<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2831 to 2845.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/notices/second-expert-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-watchmen"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/networking-better-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/failed-uk-nir-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-matters-ahmedabad"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/ian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/muzzling-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/battle-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/catch-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cause-and-effect"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/govt-proposal"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/anti-social-network"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/online-censorship"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services">
    <title>The Draft Electronic Delivery of Services Bill, 2011 – Comments by CIS</title>
    <link>https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services</link>
    <description>
        &lt;b&gt;The Draft Electronic Delivery of Services Bill, 2011 (“Bill”) is a Bill to provide for delivery of government services manadatorily through electronic means by phasing out manual delivery of services. It is heartening to note that the Bill shifts the approach to electronic delivery of services by Government agencies to one as part of the citizens' right to service delivery through electronic means rather than a luxury or benefit doled out by the Government. The Bill introduces bodies exclusively accountable for ensuring that electronic delivery of services by the Government at the state and central levels. While this is a welcome move on the part of the Government there are a few comments we, at the Centre for Internet and Society, have on the present version of the Bill:&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;Accessibility&lt;br /&gt;The Bill does not make it mandatory for all 
Government services to be accessible to all including persons with 
disabilities. The Bill refers to the term “access”, as defined in 
Section 2(1)(a) from the prespective of merely gaining physical access 
to the services or availability of such services1 rather than from the 
perspective of catering to the ability of a person with print (or other)
 disbilities from gaining access to the services in the normal format. 
It is very important that the electronic services are delivered in a 
format which is accessible to all persons including persons with 
disbilities, elderly persons etc. It should be mandatory for the 
Government to comply with Web Content Accessibility Guidelines (WCAG) 
and National Informatics Centre (NIC) guidelines for web accessibility. 
It is also important to ensure accessibility of all documents produced 
during service delivery by Government agencies.&lt;/li&gt;&lt;li&gt;Linguistic Accessibility&amp;nbsp;&lt;br /&gt;Section
 5(2)(b) of the Bill requires the Government to prescribe a framework 
for all its agencies to ensure web presence or enablement which refers 
to rendering electronic services in the language chosen by the user. In 
pursuance of the same, it is important for delivery of services to be 
available in all national languages of India to begin with in addition 
to the content being encoded in Unicode font for all languages. It is 
important to note that there are not many open fonts available for 
Indian languages. Hence, it must be ensured that the Government 
allocates sufficient funds to ensure linguistic accessbility of the 
services delivered, while ensuring implementation of the provisions of 
the Bill.&lt;/li&gt;&lt;li&gt;Public Scrutiny&amp;nbsp;&lt;br /&gt;In order to ensure transparency of
 Government services and process of service delivery, it is essential 
that the Bill incorporates a provision to enable citizens to gain access
 to information provided by the Government as part of the service 
delivery process unless disclosing such information would amount to 
violation of any applicable law. Similarly, provision should be made for
 making public all RTI applications filed with the Government and 
responses to them.&lt;/li&gt;&lt;li&gt;Use of Free and Open Source Software&lt;br /&gt;Considering
 that electronic service delivery by Government agencies is effected 
through public money, it is important that Governments are urged to use 
Free and Open Source Software (FOSS) for service delivery. This cuts 
costs to a great extent and also make the process more transparent and 
capable of customisation to varied needs of different departments. It is
 important to insert a provision requiring the Government to use FOSS as
 far as possible and in the event of any use of proprietary software, 
the Government should clearly explain the reason for such use, the costs
 incurred for the same, the additional benefit derived out of its use 
and other relevant details.&lt;/li&gt;&lt;li&gt;Open Standards&lt;br /&gt;The Bill must 
stress on use of open standards for all computer resources and service 
delivery systems by Government agencies. As is the case with FOSS, such 
use brings down operation costs drastically and makes the service 
delivery process transparent and available for all to use. Use of ODF 
formats for documents, HTML for websites, ISA standards for hardware is 
recommended. It is also useful to ensure compliance with W3C guidelines 
by the concerned Government departments during implementation of the 
Bill.&lt;/li&gt;&lt;li&gt;Whistleblower Exception&lt;br /&gt;The Bill does not contain any 
safeguards to ensure free and fearless disclosure of any wilful 
violation of the law impacting larger public interest. It is important 
to include a provision protecting any person exposing any violation of 
the provisions of the Bill or blowing the cover off any scam or 
farudulent activity decieving the public committed by service providers 
under the Bill. Such protection can be given by ensuring that the 
actions of such whistleblower, to the extent required for the exposure, 
does not constitute an offence under the provisions of the Bill.&lt;/li&gt;&lt;li&gt;Penalties for Offences&lt;br /&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;Chapter 4 of the Bill gives a 
detailed list of acts constituting an offence under the Act including 
Section 15 which specifically relates to offences by companies. It is 
critical to ensure that the punishment and penalities for offences 
extend not only to citizens and companies but also to Government 
officials who misuse information they are&amp;nbsp;privy to under the provisions 
of the Bill. In fact, a separate provision specifically applicable to 
the various offences which could be committed by Government officials 
under the Bill can reduce misuse of its provisions by the Government.&lt;/li&gt;&lt;li&gt;It
 is to be noted that several provisions listed under Chapter 4 of the 
Bill covering offences and penalties are a reproduction of the 
provisions for the same under the Information Technology Act, 2000 (“IT 
Act”). Such reprodution is unnecessary and acts which are already deemed
 to be offences and have punishments prescribed for them under the IT 
Act (or any other legislation for the time being in force in India) need
 not be covered again in the Bill. This will avoid duplication and 
confusion in the legislations.&lt;/li&gt;&lt;li&gt;Section 19(1) of the Bill 
provides that no alleged offence under the Bill can be tried in a court 
of law unless the Central Electronic Delivery of Services Commissioner 
(“Central Commissioner”) or the State Electronic Delivery of Services 
Commissioner (“State Commissioner”) authorises the same by issuing a 
complaint in this regard to the relevant court. This provision directly 
conflicts with a citizen's constitutional right to seek legal redress 
since it takes away his freedom to approach a court of law for redressal
 of his grievance without the permission of the Commissioners. It is 
recommended that the provision be either deleted or suitably modify so 
that it is not in violation of this constitutional right.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;Bottoms up Approach&lt;br /&gt;A decentralised approach should be 
adopted along the lines of the Panchayati Raj system giving the citizen a
 greater say in the framework and implementation of service delivery by 
Government agencies. Implementation can be at the Panchayat and District
 levels apart from State levels. Citizens must be able to access and 
update their information. Furthermore, they should be able to define to a
 certain extent, access control to their information. This will 
automatically make them eligible or ineligible for various government 
services.&amp;nbsp;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Charges for service delivery&lt;br /&gt;Section 4 
of the Bill authorises the Government to allow service providers to 
collect charges for electronic service delivery while Section 3(2) 
provides for the Government to regulate the manner and method of payment
 of such charges. It is critical to ensure that such charges levied 
under the provisions of the Bill do not exceed the charges levied by the
 Government agency for manual delivery of services. Charges for manual 
service delivery may include charges for photocopy, printing, paper, 
postage etc., all of which are totally eliminated during service 
delivery through electronic means. Thus, levying the same charges, let 
alone greater charges for electronic service delivery is totally 
unnecessary and places an additional burden on the citizen ultimately 
defeating the very purpose of the Bill.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Security in payment of charges&lt;br /&gt;Section
 3(2) of the Bill provides for the Government to regulate the manner and
 method of payment of charges for delivery of services.It is important 
that each transaction that takes place is done securely and without the 
exposure of an individuals confidential details. There are many ways to 
structure the transaction of payment of fees to achieve this goal. We 
reccommend that the SCOSTA smart card structure is used for completing 
and processing a transaction.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Data Security and Privacy&lt;br /&gt;Section
 5(1)(e) of the Bill requires the Government to ensure integrity, 
security and confidentiality of data collected, preserved and retained. 
We recommend that in addition to this, the Government also ensures 
integrity, security and confidentiality of data or information that is 
transferred, accessed or deleted. We also recommend that the Bill 
requires the Government to prescribe a framework under Section 5(2) for 
agency privacy policies to ensure that they are interoperable and 
consistent between different departments of the Government.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Functions of the Central Commissioner&lt;br /&gt;Section
 8 of the Bill grants the Central Commissioner the power to perform any 
or all of the functions listed in the provision including Section 8(f) 
which refers to the power of the State Commissioner in conducting the 
work of the State Government agencies. A Central Government authority 
may not have a say in all matters under the purview of the State 
Governments. This aspect has been left out for consideration while 
drafting this provision and hence it needs to be relooked at.&lt;/li&gt;&lt;li&gt;Cut-off Date for Implementation&lt;br /&gt;While
 the Bill mandates a cut off period of 180 days for the Government to 
finalise on the scope, framework and manner of service delivery under 
its provisions, it states that the Government “may” prescribe a 
framework for implementation of the provisions. It is recommended, for 
the purpose of ensuring speedy implementation of the provisions, that 
the term “may” in Section 5(2) be replaced by “shall”.&lt;/li&gt;&lt;li&gt;Transparency of Government Agencies&lt;br /&gt;Transparency
 and accountability of the Government towards the citizen is as 
important as the transparency of the citizen towards the Government. 
