<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 91 to 105.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/gauging-users-reactions-towards-zero-rating"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights">
    <title>Reading the Fine Script: Service Providers, Terms and Conditions and Consumer Rights</title>
    <link>https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights</link>
    <description>
        &lt;b&gt;This year, an increasing number of incidents, related to consumer rights and service providers, have come to light. This blog illustrates the facts of the cases, and discusses the main issues at stake, namely, the role and responsibilities of providers of platforms for user-created content with regard to consumer rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;On 1st July, 2014 the Federal Trade Commission (FTC) filed a complaint against T-Mobile USA,&lt;/span&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn1"&gt;[1]&lt;/a&gt;&lt;span&gt; accusing the service provider of 'cramming' customers bills, with millions of dollars of unauthorized charges. Recently, another service provider, received flak from regulators and users worldwide, after it published a paper, 'Experimental evidence of massive-scale emotional contagion through social networks'.&lt;/span&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn2"&gt;[2]&lt;/a&gt;&lt;span&gt; The paper described Facebook's experiment on more than 600,000 users, to determine whether manipulating user-generated content, would affect the emotions of its users.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In both incidents the terms that should ensure the protection of their user's legal rights, were used to gain consent for actions on behalf of the service providers, that were not anticipated at the time of agreeing to the terms and conditions (T&amp;amp;Cs) by the consumer. More precisely, both cases point to the underlying issue of how users are bound by T&amp;amp;Cs, and in a mediated online landscape—highlight, the need to pay attention to the regulations that govern the online engagement of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I have read and agree to the terms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In his statement, Chief Executive Officer, John Legere might have referred to T-Mobile as "the most pro-consumer company in the industry",&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn3"&gt;[3]&lt;/a&gt; however the FTC investigation revelations, that many customers never authorized the charges, suggest otherwise.  The FTC investigation also found that, T-Mobile received 35-40 per cent of the amount charged for subscriptions, that were made largely through innocuous services, that customers had been signed up to, without their knowledge or consent. Last month news broke, that just under 700,000 users 'unknowingly' participated in the Facebook study, and while the legality and ethics of the experiment are being debated, what is clear is that Facebook violated consumer rights by not providing the choice to opt in or out, or even the knowledge of such social or psychological experiments to its users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both incidents boil down to the sensitive question of consent. While binding agreements around the world work on the condition of consent, how do we define it and what are the implications of agreeing to the terms?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms of Service: Conditions are subject to change &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A legal necessity, the existing terms of service (TOS)—as they are also known—as an acceptance mechanism are deeply broken. The policies of online service providers are often, too long, and with no shorter or multilingual versions, require substantial effort on part of the user to go through in detail. A 2008 Carnegie Mellon study estimated it would take an average user 244 hours every year to go through the policies they agree to online.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn4"&gt;[4]&lt;/a&gt; Based on the study, Atlantic's Alexis C. Madrigal derived that reading all of the privacy policies an average Internet user encounters in a year, would take 76 working days.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The costs of time are multiplied by the fact that terms of services change with technology, making it very hard for a user to keep track of all of the changes over time. Moreover, many services providers do not even commit to the obligation of notifying the users of any changes in the TOS. Microsoft, Skype, Amazon, YouTube are examples of some of the service providers that have not committed to any obligations of notification of changes and often, there are no mechanisms in place to ensure that service providers are keeping users updated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook has said that the recent social experiment is perfectly legal under its TOS,&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn6"&gt;[6]&lt;/a&gt; the question of fairness of the conditions of users consent remain debatable. Facebook has a broad copyright license that goes beyond its operating requirements, such as the right to 'sublicense'. The copyright also does not end when users stop using the service, unless the content has been deleted by everyone else.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, since 2007, Facebook has brought major changes to their lengthy TOS about every year.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn7"&gt;[7]&lt;/a&gt; And while many point that Facebook is transparent, as it solicits feedback preceding changes to their terms, the accountability remains questionable, as the results are not binding unless 30% of the actual users vote. Facebook can and does, track users and shares their data across websites, and has no obligation or mechanism to inform users of the takedown requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Courts in different jurisdictions under different laws may come to different conclusions regarding these practices, especially about whether changing terms without notifying users is acceptable or not. Living in a society more protective of consumer rights is however, no safeguard, as TOS often include a clause of choice of law which allow companies to select jurisdictions whose laws govern the terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The recent experiment bypassed the need for informed user consent due to Facebook's Data Use Policy&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn8"&gt;[8]&lt;/a&gt;, which states that once an account has been created, user data can be used for 'internal operations, including troubleshooting, data analysis, testing, research and service improvement.' While the users worldwide may be outraged, legally, Facebook acted within its rights as the decision fell within the scope of T&amp;amp;Cs that users consented to. The incident's most positive impact might be in taking the questions of Facebook responsibilities towards protecting users, including informing them of the usage of their data and changes in data privacy terms, to a worldwide audience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;My right is bigger than yours&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most TOS agreements, written by lawyers to protect the interests of the companies add to the complexities of privacy, in an increasingly user-generated digital world. Often, intentionally complicated agreements, conflict with existing data and user rights across jurisdictions and chip away at rights like ownership, privacy and even the ability to sue. With conditions that that allow for change in terms at anytime, existing users do not have ownership or control over their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In April New York Times, reported of updates to the legal policy of General Mills (GM), the multibillion-dollar food company.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn9"&gt;[9]&lt;/a&gt; The update broadly asserted that consumers interacting with the company in a variety of ways and venues no longer can sue GM, but must instead, submit any complaint to “informal negotiation” or arbitration. Since then, GM has backtracked and clarified that “online communities” mentioned in the policy referred only to those online communities hosted by the company on its own websites.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn10"&gt;[10]&lt;/a&gt; Clarification aside, as Julia Duncan, Director of Federal programs at American Association for Justice points out, the update in the terms were so broad, that they were open to wide interpretation and anything that consumers purchase from the company could have been held to this clause. &lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data and whose rights?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following Snowden revelations, data privacy has become a contentious issue in the EU, and TOS, that allow the service providers to unilaterally alter terms of the contract, will face many challenges in the future. In March Edward Snowden sent his testimony to the European Parliament calling for greater accountability and highlighted that in "a global, interconnected world where, when national laws fail like this, our international laws provide for another level of accountability."&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn12"&gt;[12]&lt;/a&gt; Following the testimony came the European Parliament's vote in favor of new safeguards on the personal data of EU citizens, when it’s transferred to non-EU.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn13"&gt;[13]&lt;/a&gt; The new regulations seek to give users more control over their personal data including the right to ask for data from companies that control it and seek to place the burden of proof on the service providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation places responsibility on companies, including third-parties involved in data collection, transfer and storing and greater transparency on concerned requests for information. The amendment reinforces data subject right to seek erasure of data and obliges concerned parties to communicate data rectification. Also, earlier this year, the European Court of Justice (ECJ) ruled in favor of the 'right to be forgotten'&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn14"&gt;[14]&lt;/a&gt;. The ECJ ruling recognised data subject's rights override the interest of internet users, however, with exceptions pertaining to nature of information, its sensitivity for the data subject's private life and the role of the data subject in public life.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In May, the Norwegian Consumer Council filed a complaint with the Norwegian Consumer Ombudsman, “… based on the discrepancies between Norwegian Law and the standard terms and conditions applicable to the Apple iCloud service...”, and, “...in breach of the law regarding control of marketing and standard agreements.”&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn15"&gt;[15]&lt;/a&gt; The council based its complaint on the results of a study, published earlier this year, that found terms were hazy and varied across services including iCloud, Drop Box, Google Drive, Jotta Cloud, and Microsoft OneDrive. The Norwegian Council study found that Google TOS, allow for users content to be used for other purposes than storage, including by partners and that it has rights of usage even after the service is cancelled.  None of the providers provide a guarantee that data is safe from loss, while many,  have the ability to terminate an account without notice. All of the service providers can change the terms of service but only Google and Microsoft give an advance notice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study also found service providers lacking with respect to European privacy standards, with many allowing for browsing of user content. Tellingly, Google had received a fine in January by the French Data Protection Authority, that stated regarding Google's TOS, "permits itself to combine all the data it collects about its users across all of its services without any legal basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;To blame or not to blame&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook is facing a probe by the UK Information Commissioner's Office, to assess if the experiment conducted in 2012 was a violation of data privacy laws.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn16"&gt;[16]&lt;/a&gt; The FTC asked the court to order T-Mobile USA,  to stop mobile cramming, provide refunds and give up any revenues from the practice. The existing mechanisms of online consent, do not simplify the task of agreeing to multiple documents and services at once, a complexity which manifolds, with the involvement of third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unsurprisingly, T-Mobile's Legere termed the FTC lawsuit misdirected and blamed the companies providing the text services for the cramming.&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn17"&gt;[17]&lt;/a&gt; He felt those providers should be held accountable, despite allegations that T-Mobile's billing practices made it difficult for consumers to detect that they were being charged for unauthorized services and having shared revenues with third-party providers. Interestingly, this is the first action against a wireless carrier for cramming and the FTC has a precedent of going after smaller companies that provide the services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The FTC charged  T-Mobile USA with deceptive billing practices in putting the crammed charges under a total for 'use charges' and 'premium services' and failure to highlight that portion of the charge was towards third-party charges. Further, the company urged customers to take complaints to vendors and was not forthcoming with refunds. For now, T-Mobile may be able to share the blame, the incident brings to question its accountability, especially as going forward it has entered a pact along with other carriers in USA including Verizon and AT&amp;amp;T, agreeing to stop billing customers for third-party services. Even when practices such as cramming are deemed illegal, it does not necessarily mean that harm has been prevented. Often users bear the burden of claiming refunds and litigation comes at a cost while even after being fined companies could have succeeded in profiting from their actions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfair terms and conditions may arise when service providers include terms that are difficult to understand or vague in their scope. TOS that prevent users from taking legal action, negate liability for service providers actions despite the companies actions that may have a direct bearing on users, are also considered unfair. More importantly, any term that is hidden till after signing the contract, or a term giving the provider the right to change the contract to their benefit including wider rights for service provider wide in comparison to users such as a term that that makes it very difficult for users to end a contract create an imbalance. These issues get further complicated when the companies control and profiting from data are doing so with user generated data provided free to the platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the knowledge economy, web companies play a decisive role as even though they work for profit, the profit is derived out of the knowledge held by individuals and groups. In their function of aggregating human knowledge, they collect and provide opportunities for feedback of the outcomes of individual choices. The significance of consent becomes a critical part of the equation when harnessing individual information. In France, consent is part of the four conditions necessary to be forming a valid contract (article 1108 of the Code Civil).