<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 111 to 125.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/washington-post-october-9-2014-rama-lakshmi-is-india-the-next-frontier-for-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/foex-live"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites">
    <title>Government blocks over 60 websites including github &amp; sourceforge on anti-terror advisory</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites</link>
    <description>
        &lt;b&gt;Over 60 websites and links, including popular online tools like Github and Sourceforge used by thousands of programmers have been blocked in India, triggering angry protests by Internet users.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by P.K. Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-31/news/57558537_1_websites-information-technology-various-internet-service-providers"&gt;published in the Economic Times&lt;/a&gt; on December 31, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The websites were blocked for hosting content that is pro terrorist  group ISIS and not cooperating with government investigations, officials  said.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Arvind%20Gupta"&gt;Arvind Gupta&lt;/a&gt;,  the head of IT Cell, BJP Tweeted: "The websites that have been blocked  were based on an advisory by Anti Terrorism Squad, and were carrying  Anti India content from ISIS. The sites that have removed objectionable  content and/or cooperated with the on going investigations, are being  unblocked."&lt;/p&gt;
&lt;p&gt;Based on an order issued by the country's telecom  department, in a letter dated December 17 and a subsequent letter on  December 19, over 60 websites have been blocked by various internet  service providers in the country.&lt;/p&gt;
&lt;p&gt;While some internet service  providers are yet to block these websites, many users have been  reporting frequent outages in these web services over the last two  weeks.&lt;/p&gt;
&lt;p&gt;Websites like Pastebin don't host any content but are a platform for users to paste text. Popular video &lt;a href="http://economictimes.indiatimes.com/topic/networks"&gt;networks&lt;/a&gt; like &lt;a href="http://economictimes.indiatimes.com/topic/Vimeo"&gt;Vimeo&lt;/a&gt; and Dailymotion are among the websites that have been blocked.&lt;/p&gt;
&lt;p&gt;Officials from the department of Information Technology and the  department of telecom were not available for comment. "These are all  providing very dangerous kind of cut and paste services..You can take  code, cut it, paste it, remove it, delete it," said one government  official who requested anonymity.&lt;/p&gt;
&lt;p&gt;The government has invoked  section 69A of the Information technology Act (2000) and Information  Technology (Procedure and Safeguards for Blocking for Access of  Information by Public) Rules ("Blocking Rules") to ban these websites.&lt;/p&gt;
&lt;p&gt;Many websites have been blocked in India from time to time on various  grounds. In September, following the Muzaffarnagar riots, over 80  websites and links on social media were blocked.&lt;/p&gt;
&lt;p&gt;However, the  inclusion of services like Github and Sourceforge that host code for  open source software are causing much anger among the developer  community. "Sometimes they might need to block specific URLs, but  blocking the entire website is wrong or they haven't thought through  it," said Thejesh GN, the co-founder of &lt;a href="http://economictimes.indiatimes.com/topic/Datameet"&gt;Datameet&lt;/a&gt; and an open source developer.&lt;/p&gt;
&lt;p&gt;"There is also a lack of transparency where people don't get to know why their sites were blocked," he added.&lt;/p&gt;
&lt;p&gt;"We're aware of reports of connectivity issues in India. We're looking  into it, and will update with more information when we have it," a  Github spokesperson said.&lt;/p&gt;
&lt;p&gt;In June 2014, the &lt;a href="http://economictimes.indiatimes.com/topic/Delhi%20High%20Court"&gt;Delhi High Court&lt;/a&gt; ordered a block of 472 file sharing websites including &lt;a href="http://economictimes.indiatimes.com/topic/Google%20Docs"&gt;Google Docs&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/Pirate%20Bay"&gt;Pirate Bay&lt;/a&gt; following a complaint filed by Sony Entertainment. The entertainment  company was hacked and contents from its servers were shared by hackers  on various file sharing websites. In earlier instances, many websites  have been blocked for copyright infringement as well.&lt;/p&gt;
&lt;p&gt;"Courts unfortunately are not exercising restraint and are indulging  ignorant copyright lawyers," said Pranesh Prakash, Policy Director at  the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society. Prakash said that most of the sites on the list don't host  copyrighted material themselves and a case can not be made against  them.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites'&gt;https://cis-india.org/internet-governance/news/economic-times-december-31-2014-jayadevan-neha-alawadhi-december-31-2014-govt-blocks-over-60-websites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T14:22:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-">
    <title>Centre blocks 32 websites for security reasons, restores some later </title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-</link>
    <description>
        &lt;b&gt;The Centre on Wednesday asked Internet Service Providers (ISP) to block 32 websites citing national security concerns, especially from terror group ISIS.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by S. Ronendra Singh was &lt;a class="external-link" href="http://www.thehindubusinessline.com/features/smartbuy/tech-news/centre-blocks-32-websites-for-security-reasons-restores-some-later/article6742568.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on December 31, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The move created a flutter on social networking sites,  as most of the Web sites, such as archive.org, vimeo.com, github.com,  pastebin.com, codepad.org and paste2.org, were being used by global  communities like application developers for free movies and books,  coders and text sharing.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;By late evening, some sites were restored.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Sources in the Ministry of Telecommunications and Information Technology confirmed the development and told &lt;i&gt;BusinessLine&lt;/i&gt;: “It was based on some national security issues, and we cannot compromise with our nation’s security….”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  senior official from the Department of Telecommunications (DoT) said  the directive had come from a Mumbai court after the Maharashtra  Anti-Terrorism Squad (ATS) had approached it to block some Web sites  carrying anti-India content.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The matter came to light  after a circular, purportedly sent by DoT to ISPs, showed up on social  networking sites, listing the sites, along with some screen shots.  Incidentally, the said circular had edited out the letter head, date and  the signature below. The ruling Bharatiya Janata Party’s IT cell head,  Arvind Gupta, tweeted saying ‘the Web sites that have been blocked were  based on an advisory by the Anti-Terrorism Squad, and were carrying  anti-India content from ISIS’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However, later in the  evening, Gupta, in his tweet said, some of the Web sites such as  vimeo.com have been restored because they have removed ‘objectionable  content and/or cooperated with the on going investigations’.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;However,  the blocked Web sites raised a furore in the social media wherein  people said the Government should amend the laws than do such things.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“The  problem isn’t just about the specific sites that are blocked; the  problem is always about the bad law + process relating to #GoIBlocks,”  Pranesh Prakash, Policy Director at Centre for Internet and Society  tweeted. He said the 69A Rules (of the IT Act 2000) does not allow for  transparency, accountability and time-limits on blocks, so it is easily  misused by the Government, the courts and individuals.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-'&gt;https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T14:13:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites">
    <title>Internet users fume as govt blocks 32 sites</title>
    <link>https://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites</link>
    <description>
        &lt;b&gt;The Department of Telecommunications (DoT) has ordered Internet service providers to block 32 websites, in cluding popular video-sharing plat forms such as Dailymotion and Vimeo, reportedly over concerns that they are being misused by Islamic State jihadists. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jaison Lewis was &lt;a class="external-link" href="http://www.mumbaimirror.com/mumbai/others/Internet-users-fume-as-govt-blocks-32-sites/articleshow/45713109.cms"&gt;published in Mumbai Mirror&lt;/a&gt; on January 1, 2015. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The ban has angered free-speech proponents who allege that the Narendra Modi government is using national security as a pretext to censor online content. On Wednesday, tweets criticising the restrictions were trending on #GOIBlocks. Senior lawyer Karuna Nandy said that she would challenge the DoT order in the Supreme Court.&lt;br /&gt;&lt;br /&gt;Apart from Dailymotion and Vimeo, Internet service providers have also been ordered to block Github and Pastebin, which are popular among programmers; Weebly, a free website creator; and Archive.org, a non-profit digital library.&lt;br /&gt;&lt;br /&gt;Some Internet users, however, were able to access some of the sites. This could be because their Internet service providers have not yet implemented the DoT order or because the government has lifted restrictions on some web addresses, according to activists monitoring the blockage of the websites.&lt;br /&gt;&lt;br /&gt;The order was issued under Section 69A (procedure for blocking public access) of the Information Technology Act, 2000. The section allows authorities to block websites without giving any formal reason or making any public announcement.&lt;br /&gt;&lt;br /&gt;However, Arvind Gupta, BJP's national head for information and technology, tweeted that the sites had been blocked over security concerns. "The Web sites have been blocked based on an advisory by Anti-Terrorism Squad, and were carrying Anti India content from ISIS.The sites that have removed objectionable content andor cooperated with the ongoing investigations, are being unblocked," he wrote.&lt;br /&gt;&lt;br /&gt;Gupta, however, did not explain how the sites were being misused by terrorists. Some of the sites are mostly frequented by programmers looking for open-source software and codes.&lt;br /&gt;&lt;br /&gt;Nandy, a Supreme Court lawyer who specialises in human rights litigations, criticised the ban. "I will challenge the order in the Su preme Court this week. I will seek directions to lift the secrecy surrounding such bans and also request for a right to appeal," she said.&lt;br /&gt;&lt;br /&gt;She added that censoring the Internet was against the idea of free expression guaranteed under the Constitution. "Such steps are not good for a healthy society," she said.&lt;br /&gt;&lt;br /&gt;Pranesh Prakash, a policy director with the Centre for Internet and Society and one of the most vocal opponents of the blockage, said that the people had the right to know why the websites had been blocked.&lt;br /&gt;&lt;br /&gt;"We still don't know why these blocks were issued: was it an overzealous copyright lawyer who found an indulgent judge to issue an overbroad and baseless order? Or was it a public servant who wrongly directed the Department of Electronics and IT to block the sites under the IT Act? We have no idea," said Prakash, who tweeted a picture of the DoT order on Wednesday.&lt;br /&gt;&lt;br /&gt;He added that websites were frequently blocked without clear evidence of wrongdoing. "These laws must be changed," Prakash said.&lt;br /&gt;&lt;br /&gt;Internet users also voiced their anger over the DoT order. "This only proves ATS is an idiot. If terrorists use buses, phones &amp;amp; Whatspp, you'll block whole system? #GOIBlocks," Poonam Sharma tweeted.&lt;br /&gt;&lt;br /&gt;Some users retweeted a Modi post from August 2012: "As a common man, I join the protest against crackdown on freedom of speech!"&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites'&gt;https://cis-india.org/internet-governance/news/mumbai-mirror-jaison-lewis-jan-1-2015-internet-users-fume-as-govt-blocks-32-sites&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-01-02T13:46:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/washington-post-october-9-2014-rama-lakshmi-is-india-the-next-frontier-for-facebook">
