<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/news/northeast-now-may-17-2019-youths-come-forward-to-augment-assamese-wikisource-project"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/cyber-space-hackers-paradise"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/year-ahead-copyright-2010"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-open-consultation-process-multistakeholder-preparatory-platform-phase-six"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/unesco-world-trends-in-freedom-of-expression-and-media-development"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/world-library-and-information-congress-2018"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/knowledge-repository-on-internet-access/wipo"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/world-day-against-software-patents"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision">
    <title>Zuckerberg's India Backlash Imperils Free Global Web Vision</title>
    <link>http://editors.cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision</link>
    <description>
        &lt;b&gt;When Facebook's co-founder proposed bringing free Web services to India, his stated aim was to help connect millions of impoverished people to unlimited opportunity. Instead, critics have accused him of making a poorly disguised land grab in India's burgeoning Internet sector. The growing backlash could threaten the very premise of Internet.org, his ambitious, two-year-old effort to connect the planet.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Bhuma Shrivastava was &lt;a class="external-link" href="http://www.ndtv.com/india-news/foreign-media-on-zuckerbergs-india-backlash-1260732"&gt;published by NDTV&lt;/a&gt; on January 4, 2016. Pranesh Prakash gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Indian authorities are circumspect because the Facebook initiative  provides access to only a limited set of websites -- undermining the  equal-access precepts of net neutrality. The telecommunications  regulator is calling for initial comments by Jan 7, extending the  deadline from today, on whether wireless carriers can charge differently  for data usage across websites, applications and platforms.&lt;br /&gt;&lt;br /&gt; Losing this fight could imperil Facebook's Free Basics, which allows  customers to access the social network and select services such as  Messenger and Microsoft's Bing without a data plan.&lt;br /&gt;&lt;br /&gt;"The  India fight is helping shape debates elsewhere," said Pranesh Prakash,  policy director at the Centre for Internet and Society, a  Bangalore-based non-profit advocacy group. "Activists in other countries  such as Brazil, Venezuela and Colombia are watching this debate and  will seize the momentum created in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's argument for free Web access is based in part on Deloitte  research showing that for every 10 people who are connected to the Web,  one is lifted out of poverty and one job is created.&lt;br /&gt;&lt;br /&gt; Facebook argues that by giving people free access to a small slice of  the Internet, they will quickly see the value in paying for the whole  thing. Zuckerberg has said his biggest challenge in connecting people to  the Web isn't access to cellular networks, but a social hurdle: he  needs to prove to people who have never been online that the Internet is  useful.&lt;br /&gt;&lt;br /&gt; "Who could possibly be against this?" Zuckerberg wrote in an impassioned  op-ed in the Times of India this week. "Surprisingly, over the last  year there's been a big debate about this in India."&lt;br /&gt;&lt;br /&gt; Zuckerberg's pleas underscore what's at stake. Facebook already attracts  1.55 billion people monthly, or about half of the Internet-connected  global population. To keep growing, the world's largest social network  needs to get more people online. Hence the billions of dollars Facebook  is spending on projects to deliver the Web to under-served areas via  drones, satellites and lasers. And Internet.org, which now spans 37  nations.&lt;br /&gt;&lt;br /&gt; India, as the world's second most populous nation, is arguably the most  important piece of Zuckerberg's Free Basics strategy. But the opposition  is fierce. Critics note that the Facebook service doesn't offer Web  favorites such as Google's search. Facebook has said it would be open to  adding more features from competitors, but critics are skeptical of  giving the social-networking giant such influence on the Internet.&lt;br /&gt;&lt;br /&gt; Critics also say that by offering a limited swath of the Internet at  comparatively slow speeds, the company is creating a diluted version of  the Web. That could stifle innovation by causing disadvantages for  Indian startups building rival apps, or allow Facebook and its  telecommunications carrier-partners to act as Internet gatekeepers.&lt;br /&gt;&lt;br /&gt; In a sign of the importance he attaches to the issue, Zuckerberg on  Tuesday called one of India's most prominent entrepreneurs to make his  case.&lt;br /&gt;&lt;br /&gt; One97 Communications, the mobile payments startup backed by Alibaba  Group Holding, is one of several tech companies that have come out  against Facebook's plans.&lt;br /&gt;&lt;br /&gt; "We are totally against telcos preferring one developer over another,"  One97 founder Vijay Shekhar Sharma said in a phone interview before that  call. "We are asking for access neutrality. We are hoping that all  startups will be treated equally."&lt;br /&gt;&lt;br /&gt; Sonia Dhawan, a spokeswoman for One97's payment website Paytm, said the  call took place but didn't describe the conversation further. Sharma  wasn't available for further comment.&lt;br /&gt;&lt;br /&gt; Facebook is now scrambling to drum up support. It's started a "Save Free  Basics In India" campaign, asking Indian users to support "digital  equality" by filling out a form that shoots an e-mail to regulators.  That also has the effect of sending notifications to user's friends  unless they opt out.&lt;br /&gt; Facebook has also taken out full-page advertisements, including one  featuring a smiling Indian farmer and his family who the ads say used  new techniques to double his crop yield.&lt;br /&gt;&lt;br /&gt; While countries such as the Philippines have embraced Free Basics, India  has been "the outlier and more challenging," Chris Daniels, vice  president of Internet.org, said in a Dec. 26 chat on Reddit.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision'&gt;http://editors.cis-india.org/internet-governance/news/ndtv-bhuma-shrivastava-january-4-2016-zuckerberg-india-backlash-imperils-free-global-web-vision&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-06T14:51:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper">
    <title>Zero Draft of Content Removal Best Practices White Paper </title>
    <link>http://editors.cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper</link>
    <description>
        &lt;b&gt;EFF and CIS Intermediary Liability Project is aimed towards the creation of a set of principles for intermediary liability in consultation with groups of Internet-focused NGOs and the academic community.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The draft paper has been created to frame the discussion and will be made available for public comments and feedback. The draft document and the views represented here are not representative of the positions of the organisations involved in the drafting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://tinyurl.com/k2u83ya"&gt;http://tinyurl.com/k2u83ya&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3 September  2014&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this white paper is to frame the discussion at several meetings between groups of Internet-focused NGOs that will lead to the creation of a set of principles for intermediary liability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles that develop from this white paper are intended as a civil society contribution to help guide companies, regulators and courts, as they continue to build out the legal landscape in which online intermediaries operate. One aim of these principles is to move towards greater consistency with regards to the laws that apply to intermediaries and their application in practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are three general approaches to intermediary liability that have been discussed in much of the recent work in this area, including CDT’s 2012 report called “Shielding the Messengers: Protecting Platforms for Expression and Innovation.” The CDT’s 2012 report divides approaches to intermediary liability into three models: 1. Expansive Protections Against Liability for Intermediaries, 2. Conditional Safe Harbor from Liability, 3. Blanket or Strict Liability for Intermediaries.&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This white paper argues in the alternative that (a) the “expansive protections against liability” model is preferable, but likely not possible given the current state of play in the legal and policy space (b) therefore the white paper supports “conditional safe harbor from liability” operating via a ‘notice-to-notice’ regime if possible, and a ‘notice and action’ regime if ‘notice-to-notice’ is deemed impossible, and finally (c) all of the other principles discussed in this white paper should apply to whatever model for intermediary liability is adopted unless those principles are facially incompatible with the model that is finally adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As further general background, this white paper works from the position that there are three general types of online intermediaries- Internet Service Providers (ISPs), search engines, and social networks. As outlined in the recent draft UNESCO Report (from which this white paper draws extensively);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With many kinds of companies operating many kinds of products and services, it is important to clarify what constitutes an intermediary. In a 2010 report, the Organization for Economic Co-operation and Development (OECD) explains that Internet intermediaries “bring together or facilitate transactions between third parties on the Internet. They give access to, host, transmit and index content, products and services originated by third parties on the Internet or provide Internet-based services to third parties.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most definitions of intermediaries explicitly exclude content producers. The freedom of expression advocacy group Article 19 distinguishes intermediaries from “those individuals or organizations who are responsible for producing information in the first place and posting it online.”  Similarly, the Center for Democracy and Technology explains that “these entities facilitate access to content created by others.”  The OECD emphasizes “their role as ‘pure’ intermediaries between third parties,” excluding “activities where service providers give access to, host, transmit or index content or services that they themselves originate.”  These views are endorsed in some laws and court rulings.  In other words, publishers and other media that create and disseminate original content are not intermediaries. Examples of such media entities include a news website that publishes articles written and edited by its staff, or a digital video subscription service that hires people to produce videos and disseminates them to subscribers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of this case study we will maintain that intermediaries offer services that host, index, or facilitate the transmission and sharing of content created by others. For example, Internet Service Providers (ISPs) connect a user’s device, whether it is a laptop, a mobile phone or something else, to the network of networks known as the Internet. Once a user is connected to the Internet, search engines make a portion of the World Wide Web accessible by allowing individuals to search their database. Search engines are often an essential go-between between websites and Internet users. Social networks connect individual Internet users by allowing them to exchange messages, photos, videos, as well as by allowing them to post content to their network of contacts, or the public at large. Web hosting providers, in turn, make it possible for websites to be published and to be accessed online.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;General Principles for ISP Governance - Content      Removals&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion that follows below outlines nine principles to guide companies, government, and civil society in the development of best practices related to the regulation of online content through intermediaries, as norms, policies, and laws develop in the coming years. The nine principles are: Transparency, Consistency, Clarity, Mindful Community Policy Making, Necessity and Proportionality in Content Restrictions, Privacy, Access to Remedy, Accountability, and Due Process in both Legal and Private Enforcement. Each principle contains subsections that expand upon the theme of the principle to cover more specific issues related to the rights and responsibilities of online intermediaries, government, civil society, and users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle I: Transparency&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“Transparency enables users’ right to privacy and right to freedom of expression. Transparency of laws, policies, practices, decisions, rationale, and outcomes related to privacy and restrictions allow users to make informed choices with respect to their actions and speech online. As such - both governments and companies have a responsibility in ensuring that the public is informed through transparency initiatives.” &lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government Transparency&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;In general, governments should publish transparency      reports:&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;As part of the democratic process, the citizens of each country have a right to know how their government is applying its laws, and a right to provide feedback about the government’s legal interpretations of its laws. Thus, all governments should be required to publish online transparency reports that provide information about all requests issued by any branch or agency of government for the removal or restriction of online content. Further, governments should allow for the submission of comments and suggestions by a webform hosted on the same webpage where that government’s transparency report is hosted. There should also be some legal mechanism that requires the government to look at the feedback provided by its citizens, ensure that relevant feedback is passed along to legislative bodies, and provide for action to be taken on the citizen-provided feedback where appropriate. Finally, and where possible, the raw data that constitutes each government’s transparency report should be made available online, for free, in a common file format such as .csv, so that civil society may have easy access to it for research purposes.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Governments should be more transparent about content      orders that they impose on ISPs&lt;br /&gt;The legislative process proceeds most effectively when the government knows how the laws that it creates are applied in practice and is able to receive feedback from the public about how those laws should change further, or remain the same. Relatedly, regulation of the Internet is most effective when the legislative and judicial branches are aware of what the other is doing. For all of these reasons, governments should publish information about all of the court orders and executive requests for content removals that they send to online intermediaries. Publishing all of this information in one place necessarily requires that some single entity within the government collects the information, which will have the benefits of giving the government a holistic view of how it is regulating the internet, encouraging dialogue between different branches of government about how best to create and enforce internet content regulation, and encouraging dialogue between the government and its citizens about the laws that govern internet content and their application. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Governments should make the compliance requirements      they impose on ISPs public&lt;br /&gt;Each government should maintain a public website that publishes as complete a picture as possible of the content removal requests made by any branch of that government, including the judicial branch. The availability of a public website of this type will further many of the goals and objectives discussed elsewhere in this section. The website should be biased towards high levels of detail about each request and towards disclosure that requests were made, subject only to limited exceptions for compelling public policy reasons, where the disclosure bias conflicts directly with another law, or where disclosure would reveal a user’s PII. The information should be published periodically, ideally more than once a year. The general principle should be: the more information made available, the better. On the same website where a government publishes its ‘Transparency Report,’ that government should attempt to provide a plain-language description of its various laws related to online content, to provide users notice about what content is lawful vs. unlawful, as well as to show how the laws that it enacts in the Internet space fit together. Further, and as discussed in section “b,” infra, government should provide citizens with an online feedback mechanism so that they may participate in the legislative process as it applies to online content.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Governments should give their citizens a way to provide      input on these policies&lt;br /&gt;Private citizens should have the right to provide feedback on the balancing between their civil liberties and other public policies such as security that their government engages in on their behalf. If and when these policies and the compliance requirements they impose on online intermediaries are made publicly available online, there should also be a feedback mechanism built into the site where this information is published. This public feedback mechanism could take a number of different forms, like, for example, a webform that allowed users to indicate their level of satisfaction with prevailing policy choices by choosing amongst several radio buttons, while also providing open text fields to allow the user to submit clarifying comments and specific suggestions. In order to be effective, this online feedback mechanism would have to be accompanied by some sort of legal and budgetary apparatus that would ensure that the feedback was monitored and given some minimum level of deference in the discussions and meetings that led to new policies being created.&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;Government should meet users concerned about its content policies in the online domain. Internet users, as citizens of both the internet and the country their country of origin, have a natural interest in defining and defending their civil liberties online; government should meet them there to extend the democratic process to the Internet. Denying Internet users a voice in the policymaking processes that determine their rights undermines government credibility and negatively influences users’ ability to freely share information online. As such, content policies should be posted in general terms online and users should have the ability to provide input on those policies online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ISP Transparency&lt;/b&gt;&lt;br /&gt;“The transparency practices of a company impact users’ freedom expression by providing insight into the scope of restriction that is taking in place in specific jurisdiction. Key areas of transparency for companies include: specific restrictions, aggregate numbers related to restrictions, company imposed regulations on content, and transparency of applicable law and regulation that the service provider must abide by.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Disclosure by service providers of notices received and actions taken can provide an important check against abuse. In addition to providing valuable data for assessing the value and effectiveness of a N&amp;amp;A system, creating the expectation that notices will be disclosed may help deter fraudulent or otherwise unjustified notices. In contrast, without transparency, Internet users may remain unaware that content they have posted or searched for has been removed pursuant due to a notice of alleged illegality. Requiring notices to be submitted to a central publication site would provide the most benefit, enabling patterns of poor quality or abusive notices to be readily exposed.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; Therefore, ISPs at all levels should publish transparency reports that include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Government Requests&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;All requests from government agencies and courts should be published in a periodic transparency report, accessible on the intermediary’s website, that publishes information about the requests the intermediary received and what the intermediary did with them in the highest level of detail that is legally possible. The more information that is provided about each request, the better the understanding that the public will have about how laws that affect their rights online are being applied. That said, steps should be taken to prevent the disclosure of personal information in relation to the publication of transparency reports. Beyond redaction of personal information, however, the maximum amount of information about each request should be published, subject as well to the (ideally minimal) restrictions imposed by applicable law. A thorough Transparency Report published by an ISP or online intermediary should include information about the following categories of requests:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Police and/or Executive Requests&lt;br /&gt;This category includes all requests to the intermediary from an agency that is wholly a part of the national government; from police departments, to intelligence agencies, to school boards from small towns. Surfacing information about all requests from any part of the government helps to avoid corruption and/or inappropriate exercises of governmental power by reminding all government officials, regardless of their rank or seniority, that information about the requests they submit to online intermediaries is subject to public scrutiny. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Court Orders&lt;br /&gt;This category includes all orders issued by courts and signed by a judicial officer. It can include ex-parte orders, default judgments, court orders directed at an online intermediary, or court orders directed at a third party presented to the intermediary as evidence in support of a removal request. To the extent legally possible, detailed information should be published about these court orders detailing the type of court order each request was, its constituent elements, and the actions(s) that the intermediary took in response to it. All personally identifying information should be redacted from any court orders that are published by the intermediary as part of a transparency report before publication.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;First Party&lt;br /&gt;Information about court orders should be further broken down into two groups; first party and third party. First party court orders are orders directed at the online intermediary in an adversarial proceeding to which the online intermediary was a party.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Third Party&lt;br /&gt;As mentioned above, ‘third party’ refers to court orders that are not directed at the online intermediary, but rather a third party such as an individual user who posted an allegedly defamatory remark on the intermediary’s platform. If the user who obtains a court order approaches an online intermediary seeking removal of content with a court order directed at the poster of, say, the defamatory content, and the intermediary decides to remove the content in response to the request, the online intermediary that decided to perform the takedown should publish a record of that removal. To be accepted by an intermediary, third party court orders should be issued by a court of appropriate jurisdiction after an adversarial legal proceeding, contain a certified and specific statement that certain content is unlawful, and specifically identify the content that the court has found to be unlawful, by specific, permalinked URL where possible.&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;This type of court order should be broken out separately from court orders directed at the applicable online intermediary in companies’ transparency reports because merely providing aggregate numbers that do not distinguish between the two types gives an inaccurate impression to users that a government is attempting to censor more content than it actually is. The idea of including first party court orders to remove content as a subcategory of ‘government requests’ is that a government’s judiciary speaks on behalf of the government, making determinations about what is permitted under the laws of that country. This analogy does not hold for court orders directed at third parties- when the court made its determination of legality on the content in question, it did not contemplate that the intermediary would remove the content. As such, the court likely did not weigh the relevant public interest and policy factors that would include the importance of freedom of expression or the precedential value of its decision. Therefore, the determination does not fairly reflect an attempt by the government to censor content and should not be considered as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, and especially considering that these third party court order may be the basis for a number of content removals, third party court orders should be counted separately and presented with some published explanation in the company’s transparency report as to what they are and why the company has decided it should removed content pursuant to its receipt of one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private-Party Requests&lt;/b&gt;&lt;br /&gt;Private-party requests are requests to remove content that are not issued by a government agency or accompanied by a court order. Some examples of private party requests include copyright complaints submitted pursuant to the Digital Millennium Copyright Act or complaints based on the laws of specific countries, such as laws banning holocaust denial in Germany.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Policy/TOS Enforcement&lt;/b&gt;&lt;br /&gt;To give users a complete picture of the content that is being removed from the platforms that they use, corporate transparency reports should also provide information about the content that the intermediary removes pursuant to its own policies or terms of service, though there may not be a legal requirement to do so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;User Data Requests&lt;/b&gt;&lt;br /&gt;While this white paper is squarely focused on liability for content posted online and best practices for deciding when and how content should be removed from online services, corporate transparency reports should also provide information about requests for user data from executive agencies, courts, and others.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle II: Consistency&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;Legal requirements for ISPs should be consistent, based      on a global legal framework that establishes baseline limitations on legal      immunity&lt;br /&gt;Broad variation amongst the legal regimes of the countries in which online intermediaries operate increases compliance costs for companies and may discourage them from offering their services in some countries due to the high costs of localized compliance. Reducing the number of speech platforms that citizens have access to limits their ability to express themselves. Therefore, to ensure that citizens of a particular country have access to a robust range of speech platforms, each country should work to harmonize the requirements that it imposes upon online intermediaries with the requirements of other countries. While a certain degree of variation between what is permitted in one country as compared to another is inevitable, all countries should agree on certain limitations to intermediary liability, such as the following: &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Conduits should be immune from claims about content      that they neither created nor modified&lt;br /&gt;As noted in the 2011 Joint Declaration on Freedom of Expression and the Internet, “[n]o one who simply provides technical Internet services such as providing access, or searching for, or transmission or caching of information, should be liable for content generated by others, which is disseminated using those services, as long as they do not specifically intervene in that content or refuse to obey a court order to remove that content, where they have the capacity to do so (‘mere conduit principle’).”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Court orders should be required for the removal of      content that is related to speech, such as defamation removal requests&lt;br /&gt;In the Center for Democracy and Technology’s Additional Responses Regarding Notice and Action, CDT outlines the case against allowing notice and action procedures to apply to defamation removal requests. They write: &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;“Uniform notice-and-action procedures should not apply horizontally to all types of illegal content. In particular, CDT believes notice-and-takedown is inappropriate for defamation and other areas of law requiring complex legal and factual questions that make private notices especially subject to abuse. Blocking or removing content on the basis of mere allegations of illegality raises serious concerns for free expression and access to information. Hosts are likely to err on the side of caution and comply with most if not all notices they receive, because evaluating notices is burdensome and declining to comply may jeopardize their protection from liability. The risk of legal content being taken down is especially high in cases where assessing the illegality of the content would require detailed factual analysis and careful legal judgments that balance competing fundamental rights and interests. Intermediaries will be extremely reluctant to exercise their own judgment when the legal issues are unclear, and it will be easy for any party submitting a notice to claim a good faith belief that the content in question is unlawful. In short, the murkier the legal analysis, the greater the potential for abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To reduce this risk, removal of or disablement of access to content based on unadjudicated allegations of illegality (i.e., notices from private parties) should be limited to cases where the content at issue is manifestly illegal – and then only with necessary safeguards against abuse as described above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CDT believes that online free expression is best served by narrowing what is considered manifestly illegal and subject to takedown upon private notice. With proper safeguards against abuse, for example, notice-and-action can be an appropriate policy for addressing online copyright infringement. Copyright is an area of law where there is reasonable international consensus regarding what is illegal and where much infringement is straightforward. There can be difficult questions at the margins – for example concerning the applicability of limitations and exceptions such as “fair use” – but much online infringement is not disputable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Quite different considerations apply to the extension of notice-and-action procedures to allegations of defamation or other illegal content. Other areas of law, including defamation, routinely require far more difficult factual and legal determinations. There is greater potential for abuse of notice-and-action where illegality is less manifest and more disputable. If private notices are sufficient to have allegedly defamatory content removed, for example, any person unhappy about something that has been written about him or her would have the ability and incentive to make an allegation of defamation, creating a significant potential for unjustified notices that harm free expression. This and other areas where illegality is more disputable require different approaches to notice and action. In the case of defamation, CDT believes “notice” for purposes of removing or disabling access to content should come only from a competent court after full adjudication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In cases where it would be inappropriate to remove or disable access to content based on untested allegations of illegality, service providers receiving allegations of illegal content may be able to take alternative actions in response to notices. Forwarding notices to the content provider or preserving data necessary to facilitate the initiation of legal proceedings, for example, can pose less risk to content providers’ free expression rights, provided there is sufficient process to allow the content provider to challenge the allegations and assert his or her rights, including the right to speak anonymously.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle III: Clarity&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;All notices that request the removal of content should      be clear and meet certain minimum requirements&lt;br /&gt;The Center for Democracy and Technology outlined requirements for clear notices in a notice and action system in response a European Commission public comment period on a revised notice and action regime.&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; They write:&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;“Notices should include the following features:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Specificity. Notices should be required to specify the      exact location of the material – such as a specific URL – in order to be      valid. This is perhaps the most important requirement, in that it allows      hosts to take targeted action against identified illegal material without      having to engage in burdensome search or monitoring. Notices that demand      the removal of particular content wherever it appears on a site without      specifying any location(s) are not sufficiently precise to enable targeted      action. &lt;/li&gt;
