The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 51 to 65.
Social Notworking - 'Murder by Twitter'
http://editors.cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter
<b>Suketu Mehta (@suketumehta) - terrible news about sunanda tharoor. this is murder by twitter. </b>
<hr />
<p style="text-align: justify; ">The article by Malini Nair <a class="external-link" href="http://articles.timesofindia.indiatimes.com/2014-01-19/social-media/46345808_1_sunanda-pushkar-social-media-that-pushkar">published in the Times of India</a> quotes Nishant Shah.</p>
<hr />
<p style="text-align: justify; ">Even before forensic science has declared the reasons behind Sunanda Pushkar's shocking death on Friday night, social media has been accused of murder. Writer Suketu Mehta wasn't the only one to point fingers. "First murder by @TwitterIndia , claps, fellow <a href="http://timesofindia.speakingtree.in/topics/thoughts/twitter">twitter</a> matured guns!" is how another tweet went. Besides the deadly cocktail of depression, drugs, a strained marriage, questions have been raised about whether the vicious banter and collective howls of derision on social media over her very public meltdown — again on social media — pushed her over the edge. <br />Have we, the tweeple, in our eagerness to share every detail of our lives over an internet megaphone, not quite understood what the social media can do, especially its pitfalls? Is the line between the public and private blurring too fast? Commentators say that the rules that govern human and social behaviour haven't changed, and the fault lies in how we negotiate the cyber turf.</p>
<p style="text-align: justify; ">Can our digital lives have serious offline consequences? Nishant Shah, director, research , Centre for Internet & Society, Bangalore, says people need to realize that though twitter amplifies everything, but the ability to hurt, be mean, fight, question, critique and bully is not new.</p>
<p>"These are human practices , which replay themselves across different media forms. What is perhaps new is that our most personal and darkest desires have become available for public spectacle," says Shah.</p>
<div dir="LTR" id="mod-a-body-after-first-para" style="text-align: justify; ">
<p>That the twitterati can be brutal has been shown often enough this last year. When Tehelka editor Tarun Tejpal was mired in allegations of sexual harassment, his daughter was hounded on social media. Recently when novelist Lavanya Sankaran wrote an op-ed for New York Times defending the decent Indian man, she was royally derided, so much so that another journalist Rahul Bhatia tweeted in her defence, asking people to lay off.</p>
<p>Sunanda's story hurtled towards a tragedy in a space of 48 hours after she went public. As Shah points out it wasn't as though there were no affairs and scandals before the dawn of social media but the tangle would have spun out differently and less brutally in another time and age. It all began, as Pushkar admitted to some papers and later denied, with the spilling of alleged BBMs sent by Pakistani journalist Mehr Tarar to Tharoor on his twitter account.</p>
<p>Predictably, the effect of the first round of revelations was explosive. In fact, Pushkar herself appeared taken aback by the fact that a twitter spat ended up making front page headlines.</p>
<p>The entire drama which, in another age, would have played out at home or a circle of family, friends and acquaintances — and at the most in far less dramatic gossip columns and on TV— was up on social media, provide enormous vicarious pleasure to thousands of social media bystanders. That Pushkar herself set the virtual assault in motion only adds to the bleak irony of it all. This was also not the first time Pushkar took a spat to twitter. @SPTVrocks tweeted about her fight with a journalist in Dubai earlier this month.</p>
<p>Clinical psychologist Varkha Chulani says it is the personality behind the media usage not the form itself that is to be blamed. "People choose to talk about their private lives to impress others, to get attention. We forget what is real and what is virtual." Shah, however, believes that we live in a world of digital striptease and that the ubiquitous and pervasive technologies that surround us have forever blurred the lines between real and virtual.</p>
<p>Activists have often pointed out that the social media has everything going for it — quick and vast connect and instant response — but what it lacks is empathy. It is easy enough to send out an RIP message, for instance, for someone you don't know or even care for, positioning yourself as a caring, empathetic soul in 140 characters.</p>
<p>Post Pushkar's death, news anchor Barkha Dutt tweeted that we need to limit viciousness , stop judging and use greater compassion on twitter.</p>
<p>Shah makes a similar plea for the human touch.</p>
<p>"We are all so self-involved , creating narratives of our selves, bit-stripping every moment , instagramming every event, tweeting every encounter, and liking all the various things that happen around us, that we don't always have enough time to stop, to respond, to think and reflect upon other people's conditions . We have become jaded, to the various 'great' moments in people's time lines, but we are also becoming jaded to the pain that our involvement in these social networks can bring to those who are the subject of our attention," he says.</p>
</div>
<div dir="LTR" id="mod-a-body-after-second-para" style="text-align: justify; ">
<p><i>With additional reporting by Shobita Dhar</i></p>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter'>http://editors.cis-india.org/news/the-times-of-india-january-19-2014-malini-nair-social-networking-murder-by-twitter</a>
</p>
No publisherpraskrishnaSocial MediaInternet Governance2014-02-04T07:02:30ZNews ItemSocial media undermining journalistic credibility?
http://editors.cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility
<b> The line separating journalists and bloggers is being increasingly blurred due to the growth of social media, said Nelson Moses, who was a panelist at a discussion on the credibility of social media as a journalistic tool.</b>
<hr />
<p style="text-align: justify; ">The article was <a class="external-link" href="http://http//newindianexpress.com/cities/bangalore/article1487619.ece">published</a> in the New Indian Express on March 4, 2013. Snehashish Ghosh was a panelist.</p>
<hr />
<p style="text-align: justify; ">The talk titled, “Is social media credible?” comprising a panel of professionals from various media houses from across India, was held as a part of the alumni reunion at the Indian Institute of Journalism and New Media (IIJNM) recently.</p>
<p style="text-align: justify; ">The panel included Snehashish Ghosh, a policy associate at the Centre for Internet and Society, Bangalore, Nelson Moses, who has had stints with numerous media houses and now works at Yahoo, Subhash Rai, web editor of the Economic and Political Weekly, and Tresa Morera, the deputy editor of the global online desk at Reuters, Bangalore.</p>
<p style="text-align: justify; ">The discussion, moderated by Professor Mark Austin of IIJNM, revolved around the crucial issues surrounding the Indian media industry and the use of social media.</p>
<p style="text-align: justify; ">Talking points included the role social media like Twitter and Facebook played in populist movements across the Middle East, such as the Arab Spring and also the exodus of people of Manipuri and Assamese descent from Bangalore last year, due to a series of phone messages which purportedly threatened them with violence.Other issues covered in the discussion were whether bloggers could be cited as credible sources of information and also if their roles in shaping public perception was influencing how media houses and journalists function.</p>
<p style="text-align: justify; ">During the course of the discussion, which centered around the drawbacks of a digitally interlinked media landscape, Subhash Rai, said that though it was clearly the work of “right-wing fundamental elements” which led to the circulation of provocative messages against people from the north eastern part of the country, the incident also pointed to the failure of neoliberalism in the Indian context.</p>
<p style="text-align: justify; ">“Journalists are one of the beneficiaries of neoliberalism,” said Shubash Rai, while arguing that often, urban concerns take precedence over more</p>
<p style="text-align: justify; ">pressing issues occurring outside the big cities, leading to these issues either not being reported or not given the same importance. “For example, nobody is reporting the agrarian crisis,” he said.</p>
<p style="text-align: justify; ">Tresa Morera, an IIJNM alumna, said that she believed that “transparency” in the Indian media, and a series of “checks and balances” within media organizations could help in better reporting by the media.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility'>http://editors.cis-india.org/news/new-indian-express-march-4-2013-social-media-undermining-journalistic-credibility</a>
</p>
No publisherpraskrishnaSocial MediaInternet Governance2013-03-06T04:41:15ZNews ItemSocial media promotions can backfire, too
http://editors.cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too
<b>Social media is a highly effective marketing tool for companies but its very ubiquity and the speed with which messaging goes viral has meant that it can hurt them badly as well, especially since platforms are not always moderated and can be hacked or misused.</b>
<p style="text-align: justify; ">The article by Ratna Bhushan and Varuni Khosla was <a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-11-11/news/43930106_1_star-india-pepsico-india-social-media-interactions">published in the Times of India</a> on November 11, 2013. Sunil Abraham is quoted.</p>
<hr />
<p style="text-align: justify; ">It's not just bad language and racially or socially insensitive messages seemingly originating from official Twitter handles, some companies are guilty of poorly judged promotions resulting in consumer backlash.</p>
<p style="text-align: justify; ">On the eve of the country's largest broadcaster Star India rebranding its sport channels last week, the Star Sports Twitter handle posted abusive language. Star India said the account had had been hacked, but by then the tweet had gone viral.</p>
<p style="text-align: justify; ">Just before that, the Board of Control for Cricket in India Twitter handle had cricket legend Sachin Tendulkar's digital autograph along with bad language on the eve of his retirement from the sports.</p>
<p style="text-align: justify; ">Two days before Diwali, beverage and snacks maker PepsiCo ran a contest on Twitter asking contestants to tweet their version of the Ramayana. That caused outrage on social media, led by writer Chetan Bhagat.</p>
<p style="text-align: justify; ">PepsiCo quickly apologised and removed the promotion but not before it got flooded by tweets from those who were upset by the move. While Star and BCCI blamed hackers and PepsiCo's scored an own goal, social media experts say companies need to be more responsible.</p>
<p style="text-align: justify; ">"Our intent was to involve young Indians in one of India's most loved festivals. We took immediate action and withdrew the contest," the beverage maker's spokesperson said.</p>
<p style="text-align: justify; ">AStar Sports spokesperson also said the firm had apologised for the offensive tweet. "We have investigated the issue. A thirdparty vendor had abused his privileged access to the account. We are in the process of taking necessary action and will ensure that no such event recurs."</p>
<p style="text-align: justify; ">But ensuring third-party quality control may be easier said than done. "Many companies are unable to handle their social media operations because they usually outsource these to companies that don't get paid well enough (say Rs 50,000 to Rs 60,000 per month).</p>
<p style="text-align: justify; ">Hence the people handling the accounts could be anyone from an untrained 22-year-old fresh out of college or someone who has no skill set in the social media space," said Gaba.</p>
<p style="text-align: justify; ">Sometimes humour can turn offensive too. In the middle of last year, when Sachin Tendulkar made his eagerly awaited 100th international century, a tweet from insurance services firm Bajaj Allianz went: Congrats to Sachin for his long awaited 100th ton. Now don't delay your retirement planning. #RetireRich #JiyoBefikar.</p>
<p style="text-align: justify; ">That caused much offence to Tendulkar's fans. Or take the case of Fortis, which sought to promote breast feeding week last year with the hashtag AgarMaKaDudhPia-HaiTo. Predictably, this one too ran into trouble.</p>
<p style="text-align: justify; ">"Social media by definition, unlike broadcast media, cannot be controlled. Therefore, even if you take all conceivable precautions there can be unintended consequences. But India is culturally as complicated as a continent — therefore, it requires a very sophisticated understanding and nuance to pull off humour that is universally appealing and does not offend anyone," said Abraham. Last week, the seven-year-old Twitter's stock rose 73% on its debut, with a market value of $31 billion, making it one of the most successful IPOs of the year and beating even its own expectations. Globally, examples abound of companies or institutions making on Twitter bloopers.</p>
<p style="text-align: justify; ">"Companies shouldn't always come up with the excuse that their account was hacked... they need to be accountable. A senior member of the team should always oversee tweets before they're sent out," said Ankita Gaba, co-founder of socialsamosa.com, an Indian social media knowledge storehouse.</p>
<p style="text-align: justify; ">Sunil Abraham, executive director of the Centre for Internet and Society, a non-profit research organisation that works on policy issues relating to freedom of expression and privacy, said, "The BCCI disaster is because they have taken automation too far. Automation of social media interactions can be useful but without careful human oversight, it can very easily be gamed by rogue elements online."</p>
<p style="text-align: justify; ">A PepsiCo India spokesman said the firm's #Ramayana140 Twitter contest "unintentionally caused some concern to consumers".</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too'>http://editors.cis-india.org/news/economic-times-november-11-2013-ratna-bhushan-varuni-khosla-social-media-promotions-can-backfire-too</a>
</p>
No publisherpraskrishnaSocial MediaInternet Governance2013-11-14T05:24:44ZNews ItemSocial Media Monitoring
http://editors.cis-india.org/internet-governance/blog/social-media-monitoring
<b>We see a trend of social media and communication monitoring and surveillance initiatives in India which have the potential to create a chilling effect on free speech online and raises question about the privacy of individuals. In this paper, Amber Sinha looks at social media monitoring as a tool for surveillance, the current state of social media surveillance in India, and evaluate how the existing regulatory framework in India may deal with such practices in future.</b>
<p> </p>
<h4>Social Media Monitoring: <a href="http://cis-india.org/internet-governance/files/social-media-monitoring/at_download/file">Download</a> (PDF)</h4>
<hr />
<h3><strong>Introduction</strong></h3>
<p>In 2014, the Government of India launched the much lauded and popular citizen outreach website called MyGov.in. A press release by the government announced that they had roped in global consulting firm PwC to assist in the data mining exercise to process and filter key points emerging from debates on Mygov.in. While this was a welcome move, the release also mentioned that the government intended to monitor social media sites in order to gauge popular opinion. Further, earlier this year, the government set up National Media Analytics Centre (NMAC) to monitor blogs, media channels, news outlets and social media platforms. The tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments, and also look at the past patterns of posts. A project called NETRA has already been reported in the media a few years back which would intercept and analyse internet traffic using pre-defined filters. Alongside, we see other initiatives which intend to use social media data for predictive policing purposes such as CCTNS and Social Media Labs.</p>
<p>Thus, we see a trend of social media and communication monitoring and surveillance initiatives announced by the government which have the potential to create a chilling effect on free speech online and raises question about the
privacy of individuals. Various commentators have raised concerns about the legal validity of such programmes and whether they were in violation of the fundamental rights to privacy and free expression, and the existing surveillance laws in India. The lack of legislation governing these programmes often translates into an absence of transparency and due procedure. Further, a lot of personal communication now exists in the public domain which
renders traditional principles which govern interception and monitoring of personal communications futile. In the last few years, the blogosphere and social media websites in India have also changed and become platforms for more dissemination of political content, often also accompanied by significant vitriol, ‘trolling’ and abuse. Thus, we see greater policing of public or semi-public spaces online. In this paper, we look at social media monitoring as a
tool for surveillance, the current state of social media surveillance in India and evaluate how the existing regulatory framework in India may deal with such practices in future.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/social-media-monitoring'>http://editors.cis-india.org/internet-governance/blog/social-media-monitoring</a>
</p>
No publisheramberSocial MediaInternet GovernanceSurveillance2017-01-16T14:23:13ZBlog EntrySocial media may influence 160 LS seats in 2014
http://editors.cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014
<b>Social media is likely to influence politics and elections in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, a new study suggests.</b>
<hr />
<p style="text-align: justify; ">This article by Zia Haq was <a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Social-media-may-play-decisive-role-in-2014-polls/Article1-1042982.aspx">published in the Hindustan Times</a> on April 12, 2013. Sunil Abraham is quoted.</p>