Therefore, the provisions of the Bill must ensure that the Government 
activities are transparent to the citizens by making available to the 
citizens, details of the responsible officials under the Bill, manner of
 service delivery and other relevant information in this regard.&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services'&gt;https://cis-india.org/internet-governance/blog/draft-electronic-delivery-services&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-08-02T07:37:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/notices/second-expert-meeting">
    <title>Second Expert Meeting on Human Rights and the Internet</title>
    <link>https://cis-india.org/notices/second-expert-meeting</link>
    <description>
        &lt;b&gt;The second expert meeting on human rights and the Internet is being organised by the Swedish Ministry for Foreign Affairs and the UN Special Rapporteur on Freedom of Opinion and Expression on 30 and 31 March 2011 in Stockholm (Sweden). Anja Kovacs will participate in this meeting.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;List of Participants (draft)&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Alison LeClaire Christie &lt;br /&gt;alison.leclairechristie@international.gc.ca&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Minister-Counsellor and Deputy Permanent Representative, Canadian mission to UN in Geneva&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anabella Rivera&lt;br /&gt;libert.expresion@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, DEMOS, Guatemala &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anja Kovacs&lt;br /&gt;anja@cis-india.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Fellow, The Centre for Internet and Society, Bangalore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anna Nawrot &lt;br /&gt;anna.nawrot@rwi.lu.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Researcher, Raoul Wallenberg Institute of Human Rights, Lund, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Annie Game &lt;br /&gt;agame@cjfe.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, CJFE-IFEX&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Anriette Esterhuysen &lt;br /&gt;anriette@apc.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Association for Progressive Communications, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Arthit Suriyawongkul &lt;br /&gt;arthit@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Thai Neitzen Network, Centre for Popular Media Reform&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Brett Solomon&lt;br /&gt;brett@accessnow.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Access Now&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Charlotta Bredberg&lt;br /&gt;charlotta.bredberg@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Thematic Coordinator for Democracy, Human Rights, Peace and Security, Global Programme Unit, Department for Global Cooperation, Sida&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cynthia Wong &lt;br /&gt;cynthia@cdt.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Project on Global Internet Freedom, Center for Democracy and Technology, Washington DC &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Daniel Westman Daniel.Westman@juridicum.su.se&lt;/td&gt;
&lt;td&gt;Researcher and Teacher, Faculty of Law, Stockholm University&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Danny Aerts &lt;br /&gt;danny.aerts@iis.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;CEO, The Internet Infrastructure Foundation (.SE)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;David Mothander davidmothander@google.com&lt;/td&gt;
&lt;td&gt;Nordic Policy Counsel, Google, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Dunja Mijatovic&lt;br /&gt;pm-fom@osce.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;OSCE Representative on Freedom of the Media&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Eduardo Bertoni&lt;br /&gt;eberto2@palermo.edu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Center for Studies on Freedom of Expression and Access to Information, Palermo University School of Law, Argentina&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Eric King&lt;br /&gt;eric@privacy.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Human Rights and Technology Advisor, Privacy International&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Grace Githaiga&lt;br /&gt;ggithaiga@hotmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Kenya ICT Action Network (KICTANET)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Guy Berger&lt;br /&gt;G.Berger@ru.ac.za&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Professor, School of Journalism &amp;amp; Media Studies, Rhodes University, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Helena Bjuremalm&lt;br /&gt;helena.bjuremalm@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Policy Specialist, Democracy Assistance, Sida &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hossam Bahgat&lt;br /&gt;Hossam@eipr.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Egyptian Initiative for Personal Rights, Cairo&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jan Kleijssen&lt;br /&gt;jan.kleijssen@coe.int&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Directorate General of Human Rights and Legal Affairs, Council of Europe&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jean-Luc Delvert&lt;br /&gt;Jean-luc.DELVERT@diplomatie.gouv.fr&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Counsellor, Human Rights Division, Ministry for Foreign Affairs, France&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jean-Pierre Kempeneers, &lt;br /&gt;jem.kempeneers@minbuza.nl&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of the Human Rights Division, Ministry of Foreign Affairs, The Netherlands&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jermyn P Brooks&lt;br /&gt;jermynbrooks@aol.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Chair, Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joana Varon &amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;joana@varonferraz.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Researcher, Centre for Technology and Society, Rio De Janeiro&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joe McNamee &amp;nbsp;&lt;br /&gt;joe@mcnamee.eu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;EU Advocacy Coordinator, European&lt;br /&gt;Digital Rights Initiative&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Joy Liddicoat&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;joy@liddicoatlaw.co.nz&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Project Coordinator, Internet Rights are Human Rights, APC, South Africa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Kurt Erik Lindqvist&lt;br /&gt;kurtis@netnod.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;CEO, NETNOD, Stockholm &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lee Hibbard &lt;br /&gt;Lee.HIBBARD@coe.int&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Coordinator for Internet Governance and Information Society, Council of Europe &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lisa Horner &lt;br /&gt;LisaH@global-partners.co.uk&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Research &amp;amp; Policy, Global Dialogue, London&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lise Bergh&lt;br /&gt;lise.bergh@amnesty.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Amnesty International,&lt;br /&gt;Swedish Section&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Louise Bermsjö&lt;br /&gt;louise.bermsjo@sida.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Programme Manager for Democracy and Human Rights, Global Programme Unit, Department for Global Cooperation, Sida&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lucille Morillon &lt;br /&gt;internet@rsf.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head, Bureau of New Media, Reporters sans frontières &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maciej TOMASZEWSKI &lt;br /&gt;maciej.tomaszewski@ec.europa.eu&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;European Commission &lt;br /&gt;DG INFSO, Unit A3 &lt;br /&gt;Internet; Network &amp;amp; Information Security&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maria Häll&lt;br /&gt;maria.hall@enterprise.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Deputy Director, Division for Information Technology Policy, Ministry of Enterprise, Energy and Communications, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mats Ringborg&lt;br /&gt;mats.ringborg@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador of Sweden to OECD and UNESCO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Matthew Barzun &lt;br /&gt;BarzunMW@state.gov &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;US Ambassador to Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Michael Camilleri &amp;nbsp;&lt;br /&gt;MCamilleri@oas.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Attorney, office of the Special Rapporteur for Freedom of Expression, OAS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nicklas Lundblad&lt;br /&gt;nlundblad@google.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Policy Counsel, Public Policy and Government Affairs, Google&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Nicole Gregory &lt;br /&gt;nicole.gregory@fco.gov.uk&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Human Rights Section, Human Rights and Democracy Department, Foreign and Commonwealth Office, UK&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Orest Nowosad&lt;br /&gt;onowosad@ohchr.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Special Procedures of the Office of the UN High Commissioner for Human Rights&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patrik Fältström &lt;br /&gt;patrik@frobbit.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Distinguished Consulting Engineer, Cisco&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patrik Hiselius &lt;br /&gt;Patrik.Hiselius@teliasonera.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Advisor, Public Affairs, Group Communications, Telia Sonera &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Paula Uimonen&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;br /&gt;paula@spidercenter.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, The Swedish Program for ICT in Developing Regions, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Richard Allan, &lt;br /&gt;ric@fb.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director of Policy in Europe, Facebook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Richard Esguerra&lt;br /&gt;gwen@eff.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Activist, Global Internet Freedom Policy, Electronic Frontier Foundation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Robert Guerra&lt;br /&gt;guerra@freedomhouse.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Project Director, Internet Freedom, Freedom House&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Robert Hårdh Robert.Hardh@civilrightsdefenders.org&lt;/td&gt;
&lt;td&gt;Executive Director, Civil Rights Defenders, Stockholm&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sally Elkhodary &lt;br /&gt;sally.khodary@anhri.net&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Programs Director, The Arabic Network for Human Rights Information, Cairo&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sarah Labowitz&lt;br /&gt;LabowitzSB@state.gov&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Office of the Coordinator for Cyber Issues, US State Dept&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Staffan Jonson&lt;br /&gt;staffan.jonson@iis.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Policy Adviser, The Internet Infrastructure Foundation (.SE)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sylvie Coudray &lt;br /&gt;s.coudray@unesco.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Division for Freedom of Expression, Democracy and Peace, UNESCO&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Thomas Hajnoczi, Thomas.HAJNOCZI@bmeia.gv.at&lt;/td&gt;
&lt;td&gt;Ambassador, Permanent Representative of Austria to Council of Europe &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Toby Mendel&lt;br /&gt;toby@law-democracy.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Executive Director, Centre for Law and Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vilhelm Konnander&lt;br /&gt;vilhelm.konnander@gmail.com&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Global Voices&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Wolfgang Benedek&lt;br /&gt;wolfgang.benedek@uni-graz.at&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Professor, Faculty of Law, Graz University, Austria&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Yaman Akdeniz&lt;br /&gt;yaman.akdeniz@bilgi.edu.tr&lt;br /&gt;&lt;br /&gt;Ženet Mujić &lt;br /&gt;zenet.mujic@osce.org&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Associate Professor of Law, Faculty of Law, Istanbul Bilgi University&lt;br /&gt;&lt;br /&gt;Senior Adviser, office of the OSCE Representative on Freedom of the Media&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Organisers&lt;/strong&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Frank la Rue&lt;br /&gt;Co-Chair of the meeting&lt;br /&gt;libert.expresion@gmail.com&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;UN Special Rapporteur on Freedom of Opinion and Expression&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Olof Ehrenkrona&lt;br /&gt;Co-Chair of the meeting&lt;br /&gt;olof.ehrenkrona@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador, Political Adviser to Foreign Minister Carl Bildt, MFA, Sweden&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Per Sjögren&lt;br /&gt;per.sjogren@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head, Dept of International Law, Human Rights and Treaty Law, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hans Dahlgren&lt;br /&gt;hans.dahlgren@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Ambassador for Human Rights, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Måns Molander&lt;br /&gt;mans.molander@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Head of Human Rights Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Johan Hallenborg&lt;br /&gt;johan.hallenborg@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Special Adviser, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Maria Koliopanou&lt;br /&gt;maria.koliopanou@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Assistant, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Karin Keil Pettersson&lt;br /&gt;karin.keil-pettersson@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Assistant, HR Section, MFA, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pauline Etemad&lt;br /&gt;pauline.etemad@foreign.ministry.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Intern, HR Section, MFA Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Rolf Ring&lt;br /&gt;rolf.ring@rwi.lu.se&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Deputy Director, Raoul Wallenberg Institute of Human Rights and Humanitarian Law, Lund, Sweden&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Gordana Jankovic &amp;nbsp;&lt;br /&gt;Gordana.Jankovic@osf-eu.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Director, Open Society Foundation Media Program&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vera Franz &lt;br /&gt;vfranz@osf-eu.org &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Program Manager, Information Program, Open Society Foundations&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Stewart Chisholm&lt;br /&gt;Stewart.Chisholm@osf-eu.org&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Senior Manager for Freedom of Expression, Open Society Media Program&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/notices/second-expert-meeting'&gt;https://cis-india.org/notices/second-expert-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-08T10:01:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-watchmen">