&lt;li&gt;Description of alleged illegal content. Notices should      be required to include a detailed description of the specific content      alleged to be illegal and to make specific reference to the law allegedly      being violated. In the case of copyright, the notice should identify the      specific work or works claimed to be infringed. &lt;/li&gt;
&lt;li&gt;Contact details. Notices should be required to contain      contact information for the sender. This facilitates assessment of      notices’ validity, feedback to senders regarding invalid notices,      sanctions for abusive notices, and communication or legal action between      the sending party and the poster of the material in question. &lt;/li&gt;
&lt;li&gt;Standing: Notices should be issued only by or on behalf      of the party harmed by the content. For copyright, this would be the      rightsholder or an agent acting on the rightsholderʼs behalf. For child      sexual abuse images, a suitable issuer of notice would be a law      enforcement agency or a child abuse hotline with expertise in assessing      such content. For terrorism content, only government agencies would have      standing to submit notice. &lt;/li&gt;
&lt;li&gt;Certification: A sender of a notice should be required      to attest under legal penalty to a good-faith belief that the content      being complained of is in fact illegal; that the information contained in      the notice is accurate; and, if applicable, that the sender either is the      harmed party or is authorized to act on behalf of the harmed party. This      kind of formal certification requirement signals to notice-senders that      they should view misrepresentation or inaccuracies on notices as akin to      making false or inaccurate statements to a court or administrative body. &lt;/li&gt;
&lt;li&gt;Consideration of limitations, exceptions, and defenses:      Senders should be required to certify that they have considered in good faith      whether any limitations, exceptions, or defenses apply to the material in      question. This is particularly relevant for copyright and other areas of      law in which exceptions are specifically described in law. &lt;/li&gt;
&lt;li&gt;An effective appeal and counter-notice mechanism. A      notice-and-action regime should include counter-notice procedures so that      content providers can contest mistaken and abusive notices and have their      content reinstated if its removal was wrongful. &lt;/li&gt;
&lt;li&gt;Penalties for unjustified notices. Senders of erroneous      or abusive notices should face possible sanctions. In the US, senders may      face penalties for knowingly misrepresenting that content is infringing,      but the standard for “knowingly misrepresenting” is quite high and the      provision has rarely been invoked.  A better approach might be to use      a negligence standard, whereby a sender could be held liable for damages      or attorneys’ fees for making negligent misrepresentations (or for      repeatedly making negligent misrepresentations). In addition, the notice-and-action      system should allow content hosts to ignore notices from senders with an      established record of sending erroneous or abusive notices or allow them      to demand more information or assurances in notices from those who have in      the past submitted erroneous notices. (For example, hosts might be deemed      within the safe harbor if they require repeat abusers to specifically      certify that they have actually examined the alleged infringing content      before sending a notice).”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt9"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;
&lt;/ol&gt;
&lt;li style="text-align: justify; "&gt;All ISPs should publish their content removal policies      online and keep them current as they evolve&lt;br /&gt;The UNESCO report states, by way of background, that “[c]ontent restriction practices based on Terms of Service are opaque. How companies remove content based on Terms of Service violations is more opaque than their handling of content removals based on requests from authorized authorities. When content is removed from a platform based on company policy, [our] research found that all companies provide a generic notice of this restriction to the user, but do not provide the reason for the restriction. Furthermore, most companies do not provide notice to the public that the content has been removed. In addition, companies are inconsistently open about removal of accounts and their reasons for doing so.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;There are legitimate reasons why an ISP may want to have policies that permit less content, and a narrower range of content, than is technically permitted under the law, such as maintaining a product that appeals to families. However, if a company is going to go beyond the minimal legal requirements in terms of content that it must restrict, the company should have clear policies that are published online and kept up-to-date to provide its users notice of what content is and is not permitted on the company’s platform. Notice to the user about the types of content that are permitted encourages her to speak freely and helps her to understand why content that she posted was taken down if it must be taken down for violating a company policy.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;When content is removed, a clear notice should be      provided in the product that explains in simple terms that content has      been removed and why&lt;br /&gt;This subsection works in conjunction with “ii,” above. If content is removed for any reason, either pursuant to a legal request or because of a violation of company policy, a user should be able to learn that content was removed if they try to access it. Requiring an on-screen message that explains that content has been removed and why is the post-takedown accompaniment to the pre-takedown published online policy of the online intermediary: both work together to show the user what types of content are and are not permitted on each online platform. Explaining to users why content has been removed in sufficient detail may also spark their curiosity as to the laws or policies that caused the content to be removed, resulting in increased civic engagement in the internet law and policy space, and a community of citizens that demands that the companies and governments it interacts with are more responsive to how it thinks content regulation should work in the online context.&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;The UNESCO report provides the following example of how Google provides notice to its users when a search result is removed, which includes a link to a page hosted by Chilling Effects:&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt11"&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“When search results are removed in response to government or copyright holder demands, a notice describing the number of results removed and the reasons for their removal is displayed to users (see screenshot below) and a copy of the request to the independent non-proft organization ChillingEffects.org, which archives and publishes the request.  When possible the company also contacts the website’s owners.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt12"&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an example of the message that is displayed when Google removes a search result pursuant to a copyright complaint.&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt13"&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Requirements that governments impose on intermediaries      should be as clear and unambiguous as possible&lt;br /&gt;Imposing liability on internet intermediaries without providing clear guidance as to the precise type of content that is not lawful and the precise requirements of a legally sufficient notice encourages intermediaries to over-remove content. As Article 19 noted in its 2013 report on intermediary liability:&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;“International bodies have also criticized ‘notice and takedown’ procedures as they lack a clear legal basis. For example, the 2011 OSCE report on Freedom of Expression on the internet highlighted that: Liability provisions for service providers are not always clear and complex notice and takedown provisions exist for content removal from the Internet within a number of participating States. Approximately 30 participating States have laws based on the EU E-Commerce Directive. However, the EU Directive provisions rather than aligning state level policies, created differences in interpretation during the national implementation process. These differences emerged once the national courts applied the provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These procedures have also been criticized for being unfair. Rather than obtaining a court order requiring the host to remove unlawful material (which, in principle at least, would involve an independent judicial determination that the material is indeed unlawful), hosts are required to act merely on the say-so of a private party or public body. This is problematic because hosts tend to err on the side of caution and therefore take down material that may be perfectly legitimate and lawful. For example, in his report, the UN Special Rapporteur on freedom of expression noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[W]hile a notice-and-takedown system is one way to prevent intermediaries from actively engaging in or encouraging unlawful behavior on their services, it is subject to abuse by both State and private actors. Users who are notiﬁed by the service provider that their content has been ﬂagged as unlawful often has little recourse or few resources to challenge the takedown. Moreover, given that intermediaries may still be held ﬁnancially or in some cases criminally liable if they do not remove content upon receipt of notiﬁcation by users regarding unlawful content, they are inclined to err on the side of safety by overcensoring potentially illegal content. Lack of transparency in the intermediaries’ decision-making process also often obscures discriminatory practices or political pressure affecting the companies’ decisions. Furthermore, intermediaries, as private entities, are not best placed to make the determination of whether a particular content is illegal, which requires careful balancing of competing interests and consideration of defenses.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt14"&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the above, if liability is to be imposed on intermediaries for certain types of unlawful content, the legal requirements that outline what is unlawful content and how to report it must be clear. Lack of clarity in this area will result in over-removal of content by rational intermediaries that want to minimize their legal exposure and compliance costs. Over-removal of content is at odds with the goals of freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNESCO Report made a similar recommendation, stating that; “Governments need to ensure that legal frameworks and company policies are in place to address issues arising out of intermediary liability. These legal frameworks and policies should be contextually adapted and be consistent with a human rights framework and a commitment to due process and fair dealing. Legal and regulatory frameworks should also be precise and grounded in a clear understanding of the technology they are meant to address, removing legal uncertainty that would provide opportunity for abuse.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt15"&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the 2011 Joint Declaration on Freedom of Expression and the Internet states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Consideration should be given to insulating fully other intermediaries, including those mentioned in the preamble, from liability for content generated by others under the same conditions as in paragraph 2(a). At a minimum, intermediaries should not be required to monitor user-generated content and should not be subject to extrajudicial content takedown rules which fail to provide sufficient protection for freedom of expression (which is the case with many of the ‘notice and takedown’ rules currently being applied).”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt16"&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Principle IV: Mindful Community Policy Making&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;“Laws and regulations as well as corporate policies are more likely to be compatible with freedom of expression if they are developed in consultation with all affected stakeholders – particularly those whose free expression rights are known to be at risk.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt17"&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/a&gt; To be effective, policies should be created through a multi-stakeholder consultation process that gives voice to the communities most at risk of being targeted for the information they share online. Further, both companies and governments should embed an ‘outreach to at-risk communities’ step into both legislative and policymaking processes to be especially sure that their voices are heard. Finally, civil society should work to ensure that all relevant stakeholders have a voice in both the creation and revision of policies that affect online intermediaries. In the context of corporate policymaking, civil society can use strategies from activist investing to encourage investors to make the human rights and freedom of expression policies of Internet companies’ part of the calculus that investors use to decide where to place their money. Considering the above;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Human rights impact assessments, considering the impact      of the proposed law or policy on various communities from the perspectives      of gender, sexuality, sexual preference, ethnicity, religion, and freedom      of expression, should be required before:&lt;/li&gt;
&lt;li&gt;New laws are written that govern content issues affecting      ISPs or conduct that occurs primarily online&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;“Protection of online freedom of expression will be strengthened if governments carry out human rights impact assessments to determine how proposed laws or regulations will affect Internet users’ freedom of expression domestically and globally.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt18"&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;li style="text-align: justify; "&gt;Intermediaries enact new policies&lt;br /&gt;“Protection of online freedom of expression will be strengthened if companies carry out human rights impact assessments to determine how their policies, practices, and business operations affect Internet users’ freedom of expression. This assessment process should be anchored in robust engagement with stakeholders whose freedom of expression rights are at greatest risk online, as well as stakeholders who harbor concerns about other human rights affected by online speech.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt19"&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Multi-stakeholder consultation processes should precede      any new legislation that will apply to content issues affecting online      intermediaries or online conduct&lt;br /&gt;“Laws and regulations as well as corporate policies are more likely to be compatible with freedom of expression if they are developed in consultation with all affected stakeholders – particularly those whose free expression rights are known to be at risk.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt20"&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Civil society and public interest groups should      encourage responsible investment in companies who implement policies that      reflect best practices for internet intermediaries&lt;br /&gt;“Over the past thirty years, responsible investors have played a powerful role in incentivizing companies to improve environmental sustainability, supply chain labor practices, and respect for human rights of communities where companies physically operate. Responsible investors can also play a powerful role in incentivizing companies to improve their policies and practices affecting freedom of expression and privacy by developing metrics and criteria for evaluating companies on these issues in the same way that they evaluate companies on other “environmental, social, and governance” criteria.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt21"&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Principle V: Necessity and Proportionality in Content      Restriction&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;Content should only be restricted when there is a legal      basis for doing so, or the removal is performed in accordance with a      clear, published policy of the ISP&lt;br /&gt;As CDT outlined in its 2012 intermediary liability report, “[a]ctions required of intermediaries must be narrowly tailored and proportionate, to protect the fundamental rights of Internet users. Any actions that a safe-harbor regime requires intermediaries to take must be evaluated in terms of the principle of proportionality and their impact on Internet users’ fundamental rights, including rights to freedom of expression, access to information, and protection of personal data. Laws that encourage intermediaries to take down or block certain content have the potential to impair online expression or access to information. Such laws must therefore ensure that the actions they call for are proportional to a legitimate aim, no more restrictive than is required for achievement of the aim, and effective for achieving the aim. In particular, intermediary action requirements should be narrowly drawn, targeting specific unlawful content rather than entire websites or other Internet resources that may support both lawful and unlawful uses.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt22"&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;When content must be restricted, it should be      restricted in the most minimal way possible (i.e., prefer domain removals      to IP-blocking)&lt;br /&gt;There are a number of different ways that access to content can be restricted. Examples include hard deletion of the content from all of a company’s servers, blocking the download of an app or other software program in a particular country, blocking the content on all IP addresses affiliated with a particular country (“IP-Blocking”), removing the content from a particular domain of a product (i.e., removing from a link from the .fr version of a search engine that remains accessible on the .com version), blocking content from a ‘version’ of an online product that is accessible through a ‘country’ or ‘language’ setting on that product, or some combination of the last three options (i.e., an online product that directs the user to a version of the product based on the country that their IP address is coming from, but where the user can alter a URL or manipulate a drop-down menu to show her a different ‘country version’ of the product, providing access to content that may otherwise be inaccessible). &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;While almost all of the different types of content restrictions described above can be circumvented by technical means such as the use of proxies, IP-cloaking, or Tor, the average internet user does not know that these techniques exist, much less how to use them. Of the different types of content restrictions described above, a domain removal, for example, is easier for an individual user to circumvent than IP-Blocked content because you only have to change the URL of the product you are using to, i.e. “.com” to see content that has been locally restricted. To get around an IP-block, you would have to be sufficiently savvy to employ a proxy or cloak your true IP address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the technical means used to restrict access to controversial content has a direct impact on the magnitude of the actual restriction on speech. The more restrictive the technical removal method, the fewer people that will have access to that content. To preserve access to lawful content, online intermediaries should choose the least restrictive means of complying with removal requests, especially when the removal request is based on the law of a particular country that makes certain content unlawful that is not unlawful in other countries. Further, when building new products and services, intermediaries should built in removal capability that minimally restricts access to controversial content.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;If content is restricted due to its illegality in a      particular country, the geographical scope of the content restriction      should be as minimal as possible&lt;br /&gt;Building on the discussion in “ii,” supra, a user should be able to access content that is lawful in her country even if it is not lawful in another country. Different countries have different laws and it is often difficult for intermediaries to determine how to effectively respond to requests and reconcile the inherent conflicts that result. For example, content that denies the holocaust is illegal in certain countries, but not in others. If an intermediary receives a request to remove content based on the laws of a particular country and determines that it will comply because the content is not lawful in that country, it should not restrict access to the content such that it cannot be accessed by users in other countries where the content is lawful. To respond to a request based on the law of a particular country by blocking access to that content for users around the world, or even users of more than one country, essentially allows for extraterritorial application of the laws of the country that the request came from. While it is preferable to standardize and limit the legal requirements imposed on online intermediaries throughout the world, to the extent that this is not possible, the next-best option is to limit the application of laws that are interpreted to declare certain content unlawful to the users that live in that country. Therefore, intermediaries should choose the technical means of content restriction that is most narrowly tailored to limit the geographical scope and impact of the removal.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ability of conduits (telecommunications/internet      service providers) to filter content should be minimized to the extent      technically and legally possible&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;The 2011 Joint Declaration on Freedom of Expression and the Internet made the following points about the dangers of allowing filtering technology:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Mandatory blocking of entire websites, IP addresses, ports, network protocols or types of uses (such as social networking) is an extreme measure – analogous to banning a newspaper or broadcaster – which can only be justified in accordance with international standards, for example where necessary to protect children against sexual abuse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Content filtering systems which are imposed by a government or commercial service provider and which are not end-user controlled are a form of prior censorship and are not justifiable as a restriction on freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Products designed to facilitate end-user filtering should be required to be accompanied by clear information to end-users about how they work and their potential pitfalls in terms of over-inclusive filtering.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt23"&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, filtering at the conduit level is a blunt instrument that should be avoided whenever possible. Similar to how conduits should not be legally responsible for content that they neither host nor modify (the ‘mere conduit’ rule discussed supra), conduits should technically restrict their ability to filter content such that it would be inefficient for government agencies to contact them to have content filtered. Mere conduits are not able to assess the context surrounding the controversial content that they are asked to remove and are therefore not the appropriate party to receive takedown requests. Further, when mere conduits have the technical ability to filter content, they open themselves to pressure from government to exercise that capability. Therefore, mere conduits should limit or not build in the capability to filter content.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Notice and notice, or notice and judicial takedown,      should be preferred to notice and takedown, which should be preferred to      unilateral removal&lt;br /&gt;Mechanisms for content removal that involve intermediaries acting without any oversight or accountability, or those which only respond to the interests of the party requesting removal, are unlikely to do a very good job at balancing public and private interests. A much better balance is likely to be struck through a mechanism where power is distributed between the parties, and/or where an independent and accountable oversight mechanism exists.&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;Considered in this way, there is a continuum of content removal mechanisms that ranges from those are the least balanced and accountable, and those that are more so.  The least accountable is the unilateral removal of content by the intermediary without legal compulsion in response to a request received, without affording the uploader of the content the right to be heard or access to remedy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notice and takedown mechanisms fit next along the continuum, provided that they incorporate, as the DMCA attempts to do, an effective appeal and counter-notice mechanism. However where notice and takedown falls down is that the cost and incentive structure is weighted towards removal of content in the case of doubt or dispute, resulting in more content being taken down and staying down than would be socially optimal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A better balance is likely to be struck by a “notice and notice” regime, which provides strong social incentives for those whose content is reported to be unlawful to remove the content, but does not legally compel them to do so. If legal compulsion is required, a court order must be separately obtained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Canada is an example of a jurisdiction with a notice and notice regime, though limited to copyright content disputes. Although this regime is now established in legislation, it formalizes a previous voluntary regime, whereby major ISPs would forward copyright infringement notifications received from rightsholders to subscribers, but without removing any content and without releasing subscriber data to the rightsholders absent a court order. Under the new legislation additional record-keeping requirements are imposed on ISPs, but otherwise the essential features of the regime remain unchanged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysis of data collected during this voluntary regime indicates that it has been effective in changing the behavior of allegedly infringing subscribers.  