<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 71 to 85.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-china-tech-forum"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing">
    <title>Cyber-Security in the Age of Smart Manufacturing</title>
    <link>https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing</link>
    <description>
        &lt;b&gt;Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by  the Federation of Indian Chamber of Commerce &amp; industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka at The Lalit Ashok, Bengaluru on September 26, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event was aimed at understanding the cyber security threats revolving around Industry 4.0 and smart manufacturing. The speakers included Mr. Gaurav Gupta, Principal Secretary, IT, BT and S&amp;amp;T Department, Government of Karnataka;Mr. Sanjay Mujoo, Vice President, Pointnext Global Centre Bangalore, Hewlett Packard Enterprise, India;Mr. Yogesh Andlay, Founder, Nucleus Software &amp;amp; Polaris Financial Technology and  Mr. Ambrish Bakaya, Co-Chair, ICT and Digital Economy Committee FICCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from discussing how to cover the threat vectors as businesses increasingly become digitised and use digital supply chains,the event was also useful in terms of obtaining an understanding of how the Karnataka government is approaching the digital ecosystem. The Centres of Excellence aim to bring on board academics, industry bodies and practitioners to develop best practices. FICCI, which was co-hosting this event indicated  that they will continue to work with the government to further this agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing'&gt;https://cis-india.org/internet-governance/news/cyber-security-in-the-age-of-smart-manufacturing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-02T00:23:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act">
    <title>Budapest Convention and the Information Technology Act</title>
    <link>https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act</link>
    <description>
        &lt;b&gt;The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of internet and computer crimes.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;br /&gt;It was drafted by the Council of Europe along with Canada, Japan, South Africa and the United States of America.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; The importance of the Convention is also indicated by the fact that adherence to it (whether by outright adoption or by otherwise making domestic laws in compliance with it) is one of the conditions mentioned in the Clarifying Lawful Overseas Use of Data Act passed in the USA (CLOUD Act) whereby a process has been established to enable security agencies of in India and the United States to directly access data stored in each other’s territories. Our analysis of the CLOUD Act vis-à-vis India can be found &lt;a href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-cloud-act-and-implications-for-india"&gt;here&lt;/a&gt;. It is in continuation of that analysis that we have undertaken here a detailed comparison of the Information Technology Act, 2000 (“&lt;b&gt;IT Act&lt;/b&gt;”) and how it stacks up against the provisions of Chapter I and Chapter II of the Convention.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before we get into a comparison of the Convention with the IT Act, we must point out the distinction between the two legal instruments, for the benefit of readers from a non legal background. An international instrument such as the Convention on Cybercrime (generally speaking) is essentially a promise made by the States which are a party to that instrument, that they will change or modify their local laws to get them in line with the requirements or principles laid out in said instrument. In case the signatory State does not make such amendments to its local laws, (usually) the citizens of that State cannot enforce any rights that they may have been granted under such an international instrument. The situation is the same with the Convention on Cybercrime, unless the signatory State amends its local laws to bring them in line with the provisions of the Convention, there cannot be any enforcement of the provisions of the Convention within that State.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; This however is not the case for India and the IT Act since India is not a signatory to the Convention on Cybercrime and therefore is not obligated to amend its local laws to bring them in line with the Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although India and the Council of Europe cooperated to amend the IT Act through major amendments brought about vide the Information Technology (Amendment) Act, 2008, India still has not become a signatory to the Convention on Cybercrime. The reasons for this appear to be unclear and it has been suggested that these reasons may range from the fact that India was not involved in the original drafting, to issues of sovereignty regarding the provisions for international cooperation and extradition.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 2 – Illegal access&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 43&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) accesses or secures access to such computer, computer system or computer network or computer resource&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention gives States the right to further qualify the offence of “illegal access” or “hacking” by adding elements such as infringing security measures, special intent to obtain computer data, other dishonest intent that justifies criminal culpability, or the requirement that the offence is committed in relation to a computer system that is connected remotely to another computer system.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, Indian law deals with the distinction by making the act of unathorised access without dishonest or fraudulent intent a civil offence, where the offender is liable to pay compensation. If the same act is done with dishonest and fraudulent intent, it is treated as a criminal offence punishable with fine and imprisonment which may extend to 3 years.&lt;/p&gt;
&lt;p&gt;It must be noted that this provision was included in the Act only through the Amendment of 2008 and was not present in the Information Technology Act, 2000 in its original iteration.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 3 – Illegal Interception&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Although the Information Technology Act, 2000 does not specifically criminalise the interception of communications by a private person. It is possible that under the provisions of Rule 43(a) the act of accessing a “computer network” could be interpreted as including unauthorised interception within its ambit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other way in which illegal interception may be considered to be illegal is through a combined reading of Sections 69 (Interception) and 45 (Residuary Penalty) with Rule 3 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 which prohibits interception, monitoring and decryption of information under section 69(2) of the IT Act except in a manner as provided by the Rules. However, it must be noted that section 69(2) only talks about interception by the government and Rule 3 only provides for procedural safeguards for such an interception. It could therefore be argued that the prohibition under Rule 3 is only applicable to the government and not to private individuals since section 62, the provision under which Rule 3 has been issued, itself is not applicable to private individuals.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 4 – Data interference&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right.&lt;/p&gt;
&lt;p&gt;2 A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43&lt;/p&gt;
&lt;p&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p&gt;(d) damages or causes to be damaged any computer, computer system or computer network, data, computer data base or any other programmes residing in such computer, computer system or computer network;&lt;/p&gt;
&lt;p&gt;(i) destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means;&lt;/p&gt;
&lt;p&gt;(j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage,&lt;/p&gt;
&lt;p&gt;he shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected. (change vide ITAA 2008)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Damage, deletion, diminishing in value and alteration of data is considered a crime as per Section 66 read with section 43 of the IT Act if done with fraudulent or dishonest intention. &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the Information Technology Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that the optional requirement of such an act causing serious harm has not been adopted by Indian law, i.e. the act of such damage, deletion, etc. by itself is enough to constitute the offence, and there is no requirement of such an act causing serious harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the Explanatory Report to the Convention on Cybercrime, “&lt;b&gt;Suppressing&lt;/b&gt; of computer data means any action that prevents or terminates the availability of the data to the person who has access to the computer or the data carrier on which it was stored.” Strictly speaking the act of suppression of data in another system is not covered by the language of section 43, but looking at the tenor of the section it is likely that if a court is faced with a situation of intentional/malicious denial of access to data, the court could expand the scope of the term “damage” as contained in sub-section (d) to include such malicious acts.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 5 – System interference&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, &lt;b&gt;when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data&lt;/b&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Section 43&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person without permission of the owner or any other person who is incharge of a computer, computer system or computer network -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) disrupts or causes disruption of any computer, computer system or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Explanation &lt;/b&gt;- for the purposes of this section -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) "Computer Contaminant" means any set of computer instructions that are designed -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) "Computer Virus" means any computer instruction, information, data or programme that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a programme, data or instruction is executed or some other event takes place in that computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 66&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two &lt;b&gt;three &lt;/b&gt;years or with fine which may extend to five lakh rupees or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offence of causing hindrance to the functioning of a computer system with fraudulent or dishonest intention is an offence under the IT Act.  &lt;b&gt;While the Convention only requires such acts to be crimes if committed intentionally, however the IT Act requires that such intention be either dishonest or fraudulent only then such an act will be a criminal offence, otherwise it will only incur civil consequences requiring the perpetrator to pay damages by way of compensation.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not require such disruption to be caused in any particular manner as is required under the Convention, although the acts of introducing computer viruses as well as damaging or deleting data themselves have been classified as offences under the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 6 – Misuse of devices&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the production, sale, procurement for use, import, distribution or otherwise making available of:&lt;/p&gt;
&lt;p&gt;i a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established in accordance with Articles 2 through 5;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii a computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5; and&lt;/p&gt;
&lt;p&gt;b the possession of an item referred to in paragraphs a.i or ii above, with intent that it be used for the purpose of committing any of the offences established in Articles 2 through 5. A Party may require by law that a number of such items be possessed before criminal liability attaches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 This article shall not be interpreted as imposing criminal liability where the production, sale, procurement for use, import, distribution or otherwise making available or possession referred to in paragraph 1 of this article is not for the purpose of committing an offence established in accordance with Articles 2 through 5 of this Convention, such as for the authorised testing or protection of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 Each Party may reserve the right not to apply paragraph 1 of this article, provided that the reservation does not concern the sale, distribution or otherwise making available of the items referred to in paragraph 1 a.ii of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision establishes as a separate and independent criminal offence the intentional commission of specific illegal acts regarding certain devices or access data to be misused for the purpose of committing offences against the confidentiality, the integrity and availability of computer systems or data. While the IT Act does not by itself makes the production, sale, procurement for use, import, distribution of devices designed to be adopted for such purposes, sub-section (g) of section 43 along with section 120A of the Indian Penal Code, 1860 which deals with “conspiracy” could perhaps be used to bring such acts within the scope of the penal statutes.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 7 – Computer related forgery&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the input, alteration, deletion, or suppression of computer data, resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible. A Party may require an intent to defraud, or similar dishonest intent, before criminal liability attaches.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The acts of deletion, alteration and suppression of data by itself is a crime as discussed above, there is no specific offence for doing such acts for the purpose of forgery. However this does not mean that the crime of online forgery is not punishable in India at all, such crimes would be dealt with under the relevant provisions of the Indian Penal Code, 1860 (Chapter 18) read with section 4 of the IT Act.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 8 – Computer-related fraud&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the causing of a loss of property to another person by:&lt;/p&gt;
&lt;p&gt;a any input, alteration, deletion or suppression of computer data,&lt;/p&gt;
&lt;p&gt;b any interference with the functioning of a computer system,&lt;/p&gt;
&lt;p&gt;with fraudulent or dishonest intent of procuring, without right, an economic benefit for oneself or for another person.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Just as in the case of forgery, there is no specific provision in the IT Act whereby online fraud would be considered as a crime, however specific acts such as charging services availed of by one person to another (section 43(h), identity theft (section 66C), cheating by impersonation (section 66D) have been listed as criminal offences. Further, as with forgery, fraudulent acts to procure economic benefits would also get covered by the provisions of the Indian Penal Code that deal with cheating.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 9 – Offences related to child pornography&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally and without right, the following conduct:&lt;/p&gt;
&lt;p&gt;a producing child pornography &lt;b&gt;for the purpose of its distribution &lt;/b&gt;through a computer system;&lt;/p&gt;
&lt;p&gt;b offering or making available child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;c distributing or transmitting child pornography through a computer system;&lt;/p&gt;
&lt;p&gt;d procuring child pornography through a computer system for oneself or for another person;&lt;/p&gt;
&lt;p&gt;e possessing child pornography in a computer system or on a computer-data storage medium.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 For the purpose of paragraph 1 above, the term "child pornography" shall include pornographic material that visually depicts:&lt;/p&gt;
&lt;p&gt;a a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;b a person appearing to be a minor engaged in sexually explicit conduct;&lt;/p&gt;
&lt;p&gt;c realistic images representing a minor engaged in sexually explicit conduct.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 For the purpose of paragraph 2 above, the term "minor" shall include all persons under 18 years of age. A Party may, however, require a lower age-limit, which shall be not less than 16 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party may reserve the right not to apply, in whole or in part, paragraphs 1, subparagraphs d and e, and 2, sub-paragraphs b and c.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;67 B Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Whoever,-&lt;/p&gt;
&lt;p&gt;(a) publishes or transmits or causes to be published or transmitted material in any electronic form which depicts children engaged in sexually explicit act or conduct or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) creates text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting children in obscene or indecent or sexually explicit manner or&lt;/p&gt;
&lt;p&gt;(c) cultivates, entices or induces children to online relationship with one or more children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource or&lt;/p&gt;
&lt;p&gt;(d) facilitates abusing children online or&lt;/p&gt;
