<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 161 to 175.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/migrant-workers-solidarity-network-and-cis-ankan-barman-atmanirbhar-bharat-meets-digital-india-an-evaluation-of-covid-19-relief-for-migrants"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/world-narrow-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/young-people-technology-new-literacies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/invisible-censorship"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/citizen-activism-the-past-decade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/no-more-66a"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/migrant-workers-solidarity-network-and-cis-ankan-barman-atmanirbhar-bharat-meets-digital-india-an-evaluation-of-covid-19-relief-for-migrants">
    <title>Atmanirbhar Bharat Meets Digital India: An Evaluation of COVID-19 Relief for Migrants</title>
    <link>https://cis-india.org/raw/migrant-workers-solidarity-network-and-cis-ankan-barman-atmanirbhar-bharat-meets-digital-india-an-evaluation-of-covid-19-relief-for-migrants</link>
    <description>
        &lt;b&gt;With the onset of the national lockdown on 24th March 2020 in response to the outbreak of COVID-19, the fate of millions of migrant workers was left uncertain. In addition, lack of enumeration and registration of migrant workers became a major obstacle for all State Governments and the Central Government to channelize relief and welfare measures.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;A majority of workers were dependent on relief provided by NGOs, Civil Society Organizations and individuals or credit via kinship networks. With mounting domestic and international pressures, various relief and welfare schemes were rolled out but they were too little, too late and more often than not characterised by poor implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of this report is to qualitatively assess health conditions of migrant workers and access to welfare during the first COVID-19 lockdown. The primary focus is on the host states of Tamil Nadu, Maharashtra and Haryana. 20 in-depth interviews were conducted remotely with migrant workers working in various sectors. Their access to welfare schemes of the Central Government as well as of their host states was ascertained. Emphasis was also laid on their access to healthcare facilities in relation to COVID-19 and non-COVID-19 ailments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The findings of the report showcase a dismal state of affairs. No one in our sample group received any kind of dry ration or cooked food in a sustained manner and, in the rare occasions when they did, it was woefully inadequate. Of the three states considered, we found that relief distribution was the best in Tamil Nadu followed by Maharashtra and then Haryana. Even the Direct Cash Transfer Scheme of the Central Government under ‘&lt;i&gt;Atmanirbhar Bharat&lt;/i&gt;’ did not reach the migrant workers. Moreover, the migrant workers were apprehensive to report any COVID-19 related symptom due to the draconian treatment that followed therein and the crumbling healthcare sector made it impossible to avail facilities in non-COVID-19 related issues. Lastly, a case has been made for the creation of bottom-level infrastructures to further dialogue between various stakeholders, including associations of migrant workers, for the implementation of schemes and policies which can consolidate migrant workers as a relevant political subject. As migrant workers reel from the impact of the second wave, pushing for on-ground infrastructure and supporting community-based organisations becomes even more urgent.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/raw/files/atmanirbhar-bharat-meets-digital-india.pdf"&gt;Click here to read the report&lt;/a&gt; authored by Ankan Barman and edited by Ayush Rathi. [PDF, 882 kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/migrant-workers-solidarity-network-and-cis-ankan-barman-atmanirbhar-bharat-meets-digital-india-an-evaluation-of-covid-19-relief-for-migrants'&gt;https://cis-india.org/raw/migrant-workers-solidarity-network-and-cis-ankan-barman-atmanirbhar-bharat-meets-digital-india-an-evaluation-of-covid-19-relief-for-migrants&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ankan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2021-06-03T12:53:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/world-narrow-web">
    <title>World Narrow Web</title>
    <link>https://cis-india.org/internet-governance/world-narrow-web</link>
    <description>
        &lt;b&gt;Censorship and how govt reacts to it may push us to country-specific networks, writes Pranesh Prakash in an article published in the Indian Express on 4 February 2012. &lt;/b&gt;
        &lt;p&gt;Twitter, a popular micro-blogging service, recently announced that “[today] we give ourselves the ability to reactively withhold content from users in a specific country — while keeping it available in the rest of the world”. In a move a few weeks ago, Blogger, Google’s blogging service, in effect announced something similar, by saying that default they would redirect Blogger users trying to get to Blogspot.com addresses (like &lt;a class="external-link" href="http://example.blogspot.com"&gt;http://example.blogspot.com&lt;/a&gt;) to their respective country sites (like &lt;a class="external-link" href="http://example.blogspot.in"&gt;http://example.blogspot.in&lt;/a&gt;). Twitter’s announcement was greeted with much disapproval by many Twitter users, as a move towards censorship, with some talking (on Twitter) about a boycott. Blogger’s move was hidden away, deep within a help page, and is being noticed now, and is causing quite a stir as caving in to censorship. Are these concerns justified? Before answering that question, let’s look at what the platforms’ announcements really say.&lt;/p&gt;
&lt;p&gt;Twitter has given itself the ability to withhold specific tweets and users in particular countries where that content is legally required to be removed (generally with a court order). Their earlier option, they inform us, was to block the offending tweets and users in all countries. Apart from this, they will publish a notice for each tweet/ user that is blocked in a country. They will also be proactively publishing every removal request they receive at ChillingEffects.org, which allows us to hold them to account and question their decision to remove tweets.&lt;/p&gt;
&lt;p&gt;Google, by redirecting you to the country-specific Blogger, is allowing for country-level removal of both blogs and individual blog posts. However, they also note that you can circumvent this by using a special “no redirect” address. Google currently forwards all search-related removals, but does not do so for Blogger-related requests, and all copyright-related complaints to ChillingEffects.org. Google does publish aggregate data relating to censorship of Blogger, on which free-speech advocates have been asking them to provide more granular information.&lt;/p&gt;
&lt;p&gt;There are three problems. First, while Twitter was just as open to repressive governments’ requests last week, by making this change, they are advertising this fact to such governments. Thailand has noted it, and has congratulated Twitter.&lt;/p&gt;
&lt;p&gt;Second, as Rob Beschizza, managing editor of the website Boing Boing, pointed out, there have been no instances of political content having been removed by Twitter. Even British courts’ super-injunctions (injunctions on speech, that prevent you from mentioning the fact that there is an injunction) were defeated by Twitter users, which only showed that attempts to censor material results in even more attention being drawn to it (which is popularly known as the “Streisand Effect”). So, does this now mean that Twitter will start applying local laws to judge “valid and applicable legal requests”, instead of American laws? What if the law is as bad as that which exists in India, where they are required to remove content within 36 hours based on any affected person’s complaint — without a court order? Will they still act on it? If they don’t, will the government or courts order Twitter.com to be blocked in India, finding it liable for illegal omissions?&lt;/p&gt;
&lt;p&gt;Third, this trend points increasingly to the fact that we are witnessing a Balkanisation of the Web as more countries start asserting their sovereignty online. As Chinese dissident journalist Michael Anti pointed out recently, it seems we now need visas (read “circumvention techniques”) to visit the international Web. But even then, there is no longer a singular “international” Web, but an Indian Web and a Guatemalan Web, and an Angolan Web. And the government’s recent proposal of requiring companies to locate their servers in India is a move towards this (apart from being a move towards killing cloud computing).&lt;br /&gt;&lt;br /&gt;That having been said, the reality is that the CEOs of Google, Google India, and Microsoft have been summoned to appear in Indian courts for allowing their users to publish material which they don’t know about, which is in a sealed envelope (and most of the accused companies haven’t been shown yet), and which they weren’t even asked once to remove.&lt;br /&gt;&lt;br /&gt;The Intermediary Guidelines Rules passed by the Department of Information Technology in April 2011 do not require the user, whose content it is, to be told that there is a complaint, nor to be given a chance to defend themselves. It does not even require public notice that the content has been removed.&lt;/p&gt;
&lt;p&gt;The truth is, the transparency around censorship that Google and Twitter are providing is far better than what most other companies are providing. For instance, Big Rock, an Indian DNS provider, suspended the CartoonsAgainstCorruption.com web address on the basis of a seemingly not legal request by the Cyber Cell of the Mumbai Crime Branch, and did so without any public notice and without even informing the cartoonist whose web address it was. At least Google and Twitter are pushing back against non-legal requests, and refusing to remove content that doesn’t violate&amp;nbsp; local laws. Single-mindedly criticising them will only put off other companies from following in their footsteps.&lt;br /&gt;&lt;br /&gt;Instead of criticising those who are actually working towards transparency in censorship, we should encourage them and others, push intermediaries not to cave in to unreasonable censorship requests, prevent them from over-censoring on their own, and push hard for the government to incorporate their best practices as part of the Intermediary Guidelines Rules.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/world-narrow-web/907579/1"&gt;The original article was published in the Indian Express&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/world-narrow-web'&gt;https://cis-india.org/internet-governance/world-narrow-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Twitter</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-03-27T16:00:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/young-people-technology-new-literacies">
    <title>Deconstructing Digital Natives: Young People, Technology and the New Literacies</title>
    <link>https://cis-india.org/digital-natives/young-people-technology-new-literacies</link>
    <description>