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The cases highlight the complexities that are inherent in the existing mechanisms of online consent. The question of consent has many underlying layers such as reasonable notice and contractual obligations related to consent such as those explored in the case in Canada, which looked at whether clauses of TOS were communicated reasonably to the user, a topic for another blog. For now, we must remember that by creating and organising  social knowledge that further human activity, service providers, serve a powerful function. And as the saying goes, with great power comes great responsibility.&lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref1"&gt;[1]&lt;/a&gt; 'FTC Alleges T-Mobile Crammed Bogus Charges onto Customers’ Phone Bills', published 1 July, 2014. See: http://www.ftc.gov/news-events/press-releases/2014/07/ftc-alleges-t-mobile-crammed-bogus-charges-customers-phone-bills&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref2"&gt;[2]&lt;/a&gt; 'Experimental evidence of massive-scale emotional contagion through social networks', Adam D. I. Kramera,1, Jamie E. Guilloryb, and Jeffrey T. Hancock, published March 25, 2014. See:http://www.pnas.org/content/111/24/8788.full.pdf+html?sid=2610b655-db67-453d-bcb6-da4efeebf534&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref3"&gt;[3]&lt;/a&gt; 'U.S. sues T-Mobile USA, alleges bogus charges on phone  bills, Reuters published 1st July, 2014 See: http://www.reuters.com/article/2014/07/01/us-tmobile-ftc-idUSKBN0F656E20140701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref4"&gt;[4]&lt;/a&gt; 'The Cost of Reading Privacy Policies', Aleecia M. McDonald and Lorrie Faith Cranor, published I/S: A Journal of Law and Policy for the Information Society 2008 Privacy Year in Review issue. See: http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref5"&gt;[5]&lt;/a&gt; 'Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days', Alexis C. Madrigal, published The Atlantic, March 2012 See: http://www.theatlantic.com/technology/archive/2012/03/reading-the-privacy-policies-you-encounter-in-a-year-would-take-76-work-days/253851/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref6"&gt;[6]&lt;/a&gt; Facebook Legal Terms. See: https://www.facebook.com/legal/terms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref7"&gt;[7]&lt;/a&gt; 'Facebook's Eroding Privacy Policy: A Timeline', Kurt Opsahl, Published Electronic Frontier Foundation , April 28, 2010 See:https://www.eff.org/deeplinks/2010/04/facebook-timeline&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref8"&gt;[8]&lt;/a&gt; Facebook Data Use Policy. See: https://www.facebook.com/about/privacy/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref9"&gt;[9]&lt;/a&gt; 'When ‘Liking’ a Brand Online Voids the Right to Sue', Stephanie Strom, published in New York Times on April 16, 2014 See: http://www.nytimes.com/2014/04/17/business/when-liking-a-brand-online-voids-the-right-to-sue.html?ref=business&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref10"&gt;[10]&lt;/a&gt; Explaining our website privacy policy and legal terms, published April 17, 2014 See:http://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/#sthash.B5URM3et.dpufhttp://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref11"&gt;[11]&lt;/a&gt; General Mills Amends New Legal Policies, Stephanie Strom, published in New York Times  on 1http://www.nytimes.com/2014/04/18/business/general-mills-amends-new-legal-policies.html?_r=0&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref12"&gt;[12]&lt;/a&gt; Edward Snowden Statement to European Parliament published March 7, 2014. See: http://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref13"&gt;[13]&lt;/a&gt; Progress on EU data protection reform now irreversible following European Parliament vote, published 12 March 201 See: http://europa.eu/rapid/press-release_MEMO-14-186_en.htm&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref14"&gt;[14]&lt;/a&gt; European Court of Justice rules Internet Search Engine Operator responsible for Processing Personal Data Published by Third Parties, Jyoti Panday, published on CIS blog on May 14, 2014. See: http://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref15"&gt;[15]&lt;/a&gt; Complaint regarding Apple iCloud’s terms and conditions , published on 13 May 2014 See:http://www.forbrukerradet.no/_attachment/1175090/binary/29927&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref16"&gt;[16]&lt;/a&gt; 'Facebook faces UK probe over emotion study' See: http://www.bbc.co.uk/news/technology-28102550&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref17"&gt;[17]&lt;/a&gt; Our Reaction to the FTC Lawsuit See: http://newsroom.t-mobile.com/news/our-reaction-to-the-ftc-lawsuit.htm&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights'&gt;https://cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>internet and society</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Accountability</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Safety</dc:subject>
    

   <dc:date>2014-07-04T06:31:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech">
    <title>Facebook and its Aversion to Anonymous and Pseudonymous Speech</title>
    <link>https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech</link>
    <description>
        &lt;b&gt;Jessamine Mathew explores Facebook's "real name" policy and its implications for the right to free speech. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The power to be unidentifiable on the internet has been a major reason for its sheer number of users. Most of the internet can now be freely used by anybody under a pseudonym without the fear of being recognised by anybody else. These conditions allow for the furtherance of free expression and protection of privacy on the internet, which is particularly important for those who use the internet as a medium to communicate political dissent or engage in any other activity which would be deemed controversial in a society yet not illegal. For example, an internet forum for homosexuals in India, discussing various issues which surround homosexuality may prove far more fruitful if contributors are given the option of being undetectable, considering the stigma that surrounds homosexuality in India, and the recent setting-aside of the Delhi High Court decision reading down Section 377 of the Indian Penal Code. The possibility of being anonymous or pseudonymous exists on many internet fora but on Facebook, the world’s greatest internet space for building connections and free expression, there is no sanction given to pseudonymous accounts as Facebook follows a real name policy. And as the &lt;a href="http://www.nytimes.com/2014/06/27/technology/facebook-battles-manhattan-da-over-warrants-for-user-data.html?_r=0"&gt;recent decision&lt;/a&gt; of a New York judge, disallowing Facebook from contesting warrants on private information of over 300 of its users, shows, there are clear threats to freedom of expression and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the subject of using real names, Facebook’s Community Standards states, “Facebook is a community where people use their real identities. We require everyone to provide their real names, so you always know who you're connecting with. This helps keep our community safe.” Facebook’s Marketing Director, Randi Zuckerberg, &lt;a href="http://www.dailymail.co.uk/news/article-2019544/Facebook-director-Randi-Zuckerberg-calls-end-internet-anonymity.html"&gt;bluntly dismissed&lt;/a&gt; the idea of online anonymity as one that “has to go away” and that people would “behave much better” if they are made to use their real names. Apart from being a narrow-minded statement, she fails to realise that there are many different kinds of expression on the internet, from stories of sexual abuse victims to the views of political commentators, or indeed, whistleblowers, many of whom may prefer to use the platform without being identified. It has been decided in many cases that humans have a right to anonymity as it provides for the furtherance of free speech without the fear of retaliation or humiliation (&lt;i&gt;see &lt;/i&gt;Talley v. California).&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook’s rationale behind wanting users to register for accounts with their own names is based on the goal of maintaining the security of other users, it is still a serious infraction on users’ freedom of expression, particularly when anonymous speech has been protected by various countries. Facebook has evolved from a private space for college students to connect with each other to a very public platform where not just social connections but also discussions take place, often with a heavily political theme. Facebook has been described as &lt;a href="http://www.thenational.ae/news/uae-news/facebook-and-twitter-key-to-arab-spring-uprisings-report"&gt;instrumental&lt;/a&gt; in the facilitation of communication during the Arab Spring, providing a space for citizens to effectively communicate with each other and organise movements. Connections on Facebook are no longer of a purely social nature but have extended to political and legal as well, with it being used to promote movements all through the country. Even in India, Facebook was the &lt;a href="http://timesofindia.indiatimes.com/home/news/Facebook-Twitter-Google-change-face-of-Indian-elections/articleshow/34721829.cms"&gt;most widely adopted medium&lt;/a&gt;, along with Twitter and Facebook, for discourse on the political future of the country during, before and after the 2014 elections. Earlier in 2011, Facebook was &lt;a href="https://cis-india.org/news/web2.0-responds-to-hazare"&gt;used intensively&lt;/a&gt; during the India Against Corruption movement. There were pages created, pictures and videos uploaded, comments posted by an approximate of 1.5 million people in India. In 2012, Facebook was also used to &lt;a href="http://timesofindia.indiatimes.com/tech/social-media/Delhi-gang-rape-case-FacebookTwitter-fuels-rally-at-India-Gate/articleshow/17741529.cms"&gt;protest against the Delhi gang rape&lt;/a&gt; with many coming forward with their own stories of sexual assault, providing support to the victim, organising rallies and marches and protesting about the poor level of safety of women in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much like its content policy, Facebook exhibits a number of discrepancies in the implementation of the anonymity ban. Salman Rushdie found that his Facebook account had been &lt;a href="http://www.nytimes.com/2011/11/15/technology/hiding-or-using-your-name-online-and-who-decides.html?pagewanted=all&amp;amp;_r=0"&gt;suspended&lt;/a&gt; and when it was reinstated after he sent them proof of identity, Facebook changed his name to the name on his passport, Ahmed Rushdie instead of the name he popularly goes by. Through a series of tweets, he criticised this move by Facebook, forcing him to display his birth name. Eventually Facebook changed his name back to Salman Rushdie but not before serious questions were raised regarding Facebook’s policies. The Moroccan activist Najat Kessler’s account was also &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CD8QFjAE&amp;amp;url=http%3A%2F%2Fjilliancyork.com%2F2010%2F04%2F08%2Fon-facebook-deactivations%2F&amp;amp;ei=O1KxU-fwH8meugSZ74HgAg&amp;amp;usg=AFQjCNE7oUt2dyrSjpTskK7Oz3Q1OYXudg&amp;amp;sig2=bsOu46nmABTUhArhdjDCVw&amp;amp;bvm=bv.69837884,d.c2E"&gt;suspended&lt;/a&gt; as it was suspected that she was using a fake name. Facebook has also not just stopped at suspending individual user accounts but has also removed pages and groups because the creators used pseudonyms to create and operate the pages in question. This was seen in the case of Wael Ghonim who created a group which helped in mobilizing citizens in Egypt in 2011. Ghonim was a Google executive who did not want his online activism to affect his professional life and hence operated under a pseudonym. Facebook temporarily &lt;a href="http://www.newsweek.com/how-wael-ghonim-sparked-egypts-uprising-68727"&gt;removed&lt;/a&gt; the group due to his pseudonymity but later reinstated it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Facebook performs its due diligence when it comes to some accounts, it has still done nothing about the overwhelmingly large number of obviously fake accounts, ranging from Santa Claus to Jack the Ripper. On my own Facebook friend list, there are people who have entered names of fictional characters as their own, clearly violating the real name policy. I once reported a pseudonymous account that used the real name of another person. Facebook thanked me for reporting the account but also said that I will “probably not hear back” from them. The account still exists with the same name. The redundancy of the requirement lies in the fact that Facebook does not request users to upload some form identification when they register with the site but only when they suspect them to be using a pseudonym. Since Facebook also implements its policies largely only on the basis of complaints by other users or the government, the real name policy makes many political dissidents and social activists the target of abuse on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Articles 21 and 22 of the ICCPR grant all humans the right to free and peaceful assembly. As governments increasingly crack down on physical assemblies of people fighting for democracy or against legislation or conditions in a country, the internet has proved to be an extremely useful tool for facilitating this assembly without forcing people to endure the wrath of governmental authorities. A large factor which has promoted the popularity of internet gatherings is the way in which powerful opinions can be voice without the fear of immediate detection. Facebook has become the coveted online space for this kind of assembly but their policies and more particularly, faulty implementation of the policies, lead to reduced flows of communication on the site.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Facebook’s fears of cyberbullying and harassment are likely to materialise if there is absolutely no check on the identity of users.  A possible solution to the conflict between requiring real names to keep the community safe and still allowing individuals to be present on the network without the fear of identification by anybody would be to ask users to register with their own names but still allowing them to create a fictional name which would be the name that other Facebook users can see. Under this model, Facebook can also deal with the issue of safety through their system of reporting against other users. If a pseudonymous user has been reported by a substantial number of people for harassment or any other cause, then Facebook may either suspend the account or remove the content that is offensive. If the victim of harassment chooses to approach a judicial body, then Facebook may reveal the real name of the user so that due process may be followed. At the same time, users who utilise the website to present their views and participate in the online process of protest or contribute to free expression in any other way can do so without the fear of being detected or targeted.  Safety on the site can be maintained even without forcing users to reveal their real names to the world. The system that Facebook follows currently does not help curb the presence of fake accounts and neither does it promote completely free expression on the site.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech'&gt;https://cis-india.org/internet-governance/blog/facebook-and-its-aversion-to-anonymous-and-pseudonymous-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jessamine Mathew</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    
    
        <dc:subject>Anonymity</dc:subject>
    
    
        <dc:subject>Pseudonimity</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-04T07:53:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet">
    <title>Terror recruiters target Indians on internet</title>
    <link>https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet</link>
    <description>
