<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 221 to 235.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-draft-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-act-and-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/primer-it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/publications/it-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/software-patenting-will-harm-industry-consumer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/deccan-herald-november-3-2008-l-subramani-visually-impaired-seek-access-to-print-materials"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/the-right-to-information-the-right-to-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/pupfip/resources"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/publications/pupfip"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg">
    <title>Letter to ICANN on NCSG</title>
    <link>https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society sent the following mail to ICANN regarding their attempt to impose their own charter for a Noncommercial Stakeholder Group (NCSG), instead of accepting the one drafted by the Noncommercial Users Constituency (NCUC).&lt;/b&gt;
        
&lt;p&gt;Dear Sir or Madam,&lt;/p&gt;
&lt;p&gt;Greetings from the Centre for Internet and Society - Bangalore. We are a Bangalore based research and advocacy organisation promoting consumer and citizen rights on the Internet. We currently focus on IPR reform, IPR alternatives and electronic accessibility by the disabled. Please see our website &amp;lt;http://cis-india.org&amp;gt; for more information about us and our activities.&lt;/p&gt;
&lt;p&gt;It has come to our attention that ICANN is imposing the ICANN staff-drafted charter for a Noncommercial Stakeholder Group (NCSG) and ignoring the version drafted by civil society. As you know, the civil society version was drafted using a consensus process and more than 80 international noncommercial organizations, including mine, support it.&lt;/p&gt;
&lt;p&gt;This is an unacceptable situation since the governance structures contained within the NCSG charter determine how effectively noncommercial users can influence policy decisions at ICANN in years to come. On behalf of Internet users in India - I would strongly urge you to reject the staff drafted version of the charter and adopt the version drafted and endorsed by civil society.&lt;/p&gt;
&lt;p&gt;Best wishes,&lt;/p&gt;
&lt;p&gt;Sunil Abraham&lt;br /&gt;Executive Director&lt;br /&gt;Centre for Internet and Society&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg'&gt;https://cis-india.org/internet-governance/blog/letter-to-icann-on-ncsg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Digital Pluralism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2011-08-02T07:41:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-draft-rules">
    <title>Comments on the Draft Rules under the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/blog/comments-draft-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society commissioned an advocate, Ananth Padmanabhan, to produce a comment on the Draft Rules that have been published by the government under the Information Technology Act.  In his comments, Mr. Padmanabhan highlights the problems with each of the rules and presents specific recommendations on how they can be improved.  These comments were sent to the Department of Information and Technology.&lt;/b&gt;
        
&lt;h2&gt;&lt;em&gt;Comments on the Draft Rules under the Information Technology Act as Amended by the Information Technology (Amendment) Act, 2008&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Submitted by the Centre for Internet and Society, Bangalore&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Prepared by Ananth Padmanabhan, Advocate in the Madras High Court&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;h2&gt;Interception, Monitoring and Decryption&lt;/h2&gt;
&lt;h3&gt;Section 69&lt;/h3&gt;
&lt;p&gt;The section says:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Where the Central Government or a State Government or any of its officer specially authorised by the Central Government or the State Government, as the case may be, in this behalf may, if satisfied that it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource. &lt;/li&gt;&lt;li&gt;The procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed.&lt;/li&gt;&lt;li&gt;The subscriber or intermediary or any person in-charge of the computer resource shall, when called upon by any agency referred to in sub-section (1), extend all facilities and technical assistance to-&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) provide access to or secure access to the computer resource
generating transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) intercept, monitor, or decrypt the information, as the case may be; or&lt;/p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) provide information stored in computer resource.
&lt;ol&gt;&lt;li&gt;The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with imprisonment for a term which may extend to seven years and shall also be liable to fine. &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #1&lt;/strong&gt;&lt;br /&gt;Section 69(3) should be amended and the following proviso be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;Provided that only those intermediaries with respect to any information or computer resource that is sought to be monitored, intercepted or decrypted, shall be subject to the obligations contained in this sub-section, who are, in the opinion of the appropriate authority, prima facie in control of such transmission of the information or computer resource. The nexus between the intermediary and the information or the computer resource that is sought to be intercepted, monitored or decrypted should be clearly indicated in the direction referred to in sub-section (1) of this section.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;In the case of any information or computer resource, there may be more than one intermediary who is associated with such information. This is because “intermediary” is defined in section 2(w) of the amended Act as,&lt;/p&gt;
&lt;p class="callout"&gt;“with respect to any electronic record means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record, including telecom service providers, network service providers, internet service providers, webhosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The State or Central Government should not be given wide-ranging powers to enforce cooperation on the part of any such intermediary without there being a clear nexus between the information that is sought to be decrypted or monitored by the competent authority, and the control that any particular intermediary may have over such information.&lt;/p&gt;
&lt;p&gt;To give an illustration, merely because some information may have been posted on an online portal, the computer resources in the office of the portal should not be monitored unless the portal has some concrete control over the nature of information posted in it. This has to be stipulated in the order of the Central or State Government which authorizes interception of the intermediary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #2&lt;/strong&gt;&lt;br /&gt;Section 69(4) should be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The closest parallels to Section 69 of the Act are the provisions in the Telegraph Rules which were brought in after the decision in PUCL v. Union of India, (1997) 1 SCC 301, famously known as the telephone tapping case.&lt;/p&gt;
&lt;p&gt;Section 69(4) fixes tremendous liability on the intermediary for non-cooperation. This is violative of Article 14.&amp;nbsp; Similar provisions in the Indian Penal Code and Code of Criminal Procedure, which demand cooperation from members of the public as regards production of documents, letters etc., and impose punishment for non-cooperation on their part, impose a maximum punishment of one month. It is bewildering why the punishment is 7 years imprisonment for an intermediary, when the only point of distinction between an intermediary under the IT Act and a member of the public under the IPC and CrPC is the difference in the media which contains the information.&lt;/p&gt;
&lt;p&gt;Section 69(3) is akin to the duty cast upon members of the public to extend cooperation under Section 39 of the Code of Criminal Procedure by way of providing information as to commission of any offence, or the duty, when a summons is issued by the Court or the police, to produce documents under Sections 91 and 92 of the Code of Criminal Procedure. The maximum punishment for non-cooperation prescribed by the Indian Penal Code for omission to cooperate or wilful breach of summons is only a month under Sections 175 and 176 of the Indian Penal Code. Even the maximum punishment for furnishing false information to the police is only six months under Section 177 of the IPC. When this is the case with production of documents required for the purpose of trial or inquiry, it is wholly arbitrary to impose a punishment of six years in the case of intermediaries who do not extend cooperation for providing access to a computer resource which is merely apprehended as being a threat to national security etc. A mere apprehension, however reasonable it may be, should not be used to pin down a liability of such extreme nature on the intermediary.&lt;/p&gt;
&lt;p&gt;This would also amount to a violation of Articles 19(1)(a) as well as 19(1)(g) of the Constitution, not to mention Article 20(3). To give an example, much of the information received from confidential sources by members of the press would be stored in computer resources. By coercing them, through the 7 year imprisonment threat, to allow access to this computer resource and thereby part with this information, the State is directly infringing on their right under Article 19(1)(a).&amp;nbsp; Furthermore, if the “subscriber” is the accused, then section 69(4) goes against Article 20(3) by forcing the accused to bear witness against himself.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69 &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 3&lt;/strong&gt;&lt;br /&gt;Directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub- section (2) of section 69 of the Information Technology (Amendment) Act, 2008 (hereinafter referred to as the said Act) shall not be issued except by an order made by the concerned competent authority who is Union Home Secretary in case of Government of India; the Secretary in-charge of Home Department in a State Government or Union Territory as the case may be. In unavoidable circumstances, such order may be made by an officer, not below the rank of a Joint Secretary to the Government of India, who has been duly authorised by the Union Home Secretary or by an officer equivalent to rank of Joint Secretary to Government of India duly authorised by the Secretary in-charge of Home Department in the State Government or Union Territory, as the case may be:&lt;/p&gt;
&lt;p&gt;Provided that in emergency cases – &lt;br /&gt;(i) in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or &lt;br /&gt;(ii) for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource is not feasible;&lt;/p&gt;
&lt;p&gt;the required interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource shall be carried out with the prior approval of the Head or the second senior most officer of the Security and Law Enforcement Agencies (hereinafter referred to as the said Security Agencies) at the Central Level and the officers authorised in this behalf, not below the rank of Inspector General of Police or an officer of equivalent rank, at the State and Union Territory level. The concerned competent authority, however, shall be informed of such interceptions or monitoring or decryption by the approving authority within three working days and that such interceptions or monitoring or decryption shall be got confirmed by the concerned competent authority within a period of seven working days. If the confirmation from the concerned competent authority is not received within the stipulated seven working days, such interception or monitoring or decryption shall cease and the same information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the concerned competent authority, as the case may be.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #3&lt;/strong&gt;&lt;br /&gt;In Rule 3, the following proviso may be inserted:&lt;/p&gt;
&lt;p class="callout"&gt;“Provided that in the event of cooperation by any intermediary being required for the purpose of interception, monitoring or decryption of such information as is referred to in this Rule, prior permission from a Supervisory Committee headed by a retired Judge of the Supreme Court or the High Courts shall be obtained before seeking to enforce the Order mentioned in this Rule against such intermediary.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Section 69 and the draft rules suffer from absence of essential procedural safeguards. This has come in due to the blanket emulation of the Telegraph Rules. Additional safeguards should have been prescribed to ensure that the intermediary is put to minimum hardship when carrying on the monitoring or being granted access to a computer resource. Those are akin to a raid, in the sense that it can stop an online e-commerce portal from carrying out operations for a day or even more, thus affecting their revenue. It is therefore recommended that in any situation where cooperation from the intermediary is sought, prior judicial approval has to be taken. The Central or State Government cannot be the sole authority in such cases.&lt;/p&gt;
&lt;p&gt;Furthermore, since access to the computer resource is required, an executive order should not suffice, and a search warrant or an equivalent which results from a judicial application of the mind (by the Supervisory Committee, for instance) should be required.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #4&lt;/strong&gt;&lt;br /&gt;The following should be inserted after the last line in Rule 22:&lt;/p&gt;
&lt;p class="callout"&gt;The Review Committee shall also have the power to award compensation to the intermediary in cases where the intermediary has suffered loss or damage due to the actions of the competent authority while implementing the order issued under Rule 3.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;The Review Committee should be given the power to award compensation to the loss suffered by the intermediary in cases where the police use equipment or software for monitoring/decryption that causes damage to the intermediary’s computer resources / networks. The Review Committee should also be given the power to award compensation in the case of monitoring directions which are later found to be frivolous or even worse, borne out of mala fide considerations. These provisions will act as a disincentive against the abuse of power contained in Section 69.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Blocking of Access to Information&lt;/h2&gt;
&lt;h3&gt;Section 69A&lt;/h3&gt;
&lt;p&gt;The section provides for blocking of websites if the government is satisfied that it is in the interests of the purposes enlisted in the section. It also provides for penalty of up to seven years for intermediaries who fail to comply with the directions under this section. &lt;br /&gt;The rules under this section describe the procedure which have to be followed barring which the review committee may, after due examination of the procedural defects, order an unblocking of the website.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Section 69A(3)&lt;/strong&gt;&lt;br /&gt;The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendation #5&lt;/strong&gt;&lt;br /&gt;The penalty for intermediaries must be lessened.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The penal provision in this section which prescribes up to seven years imprisonment and a fine on an intermediary who fails to comply with the directions so issued is also excessively harsh. Considering the fact that various mechanisms are available to escape the blocking of websites, the intermediaries must be given enough time and space to administer the block effectively and strict application of the penal provisions must be avoided in bona fide cases.&lt;/p&gt;
&lt;p&gt;The criticism about Section 69 and the draft rules in so far as intermediary liability is concerned, will also apply mutatis mutandis to these rules as well as Section 69A.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 69A&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Rule 22: Review Committee&lt;/strong&gt;&lt;br /&gt;The Review Committee shall meet at least once in two months and record its findings whether the directions issued under Rule (16) are in accordance with the provisions of sub-section (2) of section 69A of the Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #6&lt;/strong&gt;&lt;br /&gt;A permanent Review Committee should be specially for the purposes of examining procedural lapses.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 22 provides for a review committee which shall meet a minimum of once in every two months and order for the unblocking of a site of due procedures have not been followed. This would mean that if a site is blocked, there could take up to two months for a procedural lapse to be corrected and it to be unblocked. Even a writ filed against the policing agencies for unfair blocking would probably take around the same time. Also, it could well be the case that the review committee will be overborne by cases and may fall short of time to inquire into each. Therefore, it is recommended that a permanent Review Committee be set up which will monitor procedural lapses and ensure that there is no blocking in the first place before all the due procedural requirements are met. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;h2&gt;Monitoring and Collection of Traffic Data&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 69B&lt;/h3&gt;
&lt;p&gt;The section provides for monitoring of computer networks or resources if the Central Government is satisfied that conditions so mentioned are satisfied.&lt;/p&gt;
&lt;p&gt;The rules provide for the manner in which the monitoring will be done, the process by which the directions for the same will be issued and the liabilities of the intermediaries and monitoring officers with respect to confidentiality of the information so monitored.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Grounds for Monitoring &lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Rule 4&lt;/strong&gt;&lt;br /&gt;The competent authority may issue directions for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource for any or all of the following purposes related to cyber security:&lt;br /&gt;(a) forecasting of imminent cyber incidents;&lt;br /&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;br /&gt;(c) identification and determination of viruses/computer contaminant;&lt;br /&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;br /&gt;(e) tracking computer resource breaching cyber security or spreading virus/computer contaminants;&lt;br /&gt;(f) identifying or tracking of any person who has contravened, or is suspected of having contravened or being likely to contravene cyber security;&lt;br /&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource;&lt;br /&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;br /&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 6&lt;/strong&gt;&lt;br /&gt;No direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule (4).&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #7&lt;/strong&gt;&lt;br /&gt;Clauses (a), (b), (c), and (i) of Rule 4 must be repealed.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;The term “cyber incident” has not been defined, and “cyber security” has been provided a circular definition.&amp;nbsp; Rule 6 clearly states that no direction for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource shall be given for purposes other than those specified in Rule 4. Therefore, it may prima facie appear that the government is trying to lay down clear and strict safeguards when it comes to monitoring at the expense of a citizens' privacy. However, Rule 4(i) allows the government to monitor if it is satisfied that it is “any matter related to cyber security”. This may well play as a ‘catch all’ clause to legalise any kind of monitoring and collection and therefore defeats the purported intention of Rule 6 of safeguarding citizen’s interests against arbitrary and groundless intrusion of privacy. Also, the question of degree of liability of the intermediaries or persons in charge of the computer resources for leak of secret and confidential information remains unanswered. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Rule 24: Disclosure of monitored data &lt;/strong&gt;&lt;br /&gt;Any monitoring or collection of traffic data or information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, undertaken in course of his duty relating to the services provided by that intermediary, shall not be unlawful, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with :&lt;br /&gt;(vi) Accessing or analysing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #8&lt;/strong&gt;&lt;br /&gt;Safeguards must be introduced with respect to exercise of powers conferred by Rule 24(vi).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendations &lt;/strong&gt;&lt;br /&gt;Rule 24(vi) provides for access, collection and monitoring of information from a computer resource for the purposes of tracing another computer resource which has or is likely to contravened provisions of the Act and this is likely to have an adverse impact on the services provided by the intermediary. Analysis of a computer resource may reveal extremely confidential and important data, the compromise of which may cause losses worth millions. Therefore, the burden of proof for such an intrusion of privacy of the computer resource, which is first used to track another computer resource which is likely to contravene the Act, should be heavy. Also, this violation of privacy should be weighed against the benefits accruing to the intermediary. The framing of sub rules under this clearly specifying the same is recommended.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;The disclosure of sensitive information by a monitoring agency for purposes of ‘general trends’ and ‘general analysis of cyber information’ is uncalled for as it dissipates information among lesser bodies that are not governed by sufficient safeguards and this could result in outright violation of citizen’s privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Manner of Functioning of CERT-In&lt;/h2&gt;