A 2010 study by the Entertainment Software Association of Canada (ESAC) found that 71% of notice recipients did not infringe again, whereas a similar 2011 study by Canadian ISP Rogers found 68% only received one notice, and 89% received no more than two notices, with only 1 subscriber in 800,000 receiving numerous notices.&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt24"&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/a&gt; However, in cases where a subscriber has a strong good faith belief that the notice they received was wrong, there is no risk to them in disregarding the erroneous notice – a feature that does not apply to notice and takedown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another similar way in which public and private interests can be balanced is through a notice and judicial takedown regime, whereby the rightsholder who issues a notice about offending content must have it assessed by an independent judicial (or perhaps administrative) authority before the intermediary will respond by taking the content down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of this is found in Chile, again limited to the case of copyright.&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt25"&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/a&gt; In response to its Free Trade Agreement with the United States, the system introduced in 2010 is broadly similar to the DMCA, with the critical difference that intermediaries are not required to take material down in order to benefit from a liability safe harbor, until such time as a court order for removal of the material is made. Responsibility for evaluating the copyright claims made is therefore shifted from intermediaries onto the courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this requirement does impose a burden on the rightsholder, this serves a purpose by disincentivizing the issue of automated or otherwise unjustified notices that are more likely to restrict or chill freedom of expression.  In cases where there is no serious dispute about the legality of the content, it is unlikely that the lawsuit would be defended. In any case, the legislation authorizes the court to issue a preliminary injunction on an ex parte basis, on condition of payment of a bond.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Intermediaries should be allowed to charge for the time      and expense associated with processing legal requests&lt;br /&gt;As an intermediary, it is time consuming and relatively expensive to understand the obligations that each country’s legal regime imposes on you, and to accurately how each legal request should be handled. Especially for intermediaries without many resources, such as forum operators or owners of home Wifi networks, the costs associated with being an intermediary can be prohibitive. Therefore, it should be within their rights to charge for their compliance costs if they are either below a certain user threshold or can show financial necessity in some way.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legal requirements imposed on intermediaries should be      a floor, not a ceiling- ISPs can adopt more restrictive policies to more      effectively serve their users as long as they have published policies that      explain what they are doing&lt;br /&gt;The Internet has space for a wide range of platforms and applications directed to different communities, with different needs and desires. A social networking site directed at children, for example, may reasonably want to have policies that are much more restrictive than a political discussion board. Therefore, legal requirements that compel intermediaries to take down content should be seen as a ‘floor,’ but not a ‘ceiling’ on the range and quantity that of content those intermediaries may remove. Intermediaries should retain control over their own policies as long as they are transparent about what those policies are, what type of content the intermediary removes, and why they removed certain pieces of content. &lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Principle VI: Privacy&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;It is important to protect the ability of Internet users to speak by narrowing and making less ambiguous the range of content that intermediaries can be held liable for, but it is also very important to make users feel comfortable sharing their view by ensuring that their privacy is protected. Protecting the user’s ability to share her views, especially when those views are controversial or have a direct bearing on important political issues, requires that the user can trust the intermediaries that she uses. This concept can be further broken down into three sub-principles:&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The user’s personal information should be protected to      the greatest extent possible given the state of the art in encryption,      security, and policy&lt;br /&gt;Users will be less willing to speak on important topics if they have legitimate concerns that their data may be taken from them. As stated in the UNESCO Report, “[b]ecause of the amount of personal information held by companies and ability to access the same, a company’s practices around collection, access, disclosure, and retention are key. To a large extent a service provider’s privacy practices are influenced by applicable law and operating licenses required by the host government. These can include requirements for service providers to verify subscribers, collect and retain subscriber location data, and cooperate with law enforcement when requested. Outcome: The implications of companies trying to balance a user’s expectation for privacy with a government’s expectation for cooperation can be serious and are inadequately managed in all jurisdictions studied.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt26"&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Where possible, ISPs should help to preserve the user’s      right to speak anonymously&lt;br /&gt;An important aspect of an Internet user’s ability to exercise her right to free expression online is ability to speak anonymously. Anonymous speech is one of the great advances of the Internet as a communications medium and should be preserved to the extent possible. As noted by special rapporteur Frank LaRue, “[i]n order for individuals to exercise their right to privacy in communications, they must be able to ensure that these remain private, secure and, if they choose, anonymous. Privacy of communications infers that individuals are able to exchange information and ideas in a space that is beyond the reach of other members of society, the private sector, and ultimately the State itself. Security of communications means that individuals should be able to verify that only their intended recipients, without interference or alteration, receive their communications and that the communications they receive are equally free from intrusion. Anonymity of communications is one of the most important advances enabled by the Internet, and allows individuals to express themselves freely without fear of retribution or condemnation.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The user’s PII should never be sold or used without her      consent, and she should always know what is being done with it via an      easily comprehensible dashboard&lt;br /&gt;The user’s trust in the online platform that she uses and relies upon is influenced not only by the relationships the intermediary maintains with the government, but also with other commercial entities. A user, who feels that her data will be constantly shared with third parties, perhaps without her consent and/or for marketing purposes, will never feel like she is able to freely express her opinion. Therefore, it is the intermediary’s responsibility to ensure that its users know exactly what information it retains about them, who it shares that information with and under what circumstances, and how to change the way that her data is shared. All of this information should be available on a dashboard that is comprehensible to the average user, and which gives her the ability to easily modify or withdraw her consent to the way her data is being shared, or the amount of data, or specific data, that the intermediary is retaining about her.&lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Principle VII: Access to Remedy&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;As noted in the UNESCO Report, “Remedy is the third central pillar of the UN Guiding Principles on Business and Human Rights, placing an obligation both on governments and on companies to provide individuals access to effective remedy. This area is where both governments and companies are almost consistently lacking. Across intermediary types, across jurisdictions and across the types of restriction, individuals whose content is restricted and individuals who wish to access such content are offered little or no effective recourse to appeal restriction decisions, whether in response to government orders, third party requests or in accordance with company policy. There are no private grievance or due process mechanisms that are clearly communicated and readily available to all users, or consistently applied.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt28"&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Any notice and takedown system is subject to abuse, and any company policy that results in the removal of content is subject to mistaken or inaccurate takedowns, both of which are substantial problems that can only be remedied by the ability for users to let the intermediary know when the intermediary improperly removed a specific piece of content and the technical and procedural ability of the intermediary to put the content back. However, the technical ability to reinstate content that was improperly removed may conflict with data retention laws. This conflict should be explored in more detail. In general, however, every time content is removed, there should be:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;A clear mechanism through which users can request      reinstatement of content&lt;br /&gt;When an intermediary decides to remove content, it should be immediately clear to the user that content has been removed and why it was removed (see discussion of in-product notice, supra). If the user disagrees with the content removal decision, there should be an obvious, online method for her to request reinstatement of the content.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reinstatement of content should be technically possible&lt;br /&gt;When intermediaries (who are subject to intermediary liability) are building new products, they should build the capability to remove content into the product with a high degree of specificity so as to allow for narrowly tailored content removals when a removal is legally required. Relatedly, all online intermediaries should build the capability to reinstate content into their products while maintaining compliance with data retention laws.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Intermediaries should have policies and procedures in      place to handle reinstatement requests&lt;br /&gt;Between the front end (online mechanism to request reinstatement of content) and the backend (technical ability to reinstate content) is the necessary middle layer, which consists of the intermediary’s internal policies and processes that allow for valid reinstatement requests to be assessed and acted upon. In line with the corporate ‘responsibility to respect’ human rights, and considered along with the human rights principle of ‘access to remedy,’ intermediaries should have a system in place from the time that an online product launches to ensure that reinstatement requests can be made and will be processed quickly and appropriately.&lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Principle VIII: Accountability&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;Governments must ensure that independent, transparent,      and impartial accountability mechanisms exist to verify the practices of      government and companies with regards to managing content created online&lt;br /&gt;“While it is important that companies make commitments to core principles on freedom of expression and privacy, make efforts to implement those principles through transparency, policy advocacy, and human rights impact assessments, it is also important that companies take these steps in a manner that is accountable to stakeholders. One way of doing this is by committing to external third party assurance to verify that their policies and practices are being implemented to a meaningful standard, with acceptable consistency wherever their service is offered. Such assurance gains further public credibility when carried out with the supervision and affirmation of multiple stakeholders including civil society groups, academics, and responsible investors. The Global Network Initiative provides one such mechanism for public accountability.  Companies not currently participating in GNI, or a process of similar rigor and multi-stakeholder involvement, should be urged by users, investors, and regulators to do so.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt29"&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Civil society should encourage comparative studies      between countries and between ISPs with regards to their content removal      practices to identify best practices&lt;br /&gt;Civil society has the unique ability to look longitudinally across this issue to determine and compare how different intermediaries and governments are responding to content removal requests. Without information about how other governments and intermediaries are handling these issues, it will be difficult for each government or intermediary to learn how to improve its laws or policies. Therefore, civil society has an important role to play in the process of creating increasingly better human rights outcomes for online platforms by performing and sharing ongoing, comparative research.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Civil society should establish best practices and      benchmarks against which ISPs and government can be measured, and should      track governments and ISPs over time in public reports&lt;br /&gt;“A number of projects that seek, define and implement indicators and benchmarks for governments or companies are either in development (examples include: UNESCO’s Indicators of Internet Development project examining country performance, Ranking Digital Rights focusing on companies) or already in operation (examples include the Web Foundation’s Web Index, Freedom House’s Internet Freedom Index, etc.). The emergence of credible, widely-used benchmarks and indicators that enable measurement of country and company performance on freedom of expression will help to inform policy, practice, stakeholder engagement processes, and advocacy.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt30"&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;h3 style="text-align: justify; "&gt;Principle IX: Due Process - In Both Legal and Private      Enforcement&lt;/h3&gt;
&lt;li style="text-align: justify; "&gt;ISPs should always consider context before removing      content and Governments and courts should always consider context before      ordering that certain content be removed&lt;br /&gt;“Governments need to ensure that legal frameworks and company policies are in place to address issues arising out of intermediary liability. These legal frameworks and policies should be contextually adapted and be consistent with a human rights framework and a commitment to due process and fair dealing. Legal and regulatory frameworks should also be precise and grounded in a clear understanding of the technology they are meant to address, removing legal uncertainty that would provide opportunity for abuse.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt31"&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Principles for Courts&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;An independent and impartial judiciary exists, at least in part, to preserve the citizen’s due process rights. Many have called for an increased reliance on courts to make determinations about the legality of content posted online in order to both shift the censorship function from unaccountable private actors and to ensure that courts only order the removal of content that is actually unlawful. However, when courts do not have an adequate technical understanding of how content is created and shared on the internet, the rights of the intermediaries that facilitate the posting of the content, and who should be ordered to remove unlawful content, they do not add value to the online ecosystem. Therefore, courts should keep certain principles in mind to preserve the due process rights of the users that post content and the intermediaries that host the content.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Preserve due process for intermediaries- do not order      them to do something before giving them notice and the opportunity to      appear before the court&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;In a dispute between two private parties over a specific piece of content posted online, it may appear to the court that the easy solution is to order the intermediary who hosts the content to remove it. However, this approach does not extend any due process protections to the intermediary and does not adequately reflect the intermediary's status as something other than the creator of the content. If a court feels that it is necessary for an intermediary to intervene in a legal proceeding between two private parties, the court should provide the intermediary with proper notice and give them the opportunity to appear before the court before issuing any orders.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Necessity and proportionality of judicial      determinations- judicial orders determining the illegality of specific      content should be narrowly tailored to avoid over-removal of content &lt;/li&gt;
&lt;p style="text-align: justify; "&gt;With regards to government removal requests, the UNESCO Report notes that “[o]ver-broad law and heavy liability regimes cause intermediaries to over-comply with government requests in ways that compromise users’ right to freedom of expression, or broadly restrict content in anticipation of government demands even if demands are never received and if the content could potentially be found legitimate even in a domestic court of law.”&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt32"&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/a&gt; Courts should follow the same principle: only order the removal of the bare minimum of content that is necessary to remedy the harm identified and nothing more.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Courts should clarify whether ISPs have to remove      content in response to court orders directed to third parties, or only      have to remove content when directly ordered to do so (first party court      orders) after an adversarial proceeding to which the ISP was a party&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;See discussion of the difference between first party and third party court orders (supra, section a., “Transparency”). Ideally, any decision that courts reach on this issue would be consistent across different countries.&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;Questions- related unresolved issues that should be      kicked to the larger group&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;How should the conflict between access to remedy and      data retention laws that say content must be hard deleted after a certain      period of time be resolved?  I think the access to remedy has to be      subordinated to the data protection laws. Let's make that our draft      position, but continue to flag it for discussion.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Should ISPs have to remove      content in response to court orders directed to third parties, or only      have to remove content when directly ordered to do so (first party court      orders) after an adversarial proceeding to which the ISP was a party?       I think first party orders.  Let's make that our draft      position, but continue to flag it for discussion.&lt;/li&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref1"&gt;[1]&lt;/a&gt; Center for Democracy and Technology, Shielding the Messengers: Protecting Platforms for Expression and Innovation at 4-15 (Version 2, 2012), available at &lt;a href="https://www.google.com/url?q=https%3A%2F%2Fwww.cdt.org%2Ffiles%2Fpdfs%2FCDT-Intermediary-Liability-2012.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNHNG5ji0HEiYXyelfwwK8qTCgOHiw"&gt;https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf&lt;/a&gt; (see pp.4-15 for an explanation of these different models and the pros and cons of each).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref2"&gt;[2]&lt;/a&gt; UNESCO, “Fostering Freedom Online: The Roles, Challenges, and Obstacles of Internet Intermediaries” at 6-7 (Draft Version, June 16th, 2014) (Hereinafter “UNESCO Report”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref3"&gt;[3]&lt;/a&gt; UNESCO Report at 56.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref4"&gt;[4]&lt;/a&gt; UNESCO Report at 37.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref5"&gt;[5]&lt;/a&gt; Center for Democracy and Technology, Additional Responses Regarding Notice and Action, Available at https://www.cdt.org/files/file/CDT%20N&amp;amp;A%20supplement.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref6"&gt;[6]&lt;/a&gt; The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information, Article 19, Global Campaign for Free Expression, and the Centre for Law and Democracy, JOINT DECLARATION ON FREEDOM OF EXPRESSION AND THE INTERNET at 2 (2011), available at &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.osce.org%2Ffom%2F78309&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNF8QmlhRMreM_BT0Eyfrw_J7ZdTGg"&gt;http://www.osce.org/fom/78309&lt;/a&gt; (Hereinafter “Joint Declaration on Freedom of Expression).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref7"&gt;[7]&lt;/a&gt; Center for Democracy and Technology, Additional Responses Regarding Notice and Action, Available at https://www.cdt.org/files/file/CDT%20N&amp;amp;A%20supplement.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref8"&gt;[8]&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref9"&gt;[9]&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref10"&gt;[10]&lt;/a&gt; UNESCO Report at 113-14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref11"&gt;[11]&lt;/a&gt; ‘Chilling Effects’ is a website that allows recipients of ‘cease and desist’ notices to submit the notice to the site and receive information about their legal rights. For more information about ‘Chilling Effects’ see: http://www.chillingeffects.org.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref12"&gt;[12]&lt;/a&gt; Id. at 73. You can see an example of a complaint published on Chilling Effects at the following location. “DtecNet DMCA (Copyright) Complaint to Google,” Chilling Effects Clearinghouse, March 12, 2013, www.chillingeffects.org/notice.cgi?sID=841442.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref13"&gt;[13]&lt;/a&gt; UNESCO Report at 73.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref14"&gt;[14]&lt;/a&gt; Article 19, Internet Intermediaries: Dilemma of Liability (2013), available at http://www.article19.org/data/files/Intermediaries_ENGLISH.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref15"&gt;[15]&lt;/a&gt; UNESCO Report at 120.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref16"&gt;[16]&lt;/a&gt; Joint Declaration on Freedom of Expression and the Internet at 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref17"&gt;[17]&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref18"&gt;[18]&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref19"&gt;[19]&lt;/a&gt; Id. at 121.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref20"&gt;[20]&lt;/a&gt; Id. at 104.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref21"&gt;[21]&lt;/a&gt; Id. at 122.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref22"&gt;[22]&lt;/a&gt; Center for Democracy and Technology, Shielding the Messengers: Protecting Platforms for Expression and Innovation at 12 (Version 2, 2012), available at https://www.cdt.org/files/pdfs/CDT-Intermediary-Liability-2012.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref23"&gt;[23]&lt;/a&gt; Joint Declaration on Freedom of Expression at 2-3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref24"&gt;[24]&lt;/a&gt; Geist, Michael, Rogers Provides New Evidence on Effectiveness of Notice-and-Notice System (2011), available at http://www.michaelgeist.ca/2011/03/effectiveness-of-notice-and-notice/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref25"&gt;[25]&lt;/a&gt; Center for Democracy and Technology, Chile’s Notice-and-Takedown System for Copyright Protection: An Alternative Approach (2012), available at https://www.cdt.org/files/pdfs/Chile-notice-takedown.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref26"&gt;[26]&lt;/a&gt; UNESCO Report at 54.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref27"&gt;[27]&lt;/a&gt; “Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue (A/HRC/23/40),” United Nations Human Rights, 17 April 2013, http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf, § 24, p. 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref28"&gt;[28]&lt;/a&gt; UNESCO Report at 118.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref29"&gt;[29]&lt;/a&gt; UNESCO Report at 122.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref30"&gt;[30]&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref31"&gt;[31]&lt;/a&gt; UNESCO Report at 120.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://docs.google.com/document/d/1S3pSuo49pqI7gIxP0-ogmVstk7EEnPRs2MPX7ncxrmc/pub#ftnt_ref32"&gt;[32]&lt;/a&gt; Id. at 119.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper'&gt;http://editors.cis-india.org/internet-governance/blog/zero-draft-of-content-removal-best-practices-white-paper&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2014-09-10T07:11:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/news/northeast-now-may-17-2019-youths-come-forward-to-augment-assamese-wikisource-project">
    <title>Youths come forward to augment Assamese Wikisource project</title>
    <link>http://editors.cis-india.org/a2k/news/northeast-now-may-17-2019-youths-come-forward-to-augment-assamese-wikisource-project</link>
    <description>
        &lt;b&gt;Assamese Wikisource is a sister-project of Assamese Wikipedia, where Assamese books with expired copyrights are available.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published in &lt;a class="external-link" href="https://nenow.in/north-east-news/youths-come-forward-to-augment-assamese-wikisource-project.html"&gt;NE NOW NEWS&lt;/a&gt; on May 17, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In order to take the &lt;a href="https://nenow.in/north-east-news/assam/assam-cm-welcomes-decision-to-include-assamese-language-in-kvs.html"&gt;Assamese&lt;/a&gt; Wikisource project forward, few young men and women of the state involving in different fields, recently gathered in Guwahati to attend a workshop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Assamese Wikisource is a sister-project of Assamese &lt;a href="https://nenow.in/north-east-news/tripura/tripura-cm.html"&gt;Wikipedia&lt;/a&gt;, where Assamese books with expired copyrights are available. The project owned by Wikimedia Foundation was launched in 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A total of 14 volunteers from across the state participated in the workshop hosted by Centre for Internet and Society-Access to knowledge (CIS-A2K) in a city hotel.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two experts–Jayanta Nath from Kolkata and Tito Dutta from Bangalore–were present as trainers for the workshop, say organisers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two-day event was coordinated by Gitartha Bordoloi, a physician based in Silchar and the administrator of Assamese Wikipedia and Wikisource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Wikisource sources hosts books, plays, lyrics, letters etc which are available in open source,” says an organiser.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;PDF or similar files are added to Wikisource which are then converted to unicode form so that every information becomes searchable on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to books that are hitherto copyright free, new books can also be donated by authors and can be added to the field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Everyone can access and contribute to this collaborative project. Presently, Assamese Wikisource stands at ninth position out of eleven Indic languages. This can be due to less Wikisource projects and also lack of contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the basic navigation on Wikisource, the participants learnt searching and uploading public domain works, using OCR to get the texts, correcting errors and creating final product for the readers, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a part of the workshop, the participants fully digitised three old Assamese books within a few hours. They also discussed the future aims, perspectives and goals of Assamese Wikipedia and Wikisource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As a result of their persistent efforts, works of &lt;a href="https://nenow.in/north-east-news/assam/satriya-exponent-basistha-dev-sarma-gets-srimanta-sankardev-award.html"&gt;Srimanta Sankardev&lt;/a&gt; and Madhabdev, &lt;a href="https://nenow.in/north-east-news/assam/assam-renovation-for-assamese-writer-lakshminath-bezbaroas-house-begins.html"&gt;Lakshminath Bezbaroa&lt;/a&gt;, Jyotiprasad Agarwala, Rajanikanta Bordoloi, Hiteshwar Barbarua and some others are now available on Assamese Wikisource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the target of digitizing the books by an author in every one or two months, the volunteers have mulled to digitize the works of Padmanath Gohain Baruah, a luminary of Assamese literature.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/news/northeast-now-may-17-2019-youths-come-forward-to-augment-assamese-wikisource-project'&gt;http://editors.cis-india.org/a2k/news/northeast-now-may-17-2019-youths-come-forward-to-augment-assamese-wikisource-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>NE NOW NEWS</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2019-05-21T16:03:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/cyber-space-hackers-paradise">
    <title>Your cyber space is a hackers paradise</title>
    <link>http://editors.cis-india.org/news/cyber-space-hackers-paradise</link>
    <description>