&lt;p&gt;(e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, representation or figure in electronic form-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for bonafide heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The publishing, transmission, creation, collection, seeking, browsing, etc. of child pornography is an offence under Indian law punishable with imprisonment for upto 5 years for a first offence and upto 7 years for a subsequent offence, along with fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that bona fide depictions for the public good, such as for publication in pamphlets, reading or educational material are specifically excluded from the rigours of the section, Similarly material kept for heritage or religious purposes is also exempted under this section. Such exceptions are in line with the intent of the Convention, since the Explanatory statement itself states that “The term "pornographic material" in paragraph 2 is governed by national standards pertaining to the classification of materials as obscene, inconsistent with public morals or similarly corrupt. Therefore, material having an artistic, medical, scientific or similar merit may be considered not to be pornographic.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 10 – Offences related to infringements of copyright and related rights&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of copyright, as defined under the law of that Party, pursuant to the obligations it has undertaken under the Paris Act of 24 July 1971 revising the Bern Convention for the Protection of Literary and Artistic Works, the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Copyright Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law the infringement of related rights, as define under the law of that Party, pursuant to the obligations it has undertaken under the International Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organisations (Rome Convention), the Agreement on Trade-Related Aspects of Intellectual Property Rights and the WIPO Performances and Phonograms Treaty, with the exception of any moral rights conferred by such conventions, where such acts are committed wilfully, on a commercial scale and by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 A Party may reserve the right not to impose criminal liability under paragraphs 1 and 2 of this article in limited circumstances, provided that other effective remedies are available and that such reservation does not derogate from the Party’s international obligations set forth in the international instruments referred to in paragraphs 1 and 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;81 Act to have Overriding effect &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this Act shall restrict any person from exercising any right conferred under the Copyright Act, 1957 or the Patents Act, 1970&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The use of the term "pursuant to the obligations it has undertaken" in both paragraphs makes it clear that a Contracting Party to the Convention is not bound to apply agreements cited (TRIPS, WIPO, etc.) to which it is not a Party; moreover, if a Party has made a reservation or declaration permitted under one of the agreements, that reservation may limit the extent of its obligation under the present Convention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act does not try to intervene in the existing copyright regime of India and creates a special exemption for the Copyright Act and the Patents Act in the clause which provides this Act overriding effect. India’s obligations under the various treaties and conventions on intellectual property rights are enshrined in these legislations.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 11 – Attempt and aiding or abetting&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, aiding or abetting the commission of any of the offences established in accordance with Articles 2 through 10 of the present Convention with intent that such offence be committed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, an attempt to commit any of the offences established in accordance with Articles 3 through 5, 7, 8, and 9.1.a and c of this Convention.&lt;/p&gt;
&lt;p&gt;3 Each Party may reserve the right not to apply, in whole or in part, paragraph 2 of this article.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;84 B Punishment for abetment of offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever abets any offence shall, if the act abetted is committed in consequence of the abetment, and no express provision is made by this Act for the punishment of such abetment, be punished with the punishment provided for the offence under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation: An Act or offence is said to be committed in consequence of abetment, when it is committed in consequence of the instigation, or in pursuance of the conspiracy, or with the aid which constitutes the abetment.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;84 C Punishment for attempt to commit offences &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whoever attempts to commit an offence punishable by this Act or causes such an offence to be committed, and in such an attempt does any act towards the commission of the offence, shall, where no express provision is made for the punishment of such attempt, be punished with imprisonment of any description provided for the offence, for a term which may extend to one-half of the longest term of imprisonment provided for that offence, or with such fine as is provided for the offence or with both.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;As can be seen, both attempts as well as abetment of criminal offences under the IT Act have also been criminalised.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 12 – Corporate liability&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to ensure that legal persons can be held liable for a criminal offence established in accordance with this Convention, committed for their benefit by any natural person, acting either individually or as part of an organ of the legal person, who has a leading position within it, based on:&lt;/p&gt;
&lt;p&gt;a a power of representation of the legal person;&lt;/p&gt;
&lt;p&gt;b an authority to take decisions on behalf of the legal person;&lt;/p&gt;
&lt;p&gt;c an authority to exercise control within the legal person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 In addition to the cases already provided for in paragraph 1 of this article, each Party shall take the measures necessary to ensure that a legal person can be held liable where the lack of supervision or control by a natural person referred to in paragraph 1 has made possible the commission of a criminal offence established in accordance with this Convention for the benefit of that legal person by a natural person acting under its authority.&lt;/p&gt;
&lt;p&gt;3 Subject to the legal principles of the Party, the liability of a legal person may be criminal, civil or administrative.&lt;/p&gt;
&lt;p&gt;4 Such liability shall be without prejudice to the criminal liability of the natural persons who have committed the offence.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;85 Offences by Companies. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where a person committing a contravention of any of the provisions of this Act or of any rule, direction or order made there under is a Company, every person who, at the time the contravention was committed, was in charge of, and was responsible to, the company for the conduct of business of the company as well as the company, shall be guilty of the contravention and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that nothing contained in this sub-section shall render any such person liable to punishment if he proves that the contravention took place without his knowledge or that he exercised all due diligence to prevent such contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where a contravention of any of the provisions of this Act or of any rule, direction or order made there under has been committed by a company and it is proved that the contravention has taken place with the consent or connivance of, or is attributable to any neglect on the part of, any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall also be deemed to be guilty of the contravention and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Explanation&lt;/b&gt;-&lt;/p&gt;
&lt;p&gt;For the purposes of this section&lt;/p&gt;
&lt;p&gt;(i) "Company" means any Body Corporate and includes a Firm or other Association of individuals; and&lt;/p&gt;
&lt;p&gt;(ii) "Director", in relation to a firm, means a partner in the firm.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The liability of a company or other body corporate has been laid out in the IT Act in a manner similar to the Budapest Convention. While, the test to determine the relationship between the legal entity and the natural person who has committed the act on behalf of the legal entity is a little more detailed&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; in the Convention, the substance of the test is laid out in the IT Act as “a person who is in charge of, and was responsible to, the company”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 14&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish the powers and procedures provided for in this section for the purpose of specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Except as specifically provided otherwise in Article 21, each Party shall apply the powers and procedures referred to in paragraph 1 of this article to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a the criminal offences established in accordance with Articles 2 through 11 of this Convention;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b other criminal offences committed by means of a computer system; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c the collection of evidence in electronic form of a criminal offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 a Each Party may reserve the right to apply the measures referred to in Article 20 only to offences or categories of offences specified in the reservation, provided that the range of such offences or categories of offences is not more restricted than the range of offences to which it applies the measures referred to in Article 21. Each Party shall consider restricting such a reservation to enable the broadest application of the measure referred to in Article 20.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b Where a Party, due to limitations in its legislation in force at the time of the adoption of the present Convention, is not able to apply the measures referred to in Articles 20 and 21 to communications being transmitted within a computer system of a service provider, which system:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i is being operated for the benefit of a closed group of users, and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii does not employ public communications networks and is not connected with another computer system, whether public or private, that Party may reserve the right not to apply these measures to such communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each Party shall consider restricting such a reservation to enable the broadest application of the measures referred to in Articles 20 and 21.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is a provision of a general nature that need not have any equivalence in domestic law. The provision clarifies that all the powers and procedures provided for in this section (Articles 14 to 21) are for the purpose of “specific criminal investigations or proceedings”.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 15 – Conditions and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall ensure that the establishment, implementation and application of the powers and procedures provided for in this Section are subject to conditions and safeguards provided for under its domestic law, which shall provide for the adequate protection of human rights and liberties, including rights arising pursuant to obligations it has undertaken under the 1950 Council of Europe Convention for the Protection of Human Rights and Fundamental Freedoms, the 1966 United Nations International Covenant on Civil and Political Rights, and other applicable international human rights instruments, and which shall incorporate the principle of proportionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Such conditions and safeguards shall, as appropriate in view of the nature of the procedure or power concerned, &lt;i&gt;inter alia&lt;/i&gt;, include judicial or other independent supervision, grounds justifying application, and limitation of the scope and the duration of such power or procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 To the extent that it is consistent with the public interest, in particular the sound administration of justice, each Party shall consider the impact of the powers and procedures in this section upon the rights, responsibilities and legitimate interests of third parties.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;NA&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This again is a provision of a general nature which need not have a corresponding clause in the domestic law. India is a signatory to a number of international human rights conventions and treaties, it has acceded to the International Covenant on Civil and Political Rights (ICCPR), 1966, International Covenant on Economic, Social and Cultural Rights (ICESCR), 1966, ratified the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD), 1965, with certain reservations, signed the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW), 1979 with certain reservations, Convention on the Rights of the Child (CRC), 1989 and signed the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT), 1984. Further the right to life guaranteed under Article 21 of the Constitution takes within its fold a number of human rights such as the right to privacy. Freedom of expression, right to fair trial, freedom of assembly, right against arbitrary arrest and detention are all fundamental rights guaranteed under the Constitution of India, 1950.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, India has enacted the Protection of Human Rights Act, 1993 for the constitution of a National Human Rights Commission, State Human Rights Commission in States and Human Rights Courts for better protection of “human rights” and for matters connected therewith or incidental thereto. Thus, there does exist a statutory mechanism for the enforcement of human rights&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; under Indian law. It must be noted that the definition of human rights also incorporates rights embodied in International Covenants and are enforceable by Courts in India.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 16 – Expedited preservation of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to enable its competent authorities to order or similarly obtain the expeditious preservation of specified computer data, including traffic data, that has been stored by means of a computer system, in particular where there are grounds to believe that the computer data is particularly vulnerable to loss or modification.&lt;/p&gt;
&lt;p&gt;2 Where a Party gives effect to paragraph 1 above by means of an order to a person to preserve specified stored computer data in the person’s possession or control, the Party shall adopt such legislative and other measures as may be necessary to oblige that person to preserve and maintain the integrity of that computer data for a period of time as long as necessary, up to a maximum of ninety days, to enable the competent authorities to seek its disclosure. A Party may provide for such an order to be subsequently renewed.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige the custodian or other person who is to preserve the computer data to keep confidential the undertaking of such procedures for the period of time provided for by its domestic law.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Article 17 – Expedited preservation and partial disclosure of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt, in respect of traffic data that is to be preserved under Article 16, such legislative and other measures as may be necessary to:&lt;/p&gt;
&lt;p&gt;a ensure that such expeditious preservation of traffic data is available regardless of whether one or more service providers were involved in the transmission of that communication; and&lt;/p&gt;
&lt;p&gt;b ensure the expeditious disclosure to the Party’s competent authority, or a person designated by that authority, of a sufficient amount of traffic data to enable the Party to identify the service providers and the path through which the communication was transmitted.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;29 Access to computers and data. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Without prejudice to the provisions of sub-section (1) of section 69, the Controller or any person authorized by him shall, if he has reasonable cause to suspect that any contravention of the provisions of this chapter made there under has been committed, have access to any computer system, any apparatus, data or any other material connected with such system, for the purpose of searching or causing a search to be made for obtaining any information or data contained in or available to such computer system. (Amended vide ITAA 2008)&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;(2) For the purposes of sub-section (1), the Controller or any person authorized by him may, by order, direct any person in charge of, or otherwise concerned with the operation of the computer system, data apparatus or material, to provide him with such reasonable technical and other assistant as he may consider necessary.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;67 C&lt;/b&gt; &lt;b&gt;Preservation and Retention of information by intermediaries &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt;Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3(7) - When required by lawful order, the intermediary shall provide information &lt;b&gt;or any such assistance&lt;/b&gt; to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a request in writing staling clearly the purpose of seeking such information or any such assistance.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It must be noted that Article 16 and Article 17 refer only to data preservation and not data retention. “Data preservation” means to keep data, which already exists in a stored form, protected from anything that would cause its current quality or condition to change or deteriorate. Data retention means to keep data, which is currently being generated, in one’s possession into the future.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In short, the article provides only for preservation of existing stored data, pending subsequent disclosure of the data, in relation to specific criminal investigations or proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Convention uses the term "order or similarly obtain", which is intended to allow the use of other legal methods of achieving preservation than merely by means of a judicial or administrative order or directive (e.g. from police or prosecutor). In some States, preservation orders do not exist in the procedural law, and data can only be preserved and obtained through search and seizure or production order. Flexibility was therefore intended by the use of the phrase "or otherwise obtain" to permit the implementation of this article by the use of these means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Indian law does not have a specific provision for issuing an order for preservation of data, the provisions of section 29 as well as sections 99 to 101 of the Code of Criminal Procedure, 1973 may be utilized to achieve the result intended by Articles 16 and 17. Although section 67C of the IT Act uses the term “preserve and retain such information”, this provision is intended primarily for the purpose of data retention and not data preservation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another provision which may conceivably be used for issuing preservation orders is Rule 3(7) of the Information Technology (Intermediary Guidelines) Rules, 2011 which requires intermediaries to provide “any such assistance” to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. However, in the absence of a power of preservation in the main statute (IT Act) it remains to be seen whether such an order would be enforced if challenged in a court of law.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 18 – Production order&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order:&lt;/p&gt;