&lt;h3&gt;Draft Rules under Section 70B(5)&lt;/h3&gt;
&lt;p&gt;Section 70B provides for an Indian Computer Emergency Response Team (CERT-In) which shall serve as a national agency for performing duties as prescribed by clause 4 of this section in accordance to the rules as prescribed.&lt;br /&gt;The rules provide for CERT-In’s authority, composition of advisory committee, constituency, functions and responsibilities, services, stakeholders, policies and procedures, modus operandi, disclosure of information and measures to deal with non compliance of orders so issued. However, there are a few issues which need to be addressed as under:&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Definitions&lt;/strong&gt;&lt;br /&gt;In these Rules, unless the context otherwise requires, “Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/ disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #9&lt;/strong&gt;&lt;br /&gt;The words ‘or implied’’ must be excluded from rule 2(g) which defines ‘cyber security incident’, and the term ‘security policy’ must be qualified to state what security policy is being referred to.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for Recommendation&lt;/strong&gt;&lt;br /&gt;“Cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicit or implied security policy resulting in unauthorized access, denial of service/disruption, unauthorized use of a computer resource for processing or storage of information or changes to data, information without authorization.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;Thus, the section defines any circumstance where an explicit or implied security policy is contravened as a ‘cyber security incident’. Without clearly stating what the security policy is, an inquiry into its contravention is against an individual’s civil rights. If an individual’s actions are to be restricted for reasons of security, then the restrictions must be expressly defined and such restrictions cannot be said to be implied.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 13(4): Disclosure of Information &lt;/strong&gt;&lt;br /&gt;Save as provided in sub-rules (1), (2), (3) of rule 13, it may be necessary or expedient to so to do, for CERT-In to disclose all relevant information to the stakeholders, in the interest of sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence relating to cognizable offence or enhancing cyber security in the country.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #10&lt;/strong&gt;&lt;br /&gt;Burden of necessity for disclosure of information should be made heavier.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;Rule 13(4) allows the disclosure of information by CERT-In in the interests of ‘enhancing cyber security’. This enhancement however needs to be weighed against the detriment caused to the individual and the burden of proof must be on the CERT-In to show that this was the only way of achieving the required.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Rule 19: Protection for actions taken in Good Faith &lt;/strong&gt;&lt;br /&gt;All actions of CERT-In and its staff acting on behalf of CERT-In are taken in good faith in fulfillment of its mandated roles and functions, in pursuance of the provisions of the Act or any rule, regulations or orders made thereunder. CERT-In and its staff acting on behalf of CERT-In shall not be held responsible for any unintended fallout of their actions.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #11&lt;/strong&gt;&lt;br /&gt;CERT-In should be made liable for their negligent action and no presumption of good faith should be as such provided for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;Rule 19 provides for the protection of CERT-In members for the actions taken in ‘good faith’. It defines such actions as ‘unintended fallouts’. Clearly, if information has been called for and the same is highly confidential, then this rule bars the remedy for any leak of the same due to the negligence of the CERT-In members. This is clearly not permissible as an agency that calls for delicate information should also be held responsible for mishandling the same, intentionally or negligently.&amp;nbsp; Good faith can be established if the need arises, and no presumption as to good faith needs to be provided.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 52&lt;/h3&gt;
&lt;p&gt;These rules, entitled the “Cyber Appellate Tribunal (Salary, Allowances and Other Terms and Conditions of Service of Chairperson and Members) Rules, 2009” are meant to prescribe the framework for the independent and smooth functioning of the Cyber Appellate Tribunal. This is so because of the specific functions entrusted to this Appellate Tribunal. Under the IT Act, 2000 as amended by the IT (Amendment) Act, 2008, this Tribunal has the power to entertain appeals against orders passed by the adjudicating officer under Section 47.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #12&lt;/strong&gt;&lt;br /&gt;Amend qualifications Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, to require judicial training and experience.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation&lt;/strong&gt;&lt;br /&gt;It is submitted that an examination of these rules governing the Appellate Tribunal cannot be made independent of the powers and qualifications of Adjudicating Officers who are the original authority to decide on contravention of provisions in the IT Act dealing with damage to computer system and failure to furnish information. Even as per the Information Technology (Qualification and Experience of Adjudicating Officers and Manner of Holding Enquiry) Rules, 2003, persons who did not possess judicial experience and training, such as those holding the post of Director in the Central Government, were qualified to perform functions under Section 46 and decide whether there has been unauthorized access to a computer system. This involves appreciation of evidence and is not a merely administrative function that could be carried on by any person who has basic knowledge of information technology.&lt;/p&gt;
&lt;p&gt;Viewed from this angle, the qualifications of the Cyber Appellate Tribunal members should have been made much tighter as per the new draft rules. The above rules when read with Section 50 of the IT Act, as amended in 2008, do not say anything about the qualification of the technical members apart from the fact that such person shall not be appointed as a Member, unless he is, or has been, in the service of the Central Government or a State Government, and has held the post of Additional Secretary or Joint Secretary or any equivalent post. Though special knowledge of, and professional experience in, information technology, telecommunication, industry, management or consumer affairs, has been prescribed in the Act as a requirement for any technical member.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Draft Rules under Section 54&lt;/h3&gt;
&lt;p&gt;These Rules do not suffer any defect and provide for a fair and reasonable enquiry in so far as allegations made against the Chairperson or the members of the Cyber Appellate Tribunal are concerned.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Penal Provisions&lt;/h2&gt;
&lt;h3&gt;Section 66A&lt;/h3&gt;
&lt;p&gt;Any person who sends, by means of a computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (a) any information that is grossly offensive or has menacing character; or&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (b) any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently by making use of such computer resource or a communication device,&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; (c) any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages,&lt;br /&gt;shall be punishable with imprisonment for a term which may extend to three years and with fine.&lt;br /&gt;Sec. 32 of the 2008 Act inserts Sec. 66A which provides for penal measures for mala fide use of electronic resources to send information detrimental to the receiver. For the section to be attracted the ‘information’ needs to be grossly offensive, menacing, etc. and the sender needs to have known it to be false.&lt;/p&gt;
&lt;p&gt;While the intention of the section – to prevent activities such as spam-sending – might be sound and even desirable, there is still a strong argument to be made that words is submitted that the use of words such as ‘annoyance’ and ‘inconvenience’ (in s.66A(c)) are highly problematic.&amp;nbsp; Further, something can be grossly offensive without touching upon any of the conditions laid down in Article 19(2).&amp;nbsp; Without satisfying the conditions of Article 19(2), this provision would be ultra vires the Constitution.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #13&lt;/strong&gt;&lt;br /&gt;The section should be amended and words which lead to ambiguity must be excluded.&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;A clearer phrasing as to what exactly could convey ‘ill will’ or cause annoyance in the electronic forms needs to be clarified. It is possible in some electronic forms for the receiver to know the content of the information. In such circumstances, if such a possibility is ignored and annoyance does occur, is the sender still liable? Keeping in mind the complexity of use of electronic modes of transmitting information, it can be said that several such conditions arise which the section has vaguely covered. Therefore, a stricter and more clinical approach is necessary.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #14&lt;/strong&gt;&lt;br /&gt;A proviso should be inserted to this section providing for specific exceptions to the offence contained in this section for reasons such as fair comment, truth, criticism of actions of public officials etc.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The major problem with Section 66A lies in clause (c) as per which any electronic mail or electronic mail message sent with the purpose of causing annoyance or inconvenience is covered within the ambit of offensive messages. This does not pay heed to the fact that even a valid and true criticism of the actions of an individual, when brought to his notice, can amount to annoyance. Indeed, it may be brought to his attention with the sole purpose of causing annoyance to him. When interpreting the Information Technology Act, it is to be kept in mind that the offences created under this Act should not go beyond those prescribed in the Indian Penal Code except where there is a wholly new activity or conduct, such as hacking for instance, which is sought to be criminalized.&lt;/p&gt;
&lt;p&gt;Offensive messages have been criminalized in the Indian Penal Code subject to the conditions specified in Chapter XXII being present. It is not an offence to verbally insult or annoy someone without anything more being done such as a threat to commit an offence, etc. When this is the case with verbal communications, there is no reason to make an exception for those made through the electronic medium and bring any electronic mail or message sent with the purpose of causing annoyance or inconvenience within the purview of an offensive message.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Section 66F&lt;/h3&gt;
&lt;p&gt;The definition of cyber-terrorism under this provision is too wide and can cover several activities which are not actually of a “terrorist” character. &lt;br /&gt;Section 66F(1)(B) is particularly harsh and goes much beyond acts of “terrorism” to include various other activities within its purview. As per this provision, &lt;br /&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, or any restricted information, data or computer database, with reasons to believe that such information, data or computer database so obtained may be used to cause or is likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of individuals or otherwise, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p&gt;This provision suffers from several defects and hence ought to be repealed.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;strong&gt;Recommendation #15&lt;/strong&gt;&lt;br /&gt;Section 66F(1)(B) has to be repealed or suitably amended to water down the excessively harsh operation of this provision. The restrictive nature of the information that is unauthorisedly accessed must be confined to those that are restricted on grounds of security of the State or foreign relations. The use to which such information may be put should again be confined to injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mere advantage to a foreign nation cannot render the act of unauthorized access one of cyber-terrorism as long as such advantage is not injurious or harmful in any manner to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order. A mens rea requirement should also be introduced whereby mere knowledge that the information which is unauthorisedly accessed can be put to such uses as given in this provision should not suffice for the unauthorised access to amount to cyber-terrorism. The unauthorised access should be with the intention to put such information to this use. The amended provision would read as follows:&lt;/p&gt;
&lt;p class="callout"&gt;“[w]hoever knowingly or intentionally penetrates or accesses a computer resource without authorisation or exceeding authorised access, and by means of such conduct obtains access to information, data or computer database that is restricted for reasons for the security of the State or foreign relations, with the intention that such information, data or computer database so obtained may be used to cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, or public order, commits the offence of cyber terrorism.”&lt;/p&gt;
&lt;p class="callout"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reasons for the Recommendation &lt;/strong&gt;&lt;br /&gt;The ambit of this provision goes much beyond information, data or computer database which is restricted only on grounds of security of the State or foreign relations and extends to “any restricted information, data or computer database”. This expression covers any government file which is marked as confidential or saved in a computer used exclusively by the government. It also covers any file saved in a computer exclusively used by a private corporation or enterprise. Even the use to which such information can be put need not be confined to those that cause or are likely to cause injury to the interests of the sovereignty and integrity of India, the security of the State, or friendly relations with foreign States. Information or data which is defamatory, amounting to contempt of court, or against decency / morality, are all covered within the scope of this provision. This goes way beyond the idea of a terrorist activity and poses serious questions.&amp;nbsp; While there is no one globally accepted definition of cyberterrorism, it is tough to conceive of slander as a terrorist activity.&lt;/p&gt;
&lt;p&gt;To give an illustration, if a journalist managed to unauthorisedly break into a restricted database, even one owned by a private corporation, and stumbled upon information that is defamatory in character, he would have committed an act of “cyber-terrorism.” Various kinds of information pertaining to corruption in the judiciary may be precluded from being unauthorisedly accessed on the ground that such information may be put to use for committing contempt of court. Any person who gains such access would again qualify as a cyber-terrorist. The factual situations are numerous where this provision can be put to gross misuse with the ulterior motive of muzzling dissent or freezing access to information that may be restricted in nature but nonetheless have a bearing on probity in public life etc. It is therefore imperative that this provision may be toned down as recommended above. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-draft-rules'&gt;https://cis-india.org/internet-governance/blog/comments-draft-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Encryption</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-09-21T06:13:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-act-and-commerce">
    <title>IT Act and Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/it-act-and-commerce</link>
    <description>
        &lt;b&gt;This is a guest post by Rahul Matthan, partner in the law firm Trilegal, and widely regarded as one of the leading experts on information technology law in India.  In this post, Mr. Matthan looks at the provisions in the amended Information Technology Act of interest to commerce, namely electronic signatures and data protection.&lt;/b&gt;
        
&lt;p&gt;This post analyses the amendments brought about to the Information Technology Act, 2000 (“IT Act 2000”) through the recent 2008 amendments (“IT Act 2008”).&lt;/p&gt;
&lt;h2&gt;Definitions&lt;/h2&gt;
&lt;p&gt;The IT Act 2008 has introduced a few additional definitions to the list of definitions originally included in the IT Act 2000. These definitions have either amplified the existing provisions or been introduced in order to address new issues required to be defined in the context of the newly introduced provisions in the statute. Some of the significant definitions have been discussed below:&lt;/p&gt;
&lt;h3&gt;Computer Network&lt;/h3&gt;
&lt;p&gt;The definition of “computer network” has been amended to specifically include the wireless interconnection of computers. While wireless technology did fall within the scope of the IT Act under the rather generic head of “other communication media”, the Amendment Act clarifies the scope of the IT Act by expressly including the term “wireless”.&lt;/p&gt;
&lt;h3&gt;Communication Devices&lt;/h3&gt;
&lt;p&gt;The IT Amendment Bill, 2006, had provided an explanation for “communication devices” under Section 66A. This definition has been moved into the definition section and now applies across all sections of the IT Act 2008. “Communication devices” is defined to mean “a cell phone, personal digital assistance (PDA) device or combination of both or any device used to communicate, send or transmit any text, video, audio or image”.&lt;/p&gt;
&lt;p&gt;There has been case law even under the IT Act that has held mobile phones to fall within the ambit of the IT Act, as a result of which all the provisions of the Act that apply to computers are equally applicable to mobile phones. This amendment only makes that position more explicit.&lt;/p&gt;
&lt;h2&gt;Electronic Signatures&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;One of the major criticisms of the IT Act 2000 was the fact that it was not a technology neutral legislation. This was specifically so in relation to the provisions in the IT Act 2000 relating to the use of digital signatures for the purpose of authentication of electronic records. The statute made specific reference to the use of asymmetric cryptosystem technologies in the context of digital signatures, and, in effect, any authentication method that did not use this technology was not recognised under the IT Act 2000.&lt;/p&gt;
&lt;p&gt;The IT Act 2008 has attempted to make this more technology neutral. In doing so, the attempt has been to bring the law in line with the United Nations Commission on International Trade Law Model Law on Electronic Signatures (“Model Law”).&lt;/p&gt;
&lt;h3&gt;Replacement of Digital Signatures&lt;/h3&gt;
&lt;p&gt;The first significant change in the IT Act 2008 is the replacement of the term “digital signatures” with “electronic signatures” in almost all the provisions in the IT Act 2000. In some provisions, reference continues to be made to digital signatures, but the net effect of the amendments is to treat digital signatures as a subset (or an example of one type) of electronic signatures.&lt;/p&gt;
&lt;p&gt;Electronic signatures have been defined as the authentication of an electronic record using the authentication techniques specified in the 2nd Schedule to the Act, provided they are reliable. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The reliability criterion has been introduced, very much along the lines of the Model Law. However, the contents of the 2nd Schedule are yet to be stipulated, which means that despite the existence of a reliability standard, the only authentication method available at this point in time is the digital signature regime.&lt;/p&gt;
&lt;h3&gt;Dual Requirement&lt;/h3&gt;
