<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 6.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/mag-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder">
    <title>The 'Global Multistakholder Community' is Neither Global Nor Multistakeholder</title>
    <link>https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder</link>
    <description>
        &lt;b&gt;CIS research shows how Western, male, and industry-driven the IANA transition process actually is.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In March 2014, the &lt;a href="http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-transition-key-internet-domain-name-functions"&gt;US government announced that they were going to end the contract they have with ICANN&lt;/a&gt; to run something called the Internet Assigned Numbers Authority (IANA), and hand over control to the “global multistakeholder community”. They insisted that the plan for transition had to come through a multistakeholder process and have stakeholders “across the global Internet community”.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Analysis of the process since then shows how flawed the “global multistakeholder community” that converges at ICANN has not actually represented the disparate interests and concerns of different stakeholders. CIS research has found that the discussions around IANA transition have not been driven by the “global multistakeholder community”, but mostly by males from industry in North America and Western Europe.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;CIS analysed the five main mailing lists where the IANA transition plan was formulated: ICANN’s &lt;a href="http://mm.ianacg.org/pipermail/icg-forum_ianacg.org/"&gt;ICG&lt;/a&gt; &lt;a href="https://forum.icann.org/lists/icg-forum/"&gt;Stewardship&lt;/a&gt; and &lt;a href="https://mm.icann.org/pipermail/accountability-cross-community/"&gt;CCWG Accountability&lt;/a&gt; lists; IETF’s &lt;a href="https://mailarchive.ietf.org/arch/browse/ianaplan/"&gt;IANAPLAN&lt;/a&gt; list; and the NRO’s &lt;a href="https://www.nro.net/pipermail/ianaxfer/"&gt;IANAXFER&lt;/a&gt; list and &lt;a href="https://www.nro.net/pipermail/crisp/"&gt;CRISP&lt;/a&gt; lists. What we found was quite disheartening.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A total of &lt;em&gt;239 individuals&lt;/em&gt; participated cumulatively, across all five lists.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Only 98 substantively contributed to the final shape of the ICG proposal&lt;/em&gt;, if one takes a count of 20 mails (admittedly, an arbitrary cut-off) as a substantive contribution, with 12 of these 98 being ICANN staff some of whom were largely performing an administrative function.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;We decided to look at the diversity within these substantive contributors using gender, stakeholder grouping, and region. We relied on public records, including &lt;a href="https://community.icann.org/display/gnsosoi/"&gt;GNSO SOI statements&lt;/a&gt;, and extensive searches on the Web. Given that, there may be inadvertent errors, but the findings are so stark that even a few errors wouldn’t affect them much.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;2 in 5&lt;/strong&gt; (39 of 98, or 40%) were from a single country: the &lt;strong&gt;United States of America&lt;/strong&gt;.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were from countries which are part of the WEOG UN grouping (which includes &lt;em&gt;Western Europe, US, Canada, Israel, Australia, and New Zealand&lt;/em&gt;), which only has developed countries.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;None&lt;/strong&gt; were from the EEC (Eastern European and Russia) group, and only &lt;strong&gt;5 of 98&lt;/strong&gt; from all of GRULAC (Latin American and Caribbean Group).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (77 of 98) were &lt;em&gt;male&lt;/em&gt; and 21 were female.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;4 in 5&lt;/strong&gt; (76 of 98) were from industry or the technical community, and only 4 (or 1 in 25​) were identifiable as primarily speaking on behalf of governments.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;This shows also that the process has utterly failed in achieving the recommendation of Paragraph 6 of the &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf&amp;gt;NETMundial outcome document&amp;lt;/a&amp;gt;, which states:
&amp;lt;blockquote&amp;gt;
&amp;lt;p&amp;gt;In the follow up to the recent and welcomed announcement of US Government with regard to its intent to transition the stewardship of IANA functions, the discussion about mechanisms for guaranteeing the transparency and accountability of those functions after the US Government role ends, has to take place through an open process with the participation of all stakeholders &amp;lt;b&amp;gt;extending beyond the ICANN community&amp;lt;/b&amp;gt;.&amp;lt;/p&amp;gt;
&amp;lt;/blockquote&amp;gt;
&amp;lt;p&amp;gt;Beyond the IANA transition, one notes that even the communities within ICANN are not very diverse. For instance:&amp;lt;/p&amp;gt;
&amp;lt;ul&amp;gt;
&amp;lt;li style="&gt;&lt;strong&gt;3 in 5 registrars are from the United States of America&lt;/strong&gt; (624 out of 1010, as of March 2014, according to ICANN's &lt;/a&gt;&lt;a href="https://www.icann.org/registrar-reports/accreditation-qualified-list.html"&gt;accredited registrars list&lt;/a&gt;), with only 0.6% being from the 54 countries in Africa (7 out of 1010).&lt;/p&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;45% of all the registries are from the United States of America&lt;/strong&gt;! (307 out of 672 registries listed in &lt;a href="https://www.icann.org/resources/pages/listing-2012-02-25-en"&gt;ICANN’s registry directory&lt;/a&gt; in August 2015.)&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;66% (34 of 51) of &lt;a href="http://www.bizconst.org/members/"&gt;the Business Constituency&lt;/a&gt; at ICANN are from a single country: the United States of America&lt;/strong&gt;. (N.B.: This page doesn’t seem to be up-to-date.)&lt;/li&gt;
&lt;p style="text-align: justify;"&gt;This shows that businesses from the United States of America continues to dominate ICANN to a very significant degree, and this is also reflected in the nature of the dialogue within ICANN, including the fact that the proposal that came out of the ICANN ‘global multistakeholder community’ on IANA transition proposes a clause that requires the ‘IANA Functions Operator’ to be a US-based entity. For more on that issue, see this post on the jurisdiction issue at ICANN (or rather, on the lack of a jurisdiction issue at ICANN).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder'&gt;https://cis-india.org/internet-governance/blog/global-multistakeholder-community-neither-global-nor-multistakeholder&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-11-03T10:42:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/mag-analysis">
    <title>Multi-stakeholder Advisory Group Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/mag-analysis</link>
    <description>
        &lt;b&gt;This analysis has been done to see the trend in the selection and rotation of the members of the Multistakeholder advisory group (MAG) in the Internet Governance Forum (IGF). The MAG has been functional for nine years from 2006-2015. The analysis is based on data procured, collated and organised by Pranesh Prakash and Jyoti Panday. Shambhavi Singh, Law Student, NLU Delhi who was interning with CIS at the time also assisted with the organisation and analysis of the data. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The researcher has collected the data from the lists of members available in the public domain from 2010-2015. The lists prior to 2010 have been procured 	by the Centre for Internet and society from the UN Secretariat of the Internet Governance Forum (IGF).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This research is based solely upon the members and the nature of their stake holding has been analysed in the light of MAG terms of reference. No data has 	been made available regarding the nomination process and the criteria on which a particular member has been re-elected to the MAG (The IGF Secretariat does 	not share this data).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the analysis, in these six years, the MAG has had around 182 members from various stakeholder groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We have divided it into five stakeholder groups, Government, Civil Society, Industry, Technical Community and Academia. Any overlap between two or more of 	these groups has also been taken into account, for example- A member of the Internet Society (ISOC) being both in the Civil Society and Technical 	Community.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;According to the MAG Terms of Reference&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, it is the prerogative of the UN Secretary General to select MAG 	Members. The general policy is that the MAG members are appointed for a period of one year, which is automatically renewed for 2 more years consecutively 	depending on their engagement in MAG activities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;There is also a policy of rotating off 1/3&lt;sup&gt;rd&lt;/sup&gt; members of MAG every year for diversity and taking new viewpoints in consideration. There is also 	an exceptional circumstance where a person might continue beyond three years in case there is a lack of candidates fitting the desired area.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, it seems like the exception has become the norm as a whopping number of members have continued beyond 3 years, ranging from 4 years up to as long 	as 8 years, this figure rounds up to around 49. No doubt some of them are exceptional talents and difficult to replace. However, the lack of transparency 	in the nomination system makes it difficult to determine the basis on which these people continued beyond the usual term.&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Number of years&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6, 6, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government/Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;4, 5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Technical community/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 8, 8, 6, 6, 4, 4, 4, 4,4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;10&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Civil society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8, 7, 7, 6, 6, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/Tech Community/ Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;8,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7, 7, 7, 6, 6, 6, 6, 5, 5, 5, 5, 5, 5, 4, 4, 4, 4, 4, 4,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;19&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6, 6, 5,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry/ Tech community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6,&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The stakeholders that have continued beyond 8 years have around 39% members from Government and related agencies. The next being Technical Community/Civil 	Society with around 20% representation, followed by Industry at 12%, 10% from the Civil Society, 6% from Academia, 4% from Government/Industry, 4% from 	Industry/Civil Society and 2% each from Industry/Technical Community and Industry/Technical Community/Civil Society respectively.