<hr />
<p style="text-align: justify; ">In these mostly urbanizing constituencies, social-media usage is now “sufficiently widespread” to influence the outcome of a general election slated for 2014, the study by IRIS Knowledge Foundation and supported by the Internet and Mobile Association of India (IAMAI), indicates.</p>
<p style="text-align: justify; ">On April 4, Congress scion Rahul Gandhi’s high-profile address to the Confederation of Indian Industry, a leading business forum, was trending topmost on Twitter in India that day, some posts by rivals mocking him.</p>
<p style="text-align: justify; ">A series of lectures by Gujarat chief minister Narendra Modi, a presumptive PM, this week too garnered strong social-media attention, with his and Gandhi’s supporters competing online to run the other down.</p>
<p style="text-align: justify; ">A deeply polarizing figure still, Modi is often accused of watching over a carnage that killed nearly 2000 people in 2002, mostly Muslims. Yet, he has pulled off a stunning online strategy to showcase Gujarat as India’s Guandong, a south China province with top GDP rankings and investment.</p>
<p style="text-align: justify; ">Research shows that social media is more persuasive than television ads. Nearly 100 million Indians, or more than Germany’s population, use the Internet each day. Of this, 40 million have assured broadband, the ones most likely to have at least one social media account.</p>
<p style="text-align: justify; ">“Unlike Obama, who used social media directly for votes, Indian politicians have tended to use it more to mould public discourse,” says Sunil Abraham, the CEO of The Centre for Internet and Society.</p>
<p style="text-align: justify; ">That is likely to change in 2014. Not surprisingly, Modi became the third politician globally, a fter Obama and Australian PM Julia Gillard, to host a political conference on Google+ hangout.</p>
<p style="text-align: justify; ">Chief ministers in states are also leveraging social media. Bihar has unveiled a re-branded campaign called, “Bihar ka haq” or Bihar’s Rightful Cause, on Facebook.</p>
<p>Social-media-impacted constituencies, according to the study, are those where Facebook users are more than the victory margin of the winner in the last Lok Sabha election, or where such users account for over 10% of the voting population.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014'>http://editors.cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014</a>
</p>
No publisherpraskrishnaSocial MediaInternet Governance2013-04-15T07:13:52ZNews ItemSo Much to Lose
http://editors.cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose
<b>Unless you have been hiding under a rock, you have been a witness to the maelstrom of events that accompanied the death of the political leader Bal Thackeray.</b>
<hr />
<p style="text-align: center; ">Nishant Shah's <a class="external-link" href="http://www.indianexpress.com/news/so-much-to-lose/1038938/0">column was published in the Indian Express</a> on December 2, 2012.</p>
<hr />
<p style="text-align: justify; ">Unless you have been hiding under a rock, you have been a witness to the maelstrom of events that accompanied the death of the political leader Bal Thackeray. For me, the brouhaha was elbowed out by the case of the police arresting two women for critiquing the events on Facebook. The person who wondered about the nature of the enforced mourning and the state of our public life, and her friend who “liked” the comment on Facebook, were booked and arrested under charges that can only be considered preposterous.</p>
<p style="text-align: justify; ">I will not repeat these arguments because it is needless to say that I am on the side of the women and think of this as yet another manifestation of the stringent measures which are being evolved as an older broadcast way of thinking meets the decentralised realities of digital technologies.</p>
<p style="text-align: justify; ">In the midst of this the idea of internet freedom needs to be revisited. The global Press Freedom Index 2011-12 report compiled by Reporters Without Borders, ranks India at 131, or as a “partly free” country, marking us as a country where the notion of internet freedom is not to be taken for granted, and possibly also one where the concept is not properly understood.</p>
<p style="text-align: justify; ">Citing various instances from the central government’s plans to censor the social web to the authoritarian crackdown on activists and cultural producers involved in online civic protests, from the traditional media industry’s stronghold over intellectual property regimes to the arrest of individuals for voicing their independent critiques online, the report shows that we not only have an infrastructure deficit (with only 10 per cent of the people in the country connected), but also a huge social and political deficit, which is being exposed by our actions and reactions to the Web.</p>
<p style="text-align: justify; ">Take the case of professor Ambikesh Mahapatra dean of the chemistry department of Jadavpur University, who was picked up by the police and lodged in the lock up for almost 40 hours for forwarding an e-mail that contained a cartoon of Trinamool Congress leaders Mamata Banerjee, Mukul Roy and Dinesh Trivedi. He and his housing society co-resident Subrata Sengupta were charged with defamation and outraging the modesty of a woman. While the proceedings are underway with the next date of hearing slated in February, 2013, the Jadavpur university professor says, “Section, 66A of the IT Act is being used for suppression of the freedom of speech. In my opinion, it is being misused by the state government, repeatedly. The section does not empower anyone to arrest those who voice their opinion and never meant to harm anybody’s image. Prompt action is needed to check the misuse of law.”</p>
<p style="text-align: justify; ">Likewise, Ravi Srinivasan, a 46-year-old a businessman from Pondicherry, was arrested for tweeting against Karti Chidambaram, son of Union Finance Minister P Chidambaram. His arrest and consequent release has not blunted his spirit. He says, “At the time (of the arrest) I had not heard of Section 66(A). I still cannot fathom why and how a tweet sent out to just 12 people — half of them family and friends — caught the eye of the police. By evening, when I had come home from the police station, my Twitter following had gone up to 1,700. About 15,000 people re-tweeted the statement that got me arrested.”</p>
<p style="text-align: justify; ">Given the series of incidents that have marked the last year and the whimsical nature of regulatory injunctions on internet freedom in the country, it might be a good idea for us to reflect on democracy and freedom.</p>
<p style="text-align: justify; ">We need to examine the fundamental nature of freedom, and how these attempts at regulating the internet are only a symptom of the systemic failures of enshrining freedom of speech, information, identity and dignity in India. However, internet freedom is often a difficult concept to engage with, because it is one of those phrases that seem to be self-explanatory but without a straightforward explanation. There are three axes which might be useful to unpack the baggage that comes with internet freedom, both for our everyday practices, and our imagined future:</p>
<p style="text-align: justify; ">Freedom of: The freedom of the internet is something that is new and needs more attention. We have to stop thinking of the internet as merely a medium or a conduit of information. As the Web becomes inextricably linked with our everyday lives, the internet is no longer just an appendage or an externality. It becomes a reference point through which our social, political and economic practices are shaped. It becomes a defining point through which we draw our meanings of what it is to be a part of the society, to have rights, to be politically aware, to be culturally engaged — to be a human. The freedom of the Net is important because the crackdowns on the Net are an attack on our rights and freedoms. The silencing of a voice on Facebook, might soon gag the voices of people on the streets, creating conditions of silence in the face of violence perpetuated by the powerful.</p>
<p style="text-align: justify; ">Freedom to: Freedom to the internet is often confused with access to the internet. While, of course, access is important in our imagination of a just society where everybody is equally connected, freedom is also about creating open and fair societies. If the power of the internet is in creating alternative spaces of expression, deliberation and opinion-making, then the freedom to the internet is about being safe and responsible in these spaces. A society that controls these spaces of public discussion, under the guise of security and public safety, is a society that has given up its faith in freedom.</p>
<p style="text-align: justify; ">Freedom for: It is often not clear that when popular technologies of information and communication are regulated and censored, it is not merely the technology that is being controlled. What is being shaped and contained is the way people use them. The freedom for the internet is about the freedom for people. The possibility that Internet Service Providers are being coerced into revealing personal information of users to police states, that intermediaries are being equipped to remove content that they find offensive from the web, and that views expressed on the social media can lead to legal battles by those who have the power but not the acumen to exercise it, all have alarming consequences. There is a need to fight for freedom, not only for the defence of technology but also for the defence of the rights that we cherish that risk being eroded.</p>
<p style="text-align: justify; ">The case of these Facebook arrests is not new. It has happened before and it will continue happening as immature governments are unable to cope with the real voices of representational democracy. These cases sometimes get naturalised because they get repeated, and even without our knowledge, can start creating a life of fear, where we internalise the regulatory system, not voicing our opinions and ideas for fear of persecution. And so, whether you agree with their politics or not, whether you endorse the viewpoints of the people who are under arrest, whether you feel implicated or not in this case, we have to realise that even if we might not agree with somebody’s viewpoint, we must defend their right to have that particular viewpoint. Anything else, and tomorrow, when you want to say something against powers of oppression, you might find yourself alone, as your voice gets heard only by those who will find creative ways of silencing you.</p>
<p style="text-align: justify; ">— With inputs from Gopu Mohan, Madhuparna Das and V Shoba</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose'>http://editors.cis-india.org/internet-governance/blog/indian-express-dec-2-2012-nishant-shah-so-much-to-lose</a>
</p>
No publishernishantSocial MediaFreedom of Speech and ExpressionPublic AccountabilityInternet GovernanceCensorship2012-12-07T16:39:09ZBlog EntryServices like TwitterSeva aren’t the silver bullets they are made out to be
http://editors.cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be
<b>TwitterSeva is great, but it should not be considered a sufficient replacement for proper e-governance systems. This is because there are several serious shortcomings with the TwitterSeva approach, and it is no wonder that enthusiastic police officers and bureaucrats are somewhat upset with the slow deployment of e-governance applications. They are also right in being frustrated with the lack of usability and scalability of existing applications that hold out the promise of adopting private sector platforms to serve citizens better.</b>
<hr />
<p style="text-align: justify; ">Sunil Abraham, executive director of the Centre for Internet and Society, wrote this in response to the <a href="http://factordaily.com/twitter-helping-india-reboot-public-services-publicly/" target="_blank">FactorDaily story</a> on TwitterSeva, a special feature developed by Twitter’s India team to help citizens connect better with government services. Sunil's article in FactorDaily can be <a class="external-link" href="http://factordaily.com/twitterseva-egovernance-public-services/">read here</a>.</p>
<hr style="text-align: justify; " />
<h3 style="text-align: justify; ">Let’s take a look at why the TwitterSeva approach is not adequate:</h3>
<p style="text-align: justify; "><b>1. Vendor and Technology Neutrality:</b> Providing a level ground for competing technologies in e-governance has been a globally accepted best practice for about 15 years now. This is usually done by using open standards policies and interoperability frameworks.</p>
<p style="text-align: justify; ">India does have a national open standards policy, but the National Informatics Centre <a href="http://www.nic.in/" target="_blank">(NIC)</a> has only published one chapter of the Interoperability Framework for e-Governance .</p>
<p style="text-align: justify; ">The thing is, while Twitter might be the preferred choice for urban elites and the middle class, it might not be the choice of millions of Indians coming online. By implicitly signaling to citizens that Twitter complaints will be taken more seriously than e-mail or SMS complaints, the government is becoming a salesperson for Twitter. Ideally, all interactions that the state has with citizens should be such that citizens can choose which vendor and technology they would like to use. Ideally, the government should have its own work-flow so that it can harvest complaints, feedback and other communications from all social media platforms be it Twitter or <a href="https://identi.ca/" target="_blank">Identica</a>, Facebook or <a href="https://joindiaspora.com/" target="_blank">Diaspora</a>, and publish responses back onto them.</p>
<blockquote style="text-align: justify; ">
<p>By implicitly signalling to citizens that Twitter complaints will be taken more seriously than e-mail or SMS complaints, the government is becoming a salesperson for Twitter</p>
</blockquote>
<p style="text-align: justify; ">Apart from undermining the power of choice for citizens, lack of vendor and technology neutrality in government use of technology undermines the efficient functioning of a competitive free market, which is the bedrock of future innovation.</p>
<p style="text-align: justify; ">When it comes to micro-blogging, Twitter has established a near monopoly in India. There are no clear signs of harm and therefore it would not be wise to advocate that the Competition Commission of India investigate Twitter. However, if the government helps Twitter tighten its grip over the Indian market, it is preventing the next cycle of creative destruction and disruption. Therefore, e-governance applications should ideally only “loosely couple” with the APIs of private firms so that competition and innovation are protected.</p>
<p style="text-align: justify; "><b>2. Holistic Approach and Accountability:</b> Ideally, as the Electronic Service Delivery Bill 2011 had envisaged, every agency within the government was supposed to (within 180 days of the enactment of the Act) do several things: publish a list of services that will be delivered electronically with a deadline for each service; commit to service-level agreements for each service and provide details of the manner of delivery; provide an agency-level grievance redressal mechanism for citizens unhappy with the delivery of these electronic services.</p>
<p style="text-align: justify; ">Notwithstanding the 180-day commitment, the Bill required that “all public services shall be delivered in electronic mode within five years” after the enactment of the Bill with a potential three-year extension if the original deadline was not met. The Bill also envisaged the constitution of a Central Electronic Service Delivery Commission with a team of commissioners who “monitor the implementation of this Bill on a regular basis” and publish an annual report which would include “the number of electronic service requests in response to which service was provided in accordance with the applicable service levels and an analysis of the remaining cases.”</p>
<blockquote style="text-align: justify; ">
<p>The Electronic Service Delivery Bill 2011 had a much more comprehensive and accountable plan for e-governance adoption in the country</p>
</blockquote>
<p style="text-align: justify; ">Citizens suffering from non-compliance with the provisions of the Bill and unsatisfied with the response from the agency level grievance redressal mechanism could appeal to the Commission. The state or central commissioners after giving the government officials an opportunity to be heard were empowered to impose a fine of Rs 5000.</p>
<p style="text-align: justify; ">Unlike the piecemeal approach of TwitterSeva, the Bill had a much more comprehensive and accountable plan for e-governance adoption in the country.</p>
<p style="text-align: justify; "><b>3. Right To Transparency:</b> Some of the interactions that the government has with citizens and firms may have to be disclosed under the obligation emerging from the Right to Information Act for disclosure to the public or to the requesting party. Therefore it is important that the government take its own steps for the retention of all data and records — independent of the goodwill and lifecycles of private firms.</p>
<p style="text-align: justify; ">Twitter is only 10 years old. It took 10 years for Orkut to shut down. Maybe Twitter will shut down in the next 10 years. How then will the government comply with RTI requests? Even if the government is not keen on pushing for data portablity as a right for consumers (just like mobile number portability in telecom, so that consumers can seamlessly shift between competing service providers), it absolutely should insist on data portability for all government use.</p>
<blockquote style="text-align: justify; ">
<p>Twitter is only 10 years old. It took 10 years for Orkut to shut down. Maybe Twitter will shut down in the next 10 years. How then will the government comply with RTI requests?</p>
</blockquote>
<p style="text-align: justify; ">This will allow it to shift to a) support multiple services, b) shift to competing/emerging services c) incrementally build its own infrastructure and also comply with the requirements of the Right to Information Act.</p>