&lt;p&gt;One significant implication of this amendment is the introduction of a dual requirement – to meet the reliability standard as well as to be included in the 2nd Schedule. However, structuring the authentication procedures in this manner offsets the objective tests of neutrality borrowed from the Model Law, since an authentication method may meet the reliability test but will not be deemed to be legally enforceable unless it is notified in the 2nd Schedule.&lt;/p&gt;
&lt;p&gt;Additionally, there will be grounds for challenging electronic signatures that are notified to the 2nd Schedule, if it can be shown that the signature so notified is not reliable under the terms of the reliability criteria. This can act as an impediment to the recognition of electronic signatures by notification.&lt;/p&gt;
&lt;h3&gt;Emphasis on Digital Signatures&lt;/h3&gt;
&lt;p&gt;Another concern is the treatment of digital signatures in the post amendment statute. The IT Act 2008 continues to retain all the provisions relating to digital signatures within the main body of the statute. The term “digital signature” has not been uniformly substituted with “electronic signature” throughout the statute. In certain provisions this leads to a certain amount of absurdity, such as in those relating to representations made as to the issuance, suspension or revocation of digital signature certificates; due to the lack of uniformity, these principles now apply only to digital signatures and not to all types of electronic signatures. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;It would have been preferable if the provisions relating to digital signatures had been moved in their entirety to the 2nd Schedule. Then, digital signatures would have become just another class of electronic signatures listed in the Schedule. By omitting to do this, the authors ensure that digital signature-specific provisions remaining in the main body of the statute challenge the technology neutrality of the statute.&lt;/p&gt;
&lt;h3&gt;Certifying Authorities&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 has made the certifying authority the repository of all electronic signatures issued under the statute. Given that there are, at present, multiple certifying authorities, this provision is impractical. Instead, the statute should have either referred to the Controller of Certifying Authorities or should have been worded to state that each certifying authority would be the repository for all electronic signature certificates issued by it.&lt;/p&gt;
&lt;h3&gt;Impact on Other Statutes&lt;/h3&gt;
&lt;p&gt;Since the enactment of the IT Act 2000, amendments have been carried out in other statutes, relying on the concept of digital signatures. For instance, the Negotiable Instruments Act, 1881, makes the use of a digital signature essential for an electronic cheque.1 While the IT Act 2008 has expanded the scope of the available authentication measures, by introducing the technologically neutral concept of electronic signatures, corresponding amendments in other statutes like the Negotiable Instruments Act, 1881, will need to be carried out, so that they are not limited in their application to digital signatures.&lt;/p&gt;
&lt;h2&gt;Data Protection&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Prior to the passing of the IT Act 2008, the concept of 'data protection' was not recognised in India. The amendments have now introduced some amount of legal protection for data stored in the electronic medium. This chapter analyses the changes sought to be introduced and their impact on data protection law in India.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2000&lt;/h3&gt;
&lt;p&gt;The only provision under the IT Act 2000, which dealt with unauthorised access and damage to data, was Section 43. Under that section, penalties were prescribed in respect of any person who downloads copies or extracts data from a computer system, introduces computer contaminants or computer viruses into a computer system or damages any data residing in a computer system.&lt;/p&gt;
&lt;h3&gt;Data under the IT Act 2008&lt;/h3&gt;
&lt;p&gt;Under the IT Act 2008, far-reaching changes have been made in relation to data. Two sections have been inserted specifically for that purpose – Sections 43-A and 72-A, one dealing with the civil and the other with the criminal remedies in relation to the breach of data related obligations.&lt;/p&gt;
&lt;h3&gt;The Civil Remedies for Data Protection&lt;/h3&gt;
&lt;p&gt;The newly introduced Section 43-A reads as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Compensation for failure to protect data - Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation, to the person so affected.&lt;/p&gt;
&lt;p&gt; Explanation - For the purposes of this section:&lt;/p&gt;
&lt;p&gt; (i)&amp;nbsp; “Body Corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/p&gt;
&lt;p&gt;(ii) “Reasonable Security Practices and Procedures” means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit; and&lt;/p&gt;
&lt;p&gt;(iii)&amp;nbsp; “Sensitive Personal Data or Information” means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While at first this provision appears to address several long standing concerns relating to data protection in India, there are several insidious flaws that could affect the development of a data protection jurisprudence in the country.&lt;/p&gt;
&lt;h3&gt;Non-Electronic Data&lt;/h3&gt;
&lt;p&gt;In the first instance, there is no mention, under this provision, of non-electronic data. Most international data protection statutes recognise and protect data stored in any electronic medium or a relevant filing system (including, for instance, a salesperson's diary). The newly introduced provisions of the IT Act 2008 do not provide any protection for data stored in a non-electronic medium.&lt;/p&gt;
&lt;p&gt;It could be argued that given the legislative focus of this statute (it has been called the Information Technology Act with a reason), it would be inappropriate to include within this statute protection for forms of data that do not relate to the digital or electronic medium. While that argument is valid to many who look to the new provisions introduced in the IT Act 2008 as the answer to the data protection concerns that the country has been facing all these years, their enthusiasm must be tempered as these new provisions merely provide solutions for electronic data.&lt;/p&gt;
&lt;h3&gt;Classification of Data&lt;/h3&gt;
&lt;p&gt;Most international data protection statutes distinguish between different levels of personal data – specifying difference levels of protection for personal information and sensitive personal information. Depending on whether the data can be classified as one or the other, they have different levels of protection, as loss, unauthorised access or disclosure of sensitive personal information is considered to have a deeper impact on the data subject. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;The new provisions of the IT Act 2008 make no such distinction. Section 43-A applies to all “sensitive personal data or information” but does not specify how personal data not deemed to be sensitive is to be treated. In essence, personal information and sensitive personal information do not appear to be differentially treated in the context of data protection.&lt;/p&gt;
&lt;h3&gt;Consequences&lt;/h3&gt;
&lt;p&gt;Under most international data protection statutes, the person in “control” of the data is liable for the consequences of disclosure, loss or unauthorised access to such information. This ensures that liability is restricted to those who actually have the ability to control the manner in which the data is treated. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, under the new provisions of the IT Act 2008, the mere possession of information and its subsequent misuse would render any person who possesses this data liable to damages. While there is likely to be a debate on what constitutes possession and how this differs from control, there can be little doubt that by referring to “possession” in addition to “operation” and “control”, the IT Act 2008 appears to have widened the net considerably.&lt;/p&gt;
&lt;h3&gt;Negligence in Implementing Security Practices&lt;/h3&gt;
&lt;p&gt;Section 43-A specifically places liability on a body corporate only if such body corporate has been negligent in implementing its security practices and procedures in relation to the data possessed, controlled or handled by it. The choice of language here is significant. The statute specifically refers to the term “negligence” in relation to the security practices and procedures as opposed to stipulating a clear, pass-fail type obligation to conform.&lt;/p&gt;
&lt;p&gt;There is a significant difference between the terms “negligence to implement” and “failure to implement”. The former can only result in a breach if the body corporate that was required to follow reasonable security practices with regard to the data in its possession or control does not perform the required action and it can be proved that a reasonable man in the same circumstances would have performed the required action. If a body corporate is to be made liable under the provisions of this Section, it is not enough to demonstrate that security procedures were not followed; it has to be proved in addition that the body corporate was negligent.&lt;/p&gt;
&lt;h3&gt;Wrongful Loss and Gain&lt;/h3&gt;
&lt;p&gt;The Section appears to have been constructed on the basis that a breach has occurred in the event that any “wrongful gain” or “wrongful loss” was suffered. These terms have not been defined either under statutes or through any judicial precedents in the civil context. However, these terms do have a definition under criminal law in India. The Indian Penal Code, 1860 (“IPC”), defines “Wrongful Gain” to mean gain, by unlawful means, of property to which the person gaining is not legally entitled; and “Wrongful Loss” to mean the loss by unlawful means of property to which the person losing it is legally entitled.&lt;/p&gt;
&lt;p&gt;There does not appear to be any greater significance in the use of these terms even though they are typically found in criminal statutes. Therefore, apart from the slight ambiguity as to purpose, their use in the IT Act does not appear to have any great significance.&lt;/p&gt;
&lt;h3&gt;Limitation on Liability&lt;/h3&gt;
&lt;p&gt;The provisions of Section 43 originally had the total liability for a breach capped at Rs. 5,00,00,000 (five crore rupees). The original text of Section 43-A had the same limitation of liability in respect of its data protection provisions. Before the bill was passed into law, this limitation was removed and now a breach of Section 43-A is not subject to any limitation of liabilities.&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices and Procedures&lt;/h3&gt;
&lt;p&gt;Section 43-A makes a reference to “reasonable security practices and procedures” and stipulates that a breach has been caused only if such practices and procedures have not been followed. There are three methods by which reasonable security practices and procedures can be established:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt; By agreement;&lt;/li&gt;&lt;li&gt;By law; and&lt;/li&gt;&lt;li&gt;By prescription by the Central Government.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;br /&gt;As there is no law in India which sets out an appropriate definition for the term and since it will be some time before which the Central Government comes out with necessary regulations, it would appear that the only option available is for the parties to arrive at an agreement as to how the sensitive personal data and information exchanged under their contract is to be handled.&lt;/p&gt;
&lt;p&gt;As a corollary, till such time as the government establishes the necessary rules in relation to these security practices and procedures, if a body corporate does not enter into an agreement with the person providing the information as to the reasonable security practices and procedures that would apply, the body corporate cannot be brought within the purview of this section for any loss or damage to data.&lt;/p&gt;
&lt;h3&gt;The Criminal Remedies for Unlawful Disclosure of Information&lt;/h3&gt;
&lt;p&gt;In addition to the civil remedies spelled out in such detail in Section 43-A, the newly introduced provisions of Section 72-A of the IT Act 2008 could be used to impose criminal sanctions against any person who discloses information in breach of a contract for services. While not exactly a data protection provision in the same way that Section 43-A is, there are enough similarities in purpose to achieve the same result.&lt;/p&gt;
&lt;p&gt;Section 72-A reads:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt; Punishment for Disclosure of information in breach of lawful contract - Save as otherwise provided in this Act or any other law for the time being in force, any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses, without the consent of the person concerned, or in breach of a lawful contract, such&amp;nbsp; material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rupees five lakh, or with both.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In substance, this provision appears to be focused on providing criminal remedies in the context of breach of confidentiality obligations under service contracts; given that the section specifically refers to the disclosure of personal information obtained under that service contract, it is fair to classify this as a provision that addresses data protection issues.&lt;/p&gt;
&lt;h3&gt;Personal Information&lt;/h3&gt;
&lt;p&gt;The IT Act 2008 does not define “personal information”. Equally, there are no judicial precedents that provide any clarity on the term. The Right to Information Act, 2005 does provide a definition for “personal information”, but that definition is inappropriate in the context of the IT Act 2008. In the absence of a useable definition for the term “personal information”, it becomes difficult to assess the scope and ambit of the provision and in particular to understand the extent to which it is enforceable.&lt;/p&gt;
&lt;h3&gt;"Willful"&lt;/h3&gt;
&lt;p&gt;The section would only apply to persons who willfully disclose personal information and cause wrongful loss or gain. Hence, in order to make a person liable it has to be proved that the person disclosing the personal information did so with an intention to cause wrongful loss or gain. It would be a valid defense to claim that any loss caused was unintentional.&lt;/p&gt;
&lt;h3&gt;Service Contracts&lt;/h3&gt;
&lt;p&gt;The section appears to be particular about the fact that it only applies in the context of personal information obtained under a contract for services. This appears to rule out confidential information (that is not of a personal nature) that has been received under any other form of agreement (including, for example, a technology license agreement). The section is clearly intended to protect against the misuse of personal information and cannot be adapted to provide a wider level of protection against all breaches of confidential information. That said, employers now have a much stronger weapon against employees who leave with the personal records of other fellow employees.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;This section also clearly applies only to those disclosures of personal information with the intent to cause wrongful loss or gain which have taken place without the consent of the person whose personal information is being disclosed. What remains to be seen is how the law will deal with situations where a general consent for disclosures has been obtained at the time of recruitment.&lt;/p&gt;
&lt;p&gt;Such clauses are made effective around the world by including opt in and opt out clauses, to allow the employee to either expressly agree to the disclosure of his personal information or to specifically exclude himself from the ambit of any such disclosures.&lt;/p&gt;
&lt;h3&gt;Media of Material&lt;/h3&gt;
&lt;p&gt;This section, unlike several other provisions of the IT Act 2008, deals with all manner of materials without requiring them to be digital. However, while disclosure of information stored in the non-electronic medium has been recognised, in the absence of a clear definition of personal information, it is difficult to ascertain the application and enforcement of this section.&lt;/p&gt;
&lt;h3&gt;What’s Missing&lt;/h3&gt;
&lt;p&gt;In order to be a truly effective data protection statute, the IT Act 2008 must include provisions relating to the collection, circumstances of collection, control, utilisation and proper disposal of data. At present the statute is silent about these aspects. In many ways, the statute addresses the particular concerns of companies or corporate entities looking for protection in relation to data outsourced to any other corporate entity for processing. Within these specific parameters the statute works well. However it does little to protect the average citizen of the country from the theft of personal data. Until we have statutory recognition of these issues, we will not be able to say that we have an effective data protection law in India.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-act-and-commerce'&gt;https://cis-india.org/internet-governance/blog/it-act-and-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Authentication</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    

   <dc:date>2011-08-02T07:41:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/primer-it-act">
    <title>Primer on the New IT Act</title>
    <link>https://cis-india.org/internet-governance/blog/primer-it-act</link>
    <description>
        &lt;b&gt;With this draft information bulletin, we briefly discuss some of the problems with the Information Technology Act, and invite your comments.&lt;/b&gt;
        
&lt;p align="justify"&gt;The latest amendments to
the Information Technology Act 2000, passed in December 2008 by the
Lok Sabha, and the draft rules framed under it contain several provisions
that can be abused and misused to infringe seriously on citizens'
fundamental rights and basic civil liberties. We have already &lt;a href="https://cis-india.org/internet-governance/it-act/short-note-on-amendment-act-2008" class="internal-link" title="Short note on IT Amendment Act, 2008"&gt;written about some of the problems&lt;/a&gt; with this Act earlier.&amp;nbsp; With this information bulletin, drafted by Chennai-based advocate Ananth Padmanabhan, we wish to extend that analysis into the form of a citizens' dialogue highlighting ways in which the Act and the rules under it fail.&amp;nbsp; Thus, we invite your comments, suggestions, and queries, as this is very much a work in progress.&amp;nbsp; We will eventually consolidate this dialogue and follow up with the government on the concerns of its citizens.&lt;/p&gt;
&lt;h3 align="justify"&gt;Intermediaries
beware&lt;/h3&gt;
&lt;p align="justify"&gt;Internet service
providers, webhosting service providers, search engines, online
payment sites, online auction sites, online market places, and cyber
cafes are all examples of “intermediaries” under this Act. The
Government can force any of these intermediaries to cooperate with
any interception, monitoring or decryption of data by stating broad
and ambiguous reasons such as the “interest of the sovereignty or
integrity of India”, “defence of India”, “security of the
State”, “friendly relations with foreign States”, “public
order” or for “preventing incitement to” or “investigating”
the commission of offences related to those. This power can be abused
to infringe on the privacy of intermediaries as well as to hamper
their constitutional right to conduct their business without interference.&lt;/p&gt;
&lt;p align="justify"&gt;If a Google search on
“Osama Bin Laden” throws up an article that claims to have
discovered his place of hiding, the Government of India can issue a
direction authorizing the police to monitor Google’s servers to
find the source of this information. While Google can, of course,
establish that this information cannot be attributed directly to the
organization, making the search unwarranted, that would not help it
much.  While section 69 grants the government these wide-ranging
powers, it does not provide for adequate safeguards in the form of having to show due cause or having an in-built right of appeal against a decision by the government. If Google refused
to cooperate under such circumstances, its directors would be liable
to imprisonment of up to seven years.&lt;/p&gt;
&lt;h3 align="justify"&gt;Pre-censorship&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The State has been given
unbridled power to block access to websites as long as such blocking
is deemed to be in the interest of sovereignty and integrity of
India, defence of India, security of the State, friendly relations
with foreign States, and other such matters.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, if a web portal or
blog carries or expresses views critical of the Indo-US nuclear deal,
the government can block access to the website and thus muzzle criticism
of its policies.&amp;nbsp;&amp;nbsp; While some may find that suggestion outlandish, it is very much possible under the Act.&amp;nbsp; Since there is no right to be heard before your website is taken down nor is there an in-built mechanism for the website owner to appeal, the decisions made by the government cannot be questioned unless you are prepared to undertake a costly legal battle.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Again, if an intermediary (like Blogspot or an ISP like Airtel) refuses to cooperate, its directors may be personally liable to imprisonment for up to a period of seven years.&amp;nbsp; Thus, being personally liable, the intermediaries are rid of any incentive to stand up for the freedom of speech and expression.&lt;/p&gt;
