<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-march-26-2015-sunil-abraham-fear-uncertainty-doubt"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/privacy-v-transparency"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham">
    <title> Why the DNA Bill is open to misuse: Sunil Abraham</title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham</link>
    <description>
        &lt;b&gt;The Human DNA Profiling Bill, the law that regulates the collection, storage and use of the human genetic code, has attracted some strong criticism from civil liberties groups including the Bengaluru-based Centre for Internet and Society (CIS) which had participated in the expert committee for DNA profiling constituted by the Department of Biotechnology in 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;CIS circulated a detailed dissent note earlier  this year on the draft of the Bill. As the government gets ready to  table the Bill in Parliament, CIS Executive Director &lt;b&gt;Sunil Abraham&lt;/b&gt; tells &lt;i&gt;Kanika Datta&lt;/i&gt; why the provisions of the Bill are open to misuse and invasion of privacy. Edited excerpts:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;&lt;span class="p-content"&gt;&lt;b&gt;Why does Centre for Internet and Society  reject using DNA analysis for non-forensic use as set out in the Human  DNA Profiling Bill in its current form? What are the possible risks  involved here?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; The problem here is that the introduction to the Bill talks of DNA  matches "without a doubt". But the way we understand it, biometric  technology depends on approximate matching and not discrete matching.  Unlike, say, the technology used for matching digital signatures,  machines for matching DNA, fingerprints or the iris specify a false  positive ratio when they leave the factory - that's what created the  controversy in the O J Simpson trial, for example. This means you have  to be very conservative in populating the database. For a given false  positive ratio - the larger the database the greater the incidence of  mistaken identification. That is why we think that for purposes other  than forensic use, it would be better to create other databases.&lt;br /&gt; &lt;br /&gt; Let me clear: we are not Luddites but neither are we naïve  techno-enthusiasts. After all, the Innocence Project in the US has  managed to overturn the convictions of many people who were held guilty  through DNA evidence. But it is a myth that the more sophisticated the  technology the more secure and accurate it is. In fact, the reverse is  often true. For instance, the voter machines we use in India are  primitive technology but they are much harder to compromise compared to  the voting machines used in the US. Given all this, we believe that  there should be "process fixes", such as sending DNA collected from a  crime scene to two laboratories as a check and balance against the  fallibility of human beings and machines.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;CIS made the point that the powers of the DNA Board are too wide. In  what possible way could these powers be misused since the Board is to be  an independent authority?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; When this exercise was started, the DNA Board had 26 functions. We  proposed that this be cut this down to ten, which was accepted by a  sub-committee. But when the final Bill came back it rejected the  consensus view and restored the 26 functions, including things like  "raising the general awareness". All this detracts from the Board's  primary role and efficiency and expands its discretionary powers. It is  true that a good regulator needs some amount of discretion but this  should be a limited discretion within a tightly defined scope -- this is  true for any regulator, not just the DNA Board.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;The provision that no civil suit can be entertained on any matter on  which the DNA Board is empowered under the Act looks excessive. Is there  any precedent that explains why this provision was introduced? What  kind of oversight and checks and balances are there in other  jurisdictions that could be incorporated in the Indian law? &lt;/b&gt;&lt;br /&gt; &lt;br /&gt; I can understand the logic here; the government is trying to ensure that  the regulator has final say. After all, if you look at telecom, the  decisions of the TDSAT (Telecom Dispute Settlement &amp;amp; Appellate  Tribunal) can be appealed in the High Court and the Supreme Court. But  eliminating judicial appeal as this Bill has state amounts to a  violation of classic regulatory design by circumventing the appellate  process. Ideally, we need a tripartite separation of law in which the  executive frames policies, the DNA board implements them and the courts  adjudicate upon them.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;You have said the term "DNA Analysis" has not been defined. Could you explain the possible risks of the absence of a definition?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; DNA analysis is of many types and some of them allow you to get to know a  person quite intimately in terms of their medical history, genetic  traits and so on. But forensic analysis looks at a limited set of  markers which are essentially privacy-protecting and from which no  genetic traits can be determined. You can't, for instance, do a study on  the genetic make-up of criminals from this analysis. Now, if this Bill  is around law enforcement - which we know is the policy intention - then  the DNA analysis should be limited to those markers. That would reduce  the chances of abuse.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;You have also criticised the low standards of information disclosure  and suggest the issue should be vested in an independent third party  rather than the DNA Bank Manager. Could you explain how this would help?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; In information and technology and telecom there is an executive  authorisation mechanism in place for information sharing that requires  the home secretary's permission for non-emergency situations and the  head of the police station in the case of an emergency. We want a  similar authorisation process - say, a judge and an established paper  trail so that there are proper checks and balances. When personal  information is involved, even the DNA Board is not well placed because  its members are scientists whereas disclosure of personal information is  a question of the law.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;You have said the Bill has not been brought in line with the nine  national privacy principles set out by an expert committee in 2012.  Shouldn't a privacy law precede the passing of the DNA Bill in any case?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; It's not a chicken-and-egg situation, but the point to consider is that  the world is moving towards European data protection principles, and  something like 100 countries have adopted it. If we in India want to  trade in European personal information (via our BPO and outsourcing  businesses) we must have a law that is adequate from the data protection  perspective. This means, among other things, mandating that anyone  whose DNA profile is accessed receives a notice to this effect, for  instance. We know that the Department of Personnel and Training has  incorporated the principles set out in the Justice Shah report in the  privacy Bill two years ago but we haven't heard anything about it since.  If and when this Bill is enacted, it will have overriding powers over a  host of laws. But where the DNA Bill is concerned, there is no reason  for it not to take cognisance of a later law.&lt;br /&gt; &lt;br /&gt; &lt;b&gt;What has been the government's reaction to this dissent note?&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; No reaction!&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-13T08:37:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it">