&lt;p&gt;a. a person in its territory to submit specified computer data in that person’s possession or control, which is stored in a computer system or a computer-data storage medium; and&lt;/p&gt;
&lt;p&gt;b. a service provider offering its services in the territory of the Party to submit subscriber information relating to such services in that service provider’s possession or control.&lt;/p&gt;
&lt;p&gt;2 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;p&gt;3 For the purpose of this article, the term “subscriber information” means any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which can be established:&lt;/p&gt;
&lt;p&gt;a the type of communication service used, the technical provisions taken thereto and the period of service;&lt;/p&gt;
&lt;p&gt;b the subscriber’s identity, postal or geographic address, telephone and other access number, billing and payment information, available on the basis of the service agreement or arrangement;&lt;/p&gt;
&lt;p&gt;c any other information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Section 28(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Controller or any officer authorized by him in this behalf shall exercise the like powers which are conferred on Income-tax authorities under Chapter XIII of the Income-Tax Act, 1961 and shall exercise such powers, subject to such limitations laid down under that Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 58(2)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(2) The Cyber Appellate Tribunal shall have, for the purposes of discharging their functions under this Act, the same powers as are vested in a civil court under the Code of Civil Procedure, 1908, while trying a suit, in respect of the following matters, namely -&lt;/p&gt;
&lt;p&gt;(b) requiring the discovery and production of documents or other electronic records;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While the Cyber Appellate Tribunal and the Controller of Certifying Authorities both have the power to call for information under the IT Act, these powers can be exercised only for limited purposes since the jurisdiction of both authorities is limited to the procedural provisions of the IT Act and they do not have the jurisdiction to investigate penal provisions. In practice, the penal provisions of the IT Act are investigated by the regular law enforcement apparatus of India, which use statutory provisions for production orders applicable in the offline world to computer systems as well. It is a very common practice amongst law enforcement authorities to issue orders under the Code of Criminal Procedure, 1973 (section 91) or the relevant provisions of the Income Tax Act, 1961 to compel production of information contained in a computer system. The power to order production of a “document or other thing” under section 91 of the Criminal Procedure Code is wide enough to cover all types of information which may be residing in a computer system and can even include the entire computer system itself.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 19 – Search and seizure of stored computer data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to search or similarly access:&lt;/p&gt;
&lt;p&gt;a a computer system or part of it and computer data stored therein; and&lt;/p&gt;
&lt;p&gt;b a computer-data storage medium in which computer data may be stored in its territory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Each Party shall adopt such legislative and other measures as may be necessary to ensure that where its authorities search or similarly access a specific computer system or part of it, pursuant to paragraph 1.a, and have grounds to believe that the data sought is stored in another computer system or part of it in its territory, and such data is lawfully accessible from or available to the initial system, the authorities shall be able to expeditiously extend the search or similar accessing to the other system.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to seize or similarly secure computer data accessed according to paragraphs 1 or 2. These measures shall include the power to:&lt;/p&gt;
&lt;p&gt;a seize or similarly secure a computer system or part of it or a computer-data storage&lt;/p&gt;
&lt;p&gt;medium;&lt;/p&gt;
&lt;p&gt;b make and retain a copy of those computer data;&lt;/p&gt;
&lt;p&gt;c maintain the integrity of the relevant stored computer data;&lt;/p&gt;
&lt;p&gt;d render inaccessible or remove those computer data in the accessed computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to order any person who has knowledge about the functioning of the computer system or measures applied to protect the computer data therein to provide, as is reasonable, the necessary information, to enable the undertaking of the measures referred to in paragraphs 1 and 2.&lt;/p&gt;
&lt;p&gt;5 The powers and procedures referred to in this article shall be subject to Articles 14 and15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;76 Confiscation &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, in respect of which any provision of this Act, rules, orders or regulations made thereunder has been or is being contravened, shall be liable to confiscation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provided &lt;/b&gt;that where it is established to the satisfaction of the court adjudicating the confiscation that the person in whose possession, power or control of any such computer, computer system, floppies, compact disks, tape drives or any other accessories relating thereto is found is not responsible for the contravention of the provisions of this Act, rules, orders or regulations made there under, the court may, instead of making an order for confiscation of such computer, computer system, floppies, compact disks, tape drives or any other accessories related thereto, make such other order authorized by this Act against the person contravening of the provisions of this Act, rules, orders or regulations made there under as it may think fit.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While Article 19 provides for the power to search and seize computer systems for the investigation into criminal offences of any type of kind, section 76 of the IT Act is limited only to contraventions of the provisions of the Act, rules, orders or regulations made thereunder. However, this does not mean that Indian law enforcement authorities do not have the power to search and seize a computer system for crimes other than those contained in the IT Act; just as in the case of Article 18, the authorities in India are free to use the provisions contained in the Criminal Procedure Code and other sectoral legislations which allow for seizure of property to seize computer systems when investigating criminal offences.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 20 – Real-time collection of traffic data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p&gt;i to collect or record through the application of technical means on the territory of that Party; or&lt;/p&gt;
&lt;p&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;traffic data, in real-time, associated with specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of traffic data associated with specified communications transmitted in its territory, through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69B Power to authorize to monitor and collect traffic data or information through any computer resource for Cyber Security &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;(1) The Central Government may, to enhance Cyber Security and for identification, analysis and prevention of any intrusion or spread of computer contaminant in the country, by notification in the official Gazette, authorize any agency of the Government to monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p&gt;(2) The Intermediary or any person in-charge of the Computer resource shall when called upon by the agency which has been authorized under sub-section (1), provide technical assistance and extend all facilities to such agency to enable online access or to secure and provide online access to the computer resource generating , transmitting, receiving or storing such traffic data or information.&lt;/p&gt;
&lt;p&gt;(3) The procedure and safeguards for monitoring and collecting traffic data or information, shall be such as may be prescribed.&lt;/p&gt;
&lt;p&gt;(4) Any intermediary who intentionally or knowingly contravenes the provisions of sub-section (2) shall be punished with an imprisonment for a term which may extend to three years and shall also be liable to fine.&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, (i) "Computer Contaminant" shall have the meaning assigned to it in section 43.&lt;/p&gt;
&lt;p&gt;(ii) "traffic data" means any data identifying or purporting to identify any person, computer system or computer network or location to or from which the communication is or may be transmitted and includes communications origin, destination, route, time, date, size, duration or type of underlying service or any other information.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Section 69B in the IT Act enables the government to authorise the monitoring and collection of traffic data through any computer system. Under the Convention, orders for collection and recording of traffic data can be given for the purposes mentioned in Articles 14 and 15. On the other hand, as per the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009, an order for monitoring may be issued for any of the following purposes relating to cyber security:&lt;/p&gt;
&lt;p&gt;(a) forecasting of imminent cyber incidents;&lt;/p&gt;
&lt;p&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;/p&gt;
&lt;p&gt;(c) identification and determination of viruses or computer contaminant;&lt;/p&gt;
&lt;p&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;/p&gt;
&lt;p&gt;(e) tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/p&gt;
&lt;p&gt;(f) identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security;&lt;/p&gt;
&lt;p&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/p&gt;
&lt;p&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/p&gt;
&lt;p&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As can be seen from the above, the reasons for which an order for monitoring traffic data can be issued are extremely wide, this is in stark contrast to the reasons for which an order for interception of content data may be issued under section 69. The Rules also provide that the intermediary shall not disclose the existence of a monitoring order to any third party and shall take all steps necessary to ensure extreme secrecy in the matter of monitoring of traffic data.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 21 – Interception of content data&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 Each Party shall adopt such legislative and other measures as may be necessary, in relation to a range of serious offences to be determined by domestic law, to empower its competent authorities to:&lt;/p&gt;
&lt;p&gt;a collect or record through the application of technical means on the territory of that Party, and&lt;/p&gt;
&lt;p&gt;b compel a service provider, within its existing technical capability:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i to collect or record through the application of technical means on the territory of that Party, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii to co-operate and assist the competent authorities in the collection or recording of,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;content data, in real-time, of specified communications in its territory transmitted by means of a computer system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2 Where a Party, due to the established principles of its domestic legal system, cannot adopt the measures referred to in paragraph 1.a, it may instead adopt legislative and other measures as may be necessary to ensure the real-time collection or recording of content data on specified communications in its territory through the application of technical means on that territory.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such legislative and other measures as may be necessary to oblige a service provider to keep confidential the fact of the execution of any power provided for in this article and any information relating to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 The powers and procedures referred to in this article shall be subject to Articles 14 and 15.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;69 Powers to issue directions for interception or monitoring or decryption of any information through any computer resource &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Where the central Government or a State Government or any of its officer specially authorized by the Central Government or the State Government, as the case may be, in this behalf may, if is satisfied that it is necessary or expedient to do in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence, it may, subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the appropriate Government to intercept, monitor or decrypt or cause to be intercepted or monitored or decrypted any information transmitted received or stored through any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Procedure and safeguards subject to which such interception or monitoring or decryption may be carried out, shall be such as may be prescribed&lt;/p&gt;
&lt;p&gt;(3) The subscriber or intermediary or any person in charge of the computer resource shall, when called upon by any agency which has been directed under sub section (1), extend all facilities and technical assistance to -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) provide access to &lt;b&gt;or secure access to &lt;/b&gt;the computer resource containing such information; generating, transmitting, receiving or storing such information; or&lt;/p&gt;
&lt;p&gt;(b) intercept or monitor or decrypt the information, as the case may be&lt;b&gt;; &lt;/b&gt;or&lt;/p&gt;
&lt;p&gt;(c) provide information stored in computer resource.&lt;/p&gt;
&lt;p&gt;(4) The subscriber or intermediary or any person who fails to assist the agency referred to in sub-section (3) shall be punished with an imprisonment for a term which may extend to seven years and shall also be liable to fine.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;There has been a lot of academic research and debate around the exercise of powers under section 69 of the IT Act, but the current piece is not the place for a standalone critique of section 69.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The analysis here is limited to a comparison of the provisions of Article 20 vis-à-vis section 69 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In that background, it needs to be pointed out that two important issues mentioned in Article 20 of the Convention are not specifically mentioned in section 69B, viz. (i) that the order should be only for specific computer data, and (ii) that the intermediary should keep such an order confidential; these requirements are covered by Rules 9 and 20 of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, respectively.&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr style="text-align: justify; "&gt;
&lt;td&gt;
&lt;p&gt;Convention on Cybercrime&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Information Technology Act, 2000&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Article 22 – Jurisdiction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1 Each Party shall adopt such legislative and other measures as may be necessary to establish jurisdiction over any offence established in accordance with Articles 2 through 11 of this Convention, when the offence is committed:&lt;/p&gt;
&lt;p&gt;a in its territory; or&lt;/p&gt;
&lt;p&gt;b on board a ship flying the flag of that Party; or&lt;/p&gt;
&lt;p&gt;c on board an aircraft registered under the laws of that Party; or&lt;/p&gt;
&lt;p&gt;d by one of its nationals, if the offence is punishable under criminal law where it was committed or if the offence is committed outside the territorial jurisdiction of any State.&lt;/p&gt;
&lt;p&gt;2 Each Party may reserve the right not to apply or to apply only in specific cases or conditions the jurisdiction rules laid down in paragraphs 1.b through 1.d of this article or any part thereof.&lt;/p&gt;