    <title>Is India the next frontier for Facebook?</title>
    <link>https://cis-india.org/internet-governance/news/washington-post-october-9-2014-rama-lakshmi-is-india-the-next-frontier-for-facebook</link>
    <description>
        &lt;b&gt;Pushing to bring hundreds of millions of Indians into the online world, Facebook founder Mark Zuckerberg on Thursday called for expanding his pet project to provide free mobile Internet for developing countries into India.&lt;/b&gt;
        &lt;p&gt;The article by Rama Lakshmi was published in &lt;a class="external-link" href="http://www.washingtonpost.com/world/is-india-the-next-frontier-for-facebook/2014/10/09/8b256ea0-d5d6-4996-aafe-8e0e776c9915_story.html"&gt;Washington Post&lt;/a&gt; on October 9, 2014. Sunil Abraham was one of the signatories.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Zuckerberg, 30, the billionaire founder of the Facebook empire, arrives  in India at a time when Facebook is losing its luster among &lt;a href="http://www.washingtonpost.com/news/the-intersect/wp/2014/10/08/teens-are-officially-over-facebook/"&gt;American teens&lt;/a&gt;,  but India’s vast market has yet to be fully tapped. A democratic  country with a growing economy like India’s, with 1.2 billion people,  two-thirds of whom are under the age of 35, is a market the company  cannot afford to ignore.&lt;/p&gt;
&lt;p&gt;India has the third-largest population of Internet users in the world at  205 million now, ranking after the United States and China. Yet the  majority of its rural poor don’t have Internet access, and less than a  tenth of its people, about 100 million, are on Facebook.&lt;/p&gt;
&lt;p&gt;“Connectivity can’t be restricted to just the rich and powerful,”  Zuckerberg said at a conference on connectivity in New Delhi. Rather, he  said, it’s a basic “human right.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg hopes to use his &lt;a href="http://www.internet.org/" title="www.internet.org"&gt;Internet.org&lt;/a&gt; connectivity initiative,  which he started with a handful of other tech companies in 2013, to  expand Indians’ online footprint and promote Facebook. He said the  program will set aside $1 million to help develop local language apps  for farmers, women and students in developing countries, including  India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the past year, Zuckerberg said, Internet.org helped nearly 3 million people around the world gain access to the Internet and Facebook by working with cellphone operators in Indonesia, the Philippines, Paraguay, Tanzania and Zambia. In those countries, cellphone users signed up for data plans that included free but limited access to health and job information, Wikipedia, Google — and, of course, Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;About 4.4 billion people in the world have no access to the Internet,  and “the offline population is . . . disproportionately rural, low  income, elderly, illiterate, and female,” said a &lt;a href="http://www.mckinsey.com/insights/high_tech_telecoms_internet/offline_and_falling_behind_barriers_to_internet_adoption"&gt;report by McKinsey&lt;/a&gt; and Facebook. Countries such as Egypt, India and Indonesia face the  greatest challenges with respect to incentives and infrastructure, the  report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It took 10 years for India to touch 100 million Internet users, but it  grew to 200 million in just the last two years,” said Subho Roy,  president of the Internet and Mobile Association of India. There are 930  million cellphone users in India today. “Cellphones have acted as the  primary driver pushing Internet usage in the last two years,” Roy said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Researchers note that new users’ first experience on the Internet is often on Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The free basic services that Facebook has promoted in different  countries help cellphone users “to experience the Internet, use some  things, to understand why it would be valuable for them and get exposure  to other services that they might over time want to pay for,”  Zuckerberg said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But many critics say that commerce is driving  Zuckerberg’s push for connectivity rather than philanthropy. They say  many new users may not pay for wider Web access and that can create  entrenched monopolies for companies like Facebook and Google.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“You  are allowing people to roam the walled garden of Internet for free. But  if they don’t pay to use unlimited Web access, you are also creating  monopolies and blocking competition in the Internet space,” said Sunil  Abraham, executive director of the Center for Internet and Society in  Bangalore. “But in India, we are so hungry for Internet access that we  cannot afford to look a gift horse in the mouth. Until India builds  physical Internet infrastructure, this will help us in the short term to  get connected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zuckerberg said cellphone operators are free to choose which services  they want to include in the package: “There is no rule that says that  Facebook or any other company has to be included in this. All we are  saying is that this is a model that works to get more people on the  Internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Facebook’s India push is not all about chasing numbers, Zuckerberg said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The sheer numbers are obviously a very important part of it,” he said.  “If you can do it in a country like India, you are improving hundreds of  millions, or maybe a billion, people’s lives, whereas doing it in  almost any other country, you wouldn’t be able to have that impact.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s new prime minister, Narendra Modi, a user of social media, has  set an ambitious target of building a broadband highway connecting  250,000 village councils across the country in the next three years.  Zuckerberg said he will meet Modi on Friday to “see how Facebook can  help” in India’s new connectivity drive.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/washington-post-october-9-2014-rama-lakshmi-is-india-the-next-frontier-for-facebook'&gt;https://cis-india.org/internet-governance/news/washington-post-october-9-2014-rama-lakshmi-is-india-the-next-frontier-for-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-05T00:43:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas">
    <title>We the goondas</title>
    <link>https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas</link>
    <description>
        &lt;b&gt;You can now be arrested in Karnataka even before you commit an offence under the IT Act. You could be in jail under the Goonda Act even if not guilty under the Indian Copyright Act. If govt thinks you are planning to send a 'lascivious' photo to a WhatsApp group, or forwarding a copyrighted song, you can be arrested.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Shyam Prasad &lt;a class="external-link" href="http://www.bangaloremirror.com/Bangalore/Cover-story/We-the-goondas/articleshow/39564603.cms"&gt;was published in the Bangalore Mirror&lt;/a&gt; on August 4, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Have a smartphone? Run for  cover. Bizarre as this might sound, the cops are going to come after  you if you so much as forward a song to a friend. Forget actually doing  it, any plans to do so could land you in serious trouble too. You could  be labelled a 'goonda' in the eyes of the State and find yourself behind  bars.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;In a completely  unfathomable move, Karnataka has brought most offences under the  Information Technology Act, 2000, and Indian Copyright Act, 1957, under  the ambit of the Goonda Act. Until now, people with a history of  offences like bootlegging, drug offences and immoral trafficking could  be taken into preventive custody. But the government, in its enthusiasm,  while adding acid attackers and sexual predators to the law, has also  added 'digital offenders'. While it was thought to be against audio and  video pirates, Bangalore Mirror has found it could be directed at all  those who frequent FB, Twitter and the online world, posting casual  comments and reactions to events unfolding around them.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;So if you are planning a  digital 'offence' — which could be an innocuous opinion like the young  girls' in Mumbai after the bandh declared on Bal Thackeray's death —  that could attract the provisions of the Information Technology Act. You  can even be taken into preventive custody like a 'goonda'. Even those  given exceptions under the Indian Copyright Act can find themselves in  jail for a year without being presented before a magistrate.  Technically, if you are even planning to forward 'lascivious' memes and  images to a WhatsApp group or forwarding a song or 'copyrighted' PDF  book, you can be punished under the Goondas Act.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The law-makers clearly did  not dwell much on the implications while bringing the majority of the  populace within the ambit of this law. On July 28, the Karnataka  Legislature passed (it took barely a minute from tabling to voice vote),  'The Karnataka Prevention of Dangerous Activities of Bootleggers,  Drug-offenders, Gamblers, Goondas, Immoral Traffic Offenders,  Slum-grabbers and Video or Audio Pirates, (Amendment) Bill, 2014'. The  amendment adds, "Acid attackers, Depradator of Environment, Digital  Offenders, Money Launderers and Sexual Predators", to the title. In  common parlance, this law is known as the 'Goonda Act'.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The move has come as a  shock to the legal community which has slammed it, terming it an attempt  by the state to usurp central powers. The government had earlier  included 'piracy' under the Goonda Act. But it was applicable only to  those pirating film DVDs. Now, this will include books, film songs,  music, software or anything big corporates and multinationals claim they  have copyright on.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Sunil Abraham, executive  director, Centre for Internet and Society, is left in no doubt that the  new law is "a terrible thing". "It is a sad development. It is not just  bringing the provisions of the IT Act, but also the Copyright Act, that  will hurt the common man," he said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;'Digital Offenders' means  "any person who knowingly or deliberately violates, for commercial  purposes, any copyright law in relation to any book, music, film,  software, artistic or scientific work and also includes any person who  illegally enters through the identity of another user and illegally uses  any computer or digital network for pecuniary gain for himself or any  other person or commits any of the offences specified under sections 67,  68, 69, 70, 71, 72, 73, 74 and 75 of the Information Technology Act,  2000."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Section 67 of the IT Act  will be the most dangerous for the common man with a smartphone in hand  now. The section, "Publishing of information which is obscene in  electronic form," includes "any material which is lascivious or appeal  to the prurient interest." This could have a very broad interpretation.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Advocate Nagendra Naik  says, "The Goonda Act provides for preventive arrest. In the Information  Technology Act and The Copyright Act, you have to commit the offence to  be arrested. But here, you can be taken into preventive custody even  before you commit the said offences. In normal arrests, you can  straightaway apply for bail. But under the Goonda Act, you cannot. There  is a long process of review and you will be in custody at least till  then. The third impact is, you can have a history sheet started against  you by the police. Technically, your slips on WhatsApp will attract the  Goonda Act against you."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Supreme Court advocate KV  Dhananjay said the Goonda Act is a draconian piece of legislation and it  necessarily mocks at the institution of courts and lawyers. "After the  passage of the various amendments to the Goonda Act, Karnataka now looks  like a mini North Korea where police mood swings will decide whether  the ordinary citizen has any right at all," he said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Advocate Shyam Sundar,  says, "What if your smartphone has a list of repeated material sent out  over days or weeks. Most people do not even know if their phones are  affected by viruses which could be sending out such material. Another  example is of Facebook. There are so many FB pages with pornographic  content. If someone who has subscribed to such a page sends you a friend  request and you accept it, that content will surface on your page. It  will have a history of repetition. The amendment clearly opens up huge  problems for the common people. There is no doubt of the law being  grossly misused and the amendment to include provisions of the IT Act  has been done without application of mind. What is lascivious appeal in  the first place? A porn star has been made a film star in India. Is this  not lust? Are there enough filters in place to secure your smartphone  from online abuse?"