        &lt;b&gt;It Looks like hackers are having a ball targeting all kinds of websites — gaming, news, government, personal email and even those run by terror networks, writes Shayan Ghosh. The article was published in Mail Today on June 6, 2011.&lt;/b&gt;
        
&lt;p&gt;After Sony PlayStation Network and Gmail breaches this week, the latest is an attack on Sony Pictures.&lt;/p&gt;
&lt;p&gt;The hackers who broke into the Sony Pictures website have collected private information such as passwords and email identities.&lt;/p&gt;
&lt;p&gt;"A group of criminal hackers known as LulzSec claimed to have breached some of our websites," CEO of Sony Pictures Entertainment Michael Lynton said.&lt;/p&gt;
&lt;p&gt;LulzSec, involved in the hacking of several leading US media firms last month, however, has another story to tell. The group blamed Sony Pictures for carelessness.&lt;br /&gt;&lt;br /&gt;"Every bit of data we took wasnt encrypted. Sony stored over 10 lakh passwords of its customers in plaintext, which means it is just a matter of taking it." "We broke into SonyPictures. com and compromised over 10 lakh users personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony data associated with their accounts.&lt;/p&gt;
&lt;p&gt;Among other things, we also compromised all administration details of Sony Pictures ( including passwords) along with 75,000 music codes and 3.5 million coupons", the group said in a post on Pastebin. com . Google mail, too, was breached this week and the hackers gained access to email accounts of hundreds of people, including senior US government officials and journalists. Google confirmed that Gmail accounts were hacked." We recently uncovered a campaign to collect user passwords, likely through phishing,” the search, cloud and net tech giant said on its blog.&lt;/p&gt;
&lt;p&gt;Asked about reports that Gmail accounts of some Indian diplomats based in China had been hacked, Google declined to comment, saying it had no data of any specific people whose accounts have been hacked.&lt;/p&gt;
&lt;p&gt;But the company pointed fingers at China.&lt;/p&gt;
&lt;p&gt;"This campaign, which appears to originate from Jinan in China, affected what seem to be the personal Gmail accounts of hundreds of users, including senior US government officials, Chinese political activists, officials in several Asian countries ( predominantly South Korea), military personnel and journalists, among others," a posting on the companys official blog said.&lt;/p&gt;
&lt;p&gt;Indian experts, too, blame Chinese hackers. "China poses a serious threat to our national security as these hacking issues dont just seem to stop," Ahmedabadbased cybercrime consultant Sunny Vaghela said.&lt;/p&gt;
&lt;p&gt;The hackers probably targeted Gmail because of the number of users they have, Vaghela added.&lt;/p&gt;
&lt;p&gt;All regimes have now started implementing surveillance mechanisms on the Internet. This is a disturbing trend all over the world.&lt;/p&gt;
&lt;p&gt;China has supremacy on it mainly because they are an early adopter of Internet surveillance and content filtering mechanisms,” a software consultant based in Bangalore, Anivar Aravind, said.&lt;/p&gt;
&lt;p&gt;"Its become more about proving a point. Hackers want to tell people that I can hack into your system and show its vulnerability," Center for Internet and Society director of research in Bangalore Nishant Shah said.&lt;/p&gt;
&lt;p&gt;But LulzSec has its own logic: "Our goal here is not to come across as master hackers… Why do you put such faith in a company that allows itself to become open to these simple attacks?"&lt;/p&gt;
&lt;p&gt;Online Safety Measures&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Secure your Email:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Change passwords often&lt;/li&gt;&lt;li&gt;Use the Gmail feature to check your “ last account activity”. It shows the IP address ( denoting a specific computer) used to access your email &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Do not open unknown email attachments&lt;/li&gt;&lt;li&gt;Do not store sensitive and personal data in email accounts&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Things to Avoid&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Do not visit unknown sites; Use different passwords for different accounts&amp;nbsp;&lt;/li&gt;&lt;li&gt;Do not divulge credit card numbers over emails or on social networks&amp;nbsp;&lt;/li&gt;&lt;li&gt;Keep track of your credit/ debit card account&amp;nbsp;&lt;/li&gt;&lt;li&gt;For online transactions use encrypted websites. Look for SSL certificate or padlock icon&lt;br /&gt;&lt;br /&gt;Read the original published by Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/showstory.aspx?queryed=9&amp;amp;querypage=22&amp;amp;boxid=315562&amp;amp;parentid=54412&amp;amp;eddate=Jun%20%206%202011%2012:00AM&amp;amp;issuedate=NaNundefinedundefined"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/cyber-space-hackers-paradise'&gt;http://editors.cis-india.org/news/cyber-space-hackers-paradise&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-23T00:58:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making">
    <title>Yogyakarta Meeting on Open Culture and Critical Making</title>
    <link>http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram will be part of the ASIA LABS theme panel and will also be doing community FOSS/FOSH workshops at the Maker events at the event organized by HONF Foundation, Catec, and r0g from June 12 to 15, 2014. &lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;Venues : Langgeng Art Foundation (LAF) , Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;b&gt;&lt;br /&gt; 03.00pm – 05.30pm (FABLAB_OD24h):&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Opening Workshop at HONFablab (Fablab Yogyakarta)&lt;/span&gt;&lt;br /&gt; &lt;b&gt;&lt;span&gt;DrawDio Workshop by Helmi Hardian (WAFT, SBY)&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;OPENING | 12 June 2014&lt;/b&gt;&lt;br /&gt; 07.00 PM at Langgeng Art Foundation (LAF) Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 07.15pm :&lt;/b&gt;&lt;br /&gt; Opening Performance, by Dream Orchestra&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.15pm – 07.45pm: Welcome Speech and Outline:&lt;/b&gt;&lt;br /&gt; - Ilham Habibie (The Habibie Center, CATEC)&lt;br /&gt; - Stephen Kovats (r0g_)&lt;br /&gt; - Venzha Christ (HONF Foundation) and presents:&lt;br /&gt; - Bapak Muchsan. (Rector of Widya Mataram Univ.)&lt;br /&gt; - Bapak. J. Eka Prijatma (Rector of Sanata Dharma Univ.)&lt;br /&gt; - Gregorius Subanar (Sanata Dharma University)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 08.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Screening Movie “DO TIMI MAKE SINDI”&lt;/b&gt;&lt;br /&gt; Speech: Gentur Suria (Movie Director)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Opening Exhibition “DO! MAKE!”&lt;/b&gt;&lt;br /&gt; Speech: Irene Agrivina (Exhibition Curator)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.30pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Collaborative Visual and Sound Performance by:&lt;/b&gt;&lt;br /&gt; - Felix Deufel and Friends (DE)&lt;br /&gt; - DJ Wok The Rock (YK)&lt;br /&gt; - DJ Haman &amp;amp; DJ Ones (YK)&lt;/p&gt;
&lt;p&gt;Welcoming Dinner&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Session 1.0&lt;/b&gt;&lt;br /&gt; Introduction-get together&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 12 June 2014 | 11.00pm – 12.00pm&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Intelligent Furniture Workshop by DORXLab&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#01 | 13 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Side Event:&lt;b&gt;&lt;br /&gt; &lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; 13 June 2014 | 09.00am – 11.00am&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Edible Book Workshop by Saad Chinoy&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] A &lt;/b&gt;&lt;br /&gt; Opening Speech&lt;br /&gt; &lt;b&gt;Introduction to [proto:type] Y2014 Yogyakarta Meeting of Open Culture and Critical Making&lt;/b&gt;&lt;br /&gt; Technology and Society&lt;br /&gt; by Ilham Habibie (The Habibie Center, CATEC)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00am – 11.30:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session I&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open System and Critical ICT4D”&lt;/b&gt;&lt;br /&gt; Moderator: Gregorius Subanar&lt;br /&gt; Panelist:&lt;br /&gt; - Craig Warren Smith&lt;br /&gt; - Etiene Turpin&lt;br /&gt; - Eku Wand&lt;br /&gt; - Sanata Dharma ICT4D&lt;br /&gt; - Yantisa Akhadi&lt;/p&gt;
&lt;p&gt;11.45am – 12.30pm:&lt;br /&gt; Break | Friday Prayer&lt;/p&gt;
&lt;p&gt;12.30pm – 01.15pm:&lt;br /&gt; Open Cultures/P2P Intro &amp;amp; Lunch&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Sticthing on Plywood session I by Maken Living Indonesia&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;01.30pm – 03.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] B Session II&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Open Design and Critical Making”&lt;/b&gt;&lt;br /&gt; Moderator: Bertha Bintari&lt;br /&gt; Panelist:&lt;br /&gt; - Deanna Herst&lt;br /&gt; - Steve McCoy&lt;br /&gt; - Jean Nöel Montagne&lt;br /&gt; - Stefania Druga&lt;br /&gt; - Yoyok Wahyudi Subroto&lt;br /&gt; - Enda Nasution&lt;br /&gt; - Matt Rato (live stream)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 02.00pm – 04.00pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Fun with Arduino Workshop by Yudianto Asmoro&lt;/span&gt; &lt;span&gt;03.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Afternoon Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Noise2Noise Workshop by Felix Deufel&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Critical Cocktail Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] C Session III&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Asia Labs”&lt;/b&gt;&lt;br /&gt; Moderator: Argha Mahendra&lt;br /&gt; Panelist:&lt;br /&gt; - Tommy Surya (Fablab Asia Network)&lt;br /&gt; - Jay Fajardo (Launch Garage – SEA Labs)&lt;br /&gt; - Irene Agrivina (HONF)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; 04.00pm – 05.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt; Make! with 3D Printer workshop by Weissa Adhiprasetya&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;05.00pm – 05.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] D Session IV&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Community Development Forum”&lt;/b&gt;&lt;br /&gt; 05.00pm – 05.30pm: Session 4.1 “Open Ecology and Sustainable”&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Performance Klub&lt;br /&gt; - Rumah Kardus&lt;br /&gt; - DORXLab&lt;/p&gt;
&lt;p&gt;05.30pm: Break | Maghrib | Dawn Pray&lt;/p&gt;
&lt;p&gt;06.00pm – 06.30pm: Session 4.2 “(H)acktivism as an open solution&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - XXLab&lt;br /&gt; - WAFT&lt;br /&gt; - LPTI Pelataran Mataram&lt;/p&gt;
&lt;p&gt;06.30pm – 07.00pm: Session 4.3: Citizen participation for social change&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - Hysteria&lt;br /&gt; - C2O&lt;br /&gt; - Explainer Maker&lt;/p&gt;
&lt;p&gt;07.00pm – 07.45pm: Session 4.4: Development at the Entrepreneurial &amp;amp; Grassroots Level&lt;br /&gt; 10 mins presentation for each presenter:&lt;br /&gt; - House The House&lt;br /&gt; - Klub Makan Siang&lt;br /&gt; - Jalan Emas&lt;br /&gt; - Technonatura&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.45pm: Jalan Emas Documentation&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 09.30pm: &lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] DINNER: MEET &amp;amp; GREET&lt;/b&gt;&lt;br /&gt; Venue: Ndalem Kaneman, Widya Mataram University&lt;br /&gt; Gamelan and performance by Among Bekso Dance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; &lt;span&gt;09.00pm – 11.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Midnight Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; &lt;/b&gt;Fun with Electronics Workshop by Satya Anindita&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.00pm – 12.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;FAB BAR&lt;/b&gt;&lt;br /&gt; venue: HONFablab (Fablab Yogyakarta)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;CONFERENCE DAY#02 | 14 June 2014&lt;br /&gt; &lt;/b&gt;at Ndalem Mangkubumen, Widya Mataram University&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00am – 09.15am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;15 mins Body and Mind Excercise&lt;/b&gt;&lt;br /&gt; short meditation by Craig Warren Smith&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;br /&gt; side event:&lt;br /&gt; 09.00am – 10.30am:&lt;br /&gt; &lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Morning Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Explainer Maker by Andre Takdare&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;10.00am – 01.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;Sticthing on Plywood session II by Maken Living Indonesia&lt;/span&gt;&lt;br /&gt; &lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] E Session V&lt;/b&gt;&lt;br /&gt; &lt;b&gt;“Y2014 to Y2015 Summit of Critical Making 2015″&lt;/b&gt;&lt;br /&gt; Introduction to [proto:type] Y2014 and toward Y2015 by Stephen Kovats ￼&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.30am – 10.30am:&lt;br /&gt; &lt;/b&gt;&lt;b&gt;[proto:type] F Session VI&lt;br /&gt; “Open Knowledge as a Platform of Sharing”&lt;br /&gt; &lt;/b&gt;Moderator: Wan Zaleha Radzi&lt;br /&gt; Panelist:&lt;br /&gt; - Elisa Anggraeni&lt;br /&gt; - Yuka Narendra&lt;br /&gt; - Saa￼d Chinoy&lt;br /&gt; - Edin Khoo&lt;br /&gt; - Tia Pamungkas&lt;br /&gt; - Inasanti Susanto&lt;/p&gt;
&lt;p&gt;&lt;b&gt;12.00pm – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; 12.00pm – 02.30:&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;b&gt;(FABLAB_OD24h):&lt;/b&gt;&lt;br /&gt; Closing FABLAB_OD24h Workshop at HONFablab (Fablab Yogyakarta)&lt;br /&gt; Introduction to Raspberry Pi by Tommy Surya&lt;br /&gt; &lt;/b&gt;————————&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.30pm – 03.00pm&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] F Session VII&lt;br /&gt; ￼￼”Maker Culture: Of Fields and Labs”&lt;br /&gt; &lt;/b&gt;Moderator: Venzha Christ&lt;br /&gt; Panelist:&lt;br /&gt; - Jeong ok Jeon&lt;br /&gt; - Amrin Hakim&lt;br /&gt; - Marton Kocsev&lt;br /&gt; - Gustaff Hariman Iskandar&lt;br /&gt; - Diyanto Imam&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;side event:&lt;br /&gt; 02.00pm – 03.30pm:&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;Open Workshop at Makers Booth&lt;/b&gt;, Limasan Ndalem Mangkubumen, Widya Mataram University&lt;/span&gt;&lt;br /&gt; &lt;span&gt;DIY BioPlastic Workshop by Irene Agrivina&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;[proto:type] G Session VIII&lt;br /&gt; &lt;/b&gt;Closing speech by Venzha Christ&lt;/p&gt;
&lt;p&gt;–move to Makers Camp–&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#01&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;br /&gt; &lt;b&gt;02.00pm – 03.30pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#01&lt;/b&gt;&lt;br /&gt; Hackidemia Workshop by Stefania Druga&lt;/p&gt;
&lt;p&gt;&lt;b&gt;04.00pm – 05.00pm:&lt;br /&gt; Break&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Traditional Music Performance&lt;/b&gt;&lt;br /&gt; by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;06.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#02&lt;/b&gt;&lt;br /&gt; DIY Organic Subs Workshop by Blah!&lt;/p&gt;
&lt;p&gt;&lt;b&gt;08.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshop#03&lt;/b&gt;&lt;br /&gt; How to Make Ceramics Workshop by Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;03.00pm – 01.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellsDISCO!&lt;/b&gt;&lt;br /&gt; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ Noor  (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ Felix (DE).  DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;09.00pm – 10.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;MAKERS CAMP DAY#02&lt;/b&gt;&lt;br /&gt; Venue: Tembi Village Yogyakarta&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00am – 09.00am:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Breakfast&lt;/b&gt;&lt;br /&gt; Breakfast is served in traditional way of Tembi&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.00am – 01.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#03: DIY Batik by Tembi Village&lt;/p&gt;
&lt;p&gt;Workshop#04: Open Source Hardware by Yudianto Asmoro&lt;/p&gt;
&lt;p&gt;Workshop#05: Body Hacking by Iwan Wijono&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;01.00pm – 02.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Lunch Break&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;02.00pm – 04.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Workshops:&lt;/b&gt;&lt;br /&gt; Workshop#06: OS Wash Workshop by Jean Nöel Montagne&lt;/p&gt;
&lt;p&gt;Workshop#07: DIY Greenhouse with Automatic Light by Irene Agrivina&lt;/p&gt;
&lt;p&gt;Workshop#08: DIY Holographic Microscope by Irene Agrivina&lt;/p&gt;
&lt;p&gt;&lt;i&gt;*workshops are happening on the same time in different spot/space. Participants registration are required&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;07.00pm – 08.00pm:&lt;/b&gt;&lt;br /&gt; &lt;b&gt;Makers Dinner&lt;/b&gt;&lt;br /&gt; Dinner is served in traditional way of Tembi Village&lt;/p&gt;
&lt;p&gt;&lt;b&gt;———————–&lt;br /&gt; &lt;/b&gt;&lt;span&gt;side event:&lt;br /&gt; &lt;b&gt;02.00pm – 02.00am +1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt; &lt;span&gt;&lt;b&gt;cellSONIC!&lt;/b&gt;&lt;br /&gt; Bands Performance &amp;amp; DJ Session&lt;br /&gt; &lt;i&gt;&lt;b&gt;Bands Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; - - Seek Six Sick – Belkastrelka – Cangkang Serigala – Skandal – Talking  Coasty – Summer in Vienna – Luise Najib - Chika and The Pistol Air –  Distorsi Liar – AHAA – Dinosaur Youth – Fashion Statement (YK)&lt;br /&gt; &lt;i&gt;&lt;b&gt;DJ Line-up:&lt;/b&gt;&lt;/i&gt;&lt;br /&gt; DJ Hamam (JKT). DJ Ones (YK). DJ Navis (YK). DJ Latex (YK). DJ  Noor (YK). DJ TIM (YK). DJ Metzdub (YK). DJ Lintang Egha (YK). DJ  Felix (DE). DJ Adit (YK). DJ NDA (YK).&lt;br /&gt; &lt;/span&gt;&lt;b&gt;———————–&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;02.00am – the next morning:&lt;br /&gt; please, have a rest!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making'&gt;http://editors.cis-india.org/news/yogyakarta-meeting-on-open-culture-and-critical-making&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-03T08:57:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/year-ahead-copyright-2010">
    <title>Year Ahead Copyright 2010: Between An Enforcement “Gold Standard” And Stronger Limitations</title>
    <link>http://editors.cis-india.org/news/year-ahead-copyright-2010</link>
    <description>
        &lt;b&gt;Whereas copyright is increasingly being exchanged for contractual relationships why all the debate and new efforts in national and international copyright legislation. Monika Ernet's article in the Intellectual Property Watch examines this in the wake of the Anti-Counterfeiting Trade Agreement and the international treaty on access to online books for the visually impaired. The article also carries Pranesh Prakash's views on introduction of technical protection measures and the protection of them by law.&lt;/b&gt;
        
&lt;p&gt;The secretly negotiated Anti-Counterfeiting Trade Agreement is now in centre stage in the global debates around copyright, as is a prospective new international treaty on access to online books for the visually impaired which comes as part of a broader push to clarify limitations and exceptions to copyright. But some are asking, why all the debate and new efforts in national and international copyright legislation when copyright is increasing being exchanged for contractual relationships?&lt;/p&gt;
&lt;p&gt;ACTA may bring with it the punishment of internet denial for infringement that has been fiercely discussed in several European countries and adopted in France, New Zealand, South Korea, and Taiwan. ACTA is seen by critics as another push by governments backing their rights holders in the eternal wars over copyright.&lt;/p&gt;
&lt;p&gt;But on the other side, there is much hope that a new treaty for the visually impaired will be negotiated at the World Intellectual Property Organization (WIPO). Open-ended consultations on outstanding issues were promised to be finalised over the early months of 2010 by the WIPO Standing Committee on Copyright and Related Rights.&lt;/p&gt;
&lt;h3&gt;ACTA and Enforcement&lt;/h3&gt;
&lt;p&gt;The seventh round of negotiations for ACTA ended after four days of talks in Guadalajara on 29 January. Round eight is expected for April in Wellington, New Zealand. If you ask the negotiators, they will tell you that they expect to get this done in 2010.&lt;/p&gt;
&lt;p&gt;There seems to be a sense of urgency to complete ACTA just at the moment when a growing list of members of national parliaments from the United States (Congress), the United Kingdom and Germany are asking for access to the ACTA documents and while the first small street protest was organised outside the meeting place in Guadalajara, Mexico. “Are the commitments of negotiators to transparency real or a strategic move?” asked New Zealand’s Labour Party politician Clare Curran before the meeting in Guadalajara.&lt;/p&gt;
&lt;p&gt;“We will have a hearing on ACTA presumably in March,” said EU Member of Parliament Alexander Alvaro, who has questioned the European Commission on the transparency, timeline and scope of the agreement. The Commissioner Designate for International Trade, Karel de Gucht, said clearly: “If there is confidentiality, I will respect it and I have to respect it.” It is impossible, he said, to change the terms during the negotiations.&lt;/p&gt;
&lt;p&gt;While he promised that he would make sure Parliament - which has now to agree to ACTA under the newly in effect Lisbon Treaty - would be “duly informed,” the Parliament which just engaged in its first fights over its new competencies with the European Council and Commission might not take that bite, said Alvaro.&lt;/p&gt;
&lt;p&gt;The Commission, meanwhile, is for 2010 preparing to put forward a follow-up to the IP enforcement directive (IPRED), as a draft text on IPRED II for criminal sanctions is expected to be put forward in May or June, immediately after the evaluation report on IPRED due in April.&lt;/p&gt;
&lt;h3&gt;Rethinking Limitations and Exceptions&lt;/h3&gt;
&lt;p&gt;While there is a big push for ACTA - which International Trademark Association President Richard Heath from Unilever said should be set as “gold standard” - there are growing concerns in academic circles. Annette Kur, IP law expert at the Max Planck Institute of Intellectual Property and Tax Law, said there is a feeling in the expert community that “we cannot go on and on tightening the screw.”&lt;/p&gt;
&lt;p&gt;Talks at WIPO about a treaty to grant exemptions for blind and visually impaired people have shown promise, but might also slow down other initiatives for a re-balancing of copyright that academics were hoping for. The implementation of other elements of the WIPO Development Agenda would be a good counterpoint against the current wave of maximal demands in rights protection, according to Kur.&lt;/p&gt;
&lt;p&gt;But proponents say there is gathering momentum for the visually impaired exception now - including a draft treaty text, which does not exist for any other issue in the committee - and to wait risks losing the chance and gambling on an uncertain and potentially very lengthy process.&lt;/p&gt;
&lt;h3&gt;National Copyright Reforms and FTAs&lt;/h3&gt;
&lt;p&gt;Some ongoing national copyright legislative reforms echo the demand for the re-balancing, with Brazil’s copyright reform the most far-reaching of these, as copyright law expert Volker Grassmuck recently wrote. The Brazilian law could be the first copyright law “balancing copyright with access and usage rights and consumer protection its declared goal,” Grassmuck wrote, but also said that the reform work might be stopped by the Brazilian election campaign in 2010. For several months, a final draft has been announced, Grassmuck told Intellectual Property Watch, yet every time publication has been postponed. “There certainly are concerns that the delay results from industry lobbying against the reform at the highest levels,” Grassmuck said.&lt;/p&gt;
&lt;p&gt;Indian copyright reform (that like the Brazilian effort started in 2005) also has made a reference to amendments to secure limitations and exceptions for the visually impaired, but is more conservative when it comes to other issues. It more closely follows the line of harmonising its regulation to the international treaties, namely the WIPO Copyright Treaty and WIPO Performances and Phonograms Treaty.&lt;/p&gt;
&lt;p&gt;The reform effort just got a new push when the Indian Copyright office published a final draft on 24 December. Pranesh Prakash, programme manager at the Center for Internet and Society in Delhi, said that the introduction of technical protection measures and the protection of these by law would bring a big change in India.&lt;/p&gt;
&lt;p&gt;Prakash said he is afraid that intermediary liability is on the political agenda of the Indian Copyright Office. This would make sense if one considers the negotiations for a free trade agreement between India and the EU that can be expected to include a lengthy section covering intellectual property, copyright and online service provider liability similar to the one in the EU-Korea FTA. The EU-Korea FTA was to be voted on by EU Parliament this week; the EU-India FTA is expected to be finalised in 2010.&lt;/p&gt;
&lt;p&gt;Copyright reforms are also under way in Canada, Hong Kong, Serbia, and in the United Kingdom the digital economy bill is under heavy discussion because of far-reaching regulatory power planned for UK communications regulator OFCOM. In Germany, a third round of copyright law reform is on the agenda with private broadcasting companies, publishers and the music industry asking for better copyright protection.&lt;/p&gt;
&lt;h3&gt;Contracts Instead of Copyright?&lt;/h3&gt;
&lt;p&gt;But while these reforms and treaty and FTA negotiations are ongoing, there is also another trend seen by experts and users of copyright, said Jeanette Hofmann, an internet governance expert. “Copyright, this moral beacon, more and more ceases to play a role in practical terms. As an author I have to live with a complete buy-out and as a copyright customer, let’s say in the library, I am often dependent on the contracts that the library has with private companies, too.”&lt;/p&gt;
&lt;p&gt;Benjamin White, head of the intellectual property at the British Library, has asked the question of whether copyright is still relevant in the digital age. “What I deal with is contracts,” he said, warning that “in most EU member states contracts effectively trump copyright laws. Limitations and exemptions are irrelevant, if there is a contract that says otherwise.” Libraries are contracting with private companies that could help them to fund digitisation projects, but would then regulate access to these objects.&lt;/p&gt;
&lt;p&gt;White said while he credits Google for getting the discussion started on how digitisation could be funded, he also wants to see a debate on whether people are comfortable with one private company having access to million of books. The Google book settlement and contracts with libraries in the US and other countries in effect could be seen as a monopoly being created around orphan works and a way to control access to millions of works for years. The EU Commissioner Designate for the Digital Agenda Neelie Kroes, when asked what she thought of Google’s book project, said she liked competition. Regulation for orphan works is on the EU Commission’s work agenda.&lt;/p&gt;
&lt;p&gt;Competition and more business offers were also said by Swiss IP lawyer Rolf Auf der Maur to be the focus of the music industry instead of enforcement. Auf der Maur, regular panellist at Midem (the largest annual conference of the music industry), said acknowledgement was trickling down in the music industry that collective licence models, for example licensing music to internet service providers, or even thoughts about flat-rates might be better than only focussing on enforcement.&lt;/p&gt;
&lt;p&gt;The major labels are interested in ventures like streaming service Spotify. Paul Brindley, co-Founder of digital music expert consultant Music Alley, said government funding for digital music service models could be expected from the British Technology Strategy Board.&lt;/p&gt;
&lt;p&gt;Yet this message could sound overly optimistic given that the music industry is the party heavily promoting a ‘three strikes and you’re out’ approach against copyright infringers.&lt;/p&gt;
&lt;p&gt;Or might there be rights owners that think what Joe McNamee, political expert for European Digital Rights (EDRI), predicts: “you can forget about enforcement of copyright, if you focus on copyright and do not get the right content in the right formats available to consumers then you will not solve the problem.“ Innovation would be blocked, he warned, and ever stronger enforcement regulation would finally lead to a lot of collateral damages in civil rights.&lt;/p&gt;
&lt;p&gt;For librarian White there also is an urgent need for a change. He said regulators need to create clear rules on access in the digital world like are set out in the Brazilian copyright reform proposal. White said he was hoping that WIPO, whose secretary general, Francis Gurry, had acknowledged the challenge of solving the relationship between private contracts and copyright, would act on the issue of access. Will that happen in 2010?&lt;/p&gt;
&lt;p&gt;Monika Ermert may be reached at &lt;a href="mailto:info@ip-watch.ch"&gt;info@ip-watch.ch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;For original article on IP Watch, &lt;a class="external-link" href="http://www.ip-watch.org/weblog/2010/02/02/copyright-2010-between-an-enforcement-gold-standard-and-stronger-limitations/"&gt;click here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/year-ahead-copyright-2010'&gt;http://editors.cis-india.org/news/year-ahead-copyright-2010&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Intellectual Property Rights</dc:subject>
    

   <dc:date>2011-04-02T13:43:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report">
    <title>WSIS+10 High Level Event: A Bird's Eye Report</title>
    <link>http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</link>
    <description>