    <title>The scariest bill in Parliament is getting no attention – here’s what you need to know about it</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it</link>
    <description>
        &lt;b&gt;A bill proposes creation of a national DNA data bank, without requisite safeguards for privacy, and opens the information to everything from civic disputes to compilation of statistics.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nayantara Narayanan was &lt;a class="external-link" href="http://scroll.in/article/743049/the-scariest-bill-in-parliament-is-getting-no-attention-heres-what-you-need-to-know-about-it"&gt;published in Scroll.in&lt;/a&gt; on July 24, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On Wednesday, the Narendra Modi government told the Supreme Court that  India's citizens have no fundamental right to privacy. Attorney General  Mukul Rohatgi &lt;a href="http://timesofindia.indiatimes.com/india/No-fundamental-right-to-privacy-to-citizens-Centre-tells-SC/articleshow/48171323.cms" target="_blank"&gt;referred&lt;/a&gt; to a 1950 court verdict which held that the right to privacy was not a  fundamental right while defending the constitutional validity of the  Aadhar scheme, a massive database of information of individual citizens  including biometrics and bank accounts. At the same time, the government  is planning another big database.&lt;br /&gt;&lt;br /&gt;In the ongoing stormy monsoon  session of Parliament, where the government and opposition have locked  horns over several proposed legislation, Human DNA Profiling Bill  2015 has been making little noise but can have widespread impact on  India’s criminal justice system and the privacy of citizens. The bill  aims to regulate the collection and use of genetic material from crime  scenes, and also proposes the creation of a national DNA databank that  might be used for non-forensic purposes.&lt;br /&gt;&lt;br /&gt;DNA is a mighty tool,  especially in criminal forensics, but access to a person’s genetic  information can be highly intrusive and dangerous. DNA contains  information about health and genetic relationships that can influence  employment, insurance. It can be tampered with and planted at crime  scenes.&lt;br /&gt;&lt;br /&gt;Law and poverty expert Usha Ramanathan and Centre for  Internet and Society executive director Sunil Abraham, who are members  of an expert committee on DNA profiling constituted by the government,  have written dissent notes against the final draft of the Human DNA  Profiling Bill. Ramanathan and Abraham are of the opinion that there  aren’t adequate safeguards to privacy and too much power rests with the  proposed DNA Profiling Board.&lt;br /&gt;&lt;br /&gt;Ramanathan notes that one of the  biggest challenges of a DNA database is function creep – the gradual  widening of the use of a technology beyond the purpose for which it was  originally intended. As this DNA profiling bill enters Parliament, here  are some questions we should be asking. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Is DNA evidence infallible?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The  short answer is “no”. Despite all the crime shows and murder movies we  have seen where DNA evidence nails the perpetrator to the crime, DNA  evidence is far from absolute. Genetic material recovered from a crime  scene is likely to be only a partial strand of DNA. Analysing this  partial strand can lead to a match with the person that left the DNA  behind but can also lead to a coincidental match with people who happen  to have a similar gene sequence in their DNA. False incriminations can  happen when more than one person’s DNA get mixed at the crime scene,  from DNA contamination, mislabelling and even degradation over time.&lt;br /&gt;&lt;br /&gt;In  the Aarushi Talwar murder case, for instance, the Hyderabad-based  Centre for DNA Fingerprinting and Diagnostics altered its 2008 report in  2013 and admitted to &lt;a href="http://www.dnaindia.com/india/report-aarushi-talwar-murder-case-talwars-say-cbi-tampered-with-evidence-1917479" target="_blank"&gt;typographical errors&lt;/a&gt; in the description of its DNA samples. The evidence could have changed the course of the investigation.&lt;br /&gt;&lt;br /&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;What will the national DNA database look like?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The  bill proposes to set up a national DNA data bank and a number of state  or regional data banks that will feed into the national data pool. Every  data bank will have six categories under which DNA profiles will be  filed – crime scene index, suspects’ index, offenders’ index, missing  persons’ index, unknown deceased persons’ index, and volunteers’ index.  The DNA profiling board will have the power to include more categories.  In the offenders’ index, the DNA information will be linked to the name  of the person from whom it was collected. All others will be linked to a  case reference number.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What happens when my genetic material is on the database?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The  bill gives sanction for broad use of DNA profiles and samples – to  identify victims of accidents or disasters, to identify missing persons,  for civil disputes and other offences. It also allows the information  to be used to create population statistics, identification research,  parental disputes, issues relating to reproductive technologies and  migration. In his dissent note, Abraham argues that all non-forensic use  should be rejected.&lt;br /&gt;&lt;br /&gt;Cases like whether paternity should be  determined, unwed mothers leaving their children and adopted children  looking for their natural parents are hugely contestable things, said  Ramanathan. “You are changing multiple structures and not recognising  any of them,” she added.&lt;br /&gt;&lt;br /&gt;Even though the bill allows for DNA  information of offenders to be expunged once a court acquits them or  sets aside a conviction, it makes no provision for removing other kinds  of profiles.&lt;br /&gt;&lt;br /&gt;The CDFD, which will be instrumental in building and  processing DNA profiles, is using the CODIS software bought from the  US's Federal Bureau of Investigation an compatible with their systems.  The FBI used CODIS to identify victims of the terrorist attacks on the  World Trade Center in 2001. More recently, the CDFD used CODIS to  identify some who died  in the Uttarakhand floods of 2013 after asking  for 5,000 people who were possibly relatives of the deceased to  undertake DNA testing.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Can the DNA profiling board protect our genetic information?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The  bill grants the board vast powers to allow the use of DNA profiles in  any civil and criminal proceedings that it deems necessary. “Ideally  these powers would lie with the legislative or judicial branch,” Abraham  said, in his dissent note. “Furthermore, the Bill establishes no  mechanism for accountability or oversight over the functioning of the  Board.”