<p style="text-align: justify; "><b>4. Privacy:</b> Unfortunately, thanks to the techno-utopians behind the Aadhaar project, the current government is infected with “data ideology.” There is an obsession with collecting as much data as possible from citizens, storing it in centralized databases and providing “dashboards” to bureaucrats and politicians. This is diametrically opposed to the view of the security community.</p>
<blockquote style="text-align: justify; ">
<p>Unfortunately, thanks to the techno-utopians behind the Aadhaar project, the current government is infected with “data ideology”</p>
</blockquote>
<p style="text-align: justify; ">For example, Bruce Schneier posted on his blog in March this year (in a piece titled ‘<a href="https://www.schneier.com/blog/archives/2016/03/data_is_a_toxic.html" target="_blank">Data is a Toxic Asset</a>‘) saying: “What all these data breaches are teaching us is that data is a toxic asset and saving it is dangerous. This idea has always been part of the data protection law starting with the 2005 EU Data Protection Directive expressed as the principle of “Data Minimization” or “Collection Limitation”. More recently technologists and policy makers also use the phrase “Privacy by Design”. Introducing an unnecessary intermediary or gate-keeper between what is essentially transactions between citizens and the state is an egregious violation of a key privacy principle.”</p>
<p style="text-align: justify; "><b>5. Middle Class and Elite Capture:</b> The use of Twitter amplifies the voices of the English-speaking, elite, and middle class citizens at the expense of the voices of the poor. While elites don’t exhibit fear when tagging police IDs and making public complaints from the comforts of their gated communities with private security guards shielding them the violence of the state, this might be a very intimidating option for the poor and disempowered.</p>
<blockquote style="text-align: justify; ">
<p>While elites don’t fear tagging police IDs and making public complaints from the comforts of their gated communities, it’s intimidating for the disempowered</p>
</blockquote>
<p style="text-align: justify; ">While the system may not be discriminatory in its design, it will have disparate impact on different sections of our society. In other words, the introduction of TwitterSeva will exacerbate power asymmetries in our society rather than ameliorating them.</p>
<p style="text-align: justify; ">The canonical scholarly reference for this is Kate Crawford’s <a href="https://hbr.org/2013/04/the-hidden-biases-in-big-data" target="_blank">analysis</a> of City of Boston’s StreetBump smartphone, which resulted in an over-reporting of potholes in elite neighbourhoods and under-reporting from poor and elderly residents. This meant that efficiency in the allocation of the city’s resources was only a cover for increased discrimination against the powerless.</p>
<p style="text-align: justify; "><b>6. Security:</b> The most important conclusion to draw from the Snowden disclosure is that the tin-foil conspiracy theorists who we used to dismiss as lunatics were correct. What has been established beyond doubt is that the United States of America is the world leader when it comes to conducting mass surveillance on netizens across the globe. It is still completely unclear how much access the NSA has to the databases of American social media giants. When the complete police force of a state starts to use Twitter for the delivery of services to the public, then it may be possible for foreign intelligence agencies to use this information to undermine our sovereignty and national security.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be'>http://editors.cis-india.org/internet-governance/blog/factordaily-sunil-abraham-october-6-2016-services-like-twitterseva-are-not-the-silver-bullets-they-are-made-out-to-be</a>
</p>
No publishersunilSocial MediaInternet Governance2016-10-06T16:31:51ZBlog EntrySeminar on “Evolution of communication: Social Media & Beyond”
http://editors.cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d
<b>Sunil Abraham will be a speaker at this event organized by TRAI on March 15 at Hotel Radisson Blu GRT, Near Airport, Chennai. Sunil will be speaking on How should Internet Giants- Social Media, Search engines and ad tech be Regulated.</b>
<p>Click to <a class="external-link" href="http://cis-india.org/internet-governance/files/seminar-on-evolution-of-communication">view the agenda</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d'>http://editors.cis-india.org/internet-governance/news/seminar-on-201cevolution-of-communication-social-media-beyond201d</a>
</p>
No publisherAdminSocial MediaInternet GovernancePrivacy2019-03-07T14:52:09ZNews ItemRural Indians don’t trust messages on WhatsApp blindly: Survey
http://editors.cis-india.org/internet-governance/news/hindustan-times-october-19-2018-vidhi-choudhary-rural-indians-don-t-trust-messages-on-whatsapp-blindly-survey
<b>Only 8% of the respondents marked 10 as their trust score on a scale of 1-10, where 1 stands for complete distrust and 10 for complete trust, in information received on WhatsApp, found a survey.</b>
<p style="text-align: justify; ">The article by Vidhi Choudhary was published in the <a class="external-link" href="https://www.hindustantimes.com/india-news/rural-indians-don-t-trust-messages-on-whatsapp-blindly-survey/story-6uzWTfNIgStWbri9JDnK0I.html">Hindustan Times</a> on October 19, 2018. Sunil Abraham was quoted.</p>
<hr />
<p style="text-align: justify; ">WhatsApp users in rural India do not blindly trust messages they receive on the messaging service, according to a limited survey across 14 states, a finding that must provide some cheer to law enforcement officials and policymakers trying to combat fake news and rumours, and to the messaging service itself.</p>
<p style="text-align: justify; ">Only 8% of the respondents marked 10 as their trust score on a scale of 1-10, where 1 stands for complete distrust and 10 for complete trust, in information received on WhatsApp, found a survey conducted by Digital Empowerment Foundation (DEF), a New Delhi-based non-profit organisation that seeks to find solutions to bridge the digital divide.</p>
<p style="text-align: justify; ">To be sure, the Digital Empowerment Foundation survey titled “What’s up Rural India?” recorded responses from only 1018 rural users in 14 states including districts like Bettiah in Bihar, Barabanki in Uttar Pradesh, Chamba, Narendra Nagar and Pratapnagar in Uttarakhand, Betul and Guna in Madhya Pradesh, Musiri in Tamil Nadu, Memboobnagar, Vikarabad and Warangal in Telangana and Alwar and Barmer in Rajasthan among others, and only a larger survey can authoritatively weigh in on the trust people have in the messaging service.</p>
<p style="text-align: justify; ">Since May, at least 30 people have been lynched by mobs with rumours on the messaging platform being responsible for some of the incidents. Fake videos and rumours of child-lifting circulated via WhatsApp have triggered lynchings in at least eight states. The Indian government wrote to WhatsApp about the incidents and the platform, owned by Facebook Inc made some changes, including a clear labelling of forwarded messages as well as limiting the number of forwards to tackle the spread of rumours and Fake News.</p>
<p style="text-align: justify; ">WhatsApp has over 200 million users in India, its largest market, and India’s chief election commissioner OP Rawat said in a recent interview with Hindustan Times that attempts to influence poll outcomes using technology was the biggest challenge before his organization, which is responsible for the conduct of polls in India.</p>
<p style="text-align: justify; ">According to the DEF survey, almost 70% of the respondents rated their trust score between 1-5. “This composition of trust is unlike what I’d imagined. Users in rural India have exercised restraint in believing the information they get from WhatsApp. They still prefer to check with peers and local communities about what is right and wrong,” said Osama Manzar, founder and director at DEF.</p>
<div class="rural_padding" style="text-align: justify; ">
<div class="rural_headline">What’s up, rural India?</div>
<div class="rural_subheadline">Survey on WhatsApp by Digital Empowerment Foundation:</div>
</div>
<p style="text-align: justify; "><img src="https://www.hindustantimes.com/static/ht2018/10/rural_India_whatsapp.jpg" width="100%" /></p>
<p style="text-align: justify; ">It is heartening to know people in rural India are sceptical about messages shared on WhatsApp, said Sunil Abraham co-founder at think-tank Centre for Internet and Society. “It’s a societal learning curve. Most of these users have been exposed to WhatsApp over the last one year. Previous incidents where trust has been misused is perhaps a reason for their apprehension. Their scepticism will grow in the light of all the disappointments that have happened. Ask them this question in 2019 and the numbers are likely to rise further,” added Abraham. Statistics in terms of overall usage of WhatsApp shows that about 66% rural users interviewed in the survey spend 1-4 hours on the messaging app daily, 46% receive between 11-60 messages in a day, 38% are active on upto five WhatsApp groups with a majority being in groups with friends, followed by work colleagues, and family. Experts said the usage of WhatsApp in rural India is surprisingly high. The high usage can be attributed to the rise of smartphone penetration in these areas.</p>
<p style="text-align: justify; ">A majority of 88% users also knew what a WhatsApp forward is and 45% said they receive between 6-20 forwarded messages in a day. In July, WhatsApp launched a label to identify forwarded messages in a bid to combat fake news and the spread of misinformation globally, including India. It later set a limit to the use of forwarded messages to 5 chats in India.</p>
<p style="text-align: justify; ">In response to an email query, WhatsApp said it has made product changes that make it clear when users have received forwarded messages and also provided greater controls for group administrators to help reduce the spread of unwanted messages in private chats.</p>
<p style="text-align: justify; ">“WhatsApp is a private messaging service for communicating with friends and family... We are working together with a number organisations to step up our education efforts so that people know how to spot fake news and hoaxes circulating online. It is heartening to note that these efforts are making a difference and keeping our users safe,” said a WhatsApp spokesperson.</p>
<p style="text-align: justify; ">Among other findings, about 40% of respondents said they were part of WhatsApp groups created by members or representatives of political parties.</p>
<p style="text-align: justify; ">“This reflects the level of campaigning and penetration of political parties. Villages are always politically sensitive and also interested in politics,” said Manzar.</p>
<p style="text-align: justify; ">Interestingly, the survey noted that 63% of the respondents were not on the service in 2014. WhatsApp will play a key role in the campaigns for 2019 as this will be the first election with a host of rural India users actively part of the service.</p>
<p style="text-align: justify; ">Data shows that the share of active WhatsApp users in rural India has doubled since 2017, according to a survey done by the Centre for the Study of Developing Societies. Abraham added this means political parties have a “direct channel” of communication with a “huge percentage of the voter base”.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/hindustan-times-october-19-2018-vidhi-choudhary-rural-indians-don-t-trust-messages-on-whatsapp-blindly-survey'>http://editors.cis-india.org/internet-governance/news/hindustan-times-october-19-2018-vidhi-choudhary-rural-indians-don-t-trust-messages-on-whatsapp-blindly-survey</a>
</p>
No publisherAdminSocial MediaInternet Governance2018-10-28T06:21:34ZNews ItemRise of the bot: all you need to know about the latest threat online
http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot
<b>In the last week of December, 2013, former union railway minister Pawan Kumar Bansal lodged a police complaint in Chandigarh after witnessing “an unusual rise in his online fan following”. The former minister told the police that his Facebook page had received more than 10,000 likes, within a span of 24 hours. While his allegation that the ‘likes’ were “fabricated” may be true, information technology experts believe a bot was at work.</b>
<p style="text-align: justify; ">The article by Danish Raza was <a class="external-link" href="http://www.hindustantimes.com/technology/socialmedia-updates/rise-of-the-bot-all-you-need-to-know-about-internet-s-latest-threat/article1-1169500.aspx">published in the Hindustan Times</a> on January 5, 2014. Snehashish Ghosh is quoted.</p>
<hr />
<p style="text-align: justify; ">A bot is a software that mimics human behaviour on the Internet. Bots can be used to create artificial accounts on social media, provide numerous likes on a particular page, send tweets or visit various websites. All this is done without any human involvement.</p>
<p style="text-align: justify; ">Bots already constitute a significant percentage of Non Human Traffic (NHT) online, which has, according to some estimates, eclipsed human traffic. Comscore, a US-based Internet technology company noted on its blog that NHT, also known as Artificial Traffic, increased from approximately 6% of the total web traffic in 2011, to 36% in 2012. Last month, a report from Incapsula, a cloud-based security service, which aids the security and performance of websites, stated that more than 60% of web traffic was non-human in 2013. The figure was based on data collected from the 20,000 sites on Incapsula’s network .</p>
<p style="text-align: justify; ">Other than bots, NHT on the web includes traffic generated by Internet routers and back end services used by websites to communicate with third parties.</p>
<p style="text-align: justify; ">India is not immune to the problem. According to the Symantec Internet Security Threat Report for 2012, there was a 280% increase in bot infections in India between 2011 and 2012. 17% of bot-infected computers, the highest in the world, are in India and 15% of global bot-net spam is generated here. The report also states that 69 Indian cities are prone to bot infections which includes Bhubaneswar, Surat, Cochin, Jaipur, Visakhapatnam, Indore, Kota, Ghaziabad and Mysore.</p>
<p style="text-align: justify; "><b>Bot spotting</b><br />How do you spot a bot? When a bot or its friend is at work, the browser directs you to sites other than the ones you intend to visit, you get full-page pop ups and pop unders, and when you quit the browser, it gets relaunched after a few minutes. Chances are your computer is part of a chain of online events which create NHT on the web, the purpose of which may be to attack a site or a server.</p>
<p style="text-align: justify; "><b>Why you should be wary</b><br />Malicious traffic, malware, hacking attempts, viruses slow down the Internet and delay legitimate traffic and services. Used to target systems or take down websites, NHT generates fake clicks on advertisements to increase website statistics.</p>
<p style="text-align: justify; ">One of the perils of ignoring artificial web traffic is that it gets counted for real impressions for which clients end up paying. For example, a website owner may hire the services of a digital marketing firm to publicise the site. In the guise of increasing page views, the marketing firm can produce a bill for fake impressions, supplementing actual human traffic to the page with bot usage.</p>
<p style="text-align: justify; ">“Unless there is a curb on this practice of malicious NHT, one stands at risk of being duped by marketers, agencies and even clients,” said Chiragh Cherian, director, online PR at Perfect Relations, a brand management firm. Recent studies have estimated bot traffic to be between 4 - 31% of total web traffic in the US, which translates to between $650 million and $4.7 billion in wasted marketing spend. According to Miaozhen Systems, a leading Chinese advertising technology company, NHT caused advertisers in China to lose approximately US$ 1.6 billion between July 2012 and June 2013.</p>
<p style="text-align: justify; "><b>How to combat Non-Human Traffic</b><br />Most servers have defence mechanisms to tackle spam and cyber attacks. Websites are also now developing mechanisms such as asking for human authentication which is difficult for a bot to execute. “But even personal computers should be equipped with strong Internet security applications such as anti-virus and anti-spyware to prevent hacking and phishing attempts and to prevent being used as slave machines for distributed cyber attacks,” said Chintu Cherian Abraham, a digital media professional. Figures show that we need to watch out where and how we go online. According to Norton Report, 2013, 61% Indians access their social network accounts from unsecured wi-fi connections, while 42% access bank accounts and 44% shop online using unsecured wi-fi connections.</p>
<p style="text-align: justify; ">Social media companies are gradually devising mechanisms to filter bots. “When a page and a fan connect on Facebook, we want to ensure that connection involves a real person interested in hearing from a specific page and engaging with that brand’s content. As such, we have recently increased our automated efforts to remove Likes on Pages that may have been gained by means that violate our terms,” mentions Facebook’s site integrity policy.</p>
<p style="text-align: justify; ">Agency-client intervention is necessary to ensure that artificial traffic is not presented as real. “It’s also important to make all agencies, advertisers and clients aware of their responsibility to keep the Internet free from malicious NHT,” said Chiragh Cherian.</p>
<p style="text-align: justify; ">Government involvement is also needed to control the problem of malicious bots. “A lot needs to be done from the government’s side to tackle bots which can be used to target the country’s critical infrastructure such as banking websites,” said Jiten Jain, a cyber security analyst, adding, “Last year, I highlighted the flaws in HDFC’s net banking website which have been rectified now. They could have been exploited to block the net-banking service.”</p>