        &lt;b&gt;What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sandhya Soman was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Terror-recruiters-target-Indians-on-internet/articleshow/38565102.cms"&gt;published in the Times of India&lt;/a&gt; on July 18, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet'&gt;https://cis-india.org/news/the-times-of-india-july-18-2014-sandhya-soman-terror-recruiters-target-indians-on-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-07-18T06:57:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls">
    <title>The trouble with trolls</title>
    <link>https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls</link>
    <description>
        &lt;b&gt;Social networking sites give trolls the ability to hide their real identity and cause grief to others. Here is what you need to do if you face an online attack.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vishal Mathur was &lt;a class="external-link" href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html"&gt;published in Livemint&lt;/a&gt; on July 22, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Social networking sites give trolls the ability       to hide their real identity and cause grief to others. Here is       what you need to do if you face an online attack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though       social networks were not designed with the intention of letting       someone anonymously abuse another online, the reality is that       people utilize the ability to hide behind online identities to       threaten other users. These could be veiled attacks, direct abuse,       or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide.       Avoid conversation if you can       The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse.       Report to the social network       You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform.       “Most social networks have systems that allow you to report       abusive content and users. However, there is great variance in the       speed with which they respond across different platforms,       jurisdictions, etc.,” says Sunil Abraham, executive director at       the Bangalore-based non-profit research organization Centre for       Internet and Society. New Delhi-based Anja Kovacs, project       director, at civil society organization Internet Democracy       Project, adds: “Blocking and reporting an account can be two ways       to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.”       Ankhi Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some.       Raheel Khursheed, head of news, politics and government at Twitter       India, did not respond to our mail about how Twitter handles       trolls at the time of going to press.       On blogs and forums, it may be a bit easier to deal with trolling       and abuse. If it is your own blog, you can delete comments and       block users. If it is a forum, the administrator can do it for       you. But, with social networks having millions of users, it is not       possible to have one administrator managing it all. And it is not       just Facebook and Twitter, all social networks have a method by       which you can register your complaint. LinkedIn, for example,       automatically blocks a user who gets multiple “I don’t know”       responses to invitations to connect. There is a strong monitoring       policy where any reported content (recommendations or direct       messages) is examined and immediate warnings are sent out to       offending parties.       Keep a copy of the offensive posts       Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst.       Don’t ignore privacy settings       Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.”       Get help from the law       In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs.       The police may look for hints of threat to cause bodily harm or       worse still, to life. In such cases, they may recommend the case       to the Cyber Crime Cell of the Central Bureau of Investigation.       “Generally, while the substantive offences do exist under law, the       process for having them enforced is deficient. These are deeper       structural problems of delay, investigation and conviction which       are prevalent across criminal justice or civil litigation,”       clarifies Gupta. Officials at the Cyber Crime Cell say they take       up cases after reference from the local police, who file the       report first and do a preliminary level of investigation.       But it is important to realize that only the police and the       law-enforcement agencies have the right to demand further details       about the perpetrator from the social networks, starting with       profile       details and Internet Protocol (IP) addresses, which will help       track the person down. Das clarifies: “Facebook has a       point-of-contact system through which the law-enforcement agencies       tell us what the actual case is, depending on severity. The police       may ask us to take down particular content, or even ask for user       information like IP info, to prevent real crime.”       According to Facebook’s Government Requests Report for       July-December 2013, the network restricted access to 4,765 pieces       of content after requests from the Indian government and       law-enforcement agencies.&lt;/p&gt;
&lt;div style="text-align: left; "&gt;Read more at: &lt;a href="http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=ref_article"&gt;http://www.livemint.com/Leisure/5biF5tW7enAmzp0jsYrRGK/The-trouble-with-trolls.html?utm_source=copy&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Though social networks were not designed with       the intention of letting someone anonymously abuse another online,       the reality is that people utilize the ability to hide behind       online identities to threaten other users. These could be veiled       attacks, direct abuse, or even threats to “cause bodily harm”.       What can you do if you’re trolled and threatened on any social       network? Follow our five-step guide. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Avoid conversation if you can &lt;/b&gt;&lt;br /&gt; The responses could come in relation to something you may have       just posted online. Or perhaps it could be just a random trolling       attempt, to get a response from you. It is important to understand       and identify such intentions. And as difficult as it may be, do       not respond. Getting into a direct interaction with a bully only       makes things worse. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Report to the social network &lt;/b&gt;&lt;br /&gt; You should report any instance of cyber bullying or harassment to       the host social network—the website or forum on which the       interaction happened. There are various methods of getting in       touch with the moderators—customer support email, contact       submission forms or even via phone, in certain locations. Describe       the problem in detail, and persist till the offending account is       blocked from the platform. “Most social networks have systems that       allow you to report abusive content and users. However, there is       great variance in the speed with which they respond across       different platforms, jurisdictions, etc.,” says Sunil Abraham,       executive director at the Bangalore-based non-profit research       organization Centre for Internet and Society. New Delhi-based Anja       Kovacs, project director, at civil society organization Internet       Democracy Project, adds: “Blocking and reporting an account can be       two ways to stop harassment on some social networks, but on other       platforms, such as Twitter, it is possible for the person to       immediately make a new account under a different username, meaning       that these measures do not necessarily stop the harassment.” Ankhi       Das, director, public policy, India and South Asia at social       network Facebook, says: “Every reported piece of content is       reviewed. Serial offenders are notified for non-compliance.”       Facebook’s Community Standards, that prevent harassment and       offensive posts, have an 11-point categorization for reported       content—violence and threats, hate speech, graphic content,       bullying and harassment, to name some. Raheel Khursheed, head of       news, politics and government at Twitter India, did not respond to       our mail about how Twitter handles trolls at the time of going to       press. On blogs and forums, it may be a bit easier to deal with       trolling and abuse. If it is your own blog, you can delete       comments and block users. If it is a forum, the administrator can       do it for you. But, with social networks having millions of users,       it is not possible to have one administrator managing it all. And       it is not just Facebook and Twitter, all social networks have a       method by which you can register your complaint. LinkedIn, for       example, automatically blocks a user who gets multiple “I don’t       know” responses to invitations to connect. There is a strong       monitoring policy where any reported content (recommendations or       direct messages) is examined and immediate warnings are sent out       to offending parties. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Keep a copy of the offensive posts &lt;/b&gt;&lt;br /&gt; Be it a post, or a series of posts, direct message or even an       offending photograph, always save it for future reference. Never       assume that the matter will end soon, and always prepare for the       worst. &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Don’t ignore privacy settings &lt;/b&gt;&lt;br /&gt; Most people start using Facebook, Twitter and other social       networks without paying much attention to the privacy       settings—what content people can see on your page, and who can       directly contact you. Be conservative in sharing information—the       less you share, the lower the chances of someone picking on you.       “Avoid friending or linking to people whom you don’t know in real       life unless you are certain of the chain of trust that exists       between you and the unknown person,” says Abraham. New Delhi-based       cyber lawyer Apar Gupta, adds: “The privacy settings on most       social networking platforms allow users to prevent (restrict) the       audience for their posts as well as strangers from contacting       them. This will prevent most cases of online harassment.” &lt;br /&gt; &lt;br /&gt; &lt;b&gt;Get help from the law &lt;/b&gt;&lt;br /&gt; In case social networks are not able to effectively block a user,       or are in some way unwilling to do so, take help from the       law-enforcement authorities. File an FIR in the nearest police       station. Unfortunately, the progress may not be very smooth. The       reality is that not every law-enforcement officer may know about       social networking sites. “You could try and go to the police, but       without support from the social network platform, they are often       at a loss to do much themselves,” warns Kovacs. The police may       look for hints of threat to cause bodily harm or worse still, to       life. In such cases, they may recommend the case to the Cyber       Crime Cell of the Central Bureau of Investigation. “Generally,       while the substantive offences do exist under law, the process for       having them enforced is deficient. These are deeper structural       problems of delay, investigation and conviction which are       prevalent across criminal justice or civil litigation,” clarifies       Gupta. Officials at the Cyber Crime Cell say they take up cases       after reference from the local police, who file the report first       and do a preliminary level of investigation. But it is important       to realize that only the police and the law-enforcement agencies       have the right to demand further details about the perpetrator       from the social networks, starting with profile details and       Internet Protocol (IP) addresses, which will help track the person       down. Das clarifies: “Facebook has a point-of-contact system       through which the law-enforcement agencies tell us what the actual       case is, depending on severity. The police may ask us to take down       particular content, or even ask for user information like IP info,       to prevent real crime.” According to Facebook’s Government       Requests Report for July-December 2013, the network restricted       access to 4,765 pieces of content after requests from the Indian       government and law-enforcement agencies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls'&gt;https://cis-india.org/news/livemint-july-22-2014-vishal-mathur-the-trouble-with-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-28T05:42:36Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/gauging-users-reactions-towards-zero-rating">
    <title>Gauging Users' Reactions Towards Zero Rating</title>
    <link>https://cis-india.org/telecom/blog/gauging-users-reactions-towards-zero-rating</link>
    <description>
        &lt;b&gt;In the ongoing debate about zero-rated plans and net neutrality, this blog post aims to study the possible effects of a survey conducted in Bangalore to gauge users' reactions towards such plans, and specifically "limited packs" offered by major telecom companies.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;I would like to thank Amba Kak, on whose research the survey was conducted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Zero­-rating is the practice of not counting (aka “zero­-rating”) certain traffic towards a subscriber’s regular Internet usage. There are different types of zero-rating that exist in the market.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;For example, Facebook Free Basics or Internet.org as it was formerly known is a platform which provides limited content to subscribers, free of cost.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Airtel Zero is another such platform that provides free content to subscribers. Instead of charging these subscribers, the providers who choose to get on the platform are charged.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Social media packs offered by major telecom companies are another variation of zero-rating. For a fraction of the price of regular data plans, users have access to apps like Facebook and Whatsapp. As per the Airtel website, a Whatsapp pack that allows 200 MB of Whatsapp for a month costs INR 46 in Karnataka.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I conducted a small survey in Bangalore to determine the effects these limited social media packs have on users. I conducted interviews that were spread over five days in three different localities in Bangalore. I interviewed eight people and five recharge shops about their take on these limited packs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I targeted two groups of users: new users of the Internet, and early adopters. The group of interviewees comprised of three university students, two shopkeepers, and three watchmen. I also talked to recharge shops in the neighbourhoods of the interviewees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Through my research, I wanted to understand how users reacted to these social media packs, and gauge the popularity of these packs. This is where feedback from recharge shops would have been useful, however, what was surprising was that none of the shops I talked to offered these plans. Two out of the five shops had not even heard of Facebook or Whatsapp packs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that recharge shops did not offer these services made it difficult to identify subscribers of limited packs. I instead decided to talk to users of mobile internet, and discern their interest towards such packs. My questions followed a specific format: I’d find out which service provider the user subscribed to, their billing structure, their internet browsing patterns, whether they had heard of limited packs, and their interest towards such packs. Out of the people I interviewed, only three expressed interest towards these packs, Whatsapp in particular. For two of them, Whatsapp was the only service they used on their phones, and a Whatsapp pack seemed more useful to them than a regular data pack.