&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The new law will in all  probability create more corruption than anything else, say experts.  Dhananjay says, "Until last week, police postings in Bangalore and other  bigger cities were selling for tens of lakhs. Thanks to these  amendments, some postings that enforce the Goonda Act will now sell for a  couple of crores. The public will not feel safe due to this draconian  legislation. Those who enforce the Goonda Act, however, will become  richer through corruption, thanks to the fear created by these new  amendments."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;One year in jail for the innocent too&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Sunil Abraham gives two  examples by which the amended Goonda Act will become a ruthless piece of  legislation. "If I publish an image of a naked body as part of a  scientific article about the human body, is it obscene or not? It will  not be obscene and, if I am arrested under the IT Act, I will be  produced before the magistrate within 24 hours and can explain it to  him. But now, I will be arrested under the Goonda Act and need not be  produced before a magistrate for 90 days. It can be extended to one  year. So for one year, I will be in jail even if I have not committed  any wrong. Another example pertains to bringing offences under the  Copyright Act under the Goonda Act. In the Copyright Act, there is an  exception for reporting, research, educational and people with  disability. A visually impaired person, for example, can, without paying  royalty, convert a book into another format like Braille or audio and  share it with another visually impaired person on a non-profit basis.  But if he is arrested under Goonda Act, he will be in jail for one year,  even before he does it."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;HAVE THEY READ STATUTE?&lt;br /&gt;&lt;i&gt;Supreme Court advocate KV Dhananjay says, "The definition of a 'digital offender' is simply laughable. I do not think that whoever asked the state government to include 'digital offence' under the Goonda Act has carefully read the Constitution of India. Under the Constitution, both copyright and telecommunications are exclusive central subjects. This means that states simply cannot make any law on these subjects." Dhananjay gives the example of payment of income tax. "You know already that only the central government can demand and collect your income taxes. Can any state government say that it will create a new law to punish its resident who defaults in payment of income tax? You would simply laugh at any such law. This new definition of 'digital offender' is no less amusing. Offences under the Information Technology Act, 2000, are exclusively punishable by the central government only. State governments have no power to say that an Act shall become an offence when it does not even have the power to regulate such an Act."&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;CRIMINAL LAW EXPERTS SAY&lt;br /&gt;&lt;i&gt;Senior designate advocate, MT Nanaiah: "This law will be too harsh. There are MLAs who do not know the meaning of cyber crime. We (advocates) will be kept busy at the cost of innocent people because of this step. It provides for arresting anyone who would allegedly be planning to do something. Finding him guilty or otherwise comes later. What happens if your phone is lost or somebody sends something from your phone without your knowledge? For the first few years, innocents will go to jail. Then the courts will probably intervene and call for modifying what is at best a bad law. A similar situation arose with Section 498(A) of IPC and Sections 3 and 4 of Dowry Prohibition Act. It was misused to such an extent that courts had to step in." Senior designate advocate and former State Public Prosecutor HS Chandramouli : "Even social legislations have been misused. And, in this case, most people are illiterate about what cyber crime is. It is mostly teenagers and college students who will feel the heat. These are the people who mostly forward material considered obscene. It is necessary to educate people through discussions, workshops in the bar associations, law college and with experts. The amendment has been passed in the Legislature without discussion, which is a tragedy. At least now, before it is gazetted, people should be warned about what is being brought into the Goonda Act. I do not know how fair adding 'digital offenders' in the Goonda Act will be to the public, but the chances of misuse are more. There are no riders or prosecution for misuse. And how many policemen know about cyber crimes? During the infamous 'kidney' case (where people were cheated and their kidneys removed) many policemen did not know the difference between kidneys and testicles."&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;ONE YEAR IN JAIL WITHOUT CHANCE OF BAIL FOR..&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Forwarding a song from your phone&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Forwarding an e-book from your email&lt;/li&gt;
&lt;li&gt;A nude photo which the govt thinks is obscene&lt;/li&gt;
&lt;li&gt;Any software that a company says it owns&lt;/li&gt;
&lt;li&gt;A movie which a company says it has copyright on&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas'&gt;https://cis-india.org/news/bangalore-mirror-shyam-prasad-august-4-2014-we-the-goondas&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2014-08-04T15:06:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet">
    <title>Terror recruiters target Indians on internet</title>
    <link>https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet</link>
    <description>
        &lt;b&gt;What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Terror-recruiters-target-Indians-on-internet/articleshow/38565102.cms"&gt;published in the Times of India&lt;/a&gt; on July 18, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet'&gt;https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-18T06:57:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/foex-live">
    <title>FOEX Live</title>
    <link>https://cis-india.org/internet-governance/blog/foex-live</link>
    <description>
        &lt;b&gt;Selections of news on online freedom of expression and digital technology from across India (and some parts of the world)&lt;/b&gt;
        &lt;p&gt;&lt;iframe frameborder="0" height="650" src="http://cdn.knightlab.com/libs/timeline/latest/embed/index.html?source=0Aq0BN7sFZRQFdGJqaHNnSC1YNTYzZEM0SThGd2ZGVFE&amp;amp;font=Bevan-PotanoSans&amp;amp;maptype=toner&amp;amp;lang=en&amp;amp;height=650" width="100%"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For feedback, comments and any incidents of online free speech violation you are troubled or intrigued by, please email Geetha at &lt;/span&gt;&lt;span&gt;geetha[at]cis-india.org or on Twitter at @covertlight.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/foex-live'&gt;https://cis-india.org/internet-governance/blog/foex-live&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Feedback</dc:subject>
    
    
        <dc:subject>Press Freedoms</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>FOEX Live</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Section 66A</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-07T12:36:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech">
    <title>Facebook and its Aversion to Anonymous and Pseudonymous Speech</title>
    <link>https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech</link>
    <description>
        &lt;b&gt;Jessamine Mathew explores Facebook's "real name" policy and its implications for the right to free speech. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The power to be unidentifiable on the internet has been a major reason for its sheer number of users. Most of the internet can now be freely used by anybody under a pseudonym without the fear of being recognised by anybody else. These conditions allow for the furtherance of free expression and protection of privacy on the internet, which is particularly important for those who use the internet as a medium to communicate political dissent or engage in any other activity which would be deemed controversial in a society yet not illegal. For example, an internet forum for homosexuals in India, discussing various issues which surround homosexuality may prove far more fruitful if contributors are given the option of being undetectable, considering the stigma that surrounds homosexuality in India, and the recent setting-aside of the Delhi High Court decision reading down Section 377 of the Indian Penal Code. The possibility of being anonymous or pseudonymous exists on many internet fora but on Facebook, the world’s greatest internet space for building connections and free expression, there is no sanction given to pseudonymous accounts as Facebook follows a real name policy. And as the &lt;a href="http://www.nytimes.com/2014/06/27/technology/facebook-battles-manhattan-da-over-warrants-for-user-data.html?_r=0"&gt;recent decision&lt;/a&gt; of a New York judge, disallowing Facebook from contesting warrants on private information of over 300 of its users, shows, there are clear threats to freedom of expression and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the subject of using real names, Facebook’s Community Standards states, “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.” Facebook’s Marketing Director, Randi Zuckerberg, &lt;a href="http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html"&gt;bluntly dismissed&lt;/a&gt; the idea of online anonymity as one that “has to go away” and that people would “behave much better” if they are made to use their real names. Apart from being a narrow-minded statement, she fails to realise that there are many different kinds of expression on the internet, from stories of sexual abuse victims to the views of political commentators, or indeed, whistleblowers, many of whom may prefer to use the platform without being identified. It has been decided in many cases that humans have a right to anonymity as it provides for the furtherance of free speech without the fear of retaliation or humiliation (&lt;i&gt;see &lt;/i&gt;Talley v. California).&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook’s rationale behind wanting users to register for accounts with their own names is based on the goal of maintaining the security of other users, it is still a serious infraction on users’ freedom of expression, particularly when anonymous speech has been protected by various countries. Facebook has evolved from a private space for college students to connect with each other to a very public platform where not just social connections but also discussions take place, often with a heavily political theme. Facebook has been described as &lt;a href="http://www.thenational.ae/news/uae-news/facebook-and-twitter-key-to-arab-spring-uprisings-report"&gt;instrumental&lt;/a&gt; in the facilitation of communication during the Arab Spring, providing a space for citizens to effectively communicate with each other and organise movements. Connections on Facebook are no longer of a purely social nature but have extended to political and legal as well, with it being used to promote movements all through the country. Even in India, Facebook was the &lt;a href="http://timesofindia.indiatimes.com/home/news/Facebook-Twitter-Google-change-face-of-Indian-elections/articleshow/34721829.cms"&gt;most widely adopted medium&lt;/a&gt;, along with Twitter and Facebook, for discourse on the political future of the country during, before and after the 2014 elections. Earlier in 2011, Facebook was &lt;a href="https://cis-india.org/news/web2.0-responds-to-hazare"&gt;used intensively&lt;/a&gt; during the India Against Corruption movement. There were pages created, pictures and videos uploaded, comments posted by an approximate of 1.5 million people in India. In 2012, Facebook was also used to &lt;a href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-case-FacebookTwitter-fuels-rally-at-India-Gate/articleshow/17741529.cms"&gt;protest against the Delhi gang rape&lt;/a&gt; with many coming forward with their own stories of sexual assault, providing support to the victim, organising rallies and marches and