<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 141 to 155.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/aprja-net-researching-bwpwap-nishant-shah-back-when-the-past-had-a-future"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/access-to-knowledge-in-market-place"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/cis-closing-statement-marrakesh-treaty-for-the-blind"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/indian-language-wikipedia-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/are-indian-consumers-laws-ready-for-digital-age"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india">
    <title>Accessible Broadcasting in India</title>
    <link>https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india</link>
    <description>
        &lt;b&gt;The abridged version of International Telecommunication Union's "Making Television Accessible" Report which we published last year has been broadened in scope and is now called "Accessible Broadcasting in India" report.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This is an updated version of the draft that was first put up for comments on October 8, 2012. &lt;a class="external-link" href="http://www.itu.int/ITU-D/sis/PwDs/Documents/ITU-G3ict Making_TV_Accessible_Report_November_2011.pdf"&gt;Read&lt;/a&gt; the full report published by ITU.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Television and Radio are mediums to inform, educate and entertain. Sitting down at the end of the day and turning on the TV or radio is a rather involuntary task for many. They have become part of the fabric of almost every Indian’s life. However, there are a significant number of people in India who are unable to enjoy TV or Radio.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Television and Radio technologies have advanced at a rapid pace but accessibility of TV and Radio in India has been a persistent problem. Being mediums that are consumed through sight and sound, those with impairments in these two areas have found TV viewing and radio listening difficult or impossible. Not much progress has been made in the area of Accessible Broadcasting since the introduction of the TV “Weekly News Bulletin for the hearing impaired” in 1987.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this report&lt;i&gt; &lt;/i&gt;is to provide information to Indian policymakers about various TV and Radio Accessibility options available, best practices followed internationally and suggest recommendations for a brighter future in the area of Accessible Broadcasting.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;This report is based on ITU’s “Making Television Accessible Report” (November 2011) by Peter Olaf Looms, Chairman ITU-T Focus Group on Audiovisual Media Accessibility. It has been adapted especially to cater to the needs and interests of India. We’d like to thank ITU for the use of this report and Peter Olaf Looms for his inputs to this abridged version. &lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;This abridged report specifically covers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; TV Accessibility Options&lt;/li&gt;
&lt;li&gt;Costs Involved &amp;amp; Bandwidth Requirements&lt;/li&gt;
&lt;li&gt;Best Practices followed internationally&lt;/li&gt;
&lt;li&gt;Radio Accessibility Options&lt;/li&gt;
&lt;li&gt;Recommendations.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india.pdf" class="internal-link"&gt;Download the abridged report&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india'&gt;https://cis-india.org/accessibility/blog/accessible-broadcasting-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>srividya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2013-01-28T05:28:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/aprja-net-researching-bwpwap-nishant-shah-back-when-the-past-had-a-future">
    <title>Back When the Past had a Future: Being Precarious in a Network Society</title>
    <link>https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/aprja-net-researching-bwpwap-nishant-shah-back-when-the-past-had-a-future</link>
    <description>
        &lt;b&gt;We live in Network Societies. This phrase has been so bastardised to refer to the new information turn mediated by digital technologies, that we have stopped paying attention to what the Network has become. Networks are everywhere. They have become the default metaphor of our times, where everything from infrastructure assemblies to collectives of people, are all described through the lens of a network.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Nishant Shah was published in a peer-reviewed newspaper &lt;a class="external-link" href="http://www.aprja.net/wp-content/uploads/2013/01/researching_bwpwap_large.pdf"&gt;Researching BWPWAP&lt;/a&gt;. The write-up is on Page 3.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We are no longer just human beings living in socially connected, politically identified communities. Instead, we have become actors, creating archives of traces and transactions, generating traffic and working as connectors in the ever expanding fold of the network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The network is an opaque metaphor, conflating description and explanation. So it becomes the object to be studied, the originary context that produces itself, and the explanatory framework that accounts for itself. In other words, the network was our past – it gives us an account of who we were, it is our present – it defines the context of all our activities, and it is our future – where we do everything to support the network because it is the only future that we can imagine for ourselves. It is this flattening characteristic of networks that are diagrammatically mapped, cartographically reproduced, and presented outside of and oblivious to temporality, that produces a condition of the future that can no longer be imagined through our everyday lives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Networks neither promise nor deliver a flattened utopia of coexistence and decentralised power. Networks are, in fact, quite aware of the structures of inequity and conditions of privilege they create and perpetuate: the only way to recognise the existence of a network is to be outside of it, the only aspiration to belong to a network is to be kept outside of it when you recognise it. Networks create themselves as simultaneously ubiquitous and scarce, of everpresent and ephemeral, creating a new ontology for our being human – an ontology of precariousness, contingent upon erasure of our histories, archives of our present, and unimaginable futures; futures we are not ready for, and don’t have strategies to occupy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I remember the times, before networks became the default conditions of being human, when kids, negotiating the variegated temporalities of their past-present-futures, would often begin their speculations on future, by saying, "When I grow up...". In that hope of growing up, was the potential for radical political action, the possibility of social reconstruction. In network societies, though, time has no currency. It has been replaced by attentions, flows of information and actions, and do not offer a tomorrow to grow into.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no future to help mitigate the exigencies of the present. And with the overwhelming emphasis on archiving the present, there is no more a coherent future that can be accounted for in the vocabulary that the network develops to explain itself, and the hypothetical world outside it.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/aprja-net-researching-bwpwap-nishant-shah-back-when-the-past-had-a-future'&gt;https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/aprja-net-researching-bwpwap-nishant-shah-back-when-the-past-had-a-future&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Habits of Living</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2013-02-12T06:16:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A">
    <title>Arbitrary Arrests for Comment on Bal Thackeray's Death</title>
    <link>https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A</link>
    <description>
        &lt;b&gt;Two girls have been arbitrarily and unlawfully arrested for making comments about the late Shiv Sena supremo Bal Thackeray's death.  Pranesh Prakash explores the legal angles to the arrests.&lt;/b&gt;
        &lt;h2 id="facts-of-the-case"&gt;Facts of the case&lt;/h2&gt;
&lt;p&gt;This morning, there was &lt;a href="http://www.mumbaimirror.com/article/2/2012111920121119043152921e12f57e1/In-Palghar-cops-book-21yearold-for-FB-post.html"&gt;a short report in the Mumbai Mirror&lt;/a&gt; about two girls having been arrested for comments one of them made, and the other 'liked', on Facebook about Bal Thackeray:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Police on Sunday arrested a 21-year-old girl for questioning the total shutdown in the city for Bal Thackeray’s funeral on her Facebook account. Another girl who ‘liked’ the comment was also arrested.&lt;/p&gt;
&lt;p&gt;The duo were booked under Section 295 (a) of the IPC (for hurting religious sentiments) and Section 64 (a) of the Information Technology Act, 2000. Though the girl withdrew her comment and apologised, a mob of some 2,000 Shiv Sena workers attacked and ransacked her uncle’s orthopaedic clinic at Palghar.&lt;/p&gt;
&lt;p&gt;“Her comment said people like Thackeray are born and die daily and one should not observe a bandh for that,” said PI Uttam Sonawane.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="what-provisions-of-law-were-used"&gt;What provisions of law were used?&lt;/h2&gt;
&lt;p&gt;There's a small mistake in Mumbai Mirror's reportage as there is no section "64(a)"&lt;sup&gt;&lt;a class="footnoteRef" href="#fn1" id="fnref1"&gt;1&lt;/a&gt;&lt;/sup&gt; in the Information Technology (IT) Act, nor a section "295(a)" in the Indian Penal Code (IPC). They must have meant &lt;a href="https://cis-india.org/internet-governance/resources/section-295a-indian-penal-code"&gt;section 295A of the IPC&lt;/a&gt; ("outraging religious feelings of any class") and &lt;a href="https://cis-india.org/internet-governance/resources/section-66A-information-technology-act"&gt;section 66A of the IT Act&lt;/a&gt; ("sending offensive messages through communication service, etc."). (Update: The Wall Street Journal's Shreya Shah has confirmed that the second provision was section 66A of the IT Act.)&lt;/p&gt;
&lt;p&gt;Section 295A of the IPC is cognizable and non-bailable, and hence the police have the powers to arrest a person accused of this without a warrant.&lt;sup&gt;&lt;a class="footnoteRef" href="#fn2" id="fnref2"&gt;2&lt;/a&gt;&lt;/sup&gt; Section 66A of the IT Act is cognizable and bailable.&lt;/p&gt;
&lt;p&gt;Update: Some news sources claim that &lt;a href="http://www.vakilno1.com/bareacts/indianpenalcode/s505.htm"&gt;section 505(2) of the IPC&lt;/a&gt; ("Statements creating or promoting enmity, hatred or ill-will between classes") has also been invoked.&lt;/p&gt;
&lt;h2 id="was-the-law-misapplied"&gt;Was the law misapplied?&lt;/h2&gt;
&lt;p&gt;This is clearly a case of misapplication of s.295A of the IPC.&lt;sup&gt;&lt;a class="footnoteRef" href="#fn3" id="fnref3"&gt;3&lt;/a&gt;&lt;/sup&gt; This provision has been frivolously used numerous times in Maharashtra. Even the banning of James Laine's book &lt;i&gt;Shivaji: Hindu King in Islamic India&lt;/i&gt; happened under s.295A, and the ban was subsequently held to have been unlawful by both the Bombay High Court as well as the Supreme Court. Indeed, s.295A has not been applied in cases where it is more apparent, making this seem like a parody news report.&lt;/p&gt;
&lt;p&gt;Interestingly, the question arises of the law under which the friend who 'liked' the Facebook status update was arrested. It would take a highly clever lawyer and a highly credulous judge to make 'liking' of a Facebook status update an act capable of being charged with electronically "sending ... any information that is grossly offensive or has menacing character" or "causing annoyance or inconvenience", or under any other provision of the IT Act (or, for that matter, the IPC).&lt;sup&gt;&lt;a class="footnoteRef" href="#fn4" id="fnref4"&gt;4&lt;/a&gt;&lt;/sup&gt; That 'liking' is protected speech under Article 19(1)(a) is not under question in India (unlike in the USA where that issue had to be adjudicated by a court), since unlike the wording present in the American Constitution, the Indian Constitution clearly protects the 'freedom of speech &lt;b&gt;and expression&lt;/b&gt;', so even non-verbal expression is protection.&lt;/p&gt;
&lt;h2 id="role-of-bad-law-and-the-police"&gt;Role of bad law and the police&lt;/h2&gt;
&lt;p&gt;In this case the blame has to be shared between bad law (s.66A of the IT Act) and an abuse of powers by police. The police were derelict in their duty, as they failed to provide protection to the Dhada Orthopaedic Hospital, run by the uncle of the girl who made the Facebook posting. Then they added insult to injury by arresting Shaheen Dhada and the friend who 'liked' her post. This should not be written off as a harmless case of the police goofing up. Justice Katju is absolutely correct in &lt;a href="http://www.hindustantimes.com/India-news/NewDelhi/Katju-demands-action-against-Mumbai-cops-for-arresting-woman/Article1-961478.aspx"&gt;demanding that such police officers should be punished&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="rule-of-law"&gt;Rule of law&lt;/h2&gt;