        &lt;b&gt;Nishant Shah was invited to do a book review of a new anthology 'Deconstructing Digital Natives', edited by Michael Thomas. The review was published in Routledge's Journal of Children and Media on July 18, 2012. &lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Deconstructing Digital Natives: Young People, Technology and the New Literacies&lt;/em&gt; is an anthology that revisits the debates and scholarship that have arisen around youth and technology in the last decade or so. It is a timely intervention that invites some of the most influential scholars who have contributed to and shaped the discourse around “digital natives” to come and revisit their original ideas from the last decade. The term “digital native” probably bears witness to the strident discourses that, more often than not, fall into the trap of exotically glorifying or despairingly vilifying young peoples’ engagement with digital technologies. As Buckingham points out in his foreword to the book, these conversations either take up the language of a “generation gap [that] entails a narrative of transformation and even of rupture, in which fundamental continuities between the past and the future have been destroyed” or they guise themselves in an “almost utopian view of technology—a fabulous story about technology liberating and empowering young people, enabling them to become global citizens, and to learn and communicate and create in free and unfettered ways” (p. ix). The essays seek a point of departure from these tried and tested arguments in order to provide a “balanced view” on the topic. And so we have a distinguished author list from the world of digital natives scholarship, coming together not only to ponder on their own contributions to the field and how those ideas need to be upgraded, but also to provide new contexts, concepts, and frameworks to understand who, or indeed, what, is a “digital native,” often in tension with their earlier work.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In its ambition of revisiting existing debates and providing a “research-based approach by presenting empirical evidence and argument from international researchers in the field,” the book succeeds unevenly (p. xi). Despite its efforts to chart a point of departure, some of the essays end up falling into some usual traps. For example, despite the fact that the oldest digital natives are probably in their thirties, they are thought of as being young. They are defined only as “students” within formal learning institutions without looking at the radical potential of learning outside organized education, embedded in their everyday practices. The digital natives remain an object of research and the peer-to-peer structures that are supposed to shape them, but do not feature in the methodologies of researching them. This notwithstanding, the essays still offer a historical and social perspective on the debates around digital natives in certain developed pockets of the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the first section, “Reflecting on the Myth,” Thomas’ essay “Technology, Education and the Discourse of the Digital Native” introduces a tension between the techno-euphorists and the “digital luddites,” which replays itself through the rest of the contributions. While Thomas places himself between “technoevangelism” and “technoskepticism,” Prensky, who coined the term “Digital Natives” in 2001, then introduces to us a new binary of “digitally wise” and “digitally dumb” (p. 4). Prensky reviews the responses that his opposition of “digital natives” and “digital immigrants” have produced over the last decade and emphasizes that his coinage was at the level of a metaphor, and was not to be taken seriously. Prensky agrees that the earlier opposition might be discarded because it evokes too many simple responses based on skills with technology. Digital wisdom, for Prensky, is in the ways in which digital technologies enhance the human brain “to anticipate second- and third-order effects to which the unaided mind may be blind” as the world becomes too complex for the “unenhanced human brain” to cope with it (p. 23). Typically, Prensky’s argument creates a dichotomy of those who can (and will) and those who will be outside of this web of digital enhancements. His analysis tries to complicate the idea of human wisdom by looking at questions of ethics and agency, but the final formulations appear cliche´d, merely re-creating the older tensions rather than thinking through them. Jones’ following essay on the “Net Generation” is more persuasive, where he argues for dismissing the idea that “nature of certain technologies . . . &lt;em&gt;has affected the outlook of an entire age cohort&lt;/em&gt; in advanced economies” and instead should unpack how “new technologies emerging with this generation have particular characteristics that &lt;em&gt;afford certain types of social engagement&lt;/em&gt;” (p.42).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the second section, titled “Perspectives,” the essays take up two different tones.The first is about looking at digital literacy, skill, and fluency in everyday practices of digital natives, and how they shape our contemporary and future sociopolitical and cultural landscapes. Banaji, in exploring the EU Civic Web Project, echoes Jones’ ideas. The presumptions within education about an entire generation as “born with technologies” has consequences in the field of civic action, where programs for citizen action are designed with expectations that the young people will have core digital competencies and literacy. She does not push that argument further, but in her study of the two Scottish e-initiatives, one can see the promise of a radical reconstruction of civic engagement movements, where the young participants are not going to be satisfied as mere participators, and will demand a space for their voice to be heard.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Takahashi’s essay on the &lt;em&gt;oyaubibunka&lt;/em&gt; (“thumb culture”) mobile generations in Japan stands alone in its analysis of an Asian context—though many might argue that Japan, with its developed economy, can hardly be counted as a typically “Asian” perspective. Takahashi is rooted, both in practice and discourse, in youth and technology in Japan, where the youth often experience close-knit community experiences through mobile interfaces, in their otherwise alienated modern habitats. Almost as a response to Turkle’s Alone Together (2011), Takahashi shows how collaborative and cocreation cultures ranging from the mobile novels on Mixi to everyday interaction on Social Networking Systems is bringing in new kinds of social spaces of belonging. The essay, however, resists simply celebrating this space and works in complex ideas of freedom, control, risks, and the tensions between traditionalization and modernity in Japan.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Zimic and Dalin, writing from a similar heavily connected Nordic region, pose a different set of questions in their essay, “Actual and Perceived Online Participation Among Young People in Sweden.” For Zimic and Dalin, in a space where connectivity can be taken for granted, the further question to ask is not whether digital natives participate online or not, but whether they participate in ways that are expected of “a digital citizen in the information age” (p. 137). Through empirical data and case studies, the essay shows the different kinds of activities that youth engage with and also concludes that though engaging in civic issues is important to the young people’s sense of belonging to participatory cultures, using the Internet does not provide an “automatic guarantee” toward participation, and “assistance is required in order to engage them in relevant activities” (p. 148).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The second set of essays in this section all cluster around the digital native as a student. Locating the digital native within educational institutions, they look at the ways in which the ideas of learning, pedagogy and engagement with the text are changing with the rise of digital technologies. Levy and Michael look at two case studies involving students in Australian high schools, to “facilitate a deeper understanding of products and processes in multimodal text construction,” which they think is core to interactive communication technology literacy skills (p. 85). The data is rigorous and rich, but the conclusions are a bit of a disappointment: digital natives need to better manage their time and resources and they need to learn traditional skills in order to cope with their educational environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The trend of an exciting hypothesis and conclusion, which do not necessarily leave you with anything more than what you already knew, continues in this section. Erstad sets out on a journey to see how digital literacy posits challenges to educating the digital generation and ends by suggesting that the digital divide should address questions of “how to navigate in the information jungle on the Internet, to create, to communicate, and so forth” (p. 114). Similarly, Kennedy and Judd want to unravel the mystery of why “students, who are so clearly familiar and apparently adept with Internet tools, are at times so poor at using the Internet academically” (p. 119). Through empirical research and interaction with students, they end up making an argument against the Googlization of everything (Vaidhyanathan, 2011), suggesting that “satisficing strategies” of information search, defined by a need for instant gratification and not looking beyond the first information sets, has produced “a generation of students that has grown up with Google [who] may over-value expediency when locating and selecting appropriate scholarly information” (p. 132). On similar trends, Levy proposes to question the assumption of whether all “young children are inherently ‘native’ users of digital technology” for implications on our future pedagogy within the new textual landscape (p. 152). The case studies and the frameworks built are interesting, but they reveal nothing more than the claim that the essay begins with by Marsh et al. (2005) and Bearne et al. (2007) that “young children are immersed in ‘digital practices’ from an early age and that they often develop skills in handling screen texts even when they are not exposed directly to computers at their own homes” (Levy, 2011, p. 163). The implication is clear: change our schools to accommodate for these new textual practices and help children capitalize on their digital competence and develop “digital wisdom.” But it is a recommendation that has been around for at least a decade, if not more.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The third and concluding section of the book, “Beyond Digital Natives,” is possibly the most promising part of the book. Bennett and Maton seek to look beyond “nuanced versions of the idea” and move the debate on to firmer grounds of how the rise of the digital natives is going to affect the policies around educational technology” (p. 169). They engage with a body of work that is specifically oriented toward building empirical evidence-based frameworks for understanding the potential role of technology in education. With a fine conceptual tool that makes distinctions between access and usage, they systemically dismiss the “academic moral panic” that characterizes conversations around youth-technology-change.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Bennett and Maton, the object of inquiry is not the digital native but the body of discourse that surrounds this particular entity—and they make a plea for research rather than imaginings, showing how the influential work in the area has been plagued by unsupported claims, unevidenced observations, and futuristic imaginations, which paint a poetic picture of digital natives but offer very little in terms of furthering the argument. It is also noteworthy that they do not flinch from critiquing the colleagues who also feature in the same book, as an idealizing and homogenizing group that has shown “diversity rather than conformity” (p. 181).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Palfrey and Gasser, whose &lt;em&gt;Born Digital&lt;/em&gt; (2008) has been the guide for lay readers to understand the nuances and complexities of the area, in their essay, begin by acknowledging that “digital natives” is an awkward term. However, they argue, it is still a term that resonates deeply with parents and educators, and that this resonance should not be taken lightly by researchers. Their decision was to use this term, albeit with caution and discretion, strategically to refer to a small subset of young people and the gamut of relationships and engagements they have with digital technologies. The suggestion is to use the term and in every usage, look at the unevennesses and awkwardness it creates, thus actually unpacking an otherwise opaque relationship which is reduced to “usage” or “access.” Their concerns are more about the quality of information and access, infrastructure for critical literacy and digital fluency, and making legible these everyday practices to larger implications for a future that they posit is bright and hopeful.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Deconstructing Digital Natives&lt;/em&gt; is an interesting revisit of a term that has grown in different ways through the first decade of the new millennium. However, the book still remains located in the same geopolitics in which the early discourse of digital natives were grounded—developed, privileged locations where connectivity, affordability, and ubiquitous digital literacy are taken for granted—reminiscent of the frantic cries one hears in piracy markets in Bangkok, “same, same, but different.” The revisiting does not seem to feel the need to explore other contexts. A few essays talk about factoring in local and contextual information in understanding digital natives, but the scholarship reinforces the idea of how technologies shape and are shaped by identities in some parts of the world, and that these identities can be heralded as universally viable, with a little nuancing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The questions that have emerged in this discourse in the recent years, remain ignored. What does a digital native look like in the Global South? Can we have new concepts and frameworks which emerge from these contexts? Is it possible to produce accounts in languages and ideas that are embedded in everyday practices rather than forcing them to become legible in existing vocabularies? One would hope that the next book that deconstructs digital natives would also deconstruct the prejudices, presumptions, and methodological processes that are embedded in this field.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Bearne, E., Clark, C., Johnson, A., Manford, P., Motteram, M., &amp;amp; Wolsencroft, H. (2007). Reading on screen. Leicester: UKLA.&lt;/li&gt;
&lt;li&gt;Marsh, J., Brookes, G., Hughes, J., Ritchie, L, Roberts, S., &amp;amp; Wright, K. (2005). &lt;em&gt;Digital beginnings: Young children’s use of popular culture, media and new technologies&lt;/em&gt;. Sheffield: Literacy Research Centre, University of Sheffield.&lt;/li&gt;