        &lt;b&gt;The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;The World Summit on Information Society (WSIS) +10 &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/implementation/2014/forum/"&gt;High Level Event&lt;/a&gt;&lt;span&gt; (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (&lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p1.html"&gt;Geneva 2003&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p2.html"&gt;Tunis 2005&lt;/a&gt;&lt;span&gt;). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opening Ceremony, WSIS+10 High Level Event &lt;/i&gt;(&lt;a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt;. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 &lt;a href="http://www.itu.int/wsis/review/mpp/"&gt;Multi-stakeholder Preparatory Platform&lt;/a&gt; (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;strong&gt;MPP&lt;/strong&gt; met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “&lt;i&gt;let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels&lt;/i&gt;”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (&lt;a href="http://www.apig.ch/"&gt;APIG&lt;/a&gt;) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders &lt;a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/"&gt;failed to reach consensus&lt;/a&gt; on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;MPP had sought and achieved a common understanding&lt;/span&gt;&lt;/strong&gt;, a sentiment &lt;a href="https://twitter.com/covertlight/status/476748168051580928"&gt;echoed&lt;/a&gt; by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;agreed&lt;/a&gt; that the MPP had worked hard to draft a document beneficial to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns around the MPP did not affect the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;review of ICT developments&lt;/span&gt;&lt;/strong&gt; over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;won an award&lt;/a&gt; for its e-health application MOTHER.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;&lt;span&gt;. Indeed, there was palpable relief in Conference Room 1 at the &lt;/span&gt;&lt;a href="http://www.cicg.ch/en/"&gt;CICG&lt;/a&gt;&lt;span&gt;, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Dialogues:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="http://editors.cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prof. Vladimir Minkin delivers a statement.&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “&lt;i&gt;lost opportunity&lt;/i&gt;”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As on previous panels, there was &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;intense focus on access, affordability and reach in developing countries&lt;/span&gt;&lt;/strong&gt;, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;question of cross-border surveillance and wanton violations of privacy went unaddressed&lt;/span&gt;&lt;/strong&gt; except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the &lt;a href="http://editors.cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;right to be forgotten&lt;/a&gt;), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Forum Track:&lt;/h3&gt;
&lt;p&gt;&lt;img src="http://editors.cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;WCIT-2012&lt;/a&gt;, UNESCO’s &lt;a href="http://www.unesco.org/new/internetstudy"&gt;Comprehensive Study on Internet-related Issues&lt;/a&gt;, spam and a taxonomy of Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;importance of national and regional IGFs&lt;/span&gt;&lt;/strong&gt; for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “&lt;i&gt;Internet governance is not shaped by individual events&lt;/i&gt;”. In light of &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;criticism&lt;/a&gt; of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;response&lt;/a&gt; (often repeated at the HLE itself). Also widely discussed was the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;role of stakeholders in Internet governance&lt;/span&gt;&lt;/strong&gt;, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “&lt;i&gt;distant dream&lt;/i&gt;”).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw &lt;a href="https://www.icann.org/profiles/george-sadowsky"&gt;Mr. George Sadowsky&lt;/a&gt;, &lt;a href="http://www.diplomacy.edu/courses/faculty/kurbalija"&gt;Dr. Jovan Kurbalija&lt;/a&gt;, &lt;a href="http://www.williamdrake.org/"&gt;Mr. William Drake&lt;/a&gt; and &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf"&gt;Mr. Eliot Lear&lt;/a&gt; (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;this ISOC study&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. &lt;a href="http://internetdemocracy.in/"&gt;Ms. Anja Kovacs&lt;/a&gt; raised pertinent concerns about &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;including voiceless minorities in a ‘rough consensus’ model&lt;/span&gt;&lt;/strong&gt;. Across sessions, &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;questions of mass surveillance, privacy and data ownership rose&lt;/span&gt;&lt;/strong&gt; from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (&lt;a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&amp;amp;sp=2010&amp;amp;rgq=D10-RGQ22.1.1&amp;amp;stg=1"&gt;Question 22-1/1&lt;/a&gt; of ITU-D Study Group 1) and cybersecurity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'&gt;http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-06-20T15:57:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-open-consultation-process-multistakeholder-preparatory-platform-phase-six">
    <title>WSIS +10 High Level Event: Open Consultation Process Multistakeholder Preparatory Platform: Phase Six: Fifth Physical Meeting</title>
    <link>http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-open-consultation-process-multistakeholder-preparatory-platform-phase-six</link>
    <description>
        &lt;b&gt;The fifth physical meeting of the Multistakeholder Preparatory Platform (MPP-WSIS+10), was held from 28-31 May 2014 in Geneva as part as part of the sixth phase of the WSIS +10 High Level Event Open Consultation process. The meeting was aimed at developing draft agreed texts for the WSIS+10 Statement on Implementation on WSIS Outcomes and the Vision Beyond 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Stakeholders including governments, private sector, civil society and international     organizations participated in the meeting, which was chaired by Prof. Dr. V.Minkin (Russian Federation), Chairman of the Council Working Group on WSIS and     the Vice Chairs of the meeting were Egypt, Switzerland and Saudi Arabia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITU Deputy Secretary General, Mr Houlin Zhao highlighted that WSIS+10 High Level Event as a joint effort of the UN family and re-emphasized on the     commitment and hard work from all UN Agencies and the Secretariat that has processed up to 500 contributions till date. He further reiterated that this     preparatory process builds upon several inputs including deliberations at WSIS Forums (2012 and 2013), WSIS+10 Visioning Challenge Initiative, 2013 WSIS+10     Multistakeholder Meeting in Paris, as well as outcomes of ITU Regional Development Forums held in six regions and led by BDT. Almost 500 multistakeholder     contributions were processed by secretariat up to now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. C.Wachholz representing UNESCO and Ms. M. Kultamaa representing the CSTD Secretariat underlined the importance of the process being an important effort     leading towards the Overall Review of the implementation of the WSIS outcomes by 2015. Ms. Kultamaa informed the meeting on the status of the discussions     taking place at the UN General Assembly regarding the modalities of the Overall Review. She underlined that for the time being there is no consensus and     discussions on this subject will continue.It is important to note that all UN organizations serve as secretariat to the preparatory process which is being     coordinated by the ITU. All the Action Line Facilitators including, ITU, UNESCO, UNCTAD, UNDP, UNDESA, WMO, UNEP, WHO, UPU, ITC, ILO, FAO, and UN Regional     Commissions,as well as WIPO, UN Women contributed towards the development of the Action line documents in the Vision, within their respective mandates. The     meeting concluded with final agreed drafts for the WSIS+10 Statement and final agreed draft for WSIS+10 Vision Chapter A and B, with some pending issues in     C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jyoti Panday representing CIS, participated in the meeting and intervened in the negotiations over the final agreed text. CIS made interventions on text     related to increasing women's participation, freedom of expression, media rights, data privacy, network security and human rights. CIS also endorsed text     on action line 'Media' which reaffirmed commitment to freedom of expression, data privacy and media rights offline and online including protection of     sources, publishers and journalists.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; WSIS+10 Statement on the Implementation of WSIS Outcomes &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Ø Preamble, Chapter A (Agreed)&lt;/p&gt;
&lt;p&gt;Ø Overview of the implementation of Action Lines, Chapter B (Agreed)&lt;/p&gt;
&lt;p&gt;Ø Challenges-during implementation of Action Lines and new challenges that have emerged, Chapter C (Agreed)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;WSIS+10 Vision for WSIS beyond 2015&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Ø Preamble, Chapter A (Agreed)&lt;/p&gt;
&lt;p&gt;Ø Priority areas to be addressed in the implementation of WSIS Beyond 2015, Chapter B (Agreed)&lt;/p&gt;
&lt;p&gt;Ø Action Lines, Chapter C&lt;/p&gt;
&lt;p&gt;С1. The role of public governance authorities and all stakeholders in the promotion of ICTs for development (Agreed)&lt;/p&gt;
&lt;p&gt;С2. Information and communication infrastructure (Agreed)&lt;/p&gt;
&lt;p&gt;C3. Access to information and knowledge (Agreed)&lt;/p&gt;
&lt;p&gt;C4. Capacity building (Agreed)&lt;/p&gt;
&lt;p&gt;C5. Building confidence and security in the use of ICTs (pending para g)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g)     &lt;ins cite="mailto:Author"&gt; Continue to promote greater cooperation [among the governments and all other stakeholders,] at the United Nations and&lt;del cite="mailto:Author"&gt;with all stakeholders at&lt;/del&gt; all other appropriate &lt;del cite="mailto:Author"&gt;fora&lt;/del&gt;fora, respectively at        &lt;del cite="mailto:Author"&gt;the &lt;/del&gt;national, regional and international levels to enhance user confidence, build trust,and protect both data and         network integrity as well as consider existing and potential threats to ICTs &lt;/ins&gt; &lt;ins cite="mailto:Author"&gt;; and address other information security and network security issues.]&lt;/ins&gt; &lt;ins cite="mailto:Author"&gt;&lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;ins cite="mailto:Author"&gt;Alt 1&lt;/ins&gt;&lt;/b&gt; &lt;b&gt;&lt;i&gt;&lt;ins cite="mailto:Author"&gt;:&lt;/ins&gt;&lt;/i&gt;&lt;/b&gt; &lt;ins cite="mailto:Author"&gt; [&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;Continue to promote cooperation [among the governments [at the United Nations ]and with all other stakeholders at the United Nations and other appropriate &lt;del cite="mailto:Author"&gt;fora&lt;/del&gt;for a] to enhance user confidence, build trust,        &lt;del cite="mailto:Author"&gt;and&lt;/del&gt; protect &lt;del cite="mailto:Author"&gt;both&lt;/del&gt; data, &lt;del cite="mailto:Author"&gt;and &lt;/del&gt;network integrity and         critical infrastructures; consider existing and potential threats to ICTs; security in the use of ICTs and address other information security and network security issues, while stressing the need to address [cybercrime and]cybersecurity issues.        &lt;del cite="mailto:Author"&gt;at appropriate forums, together with all stakeholdersncluding cybersecurity, [and cybercrime]&lt;/del&gt;] &lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;ins cite="mailto:Author"&gt;Alt 2&lt;/ins&gt;&lt;/b&gt; &lt;ins cite="mailto:Author"&gt;: &lt;/ins&gt; &lt;ins cite="mailto:Author"&gt; [Continue to promote cooperation among the governments at the United Nations and other international organizations and with all other stakeholders at         all appropriate fora to enhance user confidence, build trust, protect data, network integrity and critical infrastructures; consider existing and         potential threats to ICTs; security in the use of ICTs [and address other information security ]and network security issues, while stressing the need         to address cybersecurity issues. ] &lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;ins cite="mailto:Author"&gt;Alt 3:&lt;/ins&gt;&lt;/b&gt; &lt;ins cite="mailto:Author"&gt; [Continue to promote cooperation among the&lt;del cite="mailto:Author"&gt;[&lt;/del&gt; governments &lt;del cite="mailto:Author"&gt;[at the United Nations]] &lt;/del&gt;and        &lt;del cite="mailto:Author"&gt;with &lt;/del&gt;all other stakeholders at &lt;del cite="mailto:Author"&gt;other &lt;/del&gt;the United Nations and other appropriate fora to         enhance user confidence, build trust, and protect both data and network integrity and critical infrastructure; consider existing and potential threats         to ICTs; security in the use of ICTs and address other &lt;del cite="mailto:Author"&gt;[&lt;/del&gt;information security&lt;del cite="mailto:Author"&gt;]&lt;/del&gt; and network security issues, while stressing the need to address &lt;del cite="mailto:Author"&gt;cybercrime and &lt;/del&gt;cybersecurity issues.        &lt;del cite="mailto:Author"&gt;[at appropriate forums, together with all stakeholders], including cybersecurity, [and cybercrime]&lt;/del&gt;] &lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;ins cite="mailto:Author"&gt;[including cybercrime] [including cybercrime and cybersecurity .][ including ICT aspects of cybercrime and cybersecurity]&lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;ins cite="mailto:Author"&gt; [Cybercrime [and cybersecurity] should continue to be dealt with,[at the United Nations and other appropriate fora] [in appropriate forums        &lt;del cite="mailto:Author"&gt;,&lt;/del&gt; ] &lt;/ins&gt; &lt;ins cite="mailto:Author"&gt;&lt;del cite="mailto:Author"&gt;&lt;/del&gt;&lt;/ins&gt;&lt;/p&gt;
&lt;p&gt;C6. Enabling environment (Agreed)&lt;/p&gt;
&lt;p&gt;C7. ICT Applications: (Agreed)&lt;/p&gt;
&lt;p&gt;E-government&lt;/p&gt;
&lt;p&gt;E-business&lt;/p&gt;
&lt;p&gt;E-learning&lt;/p&gt;
&lt;p&gt;E-health&lt;/p&gt;
&lt;p&gt;E-employment&lt;/p&gt;
&lt;p&gt;E-environment&lt;/p&gt;
&lt;p&gt;E-agriculture&lt;/p&gt;
&lt;p&gt;E-science&lt;/p&gt;
&lt;p&gt;C8. Cultural diversity and identity, linguistic diversity and local content (agreed but pending para f)&lt;ins cite="mailto:Author"&gt;&lt;/ins&gt;&lt;/p&gt;
&lt;p&gt;&lt;ins cite="mailto:Author"&gt; f) [Reinforce [and [enhance] implement at the national level] the recommendations concerning the promotion and use of multilingualism [and universal         access to cyberspace]]. &lt;/ins&gt;&lt;/p&gt;
&lt;p&gt;C9. Media (meeting has developed three proposals that were requested to be reflected in the documents in a table format)&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Discussion at the MPP Plenary meeting:&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; UK proposal, discussed with and supported by: Sweden, Australia, Spain, Germany, UNESCO, European Broadcasting Union, Switzerland,                         APIG, Centre for Internet and Society (India), Austria, Tunisia, IDEA, Cisco Systems, Mexico, United States, Japan, Canada, ICC BASIS,                         Intel, Internet Society, Health and Environment Program (HEP), Netherlands, and Microsoft. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; It was later supported by The Center for Democracy &amp;amp; Technology, Hungary, Czech Republic. International Federation of Library                         Associations, Portugal, Association for Progressive Communications, auDA (the ccTLD manager for Australia), Finland, Internet Democracy                         Project (India) &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proposal: Rwanda and Russia&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Media will benefit from the broader and expanded role of ICTs that can enhance media’s contribution to the development goals of the                     post-2015 Sustainable Development Agenda.&lt;/p&gt;
&lt;p&gt;[The principles of freedom of expression and the free flow of information, ideas and knowledge are essential for the information and                     knowledge societies and beneficial to development with recognizing that the same rights that people have offline must also be protected                     online, including the right to privacy.]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Media will benefit from the broader and expanded role of ICTs that can enhance media's contribution to the development goals of the                     post-2015 Sustainable Development Agenda. The right to freedom of expression and the free flow of information, ideas and knowledge, and the                     protection of privacy, are essential for the information and knowledge societies and beneficial to development. The same rights that people                     have offline must also be protected online.&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;We reaffirm the continued relevance of all issues highlighted under action line C9 on Media (Geneva 2003) and the need for continued                     implementation of this action line.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;1. 1. [Develop and update national ICT-Media legislation that guarantees the independence, objectivity, social responsibility, neutrality                     and plurality of the media according to international standards as well as the domestic needs.]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;1. Develop and update national ICT-Media legislation that guarantees the independence, diversity and plurality of the media according to                     international standards.&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;2. [Continue to take appropriate measures — consistent with [international law][freedom of expression]— to combat illegal [content and to protect vulnerable groups , in particular children, from harmful content in media content] and harmful media content.]                    &lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;2. Continue to take appropriate measures, consistent with international human rights law, to combat illegal media content.                    &lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;3. Ensure that women and men equally access, participate and contribute to the media sector, including to decision-making processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alt: Work towards ensuring that women and men equally access, participate and contribute to the media sector, including to decision-making                     processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alt: Encourage that women and men access, participate and contribute on equal basis to the media sector, including to decision-making                     processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[Alt: [Encourage][Ensure] [Strive] [ to leverage the potential of ICTs] to provide full and effective [equal ]opportunities to women and                     men to access, participate and contribute to the media sector, [including to decision-making processes]]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;3. Encourage equal opportunities and the active participation of women in the media sector.&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4. [Continue to encourage [independent] tradition [neutral, objective, responsible] nal media to bridge the knowledge divide and to                     facilitate [the freedom of expression] the flow of cultural content, particularly in rural and remote areas.]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;4. Continue to encourage traditional media to bridge the knowledge divide and to facilitate the flow of cultural content, particularly in                     rural areas.&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;5. Encourage online and offline mass media to play a more substantial role in capacity building for the information society.                    &lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td rowspan="2"&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;5. Ensure the [safety[ and responsibility] of all journalists and media workers [and their accountability], [taking into account the                     provisions of article 19 of the International Convention on Civil and Political Rights (ICCPR)]. ,[ including [bloggers] social media                     producers, and their sources and facilitate the implementation of the UN Plan of action on the safety of journalists and the issue of                     impunity.]&lt;/p&gt;
&lt;p&gt;[To ensure the safety of journalists and address the issue of impunity in accordance to UNGA Resolution (A/RES/68/163)]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;6. Ensure the safety of all journalists and media workers, including social media producers and bloggers, and their sources and facilitate                     the implementation of the UN Plan of Action on the safety of journalists and address the issue of impunity&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;6. We reaffirm our commitment to the principles of freedom of the press and freedom of information, as well as those of the independence,                     pluralism and diversity of media, which are essential to the Information Society. Freedom to seek, receive, impart and use information for                     the creation, accumulation and dissemination of knowledge is important to the Information Society. We call for the responsible use and                     treatment of information by the media in accordance with the highest ethical and professional standards. Traditional media in all their                     forms have an important role in the Information Society and ICTs should play a supportive role in this regard. Diversity of media ownership                     should be encouraged, in conformity with national law, and taking into account relevant international conventions. We reaffirm the                     necessity of reducing international imbalances affecting the media, particularly as regards infrastructure, technical resources and the                     development of human skills.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;C10. Ethical dimensions of the Information Society (Agreed)&lt;/p&gt;
&lt;p&gt;C11. International and regional cooperation (Agreed)&lt;/p&gt;
&lt;p&gt;The Chapter C, Part III: The paras highlighted in yellow below did not receive consensus. &lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;III [Action Lines beyond 2015: Looking to the Future&lt;del cite="mailto:Author"&gt;&lt;/del&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;ins cite="mailto:Author"&gt;[&lt;/ins&gt;We reaffirm&lt;/b&gt; that effective cooperation among governments, private sector, civil society and the United Nations and other international organizations, according to     their different roles and responsibilities and leveraging on their expertise, is essential, taking into account the multifaceted nature of building the     Information Society.&lt;ins cite="mailto:Author"&gt;]&lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;[We emphasize&lt;/b&gt; great importance of continuation of the multistakeholder implementation at the international level, following the themes and action lines in the Geneva     Plan of Action, and moderated/facilitated by UN agencies. The coordination of multistakeholder implementation activities would help to avoid duplication of     activities. This should include, inter alia, information exchange, creation of knowledge, sharing of best practices, and assistance in developing     multi-stakeholder and public-private partnerships.&lt;ins cite="mailto:Author"&gt;]&lt;/ins&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;[We reaffirm&lt;/b&gt; importance of the United Nations Group on the Information Society (UNGIS) created by the    &lt;a href="http://ceb.unsystem.org/" target="_blank"&gt;UN-Chief Executives Board (CEB)&lt;/a&gt; upon guidance by Tunis Agenda (Para 103), as an efficient and     effective inter-agency mechanism with the main objective to coordinate substantive and policy issues facing the United Nations’ implementation of the     outcomes of the &lt;a href="http://www.itu.int/wsis" target="_blank"&gt;World Summit on the Information Society (WSIS)&lt;/a&gt;.&lt;ins cite="mailto:Author"&gt;]&lt;/ins&gt;(HEP     – delete)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We welcome&lt;/b&gt; holding of the annual WSIS Forum, which has become a key forum for multi-stakeholder debate on pertinent issues related to the Geneva Plan of Action and     note that the Forum’s inclusiveness, openness, and thematic focus have strengthened responsiveness to stakeholders and contributed to increased physical     and remote participation. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We encourage&lt;/b&gt; all stakeholders to contribute to and closely collaborate with the Partnership on Measuring ICT for Development as an international, multi-stakeholder     initiative to improve the availability and quality of ICT data and indicators, particularly in developing countries. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;[We emphasize/ recognize&lt;/b&gt; that the commitments to advance gender equality perspectives and undertake the necessary actions throughout the WSIS outcomes, as called for in Para 3 of     Preamble under this document, should also be implemented, reviewed and monitored, consistent with other Action Lines, by UN Women in cooperation with other     Action Line Facilitators.&lt;ins cite="mailto:Author"&gt;]&lt;/ins&gt;(HEP – delete)&lt;/p&gt;
&lt;p&gt;&lt;b&gt;We encourage&lt;/b&gt; all WSIS stakeholders to continue to contribute information on their activities to the public WSIS stocktaking database maintained by ITU. In this regard,     we invite all countries to gather information at the national level with the involvement of all stakeholders, to contribute to the stocktaking. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We also welcome&lt;/b&gt; continuation of the WSIS Project Prizes initiative that has been launched by ITU with involvement of all Action line facilitators as a competition that     recognizes excellence in the implementation of projects and initiatives which further the WSIS goals of improving connectivity to ICTs), particularly     within underserved communities, and provide a high-profile, international platform for recognizing and showcasing success stories and models that could be     easily replicated. In this regard, the WSIS Stocktaking Database is of utmost importance in sharing best practices amongst WSIS Stakeholders. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;We emphasize&lt;/b&gt; on the importance of 17 May as World Information Society Day to help to raise awareness, on an annual basis, of the importance of this global facility, on     the issues dealt with in the WSIS especially the possibilities that the use of ICTs can bring for societies and economies, as well as of ways to bridge the     digital divide. [agreed]]&lt;/p&gt;