&lt;p&gt;Rule of law demands that laws are not applied in an arbitrary manner. When tens of thousands were making similar comments in print (Justice Katju's article in the Hindu, for instance), over the Internet (countless comments on Facebook, Rediff, Orkut, Twitter, etc.), and in person, how did the police single out Shaheen Dhada and her friend for arrest?&lt;sup&gt;&lt;a class="footnoteRef" href="#fn5" id="fnref5"&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="social-media-regulation-vs.-suppression-of-freedom-of-speech-and-expression"&gt;Social Media Regulation vs. Suppression of Freedom of Speech and Expression&lt;/h2&gt;
&lt;p&gt;This should not be seen merely as "social media regulation", but as a restriction on freedom of speech and expression by both the law and the police. Section 66A makes certain kinds of speech-activities ("causing annoyance") illegal if communicated online, but legal if that same speech-activity is published in a newspaper. Finally, this is similar to the Aseem Trivedi case where the police wrongly decided to press charges and to arrest.&lt;/p&gt;
&lt;p&gt;This distinction is important as it being a Facebook status update should not grant Shaheen Dhada any special immunity; the fact of that particular update not being punishable under s.295 or s.66A (or any other law) should.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;
&lt;p&gt;Section 64 of the IT Act is about "recovery of penalty" and the ability to suspend one's digital signature if one doesn't pay up a penalty that's been imposed.&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn2"&gt;
&lt;p&gt;The police generally cannot, without a warrant, arrest a person accused of a bailable offence unless it is a cognizable offence. A non-bailable offence is one for which a judicial magistrate needs to grant bail, and it isn't an automatic right to be enjoyed by paying a bond-surety amount set by the police.&lt;a href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn3"&gt;
&lt;p&gt;Section 295A of the IPC has been held not to be unconstitutional. The first case to &lt;a href="http://ibnlive.in.com/generalnewsfeed/news/pil-to-declare-sec-66a-as-unconstitutional-filed/1111666.html"&gt;challenge the constitutionality of section 66A of the IT Act&lt;/a&gt; was filed recently in front of the Madurai bench the Madras High Court.)&lt;a href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn4"&gt;
&lt;p&gt;One can imagine an exceptional case where such an act could potentially be defamatory, but that is clearly exceptional.&lt;a href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn5"&gt;
&lt;p&gt;This is entirely apart from the question of how the Shiv Sena singled in on Shaheen Dhada's Facebook comment.&lt;a href="#fnref5"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;This blog entry has been re-posted in the following places&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?283033"&gt;Outlook&lt;/a&gt; (November 19, 2012).&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://kafila.org/2012/11/19/social-media-regulation-vs-suppression-of-freedom-of-speech-pranesh-prakash/"&gt;KAFILA&lt;/a&gt; (November 19, 2012).&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A'&gt;https://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IPC</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-02T03:42:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated">
    <title>India's Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched</title>
    <link>https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated</link>
    <description>
        &lt;b&gt;On Day 1 of the 28th Session of the World Intellectual Property Organization (“WIPO”) Standing Committee on Copyright and Related Rights (“SCCR”), the WIPO organized an event to mark India’s ratification of the Marrakesh Treaty to Facilitate Access to Published Works for Persons Who Are Blind, Visually Impaired or Otherwise Print Disabled, 2013 (“Marrakesh Treaty”), and to launch the Accessible Books Consortium (“ABC”).&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;India Becomes the First Country to Ratify the Marrakesh Treaty&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Francis Gurry, Director General, WIPO said that the Marrakesh Treaty received 79 signatures in the twelve month period that the treaty was open for signatures. He further said that India’s ratification of the Marrakesh Treaty one year from its conclusion was a “WIPO record of sorts” and a “great example from a major country” of the importance attached to the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dilip Sinha, Ambassador and Permanent Representative of India to the United Nations in Geneva handed over India’s Instrument of Accession to the Marrakesh Treaty to Francis Gurry. Ambassador Sinha in his speech stressed on the importance of the Marrakesh Treaty to India and said that it helped that India had its amendments to its Copyright Act, 1957 in place, incorporating the provisions of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maryanne Diamond, the Immediate Past President of the World Blind Union (“WBU”) congratulated India on its ratification. Calling it a country who showed “huge leadership” in negotiations of the Marrakesh Treaty, Ms. Diamond said that this ratification was extremely significant, with India being home to a large number of blind and print disabled people and a part of the Global South. Ms. Diamond urged other nations to follow India’s example and make it a priority to ratify the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jens Bammel, Secretary General, International Publishers Association (“IPA”) also congratulated India on its ratification of the Marrakesh Treaty and called on other member states to ratify it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Accessible Books Consortium Launched&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;At the launch of the ABC, Mr. Gurry said that the Marrakesh Treaty was only the means to an end, where the end was books in the hands of print disabled and visually impaired persons across the world. “To make it operational,” said Mr. Gurry, “we need to have operational activities.” He said that the ABC was an operational activity which would “breathe life” into and “make operational” the legal framework provided by the Marrakesh Treaty.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What Does it Do?&lt;/h3&gt;
&lt;p&gt;Mr. Gurry said that the ABC aimed at achieving three things- &lt;i&gt;first, &lt;/i&gt;capacity building; &lt;i&gt;second, &lt;/i&gt;international book exchange and &lt;i&gt;third, &lt;/i&gt;international book exchange.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Capacity Building- Mr. Gurry said that the ABC seeks to provide training on accessible book production and distribution. He thanked the Republic of Korea which has committed to providing financial assistance for training in respect of production of books in accessible formats.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;International Book Exchange- Mr. Gurry said that this activity was an IT supported facility, namely, the &lt;a href="http://www.accessiblebooksconsortium.org/tigar/en/"&gt;TIGAR Service&lt;/a&gt; which has its origins in India. This would allow participating institutions to perform international searches of databases to find out if accessible formats of books are available. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Inclusive Publishing- Mr. Gurry said that at the end of the day, “books should be born accessible” and technology was creating the “promise of the realization of this aspiration.” Mr. Gurry said that the ABC would promote accessible publishing and to this end, had drawn up a charter of accessible publishing- &lt;a href="http://www.accessiblebooksconsortium.org/inclusive_publishing/en/accessible_best_practice_guidelines_for_publishers.html"&gt;Accessible Publishing Best Practice Guidelines for Publishers&lt;/a&gt;. Elsevier is the first publisher to have signed this charter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;India, WBU and IPA delighted&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Praising the ABC, Ambassador Sinha called it an indicator of what multi-stakeholder cooperation needs to do. He said that the ABC would assist organizations such as the DAISY Forum of India in achieving the goal of access to books in accessible formats. Congratulating the WIPO for its efforts on this front, Ambassador Sinha said that this would help nations like India realize their goal of achieving the purposes of the Marrakesh Treaty. Ms. Diamond, representing the WBU congratulated Elsevier on signing the charter. Jens Bammel, on behalf of the IPA expressed concern for making books available in accessible formats for non English speakers. The ABC, he said, was a project initiated to “genuinely complement” the Marrakesh Treaty, and would create a global catalogue of accessible works, whether provided by libraries or by publishers. Expressing his delight that the ABC was being supported equally by all stakeholders, Mr. Bammel reached out to member states to support this initiative politically.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated'&gt;https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-01T11:09:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking">
    <title>Analysis of DIT's Response to Second RTI on Website Blocking</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking</link>
    <description>
        &lt;b&gt;In this blog post, Pranesh Prakash briefly analyses the DIT's response to an RTI request on website blocking alongside the most recent edition of Google's Transparency Report, and what it tells us about the online censorship regime in India.&lt;/b&gt;
        
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;h2 id="what-the-dits-response-tells-us-and-what-it-doesnt"&gt;What the DIT's Response Tells Us, and What It Doesn't&lt;/h2&gt;
&lt;p&gt;We at the Centre for Internet and Society had sent in a right to information request to the Department of Information Technology (DIT) asking for more information about website blocking in India. The &lt;a href="https://cis-india.org/internet-governance/dit-response-2nd-rti-blocking" class="internal-link" title="Text of DIT's Response to Second RTI on Website Blocking"&gt;response we got from the DIT&lt;/a&gt; was illuminating in many ways. The following are the noteworthy points, in brief:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Six government officials, and one politician have so far made requests for 'disabling access' to certain online content under s.69A of the Information Technology (IT) Act.&lt;/li&gt;

    &lt;li&gt;68 individual items have been requested to be blocked, those being 64 websites (domain-level blocking), 1 sub-domain, and 3 specific web pages. Seemingly, none of these requests have been accepted.&lt;/li&gt;

    &lt;li&gt;The data provided by the government seemingly conflicts with the data released by the likes of Google (via its Transparency Report).&lt;/li&gt;

    &lt;li&gt;India's law enforcement agencies are circumventing the IT Act, the Indian Penal Code (IPC), and ultimately the Constitution, by not following proper procedure for removal of online content.&lt;/li&gt;

    &lt;li&gt;Either the DIT is not providing us all the relevant information on blocking, or is not following the law.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="conflicting-data-on-censorship-requests"&gt;Conflicting Data on Censorship Requests&lt;/h2&gt;
&lt;p&gt;The latest &lt;a href="http://www.google.com/transparencyreport/governmentrequests/IN/"&gt;Google Transparency Report&lt;/a&gt;, released on October 25, 2011, shows that there were 68 written requests (imaginably taking the form of forceful requests/orders) from Indian law enforcement agencies for removal of 358 items from Google's various. If you take the figures since January 2010, it adds up to over 765.&lt;/p&gt;
&lt;p&gt;However, the official government statistics show only eight separate requests having been made to the&amp;nbsp; DIT (which, under the IT Act, is the only authority that can order the blocking of online content), adding up to a total of 64 websites (domain-level), 1 sub-domain, and 3 specific web pages. Of these only 3 are for Google's services (2 for Blogger, and 1 for YouTube).&lt;/p&gt;
&lt;p&gt;If classified according to presumable reason for seeking of the block, that would be 61 domains hosting adult content; 1 domain (tamil.net.in), 1 sub-domain (ulaginazhagiyamuthalpenn.blogspot.com), and 2 specific pages (video of a speech by Bal Thackeray on YouTube and Wikipedia page for Sukhbir Singh Badal) for political content; 1 for religious content (a blog post titled "Insults against Islam" in Malay); and 1 domain hosting online gambling (betfair.com). It is unclear for why one of the requests was made (topix.net).&lt;sup&gt;&lt;a id="fnref1" class="footnoteRef" name="fnref1" href="#fn1"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="content-removal-vs.-content-blocking"&gt;Content Removal vs. Content Blocking&lt;/h2&gt;
&lt;p&gt;Section 69A of the IT Act provides the Central Government the power to "direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource". The only person through whom this power can be exercised is the 'Designated Officer' (currently Dr. Gulshan Rai of the DIT), who in turn has to follow the procedure laid down in the rules drafted under s.69A ("Information Technology (Procedure and Safeguard for Blocking for Access of Information by Public) Rules, 2009", the 'Blocking Rules').&lt;/p&gt;
&lt;p&gt;Because of this, we see everyone from the Secretary of the Public Law and Order Department of Tamil Nadu to the Joint Commissioner of Police of Mumbai and the State President of the Bharatiya Janata Minority Morcha approaching the Designated Officer for blocking of websites.&lt;/p&gt;