&lt;br /&gt;&lt;br /&gt;Ramanathan questions the constitution of the board  itself, her worry being that the board is not a body of disinterested  officials. The secretary of the board is supposed to be from the Centre  for DNA Fingerprinting and Diagnostics, an autonomous institute that  will get a lot of work from the creation of the national DNA data bank.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Why does a DNA fingerprinting consent form ask for caste?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;One  of the most troubling features of the creation of a databank is the  consent form to be signed by a person donating blood for DNA analysis.  Along with name, gender and address, the form also asks for caste to be  listed.&lt;br /&gt;&lt;br /&gt;India has a history of unwarrantedly linking caste and  community with criminality. Members of decriminalised tribes regularly  report being harassed by the police and even having false cases foisted  on them simply because they are linked to a certain community. Tagging  caste onto genetic data can result in unfair profiling and  identification errors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United Kingdom set up its national criminal DNA database in 1995.  The database expanded over a decade by including genetic information of  anyone who was arrested till more than one million innocent people were  on it – including &lt;a href="http://www.sciencedirect.com/science/article/pii/S2090536X14000239" target="_blank"&gt;a grandmother&lt;/a&gt; who didn’t return a football to children who kicked it into her garden.  The dangers of a genetic database are too much state oversight, false  implication in crimes and a loss of privacy – none of which should come  to pass without at least a debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it'&gt;http://editors.cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-09-13T07:56:42Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check">
    <title>India’s digital check</title>
    <link>http://editors.cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check</link>
    <description>
        &lt;b&gt;All nine pillars of Digital India directly correlate with policy research conducted at the Centre for Internet and Society, where I have worked for the last seven years. This allows our research outputs to speak directly to the priorities of the government when it comes to digital transformation. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.dnaindia.com/analysis/column-india-s-digital-check-2102575"&gt;published by DNA&lt;/a&gt; on July 8, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Broadband Highways and Universal Access to Mobile Connectivity: The  first two pillars have been combined in this paragraph because they both  require spectrum policy and governance fixes. Shyam Ponappa, a  distinguished fellow at our Centre calls for the leveraging of shared  spectrum and also shared backhaul infrastructure. Plurality in spectrum  management, for eg, unlicensed spectrum should be promoted for  accelerating backhaul or last mile connectivity, and also for community  or local government broadband efforts. Other ideas that have been  considered by Ponappa include getting state owned telcos to exit  completely from the last mile and only focus on running an open access  backhaul through Bharat Broadband Limited. Network neutrality  regulations are also required to mitigate free speech, diversity and  competition harms as ISPs and TSPs innovate with business models such as  zero-rating.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Public Internet Access Programme: Continuing investments into Common  Service Centres (CSCs) for almost a decade may be questionable and  therefore a citizen’s audit should be undertaken to determine how the  programme may be redesigned. The reinventing of post offices is very  welcome, however public libraries are also in need urgent reinventing.  CSCs, post offices and public libraries should all leverage long range  WiFi for Internet and intranet, empowering BYOD [Bring Your Own Device]  users. Applications will take time to develop and therefore immediate  emphasis should be on locally caching Indic language content. State &lt;a href="http://www.dnaindia.com/topic/public-library-acts"&gt;Public Library Acts&lt;/a&gt; need to be amended to allow for borrowing of digital content. Flat-fee  licensing regimes must be explored to increase access to knowledge and  culture. Commons-based peer production efforts like Wikipedia and  Wikisource need to be encouraged.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Governance: Reforming Government through Technology: DeitY, under the  leadership of free software advocate Secretary RS Sharma, has  accelerated adoption and implementation of policies supporting  non-proprietary approaches to intellectual property in e-governance.  Policies exist and are being implemented for free and open source  software, open standards and electronic accessibility for the disabled.  The proprietary software lobby headed by Microsoft and industry  associations like &lt;a href="http://www.dnaindia.com/topic/nasscom"&gt;NASSCOM&lt;/a&gt; have tried to undermine these policies but have failed so far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government should continue to resist such pressures. Universal  adoption of electronic signatures within government so that there is a  proper audit trail for all communications and transactions should be  made an immediate priority. Adherence to globally accepted data  protection principles such as minimisation via “form simplification and  field reduction” for Digital India should be applauded. But on the other  hand the mandatory requirement of Aadhaar for DigiLocker and eSign  amounts to contempt of the Supreme Court order in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e-Kranti — Electronic Delivery of Services: The 41 mission mode projects  listed are within the top-down planning paradigm with a high risk of  failure — the funds reserved for these projects should instead be  converted into incentives for those public, private and public private  partnerships that accelerate adoption of e-governance. The dependency on  the National Informatics Centre (NIC) for implementation of &lt;a href="http://www.dnaindia.com/topic/e-governance"&gt;e-governance&lt;/a&gt; needs to be reduced, SMEs need to be able to participate in the  development of e-governance applications. The funds allocated for this  area to DeitY have also produced a draft bill for Electronic Services  Delivery. This bill was supposed to give RTI-like teeth to e-governance  service by requiring each government department and ministry to publish  service level agreements [SLAs] for each of their services and  prescribing punitive action for responsible institutions and individuals  when there was no compliance with the SLAs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information for All: The open data community and the Right to  Information movement in India are not happy with the rate of  implementation of National Data Sharing and Accessibility Policy  (NDSAP). Many of the datasets on the Open Data Portal are of low value  to citizens and cannot be leveraged commercially by enterprise.  Publication of high-value datasets needs to be expedited by amending the  proactive disclosure section of the Right to Information Act 2005.