protesting about the poor level of safety of women in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like its content policy, Facebook exhibits a number of discrepancies in the implementation of the anonymity ban. Salman Rushdie found that his Facebook account had been &lt;a href="http://www.nytimes.com/2011/11/15/technology/hiding-or-using-your-name-online-and-who-decides.html?pagewanted=all&amp;amp;_r=0"&gt;suspended&lt;/a&gt; and when it was reinstated after he sent them proof of identity, Facebook changed his name to the name on his passport, Ahmed Rushdie instead of the name he popularly goes by. Through a series of tweets, he criticised this move by Facebook, forcing him to display his birth name. Eventually Facebook changed his name back to Salman Rushdie but not before serious questions were raised regarding Facebook’s policies. The Moroccan activist Najat Kessler’s account was also &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CD8QFjAE&amp;amp;url=http%3A%2F%2Fjilliancyork.com%2F2010%2F04%2F08%2Fon-facebook-deactivations%2F&amp;amp;ei=O1KxU-fwH8meugSZ74HgAg&amp;amp;usg=AFQjCNE7oUt2dyrSjpTskK7Oz3Q1OYXudg&amp;amp;sig2=bsOu46nmABTUhArhdjDCVw&amp;amp;bvm=bv.69837884,d.c2E"&gt;suspended&lt;/a&gt; as it was suspected that she was using a fake name. Facebook has also not just stopped at suspending individual user accounts but has also removed pages and groups because the creators used pseudonyms to create and operate the pages in question. This was seen in the case of Wael Ghonim who created a group which helped in mobilizing citizens in Egypt in 2011. Ghonim was a Google executive who did not want his online activism to affect his professional life and hence operated under a pseudonym. Facebook temporarily &lt;a href="http://www.newsweek.com/how-wael-ghonim-sparked-egypts-uprising-68727"&gt;removed&lt;/a&gt; the group due to his pseudonymity but later reinstated it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook performs its due diligence when it comes to some accounts, it has still done nothing about the overwhelmingly large number of obviously fake accounts, ranging from Santa Claus to Jack the Ripper. On my own Facebook friend list, there are people who have entered names of fictional characters as their own, clearly violating the real name policy. I once reported a pseudonymous account that used the real name of another person. Facebook thanked me for reporting the account but also said that I will “probably not hear back” from them. The account still exists with the same name. The redundancy of the requirement lies in the fact that Facebook does not request users to upload some form identification when they register with the site but only when they suspect them to be using a pseudonym. Since Facebook also implements its policies largely only on the basis of complaints by other users or the government, the real name policy makes many political dissidents and social activists the target of abuse on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Articles 21 and 22 of the ICCPR grant all humans the right to free and peaceful assembly. As governments increasingly crack down on physical assemblies of people fighting for democracy or against legislation or conditions in a country, the internet has proved to be an extremely useful tool for facilitating this assembly without forcing people to endure the wrath of governmental authorities. A large factor which has promoted the popularity of internet gatherings is the way in which powerful opinions can be voice without the fear of immediate detection. Facebook has become the coveted online space for this kind of assembly but their policies and more particularly, faulty implementation of the policies, lead to reduced flows of communication on the site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Facebook’s fears of cyberbullying and harassment are likely to materialise if there is absolutely no check on the identity of users.  A possible solution to the conflict between requiring real names to keep the community safe and still allowing individuals to be present on the network without the fear of identification by anybody would be to ask users to register with their own names but still allowing them to create a fictional name which would be the name that other Facebook users can see. Under this model, Facebook can also deal with the issue of safety through their system of reporting against other users. If a pseudonymous user has been reported by a substantial number of people for harassment or any other cause, then Facebook may either suspend the account or remove the content that is offensive. If the victim of harassment chooses to approach a judicial body, then Facebook may reveal the real name of the user so that due process may be followed. At the same time, users who utilise the website to present their views and participate in the online process of protest or contribute to free expression in any other way can do so without the fear of being detected or targeted.  Safety on the site can be maintained even without forcing users to reveal their real names to the world. The system that Facebook follows currently does not help curb the presence of fake accounts and neither does it promote completely free expression on the site.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech'&gt;https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jessamine Mathew</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Pseudonimity</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-04T07:53:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year">
    <title>Cyber crimes shoot up 52% in India over last year</title>
    <link>https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year</link>
    <description>
        &lt;b&gt;There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by K.V.Kurmanath was &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cyber-crimes-shoot-up-52-in-india-over-last-year/article6168812.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;published in the Hindu Businessline&lt;/a&gt; on July 2, 2014. Bhairav Acharya gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you add the cases registered under the IPC, the total number of cyber crime cases crosses the 5,500-mark. Police across the country arrested 3,301 persons in connection with these cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maharashtra and Andhra Pradesh (undivided) have topped the list with 681 and 635 cases respectively under the IT Act, both showing an almost 50 per cent growth in cyber crimes over the previous year. In the previous year, Maharashtra had registered 471 and Andhra Pradesh 429.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security experts have been cautioning people to be careful while using the Internet. Besides increasing the security of the networks they are using, users must be careful while engaging with strangers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent Microsoft report said many customer infections involve users tricked to install secondary offers, indicating a shift in malware proliferation. According to the latest data provided by the National Crime Records Bureau, the official chronicler of crime in the country, cyber crime registered under the Indian Penal Code (IPC) has shown a much higher growth rate of 122 per cent in 2013 over the previous year’s figure. IPC cases went up to 1,316 in 2013 from 595 in the previous year. Maharashtra topped the list here too with the cops booking 226 cases in this category.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wrong nomenclature?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya of the Centre for Internet and Society feels that the term cyber crime has not been defined well. “It is time we do away with the practice of calling any crime a ‘cyber crime’ just because the person who does it uses a computer,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Instead, I think the term ‘cyber crime’ should only be used in relation to offences that can only be committed by using information and communications technology (ICT) such as the internet (which is comprised of the world wide web, email protocols, file transfer protocols, and more) as well as network infrastructure that is not the internet,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, only if there is a direct causal link between the crime and ICT and network technology should a crime be called a cyber crime, Acharya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other States with a high number of cases booked under the IT Act include Karnataka (513), Kerala (349), Madhya Pradesh (282) and Rajasthan (239). Gujarat showed a decline with the number coming down to 61 from 68 in the previous year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year'&gt;https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2014-07-03T10:14:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights">
    <title>Reading the Fine Script: Service Providers, Terms and Conditions and Consumer Rights</title>
    <link>https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights</link>
    <description>
        &lt;b&gt;This year, an increasing number of incidents, related to consumer rights and service providers, have come to light. This blog illustrates the facts of the cases, and discusses the main issues at stake, namely, the role and responsibilities of providers of platforms for user-created content with regard to consumer rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;On 1st July, 2014 the Federal Trade Commission (FTC) filed a complaint against T-Mobile USA,&lt;/span&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn1"&gt;[1]&lt;/a&gt;&lt;span&gt; accusing the service provider of 'cramming' customers bills, with millions of dollars of unauthorized charges. Recently, another service provider, received flak from regulators and users worldwide, after it published a paper, 'Experimental evidence of massive-scale emotional contagion through social networks'.&lt;/span&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn2"&gt;[2]&lt;/a&gt;&lt;span&gt; The paper described Facebook's experiment on more than 600,000 users, to determine whether manipulating user-generated content, would affect the emotions of its users.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In both incidents the terms that should ensure the protection of their user's legal rights, were used to gain consent for actions on behalf of the service providers, that were not anticipated at the time of agreeing to the terms and conditions (T&amp;amp;Cs) by the consumer. More precisely, both cases point to the underlying issue of how users are bound by T&amp;amp;Cs, and in a mediated online landscape—highlight, the need to pay attention to the regulations that govern the online engagement of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I have read and agree to the terms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his statement, Chief Executive Officer, John Legere might have referred to T-Mobile as "the most pro-consumer company in the industry",&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn3"&gt;[3]&lt;/a&gt; however the FTC investigation revelations, that many customers never authorized the charges, suggest otherwise.  The FTC investigation also found that, T-Mobile received 35-40 per cent of the amount charged for subscriptions, that were made largely through innocuous services, that customers had been signed up to, without their knowledge or consent. Last month news broke, that just under 700,000 users 'unknowingly' participated in the Facebook study, and while the legality and ethics of the experiment are being debated, what is clear is that Facebook violated consumer rights by not providing the choice to opt in or out, or even the knowledge of such social or psychological experiments to its users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both incidents boil down to the sensitive question of consent. While binding agreements around the world work on the condition of consent, how do we define it and what are the implications of agreeing to the terms?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms of Service: Conditions are subject to change &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A legal necessity, the existing terms of service (TOS)—as they are also known—as an acceptance mechanism are deeply broken. The policies of online service providers are often, too long, and with no shorter or multilingual versions, require substantial effort on part of the user to go through in detail. A 2008 Carnegie Mellon study estimated it would take an average user 244 hours every year to go through the policies they agree to online.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn4"&gt;[4]&lt;/a&gt; Based on the study, Atlantic's Alexis C. Madrigal derived that reading all of the privacy policies an average Internet user encounters in a year, would take 76 working days.