&lt;p&gt;However, as the data from Google shows, there are many times more requests being sent to remove content. The only explanation for this is that an order to 'block for access... or cause to be blocked for access by the public' is taken to be different from an order for removal of content. Nothing in the IT Act, nor in the Blocking Rules actually address this issue.&lt;sup&gt;&lt;a id="fnref2" class="footnoteRef" name="fnref2" href="#fn2"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Thus, there is a possibility that the forcible removal of content is treated separately from blocking of content. That would mean that while blocking is regulated by the IT Act, forcible removal of content is not. Thus, it would seem that forcible removal of online content is happening without clear regulation or limits.&lt;sup&gt;&lt;a id="fnref3" class="footnoteRef" name="fnref3" href="#fn3"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="role-of-the-indian-penal-code-and-code-of-criminal-procedure"&gt;Role of the Indian Penal Code and Code of Criminal Procedure&lt;/h2&gt;
&lt;p&gt;There are existing provisions in the Indian Penal Code that provide the government the power to censor book, pamphlets, and other material on varied grounds, including obscenity, causing of enmity between communities, etc. The police is provided powers to enforce such governmental orders. Section 95 of the Code of Criminal Procedure allows the State Government to declare (through an official notification) certain publications which seem to violate the Indian Penal Code as 'forfeited to the Government' and to issue search warrants for the same. After this the police can enforce that notification.&lt;/p&gt;
&lt;p&gt;It is clear that this is not the case for any of the content removal requests that were sent to Google.&lt;/p&gt;
&lt;h2 id="police-are-defeating-the-constitution-and-the-it-act"&gt;Police Are Defeating the Constitution and the IT Act&lt;/h2&gt;
&lt;p&gt;Therefore, it would seem that law enforcement agencies are operating outside the bounds set up under the Indian Penal Code, the Code of Criminal Procedure, as also the Information Technology Act, when they send requests for removal of content to companies like Google. While a company might comply with it because it appears to them to violate their own terms of service (which generally include a wide clause about content being in accordance with all local laws), community guidelines, etc., it would appear that it is not required under the law to do so if the order itself is not legal.&lt;/p&gt;
&lt;p&gt;However, anecdotal evidence has it that most companies comply with such 'requests' even when they are not under any legal obligation to do so.&lt;/p&gt;
&lt;p&gt;This way the intention of Parliament in enacting s.69A of the IT Act—to regulate government censorship of the Internet and bring it within the bounds laid down in the Constitution—is defeated.&lt;/p&gt;
&lt;h2 id="dit-either-evasive-or-not-following-rules"&gt;DIT Either Evasive or Not Following Rules&lt;/h2&gt;
&lt;p&gt;The DIT did not provide answers on:&lt;/p&gt;
&lt;ul&gt;
    &lt;li&gt;Whether any block ordered by the DIT has ever been revoked&lt;/li&gt;

    &lt;li&gt;On what basis DIT decides which intermediary (web host, ISP, etc.) to send the order of blocking to&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;It also provided the minutes for only one meeting&lt;sup&gt;&lt;a id="fnref4" class="footnoteRef" name="fnref4" href="#fn4"&gt;4&lt;/a&gt;&lt;/sup&gt; of the committee that decides whether to carry out a block, when we had requested for minutes of all the meetings it has ever held. That committee (the Committee for Examination of Requests, constituted under Rule 8(4) of the Blocking Rules) has to consider every single item in every single request forwarded to the Designated Officer, and 68 items were sent to the Designated Officer in 6 requests. Quite clearly something doesn't add up. Either the Committee is not following the Blocking Rules or the DIT is not providing a full reply under the RTI Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
      &lt;li id="fn1"&gt;
&lt;p&gt;A request was made to block http://www.topix.net, by the 'Commmissioner, Maharashtra State, Colaba, Mumbai—400001', presumably the Commissioner of State Intelligence Department of Maharashtra, whose office is located in Colaba. &lt;a title="Jump back to footnote 1" class="footnoteBackLink" href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn2"&gt;
&lt;p&gt;However, the Blocking Rules require the person or the hosting intermediary being contacted for a response. This provides the person/intermediary the opportunity to remove the content voluntarily or to oppose the request for blocking.&lt;/p&gt;
&lt;p&gt;"Rule 8. Examination of request: (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary." &lt;a title="Jump back to footnote 2" class="footnoteBackLink" href="#fnref2"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn3"&gt;
&lt;p&gt;While it is possible to imagine that the Indian Penal Code and the Code of Criminal Procedure lay down limits, it is clear from the Google Transparency Report that the requests from removal are not coming based only on court orders, but from the executive and the police. The police have no powers under the IPC or the CrPC to request removal of content without either a public notification issued by the State Government or a court order. &lt;a title="Jump back to footnote 3" class="footnoteBackLink" href="#fnref3"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;

      &lt;li id="fn4"&gt;
&lt;p&gt;The minutes of the meeting held on August 24, 2010, on the request for blocking of www.betfair.com were sent as 'Annexure III' of the DIT response.&amp;nbsp; This request was not granted.&amp;nbsp; &lt;a title="Jump back to footnote 4" class="footnoteBackLink" href="#fnref4"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking'&gt;https://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2011-12-02T09:26:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape">
    <title>Exploring the Digital Landscape: An Overview</title>
    <link>https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape</link>
    <description>
        &lt;b&gt;One component of the Digital Humanities mapping exercise was a series of six research projects commissioned by HEIRA-CSCS, Bangalore over November 2013-March 2014. These studies attempted to chart various aspects of the digital landscape in India today, with a focus on emerging forms of humanistic enquiry engendered by the Internet and new digital technologies. This blog post presents a broad overview of some of the key learnings from these projects. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The six research studies commissioned by HEIRA-CSCS as part of the collaborative exercise to map the Digital Humanities (DH) were formulated within a broad rubric of exploring changes at the intersection of youth, technology and higher education in India. Apart from existing questions about the digital divide, and the possibilities of increased connectivity and availability of new sources of information due to proliferation of digital tools and access to the Internet, the projects also tried to address in some way the problem of understanding and formulating a research enquiry about the ‘digital’ itself. The digital as a mode of existence or being, or a new ‘social’ or as discussed in the earlier blog-posts, is essentially a premise of the DH discourse as it has emerged in different parts of the world. While the studies focus largely on youth and higher education and so are located with a certain context, they do attempt to address larger questions about understanding the digital landscape in India today, with reference to new and changing practices of interdisciplinary research and scholarship in the humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just to recapitulate from an earlier blog-post; the following were the studies commissioned:&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt;
&lt;li&gt;&lt;b&gt;Survey of Printed Digitised Materials in Bengali&lt;/b&gt;&lt;b&gt; – &lt;/b&gt;an extensive survey and report of printed digitized materials in Bengali across a few selected themes. The objective of this exercise is to map the nature of available digitized materials and explore possibilities of their use in the higher education classroom.&lt;b&gt;&lt;br /&gt;Researcher: Saidul Haque, Jadavpur University, Kolkata&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Confessions in the Digital Age&lt;/b&gt;&lt;b&gt; – &lt;/b&gt;looks at the rising trend of ‘confession pages’ on social media, most of which are located in an educational context, and explores the manner in which the digital space and its assumed anonymity has reconfigured this practice and the interaction between youth and technology.&lt;b&gt;&lt;br /&gt;Researcher: Rimi Nandy, Jadavpur University, Kolkata&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Queer Expression in the Online Space&lt;/b&gt; – this study explores the concept of digital citizenship with a focus on how youth from the LGBTQ community engage with digital technologies such as social media, mobile phones and radio to negotiate questions of identity politics, activism and citizenship in cyberspace.&lt;b&gt;&lt;br /&gt;Researcher: Ditilekha Sharma, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Creating Knowledge: Mapping the nature of Content and Processes  on the English Wikipedia&lt;/b&gt; - analyses the nature of content produced on Wikipedia, with a focus on the representation of women and gender-related topics to explore if online knowledge platforms contain and perpetuate a systemic gender-bias.&lt;b&gt;&lt;br /&gt;Researcher:&lt;/b&gt; &lt;b&gt;Sohnee Harshey, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;From the Streets to the Web: Feminist Activism on Social Media&lt;/b&gt;&lt;b&gt;– &lt;/b&gt;an ethnographic exploration of social media platforms to explore how feminist activists have engaged with digital technology and if this has allowed for a redefinition of political organization and new forms of activism within the movement.&lt;b&gt;&lt;br /&gt;Researcher: Sujatha Subramanian, Tata Institute of Social Sciences, Mumbai&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This exercise was also an attempt to build on some of the learnings from a four-year programme undertaken by HEIRA-CSCS titled ‘Pathways to Higher Education (supported by the Ford Foundation), which looked at the problem of &lt;i&gt;quality of access&lt;/i&gt; in higher education for students from disadvantaged sections of society, particularly with respect to the digital and linguistic divide. The emphasis therefore was on understanding how young people, who are known as digital natives, negotiate with these rapidly changing modes of communication and learning. The projects therefore are located in institutional spaces and primarily address the demographic of 18 – 35 years, although there are exceptions as in the case of the studies on Wikipedia and the Bengali archival materials. Most of the studies draw from conventional methods of humanities and social sciences research, largely consisting of ethnographic and textual analysis, interviews and surveys. Adapting these methods to the digital domain, or rather formulating new research questions and methodology that is adequate to understand the nuances of the digital sphere was one of the key challenges of this exercise. Some of the learning outcomes from these studies may be summarized under the following themes:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Emergence of the (Digital) Public Sphere&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The advent of the internet and digital technologies has largely been considered enabling, in terms of what it allows you to do and be both in the real and virtual worlds. The growth of online activism in the last couple of years is indicative of this change to a large extent. This has been particularly true of traditional forms of activism that have now adopted the digital space, such as the LGBTQ or feminist movements. A majority of the respondents in the studies focussing on these two themes have endorsed the positive aspect of activism in the online space, in terms of organising people and connecting civil society and the community, and bringing these issues into the mainstream. Most felt that the internet offers a space, and a relatively safe one at that, to talk about issues related to sexuality and gender. Not only in terms of its potential to garner large numbers, disseminate information and create wider transnational networks, the online space can now also be seen as the space where the activism originates, rather than merely supplementing or facilitating traditional on-the-ground movements. As such, the digital has evolved into an alternate critical public sphere were the discourse around identity, citizenship, and socio-political participation has become more varied, even if not yet adequately nuanced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While most of the studies endorse the democratising potential of the internet and digital technology, particularly that of mobile phones which have made these networks and resources accessible to a larger cross-section of people, many have also speak about the replication of several forms of systemic injustice and marginalisation that exist in the real world in the online space. The project on the gender-gap on Wikipedia cites examples of such a politics of exclusion in the knowledge-making process, not just with respect to content on Wikipedia, but also in the inclusion of women in the process of content-generation. Respondents in the other two projects on activism also spoke of instances of gendered violence and abuse, often a repercussion of being vocal online, thus highlighting the problematic duality of the condition of being visible and vulnerable. The imperative