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I also wanted to find out how much of an effect price played on the users while they chose a data plan. Even though a limited pack is substantially cheaper than a regular&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;data plan, six out of the eight users said they would choose an all-access data pack. Three of these six users expressed wariness towards such plans as they found the billing structures confusing. They were nervous about the possibility of being charged unfairly high rates in the accidental case of accessing services that were not provided by the limited packs. Further, three of the others were of the opinion than a regular data pack with full access to the internet was preferable to the limited access services provided by these packs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From these interviews, one can assume that knowledge of these limited packs is low among both users and recharge shops, and the takers for the same are minimal. It would be hasty to jump to the conclusions from this admittedly anecdotal evidence, keeping in mind the small pool of interviewees, but it raises interesting questions with no easy answers: how great a factor is price for the users while choosing limited packs over regular internet packs? Perhaps more importantly, do these packs confine users to the walled garden, or will they venture out of it in order to access the whole Internet? &lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;My findings explore a tiny proportion of what users think about these plans. However, there is a long way to go for policy and regulation decisions.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Background Paper to CIS Submission for TRAI Consultation on Regulatory Framework for OTT Services which can be found here: http://trai.gov.in/comments/24-April/Attachments-75/2015-04-24_CIS-background-paper_Net-neutrality.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Facebook, Reliance Communications launch Internet.org in India by Nimish Sawant for Firstpost&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Airtel Offers Customers Free Access to Select Apps With 'Airtel Zero'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The tariff rates can be found &lt;a class="external-link" href="http://www.airtel.in/whatsapp/?cid=social21491444"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. For example, an Airtel Whatsapp pack is less than half the price of a one month 2G connection&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Zero for Conduct by Susan Crawford for Backchannel&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/gauging-users-reactions-towards-zero-rating'&gt;https://cis-india.org/telecom/blog/gauging-users-reactions-towards-zero-rating&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aadya Misra</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2015-11-25T15:30:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom">
    <title>Wikipedia Editing as Assessment Tool in the Indian Higher Education Classroom</title>
    <link>https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom</link>
    <description>
        &lt;b&gt;Getting students to create and edit Wikipedia entries in English and Indian languages can be a comprehensive assessment tool at the Bachelor’s and Master’s levels. Both levels of higher education require the demonstration of the ability to present knowledge in encyclopaedic form, which can be done by a good review of relevant literature and the showcasing of key arguments in the field.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Using the &lt;a href="https://cis-india.org/openness/blog-old/dublin-descriptors.pdf" class="internal-link"&gt;Dublin competency level descriptors&lt;/a&gt;,&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt; we can put down what sorts of &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Higher_education"&gt;higher education&lt;/a&gt; skills Wikipedia editing can help evaluate. The most commonly accepted descriptors internationally are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Demonstration of Knowledge and understanding &lt;/li&gt;
&lt;li&gt;Applying knowledge and understanding &lt;/li&gt;
&lt;li&gt;Making judgements &lt;/li&gt;
&lt;li&gt;Communication abilities&lt;/li&gt;
&lt;li&gt;Learning skills relevant to higher education&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Main_Page"&gt;Wikipedia&lt;/a&gt; allows for assessing the ‘depth’ of an article which is the measure of the quality of an entry. The depth is a function of several parameters like the number of edits an article has seen, the length of discussion in the talk pages, the number of footnotes, references, hyperlinks and editors active on that page. In addition to this, providing Wiki-interlinks to key concepts within an article and categorization of articles exposes the students to a "semantic web" of interconnections between various fields of knowledge. Although, it may not be a complete substitute for the more formal modes of assessment, it provides a more rounded form of evaluation for student assessment. The ‘depth’ indicator also shows the relative significance of an article for the larger community of users, thereby providing a better model for student assessment in the long run.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Bachelor's Level&lt;/h3&gt;
&lt;p&gt;By getting students to edit on Wikipedia at the Bachelor’s Level, you can test the following, and appropriate weightage can be given to each aspect of the work:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Comprehension of the theory, concepts and processes pertaining to a field or fields of learning &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Demonstration of knowledge, supported by the use of advanced textbooks and other reading materials, of one or more specialised areas &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to apply this knowledge and comprehension in a manner that indicates a thorough and informed approach to the work, and have competences typically demonstrated through devising and sustaining arguments&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to gather and interpret relevant data to inform independent judgements which include reflection on relevant social, scientific or ethical issues &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to communicate information, ideas, problems and solutions to both specialist and non-specialist audiences [in the case of Wikipedia, the audience would usually be a non-specialist one]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Master's Level&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;By getting students to edit on Wikipedia at the Master’s Level, you can test the following, and appropriate weightage can be given to each aspect of the work:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Demonstration of knowledge and comprehension that is founded upon, extends and enhances that associated with the Bachelor’s level and is at the forefront of a field of learning &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Critical awareness of current problems and new insights, new tools and new processes within their field of learning (ability to do a good literature review, which can be seen through the citations provided for a Wikipedia entry)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to apply their knowledge, comprehension, and critical awareness in broader or multidisciplinary areas related to their fields of study &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to integrate knowledge and handle complexity, to formulate judgements with incomplete or limited information, with an awareness of the social and ethical responsibilities linked to the application of their knowledge and judgements &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to communicate their conclusions, and knowledge, rationale and processes underpinning these, to specialist and non-specialist audiences clearly and unambiguously&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to reflect on one’s own writing by engaging with feedback received from a collaborative network.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ability to form peer knowledge networks through collaboration and interaction with other contributors&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Risks and Mitigation&lt;/h3&gt;
&lt;p&gt;It is helpful to be aware of the typical risks a faculty may face in using Wikipedia entries as an assessment tool.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New article creation: Wikipedias, especially the &lt;a class="external-link" href="http://en.wikipedia.org/wiki/English_Wikipedia"&gt;English Wikipedia&lt;/a&gt;, are closely monitored by thousands of volunteers from across the world. Often, articles created by new users come under a lot of scrutiny. It is advisable to first encourage the students to edit and improve the existing articles before creating a new article all by themselves. Also taking the help of an experienced Wikipedian will go a long way in mentoring the students on the nuances of the Wikipedia platform and the volunteer community that strives in good faith to preserve the quality of entries. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Copyright violation: &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Control-C"&gt;Ctrl+c&lt;/a&gt; and &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Cut,_copy,_and_paste"&gt;Ctrl+v&lt;/a&gt; (i.e., &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Plagiarism"&gt;plagiarism&lt;/a&gt;) is a major challenge for the higher education sector across the world. Often the students find that copy-pasting the content from various sources is an easy way of doing an assignment. On Wikipedia, plagiarism is taken very seriously and a student editor can get banned from further contribution to Wikipedia, which may de-motivate the entire class. It’s useful for the faculty to give a detailed orientation on this aspect before encouraging the students to take up writing a Wikipedia entry as an assignment. There are numerous resources (text and videos) made available by Wikimedians across the world explaining the problem of plagiarism. These could be used by the faculty. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If you are encouraging students to write an entry in an Indian language Wikipedia, special attention and support needs to be planned to train the students in typing in that particular Indian language script. Wikipedias have a useful tool called &lt;a class="external-link" href="http://www.mediawiki.org/wiki/Universal_Language_Selector"&gt;Universal Language Selector&lt;/a&gt; (ULS) which makes it very easy for the student to start typing in any script using the transliteration method. There is increasing support for Indian language scripts, however. You could check whether your University computer lab has Unicode compliant computers/systems. This will help the students to work offline on their assignment, if required.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;One of the biggest challenges for a teacher is to get the student to see the value of taking up a Wikipedia entry as an assignment. Some of the students may see this as an additional task or extra-curricular activity and may not put in a committed effort, which could affect the goals you have set for your course. Faculties are encouraged to find various means of integrating/dovetailing the Wikipedia assignment into the curriculum or course. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Faculty may also feel this as an additional burden on them, especially in terms of evaluation of the assignment. There are various tools available to measure most of the assessment parameters set out above, which will not take much time. It is in fact possible to save faculty time if the evaluation is planned meticulously. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A pragmatic challenge for the faculty would be to deal with a scenario where the entire class submits the assignments on Wikipedia on the last day. This will not only increase burden on the faculty but can also result in a lot of plagiarism. An effective way to address this challenge is to make the Wikipedia entry assignment part of a formative assessment, whereby the student develops the entry over a period of time (e.g. one month or during the course). There are various tools through which you can track the students’ contribution continuously and share feedback with them periodically.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].Available at &lt;a class="external-link" href="http://www.tcd.ie/teaching-learning/academic-development/assets/pdf/dublin_descriptors.pdf"&gt;http://www.tcd.ie/teaching-learning/academic-development/assets/pdf/dublin_descriptors.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom'&gt;https://cis-india.org/openness/blog-old/wikipedia-as-assessment-tool-in-indian-higher-education-classroom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Dr. Tejaswini Niranjana, Ashwin Kumar A.P. and T. Vishnu Vardhan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Higher Education</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-01-30T10:06:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too">
    <title>Social media promotions can backfire, too</title>
    <link>https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too</link>
    <description>
        &lt;b&gt;Social media is a highly effective marketing tool for companies but its very ubiquity and the speed with which messaging goes viral has meant that it can hurt them badly as well, especially since platforms are not always moderated and can be hacked or misused.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Ratna Bhushan and Varuni Khosla was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-11-11/news/43930106_1_star-india-pepsico-india-social-media-interactions"&gt;published in the Times of India&lt;/a&gt; on November 11, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It's not just bad language and racially or socially insensitive messages  seemingly originating from official Twitter handles, some companies are  guilty of poorly judged promotions resulting in consumer backlash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the eve of the country's largest broadcaster Star India  rebranding its sport channels last week, the Star Sports Twitter handle  posted abusive language. Star India said the account had had been  hacked, but by then the tweet had gone viral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just before that,  the Board of Control for Cricket in India Twitter handle had cricket  legend Sachin Tendulkar's digital autograph along with bad language on  the eve of his retirement from the sports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two days before  Diwali, beverage and snacks maker PepsiCo ran a contest on Twitter  asking contestants to tweet their version of the Ramayana. That caused  outrage on social media, led by writer Chetan Bhagat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PepsiCo  quickly apologised and removed the promotion but not before it got  flooded by tweets from those who were upset by the move. While Star and  BCCI blamed hackers and PepsiCo's scored an own goal, social media  experts say companies need to be more responsible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Our intent was to involve young Indians in one of India's most loved  festivals. We took immediate action and withdrew the contest," the  beverage maker's spokesperson said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AStar Sports spokesperson  also said the firm had apologised for the offensive tweet. "We have  investigated the issue. A thirdparty vendor had abused his privileged  access to the account. We are in the process of taking necessary action  and will ensure that no such event recurs."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But ensuring  third-party quality control may be easier said than done. "Many  companies are unable to handle their social media operations because  they usually outsource these to companies that don't get paid well  enough (say Rs 50,000 to Rs 60,000 per month).