<p style="text-align: justify; ">Until we have a robust mechanism to filter out bogus traffic from real, it will be difficult to say whether the social media followers of Bansal and other public figures are human or not.</p>
<table class="invisible">
<tbody>
<tr>
<th><img src="http://editors.cis-india.org/home-images/FactFile.png" alt="Fact File" class="image-inline" title="Fact File" /></th>
</tr>
</tbody>
</table>
<p style="text-align: justify; "><b>Know your Bots</b><br />Not all bots are used with a negative intent. Some help in research and monitoring.</p>
<p style="text-align: justify; "><b>The Malicious</b><br />Bots can be effectively used to impersonate and to hack accounts leading to financial losses and intellectual property theft. “Theft of personal details, username and password to operate one’s bank account is a classic example of how bots can lead to financial losses. It is an organised cyber crime,” explained Commander (Retd) Mukesh Saini, former national information security coordinator, Government of India. In May 2013, cyber criminals broke into the Mumbai-based account of the RPG group and siphoned off `2.4 crore. Three people were arrested in the case.</p>
<p style="text-align: justify; ">“The rate at which NHT is increasing is alarming,” says Tinu Cherian Abraham. “Any computer connected to the Internet is vulnerable to such attacks. The user will not get to know about it unless he or she has installed an Internet security application.”</p>
<p style="text-align: justify; ">Besides bots, computers also generate other kinds of secondary activities, while the user is surfing the Internet. This activity remains in the background and is never seen by the user, unlike the bot-generated pop ups, observes Comscore. For example, your computer might be being used as a channel to reach a server with the intention of hacking it. And you will never know.</p>
<p style="text-align: justify; "><b>The Good</b><br />Not all NHT is bad, though. In fact, good bots such as scrapers can be effectively used to conduct research. “Wikipedia can be scraped to investigate the frequency of edits on a Wikipedia page and track the increase in the number of editors,” explained Snehashish Ghosh, policy associate at the Bangalore-based Centre for Internet & Society.</p>
<p style="text-align: justify; ">Good bots are also used by search engines to track content on websites and enhance their search results. Search bots and other good bots formed 31% of total bots, the Incapsula report noted.</p>
<p style="text-align: justify; "><b>The Social</b><br />Apart from malicious and good bots, there are social media bots too. “Extensive analysis is done on social media traffic for monitoring, business lead generation, as well as reputation management. This has amounted to a lot of automated or non-human traffic,” said Abraham.</p>
<p style="text-align: justify; ">According to Facebook’s filings published in a Forbes report in February 2012, around 83 million of its users are bogus. “It’s a violation of our policies to use a fake name or operate under a false identity, and we encourage people to report any user they suspect of doing this, either through the report links we provide on the site or through the contact forms in our help centre,” a Facebook spokesperson told HT.</p>
<p style="text-align: justify; ">Twitter bots have also made its presence felt on the platform. “Twitter has witnessed very interesting bots which have found appreciation from the community for being funny and creative. The microblogging site cracked down on some harmful bots, but still some of the advanced level bots slip through the net,” said Ghosh.</p>
<p style="text-align: justify; ">In August 2012, London-based firm Digital Evaluators, which evaluates social media presence of worldwide companies, released an analysis of Twitter followers of the US Presidential Election candidates Barack Obama and Mitt Romney. 21.9% of Barack Obama’s 17.82 million Twitter followers were found to be bogus.</p>
<p style="text-align: justify; "><b>The Big Brother</b><br />Ghosh said that the increase in NHT related to the Internet of things, the concept which enables communication between two or more devices, results in privacy issues. “Take a situation where your mobile device is constantly tracking your location for the purpose of switching on the air conditioner at your home before you reach. Such applications produce huge amounts of personal data and there is no clarity whether this data is being stored,” he said.</p>
<p style="text-align: justify; ">“As the new networks link data from products, company assets, or the operating environment, they will generate better information and analysis, which can enhance decision making significantly. Some organisations are starting to deploy these applications in targeted areas, while more radical and demanding uses are still in the conceptual or experimental stages,” noted a McKinsey & Company report on Internet of things.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot'>http://editors.cis-india.org/news/hindustan-times-january-5-2014-danish-raza-rise-of-the-bot</a>
</p>
No publisherpraskrishnaSocial MediaWikipediaInternet GovernanceAccess to Knowledge2014-01-31T07:16:36ZNews ItemReply to RTI Application on Blocking of website and Rule 419A of Indian Telegraph Rules, 1951
http://editors.cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951
<b>The Department of Telecommunications sent its reply to an RTI application from the Centre for Internet and Society. The application was sent on December 27, 2012 with reference to blocking of websites and Rule 419A of the Indian Telegraph Rules, 1951.</b>
<p style="text-align: left; ">To<br />Shri Subodh Saxena<br />Central Public Information Officer (RTI)<br />Director (DS-II), Room No 1006, Sanchar Bhawan<br />Department of Télécommunications (DoT)<br />Ministry of Communications and Information Technology<br />20, Ashoka Road, New Delhi — 110001<br /><br />Dear Sir,<br /><b>Subject: Information on Website Blocking Requested under the Right to Information Act, 2005</b></p>
<p>1. Full Name of the Applicant: Centre for Internet & Society</p>
<p>2. Address of the Applicant</p>
<p>Mailing Address: Centre for Internet and Society<br />194, 2־C Cross,<br />Domlur Stage II,<br />Bangalore 560071</p>
<p>3. Details of the information required</p>
<p class="Bodytext1" style="text-align: justify; ">It has come to our attention that Airtel Broadband Services ("Airtel") and Mahanagar Téléphoné Nigam Limited ("MTNL") have recently blocked access to a number of domain sites for all their users across the country. Airtel has blocked Fabulous Domains (<a href="http://www.fabulous.com/">http://www.fabulous.com/</a>), BuyDomains (<a href="http://www.buvdomains.com/">http://www.buvdomains.com/</a>) and Sedo (<a href="http://sedo.co.uk/uk/home/welcome/%29%e2%96%a0">http://sedo.co.uk/uk/home/welcome/)</a>. MTNL has blocked Sedo (<a href="http://sedo.co.uk/uk/home/welcQme/">http://sedo.co.uk/uk/home/welcQme/</a>). Subscribers trying to access this website receive a message noting "This website/URL has been blocked until further notice either pursuant to Court orders or on the Directions issued by the Department of Télécommunications". In this regard, we request information on the following queries under Section 6(1) of the Right to Information Act, 2005:</p>
<ul>
</ul>
<ol>
<li style="text-align: justify; ">Does the Department have powers to require an Internet Service Provider to block a website? If so, please provide a citation of the statute under which power is granted to the Department, as well as the safeguards prescribed to be in accordance with Article 19(1)(a) of the Constitution of India.</li>
<li> </li>
<li style="text-align: justify; ">Did the Department order Airtel or MTNL to block any or all of the above mentioned websites? If so, please provide a copy of such order or orders. If not, what action, if at all, has been taken by the Department against Airtel and MTNL for blocking of websites?</li>
<li style="text-align: justify; ">Has the Department ever ordered the blocking of any website? If so, please provide a list of addresses of all the websites that have been ordered to be blocked.</li>
<li style="text-align: justify; ">Please provide use the present composition of the Committee constituted under rule 419A of the Indian Telegraph Rules, 1951.</li>
<li>Please provide us the dates and copies of the minutes of all meetings held by the Committee constituted under rule 419A of the Indian Telegraph Rules, 1951, and copies of all their recommendations.</li>
</ol>
<p>4. Years to which the above requests pertain: 2012</p>
<p>5. Designation and address of the PIO from whom the information is required</p>
<p>Shri Subodh Saxena<br />Central Public Information Officer (RTI)<br />Director (DS-II), Room No 1006, Sanchar Bhawan<br />Department of Télécommunications (DoT)<br />Ministry of Communications and Information Technology<br />20, Ashoka Road, New Delhi — 110001</p>
<p style="text-align: justify; ">To the best of my belief, the détails sought for fall within your authority. Further, as provided under section 6(3) of the Right to Information Act ("RTI Act"), in case this application does not fall within your authority, I request you to transfer the same in the designated time (5 days) to the concerned authority and inform me of the same immediately.</p>
<p style="text-align: justify; ">To the best of my knowledge the information sought does not fall within the restrictions contained in section 8 and 9 of the RTI Act, and any provision protecting such information in any other law for the time being in force is inapplicable due to section 22 of the RTI Act.</p>
<p style="text-align: justify; ">Please provide me this information in electronic form, via the e-mail address provided above. This to certify that I, Smitha Krishna Prasad, am a citizen of India.</p>
<p style="text-align: justify; ">A fee of Rs. 10/- (Rupees Ten Only) has been made out in the form of a demand draft drawn in favour of "Pay and Accounts Officer (HQ), Department of Telecom" payable at New Delhi.</p>
<p style="text-align: justify; ">Date. Monday November 26,2012<br />Place: Bengaluru, Karnataka<br /><br /></p>
<hr />
<p style="text-align: left; "><b>Below is the reply received from the Department of Telecommunications for the above RTI application</b></p>
<hr />
<p style="text-align: center; "><b>Government of India <br />Department of Télécommunications<br />Sanchar Bhawan, 20, Ashoka Road. New Delhi -110 001 <br />(DS-CelI)</b></p>
<table class="invisible">
<tbody>
<tr>
<th colspan="6">No. DIR(DS-II)/RTI/2009</th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th colspan="7">Dated:ll/01/2013</th>
</tr>
</tbody>
</table>
<p>To,<br />Centre for Internet and Society,<br />No. 194, 2-C Cross,<br />Domlur Stage II,<br />Bangalore - 560 071</p>
<p style="text-align: justify; ">This has reference to RTI application dated 27/12/2012 with reference to Blocking of website and Rule 419A of Indian Telegraph Rules, 1951</p>
<ol><ol>
<li style="text-align: justify; ">In this regard it is submitted that Internet Service licensees are to follow the provisions of Information Technology Act 2000 as amended from time to time. Under Information Technology Act 2000, "<b>Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules 2009</b>" were notified on 27/10/2009.(Annexure) Aforesaid notified rules describes the "<b>Designated Officer</b>" for the purpose of issuing direction for blocking for access by the public any information generated, transmitted, received, stored or hosted in any computer resource under subsection (2) of Section 69(A) of the ACT. Wide Gazette Notification dated 20/01/2010 <b>Group Coordinator , Cyber Law division, Department of Information Technology</b> has been authorized and designated as "<b>Designated Officer</b>".<br /><br />As per the directions of Group Coordinator, Cyber Law division, under Information Technology Act 2000, instructions for blocking/ unblocking of websites/URLs are issued to Internet Service Licensees.<br /><br />As per the available information no instruction to Internet Service Providers has been issued for Blocking of <a href="http://www.fabulous.com/">http://www.fabulous.com/</a>, <a href="http://www.buydomains.com/">http://www.buydomains.com/</a>, <a href="http://sedo.co.uk/uk/home/welcome/">http://sedo.co.uk/uk/home/welcome/</a> and <a href="http://sedo.co.uk/uk/home/welcome/">http://sedo.co.uk/uk/home/welcome/</a> as mentioned in your RTI application.<br /><br />Copies of Blocking order for which blocking instructions issued by DoT are not being provided are not provided as per Clause 16 of "Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules 2009" which says "Strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof."</li>
<li style="text-align: justify; ">With reference to information (Para 4 & 5 of RTI Aplication ) on Rule 419A of Indian Telegraph Rule, 1951 , the RTI is being forwarded to Dir (AS-III) & CPIO, DoT for providing the information.</li>
<li style="text-align: justify; ">The appeal, it any, may be made before Shri Nitin Jain, DDG(DS) & Appellate Authority, Department of Télécommunications, Room No. 1201, Sanchar Bhawan, 20 Ashoka Road, Nevy Delhi-110 001 within 30 days from the date of receipt of this letter.</li>
</ol></ol>
<table class="invisible">
<tbody>
<tr>
<td colspan="5">
<p class="Bodytext41">Encl: As above</p>
</td>
<th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th>
<td><img src="http://editors.cis-india.org/home-images/Subodh.png" alt="Subodh" class="image-inline" title="Subodh" /></td>
<td></td>
<td></td>
<td></td>
<th></th><th></th>
</tr>
<tr>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td></td>
<td colspan="7">(Subodh Saxena) <br /> DIR (DS-II)<br /> 011-2303 6860<br /> 011-2335 9454<br /></td>
</tr>
</tbody>
</table>
<p>Copy to:</p>
<p><b>(I) Shri Rajiv Kumar, CPIO & Director (AS-III), DoT, New Delhi</b></p>
<p style="text-align: center; ">NOTIFICATION<br />New Delhi, the 27th October, 2009</p>
<p style="text-align: justify; ">G.S.R. 781 (E). — In exercise of the powers conferred by clause (z) of sub-section (2) of section 87, read with sub-section (2) of section 69A of the Information Technology Act 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:</p>
<ol>
<li style="text-align: justify; ">Short title and commencement — (1) These rules may be called the Information Technology (Procedure and Safeguards for Blocking for Access and Information by Public) Rules, 2009.<br />(2) They shall come into force on the date of their publication in the Official Gazette.</li>
<li style="text-align: justify; ">Definitions. — In these rules, unless the context otherwise requires. —<br />(a) "Act" means the Information Technology Act, 2000 (21 of 2000);<br />(b) "computer resource" means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;<br />(c) "Designated Officer" means an officer designated as Designated Officer under rule 3;<br />(d) "Form" means a form appended to these rules;<br />(e) "intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;<br />(f) "nodal officer" means the nodal officer designated as such under rule 4;<br />(g) "organisation" means<br /> (i) Ministries or Departments of the Government of India;<br /> (ii) State Governments and Union Territories;<br /> (iii) Any agency of the Central Government, as may be notified in the Official Gazette, by the Central Government<br />(h) "request" means the request for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource;<br />(i) "Review Committee" means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951.</li>
<li style="text-align: justify; ">Designated Officer — The Central Government shall designate by notification in Official Gazette, an officer of the Central Government not below the rank of a Joint Secretary, as the "Designated Officer", for the purpose of issuing direction for blocking for access by the public any information generated, transmitted. received,, stored or hosted in any computer resource under sub-section (2) of section 69A of the Act.</li>
<li style="text-align: justify; ">Nodal officer or organisation.— Every organisation for the purpose of these rules, shall designate one of its officer as the Nodal Officer and shall intimate the same to the Central Government in the Department of Information Technology under the Ministry of Communications and Information Technotogy, Government of India and also publish the name of the said Nodal Officer on their website.</li>
<li style="text-align: justify; ">Direction by Designated Officer. — The Designated Officer may, on receipt of any request from the Nodal Officer of an organisation or a competent court, by order direct any Agency of the Government or intermediary to block for access by the public any information or part thereof generated, transmitted, received, stored or hosted in any computer resource for any of the reasons specified in sub-section (1) of section 69A of the Act.</li>
<li style="text-align: justify; ">Forwarding of requests by organisation. — (1) Any person may send their complaint to the Nodal Officer of the concerned organisation for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource:<br /> Provided that any request other than the one from the Nodal Officer of the organisation shall be sent with the approval of the Chief Secretary of the concerned State or Union territory to the Designated Officer.<br /> Provided further that in case a Union territory has no Chief Secretary, then, such request may be approved by the Adviser to the Administrator of that Union territory.<br />(2) The organisation shall examine the complaint received under sub-rule (1) to satisfy themselves about the need for taking of action in relation to the reasons enumerated in sub-section (1) of section 69A of the Act and after being satisfied, it shall send the request through its Nodal Officer to the Designated Officer in the format specified in the Form appended to these rules.<br />(3) The Designated Officer shall not entertain any complaint or request for blocking of information directly from any person.<br />(4) The request shall be in writing on the letter head of the respective organisation, complete in all respects and may be sent either by mail or by fax or by e-mail signed with electronic signature of the Nodal Officer.<br /> Provided that in case the request is sent by fax or by e-mail which is not signed with electronic signature, the Nodal Officer shall provide a signed copy of the request so as to reach the Designated Officer within a period of three days of receipt of the request by such fax or e-mail.<br />(5) On receipt, each request shall be assigned a number along with the date and time of its receipt by the Designated Officer and he shall acknowledge the receipt thereof to the Nodal Officer within a period of twenty four hours of its receipt.</li>