of creating safe online spaces to voice opinions, show solidarity or express dissent has been stressed by a majority of respondents in these studies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Being Digital: Visibility and Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moving from the question of doing to being, a paradox about the online space has been the way in which it accords a certain hyper-visibility, and increasingly makes invisible people and discourses, many a time not by choice. The option of anonymity accorded by the online space has been important for many voices of dissent to find expression, and for non-normative discourse to become visible in mainstream debates. However, the problems of anonymity can be several, as seen in the case of the study on the Facebook confessions. ‘Performance’ is an important aspect of these confessions; whether it is in the nature of a comment on another person or a representation of the self. The creation and performance of identities has been a significant component of studies on digital and cyber culture studies. The internet as facilitating performance of a certain gendered identity, while also in some ways obscuring certain others – as in the case of the marginalisation of lesbian, bisexual or transsexual individuals within the queer community is a case in point. Further the visibility accorded to issues in the online space is also conditional, in terms of what gets viewed, discussed and acted upon. The Wikipedia study discusses this in terms of a ‘covert alliance-building’ of editors or consensus on what goes up online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another positive attribute of the online space as reiterated by most people in the projects was that of increased accessibility - to networks, people and resources. But as is evident from the earlier paragraph, such accessibility often comes with a caveat - the conditions of the access are also as important. In the case of the survey on Bengali materials, the availability of a large corpus of materials in various spaces and the efforts to digitse them is an insufficient measure given the poor accessibility to such digitised materials available online, due to issues of copyright, metadata, technological support and lack of subject expertise. Accessibility is an important aspect of being digital as understood in the project on mapping the digital classroom. While students in most undergraduate classrooms have access to digital devices in one form or the other, the use of these devices in learning is contingent upon several factors such as student and teacher competence and comfort, and the ease to adapt to changing teaching-learning environments given cultural and linguistic divides. More importantly, the perception of the internet or digital technologies as a tool to merely facilitate communication or learning, rather than a space of critical engagement is the predominant understanding, with few notable exceptions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;New Knowledge-making Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Combining the being and doing in the online space are the new modes of knowledge formation engendered by this medium. The Wikipedia is illustrative of the process of collaborative knowledge production, and the politics inherent therein. The problems and challenges of digitisation and archival practice as evident in the study of the Bengali digitised materials is also an example of this knowledge vs information conundrum. However the connect with higher education, as in the availability of scholarly materials in regional languages in the latter case, and the need to acknowledge non-traditional sources as scholarly as in the former, are some of the immediate challenges identified by these studies. The model of annotations and referencing, as made possible by collaborative and dynamic knowledge repositories is an important concern of the DH debate as well, in terms of questioning existing hierarchies of authorship and expertise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bringing in of non-normative discourse on sexuality and gender into the mainstream, and the emergence of new issues in some sense has also been facilitated by the online space to some extent, even if within certain exclusive communities or spaces. An example of this is in terms of narratives of pleasure in feminist discussions, which seem to have found a space online but not so much in debates otherwise seen in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Changes in learning and pedagogic practice are an important aspect of new knowledge-making practices, and as mentioned earlier this is apparent in classrooms today given that students and faculty recognise the potential of digital technologies. However, the primacy of textual material in most classrooms, and a certain reluctance to engage with digital media and texts on the part of faculty and students in a substantive way is an attribute of the classroom today. Indeed, ways of reading and writing have changed with the onslaught of technology; as the study on confessions demonstrates communication on social media and mobile phones have evolved a different linguistic forms, both in English and regional languages. This and the problem of an information clutter, or ‘excess’, without the option of verifiability in most cases, is one of the major concerns of faculty with regard to technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the projects in themselves may have only indirectly contributed to our understanding of DH, the process of formulating these questions and trying to find some answers to them have been insightful, particularly with respect to the problems with understanding technology, the importance of form and process, and the growth of alternative spaces of learning, all which are relevant to the DH discourse. For some reflections on the individual projects, see the guest posts by the researchers on CIS-RAW; the complete research reports are available at &lt;a href="http://cscs.res.in/irps/heira/irps/heira/documents"&gt;http://cscs.res.in/irps/heira/irps/heira/documents&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape'&gt;https://cis-india.org/raw/digital-humanities/exploring-the-digital-landscape&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-04-14T15:48:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition">
    <title>Digital Humanities and the Problem of Definition</title>
    <link>https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition</link>
    <description>
        &lt;b&gt;The Digital Humanities as a field that still eludes definition has been the subject of much discourse and writing. This blog post looks at this issue as one of trying to approach the field from a disciplinary lens, and the challenges that this may pose to the attempts at a definition. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;Much has been said and written about the Digital Humanities as an emergent field or domain of enquiry; the plethora of departments being set up all across the world, well mostly the developed world is testimony to the claimed innovative and generative potential of the field. &amp;nbsp;&amp;nbsp;However, as outlined in the earlier blog-post, the problem of definition still persists. As Mathew Kirschenbaum points out, the growing literature around the ‘what is Digital Humanities’ question may well be a genre in itself.&lt;a name="fr1" href="#fn1"&gt;[1] &lt;/a&gt;While the predominant narrative seems to be in terms of defining what Digital Humanities, or to take it a step back, what the ‘digital’ allows you to do, with respect to enabling or facilitating certain kinds of research and pedagogy, a pertinent question still is that of what it allows you to ‘be’. Digital Humanities has been alternatively called a method, practice and field of enquiry, but scholars and practitioners in many instances have stopped short of fully embracing it as a discipline. This is an interesting development given the rapid pace of its institutionalisation - from being located in existing Humanities or Computational Sciences or Media Studies departments it has now claimed functional institutional spaces of its own, with not just interdisciplinary research and teaching but also other creative and innovative knowledge-making practices. The field is slowly gaining credence in India as well, with several institutions pursuing questions around core questions within the fold of Digital Humanities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;So is the disciplinary lens inadequate to understand this phenomenon, or is it too early for a field still considered in some ways rather incipient. The growth of the academic discipline itself is something of a fraught endeavour; as debates around the scientific revolution and Enlightenment thought have established. To put it in a very simple manner, the story of academic disciplines is that of training in reason.&lt;a name="fr2" href="#fn2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Andrew Cutrofello says “In academia, a discipline is defined by its methodological rigor and the clear boundaries of its field of inquiry. Methods or fields are criticized as being "fuzzy" when they are suspected of lacking a discipline. In a more straightforwardly Foucauldian sense, the disciplinary power of academic disciplines can be located in their methods for producing docile bodies of different sorts.”&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt; The problem with defining Digital humanities may lie in it not conforming to precisely this notion of the academic discipline, and changing notions of the function of critique when mediated through the digital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However a prevalent mode of understanding Digital Humanities has been in terms of the disciplinary concerns it raises for the humanities themselves; this works with the assumption that it is in fact a newer, improved version or extension of the humanities. The present mapping exercise too began with the disciplinary lens, but instead of enquiring about what the Digital Humanities is, it looked at what the ‘digital’ has brought to, changed or appropriated in terms of existing disciplinary concerns within the humanities. If one has to look at the digital itself as a state of being or existence, then one needs to understand this new techno-social paradigm much better. Prof. Amlan Dasgupta, at the School of Cultural Texts and Records at Jadavpur University in Kolkata sees this as a useful way of going about the problem of trying to arrive at a definition of the field — one is to understand the history of the term, from its inherited definition in the Anglo-American context, and the second is to distinguish it from what he calls the current state of ‘digitality’ — where all cultural objects are being now being conceived of as ‘digital’ objects. In the Indian context, the question of digitality also becomes important from the perspective of technological obsolescence - where there is resistance to discontinuing or phasing out the use of certain kinds of technology; either for lack of access to better ones or simply because one finds other uses for it. Prof. Dasgupta interestingly terms this a ‘culture of reuse’, one example of this being the typewriter which for all practical purposes has been displaced by the computer, but still finds favour with several people in their everyday lives. The question of livelihood is still connected to some of these technologies, so much so that they are very much a part of channels of cultural production and circulation, and even when they cease to become useful they have value as cultural artefacts. We therefore inhabit at the same time, different worlds, or as he calls it ‘a multi-layered technological sphere’. The variedness of this space, and the complexities or ‘degrees of use’ of certain technologies or technological objects is what further determines the nature of this space. This complicates the questions of&amp;nbsp; access to technology or the ‘digital divide’ which have been and still are some of the primary approaches to understanding technology, particularly in the Global South.&amp;nbsp; The need of the hour is to be able to distinguish between this current state of digitality that we are in, and what is meant by the Digital Humanities. It may after all be a set of methodologies rather than a subject or discipline in itself — the question is how it would help us understand the ‘digital’ itself much better and the new kinds of enquiries it may then facilitate about this space we now inhabit.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;One of the important points of departure, from the traditional humanities and later humanities computing itself as mentioned in the earlier blog, has been the blurring of boundaries between content, method and object/s of enquiry. The ‘process’ has become important, as illustrated by the iterative nature of most Digital Humanities projects and the discourse itself which emphasises the ‘making’ and ‘doing’ aspects of research as much as the content itself. Tool-building as a critical activity rather than as mere facilitation is an important part of the knowledge-making process in the field. In conjunction with this, Dr. Moinak Biswas, at the Department of Film Studies at Jadavpur University, thinks that the biggest changes have been in terms of the collaborative nature of knowledge production, based on voluntarily sharing or creating new content through digital platforms and archives, and crucially the possibility of now imagining creative and analytical work as not separate practices, but within in a single space and time. He cites an example from film, where ‘image’ making and critical practice can both be combined on one platform, like the online archive &lt;a href="http://indiancine.ma/"&gt;Indiancine.ma&lt;/a&gt; or the &lt;a href="http://vectors.usc.edu/issues/index.php?issue=7"&gt;Vectors&lt;/a&gt; journal for example to produce new layers of meaning around existing texts. The aspect of critique is important here, given that the consistent criticism about the field has been the ambiguity of its social undertaking; its critical or political standpoint or challenge to existing theoretical paradigms. Most of the interest around the term has been in very instrumental terms, as a facilitator or enabler of certain kinds of digital practice. Alan Liu further explains this in what he sees as the role of the Digital Humanities in cultural criticism when he says, “Beyond acting in an instrumental role, the digital humanities can most profoundly advocate for the humanities by helping to broaden the very idea of instrumentalism, technological, and otherwise. This could be its unique contribution to cultural criticism’’.