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence the people  handling the accounts could be anyone from an untrained 22-year-old  fresh out of college or someone who has no skill set in the social media  space," said Gaba.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sometimes humour can turn offensive too. In the middle of last year,  when Sachin Tendulkar made his eagerly awaited 100th international  century, a tweet from insurance services firm Bajaj Allianz went:  Congrats to Sachin for his long awaited 100th ton. Now don't delay your  retirement planning. #RetireRich #JiyoBefikar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That caused much offence to Tendulkar's fans. Or take the case of  Fortis, which sought to promote breast feeding week last year with the  hashtag AgarMaKaDudhPia-HaiTo. Predictably, this one too ran into  trouble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Social media by definition, unlike broadcast media, cannot be  controlled. Therefore, even if you take all conceivable precautions  there can be unintended consequences. But India is culturally as  complicated as a continent — therefore, it requires a very sophisticated  understanding and nuance to pull off humour that is universally  appealing and does not offend anyone," said Abraham. Last week, the  seven-year-old Twitter's stock rose 73% on its debut, with a market  value of $31 billion, making it one of the most successful IPOs of the  year and beating even its own expectations. Globally, examples abound of  companies or institutions making on Twitter bloopers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Companies  shouldn't always come up with the excuse that their account was  hacked... they need to be accountable. A senior member of the team  should always oversee tweets before they're sent out," said Ankita Gaba,  co-founder of socialsamosa.com, an Indian social media knowledge  storehouse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director of the Centre for  Internet and Society, a non-profit research organisation that works on  policy issues relating to freedom of expression and privacy, said, "The  BCCI disaster is because they have taken automation too far. Automation  of social media interactions can be useful but without careful human  oversight, it can very easily be gamed by rogue elements online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A PepsiCo India spokesman said the firm's #Ramayana140 Twitter contest "unintentionally caused some concern to consumers".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too'&gt;https://cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-14T05:24:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello">
    <title>I Just Pinged to Say Hello</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello</link>
    <description>
        &lt;b&gt;A host of social networks find us more connected than ever before, but leave us groping for words in the digital space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Dr. Nishant Shah's article was &lt;a class="external-link" href="http://www.indianexpress.com/news/i-just-pinged-to-say-hello/1198448/0"&gt;published in the Indian Express&lt;/a&gt; on November 24, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I am making a list of all the platforms that I use to connect with the large networks that I belong to. Here goes: I use Yahoo! Messenger to talk to my friends in east Asia. Most of my work meetings happen on Skype and Google Hangout. A lot of friendly chatter fills up my Facebook Messenger. Twitter is always available for a little back-chat and bitching. On the phone, I use Viber to make VoIP calls and WhatsApp is the space for unending conversations spread across days. And these are just the spaces for real-time conversation. Across all these platforms, something strange is happening. As I stay connected all the time, I am facing a phenomenon where we have run out of things to say, but not the desire to talk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I had these three conversations today on three different instant-messaging platforms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Person 1 (on WhatsApp): Hi.&lt;br /&gt;&lt;br /&gt;Me: Hey, good to hear from you. How are you doing?&lt;br /&gt;&lt;br /&gt;Person 1: Good.&lt;br /&gt;&lt;br /&gt;Me (after considerable silence): So what's up?&lt;br /&gt;&lt;br /&gt;Person 1: Nothing.&lt;br /&gt;&lt;br /&gt;End of conversation.&lt;br /&gt;&lt;br /&gt;Person 2 (On an incoming video call on Skype): Hey, you there?&lt;br /&gt;&lt;br /&gt;Me: Yeah. What time is it for you right now?&lt;br /&gt;&lt;br /&gt;Person 2: It is 10 at night.&lt;br /&gt;&lt;br /&gt;Me: Oh! That is late. How come you are calling me so late?&lt;br /&gt;&lt;br /&gt;Person 2: Oh, I saw you online.&lt;br /&gt;&lt;br /&gt;Me: Ok….. *eyes raised in question mark*&lt;br /&gt;&lt;br /&gt;Person 2: So, that's it. I am going to sleep soon.&lt;br /&gt;&lt;br /&gt;Me: Ok…. Er…goodnight.&lt;br /&gt;&lt;br /&gt;Person2: Goodnight.&lt;br /&gt;&lt;br /&gt;We hang up.&lt;br /&gt;&lt;br /&gt;Person 3 (pinging me on Facebook): Hey, you are in the US right now?&lt;br /&gt;&lt;br /&gt;Me: Yes. I am attending a conference here.&lt;br /&gt;&lt;br /&gt;Person 3: Cool!&lt;br /&gt;&lt;br /&gt;Me: Umm… yeah, it is.&lt;br /&gt;&lt;br /&gt;Person 3: emoticon of a Facebook 'like'. Have fun. Bye.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially I was irritated at the futility of these pings that are bewildering in their lack of content. I dismissed it as one of those things, but I realise that there is a pattern here. Our lives are so particularly open and documented, such minute details of what we do, where we are and who we are with, is now available for the rest of the world to consume, making most of the conversations seeking information, redundant. If you know me on my social media networks, you already know most of the basic things that you would want to know about me. And it goes without saying that no matter how close and connected we are, we are not necessarily in a state where we want to talk all the time. The more distributed our lives are, the more diminished is the need for personal communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, the habit or the urge to ping, buzz, DM or chat has not caught up with this interaction deficit. So, we still seem to reach out, using a variety of platforms just to say hello, even when there is nothing to say. I call this the 'Always On' syndrome. We live in a world where being online all the time has become a ubiquitous reality. Even when we are asleep, or busy in a meeting, or just mentally disconnected from the online spaces, our avatars are still awake. They interact with others. And when they feel too lonely, they reach out and send that empty ping — just to confirm that they are not alone. That on the other side of the glowing screen is somebody else who is going to connect back, and to reassure you that we are all together in this state of being alone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This empty ping has now become a signifier, loaded with meaning. The need for human connection has been distributed, but it does not compensate our need for one-on-one contact. In the early days of the cell phone, when incoming calls were still being charged, the missed call, without any content, was a code between friends and lovers. It had messages about where to meet, when to meet, or sometimes, just that you were missing somebody. The empty ping is the latest avatar of the missed call — in a world where we are always online but not always connected, when we are constantly together, but also spatially and emotionally alone, the ping remains that human touch in the digital space that reassures us that on the other side of that seductive interface and the buzzing gadget, is somebody we can say hello to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello'&gt;https://cis-india.org/internet-governance/blog/indian-express-november-24-2013-nishant-shah-i-just-pinged-to-say-hello&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-30T08:36:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one">
    <title>When the virtual world wakes up the real one</title>
    <link>https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one</link>
    <description>
        &lt;b&gt;The unprecedented wave of voices speaking up against sexual harassment in recent times has as much to do with technology as the determination to seek justice. From Twitter to Tumblr, and blogs to pastebin, the internet's anonymity, reach and speed allow small, personal stories of abuse to swell into big stories.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Malini Nair was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-11-24/deep-focus/44411700_1_social-web-sexual-harassment-editor-tarun-tejpal"&gt;published in the Times of India&lt;/a&gt; on November 24. Nishant Shah is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The outrage over the Tehelka case started with a post on pastebin, an  anonymous document sharing site, on Wednesday evening. It contained the  email managing editor Shoma Chaudhury had sent to the Tehelka staff with  editor Tarun Tejpal's "atonement" letter appended below. A few hours  later, the story had ballooned into a heated debate, and the outpouring  forced what was being dismissed as an "internal matter" to be treated as  a criminal case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two &lt;a href="http://timesofindia.indiatimes.com/topic/Women"&gt;women&lt;/a&gt; who recently spoke up against harassment at the hands of a retired  Supreme Court judge also used Facebook and the blogosphere to tell their  stories, ensuring that the real world was actually moved into taking  action. "The social web's biggest comfort is that we are no longer  alone," says Nishant Shah, director, Research at the Centre for Internet  and Society, Bangalore. "No matter what has happened to us, it has  happened to somebody else. The possibility of finding credulous and  empathetic audiences who but share our pain, understand it, and respond  to it is unprecedented." Retweets and comments have often been described  as the digital equivalent of holding hands.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah's pick of web  campaigns that highlighted the problems include Blank Noise which calls  women to talk of small, everyday stories of harassment, the Pink Chaddi  drive and Why We Need Feminism, a web venture across American  universities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason why the net encourages victims of  abuse who might otherwise have stayed quiet to speak out is its  "pseudonymity", as Shah terms it. In societies where there is shame  attached to talking about sexual assault, the online space saves women  from having to put themselves out in the "physical space" while ensuring  that the perpetrator is exposed, he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plus for  social web is that it gets other victims to speak up as well, gathering  force and magnitude in the process. This happened in the instance of the  legal interns. Another instance that surfaced just a month ago was of  two American women science bloggers Danielle Lee and Monica Byrne. When  Lee refused to write a piece for free for Biology Online, she was called  "urban whore" by an enraged editor. She blogged about it and the  ensuing storm over social media got her huge support. After Lee's  expose, Byrne blogged about an acutely sexual conversation a powerful  science writer inflicted on her. The outrage this provoked abated only  after he made amends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an article in Gender and Culture blog project puts it: "( The digital world provided) a &lt;a href="http://timesofindia.indiatimes.com/topic/Forum"&gt;forum&lt;/a&gt; for these victims to document their abuse, and a courtroom where the  abusers have been judged and found guilty by public opinion".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of  course there are problems with the internet's version of justice — it  tends to play judge, jury and executioner with giddy recklessness. In  the Tehelka case, the first questionable moment came when the survivor's  email was tweeted and re-tweeted with no concern for her requests for  anonymity. "The problem with Twitter and Facebook is the incredible and  gross violations of privacy of the survivor. And otherwise responsible  adults join lynch mobs calling either the &lt;a href="http://timesofindia.indiatimes.com/topic/Survivor"&gt;survivor&lt;/a&gt; or the accused names, making ridiculous allegations, desperately  looking for an easy narrative to hang everything on," says author Nisha  Susan, who led the Pink Chaddi campaign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentator Santosh Desai says that it is tough to choose between an  unbridled but powerful social web and one that is cautious and governed  by norms. "Earlier, there were receivers and broadcasters who were few  and governed by licenses and a code of behaviour. Now everyone is a  broadcaster, everyone is a circulator and everyone is an aggregator.  Having no oversight here could be problematic," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Susan says communities need to go beyond social media in such situations. "It should also be a time for us to reflect. On what we would do in such a situation, how we could perhaps prevent it, on the sense of entitlement powerful men have all over the world, on the awful pressures young women face. We should all be reflecting. Instead we are just re-tweeting."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one'&gt;https://cis-india.org/news/the-times-of-india-malini-nair-november-24-2013-when-the-virtual-world-wakes-up-the-real-one&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-11-30T09:35:06Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail">
    <title>Indian government wakes up to risk of Hotmail, Gmail</title>
    <link>https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail</link>
    <description>
