis-india.org/news/global-asc-upenn-events-internet-censorship-surveillance-and-corporate-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-25T10:29:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