<li style="text-align: justify; ">Committee for examinatlon of request.— The request along with the printed sample content of the alleged offending information or part thereof shall be examined by a committee consisting of the Designated Officer as its chairperson and representatives, not below the rank of Joint Secretary in Ministries of Law and Justice, Home Affairs. Information and Broadcasting and the Indian Computer Emergency Response Team appointed under sub-section (1) of section 70B of the Act.</li>
<li style="text-align: justify; ">Examination of request.— (1) On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the informalion or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications, if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary.<br />(2) In case of non-appearance of such person or intermediary, who has been served with the notice under sub-rule (I), before the committee on such specified date and time, the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.<br />(3) In case, such a person or intermediary, who has been served with the notice under sub-rule (1), is a foreign entity or body corporate as identified by the Designated Officer, notice shall be sent by way of letters or fax or e-mail signed with electronic signatures to such foreign entity or body corporate and any such foreign entity or body corporate shall respond to such a notice within the time specified therein, failing which the committee shall give specific recommendation in writing with respect to the request received from the Nodal Officer, based on the information available with the committee.<br />(4) The committee referred to in rule 7 shall examine the request and printed sample information and consider whether the request is covered within the scope of sub-section (1) of section 69A of the Act and that it is justifiable to block such information or part thereof and shall give specific recommendation in writing with respect to the request received from the Nodal Officer.<br />(5) The designated Officer shall submit the recommendation of the committee, in respect of the request for blocking of information along with the details sent by the Nodal Officer to the Secretary in the Department of Information Technology under the Ministry of Communications and Information Technology, Government of India (hereinafter referred to as the "Secretary, Department of Information Technology").<br />(6) The Designated Officer, on approval of the request by the Secretary, Department of Information Technology, shall direct any agency of the Government or the intermediary to block the offending information generaled, transmitted, received, stored or hosted in their computer resource for public access within time limit specified in the direction:<br /> Provided that in case the request of the Nodal Officer is not approved by the Secretary, Department of Information Technology, the Designated Officer shall convey the same to such Nodal Officer.</li>
<li style="text-align: justify; ">Blocking of Information in cases of emergency.— (1) Notwithstanding anything contained in rules 7 and 8, the Designated Officer, in any case of emergency nature, for which no delay is acceptable, shall examine the request and printed sample information and consider whether the request is within the scope of sub-section (1) of section 69A of the Act and it is necessary or expedient and justifiable to block such information or part thereof and submit the request with specific recommendations in writing to Secretary, Department of Information Technology.<br />(2) In a case of emergency nature, tne Secretary. Department of Information Technology may, if he is satisfied that it is necessary or expedent and justifiable for blocking for public access of any information or part thereof through any computer resource and after recording reasons in writing as an interim measure issue such directions as he may consider necessary to such identified or identifiable persons or intermediary in control of such computer resource hosting such information or part thereof without giving him an opportunity of hearing.<br />(3) The Designated Officer, at ihe earliest but not later than forty-eight hours of issue of direction under sub-rule 2, shall bring the request before the committee referred to in rule 7 for its consideration and recommendation.<br />(4) On receipt of recommendations of committee, Secretary, Department of Information Technology, shall pass the final order as regard to approval of such request and in case the request for blocking is not approved by the Secretary. Department of Information Technology in his final order, the interim direction issued under sub-rule (2) shall be revoked and the person or intermediary in control of such information shall be accordingly directed to unblock the information for public access.</li>
<li style="text-align: justify; ">Process of order of court for blocking of Information — In case of an order from a competent court in India for blocking of any information or part thereof generated, transmitted, received, stored or hosted in a computer resource, the Designated Officer shall, immediately on receipt of certified copy of the court order, submit it to the Secretary, Department of Information Technology and initiate action as directed by the court.</li>
<li style="text-align: justify; ">Expeditious disposal of request - The request received from the Nodal Officer shall be decided expeditiously which in no case shall be more than seven working days from the date of receipt of the request.</li>
<li style="text-align: justify; ">Action for non-compliance of direction by Intermediary — In case the intermediary fails to comply with the direction issued to him under rule 9, the Designated Officer shall, with the prior approval of the Secretary, Department of Information Technology, initiate appropriate action as may be required to comply with the provisions of sub-section (3) of section 69A of the Act.</li>
<li style="text-align: justify; ">Intermediary to designate one person to receive and handle directions — (1) Every intermediary shall designate at least one person to receive and handle the directions for blocking of access by the public any information generated, transmitted, received, stored or hosted in any computer resource under these rules.<br />(2) The designated person of the intermediary shall acknowledge receipt of the directions to the Designated Officer within two hours on receipt of the direction through acknowledgement letter or fax or e-mail signed with electronic signature.</li>
<li style="text-align: justify; ">Meeting of Review Commlttee — The Review Committee shall meet at least once in two months and record its findings whether the directions issued under these rules are in accordance with the provisions of sub-seclion (1) of section 69A of the Act and if is of the opinion that the directions are not in accordance with the provisions referred above, it may set aside the directions and issue order for unblocking of said information generated, transmitted, received, stored or hosted in a computer resource for public access.</li>
<li style="text-align: justify; ">Maintenance of records by Designated Officer — The Designated Officer shall maintain complete record of the request received and action taken thereof, in electronic database and also in register of the cases of blocking for public access of the information generated, transmitted, received, stored or hosted in a computer resource.</li>
<li style="text-align: justify; ">Requests and complaints to be confidential — Strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof.</li>
</ol>
<p style="text-align: center; "><b>FORM</b><br />(See rule 6(2))</p>
<p style="text-align: left; "><b> A. Complaint <br /></b></p>
<ol>
<li>Name of the complainant: --_________________________________________________________________<br />(Person who has sent the complaint to the Ministry/Department/State Govt./Nodal Officer)</li>
<li>Address: ________________________________________________________________________________<br /> ________________________________________________________________________________<br /> City: ______________________________ Pin Code: __________________</li>
<li>Telephone: ________________________ (prefix STD code) </li>
<li>Fax (if any): _______________________</li>
<li>Mobile (if any): ______________________</li>
<li>Email (if any): __________________________________<br /><br /><b>B. Details of website/computer resource/intermediary/offending information hosted on the website </b><br />(Please give details wherever known)</li>
<li>URL / web address: ____________________________________</li>
<li>IP Address: _______________________________________</li>
<li>Hyperlink: ________________________________________</li>
<li>Server/Proxy Server address: ________________________________________</li>
<li>Name of the Intermediary: _________________________________________</li>
<li>URL of the Intermediary: __________________________________________<br />(Please attach screenshot/printout of the offending information)</li>
<li>Address or location of intermediary in case the intermediary is telecom service provider, network service provider, internet service provider, web-hosting service provider and cyber cafe or other form of intermediary for which information under points (7), (8), (9), (10), (11) and (12) are not available.<br />___________________________________________________________<br />___________________________________________________________<br />___________________________________________________________<br /><b>C. Details of Request for blocking</b></li>
<li>Recommendations/Comments of the Ministry/State Govt: ________________________<br />________________________________________________________________________<br />________________________________________________________________________</li>
<li>The level at which the comments/recommendation have been approved <br />(Please specify designation) ________________________________________________</li>
<li>Have the complaint been examined in Ministry / State Government: Y/N</li>
<li>If yes, under which of the following reasons it falls (please tick):<br />(i) Interest of sovereignty or integrity of India<br />(ii) Defence of India<br />(iii) Security of the State<br />(iv) Friendly relations with foreign states<br />(v) Public order<br />(vi) For preventing incitement to the commission of any cognisable offence relating to above<br /><b>D. Details of the Nodal Officer, forwarding the complaint along with recommendation of the Ministry/State Govt</b>. <b>and related enclosures</b></li>
<li>Name of the Nodal Officer: ___________________________________________</li>
<li>Designation: ______________________________________________________</li>
<li>Organisation: _____________________________________________________</li>
<li>Address: ________________________________________________ _________<br /> <br /> __________________________________________________________<br /><br /> City: __________________________ Pin Code: _________________</li>
<li>Telephone: ___________________________ (prefix STD code) </li>
<li>Fax (if any) _____________________</li>
<li>Mobile (if any) ______________________</li>
<li>Email (if any): ___________________________<br /><b>E: Any other information:</b><br />F: Enclosures:
<table class="invisible">
<tbody>
<tr>
<td>1.</td>
</tr>
<tr>
<td>2.</td>
</tr>
<tr>
<td>3.</td>
</tr>
</tbody>
</table>
<table class="invisible">
<tbody>
<tr>
<th>Date</th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th>Place</th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th></th><th>Signature</th>
</tr>
</tbody>
</table>
<br />
<table class="invisible">
<tbody>
<tr>
<th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th><br /></th><th>[No. 9(16)J2004-EC]<br />N. RAVI SHANKER, Jt. Secy<br /></th>
</tr>
</tbody>
</table>
<br />3855GI/09-5 </li>
</ol><ol> </ol> <ol> </ol><ol> </ol>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951'>http://editors.cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951</a>
</p>
No publisherpraskrishnaFreedom of Speech and ExpressionSocial MediaInternet GovernanceCensorship2013-03-21T07:58:12ZPageRegulating Social Media: Unrealistic, Impossible, Necessary?
http://editors.cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary
<b>The Press Council of India Chairperson Justice Markandey Katju calls for regulating social media, saying it will prevent offensive material coming into the public domain. But is it really necessary to regulate the social media? If yes, is it possible to do it?</b>
<hr />
<p style="text-align: justify; ">This was <a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/regulating-social-media-unrealistic-impossible-necessary/271183">published by NDTV</a> on April 11, 2013.</p>
<hr />
<p style="text-align: justify; ">NDTV aired a discussion by Ashwin S Kumar, Co-editor, Columnist, The Unreal Times; Kunal Majumder, Assitant Editor, Tehelka.com and Pranesh Prakash, Policy Director, Centre for Internet and Society on April 11, 2013 in response to Justice Katju's comments on bringing 'social media' under the Press Council of India.</p>
<p>Pranesh Prakash laid out four brief points:</p>
<ol>
<li style="text-align: justify; ">'Social media' allows coffee house discussion and toilet wall scrawls to seem like print publications, but it's a mistake to treat it the same way we do print publications. The UK is now planning on using prosecutorial flexibility to refrain from prosecuting simple offensive speech on social media. </li>
<li style="text-align: justify; ">The same laws should apply online as they do offline (but how the apply, can differ), and that is currently the case. Most content-related offences in the IPC, etc., are offences online as well as offline. </li>
<li style="text-align: justify; ">Editors and journalists exist for most print publications and broadcast programmes, while that isn't true for most 'social media'. So guidelines applicable to the press mostly won't be applicable online.</li>
<li style="text-align: justify; ">Electronic publications (like Medianama, The Daily Dish, Huffington Post) which consider themselves engaged in a journalistic venture present a special problem that we <b class="moz-txt-star">do<span class="moz-txt-tag"> </span></b> need to have a public conversation about.</li>
</ol>
<hr />
<h3>Video</h3>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/wzTJO3Vvmhk" width="320"></iframe></p>
<p>
For more details visit <a href='http://editors.cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary'>http://editors.cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary</a>
</p>
No publisherpraskrishnaSocial MediaFreedom of Speech and ExpressionInternet GovernanceVideoCensorshipSocial Networking2013-04-30T16:50:13ZNews ItemReading the Fine Script: Service Providers, Terms and Conditions and Consumer Rights
http://editors.cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights
<b>This year, an increasing number of incidents, related to consumer rights and service providers, have come to light. This blog illustrates the facts of the cases, and discusses the main issues at stake, namely, the role and responsibilities of providers of platforms for user-created content with regard to consumer rights.</b>
<p style="text-align: justify; "><span>On 1st July, 2014 the Federal Trade Commission (FTC) filed a complaint against T-Mobile USA,</span><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn1">[1]</a><span> accusing the service provider of 'cramming' customers bills, with millions of dollars of unauthorized charges. Recently, another service provider, received flak from regulators and users worldwide, after it published a paper, 'Experimental evidence of massive-scale emotional contagion through social networks'.</span><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn2">[2]</a><span> The paper described Facebook's experiment on more than 600,000 users, to determine whether manipulating user-generated content, would affect the emotions of its users.</span></p>
<p style="text-align: justify; ">In both incidents the terms that should ensure the protection of their user's legal rights, were used to gain consent for actions on behalf of the service providers, that were not anticipated at the time of agreeing to the terms and conditions (T&Cs) by the consumer. More precisely, both cases point to the underlying issue of how users are bound by T&Cs, and in a mediated online landscape—highlight, the need to pay attention to the regulations that govern the online engagement of users.</p>
<p style="text-align: justify; "><b>I have read and agree to the terms</b></p>
<p style="text-align: justify; ">In his statement, Chief Executive Officer, John Legere might have referred to T-Mobile as "the most pro-consumer company in the industry",<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn3">[3]</a> however the FTC investigation revelations, that many customers never authorized the charges, suggest otherwise. The FTC investigation also found that, T-Mobile received 35-40 per cent of the amount charged for subscriptions, that were made largely through innocuous services, that customers had been signed up to, without their knowledge or consent. Last month news broke, that just under 700,000 users 'unknowingly' participated in the Facebook study, and while the legality and ethics of the experiment are being debated, what is clear is that Facebook violated consumer rights by not providing the choice to opt in or out, or even the knowledge of such social or psychological experiments to its users.</p>
<p style="text-align: justify; ">Both incidents boil down to the sensitive question of consent. While binding agreements around the world work on the condition of consent, how do we define it and what are the implications of agreeing to the terms?</p>
<p style="text-align: justify; "><b>Terms of Service: Conditions are subject to change </b></p>