    <title>India Should Watch Its Internet Watchmen </title>
    <link>https://cis-india.org/news/internet-watchmen</link>
    <description>
        &lt;b&gt;The month after terrorists attacked Mumbai in 2008, India's government initiated legislation enabling it to eavesdrop on electronic communication and block websites on grounds of national security. There was no public debate before the bill in question was introduced, and hardly any debate inside parliament itself before it passed in 2009. In the law, there were no guidelines about the extent to which an individual's right to privacy would be breached. And there was certainly no mention, and therefore, reassurance, that due process would be followed when it came to restricting access to websites. This article by Rahul Bhatia was published in the Wall Street Journal on March 28, 2011.&lt;/b&gt;
        
&lt;p&gt;It's taken about two years for the first signs of misuse to show up. And there may be many more, as the government uses vague discretion instead of firm rules to police India's Internet. Various groups can exploit these discretionary powers to their own ends.&lt;/p&gt;
&lt;p&gt;Earlier this month, the Indian Computer Emergency Response Team (CERT-In), the body appointed by the government to protect India's information infrastructure, blocked a text-message provider that sends out advertisements in bulk over mobile phone. It also blocked Typepad.com, a publishing platform used frequently by bloggers. Both restrictions have now been lifted.&lt;/p&gt;
&lt;p&gt;Most contentiously, a Delhi court ordered CERT-In to block access to Zone-H.org, an Italian security giant that acts as a repository of hacked websites—that is, it collects screen grabs of sites that are infiltrated, which later proves valuable for studying the cyber crime in question. A representative of this website accused an Indian cyber security firm, E2 Labs, of using Zone-H's logo and images to promote its own cyber security school courses. E2 Labs dragged Zone-H to court in 2009 and, on grounds of defamation, had Zone-H's website blocked. What muddies the waters is that E2 Labs claims to work for the government.&lt;/p&gt;
&lt;p&gt;Nobody knows what threat, if any, these websites posed to national security. Users who tried accessing them simply received a one-line message from their service providers that the sites had been blocked due to "instructions from the Department of Telecom." That message later disappeared, replaced by the standard error message: "Page Not Found."&lt;/p&gt;
&lt;p&gt;Many bloggers immediately started comparing this case to the situation they found themselves in 2006, when the government banned Blogspot.com right after Mumbai's suburban train system was hit by bomb blasts. The Department of Telecom then did not offer an official reason, leaving people guessing that this was some kind of response to that terrorist attack.&lt;/p&gt;
&lt;p&gt;That's happening again. The guidelines under which CERT-In operates say that all information related to website blocking is classified. Moreover, its mandate does not include communicating with the public. Which is why everyone is in the dark. Nobody even knows how widespread the blockade is. There's no hint of the process involved. There's no course for redress for those who own the affected sites.&lt;/p&gt;
&lt;p&gt;Inquiries from journalists about the Department of Telecom's method of functioning have gone unanswered. When cornered by the press this month, India's Information Technology minister Kapil Sibal, who oversees this department, passed responsibility to the ministry of home affairs, which manages the nation's internal security.&lt;/p&gt;
&lt;p&gt;Perhaps there are legitimate reasons for blocking these websites. India has faced its share of terrorist attacks that have, in the last decade, begun to affect the country's urban centers. Terrorists have gotten more sophisticated. The 2008 Mumbai assault especially put pressure on security personnel to be electronically vigilant, because the terrorists used satellite phones and internet technology to communicate. Since then, the government has ramped up its scrutiny of the Internet, including getting into a high-profile dispute last year with Blackberry-maker Research in Motion. Blogs are fair game, too, seeing as how terrorist groups have been known to use them for recruiting and communication. But if there are good reasons this time for blocking the sites in question, they're unknown and unexplained.&lt;/p&gt;
&lt;p&gt;That lack of explanation is cause for alarm. First, there's the impact on businesses. Intermediary guidelines proposed by the Department of Information Technology put the onus on service providers to remove any material that, in addition to endangering national security, "causes inconvenience or annoyance," is "grossly offensive or menacing in nature," or "belongs to another person." These open-ended guidelines mean service providers have to spend a good chunk of their time dealing with government officials to determine, say, what is offensive.&lt;/p&gt;
&lt;p&gt;The larger impact is on the rule of law. The clumsiness with which New Delhi has blocked these sites undermines any legitimacy the laws have. Lawyers I've spoken with already say that the guidelines, which are open to wide interpretation, violate the country's constitution.&lt;/p&gt;
&lt;p&gt;This legal debacle has implications beyond any immediate security concerns. Despite being a democracy with a vigorous free press, India can't afford to take freedom of speech for granted. The concern here is that a statute intended to protect the country from terrorism may also give new legal cover to people trying to restrict speech for other reasons.&lt;/p&gt;
&lt;p&gt;Already, thanks in part to the lack of political support for free speech, varied groups hijack cracks or loopholes in the legal framework to their populist ends. For instance, a colonial-era law against religious insults was used in 2007 to appease Hindu nationalists who wanted the government to punish Muslim painter M.F. Hussain for depicting "Mother India" in the nude. That case suggests that the new ill-considered and badly implemented rules for online policing could be exploited by political or business interests.&lt;/p&gt;
&lt;p&gt;India undoubtedly faces a serious terrorism problem. But New Delhi needs to defend itself through laws that don't end up impinging on free speech in damaging, undemocratic ways.&lt;/p&gt;
&lt;p&gt;Mr. Bhatia is a writer with Open Magazine in Mumbai.&lt;/p&gt;
&lt;p&gt;Read the original story &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704396904576226460167553174.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-watchmen'&gt;https://cis-india.org/news/internet-watchmen&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-05-06T05:08:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/networking-better-governance">
    <title>Networking its way to better governance </title>
    <link>https://cis-india.org/news/networking-better-governance</link>
    <description>
        &lt;b&gt;New policy to regulate Government presence on social media. This article by Deepa Kurup was published in the Hindu on March 28, 2011.
&lt;/b&gt;
        
&lt;p&gt;The official Facebook page of the Karnataka Criminal Investigation Department, “DGPCIDKARNATAKA”, is a string of one-sided comments punctuated with official-ese, or newspaper links of some prominent crime or an article by the officials.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Twitter account, also started around June 2010, has all of 38 tweets, and barely any interaction with “common” men/women. Started with much fanfare, these are among the very few State Government agencies that took to social media, but haven't taken it beyond mere formalities. On the brighter side, blogs by a few Ministers — most prominently, Higher Education Minister V.S. Acharya and Minister for Law and Parliamentary Affairs S. Suresh Kumar — are lively and even interactive, in spurts. A few government departments too have blogs, but none remarkable.&lt;/p&gt;
&lt;p&gt;Though the Indian Government's tryst with social media is fairly new — it took a few Twitter controversies, courtesy former Minister @ShashiTharoor, to make the government sit up and take note — some departments such as IndiaPost, the Delhi Traffic Police, Census India and even the Planning Commission, have been able to take it beyond mere posturing and have interacted with citizens, even tried to solve problems. IndiaPost's Twitter page is a good example of how agencies can engage with stakeholders, at least to an extent.&lt;/p&gt;
&lt;p&gt;A draft policy&lt;/p&gt;
&lt;p&gt;Twitter recently hit headlines again when foreign secretary Nirupama Sen logged on with an official ID and interacted with Indians stranded in Libya looking to make their way back. All these examples, that have earned these departments accolades, has prompted the Indian Government to come up with a new policy for social media.&lt;/p&gt;
&lt;p&gt;The e-governance group of the Department of Information Technology (DIT) held a meeting this week to draw up guidelines to “regulate” Government presence on social media sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Speaking to The Hindu, a DIT official said this had been on the Government's agenda because efforts in this direction had been all too scattered, and some of the success stories had convinced them that it could be a good platform for interaction. The official added that the feedback they got on the 12th Planning Commission's Facebook page was seen as a good example of how these tools could be leveraged.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But why regulate at all? Regulating social media use by government officials is imperative mainly to ensure that use of information or data is compliant with existing laws.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Consistency needed&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, director of the Centre for Internet and Society, a Bangalore-based non-governmental organisation, points out that with no general rules in place, the use of Twitter or Facebook account varies according to the bureaucrats heading the departments. “This cannot be the case as the channel of communication has to be a continuous thing, and the data shared with citizens has to be accurate; which means the same standards need to be applied to online sharing of data as is applied to offline data handling. Departments should also be obliged to back-up online data periodically,” he says.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;For instance, a traffic police department announced that citizens could share pictures of traffic rule offenders on Facebook or on its website, to facilitate tracking of offenders. “Such a move could have huge privacy implications, and may also lead to vigilante activism,” warns Mr. Abraham, adding that we need a policy so that all activity, however casual it may seem, is compliant with existing law governing data protection and privacy.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;With the Government jumping on to the 2.0 bandwagon (often under pressure like in Mumbai where citizens created a Facebook page for the police forcing them to create a real one), it is time to really make it official. So, while the idea of giving a face to government agencies and pushing for transparency and greater interaction with citizens, standardisation of social media use is indeed the way forward.&lt;/p&gt;
&lt;p&gt;Read the original article in the Hindu &lt;a class="external-link" href="http://www.thehindu.com/todays-paper/tp-national/article1577350.ece"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/networking-better-governance'&gt;https://cis-india.org/news/networking-better-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:13:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/failed-uk-nir-project">
    <title>‘Learn from failed UK NIR project’</title>
    <link>https://cis-india.org/news/failed-uk-nir-project</link>
    <description>
        &lt;b&gt;The new government in the UK recently scrapped its decade-long work spending millions of pounds on establishing the National Identity Registration (NIR) number simply because it realised it wasn't workable. This article by Madhumita was published in the Deccan Chronicle on March 22, 2011.


&lt;/b&gt;
        
&lt;p&gt;There might just be a lesson in this for India that has begun the ambitious Unique Identification (UID) project. The fact, experts says, is that the technology to make this project work successfully in India, that is attempting to cover the largest biometric registry in the world so far, does not exist, at the moment.&lt;/p&gt;
&lt;p&gt;According to Dr Ian Brown, senior research fellow at the Oxford Internet Institute, University of Oxford, there was very little evidence that the NIR in UK met the objectives it laid for the initiative. Dr Brown, who has worked extensively on privacy with regard to biometrics, asserted that in the area of privacy and trust there was already a lot of distrust among citizens concerning identity registration. Additionally the UK government losing the CDs that contained information of 25 million people, led to the debate of data breach, a major issue for India concerning the UID.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“The reasons behind the need for the card included politically popular goals that varied depending on the demands of that political moment. From anti-terrorism to reducing social security fraud, identification fraud, illegal immigration and creating a sense of community, the UK government's response was thin when it came to checking for evidence on the project successfully meeting these objectives. If it was for the largest argument of fitting into the wider perspective of criminal justice and security, then studies have shown that cost-effective measures such as streetlights managed to reduce crime by 30 per cent as against surveillance cameras that reduced crime a mere three per cent in the UK,” stated Dr Brown during a lecture at IISc.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;India too has argued the same reasons of terrorism and security along with literacy and eradicating poverty. But where is the evidence that one cannot breach this system? Asked advocate Malavika Jayaram.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Prashant Iyengar of the Centre for Internet and Society (CIS) reiterating this stated that there was no guarantee that an individual's information would be safeguarded. The general consensus was that nobody is opposed to the UID, just its current form.&lt;/p&gt;
&lt;p&gt;UK’s NIR disaster&lt;/p&gt;
&lt;p&gt;The introduction of the UK’s National Identity Register (NIR) scheme was much debated, and various degrees of concern about the scheme were expressed by human rights lawyers, activists, security professionals and IT experts, as well as politicians.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Many of the concerns focused on the databases which underlie the identity cards rather than the cards themselves.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;It is also used to identify individuals in groups that are under surveillance. India is undertaking an ambitious mega project (the Multipurpose National Identity Card) to provide a unique identification number to each of its 1.25 billion people.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in the Deccan Chronicle &lt;a class="external-link" href="http://www.deccanchronicle.com/channels/cities/bengaluru/%E2%80%98learn-failed-uk-nir-project%E2%80%99-798"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/failed-uk-nir-project'&gt;https://cis-india.org/news/failed-uk-nir-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:12:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases">