        &lt;b&gt;Worried by US spying revelations, India has begun drawing up a new email policy to help secure government communications, but the man responsible for drafting the rules still regularly uses Hotmail.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was originally published by &lt;a class="external-link" href="http://www.google.com/hostednews/afp/article/ALeqM5goPLsuDV0nXQ5To1xWzthPSETXlw?docId=f8f4236f-1218-4fea-bf25-a01a9f50351a"&gt;AFP&lt;/a&gt; on December 7, 2013, was also mirrored by the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2013-12-09/internet/44988376_1_new-email-policy-nsa-official-email"&gt;Times of India&lt;/a&gt;, &lt;a class="external-link" href="http://www.livemint.com/Home-Page/VBuZT9V4A5vsNOcEDuZZfL/India-wakes-up-to-risk-of-Hotmail-Gmail.html"&gt;Livemint&lt;/a&gt;, &lt;a class="external-link" href="http://www.gulf-times.com/india/185/details/374083/govt-wakes-up-to-hotmail,-gmail-risk"&gt;Reuters&lt;/a&gt;, &lt;a class="external-link" href="http://www.dawn.com/news/1061413/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;Dawn&lt;/a&gt;, &lt;a class="external-link" href="http://www.ndtv.com/article/india/indian-government-wakes-up-to-risk-of-hotmail-gmail-455999"&gt;NDTV&lt;/a&gt;, &lt;a class="external-link" href="http://nz.news.yahoo.com/a/-/technology/20216609/indian-government-wakes-up-to-risk-of-hotmail-gmail/"&gt;Yahoo News&lt;/a&gt;, &lt;a class="external-link" href="http://www.themalaysianinsider.com/technology/article/indian-government-wakes-up-to-risk-of-hotmail-gmail"&gt;The Malaysian Insider&lt;/a&gt; and &lt;a class="external-link" href="http://www.digitalone.com.sg/news/article/28250"&gt;Asia One Digital&lt;/a&gt;. A slightly modified version was &lt;a class="external-link" href="http://www.siliconindia.com/news/enterpriseit/Indian-Government-Boots-to-Safe-Mode-After-Gmail-And-Hotmail-Security-Threats--nid-157899-cid-7.html"&gt;published by Silicon India&lt;/a&gt; on December 11. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Like many of his peers in ministries across New Delhi, IT Minister Kapil Sibal's office recently sent an email inviting journalists to the launch of his new personal website using the free email service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others, including senior foreign ministry officials, the information and broadcasting minister and the health ministry secretary, also use Gmail, Hotmail or Yahoo instead of their government accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When asked why he continued to use his Hotmail for official use, Sibal declined to comment, but a senior bureaucrat in his ministry admitted that he personally preferred Gmail because it is "just a lot easier".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We keep moving, get different designations, go different places and with that, our emails change. You lose contacts and important emails, which you don't need to worry about with a Gmail account," the bureaucrat told AFP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To be honest, the quality of our official mail isn't that great yet. It still needs some work," he added on condition of anonymity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IT security expert Sunil Abraham said the use of Gmail and the like was highly risky since the American services had their servers in the US and the National Security Agency has been known to tap into their database systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many state and federal public workers actively use popular email services for office, but some of the estimates are startling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As much as 90 percent of government officials use private email (services) for official use... that's because their official email is not as stable or speedy," said Abraham, executive director of the Bangalore-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In September Sibal's ministry announced a new "Email Policy of the Government of India" in the wake of spying allegations about the NSA revealed by former NSA contractor Edward Snowden.&lt;br /&gt;NSA's tentacles not only crept into the Indian embassy in Washington and its UN office in New York, but also accessed email and chat messenger contact lists of hundreds of millions of ordinary citizens worldwide, according to media reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During a single day last year, the NSA's Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, The Washington Post said, according to an internal NSA presentation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The $11 million Indian project aims to bring some five million public employees onto the government's email domain powered by the National Informatics Centre (NIC) as early as mid-December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is awaiting clearances and suggestions from all ministries before the proposal goes to the cabinet this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;J. Satyanarayana, secretary of the department of electronics and IT, dismissed claims that the policy was too late and was a response to the Snowden scandal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The policy is not a reaction to any global spying revelations, it was already in the works. It is just a mere coincidence that both came around the same time," he said.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Fresh doubts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some cyber security experts say bringing millions aboard a centralised server could make a hacker's job easier, with all critical government information available on a single platform.&lt;br /&gt;More than 11,000 Indian websites were hacked or defaced between May and August this year, with a large number of attacks on the ".in" domain whose servers are in India, the Times of India reported last month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Making the use of a centralised government server is not the best way to proceed. Having everything on one platform makes it even more vulnerable to cyber attacks and hacking," said Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It also brings about new worries of the NIC becoming the local snoop."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some also predict that the ambitious policy would eventually fizzle out for lack of attention from ministers and bureaucrats, who work in government offices where stacks of yellowing files and papers are still a common sight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It's sad but most of these officials don't understand much about technology, so mastering email is something that is miles and miles away," said Vijay Mukhi, a Mumbai-based cyber security expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These guys saw all the snooping news and suddenly they woke up and said 'lets make an email policy'. Enforcing this is not possible on a practical basis."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT ministry also plans to conduct workshops to teach employees about email security such as when to change passwords and user names and how to use email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Every employee should know how, what and when critical data can be vulnerable... with most work still done on paper, it is important to know the nitty-gritty of using email," Satyanarayana said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail'&gt;https://cis-india.org/news/afp-december-7-2013-annie-banerjee-indian-government-wakes-up-to-risk-of-hotmail-gmail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-12-30T04:24:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a">
    <title>Thousands go online against 66A</title>
    <link>https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a</link>
    <description>
        &lt;b&gt;An online petition aimed at amending section 66A of the Information Technology (IT) Act and re-examining internet laws has garnered 3,000 signatures since it began on Tuesday — two days before Kapil Sibal, telecom and IT minister, chairs a meeting with the cyber regulation advisory committee.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Apoorva Dutt was &lt;a class="external-link" href="http://www.dnaindia.com/mumbai/report_thousands-go-online-against-66a_1771070"&gt;published in DNA on November 29, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;An online petition aimed at amending section 66A of the Information Technology (IT) Act and re-examining internet laws has garnered 3,000 signatures since it began on Tuesday — two days before Kapil Sibal, telecom and IT minister, chairs a meeting with the cyber regulation advisory committee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petition, anchored on Change.org, a platform for social initiatives, was started by Bangalore-based advocate Gautam John after two girls were arrested for their Facebook post on imposing a bandh in the city on the day Shiv Sena chief Bal Thackeray was cremated. Following their arrests, Shaheen Dhada has deleted her Facebook account while her friend Rini Srinivasan who merely liked the post has opened a new account on the social networking site. However, she has vowed to refrain from making political statements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;John is blunt about the legislative effect an online petition can have. l Turn to p8.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Honestly, I don’t believe that a petition can change laws, but it gives concerned citizens a platform for documenting their concern in such troubling scenarios. To some extent, this sort of petition can represent a civil society’s point of view. No more can a government authority say ‘only NGOs care about an issue’. Now they know – thousands of ordinary people care,” John said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at the Centre For Internet and Society in Bangalore, points out the flaws in section 66A that have been exploited in cases like the Palghar incident. “Section 66A is very broadly-worded and the punishment (three years imprisonment) is excessive,” he said. “The law was borrowed – that too badly – from a British law. There are many a things greatly flawed in this unconstitutional provision, from the disproportionality of the punishment to the non-existence of the crime. The 2008 amendment to the IT Act was one of eight laws passed in 15 minutes without any debate in the winter session of Parliament.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The petition also aims to organise a meeting of the civil society stakeholders to look into these concerns. A similar meeting was scheduled to be held in August, but it did not take place.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sudarshan Balachandran of Change.org is the lead campaigner and organiser of the petition. He hopes to hand over a copy of the petition to Sibal during the meeting on Thursday. “Sibal has gone on record to say that they will examine the law, and if they feel it doesn’t work, it will be junked. So I am hopeful,” said Balachandran.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a'&gt;https://cis-india.org/news/dnaindia-nov-29-2012-apoorva-dutt-thousands-go-online-against-66a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2012-11-30T06:40:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014">
    <title>FOEX Live: June 8-15, 2014</title>
    <link>https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014</link>
    <description>
        &lt;b&gt;A weekly selection of news on online freedom of expression and digital technology from across India (and some parts of the world). Please email relevant news/cases/incidents to geetha[at]cis-india.org.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Karnataka:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A Hindu rightwing group &lt;/span&gt;&lt;a href="http://www.daijiworld.com/news/news_disp.asp?n_id=241239"&gt;demanded the arrest&lt;/a&gt;&lt;span&gt; of a prominent activist, who during a speech on the much-debated Anti-superstition Bill, made comments that are allegedly blasphemous.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Kerala:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;On June 10, the principal and six students of Government Polytechnic at Kunnamkulam, Thrissur, &lt;/span&gt;&lt;a href="http://indianexpress.com/article/india/india-others/modi-on-negative-faces-list-principal-6-others-booked/"&gt;were arrested&lt;/a&gt;&lt;span&gt; for publishing a photograph of Prime Minister Narendra Modi alongside photographs of Hitler, Osana bin Laden and Ajmal Kasab, under the rubric ‘negative faces’. An FIR was &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/kerala/case-against-principal-students-for-slighting-modi/article6101911.ece?ref=relatedNews"&gt;registered&lt;/a&gt;&lt;span&gt; against them for various offences under the Indian Penal Code including defamation (Section 500), printing or engraving matter known to be defamatory (Section 501), intentional insult with intent to provoke breach of peace (Section 504), and concealing design to commit offence (Section 120) read with Section 34 (acts done by several persons in furtherance of common intention). The principal was later &lt;/span&gt;&lt;a href="http://www.thehindu.com/news/national/kerala/kerala-college-principal-arrested-over-modi-negative-faces-row/article6111575.ece?ref=relatedNews"&gt;released on bail&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a similarly unsettling incident, on June 14, 2014, a &lt;a href="http://www.thehindu.com/news/national/kerala/another-kerala-college-wades-into-modi-row/article6111912.ece?ref=relatedNews"&gt;case was registered&lt;/a&gt; against the principal and 11 students of Sree Krishna College, Guruvayur, for using “objectionable and unsavoury” language in a crossword in relation to PM Narendra Modi, Rahul Gandhi, Shashi Tharoor, etc. Those arrested were later &lt;a href="http://www.thehindu.com/news/national/kerala/nine-students-arrested-in-kerala-for-antimodi-remarks-in-campus-magazine/article6116911.ece?homepage=true&amp;amp;utm_source=Most%20Popular&amp;amp;utm_medium=Homepage&amp;amp;utm_campaign=Widget%20Promo"&gt;released on bail&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Maharashtra:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Facebook posts involving objectionable images of Dr. B.R. Ambedkar led to &lt;a href="http://www.thehindu.com/news/facebook-post-on-ambedkar-sparks-violence-in-mharashtra/article6096766.ece"&gt;arson and vandalism in Pune&lt;/a&gt;. Police have sought details of the originating IP address from Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A Pune-based entrepreneur &lt;a href="http://www.ndtv.com/article/cities/new-facebook-group-to-block-offensive-posts-against-religious-figures-542189"&gt;has set up&lt;/a&gt; a Facebook group to block ‘offensive’ posts against religious leaders. The Social Peace Force will use Facebook’s ‘Report Spam’ option to take-down of ‘offensive’ material.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deputy Chief Minister Ajit Pawar &lt;a href="http://indianexpress.com/article/india/india-others/maharashtra-deputy-cm-says-ban-social-media-retracts/"&gt;suggested&lt;/a&gt; a ban on social media in India, and retracted his statement post-haste.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Punjab:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A bailable warrant &lt;a href="http://www.hindustantimes.com/punjab/chandigarh/warrants-against-singer-kailash-kher-for-hurting-religious-sentiments/article1-1227795.aspx"&gt;was issued&lt;/a&gt; against singer Kailash Kher for failing to appear in court in relation to a case. The singer is alleged to have hurt religious sentiments of the Hindu community in a song, and a case registered under Sections 295A and 298, Indian Penal Code.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Uttar Pradesh:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The presence of a photograph on Facebook, in which an accused in a murder case is found posing with an illegal firearm, resulted in a &lt;a href="http://www.firstpost.com/india/up-murder-accused-booked-for-posing-on-facebook-with-illegal-gun-1567323.html"&gt;case being registered&lt;/a&gt; against him under the IT Act.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;News &amp;amp; Opinion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Authors, civil society activists and other concerned citizens &lt;a href="http://www.financialexpress.com/news/civil-society-activists-flay-narendra-modi-pmos-silence-on-attacks-on-dissent/1258143"&gt;issued a joint statement&lt;/a&gt; questioning Prime Minister Modi’s silence over arrests and attacks on exercise of free speech and dissent. Signatories include Aruna Roy, Romila Thapar, Baba Adhav, Vivan Sundaram, Mrinal Pande, Jean Dreze, Jayati Ghosh, Anand Pathwardhan and Mallika Sarabhai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response to Mumbai police’s decision to take action against those who ‘like’ objectionable or offensive content on Facebook, experts say the &lt;a href="http://indianexpress.com/article/cities/mumbai/freedom-to-like-shareany-content-a-fundamental-right-experts/"&gt;freedom to ‘like’ or ‘share’&lt;/a&gt; posts or tweets is fundamental to freedom of expression. India’s defamation laws for print and the Internet need harmonization, moreover.