<p style="text-align: justify; ">A legal necessity, the existing terms of service (TOS)—as they are also known—as an acceptance mechanism are deeply broken. The policies of online service providers are often, too long, and with no shorter or multilingual versions, require substantial effort on part of the user to go through in detail. A 2008 Carnegie Mellon study estimated it would take an average user 244 hours every year to go through the policies they agree to online.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn4">[4]</a> Based on the study, Atlantic's Alexis C. Madrigal derived that reading all of the privacy policies an average Internet user encounters in a year, would take 76 working days.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn5">[5]</a></p>
<p style="text-align: justify; ">The costs of time are multiplied by the fact that terms of services change with technology, making it very hard for a user to keep track of all of the changes over time. Moreover, many services providers do not even commit to the obligation of notifying the users of any changes in the TOS. Microsoft, Skype, Amazon, YouTube are examples of some of the service providers that have not committed to any obligations of notification of changes and often, there are no mechanisms in place to ensure that service providers are keeping users updated.</p>
<p style="text-align: justify; ">Facebook has said that the recent social experiment is perfectly legal under its TOS,<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn6">[6]</a> the question of fairness of the conditions of users consent remain debatable. Facebook has a broad copyright license that goes beyond its operating requirements, such as the right to 'sublicense'. The copyright also does not end when users stop using the service, unless the content has been deleted by everyone else.</p>
<p style="text-align: justify; ">More importantly, since 2007, Facebook has brought major changes to their lengthy TOS about every year.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn7">[7]</a> And while many point that Facebook is transparent, as it solicits feedback preceding changes to their terms, the accountability remains questionable, as the results are not binding unless 30% of the actual users vote. Facebook can and does, track users and shares their data across websites, and has no obligation or mechanism to inform users of the takedown requests.</p>
<p style="text-align: justify; ">Courts in different jurisdictions under different laws may come to different conclusions regarding these practices, especially about whether changing terms without notifying users is acceptable or not. Living in a society more protective of consumer rights is however, no safeguard, as TOS often include a clause of choice of law which allow companies to select jurisdictions whose laws govern the terms.</p>
<p style="text-align: justify; ">The recent experiment bypassed the need for informed user consent due to Facebook's Data Use Policy<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn8">[8]</a>, which states that once an account has been created, user data can be used for 'internal operations, including troubleshooting, data analysis, testing, research and service improvement.' While the users worldwide may be outraged, legally, Facebook acted within its rights as the decision fell within the scope of T&Cs that users consented to. The incident's most positive impact might be in taking the questions of Facebook responsibilities towards protecting users, including informing them of the usage of their data and changes in data privacy terms, to a worldwide audience.</p>
<p style="text-align: justify; "><b>My right is bigger than yours</b></p>
<p style="text-align: justify; ">Most TOS agreements, written by lawyers to protect the interests of the companies add to the complexities of privacy, in an increasingly user-generated digital world. Often, intentionally complicated agreements, conflict with existing data and user rights across jurisdictions and chip away at rights like ownership, privacy and even the ability to sue. With conditions that that allow for change in terms at anytime, existing users do not have ownership or control over their data.</p>
<p style="text-align: justify; ">In April New York Times, reported of updates to the legal policy of General Mills (GM), the multibillion-dollar food company.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn9">[9]</a> The update broadly asserted that consumers interacting with the company in a variety of ways and venues no longer can sue GM, but must instead, submit any complaint to “informal negotiation” or arbitration. Since then, GM has backtracked and clarified that “online communities” mentioned in the policy referred only to those online communities hosted by the company on its own websites.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn10">[10]</a> Clarification aside, as Julia Duncan, Director of Federal programs at American Association for Justice points out, the update in the terms were so broad, that they were open to wide interpretation and anything that consumers purchase from the company could have been held to this clause. <a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn11">[11]</a></p>
<p style="text-align: justify; "><b>Data and whose rights?</b></p>
<p style="text-align: justify; ">Following Snowden revelations, data privacy has become a contentious issue in the EU, and TOS, that allow the service providers to unilaterally alter terms of the contract, will face many challenges in the future. In March Edward Snowden sent his testimony to the European Parliament calling for greater accountability and highlighted that in "a global, interconnected world where, when national laws fail like this, our international laws provide for another level of accountability."<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn12">[12]</a> Following the testimony came the European Parliament's vote in favor of new safeguards on the personal data of EU citizens, when it’s transferred to non-EU.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn13">[13]</a> The new regulations seek to give users more control over their personal data including the right to ask for data from companies that control it and seek to place the burden of proof on the service providers.</p>
<p style="text-align: justify; ">The regulation places responsibility on companies, including third-parties involved in data collection, transfer and storing and greater transparency on concerned requests for information. The amendment reinforces data subject right to seek erasure of data and obliges concerned parties to communicate data rectification. Also, earlier this year, the European Court of Justice (ECJ) ruled in favor of the 'right to be forgotten'<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn14">[14]</a>. The ECJ ruling recognised data subject's rights override the interest of internet users, however, with exceptions pertaining to nature of information, its sensitivity for the data subject's private life and the role of the data subject in public life.</p>
<p style="text-align: justify; ">In May, the Norwegian Consumer Council filed a complaint with the Norwegian Consumer Ombudsman, “… based on the discrepancies between Norwegian Law and the standard terms and conditions applicable to the Apple iCloud service...”, and, “...in breach of the law regarding control of marketing and standard agreements.”<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn15">[15]</a> The council based its complaint on the results of a study, published earlier this year, that found terms were hazy and varied across services including iCloud, Drop Box, Google Drive, Jotta Cloud, and Microsoft OneDrive. The Norwegian Council study found that Google TOS, allow for users content to be used for other purposes than storage, including by partners and that it has rights of usage even after the service is cancelled. None of the providers provide a guarantee that data is safe from loss, while many, have the ability to terminate an account without notice. All of the service providers can change the terms of service but only Google and Microsoft give an advance notice.</p>
<p style="text-align: justify; ">The study also found service providers lacking with respect to European privacy standards, with many allowing for browsing of user content. Tellingly, Google had received a fine in January by the French Data Protection Authority, that stated regarding Google's TOS, "permits itself to combine all the data it collects about its users across all of its services without any legal basis."</p>
<p style="text-align: justify; "><b>To blame or not to blame</b></p>
<p style="text-align: justify; ">Facebook is facing a probe by the UK Information Commissioner's Office, to assess if the experiment conducted in 2012 was a violation of data privacy laws.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn16">[16]</a> The FTC asked the court to order T-Mobile USA, to stop mobile cramming, provide refunds and give up any revenues from the practice. The existing mechanisms of online consent, do not simplify the task of agreeing to multiple documents and services at once, a complexity which manifolds, with the involvement of third parties.</p>
<p style="text-align: justify; ">Unsurprisingly, T-Mobile's Legere termed the FTC lawsuit misdirected and blamed the companies providing the text services for the cramming.<a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftn17">[17]</a> He felt those providers should be held accountable, despite allegations that T-Mobile's billing practices made it difficult for consumers to detect that they were being charged for unauthorized services and having shared revenues with third-party providers. Interestingly, this is the first action against a wireless carrier for cramming and the FTC has a precedent of going after smaller companies that provide the services.</p>
<p style="text-align: justify; ">The FTC charged T-Mobile USA with deceptive billing practices in putting the crammed charges under a total for 'use charges' and 'premium services' and failure to highlight that portion of the charge was towards third-party charges. Further, the company urged customers to take complaints to vendors and was not forthcoming with refunds. For now, T-Mobile may be able to share the blame, the incident brings to question its accountability, especially as going forward it has entered a pact along with other carriers in USA including Verizon and AT&T, agreeing to stop billing customers for third-party services. Even when practices such as cramming are deemed illegal, it does not necessarily mean that harm has been prevented. Often users bear the burden of claiming refunds and litigation comes at a cost while even after being fined companies could have succeeded in profiting from their actions.</p>
<p style="text-align: justify; "><b>Conclusion </b></p>
<p style="text-align: justify; ">Unfair terms and conditions may arise when service providers include terms that are difficult to understand or vague in their scope. TOS that prevent users from taking legal action, negate liability for service providers actions despite the companies actions that may have a direct bearing on users, are also considered unfair. More importantly, any term that is hidden till after signing the contract, or a term giving the provider the right to change the contract to their benefit including wider rights for service provider wide in comparison to users such as a term that that makes it very difficult for users to end a contract create an imbalance. These issues get further complicated when the companies control and profiting from data are doing so with user generated data provided free to the platform.</p>
<p style="text-align: justify; ">In the knowledge economy, web companies play a decisive role as even though they work for profit, the profit is derived out of the knowledge held by individuals and groups. In their function of aggregating human knowledge, they collect and provide opportunities for feedback of the outcomes of individual choices. The significance of consent becomes a critical part of the equation when harnessing individual information. In France, consent is part of the four conditions necessary to be forming a valid contract (article 1108 of the Code Civil).</p>
<p style="text-align: justify; ">The cases highlight the complexities that are inherent in the existing mechanisms of online consent. The question of consent has many underlying layers such as reasonable notice and contractual obligations related to consent such as those explored in the case in Canada, which looked at whether clauses of TOS were communicated reasonably to the user, a topic for another blog. For now, we must remember that by creating and organising social knowledge that further human activity, service providers, serve a powerful function. And as the saying goes, with great power comes great responsibility.</p>
<hr size="1" style="text-align: justify; " width="33%" />
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref1">[1]</a> 'FTC Alleges T-Mobile Crammed Bogus Charges onto Customers’ Phone Bills', published 1 July, 2014. See: http://www.ftc.gov/news-events/press-releases/2014/07/ftc-alleges-t-mobile-crammed-bogus-charges-customers-phone-bills</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref2">[2]</a> 'Experimental evidence of massive-scale emotional contagion through social networks', Adam D. I. Kramera,1, Jamie E. Guilloryb, and Jeffrey T. Hancock, published March 25, 2014. See:http://www.pnas.org/content/111/24/8788.full.pdf+html?sid=2610b655-db67-453d-bcb6-da4efeebf534</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref3">[3]</a> 'U.S. sues T-Mobile USA, alleges bogus charges on phone bills, Reuters published 1st July, 2014 See: http://www.reuters.com/article/2014/07/01/us-tmobile-ftc-idUSKBN0F656E20140701</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref4">[4]</a> 'The Cost of Reading Privacy Policies', Aleecia M. McDonald and Lorrie Faith Cranor, published I/S: A Journal of Law and Policy for the Information Society 2008 Privacy Year in Review issue. See: http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref5">[5]</a> 'Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days', Alexis C. Madrigal, published The Atlantic, March 2012 See: http://www.theatlantic.com/technology/archive/2012/03/reading-the-privacy-policies-you-encounter-in-a-year-would-take-76-work-days/253851/</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref6">[6]</a> Facebook Legal Terms. See: https://www.facebook.com/legal/terms</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref7">[7]</a> 'Facebook's Eroding Privacy Policy: A Timeline', Kurt Opsahl, Published Electronic Frontier Foundation , April 28, 2010 See:https://www.eff.org/deeplinks/2010/04/facebook-timeline</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref8">[8]</a> Facebook Data Use Policy. See: https://www.facebook.com/about/privacy/</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref9">[9]</a> 'When ‘Liking’ a Brand Online Voids the Right to Sue', Stephanie Strom, published in New York Times on April 16, 2014 See: http://www.nytimes.com/2014/04/17/business/when-liking-a-brand-online-voids-the-right-to-sue.html?ref=business</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref10">[10]</a> Explaining our website privacy policy and legal terms, published April 17, 2014 See:http://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/#sthash.B5URM3et.dpufhttp://www.blog.generalmills.com/2014/04/explaining-our-website-privacy-policy-and-legal-terms/</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref11">[11]</a> General Mills Amends New Legal Policies, Stephanie Strom, published in New York Times on 1http://www.nytimes.com/2014/04/18/business/general-mills-amends-new-legal-policies.html?_r=0</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref12">[12]</a> Edward Snowden Statement to European Parliament published March 7, 2014. See: http://www.europarl.europa.eu/document/activities/cont/201403/20140307ATT80674/20140307ATT80674EN.pdf</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref13">[13]</a> Progress on EU data protection reform now irreversible following European Parliament vote, published 12 March 201 See: http://europa.eu/rapid/press-release_MEMO-14-186_en.htm</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref14">[14]</a> European Court of Justice rules Internet Search Engine Operator responsible for Processing Personal Data Published by Third Parties, Jyoti Panday, published on CIS blog on May 14, 2014. See: http://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref15">[15]</a> Complaint regarding Apple iCloud’s terms and conditions , published on 13 May 2014 See:http://www.forbrukerradet.no/_attachment/1175090/binary/29927</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref16">[16]</a> 'Facebook faces UK probe over emotion study' See: http://www.bbc.co.uk/news/technology-28102550</p>
<p style="text-align: justify; "><a href="file:///C:/Users/jyoti/Desktop/Reading%20the%20fine%20script%20When%20terms%20and%20conditions%20apply.docx#_ftnref17">[17]</a> Our Reaction to the FTC Lawsuit See: http://newsroom.t-mobile.com/news/our-reaction-to-the-ftc-lawsuit.htm</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights'>http://editors.cis-india.org/internet-governance/blog/reading-between-the-lines-service-providers-terms-and-conditions-and-consumer-rights</a>
</p>
No publisherjyotiSocial MediaConsumer RightsGoogleinternet and societyPrivacyTransparency and AccountabilityIntermediary LiabilityAccountabilityFacebookData ProtectionPoliciesSafety2014-07-04T06:31:37ZBlog EntryPublic Art, Technology and Citizenship - Blank Noise Project
http://editors.cis-india.org/digital-natives/making-change/blank-noise-citizenship
<b>Jasmeen Patheja speaks about the active citizen in the digital age, its challenges in the public and private spheres and interdisciplinary methods to overcome them.</b>
<div align="center">
<pre><img src="http://editors.cis-india.org/copy2_of_copy_of_PhotoComic.jpg/image_preview" alt="Reconceptualizing Eve-Teasing" class="image-inline image-inline" title="Reconceptualizing Eve-Teasing" />
<strong>
CHANGE-MAKER:</strong> Jasmeen Patheja
<strong>
PROJECT</strong>: Blank Noise Project: A volunteer-led arts collective community
<strong>
STRATEGY OF CHANGE</strong>:
Fostering an active, participatory and horizontal model of citizenship,
empowering its volunteers to participate politically and address issues
of street sexual harassments in the public sphere.