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The costs of time are multiplied by the fact that terms of services change with technology, making it very hard for a user to keep track of all of the changes over time. Moreover, many services providers do not even commit to the obligation of notifying the users of any changes in the TOS. Microsoft, Skype, Amazon, YouTube are examples of some of the service providers that have not committed to any obligations of notification of changes and often, there are no mechanisms in place to ensure that service providers are keeping users updated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has said that the recent social experiment is perfectly legal under its TOS,&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn6"&gt;[6]&lt;/a&gt; the question of fairness of the conditions of users consent remain debatable. Facebook has a broad copyright license that goes beyond its operating requirements, such as the right to 'sublicense'. The copyright also does not end when users stop using the service, unless the content has been deleted by everyone else.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, since 2007, Facebook has brought major changes to their lengthy TOS about every year.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn7"&gt;[7]&lt;/a&gt; And while many point that Facebook is transparent, as it solicits feedback preceding changes to their terms, the accountability remains questionable, as the results are not binding unless 30% of the actual users vote. Facebook can and does, track users and shares their data across websites, and has no obligation or mechanism to inform users of the takedown requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Courts in different jurisdictions under different laws may come to different conclusions regarding these practices, especially about whether changing terms without notifying users is acceptable or not. Living in a society more protective of consumer rights is however, no safeguard, as TOS often include a clause of choice of law which allow companies to select jurisdictions whose laws govern the terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent experiment bypassed the need for informed user consent due to Facebook's Data Use Policy&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn8"&gt;[8]&lt;/a&gt;, which states that once an account has been created, user data can be used for 'internal operations, including troubleshooting, data analysis, testing, research and service improvement.' While the users worldwide may be outraged, legally, Facebook acted within its rights as the decision fell within the scope of T&amp;amp;Cs that users consented to. The incident's most positive impact might be in taking the questions of Facebook responsibilities towards protecting users, including informing them of the usage of their data and changes in data privacy terms, to a worldwide audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;My right is bigger than yours&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most TOS agreements, written by lawyers to protect the interests of the companies add to the complexities of privacy, in an increasingly user-generated digital world. Often, intentionally complicated agreements, conflict with existing data and user rights across jurisdictions and chip away at rights like ownership, privacy and even the ability to sue. With conditions that that allow for change in terms at anytime, existing users do not have ownership or control over their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April New York Times, reported of updates to the legal policy of General Mills (GM), the multibillion-dollar food company.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn9"&gt;[9]&lt;/a&gt; The update broadly asserted that consumers interacting with the company in a variety of ways and venues no longer can sue GM, but must instead, submit any complaint to “informal negotiation” or arbitration. Since then, GM has backtracked and clarified that “online communities” mentioned in the policy referred only to those online communities hosted by the company on its own websites.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn10"&gt;[10]&lt;/a&gt; Clarification aside, as Julia Duncan, Director of Federal programs at American Association for Justice points out, the update in the terms were so broad, that they were open to wide interpretation and anything that consumers purchase from the company could have been held to this clause. &lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data and whose rights?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following Snowden revelations, data privacy has become a contentious issue in the EU, and TOS, that allow the service providers to unilaterally alter terms of the contract, will face many challenges in the future. In March Edward Snowden sent his testimony to the European Parliament calling for greater accountability and highlighted that in "a global, interconnected world where, when national laws fail like this, our international laws provide for another level of accountability."&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn12"&gt;[12]&lt;/a&gt; Following the testimony came the European Parliament's vote in favor of new safeguards on the personal data of EU citizens, when it’s transferred to non-EU.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn13"&gt;[13]&lt;/a&gt; The new regulations seek to give users more control over their personal data including the right to ask for data from companies that control it and seek to place the burden of proof on the service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation places responsibility on companies, including third-parties involved in data collection, transfer and storing and greater transparency on concerned requests for information. The amendment reinforces data subject right to seek erasure of data and obliges concerned parties to communicate data rectification. Also, earlier this year, the European Court of Justice (ECJ) ruled in favor of the 'right to be forgotten'&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn14"&gt;[14]&lt;/a&gt;. The ECJ ruling recognised data subject's rights override the interest of internet users, however, with exceptions pertaining to nature of information, its sensitivity for the data subject's private life and the role of the data subject in public life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May, the Norwegian Consumer Council filed a complaint with the Norwegian Consumer Ombudsman, “… based on the discrepancies between Norwegian Law and the standard terms and conditions applicable to the Apple iCloud service...”, and, “...in breach of the law regarding control of marketing and standard agreements.”&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn15"&gt;[15]&lt;/a&gt; The council based its complaint on the results of a study, published earlier this year, that found terms were hazy and varied across services including iCloud, Drop Box, Google Drive, Jotta Cloud, and Microsoft OneDrive. The Norwegian Council study found that Google TOS, allow for users content to be used for other purposes than storage, including by partners and that it has rights of usage even after the service is cancelled.  None of the providers provide a guarantee that data is safe from loss, while many,  have the ability to terminate an account without notice. All of the service providers can change the terms of service but only Google and Microsoft give an advance notice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study also found service providers lacking with respect to European privacy standards, with many allowing for browsing of user content. Tellingly, Google had received a fine in January by the French Data Protection Authority, that stated regarding Google's TOS, "permits itself to combine all the data it collects about its users across all of its services without any legal basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;To blame or not to blame&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook is facing a probe by the UK Information Commissioner's Office, to assess if the experiment conducted in 2012 was a violation of data privacy laws.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn16"&gt;[16]&lt;/a&gt; The FTC asked the court to order T-Mobile USA,  to stop mobile cramming, provide refunds and give up any revenues from the practice. The existing mechanisms of online consent, do not simplify the task of agreeing to multiple documents and services at once, a complexity which manifolds, with the involvement of third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unsurprisingly, T-Mobile's Legere termed the FTC lawsuit misdirected and blamed the companies providing the text services for the cramming.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn17"&gt;[17]&lt;/a&gt; He felt those providers should be held accountable, despite allegations that T-Mobile's billing practices made it difficult for consumers to detect that they were being charged for unauthorized services and having shared revenues with third-party providers. Interestingly, this is the first action against a wireless carrier for cramming and the FTC has a precedent of going after smaller companies that provide the services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FTC charged  T-Mobile USA with deceptive billing practices in putting the crammed charges under a total for 'use charges' and 'premium services' and failure to highlight that portion of the charge was towards third-party charges. Further, the company urged customers to take complaints to vendors and was not forthcoming with refunds. For now, T-Mobile may be able to share the blame, the incident brings to question its accountability, especially as going forward it has entered a pact along with other carriers in USA including Verizon and AT&amp;amp;T, agreeing to stop billing customers for third-party services. Even when practices such as cramming are deemed illegal, it does not necessarily mean that harm has been prevented. Often users bear the burden of claiming refunds and litigation comes at a cost while even after being fined companies could have succeeded in profiting from their actions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfair terms and conditions may arise when service providers include terms that are difficult to understand or vague in their scope. TOS that prevent users from taking legal action, negate liability for service providers actions despite the companies actions that may have a direct bearing on users, are also considered unfair. More importantly, any term that is hidden till after signing the contract, or a term giving the provider the right to change the contract to their benefit including wider rights for service provider wide in comparison to users such as a term that that makes it very difficult for users to end a contract create an imbalance. These issues get further complicated when the companies control and profiting from data are doing so with user generated data provided free to the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the knowledge economy, web companies play a decisive role as even though they work for profit, the profit is derived out of the knowledge held by individuals and groups. In their function of aggregating human knowledge, they collect and provide opportunities for feedback of the outcomes of individual choices. The significance of consent becomes a critical part of the equation when harnessing individual information. In France, consent is part of the four conditions necessary to be forming a valid contract (article 1108 of the Code Civil).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cases highlight the complexities that are inherent in the existing mechanisms of online consent. The question of consent has many underlying layers such as reasonable notice and contractual obligations related to consent such as those explored in the case in Canada, which looked at whether clauses of TOS were communicated reasonably to the user, a topic for another blog. For now, we must remember that by creating and organising  social knowledge that further human activity, service providers, serve a powerful function. And as the saying goes, with great power comes great responsibility.