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While supporting freedom of expression, Minister for Information and Broadcasting Prakash Javadekar cautioned &lt;a href="http://www.mizonews.net/nation/no-compromise-on-press-freedom-but-practice-self-restraint-javadekar/"&gt;the press&lt;/a&gt; and &lt;a href="http://articles.economictimes.indiatimes.com/2014-06-09/news/50448166_1_facebook-post-prakash-javadekar-speech"&gt;all users of social media&lt;/a&gt; that the press and social media should be used responsibly for unity and peace. The Minister has also &lt;a href="http://blogs.reuters.com/faithworld/2014/06/09/indian-govt-vows-to-uphold-free-speech-after-hindu-book-withdrawal/"&gt;spoken out&lt;/a&gt; in favour of free publication, in light of recent legal action against academic work and other books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Infosys, India’s leading IT company, &lt;a href="http://www.thehindu.com/news/national/infosys-slaps-defamation-notice-on-three-newspapers/article6098717.ece"&gt;served defamation notices&lt;/a&gt; on the &lt;i&gt;Economic Times&lt;/i&gt;, the &lt;i&gt;Times of India &lt;/i&gt;and the Financial Express, for “loss and reputation and goodwill due to circulation of defamatory articles”. Removal of articles and an unconditional apology were sought, and Infosys claimed damages amounting to Rs. 2000 crore. On a related note, Dr. Ashok Prasad &lt;a href="http://www.newslaundry.com/2014/06/09/arresting-the-slander/"&gt;argues&lt;/a&gt; that criminal defamation is a violation of freedom of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Drawing on examples from the last 3 years, Ritika Katyal &lt;a href="http://southasia.foreignpolicy.com/posts/2014/06/11/warning_bells_for_freedom_of_expression_in_modi_s_india"&gt;analyses&lt;/a&gt; India’s increasing violence and legal action against dissent and hurt sentiment, and concludes that Prime Minister Narendra Modi has both the responsibility and ability to “&lt;i&gt;rein in Hindu hardliners&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discretionary powers resting with the police under the vaguely and broadly drafted Section 66A, Information Technology Act, are dangerous and unconstitutional, &lt;a href="http://indiatogether.org/articles/freedom-of-speech-on-internet-section-66a-laws"&gt;say experts&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Providing an alternative view, the &lt;i&gt;Hindustan Times &lt;/i&gt;&lt;a href="http://www.hindustantimes.com/comment/efficient-policing-is-the-best-way-to-check-cyber-crimes/article1-1228163.aspx"&gt;comments&lt;/a&gt; that the police ought to “&lt;i&gt;pull up their socks&lt;/i&gt;” and understand the social media in order to effectively police objectionable and offensive content on the Internet.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Keeping Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indconlawphil’s &lt;a href="http://indconlawphil.wordpress.com/free-speech-watch/"&gt;Free Speech Watch&lt;/a&gt; keeps track of violations of freedom of expression in India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014'&gt;https://cis-india.org/internet-governance/blog/foex-live-june-8-15-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>FOEX Live</dc:subject>
    
    
        <dc:subject>Section 66A</dc:subject>
    

   <dc:date>2014-06-16T10:22:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951">
    <title>Reply to RTI Application on Blocking of website and Rule 419A of Indian Telegraph Rules, 1951</title>
    <link>https://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951</link>
    <description>
        &lt;b&gt;The Department of Telecommunications sent its reply to an RTI application from the Centre for Internet and Society. The application was sent on December 27, 2012 with reference to blocking of websites and Rule 419A of the Indian Telegraph Rules, 1951.&lt;/b&gt;
        &lt;p style="text-align: left; "&gt;To&lt;br /&gt;Shri Subodh Saxena&lt;br /&gt;Central Public Information Officer (RTI)&lt;br /&gt;Director (DS-II), Room No 1006, Sanchar Bhawan&lt;br /&gt;Department of Télécommunications (DoT)&lt;br /&gt;Ministry of Communications and Information Technology&lt;br /&gt;20, Ashoka Road, New Delhi — 110001&lt;br /&gt;&lt;br /&gt;Dear Sir,&lt;br /&gt;&lt;b&gt;Subject: Information on Website Blocking Requested under the Right to Information Act, 2005&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1. Full Name of the Applicant: Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;p&gt;2. Address of the Applicant&lt;/p&gt;
&lt;p&gt;Mailing Address: Centre for Internet and Society&lt;br /&gt;194, 2־C Cross,&lt;br /&gt;Domlur Stage II,&lt;br /&gt;Bangalore 560071&lt;/p&gt;
&lt;p&gt;3. Details of the information required&lt;/p&gt;
&lt;p class="Bodytext1" style="text-align: justify; "&gt;It  has come to our attention that Airtel Broadband Services ("Airtel") and  Mahanagar Téléphoné Nigam Limited ("MTNL") have recently blocked access  to a number of domain sites for all their users across the country.  Airtel has blocked Fabulous Domains (&lt;a href="http://www.fabulous.com/"&gt;http://www.fabulous.com/&lt;/a&gt;), BuyDomains (&lt;a href="http://www.buvdomains.com/"&gt;http://www.buvdomains.com/&lt;/a&gt;) and Sedo (&lt;a href="http://sedo.co.uk/uk/home/welcome/%29%e2%96%a0"&gt;http://sedo.co.uk/uk/home/welcome/)&lt;/a&gt;. MTNL has blocked Sedo (&lt;a href="http://sedo.co.uk/uk/home/welcQme/"&gt;http://sedo.co.uk/uk/home/welcQme/&lt;/a&gt;).  Subscribers trying to access this website receive a message noting  "This website/URL has been blocked until further notice either pursuant  to Court orders or on the Directions issued by the Department of  Télécommunications". In this regard, we request information on the  following queries under Section 6(1) of the Right to Information Act,  2005:&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Does  the Department have powers to require an Internet Service Provider to  block a website? If so, please provide a citation of the statute under  which power is granted to the Department, as well as the safeguards  prescribed to be in accordance with Article 19(1)(a) of the Constitution  of India.&lt;/li&gt;
&lt;li&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Did  the Department order Airtel or MTNL to block any or all of the above  mentioned websites? If so, please provide a copy of such order or  orders. If not, what action, if at all, has been taken by the Department  against Airtel and MTNL for blocking of websites?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Has  the Department ever ordered the blocking of any website? If so, please  provide a list of addresses of all the websites that have been ordered  to be blocked.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide use the present composition of the Committee constituted under rule 419A of the Indian Telegraph Rules, 1951.&lt;/li&gt;
&lt;li&gt;Please  provide us the dates and copies of the minutes of all meetings held by  the Committee constituted under rule 419A of the Indian Telegraph Rules,  1951, and copies of all their recommendations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;4. Years to which the above requests pertain: 2012&lt;/p&gt;
&lt;p&gt;5. Designation and address of the PIO from whom the information is required&lt;/p&gt;
&lt;p&gt;Shri Subodh Saxena&lt;br /&gt;Central Public Information Officer (RTI)&lt;br /&gt;Director (DS-II), Room No 1006, Sanchar Bhawan&lt;br /&gt;Department of Télécommunications (DoT)&lt;br /&gt;Ministry of Communications and Information Technology&lt;br /&gt;20, Ashoka Road, New Delhi — 110001&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the best of my belief, the détails sought for fall within your authority. Further, as provided under section 6(3) of the Right to Information Act ("RTI Act"), in case this application does not fall within your authority, I request you to transfer the same in the designated time (5 days) to the concerned authority and inform me of the same immediately.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the best of my knowledge the information sought does not fall within the restrictions contained in section 8 and 9 of the RTI Act, and any provision protecting such information in any other law for the time being in force is inapplicable due to section 22 of the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please provide me this information in electronic form, via the e-mail address provided above. This to certify that I, Smitha Krishna Prasad, am a citizen of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A fee of Rs. 10/- (Rupees Ten Only) has been made out in the form of a demand draft drawn in favour of "Pay and Accounts Officer (HQ), Department of Telecom" payable at New Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Date. Monday November 26,2012&lt;br /&gt;Place: Bengaluru, Karnataka&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: left; "&gt;&lt;b&gt;Below is the reply received from the Department of Telecommunications for the above RTI application&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;Government of India &lt;br /&gt;Department of Télécommunications&lt;br /&gt;Sanchar Bhawan, 20, Ashoka Road. New Delhi -110 001 &lt;br /&gt;(DS-CelI)&lt;/b&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th colspan="6"&gt;No. DIR(DS-II)/RTI/2009&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th colspan="7"&gt;Dated:ll/01/2013&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;To,&lt;br /&gt;Centre for Internet and Society,&lt;br /&gt;No. 194, 2-C Cross,&lt;br /&gt;Domlur Stage II,&lt;br /&gt;Bangalore - 560 071&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This has reference to RTI application dated 27/12/2012 with reference to Blocking of website and Rule 419A of Indian Telegraph Rules, 1951&lt;/p&gt;
&lt;ol&gt;&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In this regard it is submitted that Internet Service licensees are to follow the provisions of Information Technology Act 2000 as amended from time to time. Under Information Technology Act 2000, "&lt;b&gt;Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules 2009&lt;/b&gt;" were notified on 27/10/2009.(Annexure) Aforesaid notified rules describes the "&lt;b&gt;Designated Officer&lt;/b&gt;" for the purpose of issuing direction for blocking for access by the public any information generated, transmitted, received, stored or hosted in any computer resource under subsection (2) of Section 69(A) of the ACT. Wide Gazette Notification dated 20/01/2010 &lt;b&gt;Group Coordinator , Cyber Law division, Department of Information Technology&lt;/b&gt; has been authorized and designated as "&lt;b&gt;Designated Officer&lt;/b&gt;".&lt;br /&gt;&lt;br /&gt;As per the directions of Group Coordinator, Cyber Law division, under Information Technology Act 2000, instructions for blocking/ unblocking of websites/URLs are issued to Internet Service Licensees.&lt;br /&gt;&lt;br /&gt;As per the available information no instruction to Internet Service Providers has been issued for Blocking of &lt;a href="http://www.fabulous.com/"&gt;http://www.fabulous.com/&lt;/a&gt;, &lt;a href="http://www.buydomains.com/"&gt;http://www.buydomains.com/&lt;/a&gt;, &lt;a href="http://sedo.co.uk/uk/home/welcome/"&gt;http://sedo.co.uk/uk/home/welcome/&lt;/a&gt; and &lt;a href="http://sedo.co.uk/uk/home/welcome/"&gt;http://sedo.co.uk/uk/home/welcome/&lt;/a&gt; as mentioned in your RTI application.&lt;br /&gt;&lt;br /&gt;Copies of Blocking order for which blocking instructions issued by DoT are not being provided are not provided as per Clause 16 of "Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules 2009" which says "Strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof."&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;With reference to information (Para 4 &amp;amp; 5 of RTI Aplication ) on Rule 419A of Indian Telegraph Rule, 1951 , the RTI is being forwarded to Dir (AS-III) &amp;amp; CPIO, DoT for providing the information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The appeal, it any, may be made before Shri Nitin Jain, DDG(DS) &amp;amp; Appellate Authority, Department of Télécommunications, Room No. 1201, Sanchar Bhawan, 20 Ashoka Road, Nevy Delhi-110 001 within 30 days from the date of receipt of this letter.&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p class="Bodytext41"&gt;Encl: As above&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Subodh.png" alt="Subodh" class="image-inline" title="Subodh" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td colspan="7"&gt;(Subodh Saxena) &lt;br /&gt; DIR (DS-II)&lt;br /&gt; 011-2303 6860&lt;br /&gt; 011-2335 9454&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Copy to:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(I) Shri Rajiv Kumar, CPIO &amp;amp; Director (AS-III), DoT, New Delhi&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: center; "&gt;NOTIFICATION&lt;br /&gt;New Delhi, the 27th October, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;G.S.R. 781 (E). — In exercise of the powers conferred by clause (z) of sub-section (2) of section 87, read with sub-section (2) of section 69A of the Information Technology Act 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Short title and commencement — (1) These rules may be called the Information Technology (Procedure and Safeguards for Blocking for Access and Information by Public) Rules, 2009.&lt;br /&gt;(2) They shall come into force on the date of their publication in the Official Gazette.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Definitions. — In these rules, unless the context otherwise requires. —&lt;br /&gt;(a) "Act" means the Information Technology Act, 2000 (21 of 2000);&lt;br /&gt;(b) "computer resource" means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;br /&gt;(c) "Designated Officer" means an officer designated as Designated Officer under rule 3;&lt;br /&gt;(d) "Form" means a form appended to these rules;&lt;br /&gt;(e) "intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;&lt;br /&gt;(f) "nodal officer" means the nodal officer designated as such under rule 4;&lt;br /&gt;(g) "organisation" means&lt;br /&gt; (i) Ministries or Departments of the Government of India;&lt;br /&gt; (ii) State Governments and Union Territories;&lt;br /&gt; (iii) Any agency of the Central Government, as may be notified in the Official Gazette, by the Central             Government&lt;br /&gt;(h) "request" means the request for blocking of access by the public any information generated, transmitted,   received, stored or hosted in any computer resource;&lt;br /&gt;(i) "Review Committee" means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Designated Officer — The Central Government shall designate by notification in Official Gazette, an officer of the Central Government not below the rank of a Joint Secretary, as the "Designated Officer", for the purpose of issuing direction for blocking for access by the public any information generated, transmitted. received,, stored or hosted in any computer resource under sub-section (2) of section 69A of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nodal officer or organisation.— Every organisation for the purpose of these rules, shall designate one of its officer as the Nodal Officer and shall intimate the same to the Central Government in the Department of Information Technology under the Ministry of Communications and Information Technotogy, Government of India and also publish the name of the said Nodal Officer on their website.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Direction by Designated Officer. — The Designated Officer may, on receipt of any request from the Nodal Officer of an organisation or a competent court, by order direct any Agency of the Government or intermediary to block for access by the public any information or part thereof generated, transmitted, received, stored or hosted in any computer resource for any of the reasons specified in sub-section (1) of section 69A of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Forwarding of requests by organisation. — (1) Any person may send their complaint to the Nodal Officer of the concerned organisation for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource:&lt;br /&gt; Provided that any request other than the one from the Nodal Officer of the organisation shall be sent with the approval of the Chief Secretary of the concerned State or Union territory to the Designated Officer.&lt;br /&gt; Provided further that in case a Union territory has no Chief Secretary, then, such request may be approved by the Adviser to the Administrator of that Union territory.