<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1271 to 1285.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/rti-reply-2015.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/rti.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/rti-application-30-june.docx"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/rti-application-june-2011.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/rti-app-2016.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Royson.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Routing.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/rti-reply-2015.pdf">
    <title>RTI Reply 2015</title>
    <link>http://editors.cis-india.org/a2k/blogs/rti-reply-2015.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/rti-reply-2015.pdf'&gt;http://editors.cis-india.org/a2k/blogs/rti-reply-2015.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-17T14:48:30Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg">
    <title>RTI Reply</title>
    <link>http://editors.cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg</link>
    <description>
        &lt;b&gt;Reply to RTI&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg'&gt;http://editors.cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-01-13T02:27:04Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/rti.pdf">
    <title>RTI PDF</title>
    <link>http://editors.cis-india.org/internet-governance/blog/rti.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/rti.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/rti.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-12-22T02:54:15Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf">
    <title>RTI on Use of DPI Technology by ISPs</title>
    <link>http://editors.cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf</link>
    <description>
        &lt;b&gt;CIS had filed a Right to Information on use of DPI Technology by ISPs. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf'&gt;http://editors.cis-india.org/telecom/use-of-dpi-technology-by-isps.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-19T07:14:38Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india">
    <title>RTI on Officials and Agencies Authorized to Intercept Telephone Messages in India</title>
    <link>http://editors.cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india</link>
    <description>
        &lt;b&gt;In an RTI mailed on April 17, 2013, the Centre for Internet and Society sought comprehensive information on the officials and agencies authorized to intercept telephone messages in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;A portion of the RTI still awaits response, as it was &lt;a href="http://editors.cis-india.org/internet-governance/blog/redirected-to-deity.pdf" class="internal-link"&gt;redirected to the Department of Electronics and Information Technology&lt;/a&gt;. But on May 23, 2013 &lt;/span&gt;&lt;span&gt;&lt;a href="http://editors.cis-india.org/internet-governance/blog/response-from-ministry-of-home-affairs.pdf" class="internal-link"&gt;Rakesh Mittal of the Ministry of Home Affairs responded in brief and directed us to the 2007 Amendment to the 1885 Indian Telegraph Act&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Referring to rule 419-A of the amendment and the Ministry of Home Affairs website, we find that within central government the power to order communications surveillance is normally reserved for Union Home Secretary, a position held by Shir Anil Goswami as of June 30, 2013 (previously R.K. Singh). The amendment goes on to say,  “In unavoidable circumstances,” however, such an order can be commanded by a Joint Secretary who has been authorized by Union Home Secretary Goswami. On the federal level, the Ministry of Home Affairs includes nearly 20 such Joint Secretaries able to be authorized for making interception commands.&lt;/p&gt;
&lt;p&gt;A listing of the original question requests are given below:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized by the Central Government to issue an order      for interception under section 5(2) of the Telegraph Act, 1885&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the officers      authorized to issue interception orders under Rule 419A(1) of the      Telegraph Rules, 1951 in unavoidable circumstances when such orders cannot      be issued by the secretary to the Government of India, Ministry of Home      Affairs.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing the name, rank and office address of the      officers/agencies designated as “competent authority” in terms of the Rule      419A(1) proviso of the Telegraph Rules, 1951.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      intercept, monitor, decrypt any information generated, transmitted,      received or stored in any computer resource under section 69(1) of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list of the agencies authorized by the Central Government to      monitor and collect traffic data or information generated, transmitted,      received or stored in any computer resource under section 69-B of the      Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please      provide a list containing name, rank and office address of the      officers/agencies authorized to issue interception orders under Rule 3,      first proviso, of the Information Technology (Procedure and Safeguards for      Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide a list of the agencies authorised to intercept, monitor, decrypt any information generated, transmitted, received or stored in any computer resource under Rule 4 of the Information Technology (Procedure and Safeguards for Interception, Monitoring, and Decryption of Information) Rules, 2009.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india'&gt;http://editors.cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T05:23:54Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79">
    <title>RTI on Complaints under Section 79 of IT Act</title>
    <link>http://editors.cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79</link>
    <description>