&lt;li&gt;Palfrey, J., &amp;amp; Gasser, U. (2008). &lt;em&gt;Born digital&lt;/em&gt;. New York, NY: Basic Books.&lt;/li&gt;
&lt;li&gt;Turkle, S. (2011). &lt;em&gt;Alone together: Why we expect more from technology and less from each other&lt;/em&gt;, NY. New York: Basic Books.&lt;/li&gt;
&lt;li&gt;Vaidhyanthan, S. (2011). &lt;em&gt;The Googlization of everything: (And why we should worry)&lt;/em&gt;. Berkeley, CA: University of California Press.&lt;/li&gt;
&lt;hr /&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;span class="visualHighlight"&gt;Nishant Shah is the Director-Research at the Bangalore-based Centre for Internet and Society. He is the principal researcher for a Global South inquiry into digital natives and sociopolitical change, and recently edited four-volume book, Digital AlterNatives with a Cause?, which is available as a free download at &lt;a href="https://cis-india.org/digital-natives/blog/dnbook" class="external-link"&gt;http://cis-india.org/digital-natives/blog/dnbook&lt;/a&gt;. Correspondence to: Nishant Shah, Centre for Internet and Society, Bangalore, India. E-mail: nishant@cis-india.org&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;Download the file (originally published by Taylor &amp;amp; Francis) &lt;a href="https://cis-india.org/digital-natives/deconstructing-digital-natives" class="internal-link"&gt;here&lt;/a&gt; [PDF, 66 Kb]&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="visualHighlight"&gt;Read the original published by Taylor &amp;amp; Francis &lt;a class="external-link" href="http://www.tandfonline.com/doi/abs/10.1080/17482798.2012.697661"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/young-people-technology-new-literacies'&gt;https://cis-india.org/digital-natives/young-people-technology-new-literacies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Book Review</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:51:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet">
    <title>Fill The Gap: Global Discussion on Digital Natives</title>
    <link>https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet</link>
    <description>
        &lt;b&gt;More often than not people don't understand the new practices inspired by Internet and digital technologies. As such a series of accusations have been leveled against the Digital Natives.  Educators, policy makers, scholars, and parents have all raised their worries without hearing out from the people they are concerned about. Hivos has initiated an online global discussion about Digital Natives. So, to voice your opinion, start tweeting with us now #DigitalNatives.&lt;/b&gt;
        
&lt;div class="content-view-full"&gt;
&lt;div class="class-event"&gt;
&lt;div class="pagecontent"&gt;
&lt;h2&gt;If you cannot attend Fill The Gap, you can also join us in a global discussion on some of the issues being discussed at #DigitalNatives&lt;br /&gt;&lt;/h2&gt;
&lt;br /&gt;
&lt;p&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you an apolitical consumer, or do you have ambitions?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNatives" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNatives&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a little prince or princess, who only wants to talk to like minded people
or are you different?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesPrincess" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesPrincess&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Is
Wikipedia your bible or do you really know something?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesWiki" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesWiki&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Are
you a digital dinosaur? They say you don’t know anything about ICT!&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalDinosaur" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalDinosaur&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Why
use the Internet, why don’t you march the streets?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesProtest" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesProtest&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Plans
to change the world? What do you need?&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld" target="_blank"&gt;http://www.tweetworks.com/groups/view/DigitalNativesChanceTheWorld&lt;/a&gt;&lt;/p&gt;
&lt;br /&gt;If you are in Amsterdam, here is the information you will need to attend the event:&lt;br /&gt;
&lt;h2&gt;Fill the Gap! - 7&lt;/h2&gt;
&lt;h3&gt;
R U Online?&lt;/h3&gt;
&lt;div class="date"&gt;Date: 				15 January 2010 				&amp;nbsp;&lt;/div&gt;
&lt;div class="date"&gt;Time: 									 12.30 											until
					
											17.00 hour&lt;/div&gt;
&lt;div class="date"&gt;Location: Het Sieraad, Postjesweg 1, Amsterdam&lt;/div&gt;
&lt;br /&gt;
			
			&lt;strong&gt;&lt;/strong&gt;The seventh edition of Fill the Gap! is all about the power of youth
and IT in developing countries. How can their skills be strengthened
and put to use for a better world? Hivos, apart from cohosting the
event, will be involving digital natives to hear their stories about
ICT and engagement. 
&lt;br /&gt;
&lt;p&gt;
An Open Space event on the potential of new (mobile) media and youth in
developing countries. For everyone in politics, the profit and the
non-profit sectors who is interested in ICT and international
development cooperation.&lt;/p&gt;
&lt;p&gt;
The use of new (mobile) technology is the most natural thing in the world for the youth of today.&lt;/p&gt;
&lt;p&gt;
Shaped by the digital era and at ease with creativeity, these
innovators use new media to change the world. Just think of the Twitter
revolution in Iran. What can the international development sector learn
from this? How could international development cooperation use the
potential power of youth to tackle development problems?&lt;/p&gt;
&lt;p&gt; The seventh edition of Fill the Gap! is all about the power of
youth and IT in developing countries. How can their skills be
strengthened and put to use for a better world? The kick-off will be
hosted by Jennifer Corriero, co-founder of Taking IT Global: the
international platform for youth and the use of new media for a better
world. Then the floor is open to discuss your own ideas with people
from new media, the business world and the international development
sector during the Open Space sessions. Join in: come to Amsterdam on
Friday January 15th and be inspired during Fill the Gap!&lt;br /&gt;
 &lt;br /&gt; Registration is free. The programme is in English.&lt;/p&gt;
&lt;br /&gt;&lt;a href="http://www.fill-the-gap.nl/Fill_the_gap_7?" target="_blank"&gt;» Fill the Gap&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet'&gt;https://cis-india.org/research/grants/digital-natives-with-a-cause/dntweet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Agency</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Digital subjectivities</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2010-01-22T10:54:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns">
    <title>Open Data Hackathons are Great, but Address Privacy and License Concerns</title>
    <link>https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns</link>
    <description>
        &lt;b&gt;This is to cross-publish a blog post from DataMeet website regarding a letter shared with the organisers of Urban Hack 2015, Bangalore, in response to a set of privacy and license concerns identified and voiced during the hackathon by DataMeet members. Sumandro Chattapadhyay co-authored and co-signed the letter. The blog post is written by Nisha Thompson.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Hackathons are a source of confusion and frustration for us. DataMeet actively does not do them unless there is a very specific outcome the community wants like&lt;a href="https://github.com/datameet/maps/tree/master/parliamentary-constituencies"&gt; freeing a whole dataset &lt;/a&gt;or introducing &lt;a href="http://datameet.org/2015/05/13/mumbai-meet-6-data-science-hackathon/"&gt;open data to a new audience&lt;/a&gt;. We feel that they cause burn out, are not productive, and in general don't help create a healthy community of civic tech and open data enthusiasts.&lt;/p&gt;
&lt;p&gt;That is not to say we feel others shouldn't do them, they are very good opportunities to spark discussion and introduce new audiences to problems in the social sector. &lt;a href="http://www.datakind.org/chapters/datakind-blr"&gt;DataKind&lt;/a&gt; and &lt;a href="https://rhokbangalore.wordpress.com/"&gt;RHOK&lt;/a&gt; and numerous others host hackathons or variations of them regularly to stir the pot, bring new people into civic tech and they can be successful starts to long term connections and experiments. A lot of people in the DataMeet community participate and enjoy hackathons.&lt;/p&gt;
&lt;p&gt;However, with great data access comes great responsibility. We always want to make sure that even if no output is achieved when a dataset is opened at least no harm should be done.&lt;/p&gt;
&lt;p&gt;Last October an open data hackathon,&lt;a href="https://www.hackerearth.com/sprints/urban-hack/"&gt; Urban Hack&lt;/a&gt;, run by Hacker Earth, &lt;a href="http://www.nasscom.in/"&gt;NASSCOM&lt;/a&gt;, &lt;a href="http://www.xrci.xerox.com/"&gt;XEROX&lt;/a&gt;, &lt;a href="https://console.ng.bluemix.net/?cm_mmc=EcoDISA-_-Bluemix_day-_-11-15-14::12-31-15-_-UrbanHack"&gt;IBM &lt;/a&gt;and &lt;a href="http://wri-india.org/"&gt;World Resource Institute India&lt;/a&gt; wanted to bring out open data and spark innovation in the transport and crime space by making datasets from &lt;a href="http://mybmtc.com/"&gt;Bangalore Metropolitan Transport Corporation (BMTC)&lt;/a&gt; and the Bangalore City Police available to work with. A DataMeet member (&lt;a href="http://www.lostprogrammer.com/"&gt;Srinivas Kodali&lt;/a&gt;) was participating, he is a huge transport data enthusiast and wanted to take a look at what is being made available.&lt;/p&gt;
&lt;p&gt;In the morning shortly after it started I received a call from him that there is a dataset that was made available that seems to be violating privacy and data security. We contacted the organizers and they took it down, later we realized it was quite a sensitive dataset and a few hundred people had already downloaded it. We were also distressed that they had not clarified ownership of data, license of data, and had linked to sources like &lt;a href="http://openbangalore.org/"&gt;Open Bangalore&lt;/a&gt;  without specifying licensing, which violated the license.&lt;/p&gt;
&lt;p&gt;The organizers were quite noted and had been involved with hackathons before so it was a little distressing to see these mistakes being made. We were concerned that the government partners (who had not participated in these types of events before) were also being exposed to poor practices. As smart cities initiatives take over the Indian urban space, we began to realize that this is a mistake that shouldn't happen again.&lt;/p&gt;
&lt;p&gt;Along with &lt;a href="http://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; and Random Hacks of Kindness we sent the organizers, Bangalore City Police and BMTC a letter about the breach in protocol. We wanted to make sure everyone was aware of the issues and that measures were taken to not repeat these mistakes.&lt;/p&gt;
&lt;p&gt;You can see the letter here:&lt;/p&gt;
&lt;p&gt;&lt;iframe src="https://www.documentcloud.org/documents/2702333-Appropriate-and-Responsible-Practices-for.html" height="500" width="600"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;We are very proud of the DataMeet community and Srinivas for bringing this violation to the attention of the organizers. As people who participate in hackathons and other data events it is imperative that privacy and security are kept in mind at all times. In a space like India where a lot of these concepts are new to institutions, like the Government, it is essential that we are always using opportunities not only to showcase the power of open data but also good practices for protecting privacy and ensuring security.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally posted on DataMeet website: &lt;a href="http://datameet.org/2016/02/02/to-hack-or-not-to-hack/"&gt;http://datameet.org/2016/02/02/to-hack-or-not-to-hack/&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns'&gt;https://cis-india.org/openness/open-data-hackathons-are-great-but-address-privacy-and-license-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Hackathon</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-02-05T20:37:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/invisible-censorship">
    <title>Invisible Censorship: How the Government Censors Without Being Seen</title>
    <link>https://cis-india.org/internet-governance/invisible-censorship</link>
    <description>
        &lt;b&gt;The Indian government wants to censor the Internet without being seen to be censoring the Internet.  This article by Pranesh Prakash shows how the government has been able to achieve this through the Information Technology Act and the Intermediary Guidelines Rules it passed in April 2011.  It now wants methods of censorship that leave even fewer traces, which is why Mr. Kapil Sibal, Union Minister for Communications and Information Technology talks of Internet 'self-regulation', and has brought about an amendment of the Copyright Act that requires instant removal of content.&lt;/b&gt;
        