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/copy_of_CivilSociety.png" alt="null" class="image-inline" title="Civil Society" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Table with overlapping interests merged&lt;/strong&gt; &lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;table style="text-align: justify;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Stakeholder&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Total Members continuing beyond 3 years&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Civil Society&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;7 + 9 + 1+1 = &lt;strong&gt;18&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Government&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;19 &lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tech Community&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;9 + 1 + 1+1 = &lt;strong&gt;12&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Industry&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;6 + 2 + 1 + 1+2 = &lt;strong&gt;13&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Academia&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;3&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;When the overlap is grouped separately, as in if a Technical Community/Civil Society person is placed both in Technical Community and Civil Society groups 	individually, then the representation of stakeholder representation is as follows(approximate values)-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Government- 29%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Civil Society- 28%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Industry- 20%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technical Community-17%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Academia-5%&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This clearly shows us that stakeholders from academia generally did not stay on MAG beyond 3 years. Even when all members that have ever been on MAG are 	taken into consideration, only around 8% representation has been from the academic community. This needs to be taken into account when new MAG members are 	selected in 2016.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The researcher has also looked at the MAG Representation based on gender and UN Regional Groups. The results of the analysis were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ratio of male members is to female members is approximately 16:9 in the MAG and the approximate value in percentage being 64% and 36% respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/MAGRepresentation.png" alt="null" class="image-inline" title="MAG Representation" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Now coming to the UN Regional Groups, the results that the analysis yielded were as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Western European and Others Group (WEOG) has the highest representation in MAG, a large number of members being from Switzerland, USA and UK. This is 	followed by the Asia Pacific Group which has 20% representation. The third largest is the African group with 19% representation followed by Latin American 	and Caribbean Group (GRULAC) and Eastern European Group with 13% and 12% representation respectively.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/UNRegional.png" alt="null" class="image-inline" title="UN Regional Representation" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;The representation of developed, developing and Least Developed Countries is as follows-&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Developed countries have approximately 42% representation, developing countries having 53% and LDCs having a mere 5% representation. There should be some effort to strive for better LDC representation as they are the most backward when it comes to Global ICT Penetration.	&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/Developed.png" alt="null" class="image-inline" title="Developed" /&gt;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; Intgovforum.org, 'MAG Terms Of Reference' (2015) &amp;lt;http://www.intgovforum.org/cms/175-igf-2015/2041-mag-terms-of-reference&amp;gt; accessed 13 July 			2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;em&gt;ICT Facts And Figures&lt;/em&gt; (1st edn, International Telecommunication Union 2015) &amp;lt;http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf&amp;gt; 			accessed 11 July 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/mag-analysis'&gt;https://cis-india.org/internet-governance/blog/mag-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-04-12T10:02:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance">
    <title>Good Intentions, Recalcitrant Text – II: What India’s ITU Proposal May Mean for Internet Governance</title>
    <link>https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance</link>
    <description>
        &lt;b&gt;The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Disclaimer and update (2 November 2014)&lt;/strong&gt;: India's Draft Resolution was discussed during the meeting of the &lt;span style="text-align: justify; "&gt;Ad Hoc Working Group on Internet-related Resolutions at the ITU Plenipot on the evening of November 1, 2014 (KST). &lt;/span&gt;After the discussion, India revised the text of the resolution, seeking to address concerns raised by ITU member states. The revised resolution may be &lt;a href="https://cis-india.org/internet-governance/blog/india-itu-resolution-busan-2014-revised/at_download/file"&gt;found here&lt;/a&gt;. However, this blog&lt;span style="text-align: justify; "&gt; post was written with reference to the &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file" style="text-align: justify; "&gt;original text&lt;/a&gt;&lt;span style="text-align: justify; "&gt; of India's Draft Resolution.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;***&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As I mentioned in my &lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"&gt;last post&lt;/a&gt;, India’s &lt;a href="http://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file"&gt;Draft Resolution&lt;/a&gt; on ‘ITU’s Role in Realising Secure Information Society’ raises security and equity concerns. The Draft Resolution has 3 security concerns: (i) security weaknesses in the network architecture that permit “&lt;i&gt;camouflaging the identity of the originator of the communication&lt;/i&gt;” and make “&lt;i&gt;tracing of communication difficult&lt;/i&gt;”; (ii) non-systematic, non-contiguous allocation of naming, numbering and addressing resources on the Internet, which makes it difficult to identify both the users and what states the IP addresses are located in; (iii) non-local routing and address resolution relating to traffic originating and terminating in the same country. Op. §§1, 3-7 seek to address these. It also identifies the present system of allocation of naming, numbering and addressing resources as inequitable, unfair, unjust and undemocratic (Op. §2 of the Draft Resolution offers a solution). I discussed some human rights implications of India’s Draft Resolution in my last post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this post, I explore the implications of the Draft Resolution for Internet governance and multi-stakeholder approaches (most notably, an &lt;a href="http://bestbits.net/lf/initiative/show/2.html"&gt;equal footing model&lt;/a&gt;).&lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance#_ftn1"&gt;[1]&lt;/a&gt; Given the uncertainties around defining multi-stakeholderism for Internet governance, this is rather ambitious. So I will try to point to concerns with certain &lt;i&gt;textual&lt;/i&gt; interpretations of the Draft Resolution, map that against the positions India’s representatives have taken on Internet governance in the past, and the motivations/concerns that underlie the tabling of the Draft Resolution. This Resolution may not be the best way to allay India's concerns, for there are technical and rights implications. But the concerns it raises are worth discussion and knowledge, and at forums where concerns are heard, acknowledged and discussed collectively. The text of the Draft Resolution and its attendant implications are not, then, the sole subjects of this post.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;The Draft Resolution and Internet governance&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The text of the Draft Resolution is problematic. Many of its clauses may be seen as taking positions against multi-stakeholder approaches to Internet governance. Introducing such a resolution at the ITU may itself bring back memories of the controversies surrounding &lt;/span&gt;&lt;a href="http://files.wcitleaks.org/public/S12-WCIT12-C-0065!!MSW-E.pdf"&gt;Resolution 3&lt;/a&gt;&lt;span&gt; of the World Conference on International Telecommunications (WCIT), 2012.&lt;/span&gt;&lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;span&gt; In 3 ways, the text of the Draft Resolution has indications for multi-stakeholder approaches.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;First&lt;/i&gt;, the Draft Resolution frames issues primarily from the perspective security. In its preamble, the Draft Resolution makes several references to security threats posed by and on the Internet. For instance, it points to the ability of the network to “&lt;i&gt;camouflage the identity of the originator of the communication&lt;/i&gt;” (Pream. §(e) [&lt;i&gt;recognizing&lt;/i&gt;]), as well as national security concerns in the present-day system of routing Internet traffic through multiple countries (Pream. §§(f) and (g), [&lt;i&gt;recognizing&lt;/i&gt;]). The apparent difficulty in tracing IP addresses, due to their random allocation, is another concern (Pream. §(h), [&lt;i&gt;recognizing&lt;/i&gt;]). Among the “&lt;i&gt;significant public policy issues&lt;/i&gt;” identified in telecom/ICT management, “&lt;i&gt;security and safety of the Telecom/ICTs&lt;/i&gt;” is specifically noted (Pream. §(i) [&lt;i&gt;considering&lt;/i&gt;]). In the Context note to the Draft Resolution and in several places in the Preamble, there are references to ITU &lt;a href="https://www.itu.int/osg/csd/cybersecurity/WSIS/RESOLUTION_130.pdf"&gt;Resolution 130&lt;/a&gt; (‘Strengthening the role of ITU in building confidence and security in the use of information and communication technologies’) and ITU’s Cyber-security Agenda. Given the (legitimate or otherwise) disproportionate involvement of governments and not other stakeholders in matters of cyber-security, the framing of issues from a security perspective may lend itself to worries for multi-stakeholderism. Specifically, the Draft Resolution notes: “&lt;i&gt;ensuring security of ICT networks is sovereign right of Member States&lt;/i&gt;” (Pream. §(b) [&lt;i&gt;recognizing&lt;/i&gt;]).