&lt;p&gt;3 Each Party shall adopt such measures as may be necessary to establish jurisdiction over the offences referred to in Article 24, paragraph 1, of this Convention, in cases where an alleged offender is present in its territory and it does not extradite him or her to another Party, solely on the basis of his or her nationality, after a request for extradition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4 This Convention does not exclude any criminal jurisdiction exercised by a Party in accordance with its domestic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5 When more than one Party claims jurisdiction over an alleged offence established in accordance with this Convention, the Parties involved shall, where appropriate, consult with a view to determining the most appropriate jurisdiction for prosecution.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;1. Short Title, Extent, Commencement and Application &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It shall extend to the whole of India and, save as otherwise provided in this Act, it applies also to any offence or contravention hereunder committed outside India by any person.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;75 Act to apply for offence or contraventions committed outside India &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Subject to the provisions of sub-section (2), the provisions of this Act shall apply also to any offence or contravention committed outside India by any person irrespective of his nationality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) For the purposes of sub-section (1), this Act shall apply to an offence or contravention committed outside India by any person if the act or conduct constituting the offence or contravention involves a computer, computer system or computer network located in India.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Convention provides for extra territorial jurisdiction only for crimes committed outside the State by nationals of that State. However, the IT Act applies even to offences under the Act committed by foreign nationals outside India, as long as the act involves a computer system or computer network located in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike para 3 of Article 22 of the Convention, the IT Act does not touch upon the issue of extradition. Cases involving extradition would therefore be dealt with by the general law of the land in respect of extradition requests contained in the Extradition Act, 1962. The Convention requires that in cases where the state refuses to extradite an alleged offender, it should establish jurisdiction over the offences referred to in Article 21(1) so that it can proceed against that offender itself. In this regard, it must be pointed out that Section 34A of the Extradition Act, 1962 provides that “Where the  Central Government is  of the  opinion that  a  fugitive  criminal  cannot  be surrendered or  returned pursuant  to a request for extradition from a foreign State,  it may, as it thinks fit, take steps to prosecute such fugitive criminal in India.” Thus the Extradition Act gives the Indian government the power to prosecute an individual in the event that such individual cannot be extradited.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;International Cooperation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chapter III of the Convention deals specifically with international cooperation between the signatory parties. Such co-operation is to be carried out both "in accordance with the provisions of this Chapter" and "through application of relevant international agreements on international cooperation in criminal matters, arrangements agreed to on the basis of uniform or reciprocal legislation, and domestic laws." The latter clause establishes the general principle that the provisions of Chapter III do not supersede the provisions of international agreements on mutual legal assistance and extradition or the relevant provisions of domestic law pertaining to international co-operation.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although the Convention grants primacy to mutual treaties and agreements between member States, in certain specific circumstances it also provides for an alternative if such treaties do not exist between the member states (Article 27 and 28). The Convention also provides for international cooperation on certain issues which may not have been specifically provided for in mutual assistance treaties entered into between the parties and need to be spelt out due to the unique challenges posed by cyber crimes, such as expedited preservation of stored computer data (Article 29) and expedited disclosure of preserved traffic data (Article 30). Contentious issues such as access to stored computer data, real time collection of traffic data and interception of content data have been specifically left by the Convention to be dealt with as per existing international instruments or arrangements between the parties.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broad language and wide terminology used IT Act seems to cover a number of the cyber crimes mentioned in the Budapest Convention, even though India has not signed and ratified the same. Penal provisions such as illegal access (Article 2), data interference (Article 4), system interference (Article 5), offence related to child pornography (Article 9), attempt and aiding or abetting (Article 11), corporate liability (Article 12) are substantially covered and reflected in the IT Act in a manner very similar to the requirements of the Convention. Similarly procedural provisions such as search and seizure of stored computer data (Article 19), real-time collection of traffic data (Article 20), interception of content data (Article 21) and Jurisdiction (Article 22) are also substantially reflected in the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However certain penal provisions mentioned in the Convention such as computer related forgery (Article 7), computer related fraud (Article 8) are not provided for specifically in the IT Act but such offences are covered when provisions of the Indian Penal Code, 1860 are read in conjugation with provisions of the IT Act. Similarly procedural provisions such as expedited preservation of stored computer data (Article 16) and production order (Article 18) are not specifically provided for in the IT Act but are covered under Indian law through the provisions of the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two categories there are certain provisions such as misuse of devices (Article 6) and Illegal interception (Article 3) which may not be specifically covered at all under Indian law, but may conceivably be said to be covered through an expansive reading of provisions of the Indian Penal Code and the IT Act. It may therefore be said that even though India has not signed or ratified the Budapest Convention, the legal regime in India is substantially in compliance with the provisions and requirements contained therein.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, the Convention on Cybercrime is perhaps the most important international multi state instruments that may be used to combat cybercrime, not merely because the provisions thereunder may be used as a model to bolster national/local laws by any State, be it a signatory or not (as in the case of India) but also because of the mechanism it lays down for international cooperation in the field of cyber terrorism. In an increasingly interconnected world where more and more information of individuals is finding its way to the cloud or other networked infrastructure the international community is making great efforts to generate norms for increased international cooperation to combat cybercrime and cyber terrorism. While the Convention is one such multilateral effort, States are also proposing to use bilateral treaties to enable them to better fight cybercrime, the United States CLOUD Act, being one such effort. In the backdrop of these novel efforts the role to be played by older instruments such as the Convention on Cybercrime as well as by important States such as India is extremely crucial.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 304, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; The analysis here has been limited to only Chapter I and Chapter II of the Convention, as it is only adherence to these two chapters that is required under the CLOUD Act.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; The only possible enforcement that may be done with regard to the Convention on Cybercrime is that the Council of Europe may put pressure on the signatory State to amend its local laws (if it is refusing to do so) otherwise it would be in violation of its obligations as a member of the European Union.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Alexander Seger, “India and the Budapest Convention: Why Not?”, &lt;a href="https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/"&gt;https://www.orfonline.org/expert-speak/india-and-the-budapest-convention-why-not/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 50, https://rm.coe.int/16800cce5b.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; India is a party to the Berne Convention on Literary and Artistic Works, the Agreement on Trade Related Intellectual Property Rights and the Rome Convention. India has also recently (July 4, 2018) announced that it will accede to the WIPO Copyright Treaty as well as the WIPO Performances and Phonographs Treaty.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; The test under the Convention is that the relevant person would be the one who has a leading position within the company, based on:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a power of representation of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to take decisions on behalf of the legal person;&lt;/li&gt;
&lt;li&gt;an authority to exercise control within the legal person.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt;Vipul Kharbanda and Elonnai Hickock, “MLATs and the proposed Amendments to the US Electronic Communications Privacy Act”, &lt;a href="https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act"&gt;https://cis-india.org/internet-governance/blog/mlats-and-the-proposed-amendments-to-the-us-electronic-communications-privacy-act&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; The term “human rights” has been defined in the Act as “rights relating to life, liberty, equality and dignity of the individual guaranteed by the Constitution or embodied in the International Covenants and enforceable by courts in India”.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 151, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;. .&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; A similar power of interception is available under section 5 of the Telegraph Act, 1885, but that extends only to interception of telegraphic communication and does not extend to communications exchanged through computer networks.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Explanatory Report to the Convention on Cybercrime, Para 244, &lt;a href="https://rm.coe.int/16800cce5b"&gt;https://rm.coe.int/16800cce5b&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act'&gt;https://cis-india.org/internet-governance/blog/budapest-convention-and-the-information-technology-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-20T16:18:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs">
    <title>Cyberspace and External Affairs:A Memorandum for India Summary</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs</link>
    <description>
        &lt;b&gt;This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides   a set of recommendations for the MEA as they craft their cyber diplomacy strategy.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;It limits itself to advocating certain procedural steps that the Ministry of External Affairs should take towards propelling  India forward as a leading voice in  the global cyber norms space and explains why occupying this leadership position should be a vital foreign policy priority. It does not delve into content-based recommendations at this stage.   Further, this memorandum is not meant to serve as exhaustive academic research on the subject but builds on previous research by the Centre for Internet &amp;amp; Society in this area to highlight key policy windows that can be driven by India.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;This memorandum provides  a background to global norms formation focussing on key global developments over the past month; traces the opportunities s for India  to play a lead role in the global norms formulation debate and then charts out process related recommendations on next steps towards India taking this forward.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyberspace-and-external-affairs"&gt;Click here&lt;/a&gt; to read more&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-and-elonnai-hickok-november-30-2018-cyberspace-and-external-affairs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-01T04:10:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">
    <title>A Critical Look at the Visual Representation of Cybersecurity</title>
    <link>https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual Representations of Cybersecurity. Images in the public sphere such as visuals in the media, Wikipedia commons, and stock images - play a vital role in the public’s perception of cybercrime and cybersecurity. &lt;/b&gt;
        
&lt;ul&gt;
&lt;li&gt;Edited by Karan Saini / Illustrations by - Paul Anthony George, and Roshan Shakeel&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download the &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity/"&gt;file here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The existing imagery comprises of largely stereotypical images of silhouettes of men in hoodies, binary codes, locks, shields; all in dark tones of blue and green. The workshop aimed at identifying the concerns with these existing images and ideating on creating visuals that capture the nuanced concepts within cybersecurity as well as to contextualise them for the Global South. It began with a discussion on the various concepts within cybersecurity including disinformation, surveillance in the name of security, security researchers, regulation of big technology companies, gender and cybersecurity, etc. This was followed by a mapping of different visual elements in the existing cybersecurity imagery to infer the biases in them. Further, an ideation session was conducted to create alternate visualisations that counter these biases. A detailed report of the workshop can be read &lt;a href="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants began by discussing the concerning impacts of present visualisations – there is a lack of representation and context of the global south. Misrepresentation of cybersecurity leads people to be susceptible to disinformation, treats cybercrime as an abstract concept that does not have a direct impact, and oversimplifies the problem and its solutions. The ecosystem in which this imagery exists also presented a larger issue. A majority of the images are created as clickbait alongside media articles. Media houses thus benefit from the oversimplification and mystification of cybersecurity in such images.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through the mapping of existing images present online, several concerns were identified. The vague elements and unclear representation add to the mystification of cybersecurity as a concept. In present depictions, the use of technological devices and objects, leads to the lack of a human element, distancing the threat from any real impact to people using these devices. The metaphor of a physical threat is often used to depict cybersecurity using elements such as a lock and key. Recurring use of these elements gives a false idea of what is being secured or breached and how. Representations rely on tropes regarding the identity of hackers, and fail to capture the vulnerability of the system. The imagery gives the impression that systems which are breached are immensely secure to begin with and are compromised&amp;nbsp; only as a result of sophisticated attacks carried out by malicious actors. The identity of hackers is commonly associated with cyber attacks and breaches, and the existing imagery reinforces this. Visuals showing a masked man or a silhouette of a man in dark background are the usual markers of a malicious hacker in conventional cybersecurity imagery. While there is a lack of representation of women in stock cybersecurity images, another trope found was that of a cheerful woman coder. There were also images of faceless women with laptops&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The reductive nature of these images point to deeper concerns around gender representation in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants examined what the implications of such visual representation would be, and why there is a need to change the imagery. How can visual depictions be more representative? Can they avoid subscribing to a homogenised idea of an Indian context – specific without being reductive? Can better depiction broaden understanding of cybercrime and emphasize the proximity of those threats? With technology, concepts are often understood through metaphors – how data is explained impacts how people perceive it. Visual imagery can play a critical role in demystifying concepts when done well; illustrations can change the discourse. They must begin to incorporate intersecting aspects of gender, privacy, susceptibility of vulnerable populations, generational and cultural gaps, as well as&amp;nbsp; manifestations of the described crimes to make technological laypersons more aware of the threat.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Potential new imagery would need to address aspects such as disinformation, the importance of privacy and who has a right to it, change representation of hackers, depict the cybersecurity community, explain specific concepts to both – the general user and to the people part of cybersecurity efforts in the country, the implications of cybercrime on vulnerable populations, and more in an attempt to deconstruct and disseminate what cybersecurity looks like today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ideation session involved rethinking specific concepts such as disinformation, and ethical hacking to create alternate imagery. For instance, disinformation was visually imagined as a distortion of an already distorted message being perceived by the viewer. In order to bring attention to the impact of devices, a phone was thought of as a central object to which different concepts of cybersecurity can be connected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/FakeNewsCascade.jpg" alt="null" class="image-inline" title="Fake News Cascade" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News Cascade’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/FakeNews.jpg" alt="null" class="image-inline" title="Fake News" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation1.jpg" alt="null" class="image-inline" title="Disinformation 1" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation2.jpg" alt="null" class="image-inline" title="Disinformation 2" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; The sketch is about questioning the validity of what we see online, and that every message we see is constructed in some form or the other by someone else.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/Disinformation3.jpg" alt="null" class="image-inline" title="Disinformation 3" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; &lt;/em&gt;The sketch visualizes how the source of information ('the original') gets distorted after a certain point.&lt;/p&gt;