&lt;h3 align="justify"&gt;We need to monitor your computer: you have a virus&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The government has been
vested with the power to authorize the monitoring and collection of
traffic data and information generated, transmitted, received or
stored in any computer resource.  This provision is much too
widely-worded.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;For instance, if the
government feels that there is a virus on your computer that can
spread to another computer, it can demand access to monitor your
e-mails on the ground that such monitoring enhances “cyber
security” and prevents “the spread of computer contaminants”.&lt;/p&gt;
&lt;h3 align="justify"&gt;Think before you click "Send"&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;If out of anger you send
an e-mail for the purpose of causing “annoyance” or
“inconvenience”, you may be liable for imprisonment up to three
years along with a fine.  While that provision (section 66A(c)) was
meant to combat spam and phishing attacks, it criminalizes much more
than it should.&lt;/p&gt;
&lt;h3 align="justify"&gt;A new brand of "cyber terrorists" &lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;The new offence of “cyber
terrorism” has been introduced, which is so badly worded that it
borders on the ludicrous.&amp;nbsp; If a journalist gains
unauthorized access to a computer where information regarding
corruption by certain members of the judiciary is stored, she becomes
a “cyber terrorist” as the information may be used to cause
contempt of court.&amp;nbsp; There is no precedent for any such definition of cyberterrorism.&amp;nbsp; It is unclear what definition of terrorism the government is going by when even unauthorized access to defamatory material is considered cyberterrorism.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/primer-it-act'&gt;https://cis-india.org/internet-governance/blog/primer-it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-08-02T07:41:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008">
    <title>Short note on IT Amendment Act, 2008</title>
    <link>https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008</link>
    <description>
        &lt;b&gt;Pranesh Prakash of the Centre for Internet and Society wrote a short note in February 2009 on the Information Technology (Amendment) Act, 2008.  This is being posted as a precursor to a more exhaustive analysis of the Act and the rules sought to be promulgated under the Act.  Thus, this does not cover the regulations that have been drafted under the Act.&lt;/b&gt;
        
&lt;p&gt;The new amendments to the Information Technology Act, 2000 that got passed by the Lok Sabha last December deserve a careful reading. There are a number of positive developments, as well as many which dismay. Positively, they signal an attempt by the government to create a dynamic policy that is technology neutral. This is exemplified by its embracing the idea of electronic signatures as opposed to digital signatures. But more could have been done on this front (for instance, section 76 of the Act still talks of floppy disks). There have also been attempts to deal proactively with the many new challenges that the Internet poses.&lt;/p&gt;
&lt;h2&gt;Freedom of Expression&lt;/h2&gt;
&lt;p&gt;The first amongst these challenges is that of child pornography. It is heartening to see that the section on child pornography (s.67B) has been drafted with some degree of care. It talks only of sexualized representations of actual children, and does not include fantasy play-acting by adults, etc. From a plain reading of the section, it is unclear whether drawings depicting children will also be deemed an offence under the section. Unfortunately, the section covers everyone who performs the conducts outlined in the section, including minors. A slight awkwardness is created by the age of "children" being defined in the explanation to section 67B as older than the age of sexual consent. So a person who is capable of having sex legally may not record such activity (even for private purposes) until he or she turns eighteen.&lt;/p&gt;
&lt;p&gt;Another problem is that the word "transmit" has only been defined for section 66E. The phrase "causes to be transmitted" is used in section 67, 67A, and 67B. That phrase, on the face of it, would include the recipient who initiates a transmission along with the person from whose server the data is sent. While in India, traditionally the person charged with obscenity is the person who produces and distributes the obscene material, and not the consumer of such material. This new amendment might prove to be a change in that position.&lt;/p&gt;
&lt;p&gt;Section 66A which punishes persons for sending offensive messages is overly broad, and is patently in violation of Art. 19(1)(a) of our Constitution. The fact that some information is "grossly offensive" (s.66A(a)) or that it causes "annoyance" or "inconvenience" while being known to be false (s.66A(c)) cannot be a reasons for curbing the freedom of speech unless it is directly related to decency or morality, public order, or defamation (or any of the four other grounds listed in Art. 19(2)). It must be stated here that many argue that John Stuart Mill's harm principle provides a better framework for freedom of expression than Joel Feinberg's offence principle. The latter part of s.66A(c), which talks of deception, is sufficient to combat spam and phishing, and hence the first half, talking of annoyance or inconvenience is not required. Additionally, it would be beneficial if an explanation could be added to s.66A(c) to make clear what "origin" means in that section. Because depending on the construction of that word s.66A(c) can, for instance, unintentionally prevent organisations from using proxy servers, and may prevent a person from using a sender envelope different form the "from" address in an e-mail (a feature that many e-mail providers like Gmail implement to allow people to send mails from their work account while being logged in to their personal account). Furthermore, it may also prevent remailers, tunnelling, and other forms of ensuring anonymity online. This doesn't seem to be what is intended by the legislature, but the section might end up having that effect. This should hence be clarified.&lt;/p&gt;
&lt;p&gt;Section 69A grants powers to the Central Government to "issue directions for blocking of public access to any information through any computer resource". In English, that would mean that it allows the government to block any website. While necessity or expediency in terms of certain restricted interests are specified, no guidelines have been specified. Those guidelines, per s.69A(2), "shall be such as may be prescribed". It has to be ensured that they are prescribed first, before any powers of censorship are granted to any body. In India, it is clear that any law that gives unguided discretion on an administrative authority to exercise censorship is unreasonable (&lt;em&gt;In re Venugopa&lt;/em&gt;l, AIR 1954 Mad 901).&lt;/p&gt;
&lt;h2&gt;Intermediary Liability&lt;/h2&gt;
&lt;p&gt;The amendment to the provision on intermediary liability (s.79) while a change in the positive direction, as is seeks to make only the actual violators of the law liable for the offences committed, still isn't wide enough. This exemption is required to be widely worded to encourage innovation and to allow for corporate and public initiatives for sharing of content, including via peer-to-peer technologies.&lt;/p&gt;
&lt;p&gt;Firstly, the requirement of taking down content upon receiving "actual knowledge" is much too heavy a burden for intermediaries. Such a requirement forces the intermediary to make decisions rather than the appropriate authority (which often is the judiciary). The intermediary is no position to decide whether a Gauguin painting of Tahitian women is obscene or not, since that requires judicial application of mind. Secondly, that requirement is vitiates the principles of natural justice and freedom of expression because it allows a communication and news medium to be gagged without giving it, or the party communicating through it, any due hearing. It has been held by our courts that a restriction that does not provide the affected persons a right to be heard is procedurally unreasonable (&lt;em&gt;Virendra v. State of Punjab&lt;/em&gt;, AIR 1957 SC 896).&lt;/p&gt;
&lt;p&gt; The intermediary loses protection of the act if (a) it initiates the transmission; (b) selects the receiver of the transmission; and (c) selects or modifies the information. While the first two are required to be classified as true "intermediaries", the third requirement is a bit too widely worded. For instance, an intermediary might automatically inject advertisements in all transmissions, but that modification does not go to the heart of the transmission, or make it responsible for the transmission in any way. Similarly, the intermediary may have a code of conduct, and may regulate transmissions with regard to explicit language (which is easy to judge), but would not have the capability to make judgments regarding fair use of copyrighted materials. So that kind of "selection" should not render the intermediary liable, since misuse of copyright might well be against the intermediary's terms and conditions of use.&lt;/p&gt;
&lt;h2&gt;Privacy and Surveillance&lt;/h2&gt;
&lt;p&gt;While the threat of cyber-terrorism might be very real, blanket monitoring of traffic is not the way forward to get results, and is sure to prove counter-productive. It is much easy to find a needle in a small bale of hay rather than in a haystack. Thus, it must be ensured that until the procedures and safeguards mentioned in sub-sections 69(2) and 69B(2) are drafted before the powers granted by those sections are exercised. Small-scale and targetted monitoring of metadata (called "traffic data" in the Bill) is a much more suitable solution, that will actually lead to results, instead of getting information overload through unchannelled monitoring of large quantities of data. If such safeguards aren't in place, then the powers might be of suspect constitutionality because of lack of guided exercise of those powers.&lt;/p&gt;
&lt;p&gt;Very importantly, the government must also follow up on these powers by being transparent about the kinds of monitoring that it does to ensure that the civil and human rights guaranteed by our Constitution are upheld at all times.&lt;/p&gt;
&lt;h3&gt;Encryption&lt;/h3&gt;
&lt;p&gt;The amending bill does not really bring about much of a change with respect to encryption, except for expanding the scope of the government's power to order decryption.&amp;nbsp; While earlier, under section 69, the Controller had powers to order decryption for certain purposes and order 'subscribers' to aid in doing so (with a sentence of up to seven years upon non-compliance), now the government may even call upon intermediaries to help it with decryption (s.69(3)). Additionally, s.118 of the Indian Penal Code has been amended to recognize the use of
encryption as a possible means of concealment of a 'design to
commit [an] offence punishable with death or imprisonment for life'.&lt;/p&gt;
&lt;p&gt;The government already controls the strength of permissible encryption by way of the Internet Service Provider licences, and now has explicitly been granted the power to do so by s.84A of the Act.&amp;nbsp; However, the government may only prescribe the modes or methods of encryption "for secure use of the electronic medium and for promotion of e-governance and e-commerce".&amp;nbsp; Thus, it is possible to read that as effectively rendering nugatory the government's efforts to restrict the strength of encryption to 40-bit keys (for symmetric encryption).&lt;/p&gt;
&lt;h2&gt;Other Penal Provisions&lt;/h2&gt;
&lt;p&gt;Section 66F(1)(B), defining "cyberterrorism" is much too wide, and includes unauthorised access to information on a computer with a belief that that information may be used to cause injury to decency or morality or defamation, even. While there is no one globally accepted definition of cyberterrorism, it is tough to conceive of slander as a terrorist activity.&lt;/p&gt;
&lt;p&gt;Another overly broad provision is s.43, which talks of "diminish[ing] its value or utility" while referring information residing on a computer, is overly broad and is not guided by the statute. Diminishing of the value of information residing on a computer could be done by a number of different acts, even copying of unpublished data by a conscientious whistleblower might, for instance, fall under this clause. While the statutory interpretation principle of &lt;em&gt;noscitur a socii&lt;/em&gt; (that the word must be understood by the company it keeps) might be sought to be applied, in this case that doesn't give much direction either.&lt;/p&gt;
&lt;p&gt;While all offences carrying penalties above three years imprisonment have been made cognizable, they have also been made bailable and lesser offences have been made compoundable. This is a desirable amendment, especially given the very realistic possibility of incorrect imprisonments (Airtel case, for instance), and frivolous cases that are being registered (Orkut obscenity cases).&lt;/p&gt;
&lt;p&gt;Cheating by personation is not defined, and it is not clear whether it refers to cheating as referred to under the Indian Penal Code as conducted by communication devices, or whether it is creating a new category of offence. In the latter case, it is not at all clear whether a restricted meaning will be given to those words by the court such that only cases of phishing are penalised, or whether other forms of anonymous communications or other kinds of disputes in virtual worlds (like Second Life) will be brought under the meaning of "personation" and "cheating".&lt;/p&gt;
&lt;p&gt;While it must be remembered that more law is not always an answer to dealing with problems, whether online or otherwise, it is good to note that the government has sought to address the newer problems that have arisen due to newer technologies. But equally important is the requirement to train both the judiciary and the law enforcement personnel to minimize the possibility of innocent citizens being harassed.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008'&gt;https://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-06-01T14:45:34Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/publications/it-act">
    <title>Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/publications/it-act</link>
    <description>
        &lt;b&gt;The Information Technology Act, 2000 (amended in 2008) is the main statute that governs online behaviour in India, from e-commerce to cybercrimes, Internet surveillance, and intermediary liability.  Thus, understanding that statute is of paramount interest to all Indian 'netizens'.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/publications/it-act'&gt;https://cis-india.org/internet-governance/publications/it-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2009-06-15T12:12:00Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/software-patenting-will-harm-industry-consumer">
    <title>Software patenting will harm industry, consumer</title>
    <link>https://cis-india.org/news/software-patenting-will-harm-industry-consumer</link>
    <description>
        &lt;b&gt;Report by Deepa Kurup in The Hindu dated 5th October 2008 as follow-up to the national meeting on software patents.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.hindu.com/2008/10/05/stories/2008100559810400.htm"&gt;Original article on The Hindu website&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BANGALORE: Living up to its status as the country’s Information Technology (IT) capital, Bangalore played host to a different kind of “software lobby” here on Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike most lobbies, this one had no vested interests and no hard-line agenda. In a bid to raise awareness about software patenting and generate a debate among stakeholders, the Free Software community from across the country participated in a national-level meeting against software patents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Public hearings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This open meeting comes in the wake of the public hearings being conducted by the Indian Patent Office to discuss the recently formulated patent manual. The office has shelved all discussion on software patents and promised an exclusive meeting with stakeholders. Nearly 20 organisations and various stakeholders who participated in the hearing threw up issues ranging from patent laws and principles in general, to specific issues of the “software per se” clause in the patent manual. Submissions made by many stakeholders to the patent office were also discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting was held to discuss the recent modification to the manual, which is being interpreted as a move to make “software in combination with hardware” patentable. As of now, software comes under the copyright law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This move is significant because a similar ordinance was scrapped by the Parliament in 2005. The Free Software community feels that the clause panders to the powerful IT and multi-national companies lobby that has been rooting for this legislation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Copyright&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the meeting, Venkatesh Hariharan of Red Hat said that software was protected by copyright and additional protection was more harmful for the industry and the consumer as a whole.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Patent is a state-granted monopoly, but copyright protects the expression of an idea and a code is safe as long as one can prove that he has arrived at it independently,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a sole representative of any government body, Joseph Mathew, Special IT advisor to the Government of Kerala, made a presentation of his government’s stand on software patents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The manual should not have brought this up again, considering Parliament scrapped it in 2005. We hope it is a clerical error and the Kerala Government will consider writing to the Union Government and the patent office informing them of our opposition to this issue,” Mr. Mathew said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Small and medium enterprises which use Free Software such as Zyxware from Trivandrum, Deep Root Linux and Turtle Linux from Bangalore, among others made presentations at the meeting. Several research and advocacy organisations such as the Centre for Internet and Society and the Delhi Science Forum put forth various facets of this debate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Lack of clarity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“The lack of clarity in the Patent Act results is being wrestled aggressively and effectively by corporate interests, patent attorneys and the patent office in favour of granting software patents. This meeting helped bring together the counter-opinions in this matter, and we will go ahead and participate in any meeting that will be called for by the authorities,” said Sunil Abraham of the Centre for Internet and Society.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/software-patenting-will-harm-industry-consumer'&gt;https://cis-india.org/news/software-patenting-will-harm-industry-consumer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-01-16T04:54:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/deccan-herald-november-3-2008-l-subramani-visually-impaired-seek-access-to-print-materials">
    <title>Visually impaired seek access to print materials</title>
    <link>https://cis-india.org/news/deccan-herald-november-3-2008-l-subramani-visually-impaired-seek-access-to-print-materials</link>
    <description>