&lt;h2&gt;Power of the Internet and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;The Internet, as anyone who has ever experienced the wonder of going online would know, is a very different communications platform from any that has existed before.&amp;nbsp; It is the one medium where anybody can directly share their thoughts with billions of other people in an instant.&amp;nbsp; People who would never have any chance of being published in a newspaper now have the opportunity to have a blog and provide their thoughts to the world.&amp;nbsp; This also means that thoughts that many newspapers would decide not to publish can be published online since the Web does not, and more importantly cannot, have any editors to filter content.&amp;nbsp; For many dictatorships, the right of people to freely express their thoughts is something that must be heavily regulated.&amp;nbsp; Unfortunately, we are now faced with the situation where some democratic countries are also trying to do so by censoring the Internet.&lt;/p&gt;
&lt;h2&gt;Intermediary Guidelines Rules&lt;/h2&gt;
&lt;p&gt;In India, the new &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;'Intermediary Guidelines' Rules&lt;/a&gt; and the &lt;a class="external-link" href="http://mit.gov.in/sites/upload_files/dit/files/GSR315E_10511%281%29.pdf"&gt;Cyber Cafe Rules&lt;/a&gt; that have been in effect since April 2011 give not only the government, but all citizens of India, great powers to censor the Internet.&amp;nbsp; These rules, which were made by the Department of Information Technology and not by the Parliament, require that all intermediaries remove content that is 'disparaging', 'relating to... gambling', 'harm minors in any way', to which the user 'does not have rights'.&amp;nbsp; When was the last time you checked wither you had 'rights' to a joke before forwarding it?&amp;nbsp; Did you share a Twitter message containing the term "#IdiotKapilSibal", as thousands of people did a few days ago?&amp;nbsp; Well, that is 'disparaging', and Twitter is required by the new law to block all such content.&amp;nbsp; The government of Sikkim can run advertisements for its PlayWin lottery in newspapers, but under the new law it cannot do so online.&amp;nbsp; As you can see, through these ridiculous examples, the Intermediary Guidelines are very badly thought-out and their drafting is even worse.&amp;nbsp; Worst of all, they are unconstitutional, as they put limits on freedom of speech that contravene &lt;a class="external-link" href="http://lawmin.nic.in/coi/coiason29july08.pdf"&gt;Article 19(1)(a) and 19(2) of the Constitution&lt;/a&gt;, and do so in a manner that lacks any semblance of due process and fairness.&lt;/p&gt;
&lt;h2&gt;Excessive Censoring by Internet Companies&lt;/h2&gt;
&lt;p&gt;We, at the Centre for Internet and Society in Bangalore, decided to test the censorship powers of the new rules by sending frivolous complaints to a number of intermediaries.&amp;nbsp; Six out of seven intermediaries removed content, including search results listings, on the basis of the most ridiculous complaints.&amp;nbsp; The people whose content was removed were not told, nor was the general public informed that the content was removed.&amp;nbsp; If we hadn't kept track, it would be as though that content never existed.&amp;nbsp; Such censorship existed during Stalin's rule in the Soviet Union.&amp;nbsp; Not even during the Emergency has such censorship ever existed in India.&amp;nbsp; Yet, not only was what the Internet companies did legal under the Intermediary Guideline Rules, but if they had not, they could have been punished for content put up by someone else.&amp;nbsp; That is like punishing the post office for the harmful letters that people may send over post.&lt;/p&gt;
&lt;h2&gt;Government Has Powers to Censor and Already Censors&lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;Currently, the government can either block content by using section 69A of the Information Technology Act (which can be revealed using RTI), or it has to send requests to the Internet companies to get content removed.&amp;nbsp; Google has released statistics of government request for content removal as part of its Transparency Report.&amp;nbsp; While Mr. Sibal uses the examples of communally sensitive material as a reason to force censorship of the Internet, out of the 358 items requested to be removed from January 2011 to June 2011 from Google service by the Indian government (including state governments), only 8 were for hate speech and only 1 was for national security.&amp;nbsp; Instead, 255 items (71 per cent of all requests) were asked to be removed for 'government criticism'.&amp;nbsp; Google, despite the government in India not having the powers to ban government criticism due to the Constitution, complied in 51 per cent of all requests. That means they removed many instances of government criticism as well.&lt;/p&gt;
&lt;h2&gt;'Self-Regulation': Undetectable Censorship&lt;/h2&gt;
&lt;p&gt;Mr. Sibal's more recent efforts at forcing major Internet companies such as Indiatimes, Facebook, Google, Yahoo, and Microsoft, to 'self-regulate' reveals a desire to gain ever greater powers to bypass the IT Act when censoring Internet content that is 'objectionable' (to the government).&amp;nbsp;&amp;nbsp; Mr. Sibal also wants to avoid embarrassing statistics such as that revealed by Google's Transparency Report. He wants Internet companies to 'self-regulate' user-uploaded content, so that the government would never have to send these requests for removal in the first place, nor block sites officially using the IT Act.&amp;nbsp; If the government was indeed sincere about its motives, it would not be talking about 'transparency' and 'dialogue' only after it was exposed in the press that the Department of Information Technology was holding secret talks with Internet companies.&amp;nbsp; Given the clandestine manner in which it sought to bring about these new censorship measures, the motives of the government are suspect.&amp;nbsp; Yet, both Mr. Sibal and Mr. Sachin Pilot have been insisting that the government has no plans of Internet censorship, and Mr. Pilot has made that statement officially in the Lok Sabha.&amp;nbsp; This, thus seems to be an instance of censoring without censorship.&lt;/p&gt;
&lt;h2&gt;Backdoor Censorship through Copyright Act&lt;/h2&gt;
&lt;p&gt;Further, since the government cannot bring about censorship laws in a straightforward manner, they are trying to do so surreptitiously, through the back door.&amp;nbsp; Mr. Sibal's latest proposed amendment to the Copyright Act, which is before the Rajya Sabha right now, has a provision called section 52(1)(c) by which anyone can send a notice complaining about infringement of his copyright.&amp;nbsp; The Internet company will have to remove the content immediately without question, even if the notice is false or malicious.&amp;nbsp; The sender of false or malicious notices is not penalized. But the Internet company will be penalized if it doesn't remove the content that has been complained about.&amp;nbsp; The complaint need not even be shown to be true before the content is removed.&amp;nbsp; Indeed, anyone can complain about any content, without even having to show that they own the rights to that content.&amp;nbsp; The government seems to be keen to have the power to remove content from the Internet without following any 'due process' or fair procedure.&amp;nbsp; Indeed, it not only wants to give itself this power, but it is keen on giving all individuals this power.&amp;nbsp; &lt;br /&gt;&lt;br /&gt;It's ultimate effect will be the death of the Internet as we know it.&amp;nbsp; Bid adieu to it while there is still time.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/invisible-censorship.pdf" class="internal-link" title="Invisible Censorship (Marathi version)"&gt;The article was translated to Marathi and featured in Lokmat&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/invisible-censorship'&gt;https://cis-india.org/internet-governance/invisible-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Social media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-01-04T08:59:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/citizen-activism-the-past-decade">
    <title>Citizen Activism the Past Decade</title>
    <link>https://cis-india.org/digital-natives/citizen-activism-the-past-decade</link>
    <description>
        &lt;b&gt;Call for Contributions to the ‘Digital Natives with a Cause?’ newsletter, ‘Citizen Activism the Past Decade’. Deadline: August 15, 2012.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The past decade (2001 – 2011) has been marked by unprecedented democratic protests across the globe. Not only have citizens risen against autocratic regimes or systemic corruption, which is not unprecedented in itself, but also, a spark in one region inflamed solidarity among neighbouring nations to pick up the placards and march for change. Plenty has been written about the strategic deployment of social media, Web 2.0 platforms and Smart-gadgets by the digital natives (the youth and the old alike) to rewrite the rules of citizen activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this issue of the newsletter, we explore the mechanics of activism aided by media: web, social, digital, and traditional. What do we understand by a cause and how does it find resonance at the local and global platforms? Is the digital native a community player or a global citizen? How do digital natives connect, collaborate, mobilize and bring about their visions of change? The aim is to not establish or reinforce these dichotomies, if indeed they exist, but to understand the dimensions of the stage the digital natives operate on &lt;em&gt;and if that stage is a synecdoche for global youth-led civic action.&lt;/em&gt; A case in point: &lt;strong&gt;‘Slut Walk’ &lt;/strong&gt;moved from being a one-off march in Toronto to becoming a global movement and came full circle when small towns and cities across the world organized protest marches with a local ‘twist’.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Topics that contributors can explore:&lt;/h3&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;ul&gt;
&lt;li&gt;What do we understand by citizen activism? How has citizen activism changed over the last 10 years with the advent of new media tools?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Youth as 'change agents'. Are protest movements youth oriented today? How are civil rights movements of the past decade different from the wave of movements that marked the 60s? (women's lib, LGBT rights, civil rights, disability rights). Explore the mechanics of organizing, mobilizing and measuring the success of a campaign in both the cases.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Participatory Politics and Web 2.0 | Value and power of the Network in effecting change | Mobilizing support and consensus within the network |studies on politically active youth using social media | digital natives as apathetic citizens | Is Slacktivism still a misunderstood term?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Kony 2012 video campaign | interviews | what went wrong and what did they do right? | Rise of DIY activism | mechanics of digital activism | resources, tools and strategies&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Rise of the ‘Glocal’ (global with local resonance) cause | Slut Walk and Co – global protests inspiring local campaigns | Children of globalization with global stakes supporting local causes – how does this work?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of new media as a vehicle for civic engagement | Are new media and traditional media mutually exclusive in influencing citizen action? | How are new media strategies deployed by citizens in comparison with traditional media engagement?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Learning from past campaigns: citizen activism initiates and strategies in history that inspire modern campaigns (The ‘Walk to Work’ protest in Uganda protesting against fuel price hike and removal of subsidies is similar to Mahatma Gandhi’s &lt;em&gt;Dandi&lt;/em&gt; &lt;em&gt;March&lt;/em&gt; in pre-independence India to protest against Salt Tax).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Finding commonalities in citizen activism across Asia, Africa and Middle East | Explore the citizen action campaigns that have shaped political discourse in the past decade | Explore some of the most successful youth action campaigns of the past decade &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;How do we measure value, quality and success of campaigns? When does a protest officially end? Studies that explore the life-cycle of a protest or movement &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The future of activism: new technologies, new demography, new forms of engagement | art and activism | Gamification &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Role of non-governmental organizations and civil society networks in fostering political change | collaboration between NGOs and social media activists / independent protesters&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;State and the empowered citizen | State response to protest | surveillance and censorship&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Technologies of protest&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Studying citizen activism | digital native research methodology to study citizen activism&lt;/li&gt;&lt;/ul&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;To know more about the topics you can write about, please write to: &lt;a class="external-link" href="http://mailtonilofar.ansh@gmail.com"&gt;nilofar.ansh@gmail.com&lt;/a&gt; (Nilofar Ansher, Community Manager). Contributions can be in the form of essays, notes, commentaries, reviews (book or paper), dialogues and chat transcript, poems, sketches / graphics. Essay word count between 800-1,600 words. Send your entries along with a brief bio and a profile picture by August 15, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;View previous issues of the 'Digital Natives with a Cause?' newsletter here: &lt;a href="https://cis-india.org/digital-natives/newsletter" class="external-link"&gt;http://cis-india.org/digital-natives/newsletter&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/citizen-activism-the-past-decade'&gt;https://cis-india.org/digital-natives/citizen-activism-the-past-decade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Nilofar Ansher</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    