    <title>Privacy and Governmental Databases</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases</link>
    <description>
        &lt;b&gt;In our research we have found that most government databases are incrementally designed in response to developments and improvements that need to be incorporated from time to time. This method of architecting a system leads to a poorly designed database with many privacy risks such as: inaccurate data, incomplete data, inappropriate disclosure of data, inappropriate access to data, and inappropriate security over data. To address these privacy concerns it is important to analyze the problem that is being addressed from the perspective of potential and planned interoperability with other government databases. Below is a list of problems and recommendations concerning privacy, concerning government databases. &lt;/b&gt;
        
&lt;h2&gt;Government Databases and recommendations for privacy practices&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Citizen-State relationships and privacy standards&lt;/strong&gt;&lt;br /&gt;Government databases foster different types of relationships between the state and its citizenry. For instance: User databases, service providing databases, and information providing databases. Each one these relationships requires a different level of privacy. Thus, it is important to identify the type of relationship that the database will foster in order to determine what type of privacy model to implement.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Specific privacy policy &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Each government database should have a specific privacy policy that are tailored to the information that they hold. Each policy should cover the following areas:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;data collection&lt;/li&gt;&lt;li&gt;digitization&lt;/li&gt;&lt;li&gt;usage&lt;/li&gt;&lt;li&gt;storage&lt;/li&gt;&lt;li&gt;security&lt;/li&gt;&lt;li&gt;disclosure&lt;/li&gt;&lt;li&gt;retrieval&lt;/li&gt;&lt;li&gt;access (inter departmental and public)&lt;/li&gt;&lt;li&gt;anonymization, obfuscation and deletion.&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personal vs. personal sensitive and public vs. non-public data categories &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Data in government databases requires varying degrees of privacy safeguards. The division of personal information vs. non personal information etc. creates distinct&lt;/p&gt;
&lt;p&gt;categories for security levels over data and permissibility of public disclosure. Ex of personal information: Name, address, telephone number, religion. Ex of non-personal data: gender, age. This could work to avoid situations such as the census - where a person’s name, address, age, etc, were all printed for the public eye.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Standardization of Privacy Policies and Access Control &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Government databases should all be designed upon interoperable standards so that the databases can "talk" to each other. The ability to coalesce databases strengthens the potential for use and reuse by different stakeholders. Furthermore, the interoperability of systems helps to avoid the creation of silos that hold multiple copies of the same data. To protect the privacy in interoperable systems - restricted and authorized access within departments and between departments is key. The Department of Information Technology has recently published a "Government Interoperability Framework" titled "Interoperability Framework for eGovernance" This policy document is the appropriate place to articulate interoperable privacy policies that could be adopted across eGovernance projects.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Record of breach notification &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;If data breach occurs in government database, the breach should be recorded and the appropriate individuals notified.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Anonymization/obfuscation and deletion policies &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Once the purpose for which the data has been collected has been served it must be anonymized/obfuscated or deleted as appropriate. All data-sets cannot be deleted as bulk aggregate data is very useful to those interested in trend analysis. Anonymizing/obfuscating the personal details of a data set ensures that privacy is protected during such trend analysis.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Accountability for accuracy of data &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Frequently data that is collected and entered into government databases is not accurate, because the departments are not collecting the data themselves. Thus, they feel no responsibility for its accuracy. If a mechanism is built into each database for identification of each data source this brings accountability for data accuracy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Appropriate uses of government databases &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Businesses should feel automatically entitled to aggregate and consolidate public information from government databases because it is technically possible to do so. Their uses of government database must be guided by policies that define "appropriate usage."&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Access, updation and control of personal information &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Citizens must be able to access and update their information. Furthermore, they should be able to define to a certain extent access control to their information - which would automatically make them eligible or ineligible for various government services.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Bibliography &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;Rezhui, Abdemounaam. Preserving Privacy in Web Services. Department of Computer Sciences, Virginia Tech.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p&gt;Medjahed, Brahim. Infrastructure for E-Government Web Services. IEEE Internet Computing, Virgina Tech. January/Feburary 2003.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;Mladen, Karen. A Report of Research on Privacy for Electronic Government. Privacy in Canada&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; joi.ito.com/privacyreport/Contents_Distilled/.../Canada_E_p252-314.pdf&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-govt-databases&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:41:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-matters-ahmedabad">
    <title>Privacy Matters - A Public Conference in Ahmedabad</title>
    <link>https://cis-india.org/events/privacy-matters-ahmedabad</link>
    <description>
        &lt;b&gt;On behalf of Privacy India, and in partnership with the Research Foundation for Governance in India and Society in Action Group, the Centre for Internet and Society invites you to “Privacy Matters” a public conference focused on discussing the
challenges and concerns to privacy in India. The event will be held at the Ahmedabad Management Association. We would be honored if you would attend the meeting and contribute your views.&lt;/b&gt;
        
&lt;p&gt;The conference will focus on the questions and dilemmas posed by privacy in India today, with a concentration on security, national surveillance, prisoners rights and privacy. The right to privacy in&amp;nbsp;India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities,prisoners, etc. – people who most need to know that sensitive information is protected. &lt;a class="external-link" href="http://www.privacyindia.org/"&gt;Privacy India&amp;nbsp;&lt;/a&gt;&amp;nbsp;was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India.&lt;/p&gt;
&lt;p&gt;One of our goals is to build consensus towards the promulgation of a comprehensive privacy legislation in India through consultations with the public, legislators and the legal and&amp;nbsp;academic community.&lt;/p&gt;
&lt;p&gt;Please confirm your participation with:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;elonnai@privacyindia.org, or&lt;/li&gt;&lt;li&gt;jsree.t@gmail.com&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Privacy Matters&lt;/h3&gt;
&lt;h3&gt;March 26th 10:30 – 4:30 pm&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p align="right"&gt;&amp;nbsp;Ahmedabad Management Association&lt;br /&gt;Core-AMA Management House&lt;br /&gt;Torrent-AMA Management Centre&lt;br /&gt;ATIRA Campus, Dr. Vikram Sarabhai Marg&lt;br /&gt;Ahmedabad 380 015, Gujarat, INDIA&lt;br /&gt;Phone: +91-79-263086&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time &lt;br /&gt;&lt;/th&gt;
&lt;th&gt;Session&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;10:00 to 10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration and Welcome&lt;br /&gt;Prashant Iyengar&lt;/strong&gt;&lt;br /&gt;Prashant Iyengar is a practicing lawyer and lead researcher for Privacy India. He will present who&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy India is, and the objectives of Privacy India's research.&amp;nbsp; Lastly he will outline the present scenario of Privacy in India.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30 to 11:15 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Keynote Address&lt;br /&gt;Usha Ramanathan&lt;/strong&gt;&lt;br /&gt;Dr. Usha Ramanathan is an internationally recognized expert on law and poverty. Her research interests include human rights, displacement, torts and environment. Ms. Ramanathan will speak about the coerced decline of privacy. National security,&amp;nbsp; corruption, pragmatism, and the emergence of technologies that often work to establish that privacy is an irrelevant notion. She will look at links not often made between&amp;nbsp; privacy and personal security, between data bases and national security, and the centrality of dislodging privacy in projects of social control are, perhaps deliberate.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 to 11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea break&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 to 1:00&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Opinions on Privacy&lt;br /&gt;Justice J N Bhatt, Mr. Ajay Tomar, Renu Pokharna&lt;/strong&gt;&lt;br /&gt;In this session key officials from Gujarat will share their experiences and opinions&lt;br /&gt;on privacy in the context of India. Speakers include:&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Justice J N Bhatt&lt;/em&gt; is the former Chief Justice of Gujarat and Bihar, and currently&lt;br /&gt;the head of the Gujarat State Law Commission. He has had ad successful career including having:&amp;nbsp; joined the Office of the Government Pleader, at Jamnagar in 1976, worked as Central Government Counsel in special matter of Armed Forces and Labour Cases, and has authored more than 50 Articles on Jurisprudence, Constitution, International Law, A.D.R, Legal Aid and Lok Adalat and Judicial Reforms&lt;br /&gt;&amp;nbsp;&lt;br /&gt;&lt;em&gt;Renu Pokharna&lt;/em&gt;, a member of the Chief Minister's Office, State of Gujarat, has spent her career&amp;nbsp; working towards the betterment of society, especially the poor and the hungry through policy and not charity. For example she is a part of the project&amp;nbsp; “Gujarat Skill Development Mission”. The project tries to achieve convergence of skill training programs to make them more effective.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Mr. Ajay Tomar&lt;/em&gt; is the chief of the Anti-Terrorism Squad in Gujarat. He has worked on cracking down on many cases involving national security and surveillance including the “Pepsi Bomber”.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00 to 2:00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:00 to 2:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy, Minority Identities, and Security&lt;br /&gt;Bobby Kuhnu&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Bobby Kuhnu&lt;/em&gt; is a lawyer, social activist, and writer. Mr. Kuhnu will examine the&lt;br /&gt;ideological underpinnings of the discourse on privacy and its bearings on socially&lt;br /&gt;marginalized identities particularly in the context of the Indian state and the&lt;br /&gt;constitutional right to privacy.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:30 to 3:00 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy and National Security&lt;br /&gt;Mathew Thomas&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Mathew Thomas&lt;/em&gt; is a management consultant and activity leader for&lt;br /&gt;development centers. Mathew has held top positions in the Indian Army, and the Defense Research and Development Organization, where he headed the missile manufacturing facility. His presentation will focus on national security and privacy.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:00 to 3:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00 to 4:30 &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Open discussion and summary&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Other Distinguished Participants&lt;/h3&gt;
&lt;ul&gt;&lt;li&gt;Justice 
Madhukar&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Former Judge, Trial Courts, Gujarat&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Kanan Divatia&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lawyer and Professor of Law, L A Shah Law College&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Professor Amal Dhru&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Visiting Professor, Indian Institute of Management, Ahmedabad&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Madhusudan Agarwal&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp; Founder, Ma'am movies&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Gaurang Raval &lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp; Drishti Media&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Rahul Chimanbhai Mehta&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Independent Candidate, IIT Delhi Alumnus&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Madhusudan Agarwal&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp; Founder, Ma'am movies&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-matters-ahmedabad'&gt;https://cis-india.org/events/privacy-matters-ahmedabad&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:14:41Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/ian">
    <title>Public Talk by Dr. Ian Brown on Privacy, Trust and Biometrics</title>
    <link>https://cis-india.org/events/ian</link>
    <description>
        &lt;b&gt; Trust is hard to build, but easy to lose. What factors affect individuals' trust in new technologies? How can governments create citizen trust in biometric security tools? Can biometrics be designed to be privacy-friendly? And how did these questions lead to the cancellation of the UK's national identity scheme, after a decade of development costing tens of millions of pounds?
About the speaker: Dr Ian Brown's research is focused on public policy issues around information and the Internet, particularly privacy and copyright. He also works in the more technical fields of communications security and healthcare informatics.