        &lt;b&gt;An article in the Deccan Herald (November 3, 2008, page 4) by L. Subramani on the CIS signature campaign.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Rahul Cherian is &lt;a class="external-link" href="http://archive.deccanherald.com/Content/Nov32008/district2008110298528.asp"&gt;quoted in this article&lt;/a&gt; published in the Deccan Herald.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bangalore-based Centre for Internet and Society (CIS), an organisation researching on the impact of internet on society, has initiated a signature campaign to persuade the Indian government to support the Treaty for the Improved Access for the Blind, Visually Impaired and other Reading Disabled Persons. &lt;br /&gt;&lt;br /&gt;The treaty, drafted earlier this year by the World Blind Union (WBU) and Knowledge Ecology International (KEI), asks governments of various countries to change their copyright laws to allow free access to information of several print disabled persons. &lt;br /&gt;&lt;br /&gt;The nation-wide campaign (in India) is being supported by organisations such as National Association of the Blind, Delhi and National Federation for the Blind (who is also an affiliate member of the WBU).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Those who are visually challenged and otherwise print disabled are able to use computers independently with the help of screen readers and magnifiers (software technology), yet they are excluded from accessing copyrighted materials since such materials aren’t available in accessible formats,” said Nirmita Narasimhan, who oversees the campaign at CIS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Treaty endorsement&lt;/b&gt;&lt;br /&gt;Signatures are sought from individuals and organisations to urge the Government of India to endorse the treaty, which calls for copyright laws to be modified so that organisations of the blind and disabled can convert books available in the market into formats which can be accessed by persons with different visual and reading disabilities. &lt;br /&gt;&lt;br /&gt;“The Indian Copyright Act (1957) is not taking into account recent technology advancements that has empowered the print disabled to access printed materials,” said Rahul Cherian, a Chennai-based copyrights lawyer involved in drafting the treaty.&lt;br /&gt;&lt;br /&gt;“Collecting signatures from people would be an evidence of public opinion in India regarding the issue and would help us to persuade the Government to make our country a signatory to the treaty. This would mean that the government must make amending the national law a priority.”&lt;br /&gt;&lt;br /&gt;Rahul said Indian publishers are largely willing to endorse changes to the law, since they view improved accessibility would bring more readers to the market (it is believed about 30 million persons are print disabled in the country). He also feels opposition from authors is unlikely as it doesn’t seriously threaten their incomes.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Interested can contact: Centre for Internet and Society, No D2, 3rd floor, Sheriff Chambers, 14, Cunningham Road, B’lore - 560 052. P: +91 80 4092 6283. M: 098458 68078. &lt;i&gt;The current address of the Centre for Internet &amp;amp; Society is No. 194, Second 'C' Cross, Domlur, 2nd Stage, Bangalore - 560071, Ph: +91 80 4092 6283 &lt;br /&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/deccan-herald-november-3-2008-l-subramani-visually-impaired-seek-access-to-print-materials'&gt;https://cis-india.org/news/deccan-herald-november-3-2008-l-subramani-visually-impaired-seek-access-to-print-materials&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-01-16T06:20:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us">
    <title>Indian surveillance laws &amp; practices far worse than US</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us</link>
    <description>
        &lt;b&gt;Explosive would be just the word to describe the revelations by National Security Agency (NSA) whistleblower Edward Snowden. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash's column was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-06-13/news/39952596_1_nsa-india-us-homeland-security-dialogue-national-security-letters"&gt;published in the Economic Times&lt;/a&gt; on June 13, 2013. &lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Now, with the American Civil Liberties Union suing the Obama  administration over the NSA surveillance programme, more fireworks could  be in store. Snowden's expose provides proof of what many working in  the field of privacy have long known. The leaks show the NSA (through  the FBI) has got a secret court order requiring telecom provider Verizon  to hand over "metadata", i.e., non-content data like phone numbers and  call durations, relating to millions of US customers (known as dragnet  or mass surveillance); that the NSA has a tool called Prism through  which it queries at least nine American companies (including Google and  Facebook); and that it also has a tool called Boundless Informant (a  screenshot of which revealed that, in February 2013, the NSA collected  12.61 billion pieces of metadata from India).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Nothing Quite Private &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The outrage in the US  has to do with the fact that much of the data the NSA has been granted  access to by the court relates to communications between US citizens,  something the NSA is not authorised to gain access to. What should be of  concern to Indians is that the US government refuses to acknowledge  non-Americans as people who also have a fundamental right to privacy, if  not under US law, then at least under international laws like the  Universal Declaration of Human Rights and the ICCPR.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;US companies  such as Facebook and Google have had a deleterious effect on privacy.  In 2004, there was a public outcry when Gmail announced it was using an  algorithm to read through your emails to serve you advertisements.  Facebook and Google collect massive amounts of data about you and  websites you visit, and by doing so, they make themselves targets for  governments wishing to snoop on you, legally or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Worse, Indian-Style &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, Google and Twitter have at least challenged a few of the  secretive National Security Letters requiring them to hand over data to  the FBI, and have won. Yahoo India has challenged the authority of the  Controller of Certifying Authorities, a technical functionary under the  IT Act, to ask for user data, and the case is still going on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To  the best of my knowledge, no Indian web company has ever challenged the  government in court over a privacy-related matter. Actually, Indian law  is far worse than American law on these matters. In the US, the NSA  needed a court order to get the Verizon data. In India, the licences  under which telecom companies operate require them to provide this. No  need for messy court processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law we currently have â€” sections 69 and 69B of the Information  Technology Act â€” is far worse than the surveillance law the British  imposed on us. Even that lax law has not been followed by our  intelligence agencies.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Keeping it Safe &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recent reports reveal  India's secretive National Technical Research Organisation (NTRO) â€”  created under an executive order and not accountable to Parliament â€”  often goes beyond its mandate and, in 2006-07, tried to crack into  Google and Skype servers, but failed. It succeeded in cracking  Rediffmail and Sify servers, and more recently was accused by the  Department of Electronics and IT in a report on unauthorised access to  government officials' mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the government argues systems like the Telephone Call  Interception System (TCIS), the Central Monitoring System (CMS) and the  National Intelligence Grid (Natgrid) will introduce restrictions on  misuse of surveillance data, it is a flawed claim. Mass surveillance  only increases the size of the haystack, which doesn't help in finding  the needle. Targeted surveillance, when necessary and proportional, is  required. And no such systems should be introduced without public debate  and a legal regime in place for public and parliamentary  accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should also encourage the usage of  end-to-end encryption, ensuring Indian citizens' data remains safe even  if stored on foreign servers. Merely requiring those servers to be  located in India will not help, since that information is still  accessible to American agencies if it is not encrypted. Also, the  currently lax Indian laws will also apply, degrading users' privacy even  more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indians need to be aware they have virtually no privacy  when communicating online unless they take proactive measures. Free or  open-source software and technologies like Open-PGP can make emails  secure, Off-The-Record can secure instant messages, TextSecure for  SMSes, and Tor can anonymise internet traffic.&lt;/p&gt;
&lt;div id="_mcePaste"&gt;&lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt;http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt; &lt;/span&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us'&gt;https://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T11:09:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018">
    <title>Submission to TRAI Consultation on "Inputs for Formulation of National Telecom Policy - 2018"</title>
    <link>https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018</link>
    <description>
        &lt;b&gt;Centre for Internet and Society (CIS) made a submission to TRAI Consultation on inputs to the National Telecom Policy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We welcome the TRAI consultation on the National Telecom Policy 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We believe these should be among the objectives of the next NTP.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;
&lt;ul&gt;
&lt;li&gt;To enable inclusion through the provision of telecommunications infrastructure and services that are accessible to all, especially for the most marginalized.&lt;/li&gt;
&lt;li&gt;To maximize the utility of telecom networks by increasing their capacity and throughput.&lt;/li&gt;
&lt;li&gt;To maximize the socio-economic utility of of spectrum and rationalize the regulatory regime.&lt;/li&gt;
&lt;li&gt;To re-energize the telecom sector, and to bring about a shift to a revenue-sharing model of revenue-generation for the exchequer.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NTP-12 does not include any policy mandate for providing accessibility for person with disabilities. The Policy should mandate implementation of systems that would enable better a&lt;span&gt;ccessibility for persons with disabilities. This could have included formulation of a Code of good practice for manufactures and service providers, conduct surveys and gather statistics on &lt;/span&gt;&lt;span&gt;use of telecommunication services by persons with disabilities, etc. &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Resource and infrastructure sharing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Resource- and infrastructure-sharing among telecommunications companies and applications is crucial to ensure both eiciency of usage of a limited resource (whether it is cabling in &lt;span&gt;underground ducts, or spectrum, or telecom towers), as well as to lower telecommunications costs (especially capital expenditure cost) and lowering barriers to entry, reducing &lt;/span&gt;environmental costs, and to maximize the beneits for consumers.&lt;a href="#ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Eforts must be taken to enable greater sharing of resources and infrastructure, without there being a negative impact on competition.&lt;a href="#ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a telecom scholar points out, “[O]perators will sometimes share the cost of digging or deploying passive infrastructure, but will lay their own iber lines, which allows &lt;span&gt;them to engage in full, facility-based competition. In these cases, there is no risk of coordination, as networks based on multiple iber lines ensure that access seekers can obtain &lt;/span&gt;&lt;span&gt;full control over them. Under such conditions, co-investment agreements are more likely to lead to timelier and more intense competition on the downstream market.”&lt;/span&gt;&lt;a href="#ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For this, the separation between infrastructure and service must be maintained, with focus of competition at the service end with infrastructure being largely common. This is managed differently in &lt;span&gt;different countries.&lt;/span&gt;&lt;a href="#ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Keeping all this in mind, we suggest that Strategies E(b) and F(c) be reworded to say, "By promoting both passive and active sharing of telecom infrastructure and &lt;span&gt;resources among telecom service providers, while ensuring that doesn’t lead to a decrease in competition, and where appropriate making certain forms of infrastructure sharing &lt;/span&gt;&lt;span&gt;mandatory."&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the resources that require sharing is spectrum. In 2015, DoT guidelines allowed liberalised spectrum to be shared among operators.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Modernizing spectrum management&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are happy to note that the strategy of “ensuring adequate availability of contiguous, broader and globally harmonised spectrum” is listed under Strategy D(u). There are many &lt;span&gt;opportunities for harmonisation of spectrum usage in India vis-a-vis global usage. For instance, currently in India, only 50 MHz of spectrum has been earmarked for unlicenced use &lt;/span&gt;&lt;span&gt;outdoors in the 5 GHz band (5.825 GHz to 5.875 GHz). There is no rationale for this distinction between indoor and outdoor use, and this limits the usage of Wi-Fi outdoors. The US has &lt;/span&gt;&lt;span&gt;delicensed 580 MHz in the 5GHz band which allows for the IEEE 802.11ac standard to be used on it, whereas India has only delicensed 300 MHz, whereas 1280 MHz is what is dictated by &lt;/span&gt;&lt;span&gt;needs.&lt;/span&gt;&lt;a href="#ftn5"&gt;[5]&lt;/a&gt; &lt;span&gt;At a minimum 580 MHz (3x160 MHz) ought to be made available for unlicensed used. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, delicensing the 60 GHz band would bring us in line with global regimes,&lt;a href="#ftn6"&gt;[6]&lt;/a&gt; &lt;span&gt;where at least &lt;/span&gt; 19 countries have delicensed the 60 Ghz band for both access as well as backhaul purposes.&lt;a href="#ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 60GHz band is ideal for delicensing since it there is virtually no interference since due to oxygen absorption and narrow antenna beam width the transmission distances&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;are short. We also need to liberalize the 70 and 80 GHz bands to enabling lower cost access for these frequencies to extend ibre connectivity where necessary by using other means, including &lt;span&gt;through aerial systems.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While under Strategy D(v), TRAI proposes the “earmarking [of] unlicensed frequency bands periodically for operation of low power devices for public use”, it should instead be &lt;span&gt;“earmarking unused, underused, and unlicensed frequency bands periodically for public use, with licence-exemption and light-licensing where possible, with safeguards to prevent &lt;/span&gt;&lt;span&gt;interference”. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even bands that have been allocated under the NFAP and licensed may lie unused or underused as well. According to a study by IIT-Hyderabad, unused TV spectrum in &lt;span&gt;India amounts to between 85%-95% of the total TV spectrum. A large swath of 115 MHz — from 470 to 585 MHz — lies unused, and is available for alternative uses. Waiting for an &lt;/span&gt;&lt;span&gt;ecosystem to develop around the 470- 698 MHz band,&lt;a href="#ftn8"&gt;[8]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;is harming the government’s vision of Digital India and an urgent course correction is needed. As we have argued in the past, &lt;/span&gt;&lt;span&gt;“[w]hereas Digital India needs low-cost wireless broadband, especially for long-distance links in rural India, because of the high cost and diiculty of building and maintaining ibre or wired &lt;/span&gt;&lt;span&gt;networks in diicult terrain, and/or in sparsely populated areas. Therefore, access to TVWS needs to be bundled with BharatNet, and other shared backbone networks like ERNET.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Policies should permit diferent network design scenarios including transmission power and purpose. Point-to-point links are needed over long distances in place of ibre or microwave, &lt;span&gt;and broad coverage is needed for contiguous areas like industrial developments, campuses, commercial complexes, or rural communities … TVWS does need tight radio ilters (unlike &lt;/span&gt;&lt;span&gt;Wi-Fi) to minimise interference, the underlying consideration that drives spectrum management. There's also need for varying power speciications depending on the network &lt;/span&gt;&lt;span&gt;design and purpose as described above, and policies for unlicensed sharing using geolocation databases, as deined by the US FCC."&lt;a href="#ftn9"&gt;[9]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, following the lead of the FCC in the USA, and Ofcom in the UK, we in India should exempt low-power usage across all spectrum bands. The approach followed by Ofcom (which &lt;span&gt;allows for powers between -90 dBm/MHz to -41 dBm/MHz (and on a sloping gradient from 10.6 GHz onwards), may be recommended. To reflect this, a strategy statement to “explore greater &lt;/span&gt;&lt;span&gt;exemptions from licensing requirements where possible, including for low-power spectrum usage”, would be helpful.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NTP should also lead the way in encouraging the government and the regulator to look to new ways of managing licence-exempt use of spectrum, as has been done, for example, in the &lt;span&gt;UK.&lt;a href="#ftn10"&gt;[10]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This allows for a movement away from power-oriented regulations to regulation on the basis of interference. For instance, shared spectrum databases may allow for coordinated usage &lt;span&gt;of higher power but without interference. Further, this allows for bands to be categorized not by usage, but by transmit powers and duty cycles.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Accessibility&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One of the lacunae in the NTP-12 is its lack of any policy mandate for providing accessibility for person with disabilities.&lt;a href="#ftn11"&gt;[11]&lt;/a&gt; &lt;span&gt;NTP-18 should not make the same mistake. The NTP should &lt;/span&gt;&lt;span&gt;mandate implementation of systems that would enable better accessibility for persons with disabilities. This should include formulation of a code of good practice for manufactures and &lt;/span&gt;&lt;span&gt;service providers, conducting surveys and gathering statistics on use of telecommunication services by persons with disabilities, etc.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Revenue maximization&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We believe that Strategy D(r) (“reviewing the objectives of spectrum management to maximise socio-economic gains”) should explicitly mention that revenue maximization should not itself &lt;span&gt;be a goal, since that may harm the socio-economic gains to be had from optimal usage of spectrum. We believe that it should be made explict that “ensuring revenue maximization for &lt;/span&gt;&lt;span&gt;the exchequer will not be the main aim of spectrum management policy”.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Auctions, which ind mention in TRAI’s recommendations, ne — to favour a model of revenue sharing&lt;a href="#ftn12"&gt;[12]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;— and at the least they need to be structured in such a manner as to avoid the “winner’s curse”.&lt;a href="#ftn13"&gt;[13]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;Revenue-sharing, which was followed after NTP-99, allows for a more sustainable form of revenue generation for the government, while having transparent allocation systems or &lt;/span&gt;&lt;span&gt;auctions designed in a manner not oriented towards maximizing the generation of auction proceeds for the government.&lt;a href="#ftn14"&gt;[14]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;Just as increasing the USO fund by itself cannot be a goal — ensuring universal service is the goal — similarly, the generation of tax revenue by itself &lt;/span&gt;&lt;span&gt;cannot be a goal.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Patents pools, local manufacturing, and cost of devices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under “Strategies to become net positive in international trade of telecommunication systems and services”, the consultation paper proposes inancial incentives for development of SEPs, as &lt;span&gt;well as “incentivising local manufacturing of network equipment and devices” as strategies. One concrete strategy to incentivise local manufacturing of telecommunications equipment &lt;/span&gt;&lt;span&gt;and devices is to create government-controlled patent pools,&lt;a href="#ftn15"&gt;[15]&lt;/a&gt; &lt;/span&gt;&lt;span&gt;which can be used to ensure that patent-holders are paid a royalty on SEPs while also lowering the transaction costs and legal &lt;/span&gt;&lt;span&gt;uncertainty for local device manufacturers, and ultimately lowering the price of devices for customers.&lt;a href="#ftn16"&gt;[16]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Private patent pools do not suiciently take care of the legal risks created to manufacturers. If government intervention is not done, then Indian manufacturers will end &lt;span&gt;up embroiled in legal battles as we have seen with Micromax, and others. CIS has provided a very detailed submission on TRAI’s Consultation Paper on Promoting Local Telecom &lt;/span&gt;&lt;span&gt;Equipment Manufacturing.