   <dc:date>2015-04-24T11:52:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online">
    <title>Intellectual Property Rights — Open Access for Researchers</title>
    <link>https://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online</link>
    <description>
        &lt;b&gt;In the year 2013, Nehaa Chaudhari had worked on a module on Intellectual Property Rights for United Nations Educational, Scientific and Cultural Organization (UNESCO)'s Open Access Curriculum (Curriculum for Researchers) as part of a project for the Commonwealth Educational Media Centre for Asia. UNESCO published the module this year. Nehaa Chaudhari and Varun Baliga were among the Module preparation team. Nehaa Chaudhari was the writer for Units 1, 2 and 3: Understanding Intellectual Property Rights, Copyright and Alternative to a Strict Copyright Regime.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This publication is available in Open Access under the Attribution - ShareAlike 3.0 IGO (CC-BY-SA 3.0 IGO) license (&lt;a class="external-link" href="http://creativecommons.org/licenses/by-sa/3.0/igo/"&gt;http://creativecommons.org/licenses/by-sa/3.0/igo/&lt;/a&gt;). By using the content of this publication, the users accept to be bound by the terms of use of the UNESCO Open Access Repository (&lt;a class="external-link" href="http://www.unesco.org/open-access/terms-use-ccbysa-en"&gt;http://www.unesco.org/open-access/terms-use-ccbysa-en&lt;/a&gt;).&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Module Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Intellectual Property Rights (IPR) are set of rights associated with creations of the human mind. An output of the human mind may be attributed with intellectual property rights. These are like any other property, and the law allows the owner to use the same to economically profit from the intellectual work. Broadly IPR covers laws related to copyrights, patents and trademarks. While laws for these are different in different countries, they follow the international legal instruments. The establishment of the Wold Intellectual Property Organization (WIPO) has established the significance of IPR for the economic growth of nations in the knowledge economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This module has three units, and while the Unit 1 covers the basics of IPR, Unit 2 expands in detail the components of copyright and explains the origins and conventions associated with it. Unit 3 discusses the emergence of liberal licensing of copyrighted work to share human creation in the commons. In the last unit, we discuss the Creative Commons approach to licensing of creative works within the structures of the copyright regime that permits the authors to exercise their rights to share in the way they intend to. Creative Commons provides six different types of licenses, of which the Creative Commons Attribution license is the most widely used in research journals part of the Open Access framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the end of this module, you are expected to be able to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understand intellectual property rights and related issues &lt;/li&gt;
&lt;li&gt;Explain copyright, authors’ rights, licensing and retention of rights; and&lt;/li&gt;
&lt;li&gt;Use the Creative Commons licensing system&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Acknowledgements&lt;/h3&gt;
&lt;p&gt;Nehaa would like to thank Varun Baliga and Anirudh Sridhar for their research and writing support in Unit 1, and Samantha Cassar for Unit 2.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/a2k/blogs/intellectual-property.pdf" class="internal-link"&gt;Click to download the PDF containing the Modules&lt;/a&gt;. Also read &lt;a class="external-link" href="http://www.unesco.org/new/en/communication-and-information/resources/news-and-in-focus-articles/all-news/news/unescos_open_access_oa_curriculum_is_now_online/#.VQo6Ho58h8e"&gt;UNESCO’s Open Access (OA) Curriculum is now online&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online'&gt;https://cis-india.org/a2k/blogs/unesco-nehaa-chaudhari-march-19-2015-communication-and-information-resources-news-and-in-focus-articles-unesco-open-access-curriculum-is-now-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-03-24T01:22:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/no-more-66a">
    <title>No more 66A!</title>
    <link>https://cis-india.org/internet-governance/blog/no-more-66a</link>
    <description>
        &lt;b&gt;In a landmark decision, the Supreme Court has struck down Section 66A. Today was a great day for freedom of speech on the Internet! When Section 66A was in operation, if you made a statement that led to offence, you could be prosecuted. We are an offence-friendly nation, judging by media reports in the last year. It was a year of book-bans, website blocking and takedown requests. Facebook’s Transparency Report showed that next to the US, India made the most requests for information about user accounts. A complaint under Section 66A would be a ground for such requests.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Section 66A hung like a sword in the middle: Shaheen Dhada was arrested in Maharashtra for observing that Bal Thackeray’s funeral shut down the city, Devu Chodankar in Goa and Syed Waqar in Karnataka were arrested for making posts about Narendra Modi, and a Puducherry man was arrested for criticizing P. Chidambaram’s son. The law was vague and so widely worded that it was prone to misuse, and was in fact being misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, the Supreme Court struck down Section 66A in its judgment on a &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/overview-constitutional-challenges-on-itact"&gt;set of petitions&lt;/a&gt; heard together last year and earlier this year. Stating that the law is vague, the bench comprising Chelameshwar and Nariman, JJ. held that while restrictions on free speech are constitutional insofar as they are in line with Article 19(2) of the Constitution. Section 66A, they held, does not meet this test: The central protection of free speech is the freedom to make statements that “offend, shock or disturb”, and Section 66A is an unconstitutional curtailment of these freedoms. To cross the threshold of constitutional limitation, the impugned speech must be of such a nature that it incites violence or is an exhortation to violence. Section 66A, by being extremely vague and broad, does not meet this threshold. These are, of course, drawn from news reports of the judgment; the judgment is not available yet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reports also say that Section 79(3)(b) has been read down. Previously, any private individual or entity, and the government and its departments could request intermediaries to take down a website, without a court order. If the intermediaries did not comply, they would lose immunity under Section 79. The Supreme Court judgment states that both in Rule 3(4) of the Intermediaries Guidelines and in Section 79(3)(b), the "actual knowledge of the court order or government notification" is necessary before website takedowns can be effected. In effect, this mean that intermediaries &lt;i&gt;need not&lt;/i&gt; act upon private notices under Section 79, while they can act upon them if they choose. This stops intermediaries from standing judge over what constitutes an unlawful act. If they choose not to take down content after receiving a private notice, they will not lose immunity under Section 79.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 69A, the website blocking procedure, has been left intact by the Court, despite infirmities such as a lack of judicial review and non-transparent operation. More updates when the judgment is made available.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/no-more-66a'&gt;https://cis-india.org/internet-governance/blog/no-more-66a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Section 66A</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Blocking</dc:subject>
    

   <dc:date>2015-03-26T02:01:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines">
    <title>Civil Society Organisations and Internet Governance in Asia and India – Section Outlines</title>
    <link>https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been invited to contribute two sections to the Asia Internet History - Third Decade (2001-2010) book edited by Dr. Kilnam Chon. The sections will discuss the activities and experiences of civil society organisations in Asia and India, respectively, in national, regional, and global Internet governance processes. The draft outlines of the sections are shared here. Comments and suggestions are invited.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the (draft) Foreword to the &lt;a href="https://sites.google.com/site/internethistoryasia/book3" target="_blank"&gt;Asia Internet History – Third Decade (2001-2010)&lt;/a&gt;,&amp;nbsp; Prof. David J. Farber &lt;a href="https://sites.google.com/site/annex3asia/home/foreword14629.docx?attredirects=0&amp;amp;d=1" target="_blank"&gt;writes&lt;/a&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;One of the early attempts to extend the reach of the Internet to Asia was via the “Johnny Appleseed” approach. That is a set of people responded to queries by people in Asian countries asking how they could connect with the growing Internet by offering to supply tapes to key people in the requesting countries, often by physically going with the tapes, as well as providing access points to the USA Internet. The people that we, I was one of the seeders, worked, with became the leaders in their nation and founded the initial national networks that blossomed with time and often formed the basis of commercial Internets. The traditions that these network frontier pioneers established lead to the eventual spread of the benefits of Internet access to not only their nations but became models for the spread to the rest of Asia…&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I am honoured to contribute to the pioneering series titled &lt;a href="https://sites.google.com/site/internethistoryasia/home" target="_blank"&gt;Asia Internet History&lt;/a&gt;, edited by Dr. Kilnam Chon, by foregrounding a range of other individuals and organisations that often worked outside but in engagement with the national governments, and technical and academic institutions that govern &lt;em&gt;the connecting tapes&lt;/em&gt; of the Internet, to ensure mass access to and effective usages of Internet in Asia.&lt;/p&gt;
&lt;p&gt;The two sections, to be authored me, provides an overview of ‘civil society organisations’ working across Asian countries that have played a critical role in the shaping of policy-making and discourse around Internet governance during 2000-2010, and then undertakes a closer look at the organisations working in India and their interventions at national, regional, and global levels.&lt;/p&gt;
&lt;p&gt;Please read the draft outlines of the &lt;a href="https://github.com/ajantriks/writings/blob/master/sumandro_asia_internet_history_civil_society_overview_outline.md" target="_blank"&gt;overview section&lt;/a&gt; and the &lt;a href="https://github.com/ajantriks/writings/blob/master/sumandro_asia_internet_history_civil_society_india_outline.md" target="_blank"&gt;section on Indian organisations&lt;/a&gt;, and share your comments. The comments can be posted on the GitHub page where the outlines are hosted, on this page, or over email: sumandro[at]cis-india[dot]org.&lt;/p&gt;