&lt;a name="fr4" href="#fn4"&gt;[4] &lt;/a&gt;While the move away from computational analysis as a technique to facilitate humanities research is quite apparent, the disciplinary concerns here still seem to be latched onto those of the traditional humanities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While reiterating some of these core questions within Digital Humanities; Dr. Souvik Mukherjee and Dr. Padmini Ray Murray, at the Department of English, Presidency University, Kolkata speak of the problem of locating the field in India, where work is presently only being done in a few small pockets.&amp;nbsp; The lack of a precise definition, or location within an established disciplinary context are some reasons why a lot of work that could come within the ambit of Digital Humanities is not being acknowledged as such; conversely it also leads to the problem of projects on digitisation or studies of digital cultures/cyber cultures being easily conflated with Digital Humanities. Related to this also is the absence of self-identifying ‘digital humanists’ (a problem outlined in the earlier blog, which will be explored in detail further in this series). More importantly, the lack of an indigenous framework to theorise around questions of the digital is also an obstacle to understanding what the field entails and the many possibilities it may offer in the Indian context. This is a problem not just of the Digital Humanities, but in general for modes of knowledge production in the social sciences and humanities that have adopted Western theoretical constructs. One could also locate in some sense the present crisis in disciplines within this problem. Gopal Guru and Sundar Sarukkai explicate this very issue when they talk about the absence of ‘experience as an important category of the act of theorising’ because of the privileging of ideas in Western constructs of experience.&amp;nbsp; This is also reflective of the bifurcation between theory and praxis in traditional social sciences or humanities epistemological frameworks which borrow heavily from the West. Digital Humanities while still to arrive at a core disciplinary concern, seems to point towards the problem of this very demarcation by addressing the aspect of practice as a very focal point of its discourse.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Even from diverse disciplinary perspectives, at present the understanding of Digital Humanities is that it facilitates new modes of humanistic enquiry, or enables one to ask questions that could not be asked earlier. As Prof. Dasgupta reiterates, it is no longer possible to imagine humanities scholarship outside of the ‘digital’ as such, as that is the world we inhabit. However, while some of the key conceptual questions for the humanities may remain the same, it is the mode of questioning that has undergone a change — we need to re-learn questioning or question-making within this new digital sphere, which is in some sense also a critical and disciplinary challenge. While this does not resolve the problem of definition, it does provide a useful route into thinking of what would be questions of Digital Humanities, particularly in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;References:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li style="text-align: justify;"&gt;Cutrofello, Andrew, “Practicing Philosophy as a Discipline of Resistance’’ Discipline and Critique: Kant, Poststructuralism and the Problem of Resistance  State University of New York Press: 1994 pp 116 - 136.&lt;/li&gt;
&lt;li&gt;Kirshchenbaum, Mark “What is Digital Humanities and What is it Doing in English Departments”, Debates in the Digital Humanities, ed. Mathew K. Gold, University of Minnesota Press: 2012&amp;nbsp; pp 4-11, &lt;a href="http://dhdebates.gc.cuny.edu/debates/text/24"&gt;http://dhdebates.gc.cuny.edu/debates/text/24&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Liu, Alan in “Where is Cultural Criticism in the Digital Humanities”, Debates in the Digital Humanities, ed. Mathew K. Gold, University of Minnesota Press: 2012&amp;nbsp; pp 492 – 502 &lt;a href="http://dhdebates.gc.cuny.edu/debates/text/24"&gt;http://dhdebates.gc.cuny.edu/debates/text/24&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Guru, Gopal and Sundar&amp;nbsp; Sarukkai, The Cracked Mirror: An Indian Debate on Experience and Theory, Oxford University Press, 2012, pp 1-8.&lt;/li&gt;&lt;/ol&gt;
&lt;div id="_mcePaste"&gt;&amp;nbsp;&lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. See Mark Kirshchenbaum “What is Digital Humanities and What is it Doing in English Departments”, Debates in the Digital Humanities, ed. Mathew K. Gold, (University of Minnesota Press, 2012 ) &lt;a href="http://dhdebates.gc.cuny.edu/debates/text/24"&gt;http://dhdebates.gc.cuny.edu/debates/text/24&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. This is a rather simple abstraction of ideas about discipline and reason as they have stemmed from Enlightenment thought. For a more elaborate understanding see ‘Conflict of the Faculties' (1798) by Immanuel Kant and ‘Discipline and Punish' (1975) by Michel Foucault. For more on Kant’s essay see &lt;a href="https://cis-india.org/raw/the-conflict-of-konigsberg" class="external-link"&gt;The Conflict of Konigsberg&lt;/a&gt; by Anirudh Sridhar.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. See Andrew Cutrofello in ‘Discipline and Critique: Kant, Poststructuralism and the Problem of Resistance (State University of New York Press, 1994).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. See Alan Liu in “Where is Cultural Criticism in the Digital Humanities”, Debates in the Digital Humanities, ed. Mathew K. Gold, (University of Minnesota Press, 2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Note: This blog post draws primarily from conversations with faculty at &lt;a class="external-link" href="http://sctrdhci.wordpress.com/"&gt;Jadavpur University&lt;/a&gt; and &lt;a class="external-link" href="http://www.presiuniv.ac.in/web/"&gt;Presidency University, Kolkata&lt;/a&gt;, both of whom offer courses on Digital Humanities.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition'&gt;https://cis-india.org/raw/digital-humanities/digital-humanities-problem-of-definition&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Mapping Digital Humanities in India</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2015-03-30T12:47:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation">
    <title>The Embodiment of the Right to Privacy within Domestic Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation</link>
    <description>
        &lt;b&gt;The Right to Privacy is a pivotal construct, essential to the actualization of justice, fairness and equity within any democratic society. It is an instrument used to secure the boundaries of an individual’s personal space, in his interaction with not only the rest of society but also the State. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is within this realm of the social transaction that there exists an unending conflict between the Right to Privacy of an individual and the overbearing hand of the State as a facilitator of public interest. This right thus acts as a safety valve providing individuals with a sacred space within which their interactions in their personal capacity have no bearing on their conduct in the public sphere. The preservation of this space is incredibly important in order to ensure a willingness of individuals to engage and cooperate with the State in its fulfillment of public welfare measures that would otherwise be deemed as intrusive. It is in this regard that the Right to Privacy, one of the last sustaining rights that an individual holds against a larger State interest, ought to be protected by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are numerous dimensions to the idea of the Right to Privacy. These include but are not limited to the privacy of person, privacy of communication, personal privacy, transactional privacy, privacy of information and the privacy of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has come to the rescue of individuals, time and again by construing "Right to Privacy" as an extension of the Fundamental Right to “Protection of Life and Personal liberty” under Article 21 of the Constitution. This has been reflected in the adjudicatory jurisprudence of the Constitutional courts in the country. However, there exists no Constitutional remedy to redress the breach of privacy by a nongovernmental actor, except under tortuous liability. The power and authority of public and private institutions to use an individual’s personal data for larger interests of national security or effectuation of socio-economic policies is still under extensive scrutiny. It is in this regard that we have compiled a number of sectoral legislations, regulating domains ranging from Finance and Telecom to Healthcare, Freedom of Expression, Consumer rights and Procedural codes. The highlighted provisions under each Act pertain to the mechanisms embodied within the legislation for the regulation of privacy within their respective sectors. Through this we aim to determine the threshold for permissible collection of confidential data and regulatory surveillance, provided a sufficient need for the same has been established. The determination of such a threshold is imperative to formulating a consistent and effective regime of privacy protection in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Click to download the below resources:&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Legislations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/master-circulars.zip" class="external-link"&gt;Master Circulars&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/finance-and-privacy.zip" class="external-link"&gt;Finance and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpc-crpc.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression.zip" class="external-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-and-privacy.zip" class="internal-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-and-privacy.zip" class="internal-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection-privacy.zip" class="external-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-and-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/healthcare.zip" class="external-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-chapters.zip" class="external-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Laws&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/code-of-civil-procedure.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-expression.zip" class="internal-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-cases.zip" class="external-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-cases.zip" class="external-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection.zip" class="internal-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/health-care.zip" class="internal-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-cases.zip" class="internal-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation'&gt;https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T02:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report">
    <title>Clarification on the Information Security Practices of Aadhaar Report</title>
    <link>https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report</link>
    <description>