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, the Draft Resolution emphasizes the sovereign right of states to regulate and control telecom/ICT. It says, for instance, “&lt;i&gt;it is the sovereign right of each state to regulate its telecommunication&lt;/i&gt;” (Pream. §(b) [&lt;i&gt;considering&lt;/i&gt;]). With regard to the Internet, the Context note to the Draft Resolution (page 1) considers the Internet to be synonymous with telecom/ICTs: “&lt;i&gt;the Telecom/ICTs, which in common lexicon is used interchangeably many times as Internet…&lt;/i&gt;”. Public telecom networks managed by telecom service providers, interconnected with other networks, are necessary for  “&lt;i&gt;proper functioning of a telecom network resources namely, among others, naming, numbering and addressing&lt;/i&gt;” (Pream. §(k) [&lt;i&gt;considering&lt;/i&gt;]). It is worth noting that the sovereign authority of states over Internet public policy issues is settled text from §35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;, though expressing it as synonymous with telecom may lead to possibilities of licensing and registration, which Bulgaria, for instance, does not do.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, the Draft Resolution identifies issues of equity and fairness in the allocation of Internet resources such as naming, numbering and addressing (Pream. §(g) [&lt;i&gt;consdering&lt;/i&gt;], Op. §2). It states that to correct this inequity, “&lt;i&gt;facilitation and collaboration among international, inter-governmental organizations and individual member states to ensure planning, implementation, monitoring and cooperation in its policies&lt;/i&gt;” is required (Pream. §(g) [&lt;i&gt;considering&lt;/i&gt;]). In operative paragaphs, our Draft Resolution calls for collaboration with “&lt;i&gt;all the concerned stakeholders including International and intergovernmental organizations to develop policies for allocation, assignment and management of IP resources including naming, numbering and addressing which is systematic, equitable, fair, just, democratic and transparent&lt;/i&gt;” (Op. §2). One may pay attention to the oversight over implementation and the necessity of inter-governmental involvement in planning and monitoring as problematic to iterations of multi-stakeholderism.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These concerns are valid and legitimate, and it is desirable that the text of the resolution be altered to address them. The text should also be altered to address the human rights concerns I point out in my &lt;a href="http://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms"&gt;previous post&lt;/a&gt;&lt;span&gt;. But human rights enforcement or implementation is within the domain of states, though civil society may be a careful watchdog. The Draft Resolution's text, most certainly, will face certain oppositions: for instance, that it is outside the scope and mandate of the ITU. That the ITU does not deal with content regulation – and this issue touches upon content – will be mentioned. That Internet governance is already being discussed and performed in multiple other multi-stakeholder fora, such as ICANN, the NRO and RIRs, IGF and WSIS, will be emphasized. That the Draft Resolution implicates national security concerns will be mentioned as well. But as an aside, on national security: under international law, states always mention their prerogative over national security, and so as a matter of international custom, national security is outside the scope of agreements unless expressly surrendered. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, debates around the role of ITU in Internet governance are not new, and those familiar will remember the &lt;a href="http://www.icannwatch.org/archive/mueller_icann_and_internet_governance.pdf"&gt;ITU’s views&lt;/a&gt; right before the creation of ICANN (also &lt;i&gt;see&lt;/i&gt; Mueller, Ruling the Root 145-48 (2002)), Resolution 3 of the WCIT, and the constant tug-of-war since then. The new Secretary-General of the ITU, Mr. Houlin Zhao, &lt;a href="http://www.itu.int/ITU-T/tsb-director/itut-wsis/files/zhao-netgov01.pdf"&gt;wrote a note&lt;/a&gt; in October 2004, before the Tunis phase of the WSIS, justifying ITU’s involvement in Internet governance, advocating that IPv6 address blocks be allocated to countries. Mr. Zhao &lt;span&gt;describes, with specific examples, ITU's role in the development and widespread growth of the Internet. He takes the examples of standards developed within the ITU and ITU's policy role in liberalisation and spread of telecommunications (such as Articles 4 &amp;amp; 9 of the 1988 ITRs).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Zhao’s concrete proposals are rendered inapplicable by the creation of the NRO and RIRs, and the growth and entrenchment of ICANN. But it may be argued that his principled justifications for ITU involvement remain. It is these that India hopes to highlight, I was told, along with the inequities in resource allocation (IPv4 was spoken of), and the disproportionate weight some states enjoy in Internet governance. &lt;span style="text-align: justify; "&gt;Her concerns are, I am told, also shared by some other states. Given that the text exhibits a less-than-friendly approach to multi-stakeholderism, &lt;/span&gt;India's previous positions on the issue are of interest. While this would not correct the snags in the Draft Resolution's text, allaying these concerns may be ideal to craft an inclusive and transparent multi-stakeholder model for Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;India and Multi-stakeholderism in Internet Governance&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s position on multi-stakeholder models for Internet governance is a matter of some obscurity. Statements at various forums exhibit a certain disagreement – or at the least, lack of engagement – among India’s ministries on our position on multi-stakeholder approaches, particularly the Ministry of External Affairs (MEA), the Department of Telecommunications (DOT) and the Department of Electronics and Information Technology (DeitY), both within the Ministry of Communications and Information Technology (MCIT). While both the MEA and DOT have been cautious supporters of a diluted form of multi-stakeholderism (they have repeatedly emphasized §35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;), DeitY has been more open in entertaining multi-stakeholder approaches for Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;At the 66&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; session of UN General Assembly, Mr. Dushyant Singh, Member of India’s Parliament from the Bharatiya Janata Party, presented our &lt;/span&gt;&lt;a href="http://cis-india.org/internet-governance/blog/india-statement-un-cirp"&gt;proposal&lt;/a&gt;&lt;span&gt; for a Committee on Internet-related Policies. The proposal sought the establishment of a UN committee comprising 50 member-states, with advisory groups including the private sector and civil society, to deal with Internet-related matters.&lt;/span&gt;&lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;span&gt; Though India was &lt;/span&gt;&lt;a href="http://www.medianama.com/2011/11/223-why-indias-proposal-for-a-un-committee-for-internet-related-policy-isnt-all-that-evil/"&gt;not opposed&lt;/a&gt;&lt;span&gt; to multi-stakeholder advisories in its CIRP proposal, it was less than inviting in this regard.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At NETmundial (April 2014), the Indian government’s &lt;a href="http://content.netmundial.br/contribution/government-of-india-s-initial-submission-to-global-multistakeholder-meeting-on-the-future-of-internet-governance-sau-paulo-brazil-april-23-24-2014/138"&gt;contribution document&lt;/a&gt; highlighted §35 of the Tunis Agenda, which delineates ‘roles and responsibilities’ of ‘respective stakeholders’ – i.e., governments (with whom reside “&lt;i&gt;sovereign policy authority&lt;/i&gt;”), the private sector (technical and economic development of the Internet) and civil society (grassroots participation). At NETmundial, Mr. Vinay Kwatra of the MEA &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETMundial-23April2014-Welcome-Remarks-en.pdf"&gt;echoed this&lt;/a&gt;, also noting the lack of consensus on what multi-stakeholderism means for Internet governance (page 64).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Admittedly, this is a legitimate concern. Internet governance at various fora does not seem to have a clear answer on what multi-stakeholderism means. The debate was/is alive, for instance, at &lt;/span&gt;&lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;&lt;span&gt;, the ICANN-convened &lt;/span&gt;&lt;a href="https://www.icann.org/stewardship"&gt;IANA transition process&lt;/a&gt;&lt;span&gt;, the World Economic Forum’s new &lt;/span&gt;&lt;a href="http://www.circleid.com/posts/20141007_beyond_netmundial_initiative_or_inertia/"&gt;NETmundial Initiative&lt;/a&gt;&lt;span&gt;, and in the many &lt;/span&gt;&lt;a href="http://bestbits.net/igf-statement-2014/"&gt;calls&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.global.asc.upenn.edu/app/uploads/2014/08/BeyondNETmundial_FINAL.pdf"&gt;suggestions&lt;/a&gt;&lt;span&gt; (pages 38-46) made over the years on strengthening the IGF (&lt;/span&gt;&lt;i&gt;see also&lt;/i&gt;&lt;span&gt;, Malcolm, Multi-stakeholder Governance and the IGF (2008), chapter 6). It is hardly surprising then, that India and other states raise this as a concern.