&lt;p&gt;For ethical hacking, a visualisation depicting a day in the life of an ethical hacker was thought of to normalize hacking and to focus on their contribution in security research.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/ADayinLife.jpg" alt="null" class="image-inline" title="A Day in Life" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘A Day in the Life of an Indian Hacker’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg" alt="null" class="image-inline" title="Surveillance in the name of Security" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;'Surveillance in the Name of Security' by&lt;/em&gt; &lt;em&gt;Roshan Shakeel&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Resources on ethical hacking (HackerOne)&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; and hacker culture (2600.com)&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; were also consulted as part of the exercise to gather references on the work done by hackers. This allowed a deeper understanding of how the hacker community depicts itself.&amp;nbsp; Check Point Research&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; and Kerala Police Cyberdome&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; were also examined for further insight into cybersecurity.&amp;nbsp; With regard to gender representation, sources that use visual techniques to communicate concerns and advocacy campaigns were also referred to. The Gendering Surveillance&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; initiative by the Internet Democracy project&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt;, which looks at how surveillance harms and restricts women, also offered insights on the use of illustrations supporting the case studies. Another reference was the "Visualising Women's Rights in the Arab World"&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; project by the Tactical Technology Collective&lt;a name="_ftnref9" href="#_ftn10"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt;. The project aims to “strengthen the use of visual techniques by women's rights advocates in the Arab world, and to build a network of women with these skills”.&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More visual explainers and animations&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; from the Tactical Technology Collective were noted for their broader engagement with digital security and privacy. A video by the Internet Democracy Project that explains the Internet through &lt;em&gt;rangoli&lt;/em&gt;&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, was observed specifically for setting the concept in Indian context through the use of aesthetics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The workshop concluded with a discussion of potential visual iterations – imagery of cybersecurity that is not technology-oriented but focussed on the behavioural implications of access to such technology, illustrated public service announcements enhancing the profile of cybersecurity researchers or the everyday hacker. The impact of the discussion itself can indicate the relevance of such an effort. Artists and designers can be encouraged to create a body of imagery that shifts discourse and perception, to begin visualising for advocacy, demystify and stop the abstraction of cybercrime that can lead to a false sense of security, incorporate unique aspects of the debate within the Indian context, and generate new dialogue and understanding of cybersecurity. A potential step forward from this workshop would be to engage with the design community at large along with the domain experts to create more effective imagery for cybersecurity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.hackerone.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://2600.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://research.checkpoint.com/about-us/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.cyberdome.kerala.gov.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://genderingsurveillance.internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/index.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/content/about-website.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/projects/survival-in-the-digital-age-ono-robot-2012/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/2018/08/dots-and-connections/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.independent.co.uk/life-style/gadgets-and-tech/features/women-in-tech-its-time-to-drop-the-old-stereotypes-7608794.html&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu'&gt;https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-21T08:00:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law">
    <title>European E-Evidence Proposal and Indian Law</title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law</link>
    <description>
        &lt;b&gt;In April of 2018, the European Union issued the proposal for a new regime dealing with cross border sharing of data and information by issuing two draft instruments, an E-evidence Regulation (“Regulation”) and an E-evidence Directive (“Directive”), (together the “E-evidence Proposal”). The Regulation is a direction to states to put in place the proper legislative and regulatory machinery for the implementation of this regime while the Directive requires the states to enact laws governing service providers so that they would comply with the proposed regime.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The main feature of the E-evidence Proposal is twofold: (i) establishment of a legal regime whereunder competent authorities can issue European Production Orders (&lt;b&gt;EPOs&lt;/b&gt;) and European Preservation Orders (&lt;b&gt;EPROs&lt;/b&gt;) to entities in any other EU member country (together the “&lt;b&gt;Data Orders&lt;/b&gt;”); and (ii) an obligation on service providers offering services in any of the EU member countries to designate legal representatives who will be responsible for receiving the Data Orders, irrespective of whether such entity has an actual physical establishment in any EU member country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this article we will briefly discuss the framework that has been proposed under the two instruments and then discuss how service providers based in India whose services are also available in Europe would be affected by these proposals. The authors would like to make it clear that this article is not intended to be an analysis of the E-evidence Proposal and therefore shall not attempt to bring out the shortcomings of the proposed European regime, except insofar as such shortcomings may affect the service providers located in India being discussed in the second part of the article.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part I - E-evidence Directive and Regulation &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The E-evidence Proposal introduces the concept of binding EPOs and EPROs. Both Data Orders need to be issued or validated by a judicial authority in the issuing EU member country. A Data Order can be issued to seek preservation or production of data that is stored by a service provider located in another jurisdiction and that is necessary as evidence in criminal investigations or a criminal proceeding. Such Data Orders may only be issued if a similar measure is available for the same criminal offence in a comparable domestic situation in the issuing country. Both Data Orders can be served on entities offering services such as electronic communication services, social networks, online marketplaces, other hosting service providers and providers of internet infrastructure such as IP address and domain name registries. Thus companies such as Big Rock (domain name registry), Ferns n Petals (online marketplace providing services in Europe), Hike (social networking and chatting), etc. or any website which has a subscription based model and allows access to subscribers in Europe would potentially be covered by the E-evidence Proposal. The EPRO, similarly to the EPO, is addressed to the legal representative outside of the issuing country’s jurisdiction to preserve the data in view of a subsequent request to produce such data, which request may be issued through MLA channels in case of third countries or via a European Investigation Order (EIO) between EU member countries. Unlike surveillance measures or data retention obligations set out by law, which are not provided for by this proposal, the EPRO is an order issued or validated by a judicial authority in a concrete criminal proceeding after an individual evaluation of the proportionality and necessity in every single case.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Like the EPO, it refers to the specific known or unknown perpetrators of a criminal offence that has already taken place. The EPRO only allows preserving data that is already stored at the time of receipt of the order, not the access to data at a future point in time after the receipt of the EPRO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While EPOs to produce subscriber data&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and access data&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; can be issued for any criminal offence an EPO for content data&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and transactional data&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; may only be issued by a judge, a court or an investigating judge competent in the case. In case the EPO is issued by any other authority (which is competent to issue such an order in the issuing country), such an EPO has to be validated by a judge, a court or an investigating judge. In case of an EPO for subscriber data and access data, the EPO may also be validated by a prosecutor in the issuing country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To reduce obstacles to the enforcement of the EPOs, the Directive makes it mandatory for service providers to designate a legal representative in the European Union to receive, comply with and enforce Data Orders. The obligation of designating a legal representative for all service providers that are operating in the European Union would ensure that there is always a clear addressee of orders aiming at gathering evidence in criminal proceedings. This would in turn make it easier for service providers to comply with those orders, as the legal representative would be responsible for receiving, complying with and enforcing those orders on behalf of the service provider.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Grounds on which EPOs can be issued&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The grounds on which Data Orders may be issued are contained in Articles 5 and 6 of the Regulation which makes it very clear that a Data Order may only be issued in a case if it is necessary and proportionate for the purposes of a criminal proceeding. The Regulation further specifies that an EPO may only be issued by a member country if a similar domestic order could be issued by the issuing state in a comparable situation. By using this device of linking the grounds to domestic law, the Regulation tries to skirt around the thorny issue of when and on what basis an EPO may be issued. The Regulation also assigns greater weight (in terms of privacy) to transactional and content data as opposed to subscriber and access data and subjects the production and preservation of the former to stricter requirements. Therefore while Data Orders for access and subscriber data may be issued for any criminal offence, orders for transactional and content data can only be issued in case of criminal offences providing for a maximum punishment of atleast 3 years and above. In addition to that EPOs for producing transactional or content data can also be issued for offences specifically listed in Article 5(4) of the Regulation. These offences have been specifically provided for since evidence for such cases would typically be available mostly only in electronic form. This is the justification for the application of the Regulation also in cases where the maximum custodial sentence is less than three years, otherwise it would become extremely difficult to secure convictions in those offences.&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Regulation also requires the issuing authority to take into account potential immunities and privileges under the law of the member country in which the service provider is being served the EPO, as well as any impact the EPO may have on fundamental interests of that member country such as national security and defence. The aim of this provision is to ensure that such immunities and privileges which protect the data sought are respected, in particular where they provide for a higher protection than the law of the issuing member country. In such situations the issuing authority “has to seek clarification before issuing the European Production Order, including by consulting the competent authorities of the Member State concerned, either directly or via Eurojust or the European Judicial Network.”&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Grounds to Challenge EPOs&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Service Providers have been given the option to object to Data Orders on certain limited grounds specified in the Regulation such as, if it was not issued by a proper issuing authority, if the provider cannot comply because of a &lt;i&gt;de facto&lt;/i&gt; impossibility or &lt;i&gt;force majeure&lt;/i&gt;, if the data requested is not stored with the service provider or pertains to a person who is not the customer of the service provider.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In all such cases the service provider has to inform the issuing authority of the reasons for the inability to provide the information in the specified form. Further, in the event that the service provider refuses to provide the information on the grounds that it is apparent that the EPO “manifestly violates” the Charter of Fundamental Rights of the European Union or is “manifestly abusive”, the service provider shall send the information in specified Form to the competent authority in the member state in which the Order has been received. The competent authority shall then seek clarification from the issuing authority through Eurojust or via the European Judicial Network.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the issuing authority is not satisfied by the reasons given and the service provider still refuses to provide the information requested, the issuing authority may transfer the EPO Certificate along with the reasons given by the service provider for non compliance, to the enforcing authority in the addressee country. The enforcing authority shall then proceed to enforce the Order, unless it considers that the data concerned is protected by an immunity or privilege under its national law or its disclosure may impact its fundamental interests such as national security and defence; or the data cannot be provided due to one of the following reasons:&lt;/p&gt;
&lt;p&gt;(a) the European Production Order has not been issued or validated by an issuing authority as provided for in Article 4;&lt;/p&gt;
&lt;p&gt;(b) the European Production Order has not been issued for an offence provided for by Article 5(4);&lt;/p&gt;
&lt;p&gt;(c) the addressee could not comply with the EPOC because of de facto impossibility or force majeure, or because the EPOC contains manifest errors;&lt;/p&gt;
&lt;p&gt;(d) the European Production Order does not concern data stored by or on behalf of the service provider at the time of receipt of EPOC;&lt;/p&gt;
&lt;p&gt;(e) the service is not covered by this Regulation;&lt;/p&gt;
&lt;p&gt;(f) based on the sole information contained in the EPOC, it is apparent that it manifestly violates the Charter or that it is manifestly abusive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above mechanism the service provider may refuse to comply with an EPO on the ground that disclosure would force it to violate a third-country law that either protects “the fundamental rights of the individuals concerned” or “the fundamental interests of the third country related to national security or defence.” Where a provider raises such a challenge, issuing authorities can request a review of the order by a court in the member country. If the court concludes that a conflict as claimed by the service provider exists, the court shall notify authorities in the third-party country and if that third-party country objects to execution of the EPO, the court must set it aside.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A service provider may also refuse to comply with an order because it would force the service provider to violate a third-country law that protects interests &lt;i&gt;other than&lt;/i&gt; fundamental rights or national security and defense. In such cases, the Regulation provides that the same procedure be followed as in case of law protecting fundamental rights or national security and defense, except that in this case the court, rather than notifying the foreign authorities, shall itself conduct a detailed analysis of the facts and circumstances to decide whether to enforce the order.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;&lt;span&gt;Service Provider “Offering Services in the Union”&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As is clear from the discussion above, the proposed regime puts an obligation on service providers offering services in the Union to designate a legal representative in the European Union, whether the service provider is physically located in the European Union or not. This appears to be a fairly onerous obligation for small technology companies which may involve a significant cost to appoint and maintain a legal representative in the European Union, especially if the service provider is not located in the EU. Therefore the question arises as to which service providers would be covered by this obligation and the answer to that question lies in the definitions of the terms “service provider” and “offering services in the Union”.&lt;/p&gt;
&lt;p&gt;The term service provider has been defined in Article 2(2) of the Directive as follows:&lt;/p&gt;
&lt;p&gt;“‘service provider’ means any natural or legal person that provides one or more of the following categories of services:&lt;/p&gt;
&lt;p&gt;(a) electronic communications service as defined in Article 2(4) of [Directive establishing the European Electronic Communications Code];&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) information society services as defined in point (b) of Article 1(1) of Directive (EU) 2015/1535 of the European Parliament and of the Council&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for which the storage of data is a defining component of the service provided to the user, including social networks, online marketplaces facilitating transactions between their users, and other hosting service providers;&lt;/p&gt;
&lt;p&gt;(c) internet domain name and IP numbering services such as IP address providers, domain name registries, domain name registrars and related privacy and proxy services;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus broadly speaking the service providers covered by the Regulation would include providers of electronic communication services, social networks, online marketplaces, other hosting service providers and providers of internet infrastructure such as IP address and domain name registries, or on their legal representatives where they exist. An important qualification that has been added in the definition is that it covers only those services where “storage of data is a defining component of the service”. Therefore, services for which the storage of data is not a defining component are not covered by the proposal. The Regulation also recognizes that most services delivered by providers involve some kind of storage of data, especially where they are delivered online at a distance; and therefore it specifically provides that services for which the storage of data is not a &lt;i&gt;main characteristic&lt;/i&gt; and is thus only of an ancillary nature would not be covered, including legal, architectural, engineering and accounting services provided online at a distance.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This does not mean that all such service providers offering the type of services in which data storage is the main characteristic, in the EU, would be covered by the Directive. The term “offering services in the Union” has been defined in Article 2(3) of the Directive as follows:&lt;/p&gt;
&lt;p&gt;“‘offering services in the Union’ means:&lt;/p&gt;
&lt;p&gt;(a) enabling legal or natural persons in one or more Member State(s) to use the services listed under (3) above; and&lt;/p&gt;