        &lt;b&gt;We are issuing a second clarificatory statement on our report titled “Information Security Practices of Aadhaar (or lack thereof): A documentation of public availability of Aadhaar numbers with sensitive personal financial information” published on May 1, 2017. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The report concerned can be accessed &lt;a href="https://cis-india.org/internet-governance/information-security-practices-of-aadhaar-or-lack-thereof-a-documentation-of-public-availability-of-aadhaar-numbers-with-sensitive-personal-financial-information-1"&gt;here&lt;/a&gt;, and the first clarificatory statement (dated May 16, 2017) can be accessed &lt;a href="https://cis-india.org/internet-governance/clarification-on-information-security-practices-of-the-aadhaar-report/"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;This clarificatory statement is being issued in response to reports that misrepresent our research. In light of repeated questions we have received, which seem to emanate from a misunderstanding of our report, we would like to make the following clarifications.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Our research involved documentation and taking illustrative screenshots (included in our report) of public webpages on the four government websites listed in our report. These screenshots were taken to demonstrate that the vulnerability existed.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The figure of 130-135 million Aadhaar Numbers quoted in our Report are, as clearly stated, derived directly by adding the aggregate numbers (of beneficiaries/individuals whose data were listed in the three government websites concerned) and published by the portals themselves in the MIS reports publicly available on the portals. The numbers are as follows:&lt;br /&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;10,97,60,343 from NREGA,&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;63,95,317 from NSAP, and&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;2,05,60,896 from Chandranna Bima (screenshots included in the report).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;strong&gt;We did not arrive at this number by downloading data ourselves but by adding the figures on the government websites. To our knowledge, no harm, financial or otherwise has been caused to anyone due to the public availability. Further, it must be noted that we published the report only after ascertaining that the websites in questions had masked or removed the data. Therefore our report only points to the possibility that there could be harm caused by malicious actors before the data was taken down. However, we are not aware of any such cases of exploitation, nor do we suggest so anywhere in our report.&lt;/strong&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;We sincerely hope that this clarification helps with a clearer comprehension of the argument and implications of the said report. We urge those who are using our report in their research to reach out to us to prevent the future misinterpretation of the report.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;— Amber Sinha and Srinivas Kodali&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report'&gt;https://cis-india.org/internet-governance/blog/clarification-on-the-information-security-practices-of-aadhaar-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Srinivas Kodali</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    

   <dc:date>2018-11-05T12:08:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/access-to-knowledge-in-market-place">
    <title>Pervasive Technologies: Access to Knowledge in the Market Place — A Presentation by Sunil Abraham</title>
    <link>https://cis-india.org/a2k/blogs/access-to-knowledge-in-market-place</link>
    <description>
        &lt;b&gt;The 2012 Global Congress on Intellectual Property and the Public Interest was organized in Rio de Janeiro from December 15 to 17, 2012. The Centre for Internet &amp; Society partnered FGV, Washington College of Law, the American Embassy, African Information Research and Training and International Centre for Trade and Sustainable Development in this event. Sunil Abraham made a presentation on Pervasive Technologies on the opening day, December 15, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham presented on 13 different smartphones from the Indian market such as: The Classroom in a Box, The Supercharger, The Networker, The Linguist, TV on the Go, The Spy, The Semi-Smartphone, The Trendy, The Boombox, 3D, The Mighty Mini, The Pianist, and the Indian Experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the above devices are manufactured in China and imported into India through local companies for domestic consumption and made available for its 900 million mobile subscribers.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blogs/pervasive-technologies.pdf" class="internal-link"&gt;Download the presentation&lt;/a&gt; [PDF, 4.61 Mb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/access-to-knowledge-in-market-place'&gt;https://cis-india.org/a2k/blogs/access-to-knowledge-in-market-place&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2013-02-13T07:05:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/cis-closing-statement-marrakesh-treaty-for-the-blind">
    <title>CIS's Closing Statement at Marrakesh on the Treaty for the Blind</title>
    <link>https://cis-india.org/a2k/blogs/cis-closing-statement-marrakesh-treaty-for-the-blind</link>
    <description>
        &lt;b&gt;Pranesh Prakash read out an abridged version of this statement as his closing remarks in Marrakesh, where the WIPO Treaty for the Blind (the "Marrakesh Treaty") has been successfully concluded.  The Marrakesh Treaty aims to facilitate access to published works by blind persons, persons with visual impairment, and other print disabled persons, by requiring mandatory exceptions in copyright law to enable conversions of books into accessible formats, and by enabling cross-border transfer of accessible format books.&lt;/b&gt;
        &lt;p&gt;Thank you, Mr. President.&lt;/p&gt;
&lt;p&gt;I am truly humbled to be here today representing the Centre for Internet and Society, an Indian civil society organization.  If I may assume the privilege of speaking on behalf of my blind colleagues at CIS who led much of our work on this treaty, and the many blindness organizations we have been working with over the past five years who haven't the means of being here today, I would like to thank you and all the delegates here for this important achievement.  And especially, I would like to thank the World Blind Union and Knowledge Ecology International who renewed focus on this issue more than 2 decades after WIPO and UNESCO first called attention to this problem and created a "Working Group on Access by the Visually and Auditory Handicapped to Material Reproducing Works Produced by Copyright".&lt;/p&gt;
&lt;p&gt;While doing so, I would like to remember my friend Rahul Cherian — a young, physically impaired lawyer from India — who co-founded Inclusive Planet, was a fellow with the Centre for Internet and Society, and was a legal adviser to the World Blind Union.  He worked hard on this treaty for many years, but very unfortunately did not live long enough to see it becoming a reality.  His presence here is missed, but I would like to think that by concluding this treaty, all the distinguished delegations here managed to honour his memory and work.&lt;/p&gt;
&lt;p&gt;I am grateful to all the distinguished delegations here for successfully concluding a reasonably workable treaty, but especially those — such as Brazil, India, Ecuador, Nigeria, Uruguay, Egypt, South Africa, Switzerland, and numerous others — who realized they were negotiating with blind people's lives, and regarded this treaty as a means of ensuring basic human rights and dignity of the visually impaired and the print disabled, instead of regarding it merely as "copyright flexibility" to be first denied and then grudgingly conceded.  The current imbalance in terms of global royalty flows and in terms of the bargaining strength of richer countries within WIPO — many of who strongly opposed the access this treaty seeks to facilitate right till the very end — is for me a stark reminder of colonialism, and I see the conclusion of this treaty as a tiny victory against it.&lt;/p&gt;
&lt;p&gt;It is historic that today WIPO and its members have collectively recognized in a treaty that copyright isn't just an "engine of free expression" but can pose a significant barrier to access to knowledge.  Today we recognize that blind writers are currently curtailed more by copyright law than protected by it.  Today we recognize that copyright not only &lt;em&gt;may&lt;/em&gt; be curtailed in some circumstances, but that it &lt;em&gt;must&lt;/em&gt; be curtailed in some circumstances, even beyond the few that have been listed in the Berne Convention.  One of the original framers of the Berne Convention, Swiss jurist and president, Numa Droz, recognized this in 1884 when he emphasized that "limits to absolute protection are rightly set by the public interest".  And as Debabrata Saha, India's delegate to WIPO during the adoption of the WIPO Development Agenda noted, "intellectual property rights have to be viewed not as a self contained and distinct domain, but rather as an effective policy instrument for wide ranging socio-economic and technological development. The primary objective of this instrument is to maximize public welfare."&lt;/p&gt;
&lt;p&gt;When copyright doesn't serve public welfare, states must intervene, and the law must change to promote human rights, the freedom of expression and to receive and impart information, and to protect authors and consumers.  Importantly, markets alone cannot be relied upon to achieve a just allocation of informational resources, as we have seen clearly from the book famine that the blind are experiencing.  Marrakesh was the city in which, as Debabrata Saha noted, "the damage [of] TRIPS [was] wrought on developing countries".  Now it has redeemed itself through this treaty.&lt;/p&gt;
&lt;p&gt;This treaty is an important step in recognizing that exceptions and limitations are as important a part of the international copyright acquis as the granting of rights to copyright holders.  This is an important step towards fulfilling the WIPO Development Agenda.  This is an important step towards fulfilling the UN Convention on the Rights of Persons with Disabilities.  This is an important step towards fulfilling Article 27 of the Universal Declaration of Human Rights,  Article 15 of the International Covenant on Economic Social and Cultural Rights and Article 30 of the UN Convention on Persons with Disabilities, all of which affirm the right of everyone — including the differently-abled — to take part in cultural life of the community.&lt;/p&gt;
&lt;p&gt;While this treaty is an important part of overcoming the book famine that the blind have faced, the fact remains that there is far more that needs to be done to bridge the access gap faced by persons with disabilities, including the print disabled.&lt;/p&gt;
&lt;p&gt;We need to ensure that globally we tackle societal and economic discrimination against the print disabled, as does the important issue of their education.  This treaty is a small but important cog in a much larger wheel through which we hope to achieve justice and equity.  And finally, blind people can stop being forced to wear an eye-patch and being pirates to get access to the right to read.&lt;/p&gt;
&lt;p&gt;I also thank the WIPO Secretariat, Director General Francis Gurry, Ambassador Trevor Clark, Michelle Woods, and the WIPO staff for pushing transparency and inclusiveness of civil society organizations in these deliberations, in stark contrast to the way many bilateral and plurilateral treaties such as Anti-Counterfeiting Trade Agreement, the India-EU Free Trade Agreement, and the Trans-Pacific Partnership Agreement have been, and are being, conducted.  I hope we see even more transparency, and especially non-governmental participation in this area in the future.&lt;/p&gt;
&lt;p&gt;I call upon all countries, and especially book-exporting countries like the USA, UK, France, Portugal, and Spain to ratify this treaty immediately, and would encourage various rightholders organizations, and the MPAA who have in the past campaigned against this treaty and now welcome this treaty, to show their support for it by publicly working to get all countries to ratify this treaty and letting us all know about it.&lt;/p&gt;
&lt;p&gt;I congratulate you all for the "Miracle of Marrakesh", which shows, as my late colleague Rahul Cherian said, "when people are demanding their basic rights, no power in the world is strong enough to stop them getting what they want".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/cis-closing-statement-marrakesh-treaty-for-the-blind'&gt;https://cis-india.org/a2k/blogs/cis-closing-statement-marrakesh-treaty-for-the-blind&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2013-07-03T12:01:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/indian-language-wikipedia-statistics">
    <title>Indian Language Wikipedia Statistics (September 2012 – April 2013)</title>
    <link>https://cis-india.org/a2k/blogs/indian-language-wikipedia-statistics</link>
    <description>