&lt;p&gt;Vision Beyond 2015 Document&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. During the meeting, the participants agreed to replace Chapter E with the following three paragraphs and include them in Chapter B of the Vision:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. Developing agreed goals and time-based measurable targets data and indicators along with enhanced monitoring and reporting. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;35. Encourage the ongoing assessment of progress towards the information society, as envisaged in the WSIS Outcomes, including through efforts such as the     Partnership on Measuring ICT for Development which has been essential for evaluating the implementation of WSIS Action Lines. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;36. In this respect, it is necessary to continue to develop appropriate ways and means to make such measurements. [agreed]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. A long discussion was held on the way forward. Some of the delegates expressed views that if text on WSIS Action Line C9 is not agreed, all Chapter C     should not be considered as agreed, and refused to consider other items without reaching agreement on WSIS Action Line C9, while others were open to     discuss further with the understanding that Chapter C is essential for the outcomes of the WSIS+10 High Level Event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Some of the delegates requested for reflecting their statements in the Chairman’s Report (See Annex).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. In conclusion the Chairman informed the meeting that the full text with all brackets will be reflected on the website and possibly forwarded to the     consideration of the WSIS+10 High Level Event. He offered his availability on 9&lt;sup&gt;th&lt;/sup&gt; June 2014 for the meeting, if needed, with the aim of     finalization of the text. He encouraged all stakeholders to conduct consultations to reach consensus for pending items prior to the Event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Link to Documentation:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Results of the pre-agreed Chapters during the Fifth Physical meeting:    &lt;a href="http://www.itu.int/wsis/review/mpp/pages/consolidated-texts.html"&gt;http://www.itu.int/wsis/review/mpp/pages/consolidated-texts.html&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Background Documents: &lt;a href="http://www.itu.int/wsis/review/mpp/#background"&gt;http://www.itu.int/wsis/review/mpp/#background&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;br clear="all" /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annex&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Statement by the Association for Proper Internet Governance         &lt;br /&gt; Regarding the 28-31 May Multistakeholder Preparatory Platform meeting         &lt;br /&gt; &lt;/b&gt; 3 June 2014&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Association for Proper Internet Governance (APIG)&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; requests that this statement be annexed to the     Chairman’s report of the Multistakeholder Preparatory Platform (MPP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG has attended all of the preparatory meetings and made numerous written and verbal submissions. Its representative has actively made constructive     suggestions in order to help achieve consensus and APIG has withdrawn various proposals that it considered important when they were challenged by other     participants, and this in order to find consensus. Some examples of such compromises made by APIG are presented below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG is pleased that full consensus was reached regarding the Statement and parts A and B of the Vision, and that consensus was reached regarding most of     part C of the Vision. However, APIG is disappointed that the rigid positions taken by some participants prevented full consensus from being reached     regarding Action Lines C5 (Building confidence and security in the use of ICTs) and C9 (Media) in part C.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It must be recalled that the purpose of the discussions regarding part C was to identify action line items that would supplement the agreed action line     items of the 2003 Geneva Plan of Action. The world has changed since 2003 and indeed the action lines need to be revisited and supplemented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agreement was reached on many supplements to the action lines. Action line C9 is related to the media, which has undergone dramatic changes since 2003.     Many supplements to this action line are surely needed, but, given the complexity of the discussions, in particular regarding freedom of speech, it was not     possible to reach consensus. Some participants took the view that, absent consensus on C9, none of the other supplements to the action lines could be     considered to have been approved by consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is correct from a procedural point of view: nothing is agreed until everything is agreed. However, APIG is of the view that the supplements to all     action lines except C9 and one item in C5 are acceptable as agreed and can be considered independently of C9 and the unresolved item in C5, while     recognizing that important issues regarding C5 and C9 remain open and must continue to be discussed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We present here the following:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Considerations on the multi-stakeholder process used during these preparatory meeting&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Compromises made by APIG&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Proposals for C5 and C9&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Considerations on the multi-stakeholder process used during MPP meetings&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Multistakeholder Preparatory Platform (MPP) meetings were conducted on the basis of equal rights for all stakeholder and no restrictions on     participation (except for registration). This allowed a wide variety of views to be heard and resulted in many valuable and diverse proposals being     presented for consideration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The leadership team (chairman and vice-chairmen) was very experienced and skilled, as was the secretariat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the volume and diversity of the submitted inputs, it was APIG’s view that the leadership team should have been requested, already after the first MPP     meeting, to propose compromise text. APIG regrets that many participants objected to this, and that the leadership team was tasked with proposing     compromise text only at a very late state. This is particularly to be regretted because all participants agreed that the compromise text that was presented     by the leadership at the end was excellent and formed an appropriate basis for further discussion and refinement. It is likely that progress would have     been more rapid, and that full consensus might have been achieved, if the compromise proposals prepared by the leaderhsip had been presented at the earlier     meetings of the MPP.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting was conducted on the basis of unanimity. That is, no text was considered to have achieved consensus unless no participant objected to it. While     this appears appealing at first sight, it can result in a small minority blocking progress towards a compromise text. And indeed this happened for some     portions of the text of part C of the Vision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If meetings are fully open, and all stakeholders have equal decision-making rights, then any stakeholder can block any proposal that, in its view,     threatens its interests. Thus it will be difficult or impossible to reach consensus on delicate issues at such meetings, and this is indeed what happened     at the MPP. Allowing private companies (which are stakeholders) to have the same power as other stakeholders with respect to public policy issues is     problematic, see the Preamble of our submission&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; to the open consultation conducted by the ITU Council     Working Group on International Internet-related Public Policy Issues (CWG-Internet). It is also problematic to allow a small number of participants, even     if they are governments, to block progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, it should be recognized that multi-stakeholder meetings in which public policy decisions are made by unanimity are not appropriate if the goal is to     reach consensus on difficult issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An alternative would be to apply “rough consensus” rather than unanimity. But this gives a great deal of power to the leadership team, and thus makes the     selection of the leadership team a very delicate matter. Such “rough consensus” cannot be held to be democratic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG is of the view that multi-stakeholder process must be democratic, again, see the Preamble of our cited submission to CWG-Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Compromises made by APIG&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. APIG would have preferred that paragaph 2 of the Preambles of both the Statement and the Vision read as follows in order to recognize recent UN     Resolutions that highlight the relevance of specific human rights in the context of the evolution of ICTs since 2005, recognizing the well-known legal     principle that offline rights apply equally online (our additions are shown as revision marks):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We reaffirm the human rights and fundamental freedoms enshrined in the Universal Declaration of Human Rights and relevant international human rights     treaties, including the International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights; and we also reaffirm paragraphs 3, 4, 5 and 18 of the Geneva Declaration    &lt;span&gt;; and we reaffirm the human rights mentioned in relevant UN Resolutions, including, but not limited to:&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;span&gt;A/RES/68/147&lt;/span&gt; &lt;span&gt;. &lt;/span&gt; &lt;span&gt;Rights of the child&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/RES/68/163. The safety of journalists and the issue of impunity&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/RES/68/167. The right to privacy in the digital age&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/RES/68/227&lt;/span&gt; &lt;span&gt;. &lt;/span&gt; &lt;span&gt;Women in development&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/20/8. The promotion, protection and enjoyment of human rights on the Internet&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES/21/24. Human rights and indigenous People&lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES/22/6&lt;/span&gt; &lt;span&gt;. &lt;/span&gt; &lt;span&gt;Protecting human rights defenders&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;b&gt;&lt;span&gt;A/HRC/RES/&lt;/span&gt;&lt;/b&gt; &lt;span&gt;23/2&lt;/span&gt; &lt;span&gt;. The role of freedom of opinion and expression in women’s empowerment&lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES/23/3. Enhancement of international cooperation in the field of human rights&lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES /23/10. Cultural rights and cultural diversity&lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES/&lt;b&gt;24/5&lt;/b&gt;&lt;/span&gt; &lt;span&gt;. &lt;/span&gt; &lt;span&gt;The rights to freedom of peaceful assembly and of association&lt;/span&gt; &lt;span&gt; &lt;/span&gt; &lt;/li&gt;
&lt;li&gt; &lt;span&gt;A/HRC/RES/25/11. Question of the realization in all countries of economic, social and cultural rights&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;APIG is disappointed that one participant (representing business) objected to inclusion in Action Line C2 (Information and Communication Infrastructure) of     the following item, which is based on text agreed at the G20 St. Petersburg meeting&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;e) There is a need to identify&lt;/span&gt; &lt;span&gt; the main difficulties that the digital economy poses for the application of existing international tax rules and &lt;/span&gt; &lt;span&gt;develop detailed options to address these difficulties.&lt;/span&gt; &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG would have preferred that the WSIS+10 recognize the dysfunctional nature of the current copyright regime for what concerns online issues and that an     explicit call be included to reform that unworkable regime&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. In particular, APIG would have preferred that     item (f) of action line C6 (Enabling Environment) read as follows (changes with respect to the agreed version are shown as revision marks):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) Foster an intellectual property rights framework that balances the interests of creators, implementers and users     &lt;span&gt; , by drastically reducing the length of copyright, by legalizing non-commercial downloads of copyright material, and by restricting what can be         patented &lt;/span&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG would have preferred that the WSIS+10 explicitly call for the globalization of the IANA fundtion, by adding the following:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In section B (Priority areas) of the Vision, adding 37:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;37) &lt;/span&gt; &lt;span&gt;Accelerating the globalization of ICANN and IANA functions.&lt;/span&gt; &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In action line C1 of the Vision, adding (f):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; (f) Agree a formal framework that provides for all governments to participate, on an equal footing, in the governance and supervision of the ICANN and         IANA functions, and that provides for effective supervision and accountability of these functions in accordance with paragraphs 29, 35, 36, 61 and 69         of the Tunis Agenda. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG would have preferred that (b) and (d) of C10 (Ethical Dimensions of the Information Society) read as follows (changes with respect to the agreed     version are shown as revision marks):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Promote respect of the fundamental ethical values in the use of ICTs and prevent their abusive usage    &lt;span&gt;, and in particular prevent mass surveillance&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Continue to enhance the protection of privacy and personal data. &lt;span&gt;Recognize that, i&lt;/span&gt; &lt;span&gt;n the absence of the right to privacy, there can be no true freedom of expression and opinion, and therefore no effective democracy. &lt;/span&gt; &lt;span&gt; Any violations of privacy and any restrictions on the protection of personal data must be held to be necessary and proportionate by an independent and         impartial judge. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;See 11 of our submission&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; to the open consultation conducted by the ITU Council Working Group on     International Internet-related Public Policy Issues (CWG-Internet) and recall that, as stated by the President of Brazil, DilmaRousseff, in her speech at     the UN General Assembly on 24 September 2013:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In the absence of the right to privacy, there can be no true freedom of expression and opinion, and therefore no effective democracy.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Proposals for C5 and C9&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;APIG would prefer the following texts for (a) of C5 and for C9.&lt;/p&gt;
&lt;h1&gt;С5. Building confidence and security in the use of ICTs&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;a) Continue to promote cooperation among governments at the United Nations and other appropriate intergovernmental forums, and with all stakeholders at     other appropriate forums, to enhance user confidence, build trust, and protect both data and network integrity; consider existing and potential threats to     ICTs, in particular threats created by weakening or compromising encryption standards; and address other information security (this being understood as     defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction) and network     security issues, in particular mass surveillance.&lt;/p&gt;
&lt;p&gt;a&lt;sup&gt;bis&lt;/sup&gt;) Address cybersecurity and cybercrime in appropriate forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the interests of compromise, APIG could accept deletion of the parts highlighted in yellow above. It should be noted that the text in parenthesis after     “information security” was not present in the 2003 version of this text, found in 12(a) of the Geneva Plan of Action. It has been added in order to make it     clear that the term “information security” is used in its ordinary sense&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;, and not in other senses.&lt;/p&gt;
&lt;div&gt;
&lt;h2&gt;C9. Media&lt;/h2&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Media will benefit from the broader and expanded role of ICTs that can enhance media’s contribution to the development goals of the post-2015 Sustainable     Development Agenda.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principles of freedom of expression and the free flow of information, ideas and knowledge, and the protection of privacy, are essential for the     information and knowledge societies and beneficial to development, recognizing that the same rights that people have offline must also be protected online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Develop and update national ICT-Media legislation that guarantees the independence, and plurality of the media according to international standards as     well as the domestic needs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Continue to take appropriate measures — consistent with freedom of expression— to combat media content that is both illegal and harmful. Any such     measures must be held to be necessary and proportionate by an independent and impartial judge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Continue to encourage traditional media to bridge the knowledge divide and to facilitate the flow of cultural content, particularly in rural areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Ensure the safety of all journalists and media workers, including social media producers and bloggers, and their sources (in particular whistle-blowers)     and facilitate the implementation of the UN Plan of action on the safety of journalists and the issue of impunity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Ensure the privacy of all media and the secrecy all communications, including E-Mail. Any violations of privacy or secrecy shall take place only if they     are held to be necessary and proportionate by an independent and impartial judge. The privacy of all media and the secrecy of all communications shall be     respected in accordance with the national laws of all concerned parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the interests of compromise, APIG could accept deletion of the parts highlighted in yellow above. The first part, “recognizing that the same rights that     people have offline must also be protected online”, is not necessary, since it affirms a well-known legal principle and since human rights are individible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It should be noted that the text proposed for 2 clarifies the text of 24 (c)) of the Geneva Plan of Action. That text could be misunderstood to imply that     one could combat content that is harmful but not illegal. But such is not the case, since content can only be restricted if it is illegal, pursuant to     article 29(2) of the Universal Declaration of Human Rights and article 19(3) of the International Covenant on Civil and Political Rights. That is, the     Geneva Plan of Action already enshrined the principle that there should be fewer restrictions on online freedom of speech than on offline freedom of speech, because the online content can be restricted only if it is “illegal and harmful”. In this respect, see 7.1 of our submission    &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; to the open consultation conducted by the ITU Council Working Group on International Internet-related     Public Policy Issues (CWG-Internet).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding 4 above, whistle-blowers are sources for journalists, so they are already included and their explicit mention can be omitted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding 5 above, see 11 of our cited submission to CWG-Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have omitted an action line regarding gender equality in media because we believe that a strong statement regarding gender equality should apply to all     action lines and thus should appear as a chapeau before action line C1. We propose the following for this chapeau (the language is that proposed by UN     Women for a potential new action line, slightly modified since it is not proposed here as an action line):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We commit to promote progress in implementing gender commitments enshrined in the WSIS outcome documents and forward-looking recommendations by pursuing     practical and joint measures to advance women’s empowerment within the Information Society. The goal is to realize women’s meaningful access to ICTs and     full integration of women’s needs and perspectives, and their equal participation as active agents, innovators and decision-makers. Also critical are     connecting and heightening understanding of online and offline realities and addressing underlying factors that hinder women’s engagement in the     Information society. Finally, we seek to develop more coherent approaches, as well as increase investments, attention and accountability measures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;Gender Analysis:&lt;/i&gt; Promote the use of “gender analysis” and associated tools and methodologies in the development of national, regional and     related global frameworks, strategies and policies and their implementation, as well as better connect with women’s empowerment communities and frameworks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Holistic Approaches and Structural Issues:&lt;/i&gt; Address underlying women’s empowerment issues in the information society, such as gender     stereotypes, specific or pronounced threats to women, such as online violence, as well as provide analysis and actionable recommendations on gender issues     that cut across action lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Support to Action Lines and Stakeholders:&lt;/i&gt; Work with and across Action Lines and specific stakeholder groups (e.g. private sector) to accelerate     integration of gender equality within their remits through identification of overarching issues, programmatic opportunities, requisite investments, policy     interventions, case studies and learning, and promote participation of women and gender equality stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;i&gt;Data and Monitoring Progress:&lt;/i&gt; Prepare scorecards on Action Line and National level reporting on women’s empowerment. Support and promote the     work of the Partnership on the Measurement of the Information Society Working Group on Gender.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; &lt;a href="http://www.apig.ch"&gt;http://www.apig.ch&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;a href="http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25/CWG-March.pdf"&gt; http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25//CWG-March.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; G20 Leaders, “Tax Annex to the St. Petersburg Declaration”, G20 (6 September 2013), Annex, Action 1            &lt;a href="http://www.g20.org/news/20130906/782776427.html"&gt;http://www.g20.org/news/20130906/782776427.html&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; In this context, see 7.3 of             &lt;a href="http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25/CWG-March.pdf"&gt; http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25//CWG-March.pdf &lt;/a&gt; and its references.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25/CWG-March.pdf"&gt; http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25//CWG-March.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;a href="http://en.wikipedia.org/wiki/Information_security"&gt;http://en.wikipedia.org/wiki/Information_security&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25/CWG-March.pdf"&gt; http://www.itu.int/en/Lists/CWGContributionmar2014/Attachments/25//CWG-March.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-open-consultation-process-multistakeholder-preparatory-platform-phase-six'&gt;http://editors.cis-india.org/internet-governance/blog/wsis-10-high-level-event-open-consultation-process-multistakeholder-preparatory-platform-phase-six&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jyoti</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-12T05:31:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground">
    <title>WORLD WIDE PLAYGROUND </title>
    <link>http://editors.cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground</link>
    <description>
        &lt;b&gt;The Delhi High Court recently asked the central government to explain why minors are allowed to create online accounts on social networking sites such as Facebook or Orkut. The High Court’s question stems from a petition filed by former senior BJP leader K.N. Govindacharya last year. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The Op-ed was &lt;a class="external-link" href="http://www.telegraphindia.com/1130515/jsp/opinion/story_16900282.jsp#.Ua8HhthmMQN"&gt;published in the Telegraph&lt;/a&gt; on May 15, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Govindacharya argued that by allowing minors to open accounts on social media sites, the companies of these sites were violating the Indian Majority Act, 1875, the Indian Contract Act, 1872, and the Information Technology Act, 2000.&lt;/p&gt;
&lt;p align="left" class="story"&gt;One of Govindacharya’s main concerns is  that when minors give false information to open an account on an online  portal, they are liable to be held guilty for a criminal offence.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;“Providing  false information about oneself is more of a crime than a civil wrong,”  explains Debsankar Chowdhury, a Calcutta-based cyber law expert.  “However, if it is provided with an intention to enter into a contract  which otherwise is not allowed, it is tantamount to fraud under Section  17 of the Contract Act of 1872.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;For minors,  though, Chowdhury points out that the Juvenile Justice Act, 2005, will  be brought into play, and they will face lighter sentences.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;As for the  social networking companies themselves, according to the law of the land  they can be held accountable if a user provides them with false  information. As Pavan Duggal, a Supreme Court advocate and expert on  cyber law, points out, “All social networking sites are intermediaries  under Section 2(1)(w) of the amended Information Technology Act, 2000.  They are made responsible for all third party data or information made  available by them under Section 79 of the Information Technology Act,  2000.” As such, social networking sites would be held accountable for  allowing people, especially minors, to create fake profiles on their  networks under Section 79 and 85 of the Information Technology Act,  2000, he adds.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The other  problem here is that while a social networking site  like Facebook  allows anyone over 13 to open an account, according to Indian law,  anyone under 18 years of age is a minor; and a minor cannot enter into a  contract with any entity. “The issue raised in Govindacharya’s petition  is of a fundamental nature,” opines Duggal. “Section 3 of the Indian  Majority Act, 1875, clearly states that every person domiciled in India  shall attain the age of majority on his completing the age of 18 years.  However, Facebook allows 13-year-olds to become its members. Since  children lack the inherent capacity to contract under the Indian  Contract Act, 1872, the contract entered into between  Indian children  below the age of 18 years and Facebook is null and void.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But though  the nitty gritty of the law seems to be weighted against children below  18 — or even 13 — joining social networking sites, not everyone believes  that kids should be prevented from having a presence online. Six months  ago, 10-year-old Shruti (name changed) met with an accident, and was  bedridden for some time. She was bored and miserable. To cheer her up,  her father signed her on to Facebook — yes, by providing false  information about her age.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Other  parents may not take a similar view of their young children joining  Facebook under false pretexts. But Ashok Agarwal, a Delhi-based lawyer  and child rights activist, believes that Govindacharya’s petition  demonstrates an outdated way of thinking. “We are letting children speak  at the UN and in Parliament, but we don’t want to let them speak  online,” he says. “Allowing children to use sites like Facebook doesn’t  hurt them, and if anything, denying them access to it would be denying  them their universal Right to Participate. This right is part of  Unicef’s Convention on the Rights of the Child.” And also it’s denying  them access to a tool and medium that is, and will be, an integral part  of their lives, adds Agarwal.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Leaving  aside the debate on whether or not children below a certain age should  be allowed on social networking sites, Chowdhury points out that right  now there is no means of checking the age of those who are signing in to  these online portals.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;In fact,  Section D of Govindacharya’s petition does point out the need for some  kind of verification process when people create an online account, much  like what phone service providers do when someone applies for a new  connection.&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;But experts  point out that this is not feasible in the case of social networking  sites. Says Chowdhury, “Mobile companies operate their network in  specific locations, whereas sites like Facebook exist worldwide.  Moreover, these portals don’t take a single penny from their users. So  do you really think it is possible to make offline verification?”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;Indeed,  verification of user data — ostensibly to cut out underage persons from  logging on to social networking sites — has much wider ramifications.  Pranesh Prakash, policy director at the Centre for Internet and Society  in Bangalore, points out that it could start a downward spiral towards  loss of online privacy. “If anyone wants to create an account on a  website, but has to provide some sort of verifiable data, you’re going  to remove a person’s ability to post anonymously on the Internet. Then  what happens to freedom of speech? People like to post online  anonymously, but if everyone’s identity is known, that privacy is  revoked.”&lt;/p&gt;
&lt;p class="story" style="text-align: justify; "&gt;The effect  of social networking sites on children will be debated for a long time.  But clearly, it would be tough to enforce laws to prevent children from  logging on to these sites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground'&gt;http://editors.cis-india.org/news/the-telegraph-op-ed-may-15-2013-world-wide-playground&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-05T09:47:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development">
    <title>World Trends in Freedom of Expression and Media Development</title>
    <link>http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development'&gt;http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-02-17T16:41:28Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/unesco-world-trends-in-freedom-of-expression-and-media-development">
    <title>World Trends in Freedom of Expression and Media Development</title>
    <link>http://editors.cis-india.org/internet-governance/blog/unesco-world-trends-in-freedom-of-expression-and-media-development</link>
    <description>
        &lt;b&gt;The United Nations Educational, Scientific and Cultural Organisation (UNESCO) had published a book in 2014 that examines free speech, expression and media development. The chapter contains a Foreword by Irina Bokova, Director General, UNESCO. Pranesh Prakash contributed to Independence: Introduction - Global Media Chapter. The book was edited by Courtney C. Radsch.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Foreword&lt;/h2&gt;
&lt;p class="Marge" style="text-align: justify; "&gt;Tectonic shifts in technology and economic models have vastly expanded the opportunities for press freedom and the safety of journalists, opening new avenues for freedom of expression for women and men across the world. Today, more and more people are able to produce, update and share information widely, within and across national borders. All of this is a blessing for creativity, exchange and dialogue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, new threats are arising. In a context of rapid change, these are combining with older forms of restriction to pose challenges to freedom of expression, in the shape of controls not aligned with international standards for protection of freedom of expression and rising threats against journalists.&lt;/p&gt;
&lt;p class="Marge" style="text-align: justify; "&gt;These developments raise issues that go to the heart of UNESCO’s mandate “to promote the flow of ideas by word and image” between all peoples, across the world. For UNESCO, freedom of expression is a fundamental human right that underpins all other civil liberties, that is vital for the rule of law and good governance, and that is a foundation for inclusive and open societies. Freedom of expression stands at the heart of media freedom and the practice of journalism as a form of expression aspiring to be in the public interest.&lt;/p&gt;
&lt;p class="Marge" style="text-align: justify; "&gt;At the 36&lt;sup&gt;th&lt;/sup&gt; session of the General Conference (November 2011), Member States mandated UNESCO to explore the impact of change on press freedom and the safety of journalists. For this purpose, the Report has adopted four angles of analysis, drawing on the 1991 &lt;i&gt;Windhoek Declaration&lt;/i&gt;, to review emerging trends through the conditions of media freedom, pluralism and independence, as well as the safety of journalists. At each level, the Report has also examined trends through the lens of gender equality.&lt;/p&gt;