&lt;p&gt;The outlines can also be directly downloaded as markdown files: the &lt;a href="https://raw.githubusercontent.com/ajantriks/writings/master/sumandro_asia_internet_history_civil_society_overview_outline.md" target="_blank"&gt;overview&lt;/a&gt; and the &lt;a href="https://raw.githubusercontent.com/ajantriks/writings/master/sumandro_asia_internet_history_civil_society_india_outline.md" target="_blank"&gt;India&lt;/a&gt; section.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Asian Civil Society Organisations and Internet Governance&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Here is a tentative list of key civil society organisations from Asia that have participated and intervened in Internet governance processes during 2001-2010. Please suggest organisations missing from the list.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Bangladesh&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://bfes.net/" target="_blank"&gt;Bangladesh Friendship Education Society (BFES)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.bnnrc.net/" target="_blank"&gt;Bangladesh NGOs Network for Radio and Communication (BNNRC)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;
&lt;a href="http://www.bytesforall.net/" target="_blank"&gt;Bytes for All, Bangladesh&lt;/a&gt;&lt;/li&gt;&lt;li&gt;
&lt;a href="http://www.isoc.org.bd/dhaka/" target="_blank"&gt;Dnet&lt;/a&gt;&lt;/li&gt;&lt;li&gt;
&lt;a href="http://www.isoc.org.bd/dhaka/" target="_blank"&gt;Internet Society Dhaka Chapter&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.voicebd.org/" target="_blank"&gt;VOICE&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Cambodia&lt;br /&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.ccimcambodia.org/" target="_blank"&gt;Cambodian Center for Independent Media (CCIM)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.open.org.kh/en" target="_blank"&gt;Open Institute&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;China&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://english.cast.org.cn/" target="_blank"&gt;China Association for Science and Technology (CAST)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isoc.hk/" target="_blank"&gt;Internet Society Hong Kong&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isc.org.cn/english/" target="_blank"&gt;Internet Society of China&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isoc.org.tw/" target="_blank"&gt;Internet Society Taiwan Chapter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isoc.org.tw/" target="_blank"&gt;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://knowledgedialogues.com/" target="_blank"&gt;Knowledge Dialogues, Hong Kong&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indonesia&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.engagemedia.org/" target="_blank"&gt;EngageMedia, Australia and Indonesia&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.ilab.or.id/" target="_blank"&gt;ICT Laboratory for Social Change (iLab)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://id-config.org/" target="_blank"&gt;Indonesian CSOs Network for Internet Governance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://ictwatch.id/" target="_blank"&gt;Indonesian ICT Partnership Association (ICT Watch)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isoc.or.id/" target="_blank"&gt;Internet Society Indonesia Chapter&lt;/a&gt; [website is under construction]&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;India&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://censorship.wikia.com/wiki/Bloggers_Collective_group" target="_blank"&gt;Bloggers Collective&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/" target="_blank"&gt;Centre for Internet and Society (CIS)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.csdms.in/" target="_blank"&gt;Centre for Science, Development and Media Studies (CSDMS)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://defindia.org/" target="_blank"&gt;Digital Empowerment Foundation (DEF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://fsf.org.in/" target="_blank"&gt;Free Software Foundation India (FSFI)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://fsmi.in/" target="_blank"&gt;Free Software Movement of India (FSMI)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://internetdemocracy.in/" target="_blank"&gt;Internet Democracy Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isocbangalore.org/" target="_blank"&gt;Internet Society Bangalore Chapter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://isocindiachennai.org/" target="_blank"&gt;Internet Society Chennai Chapter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isocdelhi.in/" target="_blank"&gt;Internet Society Delhi Chapter&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isocindiakolkata.in/" target="_blank"&gt;Internet Society Kolkata Chapter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.itforchange.net/" target="_blank"&gt;IT for Change&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.itu-apt.org/" target="_blank"&gt;ITU-APT Foundation of India (IAFI)&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.orfonline.org/" target="_blank"&gt;Observer Research Foundation (ORF)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.knowledgecommons.in/" target="_blank"&gt;Society for Knowledge Commons (Knowledge Commons)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://sflc.in/" target="_blank"&gt;Software Freedom Law Centre (SFLC)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Iran&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.ictgroup.org/" target="_blank"&gt;Iranian Civil Society Organizations Training and Research Centre (ICTRC)&lt;/a&gt; [URL is not working]&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Japan&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.glocom.ac.jp/e/" target="_blank"&gt;Centre for Global Communications (GLOCOM)&lt;/a&gt; [Academia?]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.isoc.jp/" target="_blank"&gt;Internet Society Japan Chapter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.jcafe.net/" target="_blank"&gt;Japan Computer Access for Empowerment (JCAFE)&lt;/a&gt; [URL is not working]&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.jca.apc.org/" target="_blank"&gt;Japan Computer Access Network (JCA-NET)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Kuwait&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.ijma3.org/" target="_blank"&gt;iJMA3 - Kuwait Information Technology Society (KITS)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Lebanon&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.lccelebanon.org/" target="_blank"&gt;Lebanese Center for Civic Education (LCCE)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Malaysia&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.isoc.my/" target="_blank"&gt;Internet Society Malaysia Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Myanmar&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://myanmarido.org/en" target="_blank"&gt;Myanmar ICT for Development Organization (MIDO)&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Nepal&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.internetsociety.org.np/" target="_blank"&gt;Internet Society Nepal Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Pakistan&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://content.bytesforall.pk/" target="_blank"&gt;Bytes for All, Pakistan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://isocibd.org.pk/" target="_blank"&gt;Internet Society Islamabad Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Philippines&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://democracy.net.ph/" target="_blank"&gt;Democracy.Net.PH&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.fma.ph/" target="_blank"&gt;Foundation for Media Alternatives (FMA)&lt;/a&gt; [URL not working&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.facebook.com/isoc.ph" target="_blank"&gt;Internet Society Philippines Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Regional&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.forum-asia.org/" target="_blank"&gt;Asian Forum for Human Rights and Development (FORUM-ASIA)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://discfoundation.com/" target="_blank"&gt;Developing Internet Safe Community (DISC) Foundation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://lirneasia.net/" target="_blank"&gt;LIRNEasia&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Singapore&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://isoc.sg/" target="_blank"&gt;Internet Society Singapore Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;South Korea&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.jinbo.net/" target="_blank"&gt;Korean Progressive Network Jinbonet&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://opennet.or.kr/" target="_blank"&gt;OpenNet&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Sri Lanka&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://isoc.lk/?lang=en" target="_blank"&gt;Internet Society Sri Lanka Chapter&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;strong&gt;Thailand&lt;/strong&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.isoc-th.org/" target="_blank"&gt;Internet Society Thailand Chapter&lt;/a&gt; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thainetizen.org/" target="_blank"&gt;Thai Netizen Network&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines'&gt;https://cis-india.org/raw/civil-society-organisations-and-internet-governance-in-asia-and-india-outlines&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Histories</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-11-13T05:40:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses">
    <title>National IPR Policy Series: RTI Requests by CIS to DIPP + DIPP Responses</title>
    <link>https://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses</link>
    <description>
        &lt;b&gt;In earlier blog posts, we have discussed the development of India’s National IPR Policy (“the Policy”); comments by the Centre for Internet and Society (“CIS”) to the IPR Think Tank before the release of the first draft of the Policy and CIS’ comments to the IPR Think Tank in response to the first draft of the Policy. Continuing our National IPR Policy Series, this article documents our requests to the Department of Industrial Policy and Promotion (“DIPP” / “the Department”) under the Right to Information (“RTI”) Act, 2005 and the responses of the Department.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/a2k/blogs/national-ipr-policy-series-dipp-response.pdf" class="external-link"&gt;View the PDF here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Details of RTI Requests Filed by CIS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In February, 2015, &lt;a href="http://cis-india.org/a2k/blogs/rti-requests-dipp-details-on-constitution-and-working-of-ipr-think-tank"&gt;CIS had filed three RTI requests&lt;/a&gt; with the DIPP. &lt;a href="https://cis-india.org/a2k/blogs/cis-rti-request-to-dipp-number-1-february-2015/view"&gt;The first request&lt;/a&gt; was four-pronged, seeking information related to &lt;i&gt;first,&lt;/i&gt; the process followed by the Department in the creation of the IPR Think Tank; &lt;i&gt;second, &lt;/i&gt;details and documents of a meeting held to constitute the Think Tank; &lt;i&gt;third, &lt;/i&gt;details and documents of all/multiple meetings held to constitute the Think Tank; &lt;i&gt;fourth&lt;/i&gt;, details of a directive/directives received from any other Government Ministry/authority directing the constitution of the Think Tank and &lt;i&gt;fifth,&lt;/i&gt; the process of shortlisting the members of the Think Tank by the DIPP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/a2k/blogs/cis-rti-request-to-dipp-number-2-february-2015/view"&gt;In our second RTI request,&lt;/a&gt; &lt;i&gt;first,&lt;/i&gt; we requested details of the process followed by the Think Tank in the formulation of the Policy; &lt;i&gt;second, &lt;/i&gt;we requested all documents relating to a meeting held for the formulation of the Policy; &lt;i&gt;third, &lt;/i&gt;we requested all documents held for multiple meetings for the creation of the Policy and &lt;i&gt;fourth,&lt;/i&gt; we requisitioned all suggestions and comments received by the Think Tank from stakeholders &lt;b&gt;before&lt;/b&gt; the release of the Policy, that is, those suggestions/comments received in November, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In our &lt;a href="https://cis-india.org/a2k/blogs/cis-request-to-dipp-3.pdf" class="external-link"&gt;third RTI request&lt;/a&gt;, also filed on also filed in February, 2015, we had asked the DIPP to indicate all suggestions and comments received by the IPR Think Tank from different stakeholders in response to the first draft of the National IPR Policy (to have been submitted on or before January 30, 2015 &lt;a href="http://dipp.nic.in/English/acts_rules/Press_Release/pressRelease_IPR_Policy_30December2014.pdf"&gt;as per DIPP’s Public Notice&lt;/a&gt;).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Responses by DIPP to CIS' RTI Requests&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DIPP replied to our three RTI requests in multiple stages. At first, &lt;a href="https://cis-india.org/a2k/blogs/dipp-response-improper-payment.pdf" class="external-link"&gt;in a letter dated 12 February, 2015&lt;/a&gt;, we were directed to resubmit our application , seemingly because we hadn’t addressed the Postal Money Order to the correct authority, and were directed to do the same. Funnily enough, we received three other responses – one for each of our RTI requests (the first of these is not dated; the second one is dated 19 February, 2015 and then revised to 26 February, 2015; and the third is also dated 26 February, 2015).