<strong>
METHOD OF CHANGE</strong>: Public space interventions using community art and technology.</pre>
</div>
<p style="text-align: justify;">To open the interview series for the <a href="http://editors.cis-india.org/digital-natives/making-change/" class="external-link">Making Change project</a>, I interviewed <a class="external-link" href="http://fellows.ted.com/profiles/jasmeen-patheja">Jasmeen Patheja</a>. She is the founder of <a class="external-link" href="http://blog.blanknoise.org/">Blank Noise</a>, a <a class="external-link" href="http://en.wikipedia.org/wiki/Blank_Noise">volunteer-led arts collective community that started in Bangalore</a> and has now spread to Mumbai, Delhi, Chennai, Calcutta, Chandigarh, Hyderabad, and Lucknow. It seeks to address street sexual harassment and violence by triggering dialogue and building testimonials around notions of "teasing" and "harassment" in the public discourse. The collective has garnered attention and momentum since it was founded in 2003, and ever since, it’s fostering a model of active citizenship across India through its volunteer network. The story of Blank Noise and the working of community art with technology highlight the need to create spaces of expression and experience in which civic and political creativity can develop and unfold organically.</p>
<p style="text-align: justify;">One of the main reflections stemming from my conversation with Jasmeen was the question of how technologies can create a sense of ownership and active citizenship. At the moment, we are moving on to a scenario in which technology has a more pervasive and complex presence. It is no longer judged merely on its connective utility, but is also understood as an actor, a space and a context within the ecosystem of social change and political democratic systems. For this reason, it is paramount to get to know the citizen that is being exposed to, influenced and impacted by these technologies and identify the ways in which his self-identity, social membership and political participation (King and Waldron 1988, Turner 1986, 1990) are being molded by them.</p>
<p style="text-align: justify;">In this post, I aim to unpack ‘active citizenship’ drawing from political science literature around citizenship and civic engagement. The analysis will be based on two dichotomies proposed by Turner: the tension between the active-passive citizen, and the contradictions between its private and public presence. I will then refer to Westmeister and Kahnein, Kabeer, Gaventa and Bennett to identify the type of citizen that Jasmeen Patheja hopes to yield through her project and the main challenges of manoeuvering in the public space. Finally, I will look at some of the tactics taken by Blank Noise to reconcile these tensions through community art and technology. This exploration of citizenship is a first stage in the journey of detecting the undertones of citizen action for social change in the digital era.</p>
<h2 align="center" style="text-align: justify;">Unpacking Citizenship</h2>
<h3><br />ACTIVE VS. PASSIVE CITIZEN</h3>
<p><strong>What is the difference between an active and a passive citizen?</strong></p>
<div class="pullquote">A passive citizen comes to existence as a subject, recipient or client of the state (...) regards its rights as privileges handed down from above (...)complies with norms yet does not act to change circumstances (...)and its security and survival are merely determined by constitutional and common law traditions</div>
<p align="justify">Turner places the citizenship question on two points of contention. The first: the vectorial nature of citizenship and how to recognize an ‘active or passive’ citizen. According to his analysis, a citizen either comes to existence from above as mere subject of the state, or from below as an active bearer of its rights (Mann 1987, Ullmann 1975, Turner 1990). The force and direction from which the citizen emerges has important implications for the self-identity of the individual, its confidence and disposition for political participation (Merrifield, 2001). A passive citizen regards its rights as privileges handed down from above, in such a way that citizenship becomes a strategy for social integration and cooperation (Mann, 1986). Westheimer and Kahne find the manifestation of this model in what they call a “Personally Responsible Citizen”: a dutiful citizen who complies with norms, pays taxes and obeys laws, yet does not act to change the circumstances of other communities (2004). However, defining the citizen as a passive actor constraints its role within its network. If the citizen’ security and survival are merely determined by constitutional and common law traditions, and the negotiation between institutions and the individual (Weber 1958 - refer to Turner 1990), the individual is a disempowered recipient or client (Cornwall, 2007) as opposed to the proactive agent Blank Noise looks to recruit and shape through heir interventions.</p>
<p>Patheja, as shown by the interview, aims to disrupt the passive citizen model by fostering political participation and putting its counterpart: ’the active citizen’ forward. Blank Noise believes the citizen must ground its claims from the grassroots and grow from below; yet still be visible and present in the public space, redefining problematic concepts looming in society’s social imaginary; what Turner would describe as revolutionary citizenship (1990).</p>
<blockquote>
<p><strong>How is your practice building a stronger model of citizenship?</strong><br />Change cannot happen only at one level. It would involve more people and different groups from different communities. For example, with citizen-led street action; we can’t end it there. It needs to push home the cause and make [the issues] visible with the government. How do we work with the government? Learning to ask and not assume it’s all their responsibility, but learning to assert our citizenship. What does it mean to do this? What does it mean to ask for safer cities in a way that it doesn’t become somebody else’s business entirely but that it’s about being able to see we are a society. We must understand the process of citizenship; what it means to be in a democratic country and what means to be a female citizen in it.</p>
</blockquote>
<p align="center"><img src="http://editors.cis-india.org/digital-natives/making-change/blank-noise-citizenship" alt="null" align="middle" title="Public Art, Technology and Citizenship - Blank Noise Project" /><img src="http://editors.cis-india.org/SafeCityPledgeDelhi.jpg/image_preview" alt="Safe City Pledge - Delhi" class="image-inline image-inline" title="Safe City Pledge - Delhi" /></p>
<p align="center">Safe City Pledge - Delhi<br /> <img src="http://editors.cis-india.org/digital-natives/blog/uploads/SafeCityPledgeMumbai.jpg/image_preview" alt="Safe City Pledge - Mumbai" class="image-inline image-inline" title="Safe City Pledge - Mumbai" /><br />Safe City Pledge - Mumbai<br />Courtesy of Blank Noise blog: <span id="url_shortened"><a href="http://bit.do/fHMm">http://bit.do/fHMm</a></span></p>
<blockquote>
<p>The message is: “this is your city, this is your space. Don’t be apologetic for your presence” And over time, Action Heros are reporting change: ”I'm getting my space. I'm not thinking twice about what I have to wear.” [...]So it was not only about a vocabulary shift, but a shift in attitude.</p>
</blockquote>
<div align="justify;" class="pullquote">
<p><br />An active citizen comes from below as an active bearer of its rights (...), feels impelled to engage and mobilize its network (...) keeps government and community members in check (...) and evolves with a higher sense of individual purpose favoring solidarity and maintaining networks of community action.</p>
</div>
<p align="justify"> </p>
<p align="justify">Westheimer and Kahne label this stronger orientation towards a social-change approach as the second degree of civic engagement or as the behaviour of a <strong>‘participatory citizen</strong>’; an individual who feels impelled to engage and mobilize its network, skills and action to respond to a community need. This participation impetus is one of Patheja’s main expectations from its Action Hero Network. However, this entails relying on intimate shifts of behaviour and attitude among the volunteers, which are in essence hard to demand, inculcate and entrench by a third party.</p>
<p style="text-align: justify;">Their approach also reflects a vision of citizenship that relies on collective action (Montgomery, 2004) to, not only keep the government in check as suggested by Westheimer and Kahnne, but other community and society members as well. From Bennett’s point of view and taking the role of information technologies into account, he would define the ideal Action Hero as a self-actualizing citizen. In contrast to its counterpart: the dutiful citizen, who sees its obligation to participate in government-centered activities, the AC evolves with higher sense of individual purpose, favouring and maintaining networks of community action, backed up by a growing distrust in media and the government. In this sense the role of technology is also paramount to how Blank Noise spreads its predicament and expands its outreach:</p>
<blockquote>
<p class="normal"><strong>What is the role of technology and media in your project?</strong><br />Using the web for example, we happened to stumble upon blogging and we realized there was a community there. Once [Action Heroes] started blogging and the press started writing about it, it created a community further. So, going back to the fact that our constant thread of conversation has been the web, there is a large percentage of the English speaking youth who are action hero agents anidd now have the responsibility of taking the conversations and actions forward.</p>
<p class="normal">On the other hand, this is not always the case. In Delhi we did an event in collaboration with Action Aid. Many of the Action Aid volunteers weren’t necessarily on Facebook. They were people who were largely Hindi speaking; their stories were about harassment in slums and these were men and women wanting to do something about the issue. So being a loose volunteer is one way, but identifying different communities is also important. Every space is a point of engagement and we use different forms of media to enable that.</p>
</blockquote>
<p style="text-align: justify;">Citizen participation, communication and mobilization mechanisms, mediated by the state in the past, are now taken up by the people in the form of social protest, civil disobedience, digital activism, consumerism, etc. (Bennett, 2008). The emphasis on collective action also calls for a broader understanding of the citizen, away from the state-conferred rights and duties, and a definition that includes solidarity and membership to broader communities (Ellison 1997), Heater and Kabeer defines this as a “horizontal view” that stresses the relationship between citizens over that of the state and the individual (Heater 2002, Kabeer 2007) and Berlin has also made the connection between group identity and affiliation as a building block of citizenship (1969).</p>
<blockquote>
<p class="normal">[on Giving Letters to Strangers] We trigger a conversation and it takes its own journey. Over time, what does it take to lean back and relax? Each person participates establishing their own level of comfort and every person’s narrative is different. [The project is] happening in Delhi while it is happening in Bangalore; allowing it to happen in a very individual, self-confrontational and at the same time, collective experience. They are doing this alone knowing that others are doing the same.</p>
</blockquote>
<p style="text-align: center;"><br /><img src="http://editors.cis-india.org/home-images/LettersStrangers.jpg/image_preview" alt="Giving out letters to Strangers" class="image-inline image-inline" title="Giving out letters to Strangers" /><br /><br /><br /><br /><strong>Dear Stranger</strong>:<br />Giving out letters to strangers in the streets of Bangalore. Courtesy of Blank Noise blog: <span id="url_shortened"><a href="http://bit.do/fHJw">http://bit.do/fHJw</a></span></p>
<p style="text-align: center;"><span id="url_shortened"><a href="http://bit.do/fHJw"><img src="http://editors.cis-india.org/home-images/copy_of_LettersStrangers2.jpg/image_preview" alt="Giving out letters to Strangers 2" class="image-inline image-inline" title="Giving out letters to Strangers 2" /><br /></a></span></p>
<p style="text-align: justify;">In this way, Blank Noise has envisioned and designed a project that fosters an active, participatory, self-actualizing and horizontal model of citizenship. This combination builds a citizen prototype with a positive disposition and attitude to civic action; traits that Gaventa identifies as elements of empowerment and political agency that can derive into higher possibilities for social change. Having citizens identify community’s ailments as their own and their network’s responsibility, results in conversations that act as causal nexus of community action. The main challenge at the moment is the implementation of this model. To what extent will the Action Hero represent this model uniformly and steadily, preventing dissonance between Blank Noise’s discourse and its practice. And secondly, how will Blank Noise volunteers negotiate their political participation between public and private spaces?</p>
<h3>PRIVATE VS. PUBLIC SPACE</h3>
<p style="text-align: justify;"><strong>Where should the active citizen operate?</strong></p>
<p style="text-align: justify;">The second tension on citizenship, as identified by Turner, is its political expression on the public arena versus its manifestation on the individual’s private space. We asked Jasmeen about the crises and spaces in which Blank Noise is operating:</p>
<blockquote>
<p style="text-align: justify;"><strong>To what crisis is the project responding to?</strong><br />The project responds to the crises and experiences of street harassment. To the sense of getting defensive, agitated, angry; creating a wall and feeling vulnerable in a city. Blank Noise was initiated at a time were street harassment was disregarded and dismissed as teasing. This ‘eve-teasing’, just going by the pulse of things, included concepts of molestation and sexual violence. There was denial, there was silence.</p>
</blockquote>
<p style="text-align: justify;">First point on the public vs. private dilemma lies on the issue at hand. Volunteers are working to re-conceptualize social norms around ‘safety’, ‘agency’ and ‘gender’, that are not only deeply entrenched in society, but that can also be traced back to the private domain of traditions and culture at the household level. By openly discussing ‘sexual harassment’ in the public space and enabling volunteers to express and act on the basis of a new understanding of citizenship and freedom, the collective is possibly also redefining dynamics at the private space of its volunteers. What is more, the motivation and determination to be an Action Hero, as mentioned by Patheja, must be grounded in a "<em>personal shift and challenge</em>".</p>
<blockquote>
<p style="text-align: justify;"><strong>How does this translate it into citizens taking ownership of the cause and sustained behavioral change in everyday practices?</strong><br />Anger is a good starting point. It is worrying when there is no anger. And then it has to be a personal shift. We’ve learned from conversations and feedback that volunteers who would say: “we came to address the issue and we are realizing that we are doing something in ourselves”. So what is the spirit of an Action Hero? Allowing something to shift and challenging something in yourself. Last year for example we worked towards having locality specific Action Hero networks and on how this intuitive citizen can become a full citizen, in terms of being an informed citizen as well.</p>
</blockquote>
<p style="text-align: center;" class="normal"><img src="http://editors.cis-india.org/home-images/copy_of_ActionHeroGame.jpg/image_preview" alt="Action Hero Game" class="image-inline image-inline" title="Action Hero Game" /></p>
<p style="text-align: center;" class="normal">Acton Hero Game. Courtesy of Blank Noise blog: <span id="url_shortened"><a href="http://bit.do/fHKq">http://bit.do/fHKq</a></span></p>
<p style="text-align: justify;" class="normal">The expectation of a personal pledge at the individual, community and public level, signals the project is blurring the lines between the private and public domain and fostering the politicization of the citizen at all fronts. This suggests that in order for the claims and behaviour of Action Heroes to become sustainable, they must also trickle into the common citizen’s routine. In words of Arendt: <em>“the space of appearance comes into being whenever men are together in the manner of speech and action, predating all formal constitutions of the public realm” </em>(1989). Establishing the private-public space as a common ground works towards bringing consistency and coherence to the interventions, yet it remains in many ways problematic and threatening to individual freedoms.</p>
<blockquote>
<p style="text-align: justify;"><strong>Does your project create new spaces for citizen expression and action?</strong><em><br /></em>Our role is to build testimonials and translate them back into the public domain. An example of this is the blogathon that happened in 2006, initiated by our Action Hero. She said: let’s invite bloggers to share their experiences of street harassment. 4-5 male and female Action Heroes made the event happen and in a couple of days we had hundreds and hundreds of testimonials and people talking about this for the first time. Maybe it was the first time speaking about it, remembering things that happened ages ago and that they had never shared. Suddenly the web was seen as a space where people could speak. Suddenly people had so much to say about the issue, the person dismissing the issue and their relationship with their body and the city.</p>
</blockquote>
<p style="text-align: center;"><img src="http://editors.cis-india.org/home-images/TalktoMe1.JPG/image_preview" alt="Talk to Me" class="image-inline image-inline" title="Talk to Me" /><br /><strong>Talk To Me:</strong><br />Creating spaces for conversation and collaboration. Courtesy of Blank Noise blog: <span id="url_shortened"><a href="http://bit.do/fHKq">http://bit.do/fHKq</a></span></p>