&lt;p class="Marge" style="text-align: justify; "&gt;The result is the portrait of change -- across the world, at all levels, featuring as much opportunity as challenge. The business of media is undergoing a revolution with the rise of digital networks, online platforms, internet intermediaries and social media. New actors are emerging, including citizen journalists, who are redrawing the boundaries of the media. At the same time, the Report shows that the traditional news institutions continue to be agenda-setters for media and public communications in general – even as they are also engaging with the digital revolution. The Report highlights also the mix of old and new challenges to media freedom, including increasing cases of threats against the safety of journalists.&lt;/p&gt;
&lt;p class="Marge" style="text-align: justify; "&gt;The pace of change raises questions about how to foster freedom of expression across print, broadcast and internet media and how to ensure the safety of journalists. The Report draws on a rich array of research and is not prescriptive -- but it sends a clear message on the importance of freedom of expression and press freedom on all platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To these ends, UNESCO is working across the board, across the world. This starts with global awareness raising and advocacy, including through &lt;i&gt;World Press Freedom Day&lt;/i&gt;. It entails supporting countries in strengthening their legal and regulatory frameworks and in building capacity. It means standing up to call for justice every time a journalist is killed, to eliminate impunity. This is the importance of the &lt;i&gt;United Nations Plan of Action on the Safety of Journalists and the Issue of Impunity&lt;/i&gt;, spearheaded by UNESCO and endorsed by the UN Chief Executives Board in April 2012. UNESCO is working with countries to take this plan forward on the ground. We also seek to better understand the challenges that are arising – most recently, through a &lt;i&gt;Global Survey on Violence against Female Journalists&lt;/i&gt;, with the International News Safety Institute, the International Women’s Media Foundation, and the Austrian Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Respecting freedom of expression and media freedom is essential today, as we seek to build inclusive, knowledge societies and a more just and peaceful century ahead. I am confident that this Report will find a wide audience, in Member States, international and regional organizations, civil society and academia, as well as with the media and journalists, and I wish to thank Sweden for its support to this initiative. This is an important contribution to understanding a world in change, at a time when the international community is defining a new global sustainable development agenda, which must be underpinned and driven by human rights, with particular attention to freedom of expression.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Freedom of expression in general, and media development in particular, are core to UNESCO’s constitutional mandate to advance ‘the mutual knowledge and understanding of peoples, through all means of mass communication’ and promoting ‘the free flow of ideas by word and image.’ For UNESCO, press freedom is a corollary of the general right to freedom of expression. Since 1991, the year of the seminal Windhoek Declaration, which was endorsed by the UN General Assembly, UNESCO has understood press freedom as designating the conditions of media freedom, pluralism and independence, as well as the safety of journalists.  It is within this framework that this report examines progress as regards press freedom, including in regard to gender equality, and makes sense of the evolution of media actors, news media institutions and journalistic roles over time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report has been prepared on the basis of a summary report on the global state of press freedom and the safety of journalists, presented to the General Conference of UNESCO Member States in November 2013, on the mandate of the decision by Member States taken at the 36th session of the General Conference of the Organization.&lt;a href="#fn*" name="fr*"&gt;[*]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The overarching global trend with respect to media freedom, pluralism, independence and the safety of journalists over the past several years is that of disruption and change brought on by technology, and to a lesser extent, the global financial crisis. These trends have impacted traditional economic and organizational structures in the news media, legal and regulatory frameworks, journalism practices, and media consumption and production habits. Technological convergence has expanded the number of and access to media platforms as well as the potential for expression. It has enabled the emergence of citizen journalism and spaces for independent media, while at the same time fundamentally reconfiguring journalistic practices and the business of news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broad global patterns identified in this report are accompanied by extensive unevenness within the whole.  The trends summarized above, therefore, go hand in hand with substantial variations between and within regions as well as countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/world-trends-in-freedom-of-expression-and-media-development" class="internal-link"&gt;&lt;b&gt;Download the PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;]. 37 C/INF.4 16 September 2013 “Information regarding the implementation of decisions of the governing bodies”. http://unesdoc.unesco.org/images/0022/002230/223097e.pdf; http://unesdoc.unesco.org/images/0022/002230/223097f.pdf&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/unesco-world-trends-in-freedom-of-expression-and-media-development'&gt;http://editors.cis-india.org/internet-governance/blog/unesco-world-trends-in-freedom-of-expression-and-media-development&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-17T17:03:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/world-library-and-information-congress-2018">
    <title>World Library and Information Congress 2018</title>
    <link>http://editors.cis-india.org/internet-governance/news/world-library-and-information-congress-2018</link>
    <description>
        &lt;b&gt;Swaraj Paul Barooah was a speaker at two panels during the World Library and Information Congress 2018 (WLIC2018), organised by the International Federation of Library Associations and Institutions (IFLA) in Kuala Lumpur on August 26 and 27, 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Swaraj's first panel, titled "Intellectual Freedom in a Polarised World" was selected as one of 9 sessions to be live-streamed and recorded, out of 249 sessions in total. The recording can be accessed on &lt;a class="external-link" href="https://www.youtube.com/watch?v=0HujFHQn1zY"&gt;YouTube&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Session 123 Intellectual Freedom in a Polarised             World - Freedom of Access to Information and Freedom of             Expression (FAIFE) Advisory Committee (SI)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chair: Martyn Wade, United Kingdom&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In many national contexts, citizens are             seen to be either “with the government or against it,”             leaving little opportunity to freely and safely express more             nuanced views of current social, political or economic             issues. While notable authoritarian regimes quite             transparently monitor and limit societal discussion, others,             ostensibly democratic, may work in practice to blunt             potentially unfavourable social commentary on the pretence             of defending political stability or public morality. IFLA’s             Freedom of Access to Information and Freedom of Expression             (FAIFE) Advisory Committee explores this phenomenon--and the             potential role of civil society and information             professionals in advancing freedom of expression--through             the experience and insights of an NGO leader, an academic             public intellectual, and an officer of UNESCO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Presentations&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Internet and the freedom of expression in Indonesia: opportunity and challenges - Indriaswati Dyah Saptaningrum, University of New South Wales; former Executive Director of the ELSAM human rights organization (Indonesia), Australia&lt;/li&gt;
&lt;li&gt;Freedom of Expression in Malaysia - Azmi Bin Sharom, Faculty of Law, University of Malaysia, Malaysia&lt;/li&gt;
&lt;li&gt;What's up with WhatsApp - polarisation and lynchings in India - Swaraj Paul Barooah, The Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;How to align national laws with international standards on freedom of expression? - Ming-Kuok Lim, Programme Specialist for Communication and Information, UNESCO, Indonesia&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;br /&gt;&lt;b&gt;Session 140 To Have and not to Hold: The End of Ownership - CLM and FAIFE&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shift from buying physical library media to licensing digital content has profound impacts on the way libraries acquire and give access to content. From e-books that can disappear at the whim (or the mistake) of the owners of a server far away, to the limits on sharing and archiving imposed by some contracts. From the potential monitoring of reader behaviour, to the criminalisation of those who simply want to improve user experience. The dominance of digital media in information provision has both broadened the field of information to which we have access, but potentially made it shallower in terms of the use that libraries, and their users, can make of it. The joint CLM-FAIFE session will look at the question of the end of ownership from a legal and an ethical point of view, drawing on the experience and knowledge of the two communities.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tomas A. Lipinski, School of Information Studies, University of Wisconsin, Milwaukee, USA – The Limits of Licensing.&lt;/li&gt;
&lt;li&gt;Ann Okerson, Centre for Research Libraries, Chicago, USA – The Possibilities of Licensing.&lt;/li&gt;
&lt;li&gt;Swaraj Paul Barooah, Centre for Internet and Society – The Balance among Licenses and Exceptions and Limitations to Copyright.&lt;/li&gt;
&lt;li&gt;Brent Roe - Laurentian University, Sudbury, Canada – Privacy Concerns and Other Side Effects of Licensing.&lt;/li&gt;
&lt;li&gt;Jonathan Hernandez-Perez, Researcher, Instituto de Investigaciones Bibilotecologicas, UNAM, Mexico City, Mexico (Invited) – Special Issues in the Developing World; Open Access as a Recapturing of Ownership.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/world-library-and-information-congress-2018'&gt;http://editors.cis-india.org/internet-governance/news/world-library-and-information-congress-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-31T02:23:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/knowledge-repository-on-internet-access/wipo">
    <title>World Intellectual Property Organisation</title>
    <link>http://editors.cis-india.org/telecom/knowledge-repository-on-internet-access/wipo</link>
    <description>
        &lt;b&gt;The World Intellectual Property Organisation (WIPO) is a specialized agency of the United Nations which deals with issues related to intellectual property rights throughout the world.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Under Article 3 of the convention establishing WIPO, the United Nation agency seeks to "promote the protection of intellectual property throughout the world through cooperation among states..."&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the proliferation of the internet, issues related to copyright have become more and more prominent. Internet has made sharing of content easy and efficient. It has also opened up avenues for e-commerce, sale and purchase of music, movies, e-books and other related content. In India, special music services and video services are made available to mobile users by the telecom service providers as value added services through internet technologies such as wireless access protocol (WAP) and general packet radio service (GPRS). Moreover, business models such as iTunes and Flyte allow consumers to download MP3 music for a fee. In this context, digital copyright has become an important topic of discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Copyright law has faced difficulties coping up with digital technologies, especially the Internet. Enforcing copyright has been a tough task, given that protected works can be easily shared and transferred through the internet. In order to adjust the legal system to be in consonance with the latest technological developments the WIPO has laid down two treaties which are known as internet treaties. They are the WIPO Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty (WPPT). These two treaties are considered to be the updates and supplements to the Berne Convention for the protection of the literary and artistic material.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The WIPO Internet Treaties are designed to update and supplement the existing international treaties on copyright and related rights, namely, the Berne Convention and the Rome Convention. They respond to the challenges posed by the digital technologies and, in particular, the dissemination of protected material over the global networks that make up the Internet.  The contents of the Internet Treaties can be divided into three parts: (1) incorporation of certain provisions of the Trade Related Intellectual Property Rights Agreement (TRIPS) not previously included explicitly in WIPO treaties (e.g., protection of computer programs and original databases as literary works under copyright law); (2) updates not specific to digital technologies (e.g., the generalized right of communication to the public); and (3) provisions that specifically address the impact of digital technologies." &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Treaties&lt;/h2&gt;
&lt;h3&gt;Berne Convention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Berne Convention &lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;was first accepted in 1986. It was an international agreement that  sought to govern copyrights. Its basic purpose was to make the  signatories recognize the copyrights of the works of authors of other  signatory countries at the same level as copyrights in their own  countries. The Three Step Test is a test contained in different forms in  a few international treaties on copyright law. It provides a limit on  the exceptions and limitations that a treaty member can provide under  its domestic law. However, the Three Step Test was first laid down in  Article 9 of the Berne Convention and it states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It shall be a matter for legislation in the countries of the Union to permit the reproduction of such works in certain special cases, provided that such reproduction does not conflict with a normal exploitation of the work and does not unreasonably prejudice the legitimate interests of the author.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are two divergent views on the limitations to copyright. Civil law sees copyright as a natural law right, meaning that an author already has the right to his work, and the law merely recognises it. Hence, civil law limitations to rights tend to be narrow. Common law adopts a utilitarian approach and advocates use of common law principles to spur creation of socially valuable works. In pursuance of such socially beneficial measures, Common law limitations are open ended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When the Three Step Test was first conceived, it was to reconcile these divergent views of copyright limitations. So, at its core was the aim to allow national legislations sufficient latitude with regard to limitations. The effects of this treaty are enormous in that it affects the accessibility of almost every book or movie online for the average internet user.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Standing Committee on Copyright and Related Rights (SCCR) was set up in 1998-1999 in order to examine issues of substantive law or harmonization in the field of copyright and rights related to copyright. The committee is comprised of all the member states of WIPO. However, intergovernmental and non-governmental organizations only have observer status.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;WIPO Performances and Phonograms Treaty (WPPT), 1996&lt;/h3&gt;
&lt;p&gt;The WPPT &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; benefits primarily two different kinds of people:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Performers (actors, singers, musicians, etc.), and&lt;/li&gt;
&lt;li&gt;Producers of phonograms (the persons or legal entities who or which take the initiative and have the responsibility for the fixation of the sounds).&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the Treaty was to protect the rights of performers and producers of phonograms in the most effective and uniform manner possible without making void contractual obligations that pre-date the treaty. The Treaty grants performers four different kinds of economic rights in their performances fixed in phonograms:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The right of reproduction,&lt;/li&gt;
&lt;li&gt;The right of distribution, &lt;/li&gt;
&lt;li&gt;The right of rental, and &lt;/li&gt;
&lt;li&gt;The right of making available.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The term of protection has been agreed for at least 50 years. The Treaty also constituted an Assembly that has the power to decide whether intergovernmental organizations can become party to the treaty.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;WIPO Copyright Treaty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The WCT was adopted in 1996 by 89 countries.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;After many advances were made in information technology since the formation of previous copyright treaties, this treaty attempted to add protections for copyrights. Mainly it ensures that computer programs were protected as literary works (Article 4) and also that the arrangement and selection of material in databases is protected (Article 5). It bolsters the protection further by providing authors with control over the rental and distribution of their work according to Article 6 to 8 which wasn’t directly prevalent in the Berne Convention. Many theorists feel that it is far too broad and offers too much protection to the copyright holder. For example, the circumvention of technical protection measures in pursuit of legal and fair use rights can be prevented because it is prohibited in this treaty. It also applies a uniform standard to all the signatory countries even though they are all at different stages of economic development and knowledge industry.&lt;/p&gt;
&lt;h3&gt;Protection of Broadcasts and Broadcasting Organizations Treaty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2006, the WIPO Standing Committee on Copyright and Related Rights (SCCR) made a basic proposal to develop protection rights for all broadcasting organizations. This treaty would allow broadcasting organizations like media broadcasters to protect the content of their transmissions. They basically will have the right to protect their transmissions from reproduction, retransmission and even from public communication and will retain the copyright protection for 50 years. The problem with this treaty is that it adds a layer protection to the copyright that already exists on the material that is being broadcasted. This would allow broadcasters to restrict access to works that are currently available in the creative commons just because they happened to transmit it. This means that the citizens were unable to access works that they could previously access. The easier and fair way of solving the problem that broadcasters face, which the piracy of broadcast signals would have been to criminalize the piracy at an international level, many NGO’s are currently arguing.&lt;/p&gt;
&lt;h3&gt;Treaty Proposal on Copyright Limitations and Exceptions for Libraries and Archives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The International Federation of Library Association (IFLA) is currently working closely with the member states of WIPO in order to draft a binding international instrument for copyright limitations and exceptions. These exceptions and limitations are necessary for the libraries to preserve their collection, lend materials and facilitate/ support education and research. This treaty proposal is mainly being drafted by NGO’s and civil society actors in partnership with librarians and intellectual property experts. IFLA has collaborated with the International Council on Archives (ICA), Electronic Information for Libraries (EIFL) and Corporación Innovarte to produce the Treaty Proposal on Copyright Limitations and Exceptions for Libraries and Archives.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the things that the treaty proposes are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Parallel importation (i.e. buying books from abroad)&lt;/li&gt;
&lt;li&gt;Cross-border uses of works and materials reproduced under a limitation and exception&lt;/li&gt;
&lt;li&gt;Library lending&lt;/li&gt;
&lt;li&gt;Library document supply&lt;/li&gt;
&lt;li&gt;Preservation of library and archival materials&lt;/li&gt;
&lt;li&gt;Use of works and other material under related rights for the benefit of persons with disabilities&lt;/li&gt;
&lt;li&gt;Use of works for education, research and private study&lt;/li&gt;
&lt;li&gt;Use of works for personal and private purposes&lt;/li&gt;
&lt;li&gt;Access to retracted and withdrawn works &lt;/li&gt;
&lt;li&gt;Orphan works&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Education&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is another treaty being discussed currently on copyright exceptions for education and research. The main issue is deciding the order in which these treaties will be negotiated and which matter is most pressing or urgent to address presently. Developing countries are in favour of both exceptions for libraries and archives as well as for education while developed countries are of the mind that exceptions for these things already exist in the current framework of international treaties and conventions. The US is expressly opposed to more discussions on more copyright exceptions and wants to move forward on the broadcast treaty discussions.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronic Frontier Foundation, Knowledge Ecology International, Public Knowledge along with other civil society groups formed a joint statement for the copyright exceptions for education in the digital age:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(...) Education should be accessible for all without barriers of space, time, or cost. Digital technologies, from the portable computer to mobile phones to tablets, are being introduced as crucial educational tools in countries ranging from South Korea to Nigeria, from Brazil to the USA. Educational materials and, therefore, its market, is increasingly becoming digital and policymakers must consider this trend when drafting copyright exceptions and limitations in a way that is appropriate for future generations and the digital age.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The increasing adoption of Information and Communication Technologies (ICTs) in the classroom and in libraries and archives has proven that teachers, learners, researchers, librarians and archivists need rights to access, use, remix, text-mine, exchange, and collaborate on educational materials. Similar rights must be ensured beyond the classroom and library or archive, taking into account the growing importance of e-learning, online communication, and the increasing practice of exchanging educational and other information content across geographical and institutional borders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The international copyright system has recognized the need for exceptions and limitations from its earliest days. Without these, the copyright system would not be able to achieve its fundamental purpose of encouraging creation and innovation for the benefit of all humankind. (...)"&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;WIPO Case Study&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In June 2013, 186 member states of the WIPO adopted a landmark treaty known as the Treaty for the Visually Impaired (Formally known as: &lt;b&gt;“Marrakesh Treaty to Facilitate Access to Published Works for Persons Who Are Blind, Visually Impaired, or Otherwise Print Disabled.”&lt;/b&gt;) &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; The purpose of the treaty was to increase the access to books for blind, visually impaired and print disabled people across the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aspects of the Treaty:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;It required an exception in domestic copyright law for people with print disabilities and the visually impaired.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;It allowed for the import and export of accessible versions of books without the permission of the copyright holder.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;However, only “authorised entities” such as blind people’s organizations can avail this provision under the treaty’s terms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Article 2 of the Treaty states that accessible books changing hands under its provisions should be solely for the use of “beneficiary persons”. It also states that “authorised entities” take “due care” when handling these books, and that they discourage the reproduction and distribution of copies that are unauthorized.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This treaty has the potential to change the way in which access to information is experienced by the visually impaired. This shows that civil society actors can take an active part in the drafting of important legislation as such a landmark treaty was originally proposed by the World Blind Union and Knowledge Ecology International after a meeting that was convened in 2008.&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;There was input sought from NGO’s throughout the process as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After the adoption of the treaty, however, the function of NGOs just increases. There are many steps required in order to ensure the effective implementation of the provisions of the treaty on the ground. Saksham Trust is one such NGO that works towards empowering marginalized sections of society by working on things like this. The following is an interview with Dipendra Manocha of Saksham Trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What kind of work in accessibility does your organization do?&lt;br /&gt;Daisy Forum of India is a network of organisations that produce and distribute books in accessible formats to persons with print disabilities. These organisations produce digital e-text and digital talking books. The organisation works in the area of policy, capacity building, awareness, technology and mainstreaming accessibility in the area of books for persons with print disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What are the main impediments to ensuring accessibility on the ground?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Our policies and laws do not make it mandatory to use standards for digital content. Standards such as Unicode, accessible digital formats, etc., are not followed in production of digital content. Due to this we are forced to re-publish everything that gets published in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Books that are available as accessible content in other countries cannot be brought in India. We also cannot send books in accessible formats to other countries with common languages.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Enough resources are not allocated to produce accessible books for persons with print disabilities.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;There are several technology gaps such as non-availability of text-to-speech (TTS) or OCR in Indian languages due to which production and reading options of accessible books is very expensive. The only option of reading in many languages is hard copy Braille or human voice recorded talking books. Both these are much more expensive than reading of digital e-text with the help of TTS technology.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Organisations and individuals in large parts of the country are not aware of the latest developments and methods of getting accessible content from common catalogue or online libraries, etc.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reading technology has not reached the end users of the country in a large scale.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Main stream publishing industry is producing digital books but these are produced in a way that they are not usable by persons with print disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;How important do you think treaties are?&lt;br /&gt;These are extremely important as it takes best practice model of accessible books all over the world. Various stakeholders came together thinking and working together to find the best possible solution that takes care of the interests of all stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not even 2% of the blind individuals worldwide have sufficient access now. Countries like Namibia don’t even have a basic infrastructure to implement what the Treaty for the Visually Impaired offers. Therefore, in these places, what are the subsequent steps that an organization like yours has to do after the treaty enables?&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Allocate resources to establish infrastructure for distribution providing sufficient protection to content to enable developing countries to participate in international exchange programme.&lt;/li&gt;
&lt;li&gt;Develop mechanisms for international exchange of content.&lt;/li&gt;