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to multi-stakeholderism, the DeitY in India has been the outlier. &lt;a href="http://www.intgovforum.org/cms/174-igf-2014/transcripts/1977-2014-09-04-ms-evolution-of-the-ig-main-room"&gt;Speaking&lt;/a&gt; at the 2014 IGF in Istanbul, Mr. R.S. Sharma, Secretary (DeitY), expressed “&lt;i&gt;no doubt that Internet Governance mechanism require the involvement of all the stakeholders, since the evolution of Internet has been a product of many different diverse groups working together in a loosely coordinated manner&lt;/i&gt;”, advocating strengthening of the IGF and pointing to India’s proposed India-IGF as an example of multi-stakeholderism at home. Most interestingly, Mr. Sharma did not focus on international Internet-related policies being the “&lt;i&gt;sovereign policy authority of states&lt;/i&gt;”. Also in the transcripts of the four meetings of the &lt;a href="http://unctad.org/en/Pages/CSTD/WGEC.aspx"&gt;Working Group on Enhanced Cooperation&lt;/a&gt; under the Committee for Science, Technology and Development (CSTD), I have been unable to find outright rejections of multi-stakeholder approaches, though India has not advocated multi-stakeholderism unequivocally either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But this – the emphasis on “&lt;i&gt;sovereign policy authority of states&lt;/i&gt;” in Internet governance – has been a consistent position for India, especially the MEA and DOT. Here at the ITU PP-14 as well, members of the Indian delegation also emphasized states’ sovereign monopoly over policy matters. “Why not take this to the ITU”, I was asked, as “many governments are uncomfortable” with the way Internet governance is being conducted at other fora. There are grave concerns, I was told, about the possibility of excessive control some governments have over both user and government data of other states (government-speak, of course, for the Snowden revelations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are, of course, concerns similar to those of authoritarian governments, or those reluctant to open up to multi-stakeholderism and looking for excuses to retain/increase government control. But it is equally possible that these concerns need not be limited only to such states. Perhaps for developing countries as well, these are real concerns. &lt;span&gt;In conversation with members of the Indian delegation at the ITU Plenipot, I was able to discern 3 broad concerns. &lt;/span&gt;&lt;i&gt;First&lt;/i&gt;&lt;span&gt;,&lt;/span&gt;&lt;i&gt; t&lt;/i&gt;&lt;span&gt;he definition of multi-stakeholderism in Internet governance. India has not shown herself comfortable with an all-out endorsement of multi-stakeholderism. This is troubling. Civil society and the private sector in India will attest to the difficulties in engaging with our government at all levels. For instance, seeking a place on India's delegation for the Plenipot proved a disheartening exercise for some members of India's civil society. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also conflicting indications. India is in the process of instituting an India-IGF, and CIS' E&lt;span style="text-align: justify; "&gt;xecutive Director, Sunil Abraham, is on the MAG. India expressed agreement, at least in informal conversation, to opening up ITU documents to the public on grounds of public interest. The Law &lt;span style="text-align: justify; "&gt;Commission of India  recently conducted a multi-stakeholder consultation on media laws in India, and &lt;span style="text-align: justify; "&gt;Telecom Regulatory Authority of India (TRAI) regularly conducts consultations, though the private sector is more active there. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What is lacking in India, however, is a set of clear procedures and processes for multi-stakeholder engagement, particularly on Internet issues. Clear, public, accessible, foreseeable and predictable set of rules or processes on participation from civil society, private sector and academia would make a world of difference to multi-stakeholderism within India. But this lack should not blind states or other stakeholders to the genuineness of privacy/security or equity concerns - for instance, of the protection of our information from mass surveillance or the feasibility and actual participation of developing countries at many Internet governance fora.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Second&lt;/i&gt;, members of the delegation expressed concern over inequalities in the allocation of naming, numbering and addressing resources. While I am uncertain how IPv6 allocation falls within this concern, t&lt;span style="text-align: justify; "&gt;he inequalities of IPv4 allocations are well documented. To gather a sense of this, it would be useful to read chapter 5 of Professor DeNardis’ &lt;/span&gt;&lt;a href="http://mitpress.mit.edu/books/protocol-politics" style="text-align: justify; "&gt;Protocol Politics&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, and to glance at Figure 5.7 (page 173). Africa controls, for instance, a mere 1% of all available IPv4 addresses, while North America and Europe control about 63%. A study on engagement from the Asia-Pacific in Internet standards organisations shows, for instance, greater participation from Western countries and from some states like Japan.&lt;/span&gt;&lt;a href="#_ftn4" style="text-align: justify; "&gt;[4]&lt;/a&gt;&lt;span style="text-align: justify; "&gt; India and other states from Asia and Africa have lesser participation. Even at ICANN, with efforts to increase participation, meaningful engagement is still from a majority of Western countries. Perhaps states and other stakeholders on the other side of the table can address these concerns through clear, inclusive, non-discriminatory commitments and implementation.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Third&lt;/i&gt;, India emphasized how the Draft Resolution does not propose that ITU be involved in content management or resources control, but only seeks to systematize allocation by asking the ITU Secretary General to collaborate and coordinate with other Internet governance organisations to create a set of principles for fair, equitable, transparent and democratic - as well as secure - allocation of resources. ITU Resolution 101 already instructs the Secretary General to collaborate with relevant Internet governance organisations, and the Draft Resolution merely seeks to spell out his tasks. However, as I pointed out in my previous post, the text of the Draft Resolution is at odds with this intention of India's. By dint of its drafting, it gravely implicates human rights, as well as touching upon resource allocation oversight ("&lt;i&gt;needs to be adhere to"&lt;/i&gt; in Op. §2). To reflect the above stated intention, the Draft Resolution would need to be redrafted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the text of the Draft Resolution exhibits, unfortunately, a certain disregard for existing network architecture and efficiency within the Internet, and to the &lt;a href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;principles&lt;/a&gt; of a free, open and inter-operable and unified Internet, when it seeks to develop a network architecture that facilitates (domestic) localization of traffic-routing, address resolution and allocation of naming, numbering and addressing. An argument may, of course, &lt;a href="http://www.internetpolicy.net/practices/ixp-india.pdf"&gt;be made&lt;/a&gt; in favour of efficiency and costs, including reduced latency. But it is clear that this has the &lt;a href="http://www.lawfareblog.com/wp-content/uploads/2014/07/Lawfare-Research-Paper-Series-Vol2No3.pdf"&gt;potential&lt;/a&gt; to increase domestic surveillance capabilities and government &lt;a href="https://www.accessnow.org/blog/2014/06/04/the-impact-of-forced-data-localisation-on-fundamental-rights"&gt;censorship&lt;/a&gt; of content. In any case, traffic localization (if not local address resolution) can be &lt;a href="http://trai.gov.in/WriteReadData/Recommendation/Documents/9SEP1052012.pdf"&gt;achieved&lt;/a&gt; without ITU coordination: through Internet Exchange Points, and through more efficient and better-negotiated peering and transit arrangements (pages 14-17). Internationally coordinated rules for localized traffic routing is not necessary; you just need to have a more efficient Internet Exchange Point. How to get more ISPs to interconnect through India’s National Internet Exchange (NIXI) is one of the very questions that India’s Telecom Regulatory Authority has taken up in its recent &lt;a href="http://www.trai.gov.in/WriteReaddata/ConsultationPaper/Document/Consultation%20Paper%20on%20Broadband%2024Sep2014.pdf"&gt;consultation&lt;/a&gt; on expanding broadband access (page 49). So it is possible that India's concerns could be addressed without ITU involvement, though I am unsure of its impact on the global Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Draft Resolution will be discussed at the ITU Plenipot today. The discussion will allow India and sympathetic countries to raise several of their concerns relating to the present system of Internet governance, and the direction of its progress. I will report on these discussions upon their completion.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span&gt;A Note on Limitations&lt;/span&gt;&lt;span&gt;:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The aim of this post is to clarify. I would caution against its being the last word on anything, much less India’s positions on Internet governance. An issue as important as this needs far greater access to and confirmation from India’s government – and a more in-depth understanding of the politics – than I do, at the moment.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, India has not been a model for civil society engagement, as illustratively, the &lt;a href="http://en.wikipedia.org/wiki/Narmada_Bachao_Andolan"&gt;Narmada Bachao Andolan&lt;/a&gt; and/or P. Sainath’s evaluation of government policies in &lt;a href="http://www.amazon.com/Everybody-Loves-Good-Drought-Districts/dp/0140259848"&gt;&lt;i&gt;Everybody Loves a Good Drought&lt;/i&gt;&lt;/a&gt; reveal. It has been harder to effectively engage with India’s government than in many states in North America, Latin America and Europe. But I believe the complex dynamics of that is not unique to India. The &lt;a href="http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded"&gt;NSA&lt;/a&gt; and &lt;a href="http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-yahoo"&gt;GCHQ&lt;/a&gt; revelations (as an example of governmental trust deficit of unmatched proportions) have shown that where governments want to keep everyone out and oblivious, they do it well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;I am not in favour of a purely multilateral approach to Internet governance. But at the same time, I share concerns over definition and the evolution of processes as well, as I am sure others in civil society also do. &lt;/span&gt;Particularly on the issue of Internet governance and multi-stakeholderism, evidence reveals inconsistency among India’s various ministries. Until this is addressed by our government (hopefully in consultation with all concerned stakeholders), an open mind would probably be the best thing we - including states - could keep.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;Acknowledgements&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;: I would like to thank Sunil Abraham, Pranesh Prakash, Rishabh Dara, Arun Sukumar, Anja Kovacs and Parminder Jeet Singh for the freedom to bounce ideas, feedback and the many discussions about multi-stakeholder approaches and Internet governance. I also wish to acknowledge Samir Saran’s &lt;a href="http://www.cfr.org/internet-policy/itu-unbundling-internet-governance/p33656"&gt;article&lt;/a&gt; in CFR, which offers an interesting perspective on India’s Draft Resolution.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; For this post, I will use ‘multi-stakeholder approaches’ as an umbrella term, but would urge readers to keep in mind the many uncertainties and disagreements about defining multi-stakeholderism for Internet governance. These disagreements exist among and within all stakeholders, including government and civil society. In addition to various iterations of the ‘equal footing model’, the model proposed in §35 of the Tunis Agenda is also multi-stakeholder, albeit in a different – and for many in civil society, less desirable – sense.&lt;/p&gt;