&lt;br /&gt;(2) The organisation shall examine the complaint received under sub-rule (1) to satisfy themselves about the need for taking of action in relation to the reasons enumerated in sub-section (1) of section 69A of the Act and after being satisfied, it shall send the request through its Nodal Officer to the Designated Officer in the format specified in the Form appended to these rules.&lt;br /&gt;(3) The Designated Officer shall not entertain any complaint or request for blocking of information directly from any person.&lt;br /&gt;(4) The request shall be in writing on the letter head of the respective organisation, complete in all respects and may be sent either by mail or by fax or by e-mail signed with electronic signature of the Nodal Officer.&lt;br /&gt; Provided that in case the request is sent by fax or by e-mail which is not signed with electronic signature, the Nodal Officer shall provide a signed copy of the request so as to reach the Designated Officer within a period of three days of receipt of the request by such fax or e-mail.&lt;br /&gt;(5) On receipt, each request shall be assigned a number along with the date and time of its receipt by the Designated Officer and he shall acknowledge the receipt thereof to the Nodal Officer within a period of twenty four hours of its receipt.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Committee for examinatlon of request.— The request along with the printed sample content of the alleged offending information or part thereof shall be examined by a committee consisting of the Designated Officer as its chairperson and representatives, not below the rank of Joint Secretary in Ministries of Law and Justice, Home Affairs. Information and Broadcasting and the Indian Computer Emergency Response Team appointed under sub-section (1) of section 70B of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Examination of request.— (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the informalion or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications, if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary.&lt;br /&gt;(2) In case of non-appearance of such person or intermediary, who has been served with the notice under sub-rule (I), before the committee on such specified date and time, the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.&lt;br /&gt;(3) In case, such a person or intermediary, who has been served with the notice under sub-rule (1), is a foreign entity or body corporate as identified by the Designated Officer, notice shall be sent by way of letters or fax or e-mail signed with electronic signatures to such foreign entity or body corporate and any such foreign entity or body corporate shall respond to such a notice within the time specified therein, failing which the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.&lt;br /&gt;(4) The committee referred to in rule 7 shall examine the request and printed sample information and consider whether the request is covered within the scope of sub-section (1) of section 69A of the Act and that it is justifiable to block such information or part thereof and shall give specific recommendation in writing with respect to the request received from the Nodal Officer.&lt;br /&gt;(5) The designated Officer shall submit the recommendation of the committee, in respect of the request for blocking of information along with the details sent by the Nodal Officer to the Secretary in the Department of Information Technology under the Ministry of Communications and Information Technology, Government of India (hereinafter referred to as the "Secretary, Department of Information Technology").&lt;br /&gt;(6) The Designated Officer, on approval of the request by the Secretary, Department of Information Technology, shall direct any agency of the Government or the intermediary to block the offending information generaled, transmitted, received, stored or hosted in their computer resource for public access within time limit specified in the direction:&lt;br /&gt; Provided that in case the request of the Nodal Officer is not approved by the Secretary, Department of Information Technology, the Designated Officer shall convey the same to such Nodal Officer.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Blocking of Information in cases of emergency.— (1) Notwithstanding anything contained in rules 7 and 8, the Designated Officer, in any case of emergency nature, for which no delay is acceptable, shall examine the request and printed sample information and consider whether the request is within the scope of sub-section (1) of section 69A of the Act and it is necessary or expedient and justifiable to block such information or part thereof and submit the request with specific recommendations in writing to Secretary, Department of Information Technology.&lt;br /&gt;(2) In a case of emergency nature, tne Secretary. Department of Information Technology may, if he is satisfied that it is necessary or expedent and justifiable for blocking for public access of any information or part thereof through any computer resource and after recording reasons in writing as an interim measure issue such directions as he may consider necessary to such identified or identifiable persons or intermediary in control of such computer resource hosting such information or part thereof without giving him an opportunity of hearing.&lt;br /&gt;(3) The Designated Officer, at ihe earliest but not later than forty-eight hours of issue of direction under sub-rule 2, shall bring the request before the committee referred to in rule 7 for its consideration and recommendation.&lt;br /&gt;(4)    On receipt of recommendations of committee, Secretary, Department of Information Technology, shall pass the final order as regard to approval of such request and in case the request for blocking is not approved by the Secretary. Department of Information Technology in his final order, the interim direction issued under sub-rule (2) shall be revoked and the person or intermediary in control of such information shall be accordingly directed to unblock the information for public access.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Process of order of court for blocking of Information — In case of an order from a competent court in India for blocking of any information or part thereof generated, transmitted, received, stored or hosted in a computer resource, the Designated Officer shall, immediately on receipt of certified copy of the court order, submit it to the Secretary, Department of Information Technology and initiate action as directed by the court.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Expeditious disposal of request - The request received from the Nodal Officer shall be decided expeditiously which in no case shall be more than seven working days from the date of receipt of the request.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Action for non-compliance of direction by Intermediary — In case the intermediary fails to comply with the direction issued to him under rule 9, the Designated Officer shall, with the prior approval of the Secretary, Department of Information Technology, initiate appropriate action as may be required to comply with the provisions of sub-section (3) of section 69A of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Intermediary to designate one person to receive and handle directions — (1) Every intermediary shall designate at least one person to receive and handle the directions for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource under these rules.&lt;br /&gt;(2) The designated person of the intermediary shall acknowledge receipt of the directions to the Designated Officer within two hours on receipt of the direction through acknowledgement letter or fax or e-mail signed with electronic signature.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Meeting of Review Commlttee — The Review Committee shall meet at least once in two months and record its findings whether the directions issued under these rules are in accordance with the provisions of sub-seclion (1) of section 69A of the Act and if is of the opinion that the directions are not in accordance with the provisions referred above, it may set aside the directions and issue order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maintenance of records by Designated Officer — The Designated Officer shall maintain complete record of the request received and action taken thereof, in electronic database and also in register of the cases of blocking for public access of the information generated, transmitted, received, stored or hosted in a computer resource.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Requests and complaints to be confidential — Strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;FORM&lt;/b&gt;&lt;br /&gt;(See rule 6(2))&lt;/p&gt;
&lt;p style="text-align: left; "&gt;&lt;b&gt; A. Complaint &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Name of the complainant: --_________________________________________________________________&lt;br /&gt;(Person who has sent the complaint to the Ministry/Department/State Govt./Nodal Officer)&lt;/li&gt;
&lt;li&gt;Address: ________________________________________________________________________________&lt;br /&gt; ________________________________________________________________________________&lt;br /&gt; City: ______________________________                                   Pin Code: __________________&lt;/li&gt;
&lt;li&gt;Telephone: ________________________ (prefix STD code) &lt;/li&gt;
&lt;li&gt;Fax (if any): _______________________&lt;/li&gt;
&lt;li&gt;Mobile (if any): ______________________&lt;/li&gt;
&lt;li&gt;Email (if any): __________________________________&lt;br /&gt;&lt;br /&gt;&lt;b&gt;B. Details of website/computer resource/intermediary/offending information hosted on the website &lt;/b&gt;&lt;br /&gt;(Please give details wherever known)&lt;/li&gt;
&lt;li&gt;URL / web address: ____________________________________&lt;/li&gt;
&lt;li&gt;IP Address: _______________________________________&lt;/li&gt;
&lt;li&gt;Hyperlink: ________________________________________&lt;/li&gt;
&lt;li&gt;Server/Proxy Server address: ________________________________________&lt;/li&gt;
&lt;li&gt;Name of the Intermediary: _________________________________________&lt;/li&gt;
&lt;li&gt;URL of the Intermediary: __________________________________________&lt;br /&gt;(Please attach screenshot/printout of the offending information)&lt;/li&gt;
&lt;li&gt;Address or location of intermediary in case the intermediary is telecom service provider, network service provider, internet service provider, web-hosting service provider and cyber cafe or other form of intermediary for which information under points (7), (8), (9), (10), (11) and (12) are not available.&lt;br /&gt;___________________________________________________________&lt;br /&gt;___________________________________________________________&lt;br /&gt;___________________________________________________________&lt;br /&gt;&lt;b&gt;C. Details of Request for blocking&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Recommendations/Comments of the Ministry/State Govt: ________________________&lt;br /&gt;________________________________________________________________________&lt;br /&gt;________________________________________________________________________&lt;/li&gt;
&lt;li&gt;The level at which the comments/recommendation have been approved &lt;br /&gt;(Please specify designation) ________________________________________________&lt;/li&gt;
&lt;li&gt;Have the complaint been examined in Ministry / State Government: Y/N&lt;/li&gt;
&lt;li&gt;If yes, under which of the following reasons it falls (please tick):&lt;br /&gt;(i) Interest of sovereignty or integrity of India&lt;br /&gt;(ii) Defence of India&lt;br /&gt;(iii) Security of the State&lt;br /&gt;(iv) Friendly relations with foreign states&lt;br /&gt;(v) Public order&lt;br /&gt;(vi) For preventing incitement to the commission of any cognisable offence relating to above&lt;br /&gt;&lt;b&gt;D. Details of the Nodal Officer, forwarding the complaint along with recommendation of the Ministry/State Govt&lt;/b&gt;. &lt;b&gt;and related enclosures&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Name of the Nodal Officer: ___________________________________________&lt;/li&gt;
&lt;li&gt;Designation: ______________________________________________________&lt;/li&gt;
&lt;li&gt;Organisation: _____________________________________________________&lt;/li&gt;
&lt;li&gt;Address: ________________________________________________ _________&lt;br /&gt; &lt;br /&gt; __________________________________________________________&lt;br /&gt;&lt;br /&gt; City: __________________________   Pin Code: _________________&lt;/li&gt;
&lt;li&gt;Telephone: ___________________________ (prefix STD code) &lt;/li&gt;
&lt;li&gt;Fax (if any) _____________________&lt;/li&gt;
&lt;li&gt;Mobile (if any) ______________________&lt;/li&gt;
&lt;li&gt;Email (if any): ___________________________&lt;br /&gt;&lt;b&gt;E: Any other information:&lt;/b&gt;&lt;br /&gt;F: Enclosures:             
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Place&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;Signature&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;[No. 9(16)J2004-EC]&lt;br /&gt;N. RAVI SHANKER, Jt. Secy&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;3855GI/09-5 &lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951'&gt;https://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-21T07:58:12Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook">
    <title>India’s ballot battle will also run through Facebook</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook</link>
    <description>
        &lt;b&gt;Facebook on Tuesday launched its widely awaited “election tracker” for the upcoming general elections, a move that signals the growing importance of social media as a political tool in a rapidly urbanizing India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/india-s-ballot-battle-will-also-run-through-facebook/article1-1190947.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on March 4, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;India’s 2014 ballot battle will run through the social-media world, which could likely influence electoral outcomes by swinging 3-4% votes, as more and more young Indians go online to make sense of politics, according to two new surveys.&lt;br /&gt; &lt;br /&gt;In these mostly urbanising seats, social-media usage is now “sufficiently widespread” to influence politics, according to the Internet and Mobile Association of India (IAMAI). An offline study conducted by market research firm TNS and Google India suggested similar shifts.&lt;br /&gt; &lt;br /&gt;The Facebook tracker (&lt;a href="http://on.fb.me/1g6ZJ3k"&gt;http://on.fb.me/1g6ZJ3k&lt;/a&gt;) will help India’s 93 million Facebook users to see which parties and candidates as well as issues are trending.&lt;br /&gt; &lt;br /&gt;Social-media platforms are likely to be influential in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, according to the IAMAI survey.&lt;br /&gt; &lt;br /&gt;These are constituencies where 10% of the voting population uses social media sites such as Facebook, or where the number of social media users is higher than the winning candidate’s margin of victory at the last election.&lt;br /&gt; &lt;br /&gt;Research shows that social media is more persuasive than television ads. Nearly 100 million Indians, or more than Germany’s population, use the Internet each day. Of this, 40 million have assured broadband, the ones most likely to have at least one social media account.&lt;br /&gt; &lt;br /&gt;“Unlike Obama who used social media directly for votes, Indian politicians have tended to use it more to mould public discourse,” says Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;br /&gt; &lt;br /&gt;“I think these trends are over-hyped and the impact, if any, would only be marginal,” said Communist Party of India MP, Gurudas Dasgupta, who created a Facebook account only last month.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook'&gt;https://cis-india.org/news/hindustan-times-zia-haq-march-4-2014-india-s-ballot-battle-will-also-run-through-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-05T11:49:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