&lt;a href="#ftn17"&gt;[17]&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Internet connection and data centres&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While under “Strategies to establish India as a global hub for data communication systems and services”, the problem of Internet interconnection is brought up, but the strategies don’t &lt;span&gt;mention what needs to be done. One of the problems facing India currently is a low level of peering interconnection agreements and a high cost of transit interconnection agreements. &lt;/span&gt;&lt;span&gt;This results in a higher cost of Internet for everyone. This needn’t be so. The NTP could establish that there should be no licensing required for running an interconnection point. &lt;/span&gt;&lt;span&gt;Currently, there is a lack of clarity on the matter, with contrary suggestions having been provided by Trai in the past. Further, the NTP and that existing interconnection exchanges &lt;/span&gt;&lt;span&gt;like NIXI should not discriminate between licensed telecom operators and unlicensed content &lt;/span&gt;providers, since it is crucial that the latter also be present at interconnection exchanges, and interconnection exchanges will not lourish unless the hurdles put in place, which favour &lt;span&gt;incumbents, are reduced.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is worrying that TRAI has suggested establishing a “licensing and regulatory framework for cloud service providers” (Strategy H(a)). While cloud service providers are subject to the &lt;span&gt;regulations provided in the IT Act, and other legislations in India, they currently are not subject to any licensing requirements. No rationale has been provided by TRAI for this &lt;/span&gt;&lt;span&gt;suggestion, and it would kill innovation in the sector, and would inhibit the emergence of India as a global hub for data communications systems and services. Similarly, while an &lt;/span&gt;&lt;span&gt;overarching data protection and security legislation needs to be in place, the suggestion of a “licensing and regulatory framework for IoT/ M2M service providers” (Strategy G(a)) is &lt;/span&gt;&lt;span&gt;worrying, and there is no suitable rationale for having licensing in this space, which will only serve to curb innovation without any corresponding or suitable benefit accruing to the public.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that telecommunications isn’t an end in itself, but is a means to an end, one of the missions of the NTP could be:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;To enable inclusion through the provision of telecommunications infrastructure and services that is accessible for all, especially for the most marginalized, including those &lt;span&gt;who are disabled, those who live in remote areas, those who are illiterate, scheduled castes and scheduled tribes, women, and transgender communities.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Once again, we are grateful to TRAI for having provided this opportunity to comment.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;].  GSMA, “Mobile Infrastructure Sharing,” 2008, https://www.gsma.com/publicpolicy/wpcontent/uploads/2012/09/Mobile-Infrastructure-sharing.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn2"&gt;&lt;/a&gt;].  José Carlos Laguna de Paz, “How Cooperation Between Telecom Firms Can Improve Efficiency,” The Regulatory Review, June 25, 2015, https://www.theregreview.org/2015/06/25/laguna-telecoms-cooperation/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn3"&gt;&lt;/a&gt;]. Ibid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn4"&gt;&lt;/a&gt;]. Jan Markendahl, Amirhossein Ghanbari, and Bengt G. Mölleryd, “Network Cooperation between Mobile Operators : Why and How Competitors Cooperate?,” in DIVA, 2013, http://urn.kb.se/resolve? urn=urn:nbn:se:kth:diva-134358.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn5"&gt;&lt;/a&gt;]. Parag Kar, “Response to TRAI’s Consultation Paper on Proliferation of Broadband through Public Wi-Fi Networks” (Qualcomm, August 10, 2016), http://www.trai.gov.in/sites/default/files/201609011022542916621Qualcomm_india_pvt_ltd.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn6"&gt;&lt;/a&gt;]. See ITU-R Report “ITU-R M.2227 (11/2011)” and ITU-R Recommendation “ITU-R M.2003-1 (01/2015)” on “Multiple Gigabit Wireless Systems in frequencies around 60 GHz”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn7"&gt;&lt;/a&gt;]. Broadband India Forum, “V Band - 60 GHz: The Key to Affordable Broadband in India” (Broadband India Forum, 2016), http://www.broadbandindiaforum.com/img/White%20Paper%20on%20V-BAND%20Revised%20Final.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn8"&gt;&lt;/a&gt;]. Varun Aggarwal, “DoT Says No to Releasing TV White Space Spectrum, Clarifies It Is for Experiments,” The Hindu Business Line, June 16, 2016, http://www.thehindubusinessline.com/info-tech/dot-says-no-to-releasing-tvwhite-space-spectrum-clarifies-it-is-for-experiments/article8737575.ece&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn9"&gt;&lt;/a&gt;].  Shyam Ponappa, “The Buzz around TV White Space,” Business Standard, November 4, 2015, http://www.businessstandard.com/article/opinion/shyam-ponappa-the-buzz-around-tv-white-space-115110401618_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn10"&gt;&lt;/a&gt;]. “Better Managing Licence-Exempt Usage,” Ofcom, October 7, 2016, https://www.ofcom.org.uk/research-anddata/technology/radio-spectrum/exempt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn11"&gt;&lt;/a&gt;]. Snehashish Ghosh, “National Telecom Policy 2012 — Issues and Concerns,” The Centre for Internet and Society, June 30, 2012, https://cis-india.org/telecom/national-telecom-policy-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn12"&gt;&lt;/a&gt;]. David E. M. Sappington and Dennis L. Weisman, “Revenue Sharing in Incentive Regulation Plans,” Information Economics and Policy 8, no. 3 (September 1, 1996): 229–48, https://doi.org/10.1016/0167-6245(96)00010-8.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn13"&gt;&lt;/a&gt;]. Shyam Ponappa, “Richard Thaler’s Views on Auctions,” Business Standard, November 1, 2017, http://www.business-standard.com/article/opinion/richard-thaler-s-views-on-auctions-117110101558_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn14"&gt;&lt;/a&gt;]. Shyam Ponappa, “Breakthroughs Needed for Digital India,” Business Standard, April 6, 2016, http://www.businessstandard.com/article/opinion/shyam-ponappa-breakthroughs-needed-for-digital-india-116040601241_1.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn15"&gt;&lt;/a&gt;]. Sunil Abraham, “Letter for Establishment of Patent Pool for Low-Cost Access Devices through Compulsory Licenses,” The Centre for Internet and Society, accessed January 19, 2018, https://cis-india.org/a2k/blogs/letter-forestablishment-of-patent-pool-for-low-cost-access-devices&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn16"&gt;&lt;/a&gt;]. Nehaa Chaudhari, “Pervasive Technologies: Patent Pools,” The Centre for Internet and Society, accessed January 19, 2018, https://cis-india.org/a2k/blogs/patent-pools&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn17"&gt;&lt;/a&gt;].  Anubha Sinha, “Comments on TRAI’s Consultation Paper on Promoting Local Telecom Equipment Manufacturing” (Centre for Internet and Society, November 13, 2017), http://www.trai.gov.in/sites/default/files/CentreInternetSocietyIndia_CP_PLTEM.pdf.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018'&gt;https://cis-india.org/telecom/blog/submission-to-trai-consultation-on-inputs-for-formulation-of-national-telecom-policy-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2018-01-25T14:46:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/the-right-to-information-the-right-to-knowledge">
    <title>The Right to Information, The Right to Knowledge (Talk by Sam Pitroda &amp; Carl Malamud)</title>
    <link>https://cis-india.org/events/the-right-to-information-the-right-to-knowledge</link>
    <description>
        &lt;b&gt;On October 15, 2017, Sam Pitroda and Carl Malamud will speak on open data and knowledge in India.&lt;/b&gt;
        &lt;p&gt;HasGeek and NUMA Bangalore are co-organizing a talk by two eminent internet pioneers — Sam Pitroda and Carl Malamud — on open data and knowledge in India.  Pranesh Prakash of CIS will introduce the speakers and their work.&lt;/p&gt;
&lt;h2&gt;The Right to Information, The Right to Knowledge&lt;/h2&gt;
&lt;p&gt;Sam Pitroda and Carl Malamud will talk about their efforts in India, the U.S., and many other countries to help promote universal access to knowledge. They'll discuss the constitutional underpinnings of this right in India and some of the information they've been making available, including 3 lakh books from the Digital Library of India, 19,000 official standards from the Bureau of Indian Standards, and a raft of other resources such as the entire Collected Works of Mahatma Gandhi.&lt;/p&gt;
&lt;p&gt;They will discuss how key laws such as the Right to Information make this possible but will focus more on how the world of open source and the Internet can turn that promise into a reality. Universal access to knowledge is the great unmet promise of our times, and they will talk about what we can all do to make this dream possible.&lt;/p&gt;
&lt;h3&gt;About the speakers&lt;/h3&gt;
&lt;p&gt;Dr. Sam Pitroda was a senior advisor to Prime Ministers Rajiv Gandhi and Manmohan Singh and is widely credited for having led India’s telecommunications and technology revolutions in the 1980s. Dr. Pitroda holds 20 honorary PhDs, close to 100 worldwide patents, and helped create the first digital PBXs in the 1960s.&lt;/p&gt;
&lt;p&gt;Carl Malamud started the first radio station on the Internet and is considered one of the pioneers of the U.S. open government movement. Carl runs Public.Resource.Org, an NGO which has placed hundreds of millions of pages of government information online, including all 19,000 Indian Standards. &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/the-right-to-information-the-right-to-knowledge'&gt;https://cis-india.org/events/the-right-to-information-the-right-to-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-02-14T12:19:16Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin">
    <title>Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh</title>
    <link>https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin</link>
    <description>
        &lt;b&gt;This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression that took place in Dhaka, Bangladesh, on January 14–15, 2013.&lt;/b&gt;
        &lt;p&gt;Bangladeshi blogger Asif Mohiuddin was brutally attacked in a stabbing last evening.  His condition is currently said to be critical.  Violent attacks on mediapersons have led to at least four deaths in the past year.  This trend is now extending to those writing online.&lt;/p&gt;
&lt;p&gt;It is the duty of societies at large to ensure that principles we universally consider sacrosanct, such as the right to life and liberty and of freedom of expression are in fact ideas, and of the government to actively protect the rights guaranteed under the Constitution of Bangladesh and to ensure they are not just words on paper.&lt;/p&gt;
&lt;p&gt;Article 39 of the Constitution of Bangladesh—and Article 19 of the Universal Declaration of Human Rights—guarantee both the freedom of thought and conscience, as well as the right of every citizen of freedom of speech and expression, and freedom of the press.&lt;/p&gt;
&lt;p&gt;Article 32 of the Constitution of Bangladesh—and Article 3 of the Universal Declaration of Human Rights—guarantee that no person shall be deprived of life or personal liberty except by law.&lt;/p&gt;
&lt;p&gt;The attack on Asif Mohiuddin constitutes a violation these fundamental principle by criminals, and we request the government to act decisively to show it will not tolerate such violations.&lt;/p&gt;
&lt;p&gt;Reporters Without Borders note that "the ability of those in the media to work freely has deteriorated alarmingly in Bangladesh, which is now ranked 129th of 179 countries in the 2011-2012 World Press Freedom Index".&lt;/p&gt;
&lt;p&gt;In general, the situation of those working as non-professional 'citizen journalists' is even worse.  In a 2010 report, the UN Special Rapporteur wrote:
&lt;blockquote&gt;"Citizen journalists are by nature more isolated, they are more vulnerable to attack than professional journalists. However, citizen journalists enjoy less protection than their counterparts in traditional media, as they do not have the support of media organizations and networks, in particular the organizational resources, including lawyers and financial resources, which can help shield them from harassment."&lt;/blockquote&gt;
This reality of greater vulnerability is equally applicable to those who do not self-identify as 'citizen journalists', but use social media to express unpopular opinions.&lt;/p&gt;
&lt;p&gt;Keeping this in mind, we call upon the government on Bangladesh to carry out swift investigations into this particular incident and bring the perpetrators to justice, and to grant greater legal support to citizen journalists and ensure better protections for all those who use the Internet as a means of expression.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin'&gt;https://cis-india.org/internet-governance/blog/statement-of-solidarity-asif-mohiuddin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    
    
        <dc:subject>Statement</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-15T11:51:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/pupfip/resources">
    <title>Resources</title>
    <link>https://cis-india.org/a2k/publications/pupfip/resources</link>
    <description>
        &lt;b&gt;A collection of resources that will help one navigate through the arguments and evidence for and against the Indian "Bayh-Dole" bill.&lt;/b&gt;
        
&lt;p&gt;&lt;u&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/u&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;PUPFIP&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;News-related/General Coverage&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.financialexpress.com/news/relook-at-publicfunded-r&amp;amp;d-bill-to-address-red-tape/376844/0"&gt;Relook at public-funded R&amp;amp;D Bill to
address red tape&lt;/a&gt; (The Financial Express)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.livemint.com/2008/12/01144901/CSIR-looks-at-commercializing.html"&gt;CSIR looks at commercializing, leasing
out patent&lt;/a&gt; (Live Mint)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither_21.html"&gt;Exporting Bayh-Dole to India: Whither Transparency Part II&lt;/a&gt;&lt;span class="post-author"&gt; (Shamnad Basheer)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://ww.scidev.net/es/science-and-innovation-policy/intellectual-property/news/proyecto-de-ley-de-patentes-suscita-debate-en-la-i.html"&gt;Indian Patent Bill stirs debate among scientists&lt;/a&gt; (Science and Development Network)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.knowledgecommission.gov.in/recommendations/legal.asp"&gt;Letter from the Knowledge Commission&lt;/a&gt;&amp;nbsp; (GoI)&lt;/p&gt;
&lt;h3&gt;Scientific
Culture&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://blogs.thehindu.com/delhi/?p=16251"&gt;Does Patenting research change the Culture of Science?&lt;/a&gt; (The Hindu)&lt;/p&gt;
&lt;h3&gt;Analytical Pieces&lt;strong&gt; &lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://www.scidev.net/en/opinions/indian-patent-bill-let-s-not-be-too-hasty.html"&gt;Indian Patent Bill: Lets not be too Hasty&lt;/a&gt;(Shamnad Basheer)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.livemint.com/2008/11/01001052/Not-in-public-interest.html"&gt;Not in public interest&lt;/a&gt;(Live Mint)&lt;a class="external-link" href="http://findarticles.com/p/articles/mi_qa3867/is_6_128/ai_n32062853/"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://findarticles.com/p/articles/mi_qa3867/is_6_128/ai_n32062853/"&gt;The Indian Public Funded IP Bill: Are we Ready?&lt;/a&gt;(K. Satyanarayana)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;Bayh-Dole&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Technology
Transfer&lt;/h3&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://www.economist.com/displaystory.cfm?story_id=1476653"&gt;Innovation's Golden Goose &lt;/a&gt;(The Economist)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.economist.com/science/displaystory.cfm?STORY_ID=10787664"&gt;Improving Innovation&lt;/a&gt;(The Economist)&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Scientific
Culture&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://www.highbeam.com/doc/1G1-129366990.html"&gt;Patents and America's Universities&lt;/a&gt;(The Economist)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.nytimes.com/2008/09/07/technology/07unbox.html?_r=1&amp;amp;pagewanted=print"&gt;When Academia Puts Profits Ahead of Wonder&lt;/a&gt;(The New York Times)&lt;/p&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://www.economist.com/displayStory.cfm?Story_ID=E1_VPNSGGT"&gt;Bayhing for blood or Doling out cash?&lt;/a&gt;(The Economist)&lt;/p&gt;
&lt;h3&gt;Evaluative
Pieces&lt;/h3&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://opensource.mit.edu/papers/Thursby.pdf"&gt;University Licensing under Bayh-Dole: What are the Issues and
Evidence?&lt;/a&gt;(Thursby and Thursby)&lt;/p&gt;
&lt;p&gt;
&lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Is Bayh-Dole Good for Developing Countries? Lessons from the US
Experience&lt;/a&gt;(So et al.)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://money.cnn.com/magazines/fortune/fortune_archive/2005/09/19/8272884/index.htm"&gt;The Law of Unintended Consequences&lt;/a&gt;(Fortune Magazine)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.sciencedirect.com/science/article/B6V77-41NCXY8-6/2/fa828bbd7705f51ffd8fcf60338daf16"&gt;The Growth of patenting and licensing by U.S. universities and the Bayh-Dole Act&lt;/a&gt; (Mowery et al.)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5g.htm"&gt;Overall Assessment of the Bayh-Dole Act&lt;/a&gt; (Nelson, Mowery, et al.)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;General Resources&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5b.htm"&gt;Joint Ventures and Intellectual Property&lt;/a&gt;(Andreas Panagopoulos)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5c.htm"&gt;Patents vs. Other Knowledge Transfer&lt;/a&gt;(Agrawal and Henderson)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5f.htm"&gt;Incentives Structure and Licensing Success&lt;/a&gt;(Dan Elfenbein)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5e.htm"&gt;University Licensing and Research Behavior&lt;/a&gt;(Lach and Schankerman)&lt;/p&gt;
&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5b.htm"&gt;Open Science and Private Property&lt;/a&gt;(Paul David)
&lt;p&gt;&amp;nbsp;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h2&gt;&lt;strong&gt;IP Alternatives&lt;/strong&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.plosmedicine.org/article/info:doi%2F10.1371%2Fjournal.pmed.0040293"&gt;New Approaches to Filling the Gap in TB Drug Discovery &lt;/a&gt;(Casenghi, Cole and Nathan)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://keionline.org/misc-docs/Prizes/prize_tb_msf_expert_meeting.pdf"&gt;The Role of Prizes in Developing Low-Cost Point-of-Care Rapid Diagnostic Tests and Better Drugs for TB&lt;/a&gt;(James Love)&lt;/p&gt;
&lt;p&gt;How to boost R&amp;amp;D for essential drugs and diagnostics&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://bmj.com/cgi/reprint/333/7582/1279.pdf"&gt;Scrooge and intellectual property rights&lt;/a&gt; (BMJ January 2006)&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;div id="refHTML"&gt;&amp;nbsp;&lt;/div&gt;

&lt;div id="refHTML"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/pupfip/resources'&gt;https://cis-india.org/a2k/publications/pupfip/resources&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Open Innovation</dc:subject>
    

   <dc:date>2009-10-20T03:29:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/pupfip/why-no-pupfip">
    <title>Arguments Against the PUPFIP Bill</title>
    <link>https://cis-india.org/a2k/publications/pupfip/why-no-pupfip</link>
    <description>
        &lt;b&gt;The Protection and Utilisation of Public Funded Intellectual Property Bill (PUPFIP Bill) is a new legislation being considered by Parliament, which was introduced in the 2008 winter session of the Rajya Sabha. It is modelled on the American Bayh-Dole Act (University and Small Business Patent Procedures Act) of 1980.  On this page, we explore some of the reasons that the bill is unnecessary, and how it will be harmful if passed.&lt;/b&gt;
        
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation unnecessary?" href="#how-is-the-legislation"&gt;How is the legislation
unnecessary?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980." href="#1-the-indian-government"&gt;The Indian government does not have vast reserves of underutilized patents, as the U.S. did in 1980.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer." href="#2-technology-transfer-is"&gt;Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a title="How is the legislation
harmful?" href="#how-is-the-legislation-1"&gt;How is the legislation
harmful?&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;&lt;a title="1) It's very foundation
is flawed and unproven: excessive patenting lead to gridlocks and
retard innovation." href="#1-it-s-very"&gt;Excessive patenting lead to
	gridlocks and retards innovation. 