&lt;p style="text-align: left; "&gt;&lt;a href="#_ftnref2"&gt;[2]&lt;/a&gt; For those unacquainted with WCIT, &lt;i&gt;see&lt;/i&gt; Mueller, &lt;i&gt;ITU Phobia: Why WCIT was derailed&lt;/i&gt;, Internet Governance Blog (18 December 2012), &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/&lt;/a&gt;; Kleinwächter, &lt;i&gt;WCIT and Internet governance: Harmless resolution or Trojan horse?&lt;/i&gt;, CircleID Blog (17 December 2012), &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3"&gt;[3]&lt;/a&gt; For a commentary, &lt;i&gt;see&lt;/i&gt; Mueller, &lt;i&gt;A United Nations Committee for Internet-related Policies? A Fair Assessment&lt;/i&gt;, Internet Governance Blog (29 October 2011), &lt;a href="http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/"&gt;http://www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internet-related-policies-a-fair-assessment/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4"&gt;[4]&lt;/a&gt; Contreras, &lt;i&gt;Divergent Patterns of Engagement in Internet Standardization: Japan, Korea and China&lt;/i&gt;. I am unable to find this paper online. Please email me for information.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance'&gt;https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-03T07:07:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms">
    <title>Good Intentions, Recalcitrant Text - I: Why India’s Proposal at the ITU is Troubling for Internet Freedoms</title>
    <link>https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms</link>
    <description>
        &lt;b&gt;The UN's International Telecommunications Union (ITU) is hosting its Plenipotentiary Conference (PP-14) this year in South Korea. At PP-14, India introduced a new draft resolution on ITU's Role in Realising Secure Information Society. The Draft Resolution has grave implications for human rights and Internet governance. Geetha Hariharan explores.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the 2014 Plenipotentiary Conference (‘PP-14’ or ‘Plenipot’) of the International Telecommunications Union (ITU), India has tabled &lt;a href="https://cis-india.org/internet-governance/blog/india-draft-resolution-itus-role-in-securing-information-security/at_download/file"&gt;a draft proposal&lt;/a&gt; on “ITU’s Role in Realising Secure Information Society” [Document 98, dated 20 October 2014] (“&lt;strong&gt;Draft Resolution&lt;/strong&gt;”). India’s proposal has incited a great deal of concern and discussion among Plenipot attendees, governments and civil society alike. Before offering my concerns and comments on the Draft Resolution, let us understand the proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our Draft Resolution identifies 3 security concerns with exchange of information and resource allocation on the Internet:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;First&lt;/i&gt;, it is troubling for India that present network architecture has “&lt;i&gt;security weaknesses&lt;/i&gt;” such as “&lt;i&gt;camouflaging the identity of the originator of the communication&lt;/i&gt;”;&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt; random IP address distribution also makes “&lt;i&gt;tracing of communication difficult&lt;/i&gt;”;&lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Second&lt;/i&gt;, India is concerned that under the present allocation system of naming, numbering and addressing resources on the Internet, it is impossible or at the very least, cumbersome to identify the countries to which IP address are allocated;&lt;a href="#_ftn3"&gt;[3]&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;i&gt;Third&lt;/i&gt;, India finds it insecure from the point of view of national security that traffic originating and terminating in the same country (domestic traffic) often routes through networks overseas;&lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; similarly, local address resolution also routes through IP addresses outside the country or region, which India finds troubling.&lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In an effort to address these concerns, the Draft Resolution seeks to instruct the ITU Secretary General:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;i&gt;First&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;to develop and recommend a ‘traffic routing plan’ that can “&lt;i&gt;effectively ensure the traceability of communication&lt;/i&gt;”;&lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Second&lt;/i&gt;, to collaborate with relevant international and intergovernmental organisations to develop an&lt;i&gt; &lt;/i&gt;“&lt;i&gt;IP address plan&lt;/i&gt;”&lt;i&gt; &lt;/i&gt;which facilitates identification of locations/countries to which IP addresses are allocated and coordinates allocation accordingly;&lt;a href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Third&lt;/i&gt;, to develop and recommend “&lt;i&gt;a public telecom network architecture&lt;/i&gt;” that localizes both routing&lt;a href="#_ftn8"&gt;[8]&lt;/a&gt; as well as address resolution&lt;a href="#_ftn9"&gt;[9]&lt;/a&gt; for local/domestic traffic to “&lt;i&gt;within the country&lt;/i&gt;”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, our Draft Resolution is intended to pave a way for “&lt;i&gt;systematic, fair and equitable allocation&lt;/i&gt;” of, &lt;i&gt;inter alia&lt;/i&gt;, naming, numbering and addressing resources,&lt;a href="#_ftn10"&gt;[10]&lt;/a&gt; keeping in mind security and human rights concerns.&lt;a href="#_ftn11"&gt;[11]&lt;/a&gt; In an informal conversation, members of the Indian delegation echoed these sentiments. Our resolution does not, I was told, raise issues about the “&lt;i&gt;concentration of control over Internet resources&lt;/i&gt;”, though “&lt;i&gt;certain governments&lt;/i&gt;” have historically exercised more control. It also does not, he clarified, wish to make privacy or human rights a matter for discussion at the ITU. All that the Draft Resolution seeks to do is to equip the ITU with the mandate to prepare and recommend a “&lt;i&gt;roadmap for the systematization&lt;/i&gt;” of allocation of naming, numbering and addressing resources, and for local routing of domestic traffic and address resolution. The framework for such mandate is that of security, given the ITU’s role in ‘building confidence and security in the use of ICTs’ under Action Line C5 of the &lt;a href="http://www.itu.int/wsis/docs/geneva/official/poa.html"&gt;Geneva Plan of Action&lt;/a&gt;, 2003.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the text of our Draft Resolution, by dint of imprecision or lack of clarity, undermines India’s intentions. On three issues of utmost importance to the Internet, the Draft Resolution has unintended or unanticipated impacts. &lt;strong&gt;&lt;i&gt;First&lt;/i&gt;&lt;/strong&gt;, its text on tracing communication and identity of originators, and systematic allocation of identifiable IP address blocks to particular countries, has impacts on privacy and freedom of expression. Given Edward Snowden’s &lt;a href="http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded"&gt;NSA files&lt;/a&gt; and the absence of adequate protections against government incursions or excesses into privacy,&lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; either in international human rights law or domestic law, such text is troublesome. &lt;strong&gt;&lt;i&gt;Second&lt;/i&gt;&lt;/strong&gt;, it has the potential to undermine multi-stakeholder approaches to Internet governance by proposing text that refers almost exclusively to sovereign monopolies over Internet resource allocation, and &lt;strong&gt;&lt;i&gt;finally&lt;/i&gt;&lt;/strong&gt;, displays a certain disregard for network architecture and efficiency, and to principles of a free, open and unified Internet, when it seeks to develop global architecture that facilitates (domestic) localization of traffic-routing, address resolution and allocation of naming, numbering and addressing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this post, I will address the first concern of human rights implications of our Draft Resolution.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Unintended Implications for Privacy and Freedom of Expression:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s Draft Resolution has implications for individual privacy. At two different parts of the preamble, India expresses concerns with the impossibility of locating the user at the end of an IP address:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Pream. §(e): “&lt;i&gt;recognizing&lt;/i&gt;… that the modern day packet networks, which at present have many security weaknesses, &lt;i&gt;inter alia&lt;/i&gt;, camouflaging the identity of originator of the communication”;&lt;/li&gt;
&lt;li&gt;Pream. §(h): “&lt;i&gt;recognizing&lt;/i&gt;… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The concerns here surround difficulties in tracking IP addresses due to the widespread use of NATs, as also the existence of IP anonymisers like Tor. Anonymisers like Tor permit individuals to cover their online tracks; they conceal user location and Internet activity from persons or governments conducting network surveillance or traffic analysis. For this reason, Tor has caused much discomfort to governments. &lt;a href="http://www.wired.com/2014/10/laura-poitras-crypto-tools-made-snowden-film-possible/"&gt;Snowden used Tor&lt;/a&gt; while communicating with Laura Poitras. Bradley (now Chelsea) Manning of Wikileaks fame is&lt;i&gt; &lt;/i&gt;&lt;a href="http://belfercenter.ksg.harvard.edu/files/maurer-dp-2011-10-wikileaks-final.pdf"&gt;reported&lt;/a&gt; to have used Tor (page 24). Crypto is increasingly the safest – perhaps the only safe – avenue for political dissidents across the world; even Internet companies were &lt;a href="http://gizmodo.com/the-nsa-was-going-to-fine-yahoo-250k-a-day-if-it-didnt-1633677548"&gt;coerced&lt;/a&gt; into governmental compliance. No wonder, then, that governments are doing all they can to dismantle IP anonymisers: the &lt;a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/"&gt;NSA&lt;/a&gt; and &lt;a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/"&gt;GCHQ&lt;/a&gt; have tried to break Tor; the Russian government has &lt;a href="http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html"&gt;offered a reward&lt;/a&gt; to anyone who can.