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Electronics Manufacturing: Mobile patent wars have begun in India with  seven big ticket cases filed at the Delhi High Court. Our Centre has  written an open letter to the previous minister for HRD and the current  PM requesting them to establish a device level patent pool with a  compulsory license of 5%. Thereby replicating India’s success at  becoming the pharmacy of the developing world and becoming the lead  provider of generic medicines through enabling patent policy established  in the 1970s. In a forthcoming paper with Prof Jorge Contreras, my  colleague Rohini Lakshané will map around fifty thousand patents  associated with mobile technologies. We estimate around a billion USD  being collected in royalties for the rights-holders whilst eliminating  legal uncertainties for manufacturers of mobile technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT for Jobs: Centralised, top-down, government run human resource  development programmes are not useful. Instead the government needs to  focus on curriculum reform and restructuring of the education system.  Mandatory introduction of free and open source software will give Indian  students the opportunity to learn by reading world-class software. They  will then grow up to become computer scientists rather than computer  operators. All projects at academic institutions should be contributions  to existing free software projects — these projects could be global or  national, for eg, a local government’s e-governance application. The  budget allocated for this pillar should instead be used to incentivise  research by giving micro-grants and prizes to those students who make  key software contributions or publish in peer-reviewed academic journals  or participate in competitions. This would be a more systemic approach  to dealing with the skills and knowledge deficit amongst Indian software  professionals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early Harvest Programmes: Many of the ideas here are very important. For  example, secure email for government officials — if this was developed  and deployed in a decentralised manner it would prevent future  surveillance of the Indian government by the NSA. But a few of the other  low-hanging fruit identified here don’t really contribute to  governance. For example, biometric attendance for bureaucrats is just  glorified bean-counting — it does not really contribute to more  accountability, transparency or better governance.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author works for the Centre for Internet and Society which  receives funds from Wikimedia Foundation that has zero-rating alliances  with telecom operators in many countries across the world&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check'&gt;http://editors.cis-india.org/internet-governance/blog/dna-sunil-abraham-july-8-2015-india-digital-check&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    

   <dc:date>2015-09-15T14:55:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency">
    <title>The generation of e-Emergency</title>
    <link>http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency</link>
    <description>
        &lt;b&gt;The next generation of censorship technology is expected to be ‘real-time content manipulation’ through ISPs and Internet companies. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/pL8oDtSth36hkoDvIjILLJ/The-generation-of-eEmergency.html"&gt;Livemint&lt;/a&gt; on June 22, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Censorship during the Emergency in the 1970s was done by clamping down on the media by intimidating editors and journalists, and installing a human censor at every news agency with a red pencil. In the age of both multicast and broadcast media, thought and speech control is more expensive and complicated but still possible to do. What governments across the world have realized is that traditional web censorship methods such as filtering and blocking are not effective because of circumvention technologies and the Streisand effect (a phenomenon in which an attempt to hide or censor information proves to be counter-productive). New methods to manipulate the networked public sphere have evolved accordingly. India, despite claims to the contrary, still does not have the budget and technological wherewithal to successfully pull off some of the censorship and surveillance techniques described below, but thanks to Moore’s law and to the global lack of export controls on such technologies, this might change in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, mass technological-enabled surveillance resulting in self-censorship and self-policing. The coordinated monitoring of Occupy protests in the US by the Department of Homeland Security, the Federal Bureau of Investigation (FBI) counter-terrorism units, police departments and the private sector showcased the bleeding edge of surveillance technologies. Stingrays or IMSI catchers are fake mobile towers that were used to monitor calls, Internet traffic and SMSes. Footage from helicopters, drones, high-res on-ground cameras and the existing CCTV network was matched with images available on social media using facial recognition technology. This intelligence was combined with data from the global-scale Internet surveillance that we know about thanks to the National Security Agency (NSA) whistle-blower &lt;a class="external-link" href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;, and what is dubbed “open source intelligence” gleaned by monitoring public social media activity; and then used by police during visits to intimidate activists and scare them off the protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Second, mass technological gaming—again, according to documents released  by Snowden, the British spy agency, GCHQ (Government Communications  Headquarters), has developed tools to seed false information online,  cast fake votes in web polls, inflate visitor counts on sites,  automatically discover content on video-hosting platform and send  takedown notices, permanently disable accounts on computers, find  private photographs on Facebook, monitor Skype activity in real time and  harvest Skype contacts, prevent access to certain websites by using  peer-to-peer based distributed denial of service attacks, spoof any  email address and amplify propaganda on social media. According to &lt;i&gt;The Intercept&lt;/i&gt;,  a secret unit of GCHQ called the Joint Threat Research Intelligence  Group (JTRIG) combined technology with psychology and other social  sciences to “not only understand, but shape and control how online  activism and discourse unfolds”. The JTRIG used fake victim blog posts,  false flag operations and honey traps to discredit and manipulate  activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, mass human manipulation. The exact size of the Kremlin troll army  is unknown. But in an interview with Radio Liberty, St. Petersburg  blogger Marat Burkhard (who spent two months working for Internet  Research Agency) said, “there are about 40 rooms with about 20 people  sitting in each, and each person has their assignments.” The room he  worked in had each employee produce 135 comments on social media in  every 12-hour shift for a monthly remuneration of 45,000 rubles.  