	&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions." href="#2-the-legislation-makes"&gt;The legislation
	makes mandatory that which is optional now, and is anyway being
	followed in many institutions.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="3) Copyright, trademark,
etc., seem to be covered under the definition of public funded
IP." href="#3-copyright-trademark-etc"&gt;Copyright,
	trademark, etc., seem to be covered under the definition of “public
	funded IP”.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded..." href="#4-it-will-result"&gt;It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial..." href="#5-it-could-have"&gt;It could have
	unintended consequences of varied kinds, including discouraging
	fundamental research as well as discouraging industrial research.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of..." href="#6-non-disclosure-requirements"&gt;Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products..." href="#7-exclusive-licensing-enables"&gt;Exclusive
	licensing enables restriction on the dissemination of academic research in the marketplace, and increase in cost of products based on public-funded research.&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 align="justify"&gt;&lt;a title="Additional Resources" href="#additional-resources"&gt;Additional resources&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;&lt;li&gt;&lt;a title="On the PUPFIP Bill" href="#on-the-pupfip-bill"&gt;On the PUPFIP Bill&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="On Bayh-Dole" href="#on-bayh-dole"&gt;On Bayh-Dole&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2 align="justify"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;Arguments&lt;br /&gt;&lt;/h2&gt;
&lt;h2 align="justify"&gt;&lt;a name="how-is-the-legislation"&gt;&lt;/a&gt;How is the legislation unnecessary?&lt;br /&gt;&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-the-indian-government"&gt;&lt;/a&gt;1) The Indian government
does not have vast reserves of underutilized patents, as the U.S. did
in 1980.&lt;/h3&gt;
&lt;p align="justify"&gt;The idea behind the
Bayh-Dole Act was that the research funded by the government (and
owned, in the US, by the government) was being underutilized. In 1980, over 28,000 unlicensed patents lay with the U.S. government.[1] The Act shifted the title of such works
from the government to the University or small business that
conducted the research, thus allowing them to take out patents on the
research outputs.  In India, under present laws, the researcher(s)
own the rights over their research whether they be government-funded
or not.  Usually, due to employment contracts, the research
institutes already have the right to patent their inventions.  Thus,
currently, there is no need for an enabling legislation in this
regard, as there was in the U.S.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;In fact, currently, the Council of
Scientific and Industrial Research (CSIR) has over 5173 patents
(counting both those in force and those under dispute), while only
222 patents are licensed (with 68 of them being under dispute). 
Thus, even with the IP being in the institute's hands, there is a
"problem" situation similar to that which necessitated
Bayh-Dole in the U.S.  Thus, quite contrary to the aims of the Act,
further patenting will only lead to a situation of even more
underutilized patents.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;a name="2-technology-transfer-is"&gt;&lt;/a&gt;2) Technology transfer is very important, but pushing IPRs aggressively is not the best way of ensuring technology transfer.&lt;/h3&gt;
&lt;p align="justify"&gt;At a recent seminar held at NUJS Kolkata on
the PUPFIP Bill, it was revealed that while IIT-Kharagpur’s
TTO-equivalent (called the Sponsored Research &amp;amp; Industrial
Consultancy division - SRIC) currently handles over Rs.300 crores
through 850 projects, only around Rs. 5-15 crores (exact figures
weren't available) are currently made through its patent
portfolio.[2] &amp;nbsp;Thus patents don't seem, on the face of things, to be the
best way of ensuring technology transfer.&amp;nbsp; Indeed, the oft-cited 28,0000 unlicensed patents held by the U.S. government were composed primarily of patents for which industry had refused to take exclusive licences.[3]&lt;/p&gt;
&lt;p align="justify"&gt;Many contend that one of the most important functions of a patent is to get inventors to disclose their inventions rather than keep them as secrets.&amp;nbsp; This reason for awarding a patent is invalidated if stronger protection is granted to trade secrets (no term limit, for instance) than for patents.&amp;nbsp; Secondly, this reason for granting patents is not valid in case of government-funded research in academia and research
institutes.  The culture of publication and the economy of reputation
are sufficient to ensure disclosure.&amp;nbsp; Even without these intrinsic factors, there grant requirements can necessitate publication.&amp;nbsp; If mere publication is believed to be insufficient, then the government would do well to ask for technology dissemination plans before grants are made.&amp;nbsp; At any rate, monopoly rights in the form of patents are
thoroughly unnecessary.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="how-is-the-legislation-1"&gt;&lt;/a&gt;How is the legislation
harmful?&lt;/h2&gt;
&lt;h3 align="justify"&gt;&lt;a name="1-it-s-very"&gt;&lt;/a&gt;1) Excessive patenting lead to gridlocks and
retard innovation.&lt;/h3&gt;
&lt;p align="justify"&gt;It sees protection of IPR
as the sole means of encouraging innovation and driving research to
the doorstep of consumers. The trend around the world is that of
exploring alternative forms of spurring innovation.  Even in India,
CSIR has gone for an innovative "&lt;a class="external-link" href="http://www.osdd.net/"&gt;Open Source Drug Discovery&lt;/a&gt;"
project, which has proven very successful so far.  Furthermore, recent literature shows that excessive
patenting is harming research and innovation by creating gridlocks.[4]&amp;nbsp; If platform technologies and basic research (such as SNP) gets mired in patents, then the transaction costs increase (not only in terms of money, but more importantly in administrative terms).&amp;nbsp; This ends up in research clearances getting blocked, and thus retards innovation.&amp;nbsp; It must be remembered that intellectual property is not only an output, but also an input.&amp;nbsp; The more aggressively the outputs are guarded and prevented from being shared, the more the inputs will be affected.&amp;nbsp; The study of patent thickets and gridlocks has reached such a stage that the U.S. law has been changed to reflect this. Firstly, the Bayh-Dole Act was amended in 2000 to state that the objectives of the Bayh-Dole Act were to be carried out "without unduly encumbering future research and discovery".&amp;nbsp; Now, the courts (in the &lt;em&gt;Bilski&lt;/em&gt; case) have increased the standard of obviousness in patent law (which means that less patents will be granted).&amp;nbsp; Furthermore, the&amp;nbsp; U.S.P.T.O.&amp;nbsp; and the U.S. Senate are currently considering means of overhauling the U.S. patent system, which many fear is close to breaking down due to over-patenting.&amp;nbsp; All these are signs that the footsteps we are seeking to follow are themselves turning back.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="2-the-legislation-makes"&gt;&lt;/a&gt;2) The legislation makes
mandatory that which is optional now, and is anyway being followed in
many institutions.&lt;/h3&gt;
&lt;p align="justify"&gt;While the CSIR labs
pursue patents aggressively, they also run the OSSD project.  The latter
might not be permissible if the Act is passed as it stands.&amp;nbsp; 
Furthermore, this would increase the number of underutilized patents,
which is a problem faced currently by CSIR, which has had an
aggressive patent policy since the 1990s.&amp;nbsp; Unlicensed patents constitute around 93% of CSIR's total patent portfolio.&amp;nbsp; (In contrast, MIT averages
around 50% licensing of patents.)&amp;nbsp; If aggressive patenting is made mandatory, it adds substantially to administrative costs of all institutes which receive any grants from the government.&amp;nbsp; These institutes might not be large enough to merit a dedicated team of professionals to handle&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="3-copyright-trademark-etc"&gt;&lt;/a&gt;3) Copyright, trademark,
etc., seem to be covered under the definition of "public funded
IP".&lt;/h3&gt;
&lt;p align="justify"&gt;This leads to a ridiculous need to attempt to commercialise
all government-funded research literature (and the government funds
science research, social sciences, arts, etc.).&amp;nbsp;  Furthermore, while the definition of "public funded IP" includes copyrights, trademarks, etc., yet the substantive provisions seem to only include those forms of IP which have to be registered compulsorily (copyright and trademark don't -- copyright comes into existence when an original work is expressed in a medium, and trademark can come into existence&amp;nbsp; by use).&amp;nbsp; Importantly, seeking to commercialise all copyrighted works of research would hamper
the movement for open access to scholarly literature.&amp;nbsp; The inititative towards open access to scholarly literature is something that National Knowledge Commission has recommended, and is a move that would result in increased dissemination of public-funded research, which seems to be an aim of the PUPFIP Bill as well.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="4-it-will-result"&gt;&lt;/a&gt;4) It will result in
a form of	double taxation for research, and will increase the consumer cost of
	all products based on publicly-funded research.&lt;/h3&gt;
&lt;p align="justify"&gt;This bill would increase the
consumer cost of all products based on publicly-funded research,
because of the additional burden of patent royalties.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Public funds research -&amp;gt; Institute patents research -&amp;gt; Pharma MNC gets exclusive license over research -&amp;gt; Drug reaches market.&lt;/p&gt;
&lt;p align="justify"&gt;Assuming an exclusive licence: Cost of the drug = cost of manufacturing, storage, etc. + &lt;em&gt;mark-up (monopolistic) cost&lt;/em&gt; + &lt;em&gt;cost of licence&lt;/em&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;Thus, in
effect, the public has to pay twice for the research: it pays once to enable the
scientist to conduct the research, and once again in the form of royalties to have that research brought to the marketplace.&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="5-it-could-have"&gt;&lt;/a&gt;5) It could have
unintended consequences of varied kinds, including discouraging
fundamental research as well as discouraging industrial research.&lt;/h3&gt;
&lt;p align="justify"&gt;The former could happen since
institutions and individual scientists have a financial incentive to
&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/2003_5b.htm"&gt;shift their focus away from fundamental research&lt;/a&gt;; the latter,
conversely, because the filings and bureaucracy involved &lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-premnath-pdf.pdf"&gt;could drive
scientists away from reporting or even engaging in industrial
research&lt;/a&gt; [pdf].&amp;nbsp; Faculty and researcher involvement in the business of
licensing is a sub-optimal usage of their talents, and there are
scientists who would rather stay away from business (as is shown by
the intake of former industry-researchers into government-funded labs
such as those of CSIR).&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="6-non-disclosure-requirements"&gt;&lt;/a&gt;6) Non-disclosure
	requirements in the Bill restricts the dissemination of research within the academic community, and curtails freedom of speech.&lt;br /&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;This will bring about a shift in science and research which is always done upon others' work.&amp;nbsp; This is why in the U.S., the National Institute of Health (N.I.H.) has sought to ensure (without any legal authority) that it only finances that research that on single nucleotide polymorphism (S.N.P.) which is not patented, and is shared freely amongst scholars.&amp;nbsp; Since this requirement of the N.I.H.'s does not have any legal backing (since it is contradictory to the Bayh-Dole Act), institutions are free to get the grant from N.I.H. and then go ahead and patent their inventions.&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3 align="justify"&gt;&lt;a name="7-exclusive-licensing-enables"&gt;&lt;/a&gt;7) Exclusive licensing enables restriction on the dissemination of
academic research in the marketplace, and increase in cost of products
based on public-funded research.&lt;/h3&gt;
&lt;p&gt;The bill allows for both assignment of licences as well as exclusive licences.&amp;nbsp; Both of these enable monopolistic pricing to be undertaken by the licensee/assignee.&amp;nbsp; There are not even any mechanisms in the Act to ensure, for instance, that a public call is made to ascertain that no parties are willing to consider a non-exclusive licence.&amp;nbsp; Patents are generally said to grant a monopoly right because of the opportunity to recover costs of research and development.&amp;nbsp; When the research is being done by public-funded money, there is no justification for monopoly rights on that research, since there are no excessive costs to recover.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;Footnotes:&lt;/p&gt;
&lt;p align="justify"&gt;[1] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;So et al.&lt;/a&gt; and &lt;a class="external-link" href="http://opensource.mit.edu/papers/Thursby.pdf"&gt;Thursby and Thursby&lt;/a&gt;, quoted in the &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commission's letter to the Prime Minister&lt;/a&gt;.&lt;/p&gt;
&lt;p align="justify"&gt;[2] See Prof. Vivekanandans' presentation "&lt;a class="external-link" href="http://www.spicyip.com/docs/ppt-vivek.pdf"&gt;Patenting and Technology Transfer-the IIT Khargpur Experience&lt;/a&gt;"&lt;/p&gt;
&lt;p align="justify"&gt;[3] See &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/p&gt;
[4] See &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="justify"&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;&lt;a name="additional-resources"&gt;&lt;/a&gt;Additional Resources&lt;/h2&gt;
&lt;h3&gt;&lt;a name="on-the-pupfip-bill"&gt;&lt;/a&gt;On the PUPFIP Bill&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;February 5, 2004: &lt;a class="external-link" href="http://www.expresspharmaonline.com/20040205/happenings05.shtml"&gt;NIPER holds parallel session of Indian Science Congress (Express Pharma)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 27, 2006:&amp;nbsp;&lt;a class="external-link" href="http://bayhdole25.org/node/40"&gt;Susan
 Finston, India to Propose New Technology Transfer Legislation 