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The First Response: On the Constitution of the Think Tank&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://cis-india.org/a2k/blogs/dipp-response-1.pdf" class="external-link"&gt;first of their responses&lt;/a&gt; to these requests, the Department has grouped our queries into five questions and provided a point-wise response to these questions, as under:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Please indicate in detail the process followed by the Department of Industrial Policy and Promotion for the constitution for an IPR Think Tank to draft the National Intellectual Property Rights Policy under Public Notice No. 10 (22)/2013 –IPR-III dated November 13, 2014 (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In its response the Department notes that it convened an &lt;i&gt;interactive meeting on IPR issues&lt;/i&gt; which was chaired by the Minister for Commerce and Industry (Independent Charge), i.e., Ms. Nirmala Sitharaman. As per the Department’s response, this meeting was held on 22 September, 2014 (&lt;b&gt;“the Meeting”&lt;/b&gt;) and was aimed at discussing &lt;i&gt;issues related to IPRs, including finalization of the Terms of Reference for IPR Think-Tank proposed to be established &lt;/i&gt;(sic.) The Department also notes that &lt;i&gt;representatives from various Ministries/Departments, Member of various Expert Committees constituted by the Department, besides IP experts and other Legal Practitioners&lt;/i&gt; (sic) were invited to the meeting. The Department then states that the composition of the Think Tank was decided &lt;i&gt;on the basis of the discussions held in the department after the said interactive Meeting&lt;/i&gt; (sic).&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;If there was a meeting held to decide on the same, please include all necessary documents including the minutes of the meeting, records, documents, memos, e-mails, opinion, advices, press releases, circulars, orders etc in which the constitution of the aforesaid mentioned IPR Think Tank was decided (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department has attached the Minutes of the Meeting held on 22 September, 2014 (&lt;b&gt;“the Minutes”&lt;/b&gt;) and states that there were no documents or papers that were circulated at this meeting and that the participants were asked to present their views on various IP issues at this meeting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Excerpts from the Minutes&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Secretary of the Department (Shri Amitabh Kant) refers to a (then) recent announcement made by the Minister of State for Commerce and Industry (&lt;b&gt;“the Minister”&lt;/b&gt;) on the formulation of the National IPR Policy and the establishment of an IPR Think Tank and states that the meeting had been convened to &lt;i&gt;discuss on various IPR issues with IP experts and legal practitioners so that it would provide essential inputs to the policy needs of the department&lt;/i&gt; (sic). The Minutes report that Mr. Kant further stated that the objective of the department was to have &lt;i&gt;a world class IP system&lt;/i&gt; and that this included a comprehensive National IPR Policy and &lt;i&gt;which takes care of various issues like IP creation, protection, administration and capacity building &lt;/i&gt;(sic). He is also reported to have said that such a stakeholder interaction was important for the government to seek inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Minister is reported to have said that the purpose of the meeting was to constitute an IP Think Tank that would &lt;i&gt;regularly provide inputs to all IP policy needs of this department as well as advice government in disparate legal aspects (sic). &lt;/i&gt;The Minutes also report her to have said that the department would finalize an IP policy within ninety days of the Meeting, based on the inputs of the participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Minutes, various issues emerged from the discussion. &lt;i&gt;Inter alia, &lt;/i&gt;these include  &lt;i&gt;first,&lt;/i&gt; that the proposal to constitute the Think Tank was a welcome measure, along the lines of similar initiatives taken by Australia, South Kora, the United Kingdom and the United States of America; &lt;i&gt;second, &lt;/i&gt;that in order to remove misconceptions held by &lt;i&gt;foreign stakeholders&lt;/i&gt; about IP enforcement in India, there was a need to highlight judgments of Indian courts that were favorable to &lt;i&gt;foreign stakeholders and MNCs&lt;/i&gt;; &lt;i&gt;third, &lt;/i&gt;that the national policies on telecom, manufacturing and IP ought to be integrated; &lt;i&gt;fourth&lt;/i&gt;, that the focus of the Policy should be &lt;b&gt;&lt;i&gt;increase in creation of IP including commercialization of IP and strengthening human capital and IP management&lt;/i&gt;&lt;/b&gt; and &lt;i&gt;fifth&lt;/i&gt;, that empirical studies should be conducted to examine the feasibility of Utility Models protection, that there was a need to revise the law on Geographical Indications and that the Policy should include protection for traditional knowledge and guidelines for publicly funded research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Minister is then said to have identified six major areas during the discussion, including &lt;i&gt;IP institution, legislation, implementation, public awareness, international aspects and barriers in IP growth&lt;/i&gt; as areas to be covered under the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Who attended the Meeting?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attached with the Minutes was also a list of participants who attended the Meeting. Out of the thirty six attendees, &lt;i&gt;I have not been able to locate a single individual or organization representing civil society&lt;/i&gt;. Participants include representatives from various government departments and ministries, including &lt;i&gt;inter alia,&lt;/i&gt; the DIPP, the Department of Commerce, the Ministry of External Affairs, the Ministry of Information and Broadcasting, the Copyright Division from the Department of Higher Education of the Ministry of Human Resources Development, the Office of the Controller General of Patents, Designs and Trademarks and the Ministry of Culture. The Meeting was also attended by representatives of corporations and industry associations, including FICCI, CII and Cadila Pharmaceuticals; in addition to representatives from law firms including Luthra and Luthra, K&amp;amp;S Partners and Inventure IP and academics including, &lt;i&gt;inter alia,&lt;/i&gt; faculty from the Asian School of Business, Trivandrum, Indian Law Institute, Delhi, Tezpur University, Assam, National Law University, Delhi, NALSAR University of Law, Hyderabad, the Indian Institute of Technology, Madras and the National Law School of India University, Bangalore.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;If there were multiple meetings held for the same please provide all necessary documents including the minutes of all such meetings, records, documents, memos, e-mails, opinions, advices, press releases, circulars, orders etc. for all such meetings held (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department answered, “No”; which I’m taking to mean that there weren’t other meetings held for the formulation of the Think Tank or the Policy. This is interesting, because the Minutes (referred to earlier) speak of another inter-ministerial meeting &lt;i&gt;including IP experts and legal practitioners&lt;/i&gt; slated to be held around the 10&lt;sup&gt;th&lt;/sup&gt; of October, 2014, to discuss the framework of the Policy.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;If a directive or directives were received by the Department of Industrial Policy and Promotion from any other government body to constitute such a think tank, please provide a copy of such a directive received by the DIPP from any Government authority, to constitute such a Think Tank (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department answered, “No”; which I’m taking to mean that there was no communication received by the Department to constitute this Think Tank.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Please indicate in detail the process of shortlisting the members of the IPR Think Tank by the Department of Industrial Policy and Promotion or any other body that was responsible for the same (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department replied that the answer to this was the same as that to the first question.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Second Response: The Drafting of the Policy&lt;/h3&gt;
&lt;p&gt;The &lt;a href="https://cis-india.org/a2k/blogs/dipp-response-2.pdf/" class="external-link"&gt;second of the Department's responses&lt;/a&gt; to our requests came in the form of separate responses to each of our four questions, as under:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Please indicate in detail the process followed by the IPR Think Tank constituted by the Department of Industrial Policy and Promotion via Public Notice No. 10 (22)/2013-IPR-III dated November 13, 2014 while framing the first draft of the National IPR Policy dated Dec. 19, 2014 (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department stated that the IPR Think Tank conducted its meetings independently without any interference from the Department. The Department then stated that the Think Tank had received comments from stakeholders via a dedicated email id and &lt;i&gt;conducted the interactive meeting with stakeholders while framing the draft on the National IPR Policy.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;If there was a meeting held to decide on the same, please include all necessary documents including the minutes of the meeting, records, documents, memos, e-mails, opinion, advices, press releases, circulars, orders, suggestions etc. related to drafting of such National IPR Policy Think Tank chaired by Justice Prabha Sridevan (sic). &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The Department replied that since the IPR Think Tank had decided &lt;i&gt;its process by themselves&lt;/i&gt; (sic), the Department&lt;i&gt; do not have the minutes of the meeting etc. conducted by the IPR Think Tank &lt;/i&gt;(sic). It attached with its reply a copy of the press releases announcing the composition of the Think Tank and asking stakeholders to submit comments to the first draft of the Policy.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;If there were multiple meetings held for the same, please provide all necessary documents including the minutes of all such meetings, records, documents, memos, e-mails, opinions, advices, press releases, circulars, order suggestions etc. for all such meetings held (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Department replied that the response to this was the same as that to the earlier question above.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Please provide all the suggestions and comments received by the IPR Think Tank from stakeholders after the DIPP issued Public Notice No. 10/22/2013-IPR-III dated 13.11.2014 asking for suggestions and comments on or before November 30, 2014 (sic).&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Department replied that the comments and suggestions were received by the Think Tank directly and that therefore, the Department was &lt;i&gt;not in a position to provide the same.&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;The&lt;i&gt; &lt;/i&gt;Third Response: Stakeholder Comments&lt;/h3&gt;
&lt;p&gt;In its &lt;a href="https://cis-india.org/a2k/blogs/dipp-response-3.pdf" class="external-link"&gt;third and final response&lt;/a&gt; to our requests, the DIPP replied to our query as under:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Please indicate all the suggestions and comments received by the IPR Think Tank by different stakeholders on or before January 30, 2015 on its first draft of the National Intellectual Property Policy submitted by the IPR Think Tank on December 19, 2014.&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Department said that &lt;i&gt;the suggestions and comments on the draft on National IPR Policy have been received by the IPR Think Tank directly. As such this Department is not in a position to provide the same (sic.).&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Observation on the DIPP's Responses&lt;/h3&gt;
&lt;p&gt;&lt;i&gt;Prima facie, &lt;/i&gt;the responses by the Department are rather curious, leading to a range of oddities and unanswered questions.&lt;/p&gt;