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far be it from me to defend Tor blindly. There are reports &lt;a href="http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption"&gt;suggesting&lt;/a&gt; that Tor is being &lt;a href="http://news.softpedia.com/news/Tor-Attracts-More-and-More-Cybercriminals-Experts-Warn-430659.shtml"&gt;used by offenders&lt;/a&gt;, and not merely those of the Snowden variety. But governments must recognize the very obvious trust deficit they face, especially after &lt;a href="http://www.statewatch.org/news/2014/may/ep-LIBE-Inquiry-NSA-Surveillance.pdf"&gt;Snowden’s revelations&lt;/a&gt;, and consider the implications of seeking traceability and identity/geolocation for every IP address, in a systematic manner. The implications are for privacy, a right guaranteed by Article 17 of the International Covenant on Civil and Political Rights (ICCPR). Privacy has been &lt;a href="http://www.hrw.org/sites/default/files/related_material/UNGA_upload_0.pdf"&gt;recognized&lt;/a&gt; by the UN General Assembly as applicable in cases of surveillance, interception and data collection, in Pream. §4 of its resolution &lt;i&gt;The Right to Privacy in the Digital Age&lt;/i&gt;. But many states do not have robust privacy protections for individuals and data. And while governments may state the necessity to create international policy to further effective criminal investigations, such an aim cannot be used to nullify or destroy the rights of privacy and free speech guaranteed to individuals. Article 5(1), ICCPR, codifies this principle, when it states that States, groups or persons may not “&lt;i&gt;engage in any activity or perform any act aimed at the destruction of any of the rights and freedoms recognized herein…&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Erosion of privacy has a chilling effect on free speech [&lt;/span&gt;&lt;i&gt;&lt;a href="http://www.law.cornell.edu/supremecourt/text/376/254"&gt;New York Times v. Sullivan&lt;/a&gt;&lt;/i&gt;&lt;span&gt;, 376 U.S. 254], so free speech suffers too. Particularly with regard to Tor and identification of IP address location and users, anonymity in Internet communications is at issue. At the moment, most states already have anonymity-restrictions, in the form of identification and registration for cybercafés, SIM cards and broadband connections. For instance, Rule 4 of India’s &lt;/span&gt;&lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf"&gt;Information Technology (Guidelines for Cyber Cafe) Rules, 2011&lt;/a&gt;&lt;span&gt;, mandates that we cannot not use computers in a cybercafé without establishing our identities. But our ITU Draft Resolution seeks to &lt;/span&gt;&lt;i&gt;dismantle&lt;/i&gt;&lt;span&gt; the ability of Internet users to operate anonymously, be they political dissidents, criminals or those merely acting on their expectations of privacy. Such dismantling would be both violative of international human rights law, as well as dangerous for freedom of expression and privacy in principle. Anonymity is integral to democratic discourse, held the US Supreme Court in &lt;/span&gt;&lt;i&gt;&lt;a href="http://www.law.cornell.edu/supct/html/93-986.ZO.html"&gt;McIntyre v. Ohio Elections Commission&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [514 U.S. 334 (1995)].&lt;/span&gt;&lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;span&gt; Restrictions on Internet anonymity facilitate communications surveillance and have a chilling effect on the free expression of opinions and ideas, &lt;/span&gt;&lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf"&gt;wrote Mr. Frank La Rue&lt;/a&gt;&lt;span&gt;, Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression (¶¶ 48-49).&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So a law or international policy for blanket identification and traceability of IP addresses has grave consequences for and &lt;i&gt;prima facie &lt;/i&gt;violates privacy, anonymity and freedom of speech. But these rights are not absolute, and can be validly restricted. And because these human rights are implicated, the ITU with its lack of expertise in the area may not be the adequate forum for discussion or study.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To be valid and justified interference, any law, policy or order interfering with privacy and free speech must meet the standards of reasonableness and proportionality, even if national security were the government’s legitimate aim, laid down in Articles 19(3) and 17 of the Covenant on Civil and Political Rights (CCPR) [&lt;/span&gt;&lt;i&gt;&lt;a href="http://www1.umn.edu/humanrts/undocs/html/vws488.htm"&gt;Toonen v. Australia&lt;/a&gt;&lt;/i&gt;&lt;span&gt;, Communication No. 488/1992, U.N. Doc CCPR/C/50/D/488/1992 (1994), ¶6.4]. And as the European Court of Human Rights found in &lt;/span&gt;&lt;i&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-76586"&gt;Weber &amp;amp; Saravia v. Germany&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [Application no. 54934/00, 29 June 2006 (ECHR), ¶95], law or executive procedure that &lt;/span&gt;&lt;i&gt;enables&lt;/i&gt;&lt;span&gt; surveillance without sufficient safeguards is &lt;/span&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;span&gt; unreasonable and disproportionate. Re: anonymity, in &lt;/span&gt;&lt;i&gt;&lt;a href="http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001-126635"&gt;Delfi AS v. Estonia&lt;/a&gt;&lt;/i&gt;&lt;span&gt; [Application no. 64569/09, 17 February 2014, ¶83], while considering the liability of an Internet portal for offensive anonymous comments, the ECHR has emphasized the importance of balancing freedom of expression and privacy. It relied on certain principles such as “&lt;/span&gt;&lt;i&gt;contribution to a debate of general interest, subject of the report, the content, form and consequences of the publication&lt;/i&gt;&lt;span&gt;” to test the validity of government’s restrictions.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The implications of the suggested text of India’s Draft Resolution should then be carefully thought out. And this is a good thing. For one must wonder why governments need perfect traceability, geolocation and user identification for &lt;i&gt;all&lt;/i&gt; IP addresses. Is such a demand really different from mass or blanket surveillance, in scale and government tracking ability? Would this not tilt the balance of power strongly in favour of governments against individuals (citizens or non-citizens)? This fear must especially arise in the absence of domestic legal protections, both in human rights, and criminal law and procedure. For instance, India’s Information Technology Act, 2000 (amended in 2008) has Section 66A, which criminalizes offensive speech, as well as speech that causes annoyance or inconvenience. Arguably, arrests under Section 66A have been &lt;a href="http://timesofindia.indiatimes.com/city/bangalore/Man-arrested-for-allegedly-sending-offensive-MMS-against-Modi-confirmed-innocent-by-police-released/articleshow/35624351.cms"&gt;arbitrary&lt;/a&gt;, and traceability may give rise to a host of new worries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In any event, IP addresses and users can be discerned under existing domestic law frameworks. Regional Internet Registries (RIR) such as APNIC allocate blocks of IP addresses to either National Internet Registries (NIR – such as IRINN for India) or to ISPs directly. The ISPs then allocate IP addresses dynamically to users like you and me. Identifying information for these ISPs is maintained in the form of &lt;/span&gt;&lt;a href="http://www.irinn.in/whoisSearchform.action"&gt;WHOIS records&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="file://localhost/pub/stats/apnic"&gt;registries&lt;/a&gt;&lt;span&gt; with RIRs or NIRs, and this information is public. ISPs of most countries require identifying information from users before Internet connection is given, i.e., IP addresses allocated (mostly by dynamic allocation, for that is more efficient). ISPs of some states are also regulated; in India, for instance, ISPs require a &lt;/span&gt;&lt;a href="http://www.dot.gov.in/licensing/data-services"&gt;licence&lt;/a&gt;&lt;span&gt; to operate and offer services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any government wished, on the basis of some reasonable cause, to identify a particular IP address or its user, then the government could first utilize WHOIS to obtain information about the ISP. Then ISPs may be ordered to release specific IP address locations and user information under executive or judicial order. There are also technical solutions, such as &lt;a href="http://traceroute.monitis.com/"&gt;traceroute&lt;/a&gt; or &lt;a href="http://ip-lookup.net/"&gt;IP look-up&lt;/a&gt; that assist in tracing or identifying IP addresses. Coders, governments and law enforcement must surely be aware of better technology than I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we take into account this possibility of geolocation of IP addresses, then the Draft Resolution’s motivation to ‘systematize’ IP address allocations on the basis of states is unclear. I will discuss the implication of this proposal, and that of traffic and address localization, in my next post.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; Pream. §(e), Draft Resolution: “recognizing… that the modern day packet networks, which at present have many security weaknesses, inter alia, camouflaging the identity of originator of the communication”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2"&gt;[2]&lt;/a&gt; Pream. §(h), Draft Resolution: “recognizing… that IP addresses are distributed randomly, that makes the tracing of communication difficult”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3"&gt;[3]&lt;/a&gt; Op. §1, Draft Resolution: “instructs the Secretary General… to collaborate with all stakeholders including International and intergovernmental organizations, involved in IP addresses management to develop an IP address plan from which IP addresses of different countries are easily discernible and coordinate to ensure distribution of IP addresses accordingly”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4"&gt;[4]&lt;/a&gt; Pream. §(g), Draft Resolution: “recognizing… that communication traffic originating and terminating in a country also many times flows outside the boundary of a country making such communication costly and to some extent insecure from national security point of view”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5"&gt;[5]&lt;/a&gt; Pream. §(f), Draft Resolution: “recognizing… that even for local address resolution at times, system has to use resources outside the country which makes such address resolution costly and to some extent insecure from national security perspective”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6"&gt;[6]&lt;/a&gt; Op. §6, Draft Resolution: “instructs the Secretary General… to develop and recommend a routing plan of traffic for optimizing the network resources that could effectively ensure the traceability of communication”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref7"&gt;[7]&lt;/a&gt; Op. §1, Draft Resolution; &lt;i&gt;see&lt;/i&gt; note 3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8"&gt;[8]&lt;/a&gt; Op. §5, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures that effectively the traffic meant for the country, traffic originating and terminating in the country remains within the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9"&gt;[9]&lt;/a&gt; Op. §4, Draft Resolution: “instructs the Secretary General… to develop and recommend public telecom network architecture which ensures effectively that address resolution for the traffic meant for the country, traffic originating and terminating in the country/region takes place within the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10"&gt;[10]&lt;/a&gt; Context Note to Draft Resolution, ¶3: “Planning and distribution of numbering and naming resources in a systematic, equitable, fair and just manner amongst the Member States…”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11"&gt;[11]&lt;/a&gt; Context Note to Draft Resolution, ¶2: “…there are certain areas that require critical attention to move in the direction of building the necessary “Trust Framework” for the safe “Information Society”, where privacy, safety are ensured”.&lt;/p&gt;