(Bayh-Dole 25)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;span id="__citationid396739" class="citation"&gt;January 16, 2007: &lt;a class="external-link" href="http://knowledgecommission.gov.in/downloads/recommendations/LegislationPM.pdf"&gt;National Knowledge Commision's Letter to Indian Prime Minister (National Knowledge Commission)&lt;/a&gt; &lt;/span&gt;&lt;/li&gt;&lt;li&gt;April 15, 2007: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20070415&amp;amp;filename=news&amp;amp;sid=23&amp;amp;page=2&amp;amp;sec_id=50"&gt;Archita Bhatta, Proposed IPR law raises concern (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;May 31, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;Science &amp;amp; Technology needs to be core of the economic development says Kapil Sibal (&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.pib.nic.in/release/release.asp?relid=28342"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 13, 2007: &lt;a class="external-link" href="http://www.pib.nic.in/release/rel_print_page.asp?relid=32628"&gt;Government Accords Approval to National Biotechnology Development Strategy (PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 1, 2008: &lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/summary/319/5863/556a"&gt;Yudhijit Bhattacharjee, Indian Government Hopes Bill Will Stimulate Innovation (Science)&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;February 19, 2008: Shamnad Basheer, Exporting Bayh Dole to India: Whither Transparency? &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither.html"&gt;(Part 1)&lt;/a&gt; &lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/02/exporting-bayh-dole-to-india-whither_21.html"&gt;(Part 2)&lt;/a&gt; (SpicyIP)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=317122"&gt;Kalpana Pathak, Varsities may soon own patent rights (Business Standard)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2008/03/17/stories/2008031751080100.htm"&gt;P.T. Jyothi Datta, Public-funded research may pay dividends for scientists (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;March 17, 2008: &lt;a class="external-link" href="http://www.iam-magazine.com/blog/Detail.aspx?g=c2472b7c-0f57-4e16-b1ea-389c44c3b4a6"&gt;Joff Wild, India considers Bayh-Dole style legislation (IAM Magazine)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 30, 2008: &lt;a class="external-link" href="http://www.pharmabiz.com/article/detnews.asp?articleid=44083&amp;amp;sectionid=46"&gt;M.K. Unnikrishnan and Pradeepti Nayak, Lessons from Bayh Dole Act and its relevance to India (PharmaBiz)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 2008: &lt;a class="external-link" href="http://ssrn.com/abstract=1265343"&gt;Sean M. O'Connor, Historical Context of U.S. Bayh-Dole Act: Implications for Indian Government Funded Research Patent Policy (STEM Newsletter)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;July 7, 2008: Shamnad Basheer,&amp;nbsp;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/2008/07/mysterious-indian-bayh-dole-bill.html"&gt;Mysterious Indian "Bayh Dole" Bill: SpicyIP Procures a Copy (SpicyIP)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;July 09, 2008: &lt;a class="external-link" href="http://www.business-standard.com/india/storypage.php?autono=328187"&gt;Latha Jishnu, Does India need a Bayh-Dole Act? (Business Standard)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;September 2008: &lt;a class="external-link" href="http://nopr.niscair.res.in/handle/123456789/2036"&gt;V.C. Vivekanandan, Transplanting Bayh-Dole Act- Issues at Stake Authors (13 Journal of Intell. Prop. 480)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 18, 2008: &lt;a class="external-link" href="http://www.scidev.net/en/opinions/indian-patent-bill-let-s-not-be-too-hasty.html"&gt;Shamnad Basheer, Indian Patent Bill: Let's not be too hasty (SciDev.net)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 28, 2008: &lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol e262 (2008)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;October 31, 2008: &lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;Cabinet gives approval for Protection and Utilization of Public Funded Intellectual Property Bill, 2008 (&lt;/a&gt;&lt;a class="external-link" href="http://pib.nic.in/release/release.asp?relid=44316"&gt;PIB Press Release)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;November 2008: &lt;a class="external-link" href="http://www.essentialmedicine.org/wordpress/wp-content/uploads/2008/11/uaem-white-paper-on-indian-bd-act.pdf"&gt;Annette Lin et al., The Bayh-Dole Act and Promoting the Transfer of Technology of Publicly Funded-Research (UAEM White Paper on the Proposed Indian Bayh-Dole Analogue)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 1,&amp;nbsp; 2008: &lt;a class="external-link" href="http://www.livemint.com/2008/10/11002336/2008/11/01001052/Not-in-public-interest.html?d=2"&gt;Editorial: Not in Public Interest (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;November 12, 2008: &lt;a class="external-link" href="http://www.genomeweb.com/biotechtransferweek/india-mulls-bill-modeled-bayh-dole-critics-claim-it-may-stifle-innovation"&gt;Ben Butkus, As India Mulls Bill Modeled on Bayh-Dole, Critics Claim It May Stifle Innovation (Biotech Transfer Weekly)&lt;/a&gt;&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;December 16, 2008: &lt;a class="external-link" href="http://mail.sarai.net/pipermail/commons-law/2008-December/002973.html"&gt;Pranesh Prakash, Indian "Bayh Dole" Bill before Parliament (Commons Law)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 23, 2009: &lt;a class="external-link" href="http://www.scidev.net/en/editorials/time-to-rethink-intellectual-property-laws-.html"&gt;Editorial: Time to Rethink Intellectual Property Laws (SciDev.net)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;March 12, 2009: &lt;a class="external-link" href="http://www.thehindu.com/seta/2009/03/12/stories/2009031250021400.htm"&gt;Feroz Ali Khader, Does Patenting Research Change the Culture of Science? (The Hindu)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;April 24, 2009: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/450560/"&gt;Sunil Abraham &amp;amp; Pranesh Prakash, Does India Need Its Own Bayh-Dole? (Indian Express)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 21, 2009: &lt;a class="external-link" href="http://www.livemint.com/2009/09/20235448/Proposed-patent-Bill-is-flawed.html?h=A1"&gt;C.H. Unnikrishnan, Proposed Patent Bill Is Flawed, Say Experts (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;September 23, 2009: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=F92B5F6A-A789-11DE-A362-000B5DABF613"&gt;Editorial: An Idea That's A Patent Misfit (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;October 2009: &lt;a class="external-link" href="http://ictsd.org/downloads/2009/11/sampat-policy-brief-5.pdf"&gt;Bhaven N. Sampat, The Bayh-Dole Model in Developing Countries: Reflections on the Indian Bill on Publicly Funded Intellectual Property (UNCTAD - ICTSD Policy Brief No. 5)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://www.icrier.org/publication/WorkingPaper244.pdf"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Patenting Public-Funded Research for Technology Transfer: A Conceptual-Empirical Synthesis of US Evidence and Lessons for India (ICRIER Working Paper No. 244)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 2010: &lt;a class="external-link" href="http://nopr.niscair.res.in/bitstream/123456789/7196/1/JIPR%2015%281%29%2019-34.pdf"&gt;Mrinalini Kochupillai, &lt;em&gt;The Protection and Utilization of Public Funded Intellectual Property Bill, 2008: A Critique in the Light of India's Innovation Environment&lt;/em&gt;, 15 J. Intell. Prop. Rights 19 (2010)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 16, 2010: &lt;a class="external-link" href="http://www.financialexpress.com/printer/news/567807/"&gt;Amit Shovon Ray &amp;amp; Sabyasachi Saha, Intellectual Bottlenecks (Financial Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;January 21, 2010: &lt;a class="external-link" href="http://www.business-standard.com/india/news/latha-jishnu-perilsthe-us-model/383179/"&gt;Latha Jishnu, Perils of the US Model (Business Standard)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 22, 2010: &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Scientists-fume-over-new-patent-bill/articleshow/5486588.cms"&gt;Rema Nagarajan, Scientists Fume Over New Patent Bill (Times of India)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;January 26, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/01/26202909/The-problem-with-patents.html"&gt;Shamnad Basheer, The Problem with Patents (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 5, 2010: &lt;a class="external-link" href="http://www.thehindubusinessline.com/2010/02/05/stories/2010020550960900.htm"&gt;Shalini Butani, Public Research May Become More Private (Business Line)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 8, 2010: &lt;a class="external-link" href="http://www.livemint.com/2010/02/07225403/Scientists-want-changes-in-inn.html"&gt;Anika Gupta, Scientists Want Changes in Innovation Bill (Mint)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 9, 2010: &lt;a class="external-link" href="http://www.livemint.com/Articles/PrintArticle.aspx?artid=AD533A7C-15A2-11DF-A92D-000B5DABF636"&gt;C.H. Unnikrishnan, Parliament Panel Wants Govt Review on Innovation Bill (Mint)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;February 15, 2010: &lt;a class="external-link" href="http://www.downtoearth.org.in/full6.asp?foldername=20100215&amp;amp;filename=croc&amp;amp;sec_id=10&amp;amp;sid=2"&gt;Leena Menghaney, A Bad Example from the U.S. (Down to Earth)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;February 19, 2010: &lt;a class="external-link" href="http://www.indianexpress.com/story-print/581701/"&gt;Pranesh Prakash, A Patent Conundrum (Indian Express)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyipindia.blogspot.com/search/label/Bayh%20Dole"&gt;SpicyIP coverage by tag 'Bayh Dole'&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://spicyip.com/ip-resources"&gt;Presentations from NUJS, Kolkata conference on the PUPFIP Bill&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;a name="on-bayh-dole"&gt;&lt;/a&gt;On Bayh-Dole&lt;/h3&gt;
&lt;strong&gt;Newspapers and Magazines&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nybooks.com/articles/17244"&gt;Marcia Angell, The Truth About the Drug Companies, New York Review of Books, July 15, 2004&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://money.cnn.com/magazines/fortune/fortune_archive/2005/09/19/8272884/index.htm"&gt;Clifton Leaf, The Law of Unintended Consequences, Fortune Magazine, Sept. 19, 2005&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.economist.com/science/PrinterFriendly.cfm?story_id=5327661"&gt;The Bayh-Dole act's 25th birthday, The Economist, Dec. 20, 2005&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.nytimes.com/2008/09/07/technology/07unbox.html?_r=1&amp;amp;pagewanted=print"&gt;Janet Rae-Dupree, When Academia Puts Profit Ahead of Wonder, N.Y. Times, Sept. 7, 2008&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Academic Journals&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.btlj.org/data/articles/20_02_02.pdf"&gt;Amy Kapczynski et al., Addressing Global Health Inequities: An Open Licensing Approach for University Innovation, 20 Berkeley Tech. L.J. 1031 (2005) &lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.plosbiology.org/article/info:doi/10.1371/journal.pbio.0060262"&gt;Anthony So et al., &lt;em&gt;Is Bayh-Dole Good for Developing Countries&lt;/em&gt;, 6 PLoS Biol. e262 (2008)&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.law.duke.edu/shell/cite.pl?66+Law+&amp;amp;+Contemp.+Probs.+289+%28WinterSpring+2003%29"&gt;Arti K. Rai &amp;amp; Rebecca S. Eisenberg, &lt;em&gt;Bayh-Dole Reform and the Progress of Biomedicine&lt;/em&gt;, 66 Law &amp;amp; Contemp. Probs. 289 (2003)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;David C. Mowery &amp;amp; Arvids A. Aiedonis, &lt;em&gt;Numbers, Quality, and Entry: How Has the Bayh-Dole Act Affected U.S. University Patenting and Licensing?&lt;/em&gt;, 1 Innovation Pol'y Econ. 187 (2000)&lt;/li&gt;&lt;li&gt;David C. Mowery, et al., &lt;em&gt;Learning to Patent: Institutional Experience, Learning, and the Characteristics of U.S. University Patents After the Bayh-Dole Act, 1981-1992&lt;/em&gt;, 48 Mgmt. Sci. 73 (2002)&lt;/li&gt;&lt;li&gt;Donald Kennedy, &lt;em&gt;Editorial: Enclosing the Research Commons&lt;/em&gt;, 294 Science 2249 (2001)&lt;/li&gt;&lt;li&gt;F.M. Scherer, &lt;em&gt;The Political Economy of Patent Policy Reform in the United States&lt;/em&gt;, 7 Colorado J. Telecomm. High Tech. L. 167 (2009)&lt;/li&gt;&lt;li&gt;Henry Steck, &lt;em&gt;Corporatization of the University: Seeking Conceptual Clarity&lt;/em&gt;, 585 Annals of Am. Acad. Pol. &amp;amp; Soc. Sci. 66 (2003)&lt;/li&gt;&lt;li&gt;Jason Owen-Smith, &lt;em&gt;Trends and Transitions in the Institutional Environment for Public and Private Science&lt;/em&gt;, 49 Higher Educ. 91 (2005)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;University Licensing and the Bayh-Dole Act&lt;/em&gt;, 301 Science 1052 (2003)&lt;/li&gt;&lt;li&gt;Jerry G. Thursby &amp;amp; Marie C. Thursby, &lt;em&gt;Who is Selling the Ivory Tower? Sources of Growth in University Licensing&lt;/em&gt;, 48 Mgmt. Sci. 90 (2002)&lt;/li&gt;&lt;li&gt;Josh Lerner,&lt;em&gt; Review of 'Ivory Tower'&lt;/em&gt;, 43 J. Econ. Litt. 510 (2005)&lt;/li&gt;&lt;li&gt;Joshua B. Powers,&lt;em&gt; R&amp;amp;D Funding Source and University Technology Transfer: What is Stimulating Universities to Be More Entrepreneurial?&lt;/em&gt;, 45 Research in Higher Educ. 1 (2004)&lt;/li&gt;&lt;li&gt;Lita Nelsen, &lt;em&gt;The Rise of Intellectual Property Protection in the American University&lt;/em&gt;, 279 Science 1460 (1998)&lt;/li&gt;&lt;li&gt;Marcia Angell &amp;amp; Arnold S. Relman, &lt;em&gt;Patents, Profits &amp;amp; American Medicine: Conflicts of Interest in the Testing &amp;amp; Marketing of New Drugs&lt;/em&gt;, 131 Daedalus 102 (2002)&lt;/li&gt;&lt;li&gt;Maria Jelenik, &lt;em&gt;Review: Two Books on Technology Transfer&lt;/em&gt;, 50 Admin. Sci. Q. 131 (2005) (Review of '&lt;em&gt;Ivory Tower&lt;/em&gt;')&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.sciencemag.org/cgi/content/full/280/5364/698"&gt;Michael
A. Heller &amp;amp; Rebecca S. Eisenberg, Can Patents Deter Innovation? The
Anticommons in Biomedical Research, 280 Science 698 (1998)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Rebecca Henderson, et al., &lt;em&gt;Universities as a Source of Commercia Technology: A Detailed Analsis of University Patenting, 1965-1988&lt;/em&gt;, 80 Rev. Econ. Statistics 119 (1998)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg, &lt;em&gt;Public Research and Private Development: Patents and Technology Transfer in Government-Sponsorded Research&lt;/em&gt;, 82 Virginia L. Rev. 1663 (1996)&lt;/li&gt;&lt;li&gt;Rebecca S. Eisenberg &amp;amp; Richard R. Nelson, &lt;em&gt;Public vs. Proprietary Science: A Fruitful Tension?&lt;/em&gt;, 131 Daedalus 89 (2002)&lt;/li&gt;&lt;li&gt;Richard Jensen &amp;amp; Marie Thursby,&lt;em&gt; Proofs and Prototypes for Sale: The Licensing of University Inventions&lt;/em&gt;, 91 Am. Econ. Rev. 240 (2001)&lt;/li&gt;&lt;li&gt;Roberto Mazzoleni &amp;amp; Richard R. Nelson, &lt;em&gt;Economic Theories about the Benefits and Costs of Patents&lt;/em&gt;, 32 J. Econ. Issues 1031 (1998)&lt;/li&gt;&lt;li&gt;Thomas A. Massaro,&lt;em&gt; Innovation, Technology Transfer, and Patent Policy: The University Contribution&lt;/em&gt;, 82 Virginia L. Rev. 1729 (1996)&lt;/li&gt;&lt;li&gt;Walter W. Powell &amp;amp; Jason Owen-Smith, &lt;em&gt;Universities and the Market for Intellectual Property in the Life Sciences&lt;/em&gt;, 17 J. Pol'y Analysis Mgmt. 253 (1998)&lt;/li&gt;&lt;li&gt;William M. Sage, &lt;em&gt;Funding Fairness: Public Investment, Proprietary Rights and Access to Health Care Technology&lt;/em&gt;, 82 Virginia L. Rev. 1737 (1996)&lt;/li&gt;&lt;li&gt;Zach W. Hall &amp;amp; Christopher Scott, &lt;em&gt;University-Industry Partnership&lt;/em&gt;, 291 Science 553 (2001)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Resources&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.researchoninnovation.org/tiip/archive/issue2003_5.htm"&gt;TIIP Newsletter: Patents and University Technology Transfer (2003) &lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.bayhdole25.org"&gt;Bay-Dole 25&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="file:///C:/Users/REBECCA/AppData/Local/Temp/moz-screenshot.png" alt="" /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/pupfip/why-no-pupfip'&gt;https://cis-india.org/a2k/publications/pupfip/why-no-pupfip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Bayh-Dole</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Access to Medicine</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>PUPFIP</dc:subject>
    
    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    

   <dc:date>2011-09-12T11:03:09Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/publications/pupfip">
    <title>PUPFIP Bill</title>
    <link>https://cis-india.org/a2k/publications/pupfip</link>
    <description>
        &lt;b&gt;A new bill which tries to promote innovation through privatization of public-funded research and is unnecessary, misguided, and will prove harmful to Indian research, innovation, and will harm the interests of taxpayers and consumers.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/publications/pupfip'&gt;https://cis-india.org/a2k/publications/pupfip&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2011-08-20T15:15:08Z</dc:date>
   <dc:type>Folder</dc:type>
   </item>




</rdf:RDF>