&lt;p&gt;(b) having a substantial connection to the Member State(s) referred to in point (a);”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (b) of the definition is the main qualifying factor which would ensure that only those entities whose offering of services has a “substantial connection” which the member countries of the EU would be covered by the Directive. The Regulation recognizes that mere accessibility of the service (which could also be achieved through mere accessibility of the service provider’s or an intermediary’s website in the EU) should not be a sufficient condition for the application of such an onerous condition and therefore the concept of a “substantial connection” was inserted to ascertain a sufficient relationship between the provider and the territory where it is offering its services. In the absence of a permanent establishment in an EU member country, such a “substantial connection” may be said to exist if there are a significant number of users in one or more EU member countries, or the “targeting of activities” towards one or more EU member countries. The “targeting of activities” may be determined based on various circumstances, such as the use of a language or a currency generally used in an EU member country, the availability of an app in the relevant national app store, providing local advertising or advertising in the language used in an EU member country, making use of any information originating from persons in EU member countries in the course of its activities, or from the handling of customer relations such as by providing customer service in the language generally used in EU member countries. A substantial connection can also be assumed where a service provider directs its activities towards one or more EU member countries as set out in Article 17(1)(c) of Regulation 1215/2012 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part II - EU Directive and Service Providers located in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this part of the article we will discuss how companies based in India and running websites providing any “service” such as social networking, subscription based video streaming, etc. such as Hike or AltBalaji, Hotstar, etc. and how such companies would be affected by the E-evidence Proposal. At first glance a website providing a video streaming service may not appear to be covered by the E-evidence Proposal since one would assume that there may not be any storage of data. But if it is a service which allows users to open personal accounts (with personal and possibly financial details such as in the case of TVF, AltBalaji or Hotstar) and uses their online behaviour to push relevant material and advertisements to their accounts, whether that would make the storage of data a defining component of the website’s services as contemplated under the proposal is a question that may not be easy to answer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if it is assumed that the services of an Indian company can be classified as information society services for which the storage of data is a defining component, that by itself would not be sufficient to make the E-evidence Proposal applicable to it. The services of an Indian company would still need to have a “substantial connection” with an EU member country. As discussed above, this substantial connection may be said to exist based on the existence of (i) a significant number of users in one or more EU member countries, or (ii) the “targeting of activities” towards one or more EU member countries. The determination of whether a service provider is targeting its services towards an EU member country is to be made based on a number of factors listed above and is a subjective determination with certain guiding factors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There does not seem to be clarity however on what would constitute a significant number of users and whether this determination is to be based upon the total number of users in an EU member country as a proportion of the population of the country or is it to be considered as a proportion of the total number of customers the service provider has worldwide. To explain this further let us assume that an Indian company such as Hotstar has a total user base of 100 million customers.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; If there is a situation where 10 million of these 100 million subscribers are located in countries other than India, out of which there are about 40 thousand customers in France and another 40 thousand in Malta; then it would lead to some interesting analysis. Now 40 thousand customers in a customer base of 100 million is 0.04% of the total customer base of the service provider which generally speaking would not constitute a “significant number”. However if we reckon the 40 thousand customers from the point of view of the total population of the country of Malta, which is approximately 4.75 Lakh,&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; it would mean approx. 8.4% of the total population of Malta. It is unlikely that any service affecting almost a tenth of the population of the entire country can be labeled as not having a significant number of users in Malta. If the same math is done on the population of a country such as France, which has a population of approx. 67.3 million,&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; then the figure would be 0.05% of the total population; would that constitute a significant number as per the E-evidence Proposal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issues discussed above are very important for any service provider, specially a small or medium sized company since the determination of whether the E-evidence Proposal applies to them or not, apart from any potential legal implications, imposes a direct economic cost for designating a legal representative in an EU member country. Keeping in mind this economic burden and how it might affect the budget of smaller companies, the Explanatory Memorandum to the Regulation clarifies that this legal representative could be a third party, which could be shared between several service providers, and further the legal representative may accumulate different functions (e.g. the General Data Protection Regulation or e-Privacy representatives in addition to the legal representative provided for by the E-evidence Directive).&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case all the above issues are determined to be in favour of the E-evidence Directive being applicable to an Indian company and the company designates a legal representative in an EU member country, then it remains to be seen how Indian laws relating to data protection would interact with the obligations of the Indian company under the E-evidence Directive. As per Rule 6 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (“&lt;b&gt;SPDI Rules&lt;/b&gt;”) service providers are not allowed to disclose sensitive personal data or information except with the prior permission of the except disclosure to mandated government agencies. The Rule provides that “the information shall be shared, without obtaining prior consent from provider of information, with &lt;i&gt;Government agencies mandated under the law&lt;/i&gt; to obtain information including sensitive personal data or information for the purpose of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences….”. Although the term “government agency mandated under law” has not been defined in the SPDI Rules, the term “law” has been defined in the Information Technology Act, 2000 (“&lt;b&gt;IT Act&lt;/b&gt;”) as under:&lt;/p&gt;
&lt;p&gt;“’law’ includes any Act of Parliament or of a State Legislature, Ordinances promulgated by the President or a Governor, as the case may be. Regulations made by the President under article 240, Bills enacted as President's Act under sub-clause (a) of clause (1) of article 357 of the Constitution and includes rules, regulations, byelaws and orders issued or made thereunder;”&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the SPDI Rules are issued under the IT Act, therefore the term “law” referred as used in the would have to be read as defined in the IT Act (unless court holds to the contrary). This would mean that Rule 6 of the SPDI Rules only recognises government agencies mandated under Indian law and therefore information cannot be disclosed to agencies not recognised by Indian law. In such a scenario an Indian company may not have any option except to raise an objection and challenge an EPO issued to it on the grounds provided in Article 16 of the Regulation, which process itself could mean a significant expenditure on the part of such a company.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The framework sought to be established by the European Union through the E-evidence Proposal seeks to establish a regime different from those favoured by countries such as the United States which favours Mutual Agreements with (presumably) key nations or the push for data localisation being favoured by countries such as India, to streamline the process of access to digital data. Since the regime put forth by the EU is still only at the proposal stage, there may yet be changes which could clarify the regime significantly. However, as things stand Indian companies may be affected by the E-evidence Proposal in the following ways:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Companies offering services outside India may inadvertently trigger obligations under the E-evidence Proposal if their services have a substantial connection with any of the member states of the European Union;&lt;/li&gt;
&lt;li&gt;Indian companies offering services overseas will have to make an internal determination as to whether the E-evidence Proposal applies to them or not;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In case of Indian companies which come under the E-evidence Proposal, they would be obligated to designate a legal representative in an EU member state for receiving and executing Data Orders as per the E-evidence Proposal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If a legal representative is designated by the Indian company they may have to incur significant costs on maintaining a legal representative especially in a situation where they have to object to the implementation of an EPO. The company would also have to coordinate with the legal representative to adequately put forth their (Indian law related) concerns before the competent authority so that they are not forced to fall foul of their legal obligations in either jurisdiction. It is also unclear the extent to which appointed legal representatives from Indian companies could challenge or push back against requests received.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Disclaimer&lt;/span&gt;: The author of this Article is an Indian trained lawyer and not an expert on European law. The author would like to apologise for any incorrect analysis of European law that may have crept into this article despite best efforts.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Explanatory Memorandum to the Proposal for Regulation of the European Parliament and of the Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters, Pg. 4, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Subscriber data means data which is used to identify the user and has been defined in Article 2 (7) as follows:&lt;/p&gt;
&lt;p&gt;“‘subscriber data’ means any data pertaining to:&lt;/p&gt;
&lt;p&gt;(a) the identity of a subscriber or customer such as the provided name, date of birth, postal or geographic address, billing and payment data, telephone, or email;&lt;/p&gt;
&lt;p&gt;(b) the type of service and its duration including technical data and data identifying related technical measures or interfaces used by or provided to the subscriber or customer, and data related to the validation of the use of service, excluding passwords or other authentication means used in lieu of a password that are provided by a user, or created at the request of a user;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term access data has been defined in Article 2(8) as follows:&lt;/p&gt;
&lt;p&gt;“‘access data’ means data related to the commencement and termination of a user access session to a service, which is strictly necessary for the sole purpose of identifying the user of the service, such as the date and time of use, or the log-in to and log-off from the service, together with the IP address allocated by the internet access service provider to the user of a service, data identifying the interface used and the user ID. This includes electronic communications metadata as defined in point (g) of Article 4(3) of Regulation concerning the respect for private life and the protection of personal data in electronic communications;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term content data has been defined in Article 2 (10) as follows:&lt;/p&gt;
&lt;p&gt;“‘content data’ means any stored data in a digital format such as text, voice, videos, images, and sound other than subscriber, access or transactional data;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The term transactional data has been defined in Article 2(9) as follows:&lt;/p&gt;
&lt;p&gt;“‘transactional data’ means data related to the provision of a service offered by a service provider that serves to provide context or additional information about such service and is generated or processed by an information system of the service provider, such as the source and destination of a message or another type of interaction, data on the location of the device, date, time, duration, size, route, format, the protocol used and the type of compression, unless such data constitues access data. This includes electronic communications metadata as defined in point (g) of Article 4(3) of [Regulation concerning the respect for private life and the protection of personal data in electronic communications];”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Explanatory Memorandum to the Proposal for Regulation of the European Parliament and of the Council on European Production and Preservation Orders for Electronic Evidence in Criminal Matters, Pg. 17, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0225&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Articles 9(4) and 10(5) of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 10(5) of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 15 of the Regulation.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 16 of the Regulation. Also see &lt;a href="https://www.insideprivacy.com/uncategorized/eu-releases-e-evidence-proposal-for-cross-border-data-access/"&gt;https://www.insideprivacy.com/uncategorized/eu-releases-e-evidence-proposal-for-cross-border-data-access/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 2(4) of the Directive establishing European Electronic Communications Code provides as under:&lt;/p&gt;
&lt;p&gt;‘electronic communications service’ means a service normally provided for remuneration  via electronic communications networks,  which encompasses 'internet access service' as defined in Article 2(2) of Regulation (EU) 2015/2120; and/or 'interpersonal communications service'; and/or services consisting wholly or mainly in the conveyance of signals such as transmission services  used for the provision of machine-to-machine services and for broadcasting, but excludes services providing, or exercising editorial control over, content transmitted using electronic communications networks and services;”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Information Society Services have been defined in the Directive specified as “any Information Society service, that is to say, any service normally provided for remuneration, at a distance, by electronic means and at the individual request of a recipient of services.”&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 8, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 9, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hotstar already has an active customer base of 75 million, as of December, 2017; &lt;a href="https://telecom.economictimes.indiatimes.com/news/netflix-restricted-to-premium-subscribers-hotstar-leads-indian-ott-content-market/62351500"&gt;https://telecom.economictimes.indiatimes.com/news/netflix-restricted-to-premium-subscribers-hotstar-leads-indian-ott-content-market/62351500&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/Malta"&gt;https://en.wikipedia.org/wiki/Malta&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/France"&gt;https://en.wikipedia.org/wiki/France&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Proposal for a Directive of the European Parliament and of the Council Laying Down Harmonised Rules on the Appointment of Legal Representatives for the Purpose of Gathering Evidence in Criminal Proceedings, Pg 5, available at &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN"&gt;https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018PC0226&amp;amp;from=EN&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Section 2(y) of the Information Technology Act, 2000.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-december-23-2018-european-e-evidence-proposal-and-indian-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-23T16:45:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic">
    <title>Mapping cybersecurity  in India: An infographic</title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic</link>
    <description>
        &lt;b&gt;This infographic maps the key stakeholder, areas of focus and threat vectors that impact cybersecurity policy in India. Broadly, policy-makers should concentrate on establishing a framework where individuals feel secure and trust the growing digital ecosystem. The infographic therefore serves as a ready reference point for the research that we have done and hope to continue  through our cybersecurity work at CIS.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Infographic.png/@@images/e6749a54-8ea1-43d6-906c-224db9773dbe.png" alt="Infographic" class="image-inline" title="Infographic" /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;i&gt;Infographic designed by Saumyaa Naidu&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-karan-saini-aayush-rathi-and-swaraj-paul-barooah-december-23-mapping-cyber-security-in-india-infographic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu, Karan Saini, Aayush Rathi and Swaraj Barooah</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-23T16:57:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security">
    <title>Private-public partnership for cyber security </title>
    <link>https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security</link>
    <description>