According to Burkhard, in order to bring a “feeling of authenticity”,  his department was divided into teams of three—one of them would be a  villain troll who would represent the voice of dissent, the other two  would be the picture troll and the link troll. The picture troll would  use images to counter the villain troll’s point of view by appealing to  emotion while the link troll would use arguments and references to  appeal to reason. In a day, the “troika” would cover 35 forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next generation of censorship technology is expected to be  “real-time content manipulation” through ISPs and Internet companies. We  have already seen word filters where blacklisted words or phrases are  automatically expunged. Last week, Bengaluru-based activist Thejesh GN  detected that Airtel was injecting javascript into every web page that  you download using a 3G connection. Airtel claims that it is injecting  code developed by the Israeli firm Flash Networks to monitor data usage  but the very same method can be used to make subtle personalized changes  to web content. In China, according to a paper by Tao Zhu et al titled &lt;i&gt;The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions&lt;/i&gt;,  “Weibo also sometimes makes it appear to a user that their post was  successfully posted, but other users are not able to see the post. The  poster receives no warning message in this case.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than two decades ago, John Gilmore, of Electronic Frontier  Foundation, famously said, “the Net interprets censorship as damage and  routes around it.” That was when the topology of the Internet was highly  decentralized and there were hundreds of ISPs that competed with each  other to provide access. Given the information diet of the average  netizen today, the Internet is, for all practical purposes, highly  centralized and therefore governments find it easier and easier to  control.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency'&gt;http://editors.cis-india.org/internet-governance/blog/livemint-june-22-2015-sunil-abraham-the-generation-of-e-emergency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-06-29T16:40:54Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality">
    <title>Multiple Aspects Need to be Addressed as the Clamour Grows for Network Neutrality</title>
    <link>http://editors.cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality</link>
    <description>
        &lt;b&gt;In the global debate there are four violations of Network Neutrality that are considered particularly egregious.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dnaindia.com/analysis/column-everyone-equally-unhappy-2077796"&gt;published in DNA &lt;/a&gt;on April 16, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One — blocking of destinations or services in order to force the  consumer to pay extra charges for access, two — not charging or  zero-rating of certain destinations and services with or without  extraction of payment from the sender or destination, and three —  throttling or prioritisation of traffic between competing destinations  or services and four — specialised services wherein the very same &lt;a href="http://www.dnaindia.com/topic/internet"&gt;Internet&lt;/a&gt; infrastructure is used to provide non-Internet but IP based services such as IP-TV.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main harms of network neutrality violations are as follows: one, censorship by private parties without legal basis; two, innovation harms because the economic threshold for new entrants is raised significantly; three, competition harms as monopolies become more entrenched and then are able to abuse their dominant position; four, harms to diversity because of the nudge effect that free access to certain services and destinations has on consumers reducing the infinite plurality of the Internet to a set of menu options. The first and fourth harm could result in the Internet being reduced to a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is insufficient to try and address this with networking rules for engineers such as “all packets should be treated equally.” But a set of principles could be developed that can help us grow access without violating network neutrality. Wikimedia Foundation has already developed their principles which they call “Wikipedia Zero Operating Principles”. In India our principles could include the following. One, no blocking without legal basis. Two, transparency — all technical and commercial arrangements are to be disclosed to the public. Three, non-exclusivity — all arrangements should be available to all parties, no special deals for those you favour. Four, non-discrimination between equals — technologies and entities that are alike should be treated alike. Five, necessity — whilst some measure may be required occasionally when there is network congestion they should be rolled back in a time-bound fashion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once these principles are enforced through a network neutrality regulation, ISPs and telecom operators will be allowed to innovate with business and payment models. Steve Song, inventor of Village Telco says “My preferred take on zero-rating would be to zero-rate gprs/edge data in general so that there is a minimum basic access for all.” My colleague Pranesh Prakash says “One possibility, of many, is to create a single marketplace or exchange for zero-rating, through which one can zero-rate on all telecom networks for standard tiered rates that they publish, and terms that are known to the regulator. Banning is akin to a brahmastra in a regulator's arsenal: it should not be used lightly” Jochai Ben-Avie of Mozilla told me yesterday of experiments in Bangladesh where consumers watch an advertisement everyday in exchange for 5Mb of data. My own suggestion to address the harms caused by walled gardens would be to make them leak – mandate that unfettered access to the Internet be provided every other hour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is many other ways in which the Internet has been transformed in India and other countries but these are not commonly considered network neutrality violations. Here are some examples.  One, blocking of port 25 — a port that is commonly used to relay email spam. Two, blocking of port 80 – so that domestic connections cannot be used to host web servers. Three, the use of private IP addresses, ISPs who are delaying migration to IPv6 infrastructure because of cost implications leverage their IPv4  address inventory by using Carrier Grade — Network Address Translators [CG-NATs].  Four, asymmetric connections where download speeds for consumers are faster than upload speeds. With the exception of the first example — all of them affect end users negatively but do not usually impact corporations and therefore have been  unfortunately sidelined in the global debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The TRAI consultation paper reveals many of the concerns of the telecom operators that go beyond the scope of network neutrality. Many of these concerns are very legitimate. There is a scarcity of spectrum  — this could partially be addressed by auctioning more spectrum, scientific management of spectrum, promotion of shared spectrum and unlicensed spectrum. Their profit margins are thinning – this could be addressed by dismantling the Universal Service Obligation Fund, it is after all as Rohan Samarajiva puts it “a tax on the poor.” Internet companies don't pay taxes – this could be addressed by the Indian government, by adopting the best practices from the OECD around preventing tax avoidance. But some of their concerns cannot be addressed because of the technological differences between telecom and Internet networks. While it is relatively easy to require telecom companies to provide personal information and allow for interception of communications, those Internet companies that use end-to-end encryption cannot divulge