&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/ian'&gt;https://cis-india.org/events/ian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:15:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/muzzling-internet">
    <title>Muzzling the Internet</title>
    <link>https://cis-india.org/news/muzzling-internet</link>
    <description>
        &lt;b&gt;It is strange suddenly to be confronted with the provisions of a law passed way back in 2008. But why should the Information Technology Amendment Act, 2008, pushed through in the weeks following the 26/11 attacks in Mumbai be making news now? This news item by Sundeep Dougal was posted in Outlook on March 17, 2011.&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/FreedomofSpeech_20110316.jpg/image_preview" alt="Freedom of Expression" class="image-inline image-inline" title="Freedom of Expression" /&gt;&lt;/p&gt;
&lt;p&gt;The Economic Times, with a report headlined &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2011-03-16/news/28698054_1_internet-users-sovereignty-and-integrity-switch"&gt;Government can switch off your internet if necessary&lt;/a&gt; breathlessly reported yesterday:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;The Indian government has armed itself with powers to 'switch off' or kill the internet during times of national emergencies, becoming one of the first few countries to assume such far reaching authority. Even as the US and other western nations debate the judiciousness of giving the government's complete control to shut down cyber traffic, India has moved a step ahead and incorporated a provision under the IT Act of 2008, giving the Central government, or any of its officers specially authorised by it, to block the internet if necessary. The shutdown can happen in the interest of sovereignty and integrity of India, its defense, security of its states, friendly relations with foreign states or for public order. Failure to comply will result in imprisonment of up to seven&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But perhaps the report can be excused for the simple reason that because the act was pretty much hustled through Parliament at a time when the national mindspace was preoccupied with other concerns, there was not much analysis or criticism in the mainstream media, though specialised blogs did raise an alarm even then. [See one critique dating back to December 2008 here April 2010 here -- and for the record, the bill was endorsed by the President in Feb 2009, and then only notified in October 2009.]&lt;/p&gt;
&lt;p&gt;Read the ET report further and you realise that the reference was perhaps occasioned by the following development that the news report went on to provide:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Not satisfied with this provision, India is now moving ahead to develop alternate plans in case the 'switch' does not work. The draft plan by the Cabinet Committee on Security and Ministry of Home Affairs along with Ministry of IT &amp;amp; Communications to 'choke' the internet at will, which ET reported last year, is also learnt to be in its final stages.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Choking refers to handicapping the servers by subjecting it to multiple requests and attacks and preventing it from functioning effectively&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But more dangerous to the issue of freedom of the internet were the recent reports, earlier in the month, of the &amp;nbsp;blocking of Typepad, Mobango, Clickatell by some ISPs, though only one of them provided a message saying, "This site has been blocked as per request from the Department of Telecom". It was 2006 all over again.&lt;/p&gt;
&lt;p&gt;As usual, the real problem was the total arbitrariness of the process and the confusion was confounded further when an unnamed Airtel spokesperson told the Hindu that there was no directive from the government, and this was “just a temporary network problem”.&lt;/p&gt;
&lt;p&gt;The crux of the matter can be summed up in this one quote from Nikhil Pahwa of Medianama in the &lt;a class="external-link" href="http://www.thehoot.org/web/home/story.php?sectionId=6&amp;amp;mod=1&amp;amp;pg=1&amp;amp;valid=true&amp;amp;storyid=5163"&gt;Hoot&lt;/a&gt;: "what gets me angry is that we wouldn't even have got to know of the blocking. There are never any indications of which websites are blocked and why. We have got to have more transparency on these issues."&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2011/03/223-indian-government-blocks-typepad-mobango-clickatell/"&gt;Medianama&lt;/a&gt; also compiled and reported the following:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://tech2.in.com/news/websites-internet/are-our-isps-blocking-blogspot/192672/0"&gt;Tech2&lt;/a&gt; wrote about a blogspot blackout on Feb 12th.&lt;/li&gt;&lt;li&gt;CuttingtheChai &lt;a class="external-link" href="http://www.cuttingthechai.com/2011/02/4828/savita-bhabhi-blocked-again-in-india-also-typepad-and-mobango/"&gt;wrote about&lt;/a&gt; Kirtu.com, where the not-safe-for-work comic Savita Bhabhi was hosted, Mobango, Typepad and Clickatell being blocked on Feb 22nd.&lt;/li&gt;&lt;li&gt;Kafila &lt;a class="external-link" href="http://kafila.org/2011/03/04/crazy-internet-censorship-time-in-india-again/"&gt;reports&lt;/a&gt;, and this is something that we’ve also been told about as well, that &lt;a class="external-link" href="http://www.zone-h.org/"&gt;Zone-H.org&lt;/a&gt; has been blocked as well. This is strange, but there is a suggestion that &lt;a class="external-link" href="http://www.bloggernews.net/124029"&gt;a company called E2 Labs got Zone-H blocked&lt;/a&gt;, because they did a post criticizing E2′s proposal to start a cyber security educational institution, alleging that there was falsification of information. A &lt;a class="external-link" href="http://www.naavi.org/cl_editorial_10/e2labs_zoneh_org.pdf"&gt;pdf of the post here&lt;/a&gt;, via Naavi.org. Again, we need clarity on why these blocks have been ordered. Also read Apar Gupta’s post&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.iltb.net/2010/04/the-utilitarian-critique-of-e-2-labs-v-zone-h/"&gt;the utilitarian critique of E2 Labs v. Zone-H&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.medianama.com/2011/03/223-it-minister-kapil-sibal-on-internet-block-social-media-worries/"&gt;Medianama further reported&lt;/a&gt; that on the sidelines of the Gov 2.0 conference last Friday, Communications &amp;amp; IT Minister Kapil Sibal passed the buck on the issue of lack of transparency in the way the Indian government blocks access to websites. Sibal told MediaNama that we should “Ask the Home Ministry, because this is a security issue.”&lt;/p&gt;
&lt;p&gt;As &lt;a class="external-link" href="http://kafila.org/2011/03/16/how-is-savita-bhabhi-a-threat-to-indias-national-security/"&gt;Shivam Vij of Kafila&lt;/a&gt; asked:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;All I want to ask Kapil Sibal is: How is Savita Bhabhi a threat to India’s national security? Wait, I have another question: why should I ask the Home Ministry when the orders for blocking come from your own Ministry, Mr Sibal, and the committee that decides on blocking has only one Home Ministry representative and two from your Ministry, sir?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;In theory a lot of people will say that the internet can not be free of regulation, that the government must block some sites. But this is the problem in practice: the government will block a soft porn comic &amp;nbsp;- only because it was talked about openly, discussed in the papers, and so on. Only because it came in the way of some bureaucrat’s antiquated sense of morality. Why, there are countless hard core Indian porn sites that are not blocked! (Oops, I shouldn’t be giving ideas.)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;And when you wonder why the Government of India thinks Savita Bhabhi is too obscene for you, they will say national security!&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;If you don’t know about the Savita Bhabhi blocking issue, see this Huffington Post&amp;nbsp;&lt;a class="external-link" href="http://www.huffingtonpost.com/2009/07/23/savita-bhabhi-india-mourn_n_243427.html"&gt;article&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;All of this of course assumes ominous overtones when one considers the government's attitude on Wikileaks and offers an inkling of the shape of things to come when we look at the recent &amp;nbsp;release of the long awaited &lt;a class="external-link" href="http://www.mit.gov.in/content/cyber-laws"&gt;draft rules for important sections of the Information Technology Act 2000&lt;/a&gt;, objections to which were sought from the public by February 28, 2011.&lt;/p&gt;
&lt;p&gt;So far, the following draft rules have been formalised:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/senstivepersonainfo07_02_11.pdf"&gt;section 43A- Reasonable security practices and procedures and sensitive personal information&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Privacy India and Centre for Internet and Society, Bangalore have offered a detailed para-wise commentary&lt;a class="external-link" href="http://www.cis-india.org/advocacy/igov/blog/security-practices-rules"&gt; here&lt;/a&gt;.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/due_dilligance4intermediary07_02_11.pdf"&gt;section 79-Due diligence observed by intermediaries guidelines&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;A detailed, para-wise, criticism is available by the Centre for Internet and Society which pointed out, inter-alia:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;they vest an extraordinary power of censorship in the hands of the intermediary, which could easily lead to the stifling of the constitutionally guaranteed freedom of speech online. &amp;nbsp;Analogous restrictions do not exist in other fields, e.g., against the press in India or against courier companies, and there is no justification to impose them on content posted online. Taken together, these provisions make it impossible to publish critical views about anything without the risk of being summarily censored.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The rules are so loosely worded as to cover almost anything. For example, consider Section 3 of the proposed rules, particularly point (g):&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"causes annoyance or inconvenience or deceives or misleads the addressee about the origin of such messages or communicates any information which is grossly offensive or menacing in nature;"&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Imagine the number of sensitive souls out there who could be claiming "inconvenience" because of "annoyance" having been caused.&lt;/p&gt;
&lt;p&gt;The Draft rule under &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/guidelines4cybercafe0702_11.pdf"&gt;section 79-Guidelines for Cyber Cafe&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;A critique by &lt;a class="external-link" href="http://prsindia.org/theprsblog/2011/02/25/no-more-wireless-internet-at-cafes-and-airports/"&gt;PRS blog&lt;/a&gt; | &lt;a class="external-link" href="http://www.medianama.com/2011/02/223-cybercafe-rules-it-act-india/"&gt;Medianama&lt;/a&gt; | &lt;a class="external-link" href="http://www.cis-india.org/advocacy/igov/blog/cyber-cafe-rules"&gt;Centre for Internet and Society&lt;/a&gt; points out, inter alia, that&lt;/p&gt;
&lt;p&gt;if enforced it will end up choking public access Internet in the country, whether through Cybercafes or at Wifi hotspots, which would cover all regular cafes that offer Internet access, the airport, where some telcos allow access, or even on-campus connectivity.&lt;/p&gt;
&lt;p&gt;While the comments for the above rules were invited only till 28.02.2011, perhaps it would still be useful to let the authorities know what one thinks about these rules by sending an email to: grai AT mit.gov.in&lt;/p&gt;
&lt;p&gt;Read the original post in the Outlook &lt;a class="external-link" href="http://blogs.outlookindia.com/default.aspx?ddm=10&amp;amp;pid=2454&amp;amp;eid=5"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/muzzling-internet'&gt;https://cis-india.org/news/muzzling-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:14:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/battle-internet">
    <title>Battle for the Internet </title>
    <link>https://cis-india.org/news/battle-internet</link>
    <description>
        &lt;b&gt;In this article written by Latha Jishnu and published by Down to Earth, Issue: March 15 2011, the author reports about the events in the United States in the post WikiLeaks scenario.&lt;/b&gt;
        
&lt;p&gt;As the Internet becomes the public square and the marketplace of our world, it is increasingly becoming a contested terrain. Its potential for diffusing knowledge and subverting the traditional channels of information is tremendous. So it is not surprising that governments, corporations and even seemingly innocuous social networking sites all want to control and influence the way the Internet operates. It’s easy to see why. Close to a third of humanity is linked to this system—and the dramatic growth in Internet usage over the past decade is set to explode in coming years. So is its commercial promise. Latha Jishnu looks at events in the US following the WikiLeaks exposé of its diplomatic cables, and in the hot spots of political turmoil across the world to understand the significance of the Internet in today’s interconnected world and the threats it faces. Arnab Pratim Dutta explains the technology used to block access to the Net.&lt;/p&gt;
&lt;table style="text-align: center;" class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;img src="https://cis-india.org/home-images/D2E1.jpg/image_preview" style="float: none;" title="D2E1" class="image-inline image-inline" alt="D2E1" /&gt;&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left;"&gt;