        &lt;b&gt;Given the decentralised nature of cyberspace, the private sector will have to play a vital role in enforcing rules for security. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/private-public-partnership-for-cyber-security/article25821899.ece"&gt;Hindu Businessline&lt;/a&gt; on December 24, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On November 11, 2018, as 70 world leaders gathered in Paris to  commemorate the countless lives lost in World War I, French President  Emmanuel Macron inaugurated the Paris Peace Forum with a fiery speech  denouncing nationalism and urging global leaders to pursue peace and  stability through multilateral initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many ways, it  echoed US President Woodrow Wilson’s monumental speech delivered at the  US Senate a century ago in which he outlined 14 points on the principles  for peace post World War I. As history unkindly reminds us through the  catastrophic realities of World War II, Wilson’s principles went on to  be sacrificed at the altar of national self-interest and inadequate  multilateral enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;President Macron’s first initiative for  global peace — the Paris Call for Trust and Security in Cyber Space was  unveiled on November 12 — at the UNESCO Internet Governance Forum — also  taking place in Paris. The call was endorsed by over 50 states, 200  private sector entities, including Indian business guilds such as FICCI  and the Mobile Association of India and over 100 organisations from  civil society and academia from all over the globe. The text essentially  comprises a set of high-level principles that seeks to prevent the  weaponisation of cyberspace and promote existing institutional  mechanisms to “limit hacking and destabilising activities” in  cyberspace.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for private participation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Given the  increasing exploitation of the internet for reaping offensive dividends  by state and non-state actors alike and the prevailing roadblocks in the  multilateral cyber norms formulation process, Macron’s efforts are  perhaps of Wilsonian proportions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A key difference, however, was  that Macron’s efforts were devised hand-in-glove with Microsoft — one of  the most powerful and influential private sector actors of our time.  Microsoft’s involvement is unsurprising given that private entities have  become a critical component of the global cybersecurity landscape and  governments need to start thinking about how to optimise their  participation in this process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, one of the defining  features of cyberspace is its incompatibility with state-centric  ‘command and control’ formulae that lead to the ordering of other global  security regimes — such as nuclear non-proliferation. The decentralised  nature of cyberspace means that private sector actors play a vital role  in implementing the rules designed to secure cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Simultaneously,  private actors such as Microsoft have recognised the utility of clearly  defined ‘rules of the road’ which ensure certainty and stability in  cyberspace and ensure its trustworthiness among global customers.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Normative deadlock&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There  have been multiple gambits to develop universal norms of responsible  state behaviour to foster cyber stability. The United Nations-Group of  Governmental Experts (UN-GGE) has been constituted five times now and  will meet again in January 2019.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the third and fourth GGEs  in 2013 and 2015 respectively made some progress towards agreeing on  some baseline principles, the fifth GGE broke down due to opposition  from states including Russia, China and Cuba on the application of  specific principles of international law to cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was  an extension of a long-running ‘Cold War’ like divide among states at  the United Nations. The US along with its NATO allies believe in  creating voluntary non-binding norms for cybersecurity through the  application of international law in its entirety while Russia, China and  its allies in the Shanghai Co-operation Organization (SCO) reject the  premise that international law applies in its entirety and call for the  negotiation of an independent treaty for cyberspace that lays down  binding obligations on states.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Critical role&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The private  sector has begun to play a critical role in breaking this deadlock.  Recent history is testament to catalytic roles played by non-state  actors in cementing global co-operative regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example,  Dupont — the world’s leading ChloroFluoroCarbon (CFC) producer — played a  leading role in the 1970s and 1980s towards the development of The  Montreal Protocol on Substances that Deplete the Ozone Layer and gained  positive recognition for its efforts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another example is the  International Committee of the Red Cross (ICRC) — a non-governmental  organisation that played a crucial role in the development of the Geneva  Conventions and its Additional Protocols, which regulate the conduct of  atrocities in warfare by preparing initial drafts of the treaties and  circulating them to key government players.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in  cyberspace, Microsoft’s Digital Geneva Convention which devised a set of  rules to protect civilian use of the internet was put forward by Chief  Legal Officer, Brad Smith two months before the fifth GGE met in 2017.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite  the breakdown at the UN-GGE, Microsoft pushed on with the Tech Accords —  a public commitment made by (as of today) 69 companies “agreeing to  defend all customers everywhere from malicious attacks by cyber-criminal  enterprises and nation-states.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like the ICRC, Microsoft  leads commendable diplomatic efforts with the Paris Call as they reached  out to states, civil society actors and corporations for their  endorsement.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Looking Forward&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Private sector-led normative  efforts towards securing cyberspace are redundant in the absence of  three key recommendations. First, is the implementation of best  practices at the organisational level through the implementation of  robust cyber defense mechanisms, the detection and mitigation of  vulnerabilities and breach notifications — both to consumer and the  government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, is the development of mechanisms that enables  direct co-operation between governments and private actors at the  domestic level. In India, a Joint Working Group between the Data  Security Council of India (DSCI) and the National Security Council  Secretariat (NSCS) was set up in 2012 to explore a Private Public  Partnership on cyber-security in India , which has great potential but  is yet to report any tangible outcomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third and final point  is the recognition that their efforts need to result in a plurality of  states coming to the negotiating table. The absence of the US, China and  Russia in the Paris Call are eerily reminiscent of the lack of US  participation in Woodrow Wilson’s League of Nations, which was one of  the reasons for its ultimate failure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft needs to keep on calling with Paris but Beijing, Washington and Alibaba need to pick up.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security'&gt;https://cis-india.org/internet-governance/blog/arindrajit-basu-hindu-businessline-december-24-2018-private-public-partnership-for-cyber-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:02:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-china-tech-forum">
    <title>India-China Tech Forum 2018</title>
    <link>https://cis-india.org/internet-governance/news/india-china-tech-forum</link>
    <description>
        &lt;b&gt;Arindrajit Basu spoke at the India-China Tech Forum 2018 organised by ORF and Peking University at the Ji Xianlin Centre for India-China Studies, Mumbai on December 11 - 12, 2018. The event functioned as a bi-annual dialogue that fosters co-operation in this space between the two countries.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;Arindrajit spoke on the panel 'India, China and the future of cyber norms' along with Saravjit Singh,Liu Ke and Weng Wejia. This was a closed door discussion under Chatham House rules. Click &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/india-china-tech-forum-2018"&gt;here&lt;/a&gt; to read the agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-china-tech-forum'&gt;https://cis-india.org/internet-governance/news/india-china-tech-forum&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-12-26T15:32:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle">
    <title>Is the new ‘interception’ order old wine in a new bottle?</title>
    <link>https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle</link>
    <description>
        &lt;b&gt;The government could always authorise intelligence agencies to intercept and monitor communications, but the lack of clarity is problematic.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;An opinion piece co-authored by Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare was published in &lt;a class="external-link" href="https://www.newslaundry.com/2018/12/27/is-the-new-interception-order-old-wine-in-a-new-bottle"&gt;Newslaundry.com&lt;/a&gt; on December 27, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;On December 20, 2018, through an &lt;a href="http://egazette.nic.in/WriteReadData/2018/194066.pdf" target="_blank"&gt;order&lt;/a&gt; issued by the Ministry of Home Affairs (MHA), 10 security  agencies—including the Intelligence Bureau, the Central Bureau of  Investigation, the Enforcement Directorate and the National  Investigation Agency—were listed as the intelligence agencies in India  with the power to intercept, monitor and decrypt "any information"  generated, transmitted, received, or stored in any computer under Rule 4  of the Information Technology (Procedure and Safeguards for  Interception, Monitoring and Decryption of Information) Rules, 2009,  framed under section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 21, the Press Information Bureau published a &lt;a href="http://www.pib.nic.in/PressReleseDetail.aspx?utm_campaign=fullarticle&amp;amp;utm_medium=referral&amp;amp;PRID=1556945" target="_blank"&gt;press release&lt;/a&gt; providing clarifications to the previous day’s order. It said the  notification served to merely reaffirm the existing powers delegated to  the 10 agencies and that no new powers were conferred on them.  Additionally, the release also stated that “adequate safeguards” in the  IT Act and in the Telegraph Act to regulate these agencies’ powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presumably,  these safeguards refer to the Review Committee constituted to review  orders of interception and the  prior approval needed by the Competent  Authority—in this case, the secretary in the Ministry of Home Affairs in  the case of the Central government and the secretary in charge of the  Home Department in the case of the State government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in  the press release, the government has always had the power to authorise  intelligence agencies to submit requests to carry out the interception,  decryption, and monitoring of communications, under Rule 4 of the  Information Technology (Procedure and Safeguards for Interception,  Monitoring and Decryption of Information) Rules, 2009, framed under  section 69(1) of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering the implications of  this notification, it is important to look at it in the larger framework  of India’s surveillance regime, which is made up of a set of provisions  found across multiple laws and operating licenses with differing  standards and surveillance capabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 5(2) of the  Indian Telegraph Act, 1885 allows the government (or an empowered  authority) to intercept or detain transmitted information on the grounds  of a public emergency, or in the interest of public safety if satisfied  that it is necessary or expedient so to do in the interests of the  sovereignty and integrity of India, the security of the State, friendly  relations with foreign states or public order or for preventing  incitement to the commission of an offence. This is supplemented by Rule  419A of the Indian Telegraph Rules, 1951, which gives further  directions for the interception of these messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;-  Condition 42 of the &lt;a href="http://www.dot.gov.in/sites/default/files/DOC270613-013.pdf" target="_blank"&gt;Unified Licence for Access Services&lt;/a&gt;,  mandates that every telecom service provider must facilitate the  application of the Indian Telegraph Act. Condition 42.2 specifically  mandates that the license holders must comply with Section 5 of the same  Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 69(1) of the Information Technology Act and  associated Rules allows for the interception, monitoring, and decryption  of information stored or transmitted  through any computer resource if  it is found to be necessary or expedient to do in the interest of the  sovereignty or integrity of India, defense of India, security of the  State, friendly relations with foreign States or public order or for  preventing incitement to the commission of any cognizable offence  relating to above or for investigation of any offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section  69B of the Information Technology Act and associated Rules empowers the  Centre to authorise any agency of the government to monitor and collect  traffic data “to enhance cyber security, and for identification,  analysis, and prevention of intrusion, or spread of computer contaminant  in the country”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Section 92 of the CrPc allows for a Magistrate or Court to order access to call record details.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notably,  a key difference between the IT Act and the Telegraph Act in the  context of interception is that the Telegraph Act permits interception  for preventing incitement to the commission of an offence on the  condition of public emergency or in the interest of public safety while  the IT Act permits interception, monitoring, and decryption  of any  cognizable offence relating to above or for investigation of any  offence. Technically, this difference in surveillance capabilities and  grounds for interception could mean that different intelligence agencies  would be authorized to carry out respective surveillance capabilities  under each statute. Though the Telegraph Act and the associated Rule  419A do not contain an equivalent to Rule 4—&lt;a href="https://mha.gov.in/MHA1/Par2017/pdfs/par2013-pdfs/ls-110214/294.pdf" target="_blank"&gt;nine Central Government agencies and one State Government agency&lt;/a&gt; have previously been authorized under the Act. The Central Government  agencies authorised under the Telegraph Act are the same as the ones  mentioned in the December 20 notification with the following  differences:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the Telegraph Act, the Research and Analysis  Wing (RAW) has the authority to intercept. However, the 2018  notification more specifically empowers  the Cabinet Secretariat of RAW  to issue requests for interception under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- Under the  Telegraph Act, the Director General of Police, of concerned  state/Commissioner of Police, Delhi for Delhi Metro City Service Area,  has the authority to intercept. However, the 2018 notification  specifically authorises  the Commissioner of Police, New Delhi with the  power to issue requests for interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That said, the&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" target="_blank"&gt; IT (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009 &lt;/a&gt;under  69B of the IT Act  contain a provision similar to Rule 4 of the IT  (Procedure and Safeguards for Interception, Monitoring and Decryption of  Information) Rules, 2009 - allowing the government to authorize  agencies that can monitor and collect traffic data.  In 2016, the  Central Government &lt;a href="http://meity.gov.in/writereaddata/files/69B%20Notification%20-April%202016.pdf" target="_blank"&gt;authorised&lt;/a&gt; the Indian Computer Emergency Response Team to monitor and collect  traffic data, or information generated, transmitted, received, or stored  in any computer resource. This was an exercise of the power conferred  upon the Central Government by Section 69B(1) of the IT Act. However,  this notification does not reference Rule 4 of the IT Rules, thus it is  unclear if a  similar notification has been issued under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  it is accurate that the order does not confer new powers, areas of  concern that existed with India’s surveillance regime continue to remain  including the question of whether 69(1) and 69B and associated Rules  are &lt;a href="https://thewire.in/government/narendra-modi-snooping-it-act-home-ministry" target="_blank"&gt;constitutionally&lt;/a&gt; valid, the lack of t&lt;a href="https://cis-india.org/internet-governance/blog/transparency-in-surveillance" target="_blank"&gt;ransparency&lt;/a&gt; by the government and the prohibition of transparency by service providers, &lt;a href="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations" target="_blank"&gt;heavy handed &lt;/a&gt;penalties on service providers for non-compliance, and a lack of legal backing and &lt;a href="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance" target="_blank"&gt;oversight&lt;/a&gt; mechanisms for intelligence agencies. Some of these could be addressed  if the draft Data Protection Bill 2018 is enacted and the Puttaswamy  Judgement fully implemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MHA’s  order and the press release thereafter have served to  publicise and  provide needed clarity with respect to the powers vested in which  intelligence agencies in India under section 69(1) of the IT Act.  This  was previously unclear and could have posed a challenge to ensuring  oversight and accountability of actions taken by intelligence agencies  issuing requests under section 69(1) .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The publishing of the list  has subsequently served to raise questions and create a debate about key  issues concerning privacy, surveillance and state overreach. On &lt;a href="https://barandbench.com/ministry-of-home-affairs-surveillance-order-challenged-in-supreme-court/" target="_blank"&gt;December 24&lt;/a&gt;,  the order was challenged by advocate ML Sharma on the grounds of it  being illegal, unconstitutional and contrary to public interest. Sharma  in his contention also stated the need for the order to be tested on the  basis of the right to privacy established by the Supreme Court in  Puttaswamy which laid out the test of necessity, legality, and  proportionality. According to this test, any law that encroaches upon  the privacy of the individual will have to be justified in the context  of the right to life under Article 21.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there are also other  questions that exist. India has multiple laws enabling its surveillance  regime and though this notification clarifies which intelligence  agencies can intercept under the IT Act, it is still seemingly unclear  which intelligence agencies can monitor and collect traffic data under  the 69B Rules. It is also unclear what this order means for past  interceptions that have taken place by agencies on this list or agencies  outside of this list under section 69(1) and associated Rules of the IT  Act. Will these past interceptions possess the same evidentiary value  as interceptions made by the authorised agencies in the order?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle'&gt;https://cis-india.org/internet-governance/blog/newslaundry-elonnai-hickok-vipul-kharbanda-shweta-mohandas-and-pranav-bidare-december-27-2018-is-the-new-interception-order-old-wine-in-a-new-bottle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vipul Kharbanda, Shweta Mohandas and Pranav M. Bidare</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2018-12-29T16:02:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity">