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref1"&gt;[1]&lt;/a&gt; 'FTC Alleges T-Mobile Crammed Bogus Charges onto Customers’ Phone Bills', published 1 July, 2014. See: http://www.ftc.gov/news-events/press-releases/2014/07/ftc-alleges-t-mobile-crammed-bogus-charges-customers-phone-bills&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref2"&gt;[2]&lt;/a&gt; 'Experimental evidence of massive-scale emotional contagion through social networks', Adam D. I. Kramera,1, Jamie E. Guilloryb, and Jeffrey T. Hancock, published March 25, 2014. See:http://www.pnas.org/content/111/24/8788.full.pdf+html?sid=2610b655-db67-453d-bcb6-da4efeebf534&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref3"&gt;[3]&lt;/a&gt; 'U.S. sues T-Mobile USA, alleges bogus charges on phone  bills, Reuters published 1st July, 2014 See: http://www.reuters.com/article/2014/07/01/us-tmobile-ftc-idUSKBN0F656E20140701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref4"&gt;[4]&lt;/a&gt; 'The Cost of Reading Privacy Policies', Aleecia M. McDonald and Lorrie Faith Cranor, published I/S: A Journal of Law and Policy for the Information Society 2008 Privacy Year in Review issue. See: http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref5"&gt;[5]&lt;/a&gt; 'Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days', Alexis C. Madrigal, published The Atlantic, March 2012 See: http://www.theatlantic.com/technology/archive/2012/03/reading-the-privacy-policies-you-encounter-in-a-year-would-take-76-work-days/253851/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref6"&gt;[6]&lt;/a&gt; Facebook Legal Terms. See: https://www.facebook.com/legal/terms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref7"&gt;[7]&lt;/a&gt; 'Facebook's Eroding Privacy Policy: A Timeline', Kurt Opsahl, Published Electronic Frontier Foundation , April 28, 2010 See:https://www.eff.org/deeplinks/2010/04/facebook-timeline&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref8"&gt;[8]&lt;/a&gt; Facebook Data Use Policy. See: https://www.facebook.com/about/privacy/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref9"&gt;[9]&lt;/a&gt; 'When ‘Liking’ a Brand Online Voids the Right to Sue', Stephanie Strom, published in New York Times on April 16, 2014 See: http://www.nytimes.com/2014/04/17/business/when-liking-a-brand-online-voids-the-right-to-sue.html?ref=business&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref10"&gt;[10]&lt;/a&gt; Explaining our website privacy policy and legal terms, published April 17, 2014 See:http://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/#sthash.B5URM3et.dpufhttp://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref11"&gt;[11]&lt;/a&gt; General Mills Amends New Legal Policies, Stephanie Strom, published in New York Times  on 1http://www.nytimes.com/2014/04/18/business/general-mills-amends-new-legal-policies.html?_r=0&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref12"&gt;[12]&lt;/a&gt; Edward Snowden Statement to European Parliament published March 7, 2014. See: http://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref13"&gt;[13]&lt;/a&gt; Progress on EU data protection reform now irreversible following European Parliament vote, published 12 March 201 See: http://europa.eu/rapid/press-release_MEMO-14-186_en.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref14"&gt;[14]&lt;/a&gt; European Court of Justice rules Internet Search Engine Operator responsible for Processing Personal Data Published by Third Parties, Jyoti Panday, published on CIS blog on May 14, 2014. See: http://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref15"&gt;[15]&lt;/a&gt; Complaint regarding Apple iCloud’s terms and conditions , published on 13 May 2014 See:http://www.forbrukerradet.no/_attachment/1175090/binary/29927&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref16"&gt;[16]&lt;/a&gt; 'Facebook faces UK probe over emotion study' See: http://www.bbc.co.uk/news/technology-28102550&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref17"&gt;[17]&lt;/a&gt; Our Reaction to the FTC Lawsuit See: http://newsroom.t-mobile.com/news/our-reaction-to-the-ftc-lawsuit.htm&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights'&gt;https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    

   <dc:date>2014-07-04T06:31:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014">
    <title>FOEX Live: June 16-23, 2014</title>
    <link>https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014</link>
    <description>
        &lt;b&gt;A weekly selection of news on online freedom of expression and digital technology from across India (and some parts of the world). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;A quick and non-exhaustive perusal of this week’s content shows that many people are worried about the state of India’s free speech following police action on account of posts derogatory to or critical of the Prime Minister. Lawyers, journalists, former civil servants and other experts have joined in expressing this worry.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While a crackdown on freedom of expression would indeed be catastrophic and possibly unconstitutional, fears are so far based on police action in only 4 recent cases: Syed Waqar in Karnataka, Devu Chodankar in Goa and two cases in Kerala where college students and principals were arrested for derogatory references to Modi. Violence in Pune, such as the murder of a young Muslim man on his way home from prayer, or the creation of a Social Peace Force of citizens to police offensive Facebook content, are all related, but perhaps ought to be more carefully and deeply explored.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kerala:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the Assembly, State Home Minister Ramesh Chennithala &lt;a href="http://www.telegraphindia.com/1140618/jsp/nation/story_18524231.jsp#.U6kh1Y2SxDs"&gt;said that the State government did not approve&lt;/a&gt; of the registration of cases against students on grounds of anti-Modi publications. The Minister denunciation of political opponents through cartoons and write-ups was common practice in Kerala, and “&lt;i&gt;booking the authors for this was not the state government’s policy&lt;/i&gt;”.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Maharashtra:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nearly 20,000 people have &lt;a href="http://www.iol.co.za/scitech/technology/internet/peace-force-takes-aim-at-facebook-1.1705842#.U6khAI2SxDs"&gt;joined&lt;/a&gt; the Social Peace Force, a Facebook group that aims to police offensive content on the social networking site. The group owner’s stated aim is to target religious posts that may provoke riots, not political ones. Subjective determinations of what qualifies as ‘offensive content’ remain a troubling issue.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Tamil Nadu:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Chennai, 101 people, including filmmakers, writers, civil servants and activists, have &lt;a href="http://timesofindia.indiatimes.com/City/Chennai/Intelligentsia-ask-CM-to-ensure-screening-of-Lankan-movie/articleshow/37107317.cms"&gt;signed a petition&lt;/a&gt; requesting Chief Minister J. Jayalalithaa to permit safe screening of the Indo-Sri Lankan film “&lt;i&gt;With You, Without You&lt;/i&gt;”. The petition comes after theatres cancelled shows of the film following threatening calls from some Tamil groups.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Telangana:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The K. Chandrasekhar Rao government &lt;a href="http://www.newslaundry.com/2014/06/23/channels-on-the-telangana-block/"&gt;has blocked&lt;/a&gt; two Telugu news channels for airing content that was “&lt;i&gt;derogatory, highly objectionable and in bad taste&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telagana government’s decision to block news channels has its supporters. Padmaja Shaw &lt;a href="http://www.thehoot.org/web/When-media-threatens-democracy/7593-1-1-14-true.html"&gt;considers&lt;/a&gt; the mainstream Andhra media contemptuous and disrespectful of “&lt;i&gt;all things Telangana&lt;/i&gt;”, while Madabushi Sridhar &lt;a href="http://www.thehoot.org/web/Abusive-media-vs-angry-legislature/7591-1-1-2-true.html"&gt;concludes&lt;/a&gt; that Telugu channel TV9’s coverage violates the dignity of the legislature.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;West Bengal:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Seemingly anti-Modi arrests &lt;a href="http://www.telegraphindia.com/1140617/jsp/nation/story_18520612.jsp#.U6kh142SxDs"&gt;have led to worry&lt;/a&gt; among citizens about speaking freely on the Internet. Section 66A poses a particular threat.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;News &amp;amp; Opinion:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Department of Telecom is preparing a draft of the National Telecom Policy, in which it &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-06-19/news/50710986_1_national-broadband-policy-broadband-penetration-175-million-broadband-connections"&gt;plans to treat broadband Internet as a basic right&lt;/a&gt;. The Policy, which will include deliberations on affordable broadband access for end users, will be finalised in 100 days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While addressing a CII CEO’s Roundtable on Media and Industry, Information and Broadcasting Minister &lt;/span&gt;&lt;a href="http://www.indiantelevision.com/regulators/i-and-b-ministry/government-committed-to-communicating-with-people-across-media-platforms-javadekar-140619"&gt;Prakash Javadekar promised&lt;/a&gt;&lt;span&gt; a transparent and stable policy regime, operating on a time-bound basis. He promised that efforts would be streamlined to ensure speedy and transparent clearances.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A perceived increase in police action against anti-Modi publications or statements &lt;a href="http://www.dw.de/indias-anti-modi-netizens-fear-possible-crackdown/a-17725267"&gt;has many people worried&lt;/a&gt;. But the Prime Minister himself was once a fierce proponent of dissent; in protest against the then-UPA government’s blocking of webpages, Modi changed his display pic to black.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;a href="http://www.medianama.com/2014/06/223-social-media-helpline-mumbai/"&gt;Medianama wonders&lt;/a&gt;&lt;/i&gt; whether the Mumbai police’s Cyber Lab and helpline to monitor offensive content on the Internet is actually a good idea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/Opinion/vGkg6ig9qJqzm2eL3SxkUK/Time-for-Modi-critics-to-just-shut-up.html"&gt;G. Sampath wonders&lt;/a&gt; why critics of the Prime Minister Narendra Modi can’t voluntarily refrain from exercising their freedom of speech, and allow India to be an all-agreeable development haven. Readers may find his sarcasm subtle and hard to catch.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts in India &lt;a href="http://www.business-standard.com/article/current-affairs/does-eu-s-right-to-be-forgotten-put-barrier-on-the-net-114062400073_1.html"&gt;mull over&lt;/a&gt; whether Section 79 of the Information Technology Act, 2000, carries a loophole enabling users to exercise a ‘right to be forgotten’. Some say Section 79 does not prohibit user requests to be forgotten, while others find it unsettling to provide private intermediaries such powers of censorship.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Some parts of the world:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sri Lanka &lt;a href="http://www.canindia.com/2014/06/sri-lanka-bans-meetings-that-can-incite-religious-hatred/"&gt;has banned&lt;/a&gt; public meetings or rallies intended to promote religious hatred.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Pakistan, Twitter &lt;a href="http://www.outlookindia.com/news/article/Twitter-Restores-Access-to-Blasphemous-Material-in-Pak/845254"&gt;has restored&lt;/a&gt; accounts and tweets that were taken down last month on allegations of being blasphemous or ‘unethical’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Myanmar, an anti-hate speech network &lt;a href="http://www.mmtimes.com/index.php/national-news/10785-anti-hate-speech-network-proposed.html"&gt;has been proposed&lt;/a&gt; throughout the country to raise awareness and opposition to hate speech and violence.&lt;/p&gt;
&lt;div class="kssattr-macro-text-field-view kssattr-templateId-blogentry_view.pt kssattr-atfieldname-text plain" id="parent-fieldname-text"&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;For feedback, comments and any incidents of online free speech violation you are troubled or intrigued by, please email Geetha at &lt;/span&gt;&lt;span&gt;geetha[at]cis-india.org or on Twitter at @covertlight.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div class="relatedItems"&gt;&lt;/div&gt;
&lt;div class="visualClear"&gt;&lt;/div&gt;
&lt;div class="documentActions"&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014'&gt;https://cis-india.org/internet-governance/blog/foex-live-june-16-23-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>FOEX Live</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Section 66A</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-06-24T10:23:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data">
    <title>Vodafone Report Explains Government Access to Customer Data</title>
    <link>https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data</link>
    <description>