&lt;p&gt;&amp;nbsp;An opposition supporter holds up a laptop showing images of celebrations in Cairo's Tahrir Square, after Egypt's President Hosni Mubarak resigned (Photo: Reuters)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Ideas and ideologies, images and reports of events, both minor and cataclysmic, fly on the Internet, swirling through cyberspace, gathering resonance, metamorphosing and touching millions of lives in different ways. Many of the ideas—and visuals—could be banal (as they very often are), some dangerous, others bringing promise of change. Some have the power to subvert, helping to stir and stoke the smouldering embers of political and social unrest as recent uprisings in north Africa, West Asia and Asia have shown. To many, the Internet is the rebel hero of our times, subverting conventional media and leaking news and information that governments would like to censor. Even a village in the remote reaches of Odisha’s Malkangiri district which may have no electricity is in some way linked to cyberspace through smart cell phones because mobile operators are increasingly turning Internet service providers (ISPs) and bringing the worldwide web to the conflict-ridden forests of central India.&lt;/p&gt;
&lt;p&gt;It is about the power and reach of connection, unprecedented since people first began communicating with each other. The Internet, therefore, is turning into a conflict zone with everyone seeking control of it: governments, corporations and social networking sites, all of whom have different agendas. Social networks may seem innocuous but they are as much a hazard as the others to Internet freedom. Surveillance of “netizens” is becoming commonplace, whether in democracies or in totalitarian regimes, through a host of new laws and regulations ostensibly aimed at strengthening national security, cyber security or protecting business interests.&amp;nbsp;&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D2E2.jpg/image_preview" alt="Down to Earth 2" class="image-inline image-inline" title="Down to Earth 2" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While most governments are seeking to filter and block specific content, in extreme cases, as in Egypt, the Net has been blacked out using what some experts say is the “kill switch” (see ‘The Egypt shutdown’). This could emerge as the biggest threat to the Internet since other regimes could be tempted to go the Egyptian way. Most governments, however, prefer not to use it, not even the censorship-obsessed Chinese and Saudi regimes because the Internet is also about business—commerce of increasing significance is being routed through its sinews. Take one small example: In January alone, Britons spent a whopping £5.1 billion online, recording a 21 per cent jump in e-commerce revenues over January 2010, according to the latest edition of the IMRG/CapGemini e-Retail Sales Index. It is the kind of figure that stops authorities from reaching for the kill switch.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: left;"&gt;In the case of China, e-commerce transactions hit 4.5 trillion yuan (US $682.16 billion) in 2010, up 22 per cent year-on-year, according to China e- Business Research Center and CNZZ Data Center. Of this, online B2B or business-to-business deals accounted for the bulk: 3.8 trillion yuan (US&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;" class="pullquote"&gt;Popular whistleblower website wikileaks.org was unavailable for some time in December 2010&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;p&gt;$576.05 billion). And retail sales are expected to zoom, too, pretty soon with e-commerce websites selling directly to customers growing to more than 18,600 last year. Thanks to a dramatic spike in the rate of Net penetration and impressive growth of online business.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the world has a long way to go before the Internet becomes ubiquitous or an all-encompassing global commons. Currently, just two billion people are linked to the system (see above: ‘Big picture’), which is less than a third of the world’s population. And the reach, as the chart shows, is rather patchy. India may be in the top five Internet user nations with a total of 81 million users but penetration is an abysmal 6.9 per cent, the worst in the list. Blame that on our pathetic education levels and poverty. China, however, is the undisputed leviathan with 420 million users in 2010—some estimates put the figure closer to 500 million now—who account for more than a fifth of the world’s Internet users. No other country’s growth in this sector matches China’s either in speed or drama.&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D3E3.jpg/image_preview" alt="Down to Earth 3" class="image-inline" title="Down to Earth 3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This is one reason Washington frequently raises the issue of China’s policing of the Internet in different fora. The most recent was on February 15 when secretary of state Hillary Clinton made the second of her rousing speeches on safeguarding the Internet from all kinds of government interference. Speaking at George Washington University in Washington DC, Clinton pointed out that the attempts to control the Internet were rife across the world but singled China for repeated attacks.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;“In China, the government censors content and redirects search requests to error pages. In Burma, independent news sites have been taken down with distributed denial of service (DDoS) attacks. In Cuba, the government is trying to create a national intranet, while not allowing their citizens to access the global internet. In Vietnam, bloggers who criticize the government are arrested and abused. In Iran, the authorities block opposition and media websites, target social media, and steal identifying information about their own people in order to hunt them down. These actions reflect a landscape that is complex and combustible, and sure to become more so in the coming years as billions of more people connect to the Internet.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: -webkit-auto;"&gt;&lt;span class="Apple-style-span"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/D4E4.jpg/image_preview" alt="Down to Earth 4" class="image-inline image-inline" title="Down to Earth 4" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;That seemed a fair assessment of the trends&amp;nbsp;but the irony is that even as the secretary of state was speaking,&amp;nbsp;the Department of Justice was seeking to enforce a court order to direct Twitter Inc,&amp;nbsp;to provide the US government records&amp;nbsp;of three individuals, including Birgitta Jonsdottir, a member of Iceland's Parliament who had been in touch with others about WikiLeaks and its founder Juan Assange last year when WikiLeaks released its huge cache of US diplomatic cables.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;A commentary in China Daily noted with asperity: “The Assange case reveals such rhetoric is just so much hypocrisy. It is apparent that when Internet freedom conflicts with self-declared US national interests, or when Internet freedom exposes lies by the self-proclaimed open and transparent government, it immediately becomes a crime.”&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The Assange case more than anything else has exposed how vulnerable the Net is to political meddling and control. In December last year, Amazon said it stopped hosting the WikiLeaks website because it “violated its terms of service” and not because the office of the Senate Homeland Security Committee chaired by Joe Lieberman had questioned Amazon about its relationship with WikiLeaks.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;WikiLeaks had turned to Amazon to keep its site available after hackers tried to flood it and prevent users accessing the classified information. Few people were willing to credit Amazon’s feeble explanation for cutting off WikiLeaks and the general surmise was that Lieberman had put some kind of pressure on the webhosting platform. According to one analyst, the simple reason is that the US government is one of the company’s biggest clients. According to a press note issued by the company: “Government adoption of AWS (Amazon Web Services) grew significantly in 2010. Today we have nearly 20 government agencies leveraging AWS, and the US federal government continues to be one of our fastest growing customer segments.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As Amazon abandoned WikiLeaks, Paypal, Visa and MasterCard had also dumped WikiLeaks. This set off a fullscale cyber war in which a fourth party made its presence felt: Hackers/ ‘hacktivists’ who unleashed operation payback for what they deemed unfair targeting of WikiLeaks and Assange. This involved a series of (DDOS) attacks on Paypal, MasterCard, Swiss Bank PostFinance and Lieberman’s website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So while governments in many parts of the world block sites, jail or kill dissidents for expressing their views on the Net, threats to the freedom of the Internet come primarily from the paranoia that governments suffer and from badly crafted policies they implement to protect business and other interests.&amp;nbsp;&lt;/p&gt;
&lt;div class="pullquote"&gt;US enforcement agencies shut down 84,000 sites, falsely accusing them of child pornography&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The US, the ultimate symbol of liberal democracy, is no less uneasy about the power of the Internet. A slew of laws are making their way through the Senate, laws that will give the administration sweeping powers to seize domain names and shut down websites, even those outside its territory, and laws that strengthen the powers of the president in the time of a cyber emergency, including the use of a kill switch. In September, the US Senate introduced the Combating Online Infringement and Counterfeits Act, which would allow the government to create a blacklist of websites that are suspected to be infringing IP rights and to pressure or require all ISPs to block access to those sites. In these cases, no due process of law protects people before they are disconnected or their sites are blocked.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In India, in the wake of the terrorist attacks in Mumbai in November 2008, Parliament hastily passed amendments to the Information Technology Act, 2000, without any discussion in either House. The December 2008 amendments have some good points but they also allow increased online surveillance. Section 69A permits the Centre to “issue directions for blocking of public access to any information through any computer resource”, which means that the government can block any website.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Pranesh Prakash of the Bengalurubased Centre for Internet and Society notes that while necessity or expediency in terms of certain restricted interests is specified, no guidelines have been specified. “It has to be ensured that they are prescribed first, before any powers of censorship are granted to anybody,” said Prakash in an analysis of the amendments. “In India, it is clear that any law that gives unguided discretion to an administrative authority to exercise censorship is unreasonable.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="text-align: center;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div style="text-align: -webkit-auto;"&gt;
&lt;p&gt;Civil rights activists say the section has broadened the scope of surveillance and that there are no legal or procedural safeguards to prevent violation of civil liberties.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As the battle for keeping the Internet is joined by netizens who are aware of the power of connection, governments, too, are ramping up command and control measures. Among the risks to an open, democratic Internet are the following:&lt;/p&gt;
&lt;h3&gt;Threat to universality&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The basic design principle underlying the World Wide Web is universality, and, according to its founder Tim Berners-Lee, several threats are emerging. Among these are: cable companies that sell Internet connectivity wanting to limit their Net users to downloading only the company’s mix of entertainment and social networking sites (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/hidden-dangers-facebook"&gt;Hidden dangers of Facebook&lt;/a&gt;’).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Another is by pricing Net connectivity out of the reach of the poor and allowing differential pricing. Berners- Lee, warned at a recent London conference: “There are a lot of companies who would love to be able to limit what web pages you can see...the moment you let Net neutrality go, you lose the web as it is...You lose something essential—the fact that any innovator can dream up an idea and set up a website at some random place and let it just take off from word of mouth...”&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Actions against piracy&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The nub of such operations lies in the US Department of Homeland Security, whose Immigration and Customs Enforcement (ICE) and the Department of Justice (DoJ) have been seizing domains because they are suspected of hawking pirated goods. The first seizure was in November last year when 82 websites selling counterfeit goods ranging from handbags to golf clubs were taken out.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Last month, there was another raid on the Internet. According to TorrentFreak and other Internet monitoring sites, the two agencies wrongly shut down 84,000 websites that had not broken the law, falsely accusing them of child pornography crimes. After the mistake was identified, it took about three days for some of the websites to go live again. The domain provider, FreeDNS, was taken aback. “Freedns.afraid.org has never allowed this type of abuse of its DNS service. We are working to get the issue sorted as quickly as possible,” it said.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Earlier, DoJ and ICE had seized the domain of the popular sports streaming and P2P download site Rojadirecta. What is shocking is that the site is based in Spain and is perfectly legal. Two courts in Spain have ruled that the site operates legally, and other than the .org domain the site has no links to the US.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Internet freedom could easily become the biggest casualty in the illconceived and poorly designed procedures adopted by developed countries— France, the UK, South Korea, Taiwan and New Zealand have similar laws—to protect intellectual property from counterfeiters and pirates, primarily at the behest of the film and music recording industries.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are indications India may be planning to follow suit (see ‘&lt;a class="external-link" href="http://www.downtoearth.org.in/content/indias-three-strikes-policy"&gt;India’s three-strikes policy&lt;/a&gt;’), although civil rights groups say it could amount to a form of deprivation of liberty.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Surveillance technology&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The problem with the use of technology in keeping the Internet safe cuts both ways. With increasing number of cyber attacks on both official and public websites from an array of hackers and malware, governments are reaching for ever more sophisticated high-tech surveillance systems. For instance, computer systems of the US Congress and the executive branches are under attack an average of 1.8 billion times per month, according to a recent Senate report. The result: more spyware. One such is deep packet inspection technology. It is a tool that protects customers from rampant spam and virus traffic. Experts say the Internet could not survive without this technology and yet, it helps authorities to keep a close watch on what people are doing on the Net. In the US, ISPs are required to have this technology.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So what can be done? Keep close tabs on government involvement in the Internet and ensure that its intrusion in both the content and the engines of this system is kept to the minimum.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Read the original article written by Latha Jishnu in Down to Earth&lt;/em&gt; &lt;a class="external-link" href="http://www.downtoearth.org.in/content/battle-internet"&gt;here&lt;/a&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/battle-internet'&gt;https://cis-india.org/news/battle-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:28:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/catch-all">