personal information or facilitate interception because it is technologically impossible. While the first two concerns could be addressed by TRAI, the last two should be addressed by other ministries and departments in the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are other concerns that are much more difficult to address without the deep understanding of latest advancements in radio communication, signal processing and congestion control techniques in packet switched networks. A telecom expert who did not wish to be identified told me that “even 2G TDM voice is 10 to 15 times more efficient when compared to VOIP. IP was developed to carry data, and is therefore not an efficient mode to carry voice as overhead requirement for packets destroys the efficiency on voice. Voice is best carried close to the physical layer where the overheads are lowest.” He claims that since “VOIP calls are spectrally inefficient they should be discouraged” through differential pricing. We need accessible scientific literature and monitoring infrastructure so that an evidence base around concerns like this can be created so as to address them effectively through regulatory interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;You know you have reached a policy solution when all concerned stakeholders are equally unhappy. Unfortunately, the TRAI consultation paper assumes that Internet companies operate in a regulatory vacuum and therefore places much unnecessary focus on the licensing of these companies. This is a disastrous proposal since the Internet today is the result of “permission-less innovation”. The real issue is network neutrality and one hopes that after rigorous debate informed by scientific evidence TRAI finds a way to spread unhappiness around equally.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author works for the Centre for Internet and Society which  receives funds from Wikimedia Foundation which has zero-rating alliances  with telecom operators in many countries across the world.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality'&gt;http://editors.cis-india.org/internet-governance/blog/dna-april-16-2015-sunil-abraham-multiple-aspects-need-to-be-addressed-as-the-clamour-grows-for-network-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-04-16T13:33:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a">
    <title>Shreya Singhal and 66A</title>
    <link>http://editors.cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a</link>
    <description>
        &lt;b&gt;Most software code has dependencies. Simple and reproducible methods exist for mapping and understanding the impact of these dependencies. Legal code also has dependencies --across court orders and within a single court order. And since court orders are not produced using a structured mark-up language, experts are required to understand the precedential value of a court order.&lt;/b&gt;
        &lt;div class="field-field-articlenote field-type-text field" style="text-align: justify; "&gt;
&lt;div class="field-items"&gt;
&lt;div class="odd field-item"&gt;
&lt;p&gt;The article was published in the Economic and Political Weekly Vol-L No.15.  Vidushi Marda, programme officer at the Centre  for Internet and Society, was responsible for all the research that went  into this article. &lt;a href="http://editors.cis-india.org/internet-governance/blog/shreya-singhal-judgment.pdf" class="external-link"&gt;PDF version here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;As a non–lawyer and engineer, I cannot authoritatively comment on the Supreme Court’s order in &lt;i&gt;Shreya Singhal vs Union of India &lt;/i&gt;(2015)  on sections of the Information Technology Act of 2000, so I have tried  to summarise a variety of views of experts in this article. The &lt;i&gt;Shreya Singhal&lt;/i&gt; order is said to be unprecedented at least for the last four decades  and also precedent setting as its lucidity, some believe, will cause a  ripple effect in opposition to a restrictive understanding of freedom of  speech and expression, and an expansiveness around reasonable  restrictions. Let us examine each of the three sections that the bench  dealt with.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Section in Question&lt;/h3&gt;
&lt;p&gt;Section 66A of the IT Act was introduced in a hastily-passed amendment. Unfortunately, the language used in this section was a pastiche of outdated foreign 	laws such as the UK Communications Act of 2003, Malicious Communications Act of 1988 and the US Telecommunications Act, 1996.&lt;sup&gt;1&lt;/sup&gt; Since the 	amendment, this section has been misused to make public examples out of innocent, yet uncomfortable speech, in order to socially engineer all Indian 	netizens into self-censorship.&lt;sup&gt;2&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Summary: &lt;/b&gt; The Court struck down Section 66A of the IT Act in its entirety holding that it was not saved by Article 19(2) of the Constitution on account of the 	expressions used in the section, such as "annoying," "grossly offensive," "menacing,", "causing annoyance." The Court justified this by going through the 	reasonable restrictions that it considered relevant to the arguments and testing them against S66A. Apart from not falling within any of the categories for 	which speech may be restricted, S66A was struck down on the grounds of vagueness, over-breadth and chilling effect. The Court considered whether some parts 	of the section could be saved, and then concluded that no part of S66A was severable and declared the entire section unconstitutional. When it comes to 	regulating speech in the interest of public order, the Court distinguished between discussion, advocacy and incitement. It considered the first two to fall 	under the freedom of speech and expression granted under Article 19(1)(a), and held that it was only incitement that attracted Article 19(2).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Between Speech and Harm&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Gautam Bhatia, a constitutional law expert, has an optimistic reading of the judgment that will have value for precipitating the ripple effect. According 	to him, there were two incompatible strands of jurisprudence which have been harmonised by collapsing tendency into imminence.&lt;sup&gt;3&lt;/sup&gt; The first 	strand, exemplified by &lt;i&gt;Ramjilal Modi vs State of &lt;/i&gt;UP&lt;sup&gt;4&lt;/sup&gt; and &lt;i&gt;Kedar Nath Singh vs State of Bihar,&lt;/i&gt;&lt;sup&gt;5&lt;/sup&gt; imported an older and weaker American standard, that is, the tendency test, between the speech and public order consequences. The second strand exemplified by&lt;i&gt;Ram Manohar Lohia vs State of &lt;/i&gt;UP&lt;i&gt;,&lt;/i&gt;&lt;sup&gt;6&lt;/sup&gt;&lt;i&gt; S Rangarajan vs P Jagjivan Ram&lt;/i&gt;,&lt;sup&gt;7&lt;/sup&gt; and&lt;i&gt;Arup Bhuyan vs Union of India,&lt;/i&gt;&lt;sup&gt;8&lt;/sup&gt; all require greater proximity between the speech and the disorder anticipated. In	&lt;i&gt;Shreya Singhal, &lt;/i&gt;the Supreme Court held that at the stage of incitement, the reasonable restrictions will step in to curb speech that has a 	tendency to cause disorder. Other experts are of the opinion that Justice Nariman was doing no such thing, and was only sequentially applying all the tests 	for free speech that have been developed within both these strands of precedent. In legal activist Lawrence Liang's analysis, "Ramjilal Modi was decided by 	a seven judge bench and Kedarnath by a constitutional bench. As is often the case in India, when subsequent benches of a lower strength want to distinguish 	themselves from older precedent but are unable to overrule them, they overcome this constraint through a doctrinal development by stealth. This is achieved 	by creative interpretations that chip away at archaic doctrinal standards without explicitly discarding them."