        &lt;b&gt;Vodafone Group PLC, the world’s second largest mobile carrier, released a report on Friday, June 6 2014 disclosing to what extent governments can request their customers’ data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="http://www.vodafone.com/content/dam/sustainability/2014/pdf/vodafone_full_report_2014.pdf"&gt;The Law Enforcement Disclosure Report&lt;/a&gt;, a section of a larger annual Sustainability Report began by asserting that Vodafone "customers have a right to privacy which is enshrined in international human rights law and standards and enacted through national laws."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the report continues, Vodafone is incapable of fully protecting its customers right to privacy, because it is bound by the laws in the various countries in which it operates. "If we do not comply with a lawful demand for assistance, governments can remove our license to operate, preventing us from providing services to our customers," The report goes into detail about the laws in each of the 29 nations where the company operates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report is one of the first published by a multinational service provider. Compiling such a report was especially difficult, according to the report, for a few reasons. Because no comparable report had been published before, Vodafone had to figure out for themselves, the “complex task” of what information they could legally publish in each country. This difficulty was compounded by the fact that Vodafone operates physical infrastructure and thus sets up a business in each of the countries where it provides services. This means that Vodafone is subject to the laws and operating licenses of each nation where it operates, unlike as a search engine such as Google, which can provide services across international borders but still be subject to United States law – where it is incorporated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report is an important step forward for consumer privacy. First, the Report shows that the company is aware of the conflict of interest between government authorities and its customers, and the pivotal position that the company can play in honoring the privacy of its users by providing information regarding the same in all cases where it legally can. Additionally, providing the user insight into challenges that the company faces when addressing and responding to law enforcement requests, the Report provides a brief overview of the legal qualifications that must be met in each country to access customer data. Also, Vodafone’s report has encouraged other telecom companies to disclose similar information to the public. For instance, Deutsche Telekom AG, a large European and American telecommunications company, said Vodafone’s report had led it consider releasing a report of it’s own.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Direct Government Access&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The report revealed that six countries had constructed secret wires or “pipes” which allowed them access to customers’ private data. This means that the governments of these six countries have immediate access to Vodafone’s network without any due process, oversight, or accountability for these opaque practices. Essentially, the report reveals, in order to operate in one of these jurisdictions, a communications company must ensure  that authorities have, real time and direct access to all personal customer data at any time, without any specific justification. The report does not name these six nations for legal reasons.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These pipes exist, the direct access model exists,” Vodafone's group privacy officer, Stephen Deadman, told the Guardian. “We are making a call to end direct access as a means of government agencies obtaining people's communication data. Without an official warrant, there is no external visibility. If we receive a demand we can push back against the agency. The fact that a government has to issue a piece of paper is an important constraint on how powers are used."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Organization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s Report lists the aggregate number of content requests they received in each country where it operates, and groups these requests into two major categories. The first is Lawful Interceptions, which is when the government directly listens in or reads the content of a communication. In the past, this type of action has been called wiretapping, but now includes reading the content of text messages, emails, and other communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second data point Vodafone provides for each country is the number of Communications Data requests they receive from each country. These are requests for the metadata associated with customer communications, such as the numbers they have been texting and the time stamps on all of their texts and calls.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worth noting that all of the numbers Vodafone reports are warrant statistics rather than target statistics. Vodafone, according to the report, has chosen to include the number of times a government sent a request to Vodafone to "intrude into the private affairs of its citizens, not the extent to which those warranted activities then range across an ever-expanding multiplicity of devices, accounts and apps."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Construction&lt;/h3&gt;
&lt;p&gt;However, in many cases, laws in the various companies in which Vodafone operates prohibit Vodafone from publishing all or part of the aforementioned data. In fact, this is the rule rather than the exception. The majority of countries, including India, prohibit Vodafone from releasing the number of data requests they receive. Other countries publish the numbers themselves, so Vodafone has chosen not to reprint their statistics either. This is because Vodafone wants to encourage governments to take responsibility for informing their citizens of the statistics themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report also makes note of the process Vodafone went through to determine the legality of publishing these statistics. It was not always straightforward. For example, in Germany, when Vodafone’s legal team went to examine the legislation governing whether or not they could publish statistics on government data requests, they concluded that the laws were unclear, and asked German authorities for advice on how to proceed. They were informed that publishing any such statistics would be illegal, so they did not include any German numbers in their report. However, since that time, other local carriers have released similar statistics, and thus the situation remains unresolved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other companies have also recently released reports. Twitter, a microblogging website, Facebook, a social networking website, and Google a search engine with social network capabilities have all released comparable reports, but their reports differ from Vodafone’s in a number of ways. While Twitter, Google, and Facebook all specified the percent of requests granted, Vodafone released no similar statistics. However, Vodafone prepared discussions of the various legal constraints that each country imposed on telecom companies, giving readers an understanding of what was required in each country for authorities to access their data, a component that was left out of other recent reports. Once again, Vodafone’s report differed from those of Google Facebook and Twitter because while Vodafone opens businesses in each of the countries where it operates and is subject to their laws, Google, Facebook, and Twitter are all Internet companies and so are only governed by United States law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google disclosed that it received 27,427 requests over a six-month period ending in December, 2013, and also noted that the number of requests has increased consistently each six-month period since data began being compiled in 2009, when fewer than half as many requests were being made. On the other hand Google said that the percentage of requests it complied with (64% over the most recent period) had declined significantly since 2010, when it complied with 76% of requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google went into less detail when explaining the process non-American authorities had to go through to access data, but did note that a Mutual Legal Assistance Treaty was the primary way governments outside of the United States could force the release of user data. Such a treaty is an agreement between the United States and another government to help each other with legal proceedings. However, the report indicated that Google might disclose user information in situations when they were not legally compelled to, and did not go into detail about how or when it did that. Thus, given the difficulty of obtaining a Mutual Legal Assistance Treaty in addition to local warrants or subpoenas, it seems likely that Google complies with many more non-American data requests than it was legally forced to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has only released two such reports so far, for the two six month periods in 2013, but they too indicated an increasing number of requests, from roughly 26,000 to 28,147. Facebook plans to continue issuing reports every six months.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twitter has also seen an increase of 22% in government requests between this and the previous reporting period, six months ago. Twitter attributes this increase in requests to an increase in users internationally, and it does seem that the website has a similarly growing user base, according to charts released by Twitter. It is worth noting that while large nations such as the United States and India are responsible for the majority of government requests, smaller nations such as Bulgaria and Ecuador also order telecom and Internet companies to turn over data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Vodaphone’s Statistics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though Vodafone’s report didn’t print statistics for the majority of the countries the report covered, looking at the few numbers they did publish can shed some light on the behavior of governments in countries where publishing such statistics is illegal.  For the countries where Vodafone does release data, the numbers of government requests for Vodafone data were much higher than for Google data. For instance, Italy requested Vodafone data 605,601 times, while requesting Google data only 896 times. This suggests that other countries such as India could be looking at many more customers’ data through telecom companies like Vodafone than Internet companies like Google.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone stressed that they were not the only telecom company that was being forced to share customers’ data, sometimes without warrants. In fact, such access was the norm in countries where authorities demanded it.