&lt;h3&gt;Who Will Watch the IPR Think Tank&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In its response to our first RTI request, the Department quite clearly stated that it decided the composition of the IPR Think Tank based on discussions in a meeting that it convened, which was also chaired by the Minister of State for Commerce and Industry, the parent ministry of the DIPP. In the same response, the Department also stated that it had not received any directive from any other ministry/government department directing the constitution of the IPR Think Tank, leading to the conclusion that this decision was taken by the DIPP/the Ministry of Commerce and Industry itself. Subsequently however, the Department justified its refusal to furnish us with documents leading to the development of the first draft of the National IPR Policy (contained in our second RTI request) by stating that the IPR Think Tank conducted its business without any interference from the Department, and that the Department did not have access to any of the submissions made to the IPR Think Tank or any of the internal minutes of the meetings etc. that were a part of the process of drafting the IPR Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various press releases by the DIPP have stated that it has constituted the IPR Think Tank, and that the purpose of the IPR Think Tank &lt;a href="http://dipp.nic.in/English/acts_rules/Press_Release/ipr_PressRelease_24October2014.pdf"&gt;would be to advise the Department on IPR issues.&lt;/a&gt; Visibly, the Department intends for the IPR Think Tank to play an active role in shaping India’s IP law and policy, including suggesting amendments to laws wherever necessary. It is concerning therefore that on the question of accountability of the IPR Think Tank, the DIPP remains silent. It may be argued perhaps, that the IPR Think Tank constitutes a ‘public authority’ under Section 2(h)(d) of the &lt;a href="http://righttoinformation.gov.in/rti-act.pdf"&gt;Right to Information Act, 2005&lt;/a&gt; (&lt;b&gt;“RTI Act”&lt;/b&gt;). In that case, the IPR Think Tank would have to fulfill, &lt;i&gt;inter alia,&lt;/i&gt; all of the obligations under Section 4 of the RTI Act as well as designate a Public Information Officer. Alternatively, given that the IPR Think Tank has been constituted by the DIPP and performs functions for the DIPP, the Public Information Officer of the DIPP would have to furnish &lt;span&gt;all&lt;/span&gt; relevant information under the RTI Act (including the information that we sought in our requests, which was not provided to us).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who are the Stakeholders&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Even a preliminary look at the list of participants at the Meeting (based on which the Department constituted the IPR Think Tank) reveals that not all stakeholders have been adequately represented. I haven’t been able to spot any representation from civil society and other organizations that might be interested in a more balanced intellectual property framework that is not rights-heavy. The following chart (based on a total sample size of 36 participants, as stated in the list of participants provided to us by the DIPP) will help put things in perspective.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Meeting.png" alt="Meeting" class="image-inline" title="Meeting" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;What Could've Been Done?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Setting aside arguments on its necessity, let us for the moment assume that this drafting of the National IPR Policy is an exercise that needed to have been undertaken. We must now examine what might possibly be the best way to go about this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2014, the World Intellectual Property Organization (&lt;b&gt;“WIPO”&lt;/b&gt;) (based on whose approach the Policy seems to have been based- at least in part), produced a detailed &lt;a href="http://www.wipo.int/edocs/pubdocs/en/intproperty/958/wipo_pub_958_1.pdf"&gt;Methodology for the Development of National Intellectual Property Strategies&lt;/a&gt;, outlining a detailed eight step process before a National IP Policy was implemented in a Member State. While this approach is one to be followed by the WIPO and might not be entirely suited to India’s drafting exercise, specific sections on the national consultation process as well as the drafting and implementation of national intellectual property strategies might prove to be a decent starting point.&lt;/p&gt;
&lt;p&gt;(More on this in an upcoming article).d&lt;/p&gt;
&lt;h3&gt;Where Do We Go From Here?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DIPP’s responses have left me with more questions, probably the subject of more RTI requests. Is the IPR Think Tank a public authority for the purposes of the Right to Information Act, 2005? To whom should questions of informational accountability of the IPR Think Tank be addressed, if there is no information available on the IPR Think Tank, and the DIPP claims to have no access to it? Do we need to re-examine the draft National IPR Policy given that there has been inadequate representation of all stakeholders? What were the suggestions made by different stakeholders, and (how) have these been reflected in the first draft of the Policy? Was there an evaluation exercise conducted before the first draft of the Policy was released in order to better inform the formulation of the Policy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We will be looking at these and other questions as they arise, and sending some of these to the DIPP in the form of RTI requests. (Watch the blog for more).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses'&gt;https://cis-india.org/a2k/blogs/national-ipr-policy-series-rti-requests-by-cis-to-dipp-dipp-responses&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    
    
        <dc:subject>DIPP</dc:subject>
    
    
        <dc:subject>RTI</dc:subject>
    
    
        <dc:subject>National IPR Policy</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>IPR Think Tank</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-04-26T08:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india">
    <title>Submitted Comments on the 'Government Open Data Use License - India'</title>
    <link>https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india</link>
    <description>
        &lt;b&gt;The public consultation process of the draft open data license to be used by Government of India has ended yesterday. Here we share the text of the submission by CIS. It was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The following comments on the 'Government Open Data Use License - India' was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay, and submitted through the &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;MyGov portal&lt;/a&gt; on July 25, 2016. The original submission can be found &lt;a href="https://www.mygov.in/sites/default/files/mygov_146946521043358971.pdfh"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I. Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society (“&lt;strong&gt;CIS&lt;/strong&gt;”) &lt;strong&gt;[1]&lt;/strong&gt; on the draft Government Open Data Use License - India (“&lt;strong&gt;the draft licence&lt;/strong&gt;”) &lt;strong&gt;[2]&lt;/strong&gt; by the Department of Legal Affairs.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;This submission is based on the draft licence released on the MyGov portal on June 27, 2016 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS commends the Department of Ministry of Law and Justice, Government of India for its efforts at seeking inputs from various stakeholders prior to finalising its open data licence. CIS is thankful for the opportunity to have been a part of the discussion during the framing of the licence; and to provide this submission, in furtherance of the feedback process continuing from the draft licence.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;II. Overview&lt;/h2&gt;
&lt;ol start="4"&gt;
&lt;li&gt;The Centre for Internet and Society is a non-governmental organisation engaged in research and policy work in the areas of, inter alia, access to knowledge and openness. This clause-by-clause submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. Accordingly, the comments in this submission aim to further these principles and are limited to those clauses that most directly have an impact on them.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;III. Comments and Recommendations&lt;/h2&gt;
&lt;ol start="5"&gt;
&lt;li&gt;&lt;strong&gt;Name of the Licence:&lt;/strong&gt; CIS recommends naming the licence “Open Data Licence - India” to reflect the nomenclature already established for similar licences in other nations like the UK and Canada. More importantly, the inclusion of the word ‘use’ in the original name “Government Open Data Use License” is misleading, since the licence permits use, sharing, modification and redistribution of open data.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Change Language on Permissible Use of Data:&lt;/strong&gt; The draft licence uses the terms “Access, use, adapt, and redistribute,” which are used in UNESCO’s definition of open educational resources, whereas, under the Indian Copyright Act &lt;strong&gt;[4]&lt;/strong&gt;, it should cover “reproduction, issuing of copies,” etc. To resolve this difference, we suggest the following language be used: “Subject to the provisions of section 7, all users are provided a worldwide, royalty-free, non-exclusive licence to all rights covered by copyright and allied rights, for the duration of existence of such copyright and allied rights over the data or information.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Section on the Scope of Applicability of the Licence:&lt;/strong&gt; It will be useful to inform the user of the licence on its applicability. The section may be drafted as: “This licence is meant for public use, and especially by all Ministries, Departments, Organizations, Agencies, and autonomous bodies of Government of India, when publicly disclosing, either proactively or reactively, data and information created, generated, collected, and managed using public funds provided by Government of India directly or through authorized agencies.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause Specifying that the Licence is Agnostic of Mode of Access:&lt;/strong&gt; As part of the section 4 of the draft licence, titled ‘Terms and Conditions of Use of Data,’ a sub-clause should be added that specifies that users may enjoy all the freedom granted under this licence irrespective of their preferred mode of access of the data concerned, say manually downloaded from the website, automatically accessed via an API, collected from a third party involved in re-sharing of this data, accessed in physical/printed form, etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause on Non-Repudiability and Integrity of the Published Data:&lt;/strong&gt; To complement the sub-clause 6.e. that notes that data published under this licence should be published permanently and with appropriate versioning (in case of the published data being updated and/or modified), another sub-clause should be added that states that non-repudiability and integrity of published data must be ensured through application of real/digital signature, as applicable, and checksum, as applicable. This is to ensure that an user who has obtained the data, either in physical or digital form, can effectively identify and verify the the agency that has published the data, and if any parts of the data have been lost/modified in the process of distribution and/or transmission (through technological corruption of data, or otherwise).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Combine Section 6 on Exemptions and Section 7 on Termination:&lt;/strong&gt; Given that the licence cannot reasonably proscribe access to data that has already been published online, it is suggested that it would be better to simply terminate the application of the licence to that data or information that ought not to have been published for grounds provided under section 8 of the RTI Act, or have been inadvertently published. It should also be noted that section 8 of the RTI Act cannot be “violated” (as stated in Section 6.g. of the draft licence), since it only provides permission for the public authority to withhold information, and does not impose an obligation on them (or anyone else) to do so. The combined clause can read: “Upon determination by the data provider that specific data or information should not have been publicly disclosed for the grounds provided under Section 8 of the Right to Information Act, 2005, the data provider may terminate the applicability of the licence for that data or information, and this termination will have the effect of revocation of all rights provided under Section 3 of this licence.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;It will be our pleasure to discuss these submissions with the Department of Legal Affairs in greater detail, supplement these with further submissions if necessary, and offer any other assistance towards the efforts at developing a national open data licence.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf"&gt;https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india'&gt;https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-07-26T09:23:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