        &lt;b&gt;The Access to Knowledge team carried out a quantitative analysis to identify trends and growth patterns in Indian Language Wikipedias over the time period from September 2012 to April 2013.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is difficult for the &lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K programme&lt;/a&gt; to either take direct credit for the growth or direct blame for the lack of it in the Indian language &lt;a class="external-link" href="http://www.wikimedia.org/"&gt;Wikimedia&lt;/a&gt; projects. However, we believe that we have been one of the factors — and sometimes a key factor — in impacting the growth of the Wikimedia projects and communities in India since the commencement of the project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the A2K programme has done some amount of work with almost all Indian language Wikipedias, the &lt;a href="https://cis-india.org/about/people/our-team" class="external-link"&gt;A2K team&lt;/a&gt; has had relatively more involvement in 10 Indic languages: &lt;a class="external-link" href="http://as.wikipedia.org/wiki/%E0%A6%AC%E0%A7%87%E0%A6%9F%E0%A7%81%E0%A6%AA%E0%A6%BE%E0%A6%A4"&gt;Assamese&lt;/a&gt;, &lt;a class="external-link" href="http://bn.wikipedia.org/wiki/%E0%A6%AA%E0%A7%8D%E0%A6%B0%E0%A6%A7%E0%A6%BE%E0%A6%A8_%E0%A6%AA%E0%A6%BE%E0%A6%A4%E0%A6%BE"&gt;Bengali&lt;/a&gt;, &lt;a class="external-link" href="http://gu.wikipedia.org/wiki/%E0%AA%AE%E0%AB%81%E0%AA%96%E0%AA%AA%E0%AB%83%E0%AA%B7%E0%AB%8D%E0%AA%A0"&gt;Gujarati&lt;/a&gt;, &lt;a class="external-link" href="http://hi.wikipedia.org/wiki/%E0%A4%AE%E0%A5%81%E0%A4%96%E0%A4%AA%E0%A5%83%E0%A4%B7%E0%A5%8D%E0%A4%A0"&gt;Hindi&lt;/a&gt;, &lt;a class="external-link" href="http://kn.wikipedia.org/wiki/%E0%B2%AE%E0%B3%81%E0%B2%96%E0%B3%8D%E0%B2%AF_%E0%B2%AA%E0%B3%81%E0%B2%9F"&gt;Kannada&lt;/a&gt;, &lt;a class="external-link" href="http://ml.wikipedia.org/wiki/%E0%B4%AA%E0%B5%8D%E0%B4%B0%E0%B4%A7%E0%B4%BE%E0%B4%A8_%E0%B4%A4%E0%B4%BE%E0%B5%BE"&gt;Malayalam&lt;/a&gt;, &lt;a class="external-link" href="http://mr.wikipedia.org/wiki/%E0%A4%AE%E0%A5%81%E0%A4%96%E0%A4%AA%E0%A5%83%E0%A4%B7%E0%A5%8D%E0%A4%A0"&gt;Marathi&lt;/a&gt;, &lt;a class="external-link" href="http://or.wikipedia.org/wiki/%E0%AC%AA%E0%AD%8D%E0%AC%B0%E0%AC%A7%E0%AC%BE%E0%AC%A8_%E0%AC%AA%E0%AD%83%E0%AC%B7%E0%AD%8D%E0%AC%A0%E0%AC%BE"&gt;Odia&lt;/a&gt;, &lt;a class="external-link" href="http://pa.wikipedia.org/wiki/%E0%A8%AE%E0%A9%81%E0%A9%B1%E0%A8%96_%E0%A8%B8%E0%A8%AB%E0%A8%BC%E0%A8%BE"&gt;Punjabi&lt;/a&gt; and &lt;a class="external-link" href="http://te.wikipedia.org/wiki/%E0%B0%AE%E0%B1%8A%E0%B0%A6%E0%B0%9F%E0%B0%BF_%E0%B0%AA%E0%B1%87%E0%B0%9C%E0%B1%80"&gt;Telugu&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to this based on the various outreach work done by A2K we have attempted to present an analysis of direct new Wikipedia users that have emerged in languages impacted by the A2K programme, keeping in mind that community mobilisation will always be an autonomous activity to some extent.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Article1.png" alt="null" class="image-inline" title="Articles 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Graph 1: Growth of Articles in Indian Language Wikipedias from September 2012 to April 2013&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt; The growth momentum in Indian languages over the eight month period from September 2012 to April 2013 looks healthy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Some language Wikipedias have been growing at a phenomenal rate than others in terms of percentage change since September 2012.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Assamese, Punjabi, Kannada and Odia Wikipedias have a growth rate of 58 per cent, 55 per cent, 30 per cent and 26 per cent respectively. These were the top four Indian language Wikipedia projects during the eight month period.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In terms of absolute number of articles, &lt;a class="external-link" href="http://ta.wikipedia.org/wiki/%E0%AE%AE%E0%AF%81%E0%AE%A4%E0%AE%B1%E0%AF%8D_%E0%AE%AA%E0%AE%95%E0%AF%8D%E0%AE%95%E0%AE%AE%E0%AF%8D"&gt;Tamil&lt;/a&gt;, Malayalam, Kannada and Hindi Wikipedias have grown by about 4,200; 3,600; 3,300; and 2,300 articles respectively.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;However, given the small size of the Wikipedia communities in Assamese, Punjabi, Kannada and Odia (as given in Graph 2 below) the growth achieved by them is much commendable and all efforts have to be put to ensure that this momentum continues by strengthening these communities and also expanding them.&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ActiveEditors.png" alt="null" class="image-inline" title="Active Editors" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Graph 2: Active Editors in Indian Language Wikipedias from September 2012 to April 2013&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt; There is a fluctuation in the number of active editors in majority of the Indian language Wikipedias, except for Punjabi Wikipedia, which has seen a consistent growth. Starting from July 2012, the Wikimedia India Programs Team began working with the Punjabi community, an activity which we have continued at the A2K programme.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The active editors on Hindi, Marathi and Sanskrit Wikipedias have been consistently coming down, which is a cause of concern. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It is important to note that Kannada and Telugu Wikipedias where the number of Active Editors were in a declining trend as of September 2012 have shown a remarkable turnaround. The A2K programme has spent the last 3-4 months working closely with both the Kannada and Telugu communities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Overall the active editors on Malayalam Wikipedia have crossed the 100 mark numerous times, making it the first Indian language Wikipedia to reach this benchmark. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Looking at the trends Tamil Wikipedia may soon reach the 100 active editor mark. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Even Bengali Wikipedia community could cross 100 active editors if concerted efforts are put in. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Assamese Wikipedia, which received support from A2K programme until January 2013, had a consistent active editor population which was around 20 people. However, once the support from the A2K programme dwindled a declining trend (since February 2013) has set in. This is worrying as it gives rise to the possibility of building dependencies through the A2K programme. Going forward we need to address this and rectify by creating self-sustaining momentum in our outreach work that lasts beyond our involvement.&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/NewEditors.png" alt="null" class="image-inline" title="New Editors" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Graph 3: Monthly growth of New Editors on Indian Language Wikipedias from September 2012 to April 2013&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;On an average 96 new editors have joined Indian language Wikipedias every month.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bengali, Hindi, Malayalam and Tamil Wikipedias have consistently seen more than 10 new editors joining every month. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Assamese, Odia and Sanskrit Wikipedias did have many new editors joining. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A total of 673 new people have become editors for Indian language Wikipedia since September 2012. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;However, the conversion rate of new editors into active editors is still a challenge across all Indian language Wikipedias. &lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PageViews.png" alt="null" class="image-inline" title="Page Views" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Graph 4: Snapshot of “Page Views” of Indian Language Wikipedias in September 2012 &amp;amp; March 2013&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Overall the “Page View” trends of Indian Language Wikipedias look positive.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bengali, Odia and Punjabi Wikipedias have shown the highest percentage growth in page views since August 2012. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In absolute numbers Bengali Wikipedia has seen a spectacular growth of 14,00,000  page-views, Marathi and Tamil Wikipedias witnessed a growth of about 10,00,000 and 8,00,000  page-views respectively. &lt;/li&gt;
&lt;li&gt;These clearly indicate the demand for knowledge and information in Indian languages on the internet.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In the below given Graph 5, we have also looked at the direct impact the A2K programme had in cultivating new editors on Indian language Wikipedias through various outreach programmes conducted during September 2012 to April 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that a total of 1,275 participants were reached out by the A2K programme. However, the username data for more than 700 participants could not be ascertained, due to inefficient data collection and input. This includes participants giving wrong usernames, trouble with the handwriting  of some of the participants, etc. We have already taken note of this issue and have put in measures to efficiently capture the new user data. Hence, we have only presented an analysis of 558 participants, whose usernames are valid.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of this it can be noted that more than 120 users have done more than 5 edits, which is 21 per cent of the participants. Further, 24 participants have done more than 100 edits on English and various Indian language Wikipedias, which constitutes 4 per cent of the total participants that the A2K programme has reached out to.&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt;
&lt;div id="_mcePaste"&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/NewEditorsStatistics.png" alt="null" class="image-inline" title="New Editors Statistics" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Graph 5: Snapshot of “New editors from outreach” of  English &amp;amp; Indian Language Wikipedias in September 2012 and March 2013&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/indian-language-wikipedia-statistics'&gt;https://cis-india.org/a2k/blogs/indian-language-wikipedia-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>T.Vishnu Vardhan, Nitika Tandon and Subhashish Panigrahi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Statistics</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2013-08-23T01:48:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/are-indian-consumers-laws-ready-for-digital-age">
    <title>Are Indian Consumer Laws Ready for the Digital Age?</title>
    <link>https://cis-india.org/a2k/blogs/are-indian-consumers-laws-ready-for-digital-age</link>
    <description>
        &lt;b&gt;The Economic and Social Council of the United Nations, recognizing the need for protection of the rights of consumers, drafted a set of model guidelines on consumer protection which were adopted by the General Assembly in 1985. The United Nations Guidelines for Consumer Protection (UNGCP) act as an international reference point of the consumer movement, however since it has been over a quarter of a century since they were first drafted, there is a strong argument for revising them to bring them in line with new developments in technology and business practices.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is for this reason that that &lt;a class="external-link" href="http://unctad.org/en/Pages/Home.aspx"&gt;United Nations Conference on Trade and Development&lt;/a&gt; has undertaken a revision of the UNGCP. &lt;a class="external-link" href="http://www.consumersinternational.org/"&gt;Consumers International&lt;/a&gt;, an international consumer rights organization has along with CIS and other groups been trying to represent the voice of consumers at the negotiations for this revision. As part of this effort, Consumers International has produced a book titled "&lt;a class="external-link" href="http://www.consumersinternational.org/news-and-media/resource-zone/jeremy_digital_ungcp#.UgM5UaxWygg"&gt;Updating the UN Guidelines for Consumer Protection for Consumers in the Digital Age&lt;/a&gt;". This blog has been produced through a filteration of the essence of some of the arguments and issues addressed in that book.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December 2012 there was a news report that pegged the market for online commerce in India at roughly USD 14 billion,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; which is why some of the poster children of online retail in India are getting stratospheric valuations even though they are yet to show any major profits, case in point, &lt;a class="external-link" href="http://www.flipkart.com/"&gt;Flipkart&lt;/a&gt; had a valuation of around USD 800 million&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; in 2012 and is looking for an IPO in around three to four years. Such huge numbers give a sneak peek into the size and scope of the Indian e-commerce marketplace which begs the question, if there are so many transactions occurring in the online marketplace and since a large number of those transactions are between retailers and domestic consumers, then are there any specific laws out there protecting the interests of consumers in the online world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the &lt;a class="external-link" href="http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; and various&lt;a class="external-link" href="http://www.rbi.org.in/scripts/bs_circularindexdisplay.aspx"&gt; circulars by the Reserve Bank of India&lt;/a&gt; regarding online banking and money transfer activities which are more generic in nature trying to secure the online space as a whole, there are no specific laws that seek to protect consumers in the online space. However, that does not necessarily mean that the consumers are left without any recourse and in this post we shall examine whether it is possible to use the &lt;a class="external-link" href="http://www.ncdrc.nic.in/1_1.html"&gt;Consumer Protection Act, 1986&lt;/a&gt; to protect consumer rights in the online environment as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Consumer Protection Act, 1986 (“&lt;b&gt;COPRA&lt;/b&gt;”) was enacted with the purpose of empowering consumers to take on the might of large corporations and preventing unscrupulous businessmen from taking undue advantage of the weak position which consumers are inherently placed  in under the archaic Indian judicial system. It set up special tribunals, simpler procedures and enacted special provisions to help consumers get a better bargaining position vis-à-vis manufacturers and retailers, etc. However, since this law was enacted more than a quarter of a century ago and it is not entirely geared towards protecting consumer rights in the digital era. However, that does not mean it is entirely toothless in the online environment although it certainly needs some major provisions to come to grasp with the special circumstances and practices of the online marketplace, as the rest of the discussion will demonstrate.&lt;/p&gt;
&lt;p&gt;For any transaction to come under the purview of COPRA, it should have the following three essential requirements:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;There should be a ‘good’ or ‘service’ sold or provided to a consumer;&lt;/li&gt;