<p style="text-align: justify;">Turner reflects on the French revolution tradition to shed light on this particular challenge for active citizenship, as what bound Frenchmen together was their citizen identity (Baker 1987). Passing on from state subjects, to actively voicing their political, civic and social aspirations coupled with meaningful mechanisms of participation. However, how do we reconcile this tradition of positive democracy with the American understanding of citizenship that enshrines the autonomous sanctity of the private space. American individualism values personal success and the main way to exercise political participation is through voluntary associations that do not represent a large-scale force -or a threat- with enough power to shape their lives (Bellah et. al 2008, Turner 1990). Translating this to the Bangalorean context: a changing society in which community- based traditions in the household are coexisting with an agitated and growingly individualist youth culture; the issues and interventions must be addressed in an implicational manner. The connections between the issue and individual freedoms must be made, in order for these actors to be willing to politicize their action in both the public and private spheres.</p>
<h3><strong>MIDDLE CLASS ACTIVISM<br /></strong></h3>
<p style="text-align: justify;"><strong>Can everybody be an active citizen?</strong></p>
<p style="text-align: justify;">The second challenge is rooted in the socio-economic group that comprises the body of volunteers of Blank Noise. I asked Jasmeen the extent to which the Action Hero Network was being led by middle class citizens.</p>
<blockquote>
<p style="text-align: justify;"><strong>Are you only reaching out to the middle class activist that has the resources to be part of the Blank Noise project?</strong><br /> Yes and no. A large percentage of our volunteers are usually web-savvy, English speaking, teenagers or in their early 20s. Others have been around for the last decade. The mainstream media also reports back mainly to the web-savvy groups. But it is also about one action hero inspiring another Action Hero. I find [the project] fascinating in terms of the spaces it leaks into. Some people tell me they were at their religious meeting and they overheard two women talking about the project, who were not necessarily web-savvy. Ultimately the media is not only reporting us but we see them as point of engagement in which more and more citizens take ownership of the issue. Although our network is largely urban middle class, we are at the point where we collaborate largely with other groups that are working with different communities so it completes the entire picture. The question is: how do you take the conversation forward? What can be that medium? and what kind of technology can get to people?</p>
</blockquote>
<div style="text-align: justify;" class="pullquote"><br />
<div align="right">
<div align="left">“We use different strategies to enable dialogue across communities. It could be on the street, on the blog, within a workshop; the web has been a constant space. If you are an Action Hero, yes you may be web-savvy, but you also carry the responsibility to take the conversation to another space."</div>
Jasmeen Patheja</div>
</div>
<p style="text-align: justify;"><br />This demographic is ultimately an interest group leading a movement and has taken on the responsibility of spreading the call to action among its network. Foregoing the assumption that every Indian citizen wants to challenge concepts of sexual harassment in the city, the fact that one group is spreading a specific opinion puts forward a tension between the dynamics of public social protest and the existence of privatized dissent. Turner reflects on Mill’s On Liberty and shows how this could entail a threat of spreading mass opinion to the extent it makes all people alike (Turner, 1990).</p>
<p style="text-align: justify;">Kabeer also highlights this by exploring the tension between universality versus particularity — a debate that questions the extent to which human rights advocacy in the public sphere will be equally received and supported by every group, given diversity of opinion within as well as obstacles to freedom of speech. Nyamu-Musembi attempts to bridge this dichotomy by framing universality as “the experience of resistance to general oppression” and particularity as “how resistance speaks to each relevant social context”. In order to have the issue speak to all citizen groups, Blank Noise is currently also depending on the the ability of its Action Heroes to pass on a message that speaks to the different needs and cultural sensibilities of communities who do not belong to the Anglo-speaking middle class it is currently operating with.<br /><br />In response to having the protest of a specific social group translate into homogenized dissent, Jasmeen is looking to increase her outreach by approaching and working with other groups.</p>
<blockquote>
<p style="text-align: justify;"><strong>How can you build effective solidarity networks among middle class activists, their networks and further communities?</strong><br />It is an attitude we are trying to push forward: have that conversation with your grandma; with your domestic help. We would love to do something with domestic workers for example. We don’t hear enough stories of who empowers or harasses them. That’s definitely a rising concern within the collective. We really need to have the complete spectrum and what kind of technology or strategies can be used to get it. Identifying these groups is a proposed future project and also an ongoing preoccupation. For now, our role is to trigger conversations and have them take their own journey.</p>
</blockquote>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">METHODS FOR CHANGE</h3>
<p><strong>How does the combination of art and technology foster active citizenship?<br /></strong></p>
<h3 style="text-align: justify;"></h3>
<p style="text-align: justify;">Some of the strategies Blank Noise has devised to overcome these obstacles relate back to the interdisciplinary design of its interventions. First, they are designed to be highly visible and aimed at triggering dialogue. This enables opinions and thoughts to flow from the private space into the public realm. Also, community art and technology as tools of expression and reflection, work as effective channels for responses to flow back and forth between both spaces.</p>
<blockquote>
<p style="text-align: justify;"><strong>Why did you take a multi-stakeholder approach and brought together technology and art?</strong><br />The entire collective is really based on defining strategies and identifying approaches to breaking denial and building conversation. Our role is enabling dialogue across forms of media and using different strategies to enable dialogue across communities. There are also lots of questions of how to create an art practice that can be collaborative and participatory. Where does art exist? How can art exist, be, feel confrontational? Can arte provoke? How can we build testimonials? Could be on the street, on the blog, twitter or within a workshop. The web has been a constant space. We also work with the web in a way that we have a growing community of Action Heroes, and if you are web-savvy, you carry the responsibility to take the conversation to another space.</p>
</blockquote>
<p style="text-align: center;"><img src="http://editors.cis-india.org/home-images/copy_of_Twitter.jpg/image_preview" alt="Twitter" class="image-inline image-inline" title="Twitter" /><br />Twitter campaign. Courtesy of: <span id="url_shortened"><a href="http://bit.do/fHLK">http://bit.do/fHLK</a></span><br /><br /><img src="http://editors.cis-india.org/home-images/Ineverasked1.jpg/image_preview" alt="I never asked for it" class="image-inline image-inline" title="I never asked for it" /><br />Public art installation to redefine sexual harassment and eve-teasing. Courtesy of Caravan Magazine: <span id="url_shortened"><a href="http://bit.do/fHLV">http://bit.do/fHLV</a></span></p>
<p align="justify">Bennett and his work on civic engagement in the digital age, notes that one of the main strategies for positive civic engagement is nurturing creative and expressive actions in this generation.</p>
<blockquote>
<p style="text-align: justify;"><strong>How does this approach work towards creating sustainable change?</strong><em><br /></em>We are creating tool kits for different ideas so the community can take it forward. There are many creative processes that equip them to initiate action in a community space. For instance, the Yelahanka Action Heroes workshop (http://yelahankaactionheroes.wordpress.com/), was a one month initiative that got Sristhi students to arrive to action heroism through games, like the Hahaha Sangha for example. We invited women out of their homes, and we would speak through pure laughter, gibberish and a sense of play. In doing that, people felt they knew each other. Anonymity was broken, people felt comfortable and safety was established. We are working towards creating safe public spaces and going beyond the biases that come from language or through age. But through the Hahaha Sangha we found there is still a need for facilitators to continue the project with the purpose of creating a safe space. Also, one of our interns is in charge of creating an Action Hero College Network and spreading information about different events, calendars, etc. It is still fluid but we are moving in that direction. Action Heroes are the strength of the project.</p>
</blockquote>
<p style="text-align: center;"><img src="http://editors.cis-india.org/home-images/copy_of_Hahaha.jpg/image_preview" alt="Hahaha" class="image-inline image-inline" title="Hahaha" /><br />Hahaha Sangha sessions - Courtesy of Blank Noise blog <span id="url_shortened"><a href="http://bit.do/fHMb">http://bit.do/fHMb</a></span></p>
<p style="text-align: justify;">The ideal of an engaged youth must be sustained by the empowerment of young people; getting them to recognize their personal expression and identities in collective spaces (Bennett, 2008). By setting in place mechanisms and opportunities to critically dissect societal problems and develop a political perspective as put forward by Westheimer and Kahne, as well as the awareness, self-identity and political confidence to act, as noted by Gaventa, the Blank Noise interventions become a context in which active citizenship is more likely.</p>
<h3 style="text-align: justify;">Conclusion</h3>
<p style="text-align: justify;">This analysis, part of the Methods of Social Change research project, aimed to shed light on how change-makers such as Blank Noise still place a heavy consideration on the notion of citizenship when designing, framing and implementing their projects. What is more, it is paramount to identify the working characteristics of an ‘active citizen’ and reflect on whether these are desirable and necessary in the populace to make political and social change more likely. It also contributes to the Making Change project by unpacking the workings of a change actor that is not confined to the ‘category of citizen’ but is still closely linked to processes of citizen action and social change in Bangalore.</p>
<p style="text-align: justify;">As seen throughout this post, the analysis of our citizen is not grounded on its relationship with the state, but instead on its disposition, self-identity and notion of social membership. After identifying our ideal active citizen: an active bearer of his rights, that defines itself horizontally in relation to other citizens and their rights, participates in political processes and is informed about and at odds with power imbalances, the Blank Noise experience demonstrated spatial tensions in implementing this ideal and practice in the public and private realms. Designing strategies and identifying technologies that enable a flow of thought and action between both spaces is a way of restructuring the ecosystem in which volunteers from the Action Hero Network interact with each other, reclaim their citizenship and alter the status quo from within. While Blank Noise is not starting a revolution, it is consolidating a process of steady and growing resistance in the public and private discourse of sexual harassment and eve-teasing in the city.</p>
<p style="text-align: justify;">Shah also notes there are implicit codes allowing only certain people to embrace this model of citizenship. This was evident on the demographic that comprises the activist bases of Blank Noise and the risks of homogenizing the political space with their discourse of change. Jasmeen Patheja brought this point forward herself, but with full confidence on the ability of dialogue and conversation to keep luring other social groups and communities into joining the debate. We discussed opportunities from exploring the foreign women experience in the public space in India to expanding the Blank Noise basis through simultaneous international interventions enabled and coordinated through technology. The network is ever-growing and its mechanisms of change are constantly innovating and adapting through its content. In the meantime, the ‘active citizen’ remains at the core of it all, pushing the project forward; fighting among other battles, that of its identity’s reassertion in the landscape of change.</p>
<hr />
<h2 style="text-align: justify;">Sources</h2>
<ol>
<li>Arendt, Hannah (1989) The Human Condition. Chicago, IL and London: The University of Chicago Press.</li>
<li>Baker, Keith Michael. <em>The French Revolution and the creation of modern political culture</em>. Vol. 3. Pergamon Press, 1987.</li>
<li style="text-align: justify;">Bennett, W. Lance. "Changing citizenship in the digital age." <em>Civic life online: Learning how digital media can engage youth</em> 1 (2008): 1-24.</li>
<li>Berlin, Isaiah. "Two concepts of liberty." <em>Berlin, I</em> (1969): 118-172.</li>
<li style="text-align: justify;">Bellah, Robert Neelly, ed. <em>Habits of the heart: individualism and commitment in American life: with a new preface</em>. University of California Pr, 2008.</li>
<li style="text-align: justify;">Cornwall, Andrea, and Vera Schatten Coelho, eds. <em>Spaces for change?: the politics of citizen participation in new democratic arenas</em>. Vol. 4. Zed Books, 2007.</li>
<li>Ellison, N. (1997) ‘Towards a new social politics: citizenship and reflexivity in late modernity’, Sociology, 31(4): 697–717.</li>
<li style="text-align: justify;">Gaventa, John, and Rajesh Tandon “Citizen engagements in a globalizing world." <em>Globalizing citizens: New dynamics of inclusion and exclusion</em> (2010): 3-30.</li>
<li style="text-align: justify;">Heater, D. (2002) World Citizenship: Cosmopolitan Thinking and Its Opponents, London: Continuum</li>
<li>Kabeer, Naila, ed. <em>Inclusive citizenship: Meanings and expressions</em>. Vol. 1. Zed Books, 2005.</li>
<li style="text-align: justify;">Kathryn Montgomery et al., Youth as E-Citizens: Engaging the Digital Generation. Center for Social Media, 2004. Retrieved February 15, 2007. <a href="http://www.centerforsocialmedia.org/ecitizens/project.htm">http://www.centerforsocialmedia.org/ecitizens/project.htm</a>.</li>
<li style="text-align: justify;">Mann, Michael. "Ruling class strategies and citizenship". <em>Sociology </em>21, no.3 (1987): 339-354</li>
<li>Shah, Nishant “Whose Change is it Anyways? <em>Hivos Knowledge Program. </em>April 30, 2013.</li>
<li>Turner, Bryan. Outline of a Theory of Citizenship. Sociology (May 1990), 24 (2), pg. 189-217</li>
<li style="text-align: justify;">Westheimer, Joel, and Joseph Kahne. "What kind of citizen? The politics of educating for democracy." <em>American educational research journal</em> 41, no. 2 (2004): 237-269</li></ol>
<p>
For more details visit <a href='http://editors.cis-india.org/digital-natives/making-change/blank-noise-citizenship'>http://editors.cis-india.org/digital-natives/making-change/blank-noise-citizenship</a>
</p>
No publisherdenisseSocial MediaWeb PoliticsDigital NativesMaking ChangeBlank Noise ProjectResearchers at Work2015-04-17T10:43:55ZBlog EntryPastebin, Dailymotion, Github blocked after DoT order: Report
http://editors.cis-india.org/internet-governance/news/times-of-india-anupam-saxena-december-31-2014-pastein-dailymotion-github-blocked-after-dot-order
<b>A number of Indian users are reporting they're not able to access websites such as Pastebin, DailyMotion and Github while accessing the internet through providers such as BSNL and Vodafone.</b>
<p style="text-align: justify; ">The article by Anupam Saxena was <a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Pastebin-Dailymotion-Github-blocked-after-DoT-order-Report/articleshow/45701713.cms">published in the Times of India</a> on December 31, 2014. Pranesh Prakash is quoted.</p>
<hr />
<p style="text-align: justify; ">The block was first reported by Pastebin, a website where you can store text online for a set period of time, through its social media accounts on December 19. In a follow-up post on December 26, the site posted that it was still blocked in India on the directions of the Indian government.A number of users also posted about the blocks on Reddit threads confirming that the sites have been blocked by Vodafone, BSNL and Hathway, among others.It now appears that the blocks are being carried out on the instructions of DoT (Department of Telecom). The telecom body reportedly issued a notification regarding the same on December 17. A screenshot of the circular has been posted on Twitter by Pranesh Prakash.</p>
<p style="text-align: justify; ">The notification mentions that 32 URLs including Pastebin, video sharing sites Vimeo and DailyMotion, Internet archive site archive.org and Github.com( a web-based software code repository), have been blocked under Section 69A of the Information Technology Act, 2000. DoT has also asked ISPs to submit compliance reports. However, we have not been able to verify the authenticity of the circular.</p>
<p style="text-align: justify; ">At the time of writing this story, we could not access Pastebin, DailyMotion and Github on Vodafone 3G and our office network that has access via dedicated lines. Vodafone is not displaying any errors and is simply blocking access. However, a number of users report that they're getting an error that says 'the site is blocked as per the instructions of Competent Authority.' However, we were able to access all the websites on Airtel 3G.</p>
<p style="text-align: justify; "><span id="advenueINTEXT" style="float:left; "> </span><span style="float:left; "><span id="advenueINTEXT" style="float:left; "> </span></span></p>
<p style="text-align: justify; "><span style="float:left; "><br /></span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/news/times-of-india-anupam-saxena-december-31-2014-pastein-dailymotion-github-blocked-after-dot-order'>http://editors.cis-india.org/internet-governance/news/times-of-india-anupam-saxena-december-31-2014-pastein-dailymotion-github-blocked-after-dot-order</a>
</p>
No publisherpraskrishnaSocial MediaInternet GovernanceChilling EffectCensorship2015-01-03T04:17:48ZNews Item