        &lt;b&gt;The Department of Electronics and Information Technology, Ministry of Communications and Information Technology, gave its reply to an RTI application filed by Saket Bisani. We are reproducing the text below:&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;b&gt;No. 14(146)/2012-ESD&lt;/b&gt;&lt;br /&gt;M/o Communications &amp;amp; Information Technololgy&lt;br /&gt;Department of Electronics &amp;amp; Information Technology&lt;br /&gt;Electronics Niketan,6, CGO Complex&lt;br /&gt;New Delhi-110003&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th&gt;&lt;/th&gt;&lt;th colspan="4"&gt;Dated: 15.1.13&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: left; "&gt;Subject: RTI application received from Shri Saket Biswani&lt;/p&gt;
&lt;p style="text-align: left; "&gt;With reference to your RTI application requesting for the following information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an article titled "We believe in the freedom of speech and expression" published in Mint of February 1, 2012, Dr. Gulshan Rai has been quoted saying:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"if the police say something has to be disabled, we tell then (Google and others) that a complaint has come under section 79 of the IT Act. We feel them: "we're bringing it to your notice. Please look at it and do whatever best you can do under the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect the above quote I request you to provide me the following information under Right to Information Act, 2005:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Please provide me a copy of every complaint that has been received by the Department of Information Technology (now the Department of Electronics and Information Technology) under Section 79 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Please provide me a copy of every notice and complaint that your office has sent pursuant to complaints received under section79 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The information as received from the custodian of the information is placed below:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Department of Electronics and Information Technology has not received any complaint quoting specifically under Section 79 of the Information Technology Act,2000.&lt;/li&gt;
&lt;li&gt;Not applicable.&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th&gt;&lt;br /&gt;&lt;/th&gt;&lt;th colspan="7"&gt;(A.K. Kaushik)&lt;br /&gt;Additional Director &amp;amp; CPIO&lt;br /&gt;(E-Security &amp;amp; Cyber Laws)&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: left; "&gt;Shri Saket Bisani &lt;br /&gt;No. 194, 2nd ׳C Cross &lt;br /&gt;Domlur 2nd Stage * &lt;br /&gt;Bangalore-560 071&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: left; "&gt;Read a &lt;a href="http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf" class="internal-link"&gt;scanned version&lt;/a&gt; of the reply that we got from the Department of Electronics and Information Technology.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79'&gt;http://editors.cis-india.org/internet-governance/resources/rti-on-complaints-under-it-act-section-79&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-06-12T09:50:40Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/rti-application-30-june.docx">
    <title>RTI Application, 30 June 2011</title>
    <link>http://editors.cis-india.org/internet-governance/rti-application-30-june.docx</link>
    <description>
        &lt;b&gt;Information on the de-duplication process in the Aadhar Project. The RTI Application by Sahana Sarkar was filed on 30 June 2011 for providing information under the Right to Information Act 2005. &lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/rti-application-30-june.docx'&gt;http://editors.cis-india.org/internet-governance/rti-application-30-june.docx&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-10-12T12:46:55Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/rti-application-june-2011.pdf">
    <title>RTI Application, 30 June 2011</title>
    <link>http://editors.cis-india.org/internet-governance/rti-application-june-2011.pdf</link>
    <description>
        &lt;b&gt;This RTI Application was filed by Sahana Sarkar on behalf of the Centre for Internet and Society on 30 June 2011.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/rti-application-june-2011.pdf'&gt;http://editors.cis-india.org/internet-governance/rti-application-june-2011.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-10-13T07:07:19Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf">
    <title>RTI Application Reply</title>
    <link>http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf</link>
    <description>
        &lt;b&gt;Reply by the Ministry of Communications &amp; Information Technology, dated January 15, 2013.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf'&gt;http://editors.cis-india.org/internet-governance/blog/reply-to-rti-application-from-saket-bisani.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-01-30T07:29:14Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/rti-app-2016.pdf">
    <title>RTI App 2016</title>
    <link>http://editors.cis-india.org/a2k/blogs/rti-app-2016.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/rti-app-2016.pdf'&gt;http://editors.cis-india.org/a2k/blogs/rti-app-2016.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-17T15:10:06Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf">
    <title>RTI App 2015</title>
    <link>http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf'&gt;http://editors.cis-india.org/a2k/blogs/rti-app-2015.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2016-11-17T15:20:04Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Royson.png">
    <title>Royson</title>
    <link>http://editors.cis-india.org/home-images/Royson.png</link>
    <description>
        &lt;b&gt;Royson&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Royson.png'&gt;http://editors.cis-india.org/home-images/Royson.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-08-12T10:26:18Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Routing.png">