    <title>Economics of Cybersecurity: Literature Review Compendium</title>
    <link>https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity</link>
    <description>
        &lt;b&gt;The twenty first century has witnessed an unprecedented conflation of everyday experiences and technosocial practices. The emergence of technologies like the Internet of Things, Cloud Computing, Digital Payment infrastructures are all emblematic of this conflation of technology with economic, social and political modes of existence.&lt;/b&gt;
        
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Authored by Natallia Khaniejo and edited by Amber Sinha&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Politics and economics are increasingly being amalgamated with Cybernetic frameworks and consequently Critical infrastructure has become intrinsically dependent on Information and Communication Technology (ICTs). The rapid evolution of technological platforms has been accompanied by a concomitant rise in the vulnerabilities that accompany them. Recurrent issues include concerns like network externalities, misaligned incentives and information asymmetries. Malignant actors use these vulnerabilities to breach secure systems, access and sell data, and essentially destabilize cyber and network infrastructures. Additionally, given the relative nascence of the realm, establishing regulatory policies without limiting innovation in the space becomes an additional challenge as well. The lack of uniform understanding regarding the definition and scope of what can be defined as Cybersecurity also serves as a barrier preventing the implementation of clear guidelines. Furthermore, the contrast between what is convenient and what is ‘sanitary’ in terms of best practices for cyber infrastructures is also a constant tussle with recommendations often being neglected in favor of efficiency. In order to demystify the security space itself and ascertain methods of effective policy implementation, it is essential to take stock of current initiatives being proposed for the development and implementation of cybersecurity best practices, and examine their adequacy in a rapidly evolving technological environment. This literature review attempts to document the various approaches that are being adopted by different stakeholders towards incentivizing cybersecurity and the economic challenges of implementing the same.&lt;/p&gt;
&lt;p style="text-align: justify;" class="moz-quote-pre"&gt;Click on the below links to read the entire story:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-i"&gt;Economics of Cybersecurity Part I&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-ii"&gt;Economics of Cybersecurity Part II&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iii"&gt;Economics of Cybersecurity Part III&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/economics-of-cyber-security-part-iv"&gt;Economics of Cybersecurity Part IV&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity'&gt;https://cis-india.org/internet-governance/blog/natalia-khaniejo-december-31-2018-economics-of-cybersecurity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natallia Khaniejo</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-01T06:09:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong">
    <title>CIS Cybersecurity Series (Part 6) - Lhadon Tethong</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong</link>
    <description>
        &lt;b&gt;CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"In authoritarian states, and in this case, in Tibet, I think that every person that we can teach and pass knowledge to, that can help them stay out of jail, stay in the streets, for one, two, three days longer, one week longer, that is a valuable time of time and resources. And I think we cannot rely on only tools and technology solutions to protect people. I think we can't just rely on government policies at the highest levels, and on export controls... the approach to digital security has to be comprehensive and we have to engage citizens. And not just in cases like the Tibetans or for activists or for people living under repression, but for people in free and open societies too." -  Lhadon Tethong, Tibetan human rights activist.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its sixth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Lhadon Tethong, Tibetan human rights activist. Lhadon is the Director of the Tibet Action Institute, where she leads a team of technologists and human rights advocates in developing and advancing open-source communication technologies, nonviolent strategies and innovative training programs for Tibetans and other groups facing heavy repression and human rights abuses.&lt;/p&gt;
&lt;p&gt;Link for Tibet Action Institute: &lt;a href="https://tibetaction.net/"&gt;https://tibetaction.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RzlvdY_DAe8" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs">
    <title>CIS Cybersecurity Series (Part 11) - Anja Kovacs</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs</link>
    <description>
        &lt;b&gt;CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"Having the cyber security debate become more and more important was a real challenge for civil society. I think in part because many of us who were&amp;nbsp;focused&amp;nbsp;on human rights aren't necessarily techies. And so, when you have a conversation with a government bureaucrat,&amp;nbsp;and ask questions about the kind of decisions they decided to take, very often they will come up with a technical answer in response. And then, if you don't have that expertise, it is difficult to react. In the meantime though, I think it has become clear that this is one of the biggest issues in the internet field at the moment. It is also one of the big issues that is driving the desires of governments to have a bigger role to play in internet&amp;nbsp;governance. So it is an area that is unavoidable for activists. What has happened slowly is that we have come to realize that the first thing, as in most other areas, is not the technical details, but principles, and those&amp;nbsp;principles&amp;nbsp;are fairly similar to how they are in many other fields." - Anja Kovacs, Internet Democracy Project&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eleventh installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Anja Kovacs, director of the Internet Democracy Project. Her&amp;nbsp;work focuses on a wide range of questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. Anja is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;(Bio from internetdemocracy.in)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Internet Democracy Project homepage:&amp;nbsp;http://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;iframe src="//www.youtube.com/embed/uWH2oup6ND8" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-10-15T15:25:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws">
    <title>National Seminar on Cyber Security &amp; Cyber Laws - Issues and Concerns</title>
    <link>https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram was a panelist at this seminar organized by the Advanced Centre for Research, Development &amp; Training in Cyber Laws &amp; Forensics on December 27 and 28, 2014 at the National Law School of India University in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sharath was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". He  spoke about 'multi-stakeholderim in cyber security and CERT programs of nations'.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PROGRAMME SCHEDULE &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 1 - 27&lt;sup&gt;th&lt;/sup&gt; December 2014 &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:00- 10:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;REGISTRATION&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;10:00- 11:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;INAUGURAL &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Welcome &amp;amp; Introduction:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt; Seminar Director&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Inaugural Address:&lt;b&gt; Shri. Pratap Reddy,&lt;/b&gt; IPS, IGP, Internal Security Division, Karnataka Police, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Key Note Address:&lt;b&gt; Dr. R. Venkata Rao, &lt;/b&gt;Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Vote of Thanks:&lt;b&gt; Dr. T. V. Subba Rao, &lt;/b&gt;Senior Professor, NLSIU&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00-11:45&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;GROUP PHOTO &amp;amp; TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;11:45-01:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PLENARY&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt; &lt;/b&gt;&lt;b&gt;"MULTI-DISCIPLINARY CHALLENGES IN ENSURING CYBER SECURITY"&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Mr. Subrahmanya Boda, &lt;/b&gt; CISO, GMR&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Mr. Sunil Varkey, &lt;/b&gt; CISO, WIPRO&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Mr. Ramesh Kauta&lt;/b&gt; , CISO, GE [India]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Mr. T T Thomas, &lt;/b&gt; CTO Synergia Technologies,&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Rahul Matthan, &lt;/b&gt; Partner, Trilegal.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan), &lt;/b&gt; Researcher at Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Mr. Srinivas P, &lt;/b&gt; CISO, Infosys &amp;amp; Anchor, DSCI Bangalore Chapter [Moderator of the session]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:00-02:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:00-03:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;03:30-04:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 3&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 4&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;6:00 to 7. 00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;CULTURAL EVENING &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Venue: Quad, Academic Block &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 2 - 28&lt;sup&gt;th&lt;/sup&gt; December 2014&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;08:00-09:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;BREAK FAST&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:30- 11:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 5&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 6&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Technical Session 7&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00- 11:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:30-1:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 8&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 9&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 10&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:30-02:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:30-03. 45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;PLENARY&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SESSION&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt;"SECURING CYBER SPACE THROUGH INSTITUTIONAL INVOLVEMENT" &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Dr. Kamble, &lt;/b&gt;Director, Computer Emergency Response Team [CERT] India, Dept of Electronics &amp;amp; IT, Ministry of IT, 					Government of India&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Dr. S.B.N. Prakash, &lt;/b&gt;Senior Professor of Law, NLSIU&lt;/p&gt;
&lt;p&gt;3. &lt;b&gt;Mr. Naa Vijay Shankar,&lt;/b&gt; Cyber Law Consultant, Bangalore&lt;/p&gt;
&lt;p&gt;4. &lt;b&gt;Mr. Balasubramanya, &lt;/b&gt;Vice President, Tata Consultancy Services, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Ranganath,&lt;/b&gt; Delivery Project Executive, IBM, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Mr. Venkatesh Murthy, &lt;/b&gt; Senior Manager, Cyber Forensics, Data Security Council of India [DSCI], Bangalore.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;b&gt;Mr. M. D. Sharath, &lt;/b&gt;Dy. S. P., Cyber Police, Bangalore&lt;/p&gt;
&lt;p&gt;8. &lt;b&gt;Dr. Nagarathna. A.,&lt;/b&gt; Senior Assistant Prof of Law, NLSIU [Moderator]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;3. 45 to 4. 00 &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:00 AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;VALEDICTORY SESSION &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seminar Resolutions:&lt;b&gt; Dr. T. V. Subba Rao, Senior Professor, NLSIU&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Valedictory Address &amp;amp; Distribution of Certificates: : &lt;b&gt;Dr. R. Venkata Rao,&lt;/b&gt; Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;Vote of thanks:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt;Seminar Director&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws'&gt;https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-31T02:04:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues">
    <title>Bali meet to discuss Internet governance issues</title>
    <link>https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues</link>
    <description>
        &lt;b&gt;Four-day event hosted by Internet Governance Forum to also discuss Internet access and diversity, privacy, security.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/nSMWfhzTld5AHD3lJFrv3L/Bali-meet-to-discuss-Internet-governance-issues.html"&gt;published in Livemint&lt;/a&gt; on October 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Representatives of governments around the world,  technology executives and activists will discuss issues such as Internet  access and diversity, privacy, security, inter-governmental  corporation, and Internet governance at a four-day event hosted by the  Internet Governance Forum (IGF) that begins on Tuesday in Bali,  Indonesia.&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;J. Satyanarayana&lt;/a&gt;&lt;/span&gt;,  secretary, ministry of communications and information technology,  confirmed India’s participation in the forum and said the country would  be represented by Dr Govind, a senior director and head of department,  e-infrastructure and Internet governance division, department of  information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  will also be taking part in a working group on Internet governance and  enhanced cooperation, which will be convened by the United Nations  Commission on Science and Technology for Development in November,” said  Satyanarayana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“IGF  is a valuable learning forum wherein different stakeholders can discuss  Internet governance policy issues without any antagonism. Other fora for  Internet policy like ICANN, WIPO (World Intellectual Property  Organization), ITU (International Telecommunication Union), etc., are  places where international law and policy are developed, and do not  allow for such learning because negotiations are always very  acrimonious. Since IGF is only meant for learning, it does not directly  address the global policy vacuum that exists for cyber crime, data  protection and privacy,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based Centre for Internet and Society, who will be participating in the Bali event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Indian  government, private sector, civil society, technical and academic  community can become more competent and effective through such a  dialogue in other multilateral and multi-stakeholder fora where  international Internet standards, policies and laws are formulated. It  also helps the stakeholders contribute to the development of  internationally interoperable domestic policy,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2006, the UN secretary general established a small secretariat in Geneva  to assist him in the convening of IGF. The first meeting was convened  in October-November 2006 in Athens. In December 2010, IGF’s mandate was  extended for five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its  eighth edition, IGF will have detailed discussions on issues such as  free flow of information on the Internet, regulatory approaches to  privacy, and protection of interests of individuals and communities in  cyberspace, Internet surveillance and legal framework for cyber crime,  said the forum in a statement on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the four-event, for instance, one of the workshops “will explore what  core principles and strategies are needed to achieve a balanced and fair  approach to data protection that is effective internationally and  regionally”, according to IGF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the prominent speakers in the event include &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Jari%20Arkko"&gt;Jari Arkko&lt;/a&gt;&lt;/span&gt;, chairman, Internet Engineering Task Force, Finland; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Virat%20Bhatia"&gt;Virat Bhatia&lt;/a&gt;&lt;/span&gt;, president, South Asia, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/AT&amp;amp;T%20Inc."&gt;AT&amp;amp;T Inc.&lt;/a&gt;&lt;/span&gt;; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Chris%20Painter"&gt;Chris Painter&lt;/a&gt;&lt;/span&gt;, coordinator for cyber issues, US department of state; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Karen%20Mulberry"&gt;Karen Mulberry&lt;/a&gt;&lt;/span&gt;, policy adviser, Internet Society; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Matthew%20Shears"&gt;Matthew Shears&lt;/a&gt;&lt;/span&gt;, director of Internet policy and human rights, Center for Democracy and Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to industry estimates, over 2.5 billion Internet users interact in  shared cross-border online spaces where they can post content  potentially accessible worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No  clear frameworks exist yet to handle the tensions between these  competing normative orders or values and enable peaceful cohabitation in  cross-border cyberspace. This challenge constitutes a rare issue of  common concern for all stakeholder groups,” said IGF on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to a UN estimate, nearly 40% of the world’s population will be online  by the end of 2013. “The Internet has become an essential tool for the  creation of jobs and the delivery of basic public services,” said the UN  undersecretary-general for economic and social affairs, &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Wu%20Hungbo"&gt;Wu Hungbo&lt;/a&gt;&lt;/span&gt;,  in a statement, adding that it is also essential “for improving access  to knowledge and education, for empowering women, for enhancing  transparency, and for giving marginalized populations a voice in  decision-making processes”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues'&gt;https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T08:29:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