&lt;p style="text-align: left; "&gt;&lt;a href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;i&gt;See, for instance&lt;/i&gt;, Report of the Office of the High Commission for Human Rights (“OHCHR”), &lt;i&gt;Right to Privacy in the Digital Age&lt;/i&gt;, A/HRC/27/37 (30 June 2014), ¶34-35, &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf"&gt;http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf&lt;/a&gt;. &lt;i&gt;See esp. &lt;/i&gt;note 30 of the Report, ¶35.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13"&gt;[13]&lt;/a&gt; Many thorny political differences exist between the US and many states (including India and Kenya, who I am told has expressed preliminary support for the Draft Resolution) with regard to Internet governance. Irrespective of this, the US Constitution’s First Amendment and judicial protections to freedom of expression remain a yardstick for many states, including India. India, for instance, has positively referred to the US Supreme Court’s free speech protections in many of its decisions; &lt;i&gt;ex. see&lt;/i&gt; Kharak Singh v. State of Uttar Pradesh, 1963 Cri. L.J. 329; R. Rajagopal v. State of Tamil Nadu, AIR 1995 SC 264.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms'&gt;https://cis-india.org/internet-governance/blog/good-intentions-going-awry-i-why-india2019s-proposal-at-the-itu-is-troubling-for-internet-freedoms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cryptography</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    

   <dc:date>2014-11-02T15:13:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework">
    <title>An Evidence based Intermediary Liability Policy Framework: Workshop  at IGF </title>
    <link>https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework</link>
    <description>
        &lt;b&gt;CIS is organising a workshop at the Internet Governance Forum 2014. The workshop will be an opportunity to present and discuss ongoing research on the changing definition of intermediaries and their responsibilities across jurisdictions and technologies and contribute to a comprehensible framework for liability that is consistent with the capacity of the intermediary and with international human-rights standards.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, India and Centre for Internet and Society, Stanford Law School, USA, will be organising a workshop to analyse the role of intermediary platforms in relation to freedom of expression, freedom of information and freedom of association at the Internet Governance Forum 2014. &lt;span&gt;The aim of the workshop is to highlight the increasing importance of digital rights and broad legal protections of stakeholders in an increasingly knowledge-based economy. The workshop will discuss public policy issues associated with Internet intermediaries, in particular their roles, legal responsibilities and related liability limitations in context of the evolving nature and role of intermediaries in the Internet ecosystem. distinct&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Online Intermediaries: Setting the context&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet has facilitated unprecedented access to information and amplified avenues for expression and engagement by removing the limits of geographic boundaries and enabling diverse sources of information and online communities to coexist. Against the backdrop of a broadening base of users, the role of intermediaries that enable economic, social and political interactions between users in a global networked communication is ubiquitous. Intermediaries are essential to the functioning of the Internet as many producers  and consumers of content on the internet rely on the action of some third party–the so called intermediary. Such intermediation ranges from the mere provision of connectivity, to more advanced services such as providing online storage spaces for data, acting as platforms for storage and sharing of user generated content (UGC), or platforms that provides links to other internet content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries enhance economic activity by reducing costs, inducing competition by lowering the barriers for participation in the knowledge economy and fuelling innovation through their contribution to the wider ICT sector as well as through their key role in operating and maintaining Internet infrastructure to meet the network capacity demands of new applications and of an expanding base of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Intermediary platforms also provide social benefits, by empowering users and improving  choice through social and participative networks, or web services that enable creativity and collaboration amongst individuals. By enabling platforms for self-expression and cooperation, intermediaries also play a critical role in establishing digital trust, protection of human rights such as freedom of speech and expression, privacy and upholding fundamental values such as freedom and democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the economic and social benefits of online intermediaries are conditional to a framework for protection of intermediaries against legal liability for the communication and distribution of content which they enable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary Liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, right holders, service providers and Internet users have been locked in a  debate on the potential liability of online intermediaries. The debate has raised global concerns on issues such as, the extent to which Internet intermediaries should be held responsible for content produced by third parties using their Internet infrastructure and how the resultant liability would affect online innovation and the free flow of knowledge in the information economy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the impact of their services on communications, intermediaries find themselves as either directly liable for their actions, or indirectly (or “secondarily”) liable for the actions of their users. Requiring intermediaries to monitor the legality of the online content poses an insurmountable task. Even if monitoring the legality of content by intermediaries against all applicable legislations were possible, the costs of doing so would be prohibitively high. Therefore, placing liability on intermediaries can deter their willingness and ability to provide services, hindering the development of the internet itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Economics of intermediaries are dependent on scale and evaluating the legality of an individual post exceeds the profit from hosting the speech, and in the absence of judicial oversight can lead to a private censorship regime. Intermediaries that are liable for content or face legal exposure, have powerful incentives, to police content and limit user activity to protect themselves.  The result is curtailing of legitimate expression especially where obligations related to and definition of illegal content is vague. Content policing mandates impose significant compliance costs limiting the innovation and competiveness of such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, placing liability on intermediaries has a chilling effect on freedom of expression online. Gate keeping obligations by service providers threaten democratic participation and expression of views online, limiting the potential of individuals and restricting freedoms. Imposing liability can also indirectly lead to the death of anonymity and pseudonymity, pervasive surveillance of users' activities, extensive collection of users' data and ultimately would undermine the digital trust between stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus effectively, imposing liability for intermediaries creates a chilling effect on Internet activity and speech, create new barriers to innovation and stifles the Internet's potential to promote broader economic and social gains.  To avoid these issues, legislators have defined 'safe harbours', limiting the liability of intermediaries under specific circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Online intermediaries do not have direct control of what information is or information are exchanged via their platform and might not be aware of illegal content per se. A key framework for online intermediaries, such limited liability regimes provide exceptions for third party intermediaries from liability rules to address this asymmetry of information that exists between content producers and intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, it is important to note, that significant differences exist concerning the subjects of these limitations, their scope of provisions and procedures and modes of operation. The 'notice and takedown' procedures are at the heart of the safe harbour model and can be subdivided into two approaches:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Vertical approach where liability regime applies to specific types of content exemplified in the US Digital Copyright Millennium Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Horizontal approach based on the E-Commerce Directive (ECD) where different levels of immunity are granted depending on the type of activity at issue&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Current framework &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Globally, three broad but distinct models of liability for intermediaries have emerged within the Internet ecosystem:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Strict liability model under which intermediaries are liable for third party content used in countries such as China and Thailand&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Safe harbour model granting intermediaries immunity, provided their compliance on certain requirements&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Broad immunity model that grants intermediaries broad or conditional immunity from liability for third party content and exempts them from any general requirement to monitor content. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the models described above can provide useful guidance for the drafting or the improvement of the current legislation, they are limited in their scope and application as they fail to account for the different roles and functions of intermediaries. Legislators and courts are facing increasing difficulties, in interpreting these regulations and adapting them to a new economic and technical landscape that involves unprecedented levels user generated content and new kinds of and online intermediaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature and role of intermediaries change considerably across jurisdictions, and in relation to the social, economic and technical contexts. In addition to the dynamic nature of intermediaries the different categories of Internet intermediaries‘ are frequently not clear-cut, with actors often playing more than one intermediation role. Several of these intermediaries offer a variety of products and services and may have number of roles, and conversely,  several of these intermediaries perform the same function. For example , blogs, video services and social media platforms are considered to be 'hosts'. Search engine providers have been treated as 'hosts' and 'technical providers'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This limitations of existing models in recognising that different types of intermediaries perform different functions or roles  and therefore should have different liability, poses an interesting area for research and global deliberation. Establishing classification of intermediaries, will also help analyse existing patterns of influence in relation to content for example when the removal of content by upstream intermediaries results in undue over-blocking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Distinguishing intermediaries on the basis of their roles and functions in the Internet ecosystem is  critical to ensuring a balanced system of liability and addressing concerns for freedom of expression. Rather than the highly abstracted view of intermediaries as providing a single unified service of connecting third parties, the definition of intermediaries must expand to include the specific role and function they have in relation  to users'  rights.  A successful intermediary liability regime must balance the needs of producers, consumers, affected parties and law enforcement, address the risk of abuses for political or commercial purposes, safeguard human rights and contribute to the evolution of uniform principles and safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Towards an evidence based intermediary liability policy framework&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This workshop aims to bring together leading representatives from a broad spectrum of stakeholder groups to discuss liability related issues and ways to enhance Internet users’ trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions to address at the panel include:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. What are the varying definitions of intermediaries across jurisdictions?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. What are the specific roles and functions that allow for classification of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. How can we ensure the legal framework keeps pace with technological advances and the changing roles of intermediaries?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. What are the gaps in existing models in balancing innovation, economic growth and human rights?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. What could be the respective role of law and industry self-regulation in enhancing trust?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. How can we enhance multi-stakeholder cooperation in this space?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Confirmed Panel:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technical Community: Malcolm Hutty: Internet Service Providers Association (ISPA)&lt;br /&gt;Civil Society: Gabrielle Guillemin: Article19&lt;br /&gt;Academic: Nicolo Zingales: Assistant Professor of Law at Tilburg University&lt;br /&gt;Intergovernmental: Rebecca Mackinnon: Consent of the Networked, UNESCO project&lt;br /&gt;Civil Society: Anriette Esterhuysen: Association for Progressive Communication (APC)&lt;br /&gt;Civil Society: Francisco Vera: Advocacy Director: Derechos Digitale&lt;br /&gt;Private Sector: Titi Akinsanmi: Policy and Government Relations Manager, Google Sub-Saharan Africa&lt;br /&gt;Legal: Martin Husovec: MaxPlanck Institute&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Moderator(s): &lt;/span&gt;&lt;span&gt;Giancarlo Frosio, Centre for Internet and Society (CIS) and &lt;/span&gt;&lt;span&gt;Jeremy Malcolm, Electronic Frontier Foundation &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Remote Moderator: &lt;/span&gt;&lt;span&gt;Anubha Sinha, New Delhi&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework'&gt;https://cis-india.org/internet-governance/blog/igf-workshop-an-evidence-based-intermediary-liability-policy-framework&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>human rights</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    

   <dc:date>2014-07-04T06:41:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report">
    <title>WSIS+10 High Level Event: A Bird's Eye Report</title>
    <link>https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</link>
    <description>
        &lt;b&gt;The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;The World Summit on Information Society (WSIS) +10 &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/implementation/2014/forum/"&gt;High Level Event&lt;/a&gt;&lt;span&gt; (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (&lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p1.html"&gt;Geneva 2003&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p2.html"&gt;Tunis 2005&lt;/a&gt;&lt;span&gt;). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opening Ceremony, WSIS+10 High Level Event &lt;/i&gt;(&lt;a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt;. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 &lt;a href="http://www.itu.int/wsis/review/mpp/"&gt;Multi-stakeholder Preparatory Platform&lt;/a&gt; (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;strong&gt;MPP&lt;/strong&gt; met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “&lt;i&gt;let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels&lt;/i&gt;”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (&lt;a href="http://www.apig.ch/"&gt;APIG&lt;/a&gt;) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders &lt;a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/"&gt;failed to reach consensus&lt;/a&gt; on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;MPP had sought and achieved a common understanding&lt;/span&gt;&lt;/strong&gt;, a sentiment &lt;a href="https://twitter.com/covertlight/status/476748168051580928"&gt;echoed&lt;/a&gt; by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;agreed&lt;/a&gt; that the MPP had worked hard to draft a document beneficial to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns around the MPP did not affect the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;review of ICT developments&lt;/span&gt;&lt;/strong&gt; over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;won an award&lt;/a&gt; for its e-health application MOTHER.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;&lt;span&gt;. Indeed, there was palpable relief in Conference Room 1 at the &lt;/span&gt;&lt;a href="http://www.cicg.ch/en/"&gt;CICG&lt;/a&gt;&lt;span&gt;, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Dialogues:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prof. Vladimir Minkin delivers a statement.&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “&lt;i&gt;lost opportunity&lt;/i&gt;”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As on previous panels, there was &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;intense focus on access, affordability and reach in developing countries&lt;/span&gt;&lt;/strong&gt;, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;question of cross-border surveillance and wanton violations of privacy went unaddressed&lt;/span&gt;&lt;/strong&gt; except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the &lt;a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;right to be forgotten&lt;/a&gt;), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Forum Track:&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;WCIT-2012&lt;/a&gt;, UNESCO’s &lt;a href="http://www.unesco.org/new/internetstudy"&gt;Comprehensive Study on Internet-related Issues&lt;/a&gt;, spam and a taxonomy of Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;importance of national and regional IGFs&lt;/span&gt;&lt;/strong&gt; for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “&lt;i&gt;Internet governance is not shaped by individual events&lt;/i&gt;”. In light of &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;criticism&lt;/a&gt; of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;response&lt;/a&gt; (often repeated at the HLE itself). Also widely discussed was the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;role of stakeholders in Internet governance&lt;/span&gt;&lt;/strong&gt;, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “&lt;i&gt;distant dream&lt;/i&gt;”).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw &lt;a href="https://www.icann.org/profiles/george-sadowsky"&gt;Mr. George Sadowsky&lt;/a&gt;, &lt;a href="http://www.diplomacy.edu/courses/faculty/kurbalija"&gt;Dr. Jovan Kurbalija&lt;/a&gt;, &lt;a href="http://www.williamdrake.org/"&gt;Mr. William Drake&lt;/a&gt; and &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf"&gt;Mr. Eliot Lear&lt;/a&gt; (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;this ISOC study&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. &lt;a href="http://internetdemocracy.in/"&gt;Ms. Anja Kovacs&lt;/a&gt; raised pertinent concerns about &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;including voiceless minorities in a ‘rough consensus’ model&lt;/span&gt;&lt;/strong&gt;. Across sessions, &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;questions of mass surveillance, privacy and data ownership rose&lt;/span&gt;&lt;/strong&gt; from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (&lt;a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&amp;amp;sp=2010&amp;amp;rgq=D10-RGQ22.1.1&amp;amp;stg=1"&gt;Question 22-1/1&lt;/a&gt; of ITU-D Study Group 1) and cybersecurity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'&gt;https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-06-20T15:57:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