    <title>Routing</title>
    <link>http://editors.cis-india.org/home-images/Routing.png</link>
    <description>
        &lt;b&gt;Routing&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Routing.png'&gt;http://editors.cis-india.org/home-images/Routing.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-05-06T06:36:44Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online">
    <title>Roundtable: Identifying and Limiting Hate Speech and Harassment Online</title>
    <link>http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online</link>
    <description>
        &lt;b&gt;Japreet Grewal attended this event organized by Software Freedom Law Centre at Constitution Club Of India, Rafi Marg, New Delhi on July 28, 2016.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the original report published by SFLC &lt;a class="external-link" href="http://sflc.in/summary-report-roundtable-on-identifying-and-limiting-hate-speech-and-harassment-online-new-delhi-july-28-2016/"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;SFLC.in organized a roundtable discussion on 28&lt;sup&gt;th&lt;/sup&gt; July, 2016 in New Delhi to initiate a focused and collaborative  dialogue around the increasingly important issues of online harassment  and hate speech. This roundtable was intended as the first in a series  of discussions around said issues, and was attended by representatives  from various stakeholder groups including intermediary platforms, civil  society groups, and media houses, along with individuals who had  personally experienced such online abuse &amp;amp; harassment. The core  objective of this discussion was to recognize and understand the vast  range of concerns that exist in this sphere, in an effort to develop a  framework for the regulation of such activities, without stepping on the  right to freedom of expression. The discussion was conducted under  Chatham House rules so as to facilitate an uninhibited exchange of  views.&lt;/p&gt;
&lt;p align="justify"&gt;Over the course of the event, the complex and  multifaceted nature of its overarching theme unraveled, as the  discussion moved from underlying social constructs, to responsibilities  of intermediary platforms, adequacy of existing laws, sensitization of  everyday users and effective handling of grievances by law enforcement  agencies. At the very outset, it was highlighted that social media  platforms, with their increasing popularity, are being considered  centralized hubs for businesses and others. However, individuals,  communities &amp;amp; institutions often find themselves at the receiving  end of sustained abuse and threats either on grounds of their actual or  perceived characteristics, or over their online expression. The dynamic  discussion that ensued brought to light significant concerns that would  require a collaborative effort across stakeholder groups to address. For  the sake of clarity, we are categorizing these learnings under the  following heads:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Conceptual understanding of online harassment and hate &lt;/span&gt;&lt;span&gt;speech&lt;/span&gt;&lt;span&gt;:&lt;/span&gt; It was discussed at length that hate speech and speech that culminates  in harassment on the online sphere, are reflective of the social outlook  of the country at large. Women were seen as more frequent targets of  harassment in the form of rape threats, sexual remarks, and name  calling, whereas men are mostly called out for their beliefs and  opinions. When discussing hate speech relations, it was considered  important to take note of the power dynamics at play amongst the  stronger groups, and the vulnerable ones. Limiting such content gets  specially complicated considering the apprehension that in an effort to  monitor hate speech and harassment, free speech may get stifled. The  paradox of anonymity being an enabler of free speech, as well the reason  for unabashed harassment adds yet another layer of complexity to the  issue. Moreover, it was felt that a nuanced distinction needed to be  made regarding the systematic attacks by online mobs against a  particular person, as opposed to hateful and/or harassing speech that  engages on a one to one level. This all culminated in a realization that  this issue goes beyond the online domain, into the societal mindset  that is amplified on the Internet, and that the faint line between free  speech, and hateful &amp;amp; harassing speech is very difficult to  pin-point.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Role of intermediaries&lt;/span&gt;:  It was the opinion of the representatives of intermediary platforms at  the roundtable that the current legal frameworks in the country are  sufficient to tackle this issue and they should operate in compliance  with such laws. While the specific terms of service may differ in terms  of permissible content depending on the type of service being provided  by the intermediary, these platforms do invariably keep a check on the  content being generated and evaluate them for compliance with the  applicable terms of service. Additionally, platforms that have the  option of users creating &amp;amp; generating their own content, give the  user various tools such as block, filter, un-follow, and other  customized options to moderate the content they receive. though the  intermediaries, in their own words ‘ are not a delete squad, but a  compliance team’, it was said that they ran the perpetual risk of either  censoring content that should not have been censored, or not censoring  enough of the content that should have been censored. This incentivizes  them to exercise zero-tolerance policies in certain areas such as child  sexual abuse or terrorism, and resort to immediate take down of content  related to such themes. However, in spite of the sheer volume of  material that is generated and reported, it was felt that a completely  automated approach cannot be followed for filtering hateful and  harassing content that violates terms of service Taking down content and  expression requires processing various factors that determine the  context of that material, and this calls for a subjective approach that  requires a set of human eyes. Therefore, the intermediaries do have  tools for users that protect them from hate and harassing speech, and  they work with certain safety experts to ensure that the users feel safe  while using their services.