    <title>Catch-all approach to Net freedom draws activist ire</title>
    <link>https://cis-india.org/news/catch-all</link>
    <description>
        &lt;b&gt;The Internet has revolutionized the way we socialise, date and even protest. Online activism is a faster, more effective way to get more people to react to a cause. But at the same time it is this speed that makes Internet-generated protests a far graver danger than offline protests. Egypt faced an Internet shutdown when the protest started gaining steam and China has been throttled with heavy cyber censorship for years. Unfortunately, silencing the voices of dissent online is as easy as raising them. This article by Annie Johnny appeared in the Sunday Guardian, New Delhi on 13 March 2011. &lt;/b&gt;
        
&lt;p&gt;A workshop recently conducted at the Constitution Club in New Delhi brought together human rights activists, bloggers and techies and explored the challenges faced by online activists.&lt;/p&gt;
&lt;blockquote&gt;“When the Internet was in its nascent stage, there was the Utopian belief that the government would not have the same role to play as it does offline. However, the Internet is being increasingly regulated by the government,” says Dr. Anja Kovacs, fellow, Centre for Internet and Society, Bangalore.&lt;/blockquote&gt;
&lt;p&gt;The Binayak Sen and Pink Chaddi campaigns provide a picture of how fast and efficient online activism is. “Initially, the campaign was restricted to a centralised network of people and was a way for me and my friends to vent out our thoughts. But it grew beyond our expectations. Between March 2008 and May 2009, we had about 1.5 million visitors. Our experience with the Internet as an effective tool in mobilising people has been very positive,” says Satya Sivaraman, one of the initiators of the Free Binayak Sen Campaign website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Blocking websites that promote child pornography and hate speech is acceptable. Activists, however, are concerned about the mysterious disappearances of blogs and the vague explanations given to justify them.&lt;/p&gt;
&lt;blockquote&gt;“There is a provision for spam in the IT Act. While the rule is meant for only for spam, it is extended over a much wider area. According to it, anything that is deemed objectionable can be blocked. Instead of targeting offensive material, the act should target harmful content. Child pornography and hate speeches cause harm, whereas what is ‘offensive’ is subjective,” says Pranesh Prakash, programme manager, Centre for Internet and Society.&amp;nbsp;&lt;/blockquote&gt;
&lt;p&gt;Bloggers in countries like Thailand and Singapore face serious consequences for posting anti-state views online. However, very few people all over the world are standing up against the curtailing of the right to freedom of expression online.&lt;/p&gt;
&lt;blockquote&gt;“There are ways to access blocked sites but most people do not bother to do that. If a site is blocked, they will simply accept it. The government in India is becoming increasingly restrictive. While their reason for concern is valid as the restrictions are in place to protect national security, the way they are dealing with this is inappropriate. Drafting vague rules related to objectionable content’ without specifying whom the content is objectionable to, is not going to help. There needs to be clearly defined categories for banning sites,” says Kovacs.&lt;/blockquote&gt;
&lt;p&gt;Rising against the growing restrictions and the wide gaps in Internet accessibility, The Internet Rights and Principles coalition, which works on Internet rights, is coming up with a Charter for Human Rights and Principles for the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The charter, which is still being drafted and has been put online for suggestions, emphasises that human rights apply the same way online as they do offline, and lays down rules and Internet policies necessary to protect human rights.&lt;/p&gt;
&lt;p&gt;Another interesting observation is that most online protests don’t always spark parallel offline protests. The Meter Jam protest against the high auto fares in Mumbai is one such example.&lt;/p&gt;
&lt;blockquote&gt;“While it helped the middle class vent their frustration, on the day of the actual offline protest, hardly anyone boycotted autos. Business went on as usual,” says Kovacs.&lt;/blockquote&gt;
&lt;ul&gt;&lt;li&gt;See the article on the Sunday Guardian &lt;a class="external-link" href="http://www.sunday-guardian.com/technologic/catch-all-approach-to-net-freedom-draws-activist-ire"&gt;website&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the original pdf &lt;a href="https://cis-india.org/advocacy/catch-net-freedom" class="internal-link" title="Catch file"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/catch-all'&gt;https://cis-india.org/news/catch-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:43:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cause-and-effect">
    <title>Cause and effect Facebook-style</title>
    <link>https://cis-india.org/news/cause-and-effect</link>
    <description>
        &lt;b&gt;While the world is crediting Facebook for triggering the Arab revolution, do Facebook groups in India say anything about top of mind causes for young Indians? Crime touches a chord - the pages that have sprung up for Radhika Tanwar and Aarushi Talwar illustrate this - but it's the ideological issues that have made it to our top five list. Anja Kovas, a fellow at the Centre for Internet and Society, a Bengaluru-based research organisation, analyses the success of these causes. &lt;/b&gt;
        
&lt;ol start="1"&gt;&lt;li&gt;Save the Tiger: The biggest Indian group on Facebook 'Save the Tiger' has a following of over 8,43,663 people. &lt;br /&gt;&lt;br /&gt;Content talk: The site tracks news items about the tiger and features comments and quotes about the animal. The group's motto 'Read between the stripes' encourages members to 'like' conservation. &lt;br /&gt;&lt;br /&gt;Pages: As the most popular cause, this also links to over 30 pages such as the 'Save the Leopard', Save the Tiger Fund' and 'Only 1411 left in India' &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Anja-speak&lt;/strong&gt;: This campaign was successful because several celebrities were a part of the cause. TV campaigns and celebs always ensure a larger audience. Also world over, environmental issues triggers stronger reactions. &lt;/li&gt;&lt;li&gt;Terrorism: It's a subject that affects every single Indian, and 'Stop Terrorism in India' has already clocked 1, 39, 436 members. &lt;br /&gt;&lt;br /&gt;Content talk: "If you want to sleep peacefully then wake up now…" It's comments like these that would best explain what the group is all about. Members of this group share videos of 26/11, violence in Kashmir, Salman Khan, anti-hunger campaign and other subjects like peace, liberty and justice. &lt;br /&gt;&lt;br /&gt;Pages: Other related pages are 'Stop terror in India and specially Mumbai'. 'Stop Terror in India, Pakistan' &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Anja-speak&lt;/strong&gt;: The Mumbai attacks shook the nation and touched a chord with everyone across age groups, classes and beliefs.&lt;/li&gt;&lt;li&gt;Kashmir: Over four lakh Kashmiris have been displaced from their state since 1989-90. It's not surprising then that Kashmir comes third in our list of causes. 'Frontline Kashmir' supports the 'freedom movement' and has about 24,000 members. &lt;br /&gt;&lt;br /&gt;Content talk: Peppered with calls for freedom, the comments on the walls also speak out against separatists.&amp;nbsp; Pages: For various viewpoints on Kashmir, also check out Amnesty International, Revolt, I Cry, We Love Syed Ali Shah Geelani.&amp;nbsp;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Anja-speak&lt;/strong&gt;:Facebook played an important role in letting young Kashmiris voice their opinions online. It's obviously a platform for young Kashmiris who want to air grievances. &lt;/li&gt;&lt;li&gt;Corruption: Despite the fact that corruption is one of the foremost issues in India today, the largest group against corruption 'India Against Corruption' has only 16,499 members. &lt;br /&gt;&lt;br /&gt;Content talk: From information on marches to news articles, this page deals with anything related to corruption in India. A much talked about issue on this page is the CWG and the 2G scam. Pages: Do check out the 'Commonwealth Jhel' page as well and the 'I Paid A Bribe' and 'Choosna Bandh Campaign'!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Anja-speak&lt;/strong&gt;: It's a topic that unites people across classes in India. With big scams unfolding every other day, people are definitely interested in such a group.&lt;/li&gt;&lt;li&gt;Free Binayak Sen: With 8,479 'likes', the Facebook page 'Release Dr Binayak Sen: Protest against mockery of justice against him', a cause by the same name that is supported by 7,745 people, stands as the most popular group. &lt;br /&gt;&lt;br /&gt;Content talk: The campaign on Facebook is an offshoot of a section of society that believes Dr Sen has been denied justice by the state and speaks of all related matters including the sedition law. Pages: There are 15 groups and 22 pages related to Dr Binayak Sen, including 'Free Binayak Sen! Repeal Section 124A IPC' and 'Free Binayak Sen - Global Campaign'. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Anja-speak&lt;/strong&gt;: This campaign owes its success, in terms of its outreach, to years of determination and relentless action by those that support Dr Sen.&lt;/li&gt;&lt;/ol&gt;
&lt;span class="Apple-style-span"&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;This article by Malvika Nanda was published in the&amp;nbsp;Hindustan Times on March 13, 2011. Read the original &lt;a class="external-link" href="http://www.hindustantimes.com/Cause-and-effect-Facebook-style/Article1-672785.aspx"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cause-and-effect'&gt;https://cis-india.org/news/cause-and-effect&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:44:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/govt-proposal">
    <title>Govt proposal to muzzle bloggers sparks outcry</title>
    <link>https://cis-india.org/news/govt-proposal</link>
    <description>
        &lt;b&gt;A government proposal seeking to police blogs has come in for severe criticism from legal experts and outraged the online community. The draft rules, drawn up by the government under the Information Technology Amendment Act, 2008, deal with due diligence to be observed by an intermediary. This article was published in the Times of India on March 10, 2011.&lt;/b&gt;
        
&lt;p&gt;Under the Act, an 'intermediary' is defined as any entity which on behalf of another receives, stores or transmits any electronic record. Hence, telecom networks, web-hosting and internet service providers, search engines, online payment and auction sites as well as cyber cafes are identified as intermediaries. The draft has strangely included bloggers in the category of intermediaries, setting off the online outcry.&lt;/p&gt;
&lt;p&gt;Blogs are clubbed with network service providers as most of them facilitate comment and online discussion and preserve the traffic as an electronic record, but equating them with other intermediaries is like comparing apples with oranges, says Pavan Duggal, advocate in the Supreme Court and an eminent cyber law expert.&lt;/p&gt;
&lt;p&gt;'This will curtail the freedom of expression of individual bloggers because as an intermediary they will become responsible for the readers' comments. It technically means that any comment or a reader-posted link on a blog which according to the government is threatening, abusive, objectionable, defamatory, vulgar, racial, among other omnibus categories, will now be considered as the legal responsibility of the blogger," he explains.&lt;/p&gt;
&lt;p&gt;Even Google, the host of Blogger, among India's most popular blogging sites, expressed displeasure at the proposal. "Blogs are platforms that empower people to communicate with one another, and we don't believe that an internet middlemen should be held unreasonably liable for content posted by users," a spokesperson told TOI.&lt;/p&gt;