&lt;sup&gt;9&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Compatibility with US Jurisprudence&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;United States (US) jurisprudence has been imported by the Indian Supreme Court in an inconsistent manner. Some judgments hold that the American first 	amendment harbours no exception and hence is incompatible with Indian jurisprudence, while other judgments have used American precedent when convenient. 	Indian courts have on occasion imported an additional restriction beyond the eight available in 19(2)-the ground of public interest, best exemplified by 	the cases of &lt;i&gt;K A Abbas&lt;/i&gt;&lt;sup&gt;10&lt;/sup&gt;&lt;i&gt; &lt;/i&gt;and &lt;i&gt;Ranjit Udeshi.&lt;/i&gt;&lt;sup&gt;11&lt;/sup&gt; The bench in its judgment-which has been characterised by 	Pranesh Prakash as a masterclass in free speech jurisprudence&lt;sup&gt;12&lt;/sup&gt;-clarifies that while the American first amendment jurisprudence is applicable in 	India, the only area where a difference is made is in the "sub serving of general public interest" made under the US law. This eloquent judgment will 	hopefully instruct judges in the future on how they should import precedent from American free speech jurisprudence.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Article 14 Challenge&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Article 14 challenge brought forward by the petitioners contended that Section 66A violated their fundamental right to equality because it 	differentiated between offline and online speech in terms of the length of maximum sentence, and was hence unconstitutional. The Court held that an 	intelligible differentia, indeed, did exist. It found so on two grounds. First, the internet offered people a medium through which they can express views 	at negligible or no cost. Second, the Court likened the rate of dissemination of information on the internet to the speed of lightning and could 	potentially reach millions of people all over the world. Before &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Supreme Court had already accepted medium-specific regulation. 	For example in &lt;i&gt;K A Abbas&lt;/i&gt;, the Court made a distinction between films and other media, stating that the impact of films on an average illiterate 	Indian viewer was more profound than other forms of communication. The pessimistic reading of &lt;i&gt;Shreya Singhal&lt;/i&gt; is that Parliament can enact 	medium-specific law as long as there is an intelligible differentia which could even be a technical difference-speed of transmission. However, the 	optimistic interpretation is that medium-specific law can only be enacted if there are medium-specific harms, e g, phishing, which has no offline 	equivalent. If the executive adopts the pessimistic reading, then draconian sections like 66A will find their way back into the IT Act. Instead, if they 	choose the optimistic reading, they will introduce bills that fill the regulatory vacuum that has been created by the striking down of S66A, that is, spam 	and cyberbullying.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 79 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Section 79 was partially read down. This section, again introduced during the 2008 amendment, was supposed to give legal immunity to intermediaries for 	third party content by giving a quick redressal for those affected by providing a mechanism for takedown notices in the Intermediaries Guidelines Rules 	notified in April 2011. But the section and rules had enabled unchecked invisible censorship&lt;sup&gt;13&lt;/sup&gt; in India and has had a demonstrated chilling 	effect on speech&lt;sup&gt;14&lt;/sup&gt; because of the following reasons:&lt;/p&gt;
&lt;p&gt;One, there are additional unconstitutional restrictions on speech and expression. Rule 3(2) required a standard "rules and regulation, terms and condition 	or user agreement" that would have to be incorporated by all intermediaries. Under these rules, users are prohibited from hosting, displaying, uploading, 	modifying, publishing, transmitting, updating or sharing any information that falls into different content categories, a majority of which are restrictions 	on speech which are completely out of the scope of Article 19(2). For example, there is an overly broad category which contains information that harms 	minors in any way. Information that "belongs to another person and to which the user does not have any right to" could be personal information or could be 	intellectual property. A much better intermediary liability provision was introduced into the Copyright Act with the 2013 amendment. Under the Copyright 	Act, content could be reinstated if the takedown notice was not followed up with a court order within 21 days.&lt;sup&gt;15&lt;/sup&gt; A counter-proposal drafted by 	the Centre for Internet and Society for "Intermediary Due Diligence and Information Removal," has a further requirement for reinstatement that is not seen 	in the Copyright Act.&lt;sup&gt;16&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Two, a state-mandated private censorship regime is created. You could ban speech online without approaching the court or the government. Risk-aversive 	private intermediaries who do not have the legal resources to subjectively determine the legitimacy of a legal claim err on the side of caution and 	takedown content.&lt;/p&gt;
&lt;p&gt;Three, the principles of natural justice are not observed by the rules of the new censorship regime. The creator of information is not required to be 	notified nor given a chance to be heard by the intermediary. There is no requirement for the intermediary to give a reasoned decision.&lt;/p&gt;
&lt;p&gt;Four, different classes of intermediaries are all treated alike. Since the internet is not an uniform assemblage of homogeneous components, but rather a 	complex ecosystem of diverse entities, the different classes of intermediaries perform different functions and therefore contribute differently to the 	causal chain of harm to the affected person. If upstream intermediaries like registrars for domain names are treated exactly like a web-hosting service or 	social media service then there will be over-blocking of content.&lt;/p&gt;
&lt;p&gt;Five, there are no safeguards to prevent abuse of takedown notices. Frivolous complaints could be used to suppress legitimate expressions without any fear 	of repercussions and given that it is not possible to expedite reinstatement of content, the harm to the creator of information may be irreversible if the 	information is perishable. Transparency requirements with sufficient amounts of detail are also necessary given that a human right was being circumscribed. 	There is no procedure to have the removed information reinstated by filing a counter notice or by appealing to a higher authority.&lt;/p&gt;