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Adequacy of legal frameworks&lt;/span&gt;:  A distinction was drawn over the course of the discussion between hate  speech as a social as opposed to a legal concept. For legal purposes,  speech would not attract penalties until it incites a real threat of  violence and civic disorder. However, the law is not sufficiently  equipped to deal with speech that does not incite violence, but causes  psychological damage. It was undisputed that the concerns in this area  cannot be solved by creating more statutes. Going down this road could  lead to the creation of a Section 66A equivalent that would lead to  censorship through law and cause a chilling effect on freedom of  expression. It was emphasized that the existing laws have adequate  provisions, but a strict implementation is required.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Response from law enforcement agencies&lt;/span&gt;:  An evaluation of this point led to the conclusion that people who are  harassed online, or are the targets of hate speech, are hesitant to  approach the police and law enforcement agencies for their help. There  have been instances where the police is unable to help due to the  limited application of laws in such cases, as mentioned above.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p align="justify"&gt;&lt;span&gt;Possible remedies&lt;/span&gt;: As a part of this roundtable, SFLC.in had proposed a set of &lt;a href="http://sflc.in/wp-content/uploads/2016/08/BestPractices_OnlineHarassment_SFLCin.pdf"&gt;best practices&lt;/a&gt; aimed at limiting hateful and harassing content online. These were  intended as self-regulatory measures that could be followed by  intermediaries functioning as speech platforms, where users could create  and publish content without pre-filtrations. Amongst the measures that  was discussed extensively was the practice of promoting ‘counter speech’  on the platforms that are most frequently used to spread hateful  propaganda and harassment. This was generally seen as an effective  counter-measure deserving further exploration, and one of the  intermediaries mentioned a project they were formulating on ‘counter  radicalization’. However, concerns were raised with respect to the  identification of areas that would benefit from counter speech, and its  effectiveness with respect to mob attacks. Another unique approach  suggested by the participants was to ‘vaccinate’ first time users by  educating them about the enormity and complexity of the Internet,  including intiation of such users to the idea that freedom of expression  online often crosses over to hate speech and harassment. This would act  as an initiation process to understand the working of the Internet and  the prevalence of hateful and harassing content on its numerous speech  platforms, so that first-time users are not discouraged from using the  Internet merely due to the presence of negative content. An interesting  suggestion for the platforms was to work towards a mechanism that is  more offender centric, and facilitates the tracking of repeat offenders  along with providing tools of blocking for users.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p align="justify"&gt;This roundtable served in exploring the many layers  of hateful and harassing speech that runs across roles and  responsibilities of various stakeholder groups and concerns that are  deeply entrenched in our societal outlook. The increasing frequency and  amount of such content on the Internet is an indication of the urgent  need to collaborate and develop a framework for limiting such speech,  while balancing the fundamental right to freedom of expression. We thank  all the participants and appreciate their valuable contributions that  facilitated a better understanding of the overall theme.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online'&gt;http://editors.cis-india.org/internet-governance/news/roundtable-identifying-and-limiting-hate-speech-and-harassment-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:31:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability">
    <title>Roundtable on ICANN Accountability </title>
    <link>http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability</link>
    <description>
        &lt;b&gt;The roundtable was organised by the Department of Electronics and Information Technology (DeitY), National Internet Exchange of India and Centre for Communication Governance, National Law University, Delhi at the Indian International Centre, New Delhi on 13 March 2015. Geetha Hariharan participated in the roundtable.&lt;/b&gt;
        &lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Timings&lt;/th&gt;&lt;th&gt;Programme&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 &lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;Welcome Address by Chimayi Arun, Research Director, Centre for Communication Governance at National Law University, Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;10.40&lt;/td&gt;
&lt;td&gt;Introductory Remarks by Dr. Ajay Kumar (IAS) Joint Secretary, DeitY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.45&lt;br /&gt;11.15&lt;/td&gt;
&lt;td&gt;Session I: NTIA IANA Functions' Stewardship Transition&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;br /&gt;14.30&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.30&lt;br /&gt;16.30&lt;/td&gt;
&lt;td&gt;Session II: Accountability and Transparency at ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability'&gt;http://editors.cis-india.org/internet-governance/news/roundtable-on-icann-accountability&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-03T16:54:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