&lt;li&gt;Address technology gaps so that local language content can be produced and read by persons with print disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The developed world will act according to its commercial interests. Most of the knowledge is produced in the developed countries and most of the disabled are in developing countries. What are ways to make this equation seem more lucrative?&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;South-south cooperation&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Even relatively smaller subscriptions and remunerations for already developed content will be additional resource of funds even for companies or organisations of developed countries if they begin distribution of their content in developing countries.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Technological Protection Measures and Rights Management Information (TPMs/RMI)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In order to ensure that unauthorized copying of a protected material can be prevented or detected, the WIPO Copyright Treaty (WCT) included new provisions dealing with TPMs and RMI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TPMs are technological safeguards which are put in place which prevents the copying of a protected work in digital format to be copied multiple times. This includes limiting the number of devices on which a song can be copied, using software which does not allow the consumer to copy the protected works from an optical disc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;RMI are generally put on the protected work to ensure that the label of the owner of the work is always embedded in the work. For example, in case of a movie, the film studio may use an RMI which would be positioned as the logo in the movie. It can be also stored as metadata along the video or the protected work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of the WCT and Article 18 of the Wipo Performances and Phonograms Treaty, 1996, (WPPT) states that the states must provide legal protection for TPMs and RMI apart from making provisions for legal remedy in case of circumvention of the technological protection measures. It is interesting to note that India is not a signatory to both the treaties that is WPPT and WCT. This could be because of the strict copyright provisions in the treaties which undermine many goals of accessibility currently being pursued by India.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Article 3 – Objectives of the Organization, Convention Establishing the World Intellectual Property Organization available at &lt;a href="http://www.wipo.int/treaties/en/convention/trtdocs_wo029.html"&gt;http://www.wipo.int/treaties/en/convention/trtdocs_wo029.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a href="http://www.wipo.int/copyright/en/ecommerce/ip_survey/chap3.html#3a"&gt;www.wipo.int/copyright/en/ecommerce/ip_survey/chap3.html#3a&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See more at &lt;a href="http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html"&gt;http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See more at &lt;a href="http://www.wipo.int/policy/en/sccr/"&gt;http://www.wipo.int/policy/en/sccr/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. See more at &lt;a href="http://www.wipo.int/treaties/en/ip/wppt/summary_wppt.html"&gt;http://www.wipo.int/treaties/en/ip/wppt/summary_wppt.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. See more at &lt;a href="http://www.wipo.int/treaties/en/ip/wct/trtdocs_wo033.html"&gt;http://www.wipo.int/treaties/en/ip/wct/trtdocs_wo033.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. See more at &lt;a href="http://www.ifla.org/files/assets/hq/topics/exceptions-limitations/documents/TLIB_v4.3_050712.pdf"&gt;http://www.ifla.org/files/assets/hq/topics/exceptions-limitations/documents/TLIB_v4.3_050712.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. See more at &lt;a href="http://www.ifla.org/node/5856"&gt;http://www.ifla.org/node/5856&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. See more at &lt;a href="https://www.eff.org/deeplinks/2012/07/wipo-possible-international-treaty-copyright-exceptions-limitations"&gt;https://www.eff.org/deeplinks/2012/07/wipo-possible-international-treaty-copyright-exceptions-limitations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. See full document at &lt;a href="https://www.eff.org/file/35218#page/1/mode/1up"&gt;https://www.eff.org/file/35218#page/1/mode/1up&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. See more at &lt;a href="http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=245323"&gt;http://www.wipo.int/meetings/en/doc_details.jsp?doc_id=245323&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. See more at &lt;a href="http://keionline.org/content/view/210/1"&gt;http://keionline.org/content/view/210/1&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/knowledge-repository-on-internet-access/wipo'&gt;http://editors.cis-india.org/telecom/knowledge-repository-on-internet-access/wipo&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anirudh Sridhar and Snehashish Ghosh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2013-12-03T06:56:10Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/world-day-against-software-patents">
    <title>World Day Against Software Patents</title>
    <link>http://editors.cis-india.org/news/world-day-against-software-patents</link>
    <description>
        &lt;b&gt;A global coalition of more than 80 software companies, associations and developers has declared the 24th of September to be the "World Day Against Software Patents".  The Hindu, a national daily dedicated one page of its Bangalore edition to software patents and software freedom. Deepa Kurup contributed written two articles titled "Will patenting take the byte out of IT here?" and "How would it be if you read only one type of book?" which reflects some of the concerns of the Free/Libre/Open Source Software community. &lt;/b&gt;
        &lt;h2&gt;Will patenting take the byte out of IT here? [&lt;a class="external-link" href="http://www.hinduonnet.com/thehindu/thscrip/print.pl?file=2008092461910300.htm&amp;amp;date=2008/09/24/&amp;amp;prd=th&amp;amp;"&gt;link&lt;/a&gt;]&lt;/h2&gt;
&lt;p&gt;Deepa Kurup&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;There has been little debate on patent laws and the software industry. Today is World Day Against Software Patents.&lt;/p&gt;
&lt;p&gt;IT software, services and outsourcing industry has been rooting for software patenting&lt;br /&gt;Delhi Patent Office receives around 50 applications for software patents every month&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;BANGALORE: Picture this. Indian mathematicians came up with the concept of the “zero” — often touted as India’s greatest contribution to civilisation — and got a patent for it. By now they would have raked in inestimable amounts in royalty. Seems preposterous? Members of the Free Software community say that patenting every other algorithm would be somewhat in the same league.&lt;br /&gt;&lt;br /&gt;While there has been substantial discussion on how patents will affect the pharmaceutical sector, there has been little debate about its implications on the software industry. To the layman, software patenting sounds like an abstract issue applicable to an even more abstract domain. However, with a growing software industry which is trying to spread its indigenous roots, the issue becomes an important one.&lt;br /&gt;&lt;br /&gt;Traditionally, software comes under the Copyright Law (just like any literary work) and anyone who writes a program owns it. After Indian Parliament in 2005 scrapped an ordinance which declared “software in combination with hardware” patentable, the controversial and ambiguous clause — “software per se” — has now resurfaced in a recently formulated Patent Manual.&lt;br /&gt;&lt;br /&gt;And how will the common man be affected by this proposed change in the patent manual? For example, when Global Patent Holdings patented usage of images on websites, a bunch of small and big companies had to cough up to $50 million each. And where does this cost reflect? “The consumer will find that products will get a lot more expensive. Take a DVD player which has about 2,000 patents (many of them software-related). Every time a local company makes a DVD player, they have to pay royalties and the costs will naturally be reflected on the sale price,” says Sunil Abraham of Centre for Internet and Society, a research and advocacy organisation.&lt;br /&gt;Backdoor entry&lt;br /&gt;&lt;br /&gt;The Free Software community feels that patents will make a backdoor entry, courtesy this manual and that ongoing public consultation (by the Patent Office) does not take their voices into account. Mr. Abraham says: “We feel that the powerful software lobbies around are pushing for this clause. If allowed, it will affect the basis of innovation, and will in turn affect the industry.” While the Bangalore consultation was “postponed indefinitely,” the Patent Office in its Delhi meeting said this issue called for an “exclusive meeting with the software industry.”&lt;br /&gt;&lt;br /&gt;The powerful IT software, services and outsourcing industry has been rooting for software patenting. Under the guile of the seemingly innocuous clause in the Indian Patent Bill 2005, software companies and the MNC lobby is trying to carve out a slice for the specific “software embedded with hardware” industry saying that it will increase the value of indigenous home-grown software, pump up software exports and thereby rake in greater revenue.&lt;br /&gt;&lt;br /&gt;However, the other side of the story is worth telling. Software, per se, is simply a set of instructions to carry out a certain process. Software experts put forth the argument that big corporations — with money, muscle and hired talent — will seek to impose patents along the software value chain, starting from source code to the recent demand for “embedded software.”&lt;br /&gt;&lt;br /&gt;Sources in the Delhi Patent Office say that they receive around 50 applications for software patents every month. In the U.S. 25,000 patents are granted every year. In a software-driven world, blurring the lines between software and software “per se” could be risky. “Patenting is an expensive and tedious process. The challenge for every programmer would be to verify each time, to see if any two lines of his code would infringe upon a patent. In the U.S., a single verification can cost as much as $5,000. The fundamental issue is that if I arrive at anything independently, should I not use it only because someone had got it patented before me?” asks a senior official at Red Hat, an open source service provider.&lt;br /&gt;&lt;br /&gt;A paper written by members of the Alternative Law Forum (ALF), the case against software patenting is presented as a very basic one. “Software evolves much faster than other industries, even with its own hardware industry. Microprocessors double in speed every two years. So, a patent that lasts up to 17 years (minimum period -15) is alarming. In this field, the idea underlying may remain the same but a product has to be replaced on an average of every two years,” it states. The paper also points out that in software “research costs are little because ideas are as abundant as air.”&lt;br /&gt;&lt;br /&gt;Prashant Iyengar of ALF feels that patent laws will effectively curtail innovation, like it has done in the U.S. “Software, unlike other industries in India, is end-driven but is also on a “body shopping” model. Given that, a strong start-up company will be either be shut down or bought over if patent laws come in,” he explains.&lt;/p&gt;
&lt;h3&gt;How would it be if you read only one type of book? [&lt;a class="external-link" href="http://www.hinduonnet.com/thehindu/thscrip/print.pl?file=2008092550590300.htm&amp;amp;date=2008/09/25/&amp;amp;prd=th&amp;amp;"&gt;link&lt;/a&gt;]&lt;/h3&gt;
&lt;p&gt;Deepa Kurup&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Little or no attention is paid to what is being taught in schools and colleges&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;BANGALORE: A computer literacy programme in a public sector organisation teaches the following modules: MS Office, MS Power Point, MS Excelsheet and Internet Explorer. A glance through the “computer syllabus” in most schools, and the list is similar. All items on this checklist have one thing in common: proprietary software. So, if every computer user is being taught exclusively on proprietary platforms, would they ever be comfortable switching to the easier, cheaper and readily available alternatives?&lt;br /&gt;&lt;br /&gt;Advocates of Free Software — software which can be used, studied and distributed without restriction — say that this is a ploy by proprietors to turn learners into potential customers. They allege that educational systems and the State are in cahoots with these large corporations which insist that children and learning adults be taught to only follow their system.&lt;br /&gt;&lt;br /&gt;In a recent meeting with a State Government official about the use of Free Software on e-governance platforms, the official complained that none of his officials knew how to use it or repair it if things went wrong.&lt;br /&gt;&lt;br /&gt;“This takes you to the root of the problem,” says Sunil Abraham of Centre for Internet and Society, Bangalore. “Students are taught to use only proprietary software. The Government is subsidising training in proprietary technology and little or no attention is paid to what is being taught in schools and colleges,” he explains.&lt;br /&gt;&lt;br /&gt;The “back-office” tag that our IT industry has learnt to live with is also a product of this malaise, experts point out. “When students learn only proprietary software, they will qualify only as computer operators and never learn about using the nuts and bolts of the profession. This is one of the reasons why there are no innovative products that come out of this country,” says Mr. Abraham.&lt;br /&gt;Simple analogy&lt;br /&gt;&lt;br /&gt;A simple analogy would be that of a child taking up reading as a habit. If a child reads a lot of books, they say, they learn to write and express better. Academics feel that in the absence of any familiarity with Free Software, where the source is easily available, engineering students and computer graduates never get to read any code and are thus hardly familiar with the languages.&lt;br /&gt;&lt;br /&gt;FOSS supporters have written to the Ministry of Human Resource Development and several universities to point this out. Anivar Aravind, a member of Free Software Users Group, says that the progress so far has been staggered. Recently, CDAC and Anna Univeristy (KB Chandrashekar Research Centre) came up with a Free Software syllabus and offers trained to teachers in engineering colleges.&lt;br /&gt;Cost factor&lt;br /&gt;&lt;br /&gt;A study by International Open Source Network (an UNDP initiative) study on FOSS and education states that using open source software could reduce the costs involved in ICT education significantly. In a country like ours, this fact that Open Source Software usually involves low or no cost would be perceived as an important step towards reducing the digital divide. With no licensing fee, they can be made available on CD or downloaded.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/world-day-against-software-patents'&gt;http://editors.cis-india.org/news/world-day-against-software-patents&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2013-01-16T07:15:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016">
    <title>Workshop Report - UIDAI and Welfare Services: Exclusion and Countermeasures</title>
    <link>http://editors.cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016</link>
    <description>
        &lt;b&gt;This report presents summarised notes from a workshop organised by the Centre for Internet and Society (CIS) on Saturday, August 27, 2016, to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Centre for Internet and Society  organised a workshop on "UIDAI and Welfare Services: Exclusion and Countermeasures" at the Institution of Agricultural on  Technologists on August 27 in Bangalore to discuss, raise awareness of, and devise countermeasures to exclusion due to implementation of UID-based verification for and distribution of welfare services &lt;strong&gt;[1]&lt;/strong&gt;. This was a follow-up to the workshop held in Delhi on “Understanding Aadhaar and its New Challenges” at the Centre for Studies in Science Policy, JNU on May 26th and 27th 2016 &lt;strong&gt;[2]&lt;/strong&gt;. In this report we summarise the key concerns raised and the case studies presented by the participants at the workshop held on August 27, 2016.&lt;/p&gt;
&lt;h2&gt;Implementation of the UID Project&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Question of Consent:&lt;/strong&gt; The Aadhaar Act &lt;strong&gt;[3]&lt;/strong&gt; states that the consent of the individual must be taken at the time of enrollment and authentication  and it must be informed to him/her the purpose for which the data would be used. However, the Act does not provide for an opt-out mechanism  and  an individual is compelled to give consent to continue with the enrollment process or to complete an authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Adherence to Court Orders:&lt;/strong&gt; Despite of several orders by Supreme Court stating that use of Aadhaar cannot be made mandatory for the purpose of availing benefits and services, multiple state governments and departments have made it mandatory for a wide range of purposes like booking railway tickets &lt;strong&gt;[4]&lt;/strong&gt;, linking below the poverty line ration cards with Aadhaar &lt;strong&gt;[5]&lt;/strong&gt;, school examinations &lt;strong&gt;[6]&lt;/strong&gt;, food security, pension and scholarship &lt;strong&gt;[7]&lt;/strong&gt;, to name a few.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Misleading Advertisements:&lt;/strong&gt; A concern was raised that individuals are being mislead in the necessity and purpose for enrollment into the project.  For example, people have been asked to enrol by telling them that they might get excluded from the system and cannot get services like passports,  banks, NREGA, salaries for government employees, denial of vaccinations, etc. Furthermore,  the Supreme Court has ordered Aadhaar not be mandatory, yet people are being told that documentation or record keeping cannot be done without UID number.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Hybrid Governance:&lt;/strong&gt; The participants pointed out that with the Aadhaar (Targeted delivery of financial and other subsidies, benefits and services) Act, 2016 (hereinafter referred to as Aadhaar Act, 2016 ) being partially enforced,  multiple examples of exclusion as reported in the news are demonstrating  how the Aadhaar project is creating a case of hybrid governance i.e private corporations playing a significant role in Governance. This can be seen in case of Aadhaar where we see many entities from private sector being involved in its implementation, as well as many software and hardware companies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Lack of Transparency around Sharing of Biometric Data:&lt;/strong&gt; The fact how and why the Government is relying on biometrics for welfare schemes is unclear and not known. Also, there is no information on how biometric data that is collected through the project is being used and its ability as an authenticating device. Along with that, there is very little information on companies that have been enlisted to hold and manage data and perform authentication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Possibility of Surveillance:&lt;/strong&gt; Multiple petitions and ongoing cases have raised concerns regarding  the possibility of surveillance, tracking, profiling, convergence of data, and the opaque involvement of private companies involved in the project.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Denial of Information:&lt;/strong&gt; In an RTI filed by one of the participant requesting to share the key contract for the project, it was refused on the grounds under section 8(1) (d) of the RTI Act, 2005. However, it was claimed that the provision would not be applicable since the contract was already awarded and any information disclosed to the Parliament should be disclosed to the citizens. The Central Information Commission issued a letter stating that the contractual obligation is over and a copy of the said agreement can be duly shared. However, it was discovered by the said participant that certain pages of the same were missing , which contained confidential information. When this issue went before appeal before the Information Commissioner, the IC gave an order to the IC in Delhi to comply with the previous order. However, it was communicated that limited financial information may be given, but not missing pages. Also, it was revealed that the UIDAI was supposed to share biometric data with NPR (by way of a MoU), but it has refused to give information since the intention was to discontinue NPR and wanted  only UIDAI to collect data.&lt;/p&gt;
&lt;h2&gt;Concerns Arising from the Report of the Comptroller and Auditor General of India (CAG) on Implementation of PAHAL (DBTL) Scheme&lt;/h2&gt;
&lt;p&gt;A presentation on the CAG compliance audit report of PAHAL on LPG &lt;strong&gt;[8]&lt;/strong&gt; revealed how the society was made to believe that UID will help deal with the issue of duplication and collection as well as use of biometric data will help. The report also revealed that multiple LPG connections have the same Aadhaar number or same bank account number in the consumer database maintained by the OMCs, the bank account number of consumers were also not accurately recorded,  scrutiny of the database revealed improper capture of Aadhaar numbers, and there was incorrect seeding of IFSC codes in consumer database. The participants felt that this was an example of how  schemes that are being introduced for social welfare  do not necessarily benefit the society, and on the contrary, has led to exclusion by design. For example, in the year 2011, by was of the The Liquefied Petroleum Gas (Regulation of Supply and Distribution) Amendment Order, 2011 &lt;strong&gt;[9]&lt;/strong&gt;, the Ministry of Petroleum and Natural Gas made the Unique Identification Number (UID) under the Aadhaar project a must for availing LPG refills. This received a lot of public pushback, which led to non-implementation of the order. In October 2012, despite the UIDAI stating that the number was voluntary, a number of services began requiring the provision of an Aadhaar number for accessing benefits. In September 2013, when the first order on Aadhaar was passed by court &lt;strong&gt;[10]&lt;/strong&gt;, oil marketing companies and UIDAI  approached the Supreme Court to change the same and allow them to make it mandatory, which was refused by the Court. Later in the year 2014, use of Aadhaar for subsidies was made mandatory.  The participants further criticised the  CAG report for revealing the manner in which linking Aadhaar with welfare schemes has allowed duplication and led to ghost beneficiaries where there is no information about who these people are who are receiving the benefits of the subsidies. For example, in Rajasthan, people are being denied their pension as they are being declared dead due to absence of information from the Aadhaar database.&lt;/p&gt;
&lt;p&gt;It was said that the statistics of duplication  mentioned in the report show how UIDAI (as it claims to ensure de-duplication of beneficiaries) is not required for this purpose and can be done without Aadhaar as well. Also, due to incorrect seeding of Aadhaar number many are being denied subsidy where there is no information regarding the number of people who have been denied the subsidy because of this.  Considering these important facts from the audit report, the discussants concluded how the statistics reflect inflated claims by UIDAI and how the problems which are said to be addressed by using Aadhaar can be dealt without it. In this context, it is important to understand how the data in the aadhaar database maybe wrong and in case of e-governance the citizens suffer. Also, the fact that loss of subsidy-not in cash, but in use of LPG cylinder - only for cooking, is ignored. In addition to that, there is no data or way to check if the cylinder is being used for commercial purposes or not as RTI from oil companies says that no ghost identities have been detected.&lt;/p&gt;
&lt;h2&gt;UID-linked Welfare Delivery in Rajasthan&lt;/h2&gt;
&lt;p&gt;One speaker presented findings on people's experiences with UID-linked welfare services in Rajasthan, collected through a 100 days trip organised to speak to people across the state on problems related to welfare governance. This visit revealed that people who need the benefits and access to subsidies most are often excluded from actual services. It was highlighted that the paperless system is proving to be highly dangerous. Some of the cases discussed included that of a disabled labourer, who was asked to get an aadhaar card, but during enrollment asked the person standing next to him to put all his  5 fingers for biometric data collection.  Due to this incorrect data, he is devoid of all subsidies since the authentication fails every time he goes to avail it. He stopped receiving his entitlements.  Though problems were anticipated, the misery of the people revealed the extent of the problems arising from the project. In another case, an  elderly woman living alone, since she could not go for Aadhaar authentication, had not been receiving the ration she is entitled to receive for the past 8 months. When the ration shop was approached to represent her case, the dealers said that they cannot provide her ration since they would require her thumb print for authentication. Later, they found out that on persuading the dealer to provide her with ration since Aadhaar is not mandatory, they found out that in their records they had actually mentioned that she was being given the ration, which was not the case. So the lack of awareness and the fact that people are entitled to receive the benefits irrespective of Aadhaar is something that is being misused by dealers. This shows how this system has become a barrier for the people, where they are also unaware about the grievance redressal mechanism.&lt;/p&gt;
&lt;h2&gt;Aadhaar and e-KYC&lt;/h2&gt;
&lt;p&gt;In this session, the use of Aadhaar for e-KYC verification was discussed The UID strategy document describes how the idea is to link UIDAI with money enabled Direct Benefit Transfer (DBT) to the beneficiaries without any reason or justification for the same. It was highlighted by one of the participants how the Reserve Bank of India (RBI) believed that making Aadhaar compulsory for e-KYC and several other banking services was a violation of the Money Laundering Act as well as its own rules and standards, however, later relaxed the rules to link Aadhaar with bank accounts and accepted its for e-KyC with great reluctance as the Department of Revenue thought otherwise. It was mentioned how allowing opening of bank accounts remotely using Aadhaar, without physically being present, was touted as a dangerous idea. However, the restrictions placed by RBI were suddenly done away with and opening bank accounts remotely was enabled via e-KYC.&lt;/p&gt;
&lt;p&gt;A speaker emphasised that with emerging FinTech services in India being tied with Aadhaar via India Stack, the following concerns are becoming critical:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;With RBI enabling creation of bank accounts remotely, it becomes difficult to to track who did e-KYC and which bank did it and hold the same accountable.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The Aadhaar Act 2016 states that UIDAI will not track the queries made and will only keep a record of Yes/No for authentication. For example, the e-KYC to open a bank account can now be done with the help of an Aadhaar number and biometric authentication. However, this request does not get recorded and at the time of authentication, an individual is simply told whether the request has been matched or not by way of a Yes/No &lt;strong&gt;[11]&lt;/strong&gt;. Though UIDAI will maintain the authentication record, this may act as an obstacle since in case the information from the aadhaar database does not match, the person would not be able to open a bank account and would only receive a yes/no as a response to the request.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Further, there is a concern that the Aadhaar Enabled Payment System being implemented by the National Payment Corporation of India (NCPI) would allow effectively hiding of source and destination of money flow, leading to money laundering and cases of bribery. This possible as NCPI maintains a mapper where each bank account is linked (only the latest one). However, Aadhaar number can be linked with multiple bank accounts of an individual. So when a transaction is made, the mapper records the transaction only from that 1 account. But if another transaction takes place with another bank account, that record is not maintained by the mapper at NCPI since it records only transactions of the latest account seeded in that. This makes money laundering easy as the money moves from aadhaar number to aadhaar number now rather than bank account to bank account.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27"&gt;http://cis-india.org/internet-governance/events/uidai-and-welfare-services-exclusion-and-countermeasures-aug-27&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges"&gt;http://cis-india.org/internet-governance/blog/report-on-understanding-aadhaar-and-its-new-challenges&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf"&gt;https://uidai.gov.in/beta/images/the_aadhaar_act_2016.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets"&gt;http://scroll.in/latest/816343/aadhaar-numbers-may-soon-be-compulsory-to-book-railway-tickets&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See: &lt;a href="http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece"&gt;http://www.thehindu.com/news/national/karnataka/linking-bpl-ration-card-with-aadhaar-made-mandatory/article9094935.ece&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms"&gt;http://timesofindia.indiatimes.com/india/After-scam-Bihar-to-link-exams-to-Aadhaar/articleshow/54000108.cms&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html"&gt;http://www.dailypioneer.com/state-editions/cs-calls-for-early-steps-to-link-aadhaar-to-ac.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf"&gt;http://www.cag.gov.in/sites/default/files/audit_report_files/Union_Commercial_Compliance_Full_Report_25_2016_English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf"&gt;http://petroleum.nic.in/docs/lpg/LPG%20Control%20Order%20GSR%20718%20dated%2026.09.2011.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://judis.nic.in/temp/494201232392013p.txt"&gt;http://judis.nic.in/temp/494201232392013p.txt&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 8(4) of the Aadhaar Act, 2016 states that "The Authority shall respond to an authentication query with a positive, negative or any other appropriate response sharing such identity information excluding any core biometric information."&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016'&gt;http://editors.cis-india.org/internet-governance/blog/workshop-report-uidai-and-welfare-services-august-27-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    

   <dc:date>2019-03-16T04:34:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