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India and the Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India is one of the most proliferate requesters of data, second only to the United States in number of requests for data from Facebook and fourth after the United States, France and Germany in number of requests for data from Google. In the most recent six-month period, India requested data from Google 2,513 times, Facebook 3,598 times, and Twitter 19 times. The percentage of requests granted varies widely from country. For example, while Facebook complies with 79% of United States authorities’ requests, it only grants 50% of India’s requests. Google responds to 83% of US requests but only 66% of India’s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook also provides data on the number of content restrictions each country requests. A content restriction request is where an authority asks Facebook to take down a particular status, photo, video, or other web content and no longer display it on their site. India, with 4,765 requests, is the country that most often asks Facebook to remove content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Vodafone’s report publishes no statistics on Indian data requests, because such disclosure would be illegal, it does discuss the legal considerations they are faced with. In India, the report explains, several laws govern Internet communications. The Information Technology Act (ITA) of 2000 is the parent legislation governing information technology in India. The ITA allows certain members of Indian national or state governments order an interception of a phone call or other communication in real time, for a number of reasons. According to the report, an interception can be ordered “if the official in question believes that it is necessary to do so in the: (a) interest of sovereignty and integrity of India; (b) the security of the State; (c) friendly relations with foreign states; (d) public order; or (e) the prevention of incitement of offences.” In short, it is fairly easy for a high-ranking official to order a wiretapping in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report goes on to detail Indian authorities’ abilities to request other customer data beyond a lawful interception. The Code of Criminal Procedure allows a court or police officer to ask Vodafone and other telecom companies to produce “any document or other thing” that the officer believes is necessary for any investigation. The ITA extends this ability to any information stored in any computer, and requires service providers to extend their full assistance to the government. Thus, it is not only legally simple to order a wiretapping in India; it is also very easy for authorities to obtain customer web or communication data at any time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that Indian laws governing communication have very little protections in place for consumer privacy. However, many in India hope to change this reality. The Group of Experts chaired by Justice AP Shah, the Department of Personnel and Training, along with other concerned groups have been working towards the  drafting of a privacy legislation for India. According to the &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;, the legislation would fix the 50 or so privacy laws in India that are outdated and unable to protect citizen’s privacy when they use modern technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Indian government is moving forward with a number of plans to further infringe the privacy of civilians. For example, the Central Monitoring System, a clandestine electronic surveillance program, gives India’s security agencies and income tax officials direct access to communications data in the country. The program began in 2007 and was announced publicly in 2009 to little fanfare and muted public debate. The system became operational in 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Vodafone’s report indicates that it is concerned about protecting its customer’s privacy, and Vodafone’s disclosure report is an important step forward for consumer web and communication privacy. The report stresses that company practice and government policy need to come together to protect citizen’s privacy and –businesses cannot do it alone. However, the report reveals what companies can do to effect privacy reform. By challenging authorities abilities to access customer data, as well as publishing information about these powers, they bring the issue to the government’s attention and open it up to public debate. Through Vodafone’s report, the public can see why their governments are making surveillance decisions. Yet, in India, there is still little adoption of transparent business practices such as these. Perhaps if more companies were transparent about the level of government surveillance their customers were being subjected to, their practices and policies for responding to requests from law enforcement, and the laws and regulations that they are subject to - the public would press the government for stronger privacy safeguards and protections.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data'&gt;https://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>joe</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-19T10:38:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014">
    <title>FOEX Live: June 8-15, 2014</title>
    <link>https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014</link>
    <description>
        &lt;b&gt;A weekly selection of news on online freedom of expression and digital technology from across India (and some parts of the world). Please email relevant news/cases/incidents to geetha[at]cis-india.org.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Karnataka:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A Hindu rightwing group &lt;/span&gt;&lt;a href="http://www.daijiworld.com/news/news_disp.asp?n_id=241239"&gt;demanded the arrest&lt;/a&gt;&lt;span&gt; of a prominent activist, who during a speech on the much-debated Anti-superstition Bill, made comments that are allegedly blasphemous.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kerala:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;On June 10, the principal and six students of Government Polytechnic at Kunnamkulam, Thrissur, &lt;/span&gt;&lt;a href="http://indianexpress.com/article/india/india-others/modi-on-negative-faces-list-principal-6-others-booked/"&gt;were arrested&lt;/a&gt;&lt;span&gt; for publishing a photograph of Prime Minister Narendra Modi alongside photographs of Hitler, Osana bin Laden and Ajmal Kasab, under the rubric ‘negative faces’. An FIR was &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/kerala/case-against-principal-students-for-slighting-modi/article6101911.ece?ref=relatedNews"&gt;registered&lt;/a&gt;&lt;span&gt; against them for various offences under the Indian Penal Code including defamation (Section 500), printing or engraving matter known to be defamatory (Section 501), intentional insult with intent to provoke breach of peace (Section 504), and concealing design to commit offence (Section 120) read with Section 34 (acts done by several persons in furtherance of common intention). The principal was later &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/kerala/kerala-college-principal-arrested-over-modi-negative-faces-row/article6111575.ece?ref=relatedNews"&gt;released on bail&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a similarly unsettling incident, on June 14, 2014, a &lt;a href="http://www.thehindu.com/news/national/kerala/another-kerala-college-wades-into-modi-row/article6111912.ece?ref=relatedNews"&gt;case was registered&lt;/a&gt; against the principal and 11 students of Sree Krishna College, Guruvayur, for using “objectionable and unsavoury” language in a crossword in relation to PM Narendra Modi, Rahul Gandhi, Shashi Tharoor, etc. Those arrested were later &lt;a href="http://www.thehindu.com/news/national/kerala/nine-students-arrested-in-kerala-for-antimodi-remarks-in-campus-magazine/article6116911.ece?homepage=true&amp;amp;utm_source=Most%20Popular&amp;amp;utm_medium=Homepage&amp;amp;utm_campaign=Widget%20Promo"&gt;released on bail&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Maharashtra:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Facebook posts involving objectionable images of Dr. B.R. Ambedkar led to &lt;a href="http://www.thehindu.com/news/facebook-post-on-ambedkar-sparks-violence-in-mharashtra/article6096766.ece"&gt;arson and vandalism in Pune&lt;/a&gt;. Police have sought details of the originating IP address from Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Pune-based entrepreneur &lt;a href="http://www.ndtv.com/article/cities/new-facebook-group-to-block-offensive-posts-against-religious-figures-542189"&gt;has set up&lt;/a&gt; a Facebook group to block ‘offensive’ posts against religious leaders. The Social Peace Force will use Facebook’s ‘Report Spam’ option to take-down of ‘offensive’ material.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deputy Chief Minister Ajit Pawar &lt;a href="http://indianexpress.com/article/india/india-others/maharashtra-deputy-cm-says-ban-social-media-retracts/"&gt;suggested&lt;/a&gt; a ban on social media in India, and retracted his statement post-haste.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Punjab:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A bailable warrant &lt;a href="http://www.hindustantimes.com/punjab/chandigarh/warrants-against-singer-kailash-kher-for-hurting-religious-sentiments/article1-1227795.aspx"&gt;was issued&lt;/a&gt; against singer Kailash Kher for failing to appear in court in relation to a case. The singer is alleged to have hurt religious sentiments of the Hindu community in a song, and a case registered under Sections 295A and 298, Indian Penal Code.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Uttar Pradesh:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The presence of a photograph on Facebook, in which an accused in a murder case is found posing with an illegal firearm, resulted in a &lt;a href="http://www.firstpost.com/india/up-murder-accused-booked-for-posing-on-facebook-with-illegal-gun-1567323.html"&gt;case being registered&lt;/a&gt; against him under the IT Act.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;News &amp;amp; Opinion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Authors, civil society activists and other concerned citizens &lt;a href="http://www.financialexpress.com/news/civil-society-activists-flay-narendra-modi-pmos-silence-on-attacks-on-dissent/1258143"&gt;issued a joint statement&lt;/a&gt; questioning Prime Minister Modi’s silence over arrests and attacks on exercise of free speech and dissent. Signatories include Aruna Roy, Romila Thapar, Baba Adhav, Vivan Sundaram, Mrinal Pande, Jean Dreze, Jayati Ghosh, Anand Pathwardhan and Mallika Sarabhai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to Mumbai police’s decision to take action against those who ‘like’ objectionable or offensive content on Facebook, experts say the &lt;a href="http://indianexpress.com/article/cities/mumbai/freedom-to-like-shareany-content-a-fundamental-right-experts/"&gt;freedom to ‘like’ or ‘share’&lt;/a&gt; posts or tweets is fundamental to freedom of expression. India’s defamation laws for print and the Internet need harmonization, moreover.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While supporting freedom of expression, Minister for Information and Broadcasting Prakash Javadekar cautioned &lt;a href="http://www.mizonews.net/nation/no-compromise-on-press-freedom-but-practice-self-restraint-javadekar/"&gt;the press&lt;/a&gt; and &lt;a href="http://articles.economictimes.indiatimes.com/2014-06-09/news/50448166_1_facebook-post-prakash-javadekar-speech"&gt;all users of social media&lt;/a&gt; that the press and social media should be used responsibly for unity and peace. The Minister has also &lt;a href="http://blogs.reuters.com/faithworld/2014/06/09/indian-govt-vows-to-uphold-free-speech-after-hindu-book-withdrawal/"&gt;spoken out&lt;/a&gt; in favour of free publication, in light of recent legal action against academic work and other books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Infosys, India’s leading IT company, &lt;a href="http://www.thehindu.com/news/national/infosys-slaps-defamation-notice-on-three-newspapers/article6098717.ece"&gt;served defamation notices&lt;/a&gt; on the &lt;i&gt;Economic Times&lt;/i&gt;, the &lt;i&gt;Times of India &lt;/i&gt;and the Financial Express, for “loss and reputation and goodwill due to circulation of defamatory articles”. Removal of articles and an unconditional apology were sought, and Infosys claimed damages amounting to Rs. 2000 crore. On a related note, Dr. Ashok Prasad &lt;a href="http://www.newslaundry.com/2014/06/09/arresting-the-slander/"&gt;argues&lt;/a&gt; that criminal defamation is a violation of freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing on examples from the last 3 years, Ritika Katyal &lt;a href="http://southasia.foreignpolicy.com/posts/2014/06/11/warning_bells_for_freedom_of_expression_in_modi_s_india"&gt;analyses&lt;/a&gt; India’s increasing violence and legal action against dissent and hurt sentiment, and concludes that Prime Minister Narendra Modi has both the responsibility and ability to “&lt;i&gt;rein in Hindu hardliners&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discretionary powers resting with the police under the vaguely and broadly drafted Section 66A, Information Technology Act, are dangerous and unconstitutional, &lt;a href="http://indiatogether.org/articles/freedom-of-speech-on-internet-section-66a-laws"&gt;say experts&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Providing an alternative view, the &lt;i&gt;Hindustan Times &lt;/i&gt;&lt;a href="http://www.hindustantimes.com/comment/efficient-policing-is-the-best-way-to-check-cyber-crimes/article1-1228163.aspx"&gt;comments&lt;/a&gt; that the police ought to “&lt;i&gt;pull up their socks&lt;/i&gt;” and understand the social media in order to effectively police objectionable and offensive content on the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Keeping Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indconlawphil’s &lt;a href="http://indconlawphil.wordpress.com/free-speech-watch/"&gt;Free Speech Watch&lt;/a&gt; keeps track of violations of freedom of expression in India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014'&gt;https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>FOEX Live</dc:subject>
    
    
        <dc:subject>Section 66A</dc:subject>
    

   <dc:date>2014-06-16T10:22:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