&lt;li&gt;Such good or service must be ‘sold’ i.e. there must be a ‘sale’;&lt;/li&gt;
&lt;li&gt;There should be a ‘defect’ in the good or ‘deficiency’ in the service;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We will now examine different types of e-commerce transactions and discuss whether they fulfill the requirements given above and therefore are amenable to the jurisdiction of COPRA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;There should be a ‘good’ or ‘service’&lt;/b&gt;&lt;br /&gt;This is issue is not very complicated so far as digital purchases of physical items are concerned. Since a book or a mobile phone is considered as a ‘good’ then it will always be considered as a ‘good’ irrespective of whether it has been bought from a physical shop or an online retailer. However, the question does take on an air of some complexity when dealing with digital items such as mp3 files and software programmes. The &lt;a class="external-link" href="http://trivandrum.gov.in/~trivandrum/images/pdfs/generalclausesact.pdf"&gt;General Clauses Act, 1897&lt;/a&gt; states that all property which is not immovable property is considered as movable property. Since immovable property is defined as land and things attached to the land, therefore it is pretty clear that ‘computer software’ would in all likelihood be considered as movable property. Whether such movable property can be considered as a ‘good’ or not is a question which is yet to be tested in the courts of law in India, however it must be mentioned that in the context of the Sales Tax Act, the Supreme Court of India has held canned software to be a ‘good’. Laying down a test for determining whether a property is a ‘good’ or not, the Supreme Court in that case laid down the following test:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;“A 'goods' may be a tangible property or an intangible one. It would become goods provided it has the attributes thereof having regard to (a) its utility; (b) capable of being bought and sold; and (c) capable of transmitted, transferred, delivered, stored and possessed. &lt;span&gt;If a software whether customized or non-customized satisfies these attributes, the same would be goods.&lt;/span&gt;”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be emphasized again that the Supreme Court’s ruling was given in the context of the Sales Tax Act and it may not be accepted by a court deciding a case on COPRA. This is one issue which could and should be addressed under Indian laws to ensure that the large numbers of Indian consumers who buy items in the online marketplace are not left in a lurch and without the protection of the COPRA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;There must be a “Sale” of the good or service&lt;br /&gt;&lt;/b&gt;Just as the previous issue, this question again can be simple when asked in relation to sale of physical goods using the internet but may not be so when talking about digital goods. When a physical item is purchased using the internet, a sale may be said to have occurred when the ownership of the good passes from the seller (online retailer) to the buyer (consumer) and the payment and delivery are complete. However, the question whether sale of software (here we are using this generic term for all sorts of computer programmes and data because the reasoning and legal analysis can be applied to both types of data) in an online environment would actually constitute a ‘sale’ requires a little more analysis. A huge problem in labeling online software purchases as a ‘sale’ is that most of these ‘sales’ are made in the form of a license. The manufacturers or retailers would argue that such an online purchase is not really a sale since the consumer usually only gets a license to use the product under strict conditions and does not buy the product as an owner, further this is really the industry standard when it comes to software purchases. The argument on the other side is that most websites advertise these products as an outside sale, for example, if you go to the &lt;a class="external-link" href="http://www.quickheal.com/"&gt;Quick Heal&lt;/a&gt; antivirus website today and go to the page for “Home Users”&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; the page clearly shows a “Buy Now” tab and indicates the price at Rs. 1549/-. In fact in a number of cases you can actually buy the file containing the software without ever being shown the contractual terms of the agreement. These terms usually specify that you are only getting a license to use the product and may not have the right to resell or lend the product to others, rights which a traditional buyer of a product enjoys under law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This issue was also discussed by a Full Bench of the Supreme Court of India in the case of &lt;i&gt;Tata Consultancy Services&lt;/i&gt; v. &lt;i&gt;State of Andhra Pradesh&lt;/i&gt;,&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; which ultimately held that the ‘sale’ of canned software (the term the court used for non customized software which is sold off the shelf) would be a sale of goods and therefore liable to be taxed under the Sales Tax Act. As is evident this decision was given in the context of the Sales Tax Act, but it could be argued that since tax statues are anyways supposed to be interpreted strictly and beneficial statutes such as the COPRA are required to be interpreted broadly, as per the accepted rules of legal interpretation, therefore it is possible that such a ‘license’ for computer software bought by an ordinary consumer could be considered as a ‘sale’ so as to bring the item within the ambit of the COPRA.&lt;/p&gt;
&lt;p&gt;Here again we see that although there might be arguments which could be made to justify such licences for computer software as a ‘sale’, however it is still an untested issue and the COPRA certainly needs to take these issues into account if we want to protect the rights of the ever growing number of online consumers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;There should be a “defect” in the goods&lt;/b&gt;&lt;br /&gt;If I order a pair of shoes from &lt;a class="external-link" href="http://flpikart.com/"&gt;flpikart.com&lt;/a&gt; and the shoes arrive with one of the soles torn off, it’s a pretty straightforward case of there being a defect. In such a scenario unless the retailer has a specified return policy (which incidentally flipkart has) the consumer would have a right to approach the consumer forum to lodge a compliant. Similarly, if I buy a software from a manufacturer for my personal use and the file has a bug in it, it can fairly easily be considered as a defect since any fault, imperfection or shortcoming in the quality, quantity, potency, purity or standard or the good can be considered as a defect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is where things get a little interesting. What if we argue that stringent Digital Rights Management techniques by some online retailers are actually a defect in the goods since they do give the consumer all the rights that a buyer of goods would traditionally have. For example, if I buy an e-book with DRMs which restrict lending and on-selling, then two of my rights as a traditional book buyer are straightaway rescinded. Let us now examine the issue in the traditional context of the term ‘defect’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If an article bought has any fault, imperfection or shortcoming in the quality, etc., then it would be considered as a defective good. For example, if a person buys a generator which is creating excessive noise, then it can be said that there is a shortcoming in the quality or the standard which is required to be maintained. A generator may supply electricity perfectly well and there may not be any fault at the time of running the machine but while operating the machine if it is creating more noise than the prescribed level, it can be said that there is a defect in the manufacture. An e-book with DRMs may also let a consumer read its contents but that may not be the only criteria to determine whether an item is defective or not. Using the traditional definition of a ‘buyer’, we can argue that a traditional buyer commonly has rights such as the right to resale, the right to make copies for personal use, the right to lend, the right to gift, etc., which may not exist in a an e-book with DRMs. Thus, an argument could be made that such measures constitute a ‘defect’ in the goods under the COPRA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, this is only an argument and it is entirely possible that a court of law may reject such an argument, especially in light of the fact that the consumer has entered into a license agreement while completing the transaction which specifically grants the consumer only specific and limited rights in regard to the item being purchased. A possible counter to this argument could be that the agreement is generally long and verbose and is only presented to the consumer towards the end of the transaction when the consumer generally does not have the time to read it. Further, there is hardly ever a situation where the consumer can negotiate the terms of the contract, it is usually a standard form of contract which is heavily tilted in favour of the seller and the consumer is given no real choice in this regard. This is why in common law jurisdictions the courts have laid down certain principles or extra conditions which a standard form of contract has to abide by for it to be enforceable viz.,:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Sufficient notice&lt;/span&gt;: This principle requires that the major and specially the unusual terms in a contract should be displayed in a sufficiently highlighted manner so that a reasonable consumer is not likely to miss these unusual terms.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Fundamental breach of contract&lt;/span&gt;: If the contract is so drafted that it would impose additional obligations on the consumer or restrict the liability and obligations of the seller in such a way that it would result in breaching any of the fundamental or main terms or obligations that one expects in such a contract, then such a contract may not be enforceable.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;Exclusion of unreasonable terms&lt;/span&gt;: Another type of protection that is available to consumers is the principle which seeks to exclude unreasonable terms from a contract i.e. a term which would defeat the very purpose of the contract or if it is repugnant to the public policy.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Relying on the above principles of standard form contracts, it is possible to at least argue that highly strict and limiting terms which are put into a long verbose standard form contract which backs the Technology Protection Measures on a protected software may not be entirely enforceable, in which case the alleged consent of the consumer for such DRMs gets negated and the software with all its DRM limitations could be considered as ‘defective’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;From the discussion above it is clear that the nature of online transactions and digital goods presents certain unique problems for the legal regime which seeks to protect consumer rights. The law needs to be amended to take into account the unique circumstances of this fledging marketplace that exists online and ensure that the legal regime is fully capable of facing the challenges thrown up by e-commerce. One of the initiatives in this regard is the effort by Consumers International to include amendments in the Model &lt;a class="external-link" href="http://www.consumersinternational.org/who-we-are/un-guidelines-on-consumer-protection#.UgNj_6xWygg"&gt;United Nations Guidelines for Consumer Protection&lt;/a&gt; to include various provisions which deal with the online marketplace and its unique challenges as well as issues relating to access to knowledge (A2K). Perhaps it is time for the establishment in India to also take this into account and bring our quarter of a century old consumer protection legislation in line with the digital age.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://goo.gl/Mh74vB"&gt;http://goo.gl/Mh74vB&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://goo.gl/By5x3i"&gt;http://goo.gl/By5x3i&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;i&gt;Tata Consultancy Services&lt;/i&gt; v. &lt;i&gt;State of Andhra Pradesh&lt;/i&gt;, 5 November, 2004, available at &lt;a class="external-link" href="http://goo.gl/Bn7KRp"&gt;http://goo.gl/Bn7KRp&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://goo.gl/lMdoI"&gt;http://goo.gl/lMdoI&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].&lt;a class="external-link" href="http://goo.gl/Bn7KRp"&gt;http://goo.gl/Bn7KRp&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Henderson&lt;/i&gt; &amp;amp; others v.&lt;i&gt; Stevenson&lt;/i&gt;, 1875 2 R (HL) 71, &lt;i&gt;Interfoto Picture Library&lt;/i&gt; Ltd v&lt;i&gt;. Stiletto Visual&lt;/i&gt; Programmes Ltd. [1988] 1 All ER 348.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Harbutt's&lt;/i&gt; "&lt;i&gt;Plasticine&lt;/i&gt;" &lt;i&gt;Ltd. &lt;/i&gt;v&lt;i&gt;. Wayne Tank and Pump Co Ltd&lt;/i&gt; [1970] 1 QB 447.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;i&gt;Lily White&lt;/i&gt; v. &lt;i&gt;R. Mannuswami&lt;/i&gt;, AIR 1966 Mad.13.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/are-indian-consumers-laws-ready-for-digital-age'&gt;https://cis-india.org/a2k/blogs/are-indian-consumers-laws-ready-for-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-08-08T11:52:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