&lt;p&gt;Blogs, which are typically maintained and updated by individuals, have showcased their political importance in recent times and the internet community views these rules as a lopsided attempt to curtail an individual's right to expression.&lt;/p&gt;
&lt;p&gt;"If individual blogs are an intermediary, then why can't Facebook and Twitter also be classified as such, as they too receive, store and transmit electronic records and facilitate online discussions," retorts the spokesperson of the Centre for Internet and Society (CIS), a Bangalore-based organization, which works on digital pluralism. "These rules will not only bring bloggers and the ISP provider on the same platform, but the due diligence clause will also result in higher power of censorship to the larger player. Imagine your ISP provider blocking your blog because it finds that certain user-comments fit these omnibus terms," the CIS spokesperson added.&lt;/p&gt;
&lt;p&gt;Most experts, including Duggal, see these rules as the outcome of the government's one-size-fits-all approach — at least in regulating online activities — and ask for an amendment to the IT Act.&lt;/p&gt;
&lt;p&gt;Read the original article in the Times of India &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/Plan-to-muzzle-bloggers-sparks-outcry/articleshow/7668026.cms"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/govt-proposal'&gt;https://cis-india.org/news/govt-proposal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:46:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/anti-social-network">
    <title>Anti-Social Network</title>
    <link>https://cis-india.org/news/anti-social-network</link>
    <description>
        &lt;b&gt;Social media is driving teens to a reality they can't handle. This article by Max Martin was published in Mail Today on February 27, 2011. &lt;/b&gt;
        
&lt;p&gt;THIS is the generation of instant messaging and two-minute noodles. Impatient teenagers are always plugged in to their computers and cell phones. Their reality is virtual and most of their friends can be found online. "It's the coolest way to keep in touch," says Charlotte William, a college student in Bangalore whose Facebook was got flooded with birthday greetings on Saturday. Her FB page is an almost-instantly updated open book of her life.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Such minute-by-minute minute updates are an integral part of any teenager's life but the older generation is cautious. Not just old-fashioned people but even the tech-savvy are raising several issues with this uncontrolled explosion of social networking. India is the seventh largest social networking market in the world, with millions of users and many issues like privacy, etiquette, commercial, and political interests. Even though people have control over the information they post online, unauthorised access&amp;nbsp;--&amp;nbsp;usage and republication -- is a major cause of concern, says Nikhil Pahwa, who publishes MediaNama, a mobile business news site based in Delhi. "You put up information about friends and family without realising the enormous consequences of it being in the public domain," says Pahwa.&lt;/p&gt;
&lt;p&gt;"I see a lot of people exchanging personal messages and phone numbers on their walls. A lot of people are rather nonchalant about it," says Christian Wolff, a German development researcher, living in Hyderabad, who finds it amazing how Indians are not as concerned about their privacy as they should be. Bangalore-based lawyer Sarim Naved says the internet gives people a misplaced sense of anonymity, which makes them shed their inhibitions -- and etiquette. Should you allow a friend to post pictures of you from that crazy party last night? What if a family member sees them? We still live by traditional values and customs and footloose pictures may not be appreciated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;And while you may think that your privacy settings are in place to never allow such an unfortunate incident take place, privacy settings give a false sense of security. "Many people cannot figure out how to put filters on," says Yamini Atmavilas, a teacher of gender studies in Hyderabad. She also says that social networking is a mixed bag: "Studies show that women use social networks differently from men. They have helped build women's social capital, providing an outlet for connection and expression."&amp;nbsp;&lt;/p&gt;
&lt;p&gt;AARTI Mundkur, who was involved in the national 'Pink Chaddi' campaign against the pub-attacking Sri Ram Sene, agrees. "Social networks capture only the imagination of the upper middle class -- and fail to evoke any other kind of response," says this activist lawyer. While the social media is powerful -- and can be used for many purposes -- it is limited in scope.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also, these sites are turning into what Wolff calls 'all-devouring marketing machines'. Facebook, for instance, is always in the midst of some controversy over its automatic personalisation or using technology to accommodate differences between individuals, so that disbursing personalised advertisements gets easier. Most of us do not realise that every little bit of information we post online is under the scrutiny of corporate entities that analyse and track browsing, spending, networking, and even music preferences.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"They make money with the data you post online for free," says Anivar Aravind, an IT consultant and commentator who started the online campaign for justice for Binayak Sen. "Even worse is when these service providers pass on this personal information to the government as Yahoo did in China leading to the imprisonment of a journalist," says Aravind.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Also getting increasingly active in the online circuit are crooks, says Shantanu Ghosh, who handles the India product operations of Symantec, a leading network and computer security firm. These crooks, he says, launch virus attacks, put up false events to attract people, and spoof networking sites to extract personal data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"This attack was observed before the Cricket World Cup 2011. Attackers had created a page offering ticket deals for the World Cup final in Mumbai, requiring users to log into their social networking accounts. Those who fell for this trick would have ended up revealing their confidential login information to these attackers." Ghosh advises: "You should treat anything you see online with skepticism -- especially if it involves clicking a link or installing an application." Also make sure you check and understand privacy policies and settings.&lt;/p&gt;
&lt;p&gt;This is even more important because existing laws on cyber crime are not strong enough. Also, the question whether new laws will be effective remains.&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"It really depends on the law. If it goes into too much detail then it will be rendered irrelevant because of advancements in technology," says Sunil Abraham, who heads Centre for Internet and Society, a Bangalore-based research group. "A good law usually focuses on principles. What we need in India is a privacy regulator that can dynamically interpret the principles in law to quickly react to developments on the internet."&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;&lt;li&gt;Read the article in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=2722011"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Also see the article in the Free Library &lt;a class="external-link" href="http://www.thefreelibrary.com/ANTI-+SOCIAL+NETWORK+(+Social+media+is+driving+teens+to+a+reality...-a0250124694"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Download the news from Mail Today &lt;a href="https://cis-india.org/advocacy/anti-social-network.pdf" class="internal-link" title="Anti-Social Network (PDF)"&gt;here&lt;/a&gt; (pdf, 2.92 MB)&lt;/li&gt;&lt;/ul&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/anti-social-network'&gt;https://cis-india.org/news/anti-social-network&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:59:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/online-censorship">
    <title>New Indian Rules May Make Online Censorship Easier</title>
    <link>https://cis-india.org/news/online-censorship</link>
    <description>
        &lt;b&gt;Draft rules proposed by the Indian government for intermediaries such as telecommunications companies, Internet service providers and blogging sites could in effect aid censorship, according to experts. The article by John Ribeiro was published in Yahoo News on March 7, 2011.&lt;/b&gt;
        
&lt;p&gt;Under the draft rules, intermediaries will have to notify users of their services not to use, display, upload, publish, share or store a variety of content, for which the definition is very vague, and liable to misuse.&lt;/p&gt;
&lt;p&gt;Content that is prohibited under these guidelines ranges from information that may "harm minors in any way" to content that is "harmful, threatening, abusive."&lt;/p&gt;
&lt;p&gt;Some of the terms are so vague that to stay on the right side of the law, intermediaries may in effect remove third-party content that is even mildly controversial, said Pavan Duggal, a cyberlaw consultant and advocate in India's Supreme Court.&lt;/p&gt;
&lt;p&gt;While the definition of some of the terms like obscenity have been ruled on by India's Supreme Court, some of the other terms do not have a precise legal definition, said Pranesh Prakash, program manager at the Centre for Internet and Society, a research and advocacy group focused on consumer and citizen rights on the Internet.&lt;/p&gt;
&lt;p&gt;"Would creating a Facebook profile for a minor, for example be considered as harming a minor ?" Duggal said.&lt;/p&gt;
&lt;p&gt;The draft rules are secondary legislation framed by the government under the country's Information Technology (Amendment) Act of 2008. Under the IT Act, an intermediary is not liable for any third-party information, data, or communication link made available or hosted by him, if among other things, he has observed due diligence under the draft rules.&lt;/p&gt;
&lt;p&gt;The new rules will give rise to subjective interpretations, thus giving a lot of discretion to non-judicial authorities in the country to decide whether the intermediary has observed due diligence or not, Duggal said.&lt;/p&gt;
&lt;p&gt;According to the draft rules, an intermediary has to inform users that in case of non-compliance of its terms of use of the services and privacy policy, it has the right to immediately terminate the access rights of the users to its site. After finding out about infringing content, either on its own or through the authorities, the intermediary has to work with the user or owner of the information to remove access to the information.&lt;/p&gt;
&lt;p&gt;Rather than recognizing the diversity of the businesses of intermediaries, the draft rules use a "one-size, fits all" set of rules across a variety of intermediaries including telecom service providers, online payment sites, e-mail service providers, and Web hosting companies, Duggal said.&lt;/p&gt;
&lt;p&gt;An intermediary such as a site with user-generated content, like Wikipedia, would need different terms of use from an intermediary such as an e-mail provider, because the kind of liability they accrue are different, Prakash wrote in his blog.&lt;/p&gt;
&lt;p&gt;The draft rules also add new provisions that appear designed to give the government easier access to content from intermediaries. Intermediaries will be required to provide information to authorized government agencies for investigative, protective, cybersecurity or intelligence activity, according to the rules.&lt;/p&gt;
&lt;p&gt;Information will have to be provided for the purpose of verification of identity, or for prevention, detection, prosecution and punishment of offenses, on a written request stating clearly the purpose of seeking such information, the rules add.&lt;/p&gt;
&lt;p&gt;The IT Act already has specific procedures in this connection for very specific information requirements, but the draft rules have broadened this to a general requirement for intermediaries to provide information, Prakash said. The new rule could in fact be a way of circumventing the earlier laws, he added.&lt;/p&gt;
&lt;p&gt;The draft rules assume significance in the context of recent moves by the Indian government to get Research In Motion to provide access to information on BlackBerry services in India. While providing lawful access to its consumer services like BlackBerry Messenger, RIM has declined to provide access to its corporate service, BlackBerry Enterprise Server, claiming that it does not have access to customers' encryption keys.&lt;/p&gt;
&lt;p&gt;The Indian government has previously also said it would demand lawful access from Google's Gmail and Skype, but has not taken any action so far in this direction.&lt;/p&gt;
&lt;p&gt;The draft rules will require compliance from a number of entities who until now had thought they were outside the ambit of compliance, Duggal said.&lt;/p&gt;
&lt;p&gt;Google did not immediately respond to e-mailed requests for its comments on the new rules. Microsoft said that the government should set the policy objectives and provide directional framework, and still allow flexibility to intermediaries to set the data protection measures as they deem fit for different situations and services.&lt;/p&gt;
&lt;p&gt;"We believe that the intermediary should be obliged to take down non-compliant content on being notified of the same as well as terminate access rights for those who use these platforms for dissemination of non-compliant content," Microsoft said in an e-mailed statement. Non-compliance include, but is not limited to, copyrights, it added.&lt;/p&gt;
&lt;p&gt;John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original in Yahoo News &lt;a class="external-link" href="http://news.yahoo.com/s/pcworld/20110307/tc_pcworld/newindianrulesmaymakeonlinecensorshipeasier"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/online-censorship'&gt;https://cis-india.org/news/online-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-01T15:57:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