&lt;p&gt;The judgment has solved half the problem by only making intermediaries lose immunity if they ignore government orders or court orders. Private takedown 	notices sent directly to the intermediary without accompanying government orders or courts order no longer have basis in law. The bench made note of the 	Additional Solicitor General's argument that user agreement requirements as in Rule 3(2) were common practice across the globe and then went ahead to read 	down Rule 3(4) from the perspective of private takedown notices. One way of reading this would be to say that the requirement for standardised "rules and 	regulation, terms and condition or user agreement" remains. The other more consistent way of reading this part of the order in conjunction with the 	striking down of 66A would be to say those parts of the user agreement that are in violation of Article 19(2) have also been read down.&lt;/p&gt;
&lt;p&gt;This would have also been an excellent opportunity to raise the transparency requirements both for the State and for intermediaries: for (i) the person 	whose speech is being censored, (ii) the persons interested in consuming that speech, and (iii) the general public. It is completely unclear whether 	transparency in the case of India has reduced the state appetite for censorship. Transparency reports from Facebook, Google and Twitter claim that takedown 	notices from the Indian government are on the rise.&lt;sup&gt;17&lt;/sup&gt; However, on the other hand, the Department of Electronics and Information Technology 	(DEITY) claims that government statistics for takedowns do not match the numbers in these transparency reports.&lt;sup&gt;18&lt;/sup&gt; The best way to address this 	uncertainty would be to require each takedown notice and court order to be made available by the State, intermediary and also third-party monitors of free 	speech like the Chilling Effects Project.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Section 69A&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Court upheld S69A which deals with website blocking, and found that it was a narrowly-drawn provision with adequate safeguards, and, hence, not 	constitutionally infirm. In reality, unfortunately, website blocking usually by internet service providers (ISPs) is an opaque process in India. Blocking 	under S69A has been growing steadily over the years. In its latest response to an RTI (right to information)&lt;sup&gt;19&lt;/sup&gt; query from the Software Freedom 	Law Centre, DEITY said that 708 URLs were blocked in 2012, 1,349 URLs in 2013, and 2,341 URLs in 2014. On 30 December 2014 alone, the centre blocked 32 	websites to curb Islamic State of Iraq and Syria propaganda, among which were "pastebin" websites, code repository (Github) and generic video hosting sites 	(Vimeo and Daily Motion).&lt;sup&gt;20&lt;/sup&gt; Analysis of leaked block lists and lists received as responses to RTI requests have revealed that the block orders 	are full of errors (some items do not exist, some items are not technically valid web addresses), in some cases counter speech which hopes to reverse the 	harm of illegal speech has also been included, web pages from mainstream media houses have also been blocked and some URLs are base URLs which would result 	in thousands of pages getting blocked when only a few pages might contain allegedly illegal content.&lt;sup&gt;21&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Pre-decisional Hearing&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The central problem with the law as it stands today is that it allows for the originator of information to be isolated from the process of censorship. The 	Website Blocking Rules provide that all "reasonable efforts" must be made to identify the originator or the intermediary who hosted the content. However, 	Gautam Bhatia offers an optimistic reading of the judgment, he claims that the Court has read into this "or" and made it an "and"-thus requiring that the 	originator &lt;i&gt;must also&lt;/i&gt; be notified of blocks when he or she can be identified.&lt;sup&gt;22&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Transparency&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Usually, the reasons for blocking a website are unknown both to the originator of material as well as those trying to access the blocked URL. The general 	public also get no information about the nature and scale of censorship unlike offline censorship where the court orders banning books and movies are 	usually part of public discourse. In spite of the Court choosing to leave Section 69A intact, it stressed the importance of a written order for blocking, 	so that a writ may be filed before a high court under Article 226 of the Constitution. While citing this as an existing safeguard, the Court seems to have 	been under the impression that either the intermediary or the originator is normally informed, but according to Apar Gupta, a lawyer for the People's Union 	for Civil Liberties, "While the rules indicate that a hearing is given to the originator of the content, this safeguard is not evidenced in practice. Not 	even a single instance exists on record for such a hearing."&lt;sup&gt;23&lt;/sup&gt; Even worse, block orders have been unevenly implemented by ISPs with variations 	across telecom circles, connectivity technologies, making it impossible for anyone to independently monitor and reach a conclusion whether an internet 	resource is inaccessible as a result of a S69A block order or due to a network anomaly.&lt;/p&gt;
&lt;p&gt;Rule 16 under S69A requires confidentiality with respect to blocking requests and complaints, and actions taken in that regard. The Court notes that this 	was argued to be unconstitutional, but does not state their opinion on this question. Gautam Bhatia holds the opinion that this, by implication, requires 	that requests cannot be confidential. Chinmayi Arun, from the Centre for Communication Governance at National Law University Delhi, one of the academics 	supporting the petitioners, holds the opinion that it is optimism carried too far to claim that the Court noted the challenge to Rule 16 but just forgot 	about it in a lack of attention to detail that is belied by the rest of the judgment.&lt;/p&gt;
&lt;p&gt;Free speech researchers and advocates have thus far used the RTI Act to understand the censorship under S69A. The Centre for Internet and Society has filed 	a number of RTI queries about websites blocked under S69A and has never been denied information on grounds of Rule 16.&lt;sup&gt;24&lt;/sup&gt; However, there has been 	an uneven treatment of RTI queries by DEITY in this respect, with the Software Freedom Law Centre&lt;sup&gt;25&lt;/sup&gt; being denied blocking orders on the basis of 	Rule 16. The Court could have protected free speech and expression by reading down Rule 16 except for a really narrow set of exceptions wherein only 	aggregate information would be made available to affected parties and members of the public.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Conclusions&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In &lt;i&gt;Shreya Singhal&lt;/i&gt;, the Court gave us great news: S66A has been struck down; good news: S79(3) and its rules have been read down; and bad news: 	S69A has been upheld. When it comes to each section, the impact of this judgment can either be read optimistically or pessimistically, and therefore we 	must wait for constitutional experts to weigh in on the ripple effect that this order will produce in other areas of free speech jurisprudence in India. 	But even as free speech activists celebrate &lt;i&gt;Shreya Singhal&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;some are bemoaning the judgment as throwing the baby away with the bathwater, 	and wish to reintroduce another variant of S66A. Thus, we must remain vigilant.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1 G S Mudur (2012): "66A 'Cut and Paste Job,'" &lt;i&gt;The Telegraph, &lt;/i&gt;3 December, visited on 3 April, 2015,	&lt;a href="http://www.telegraphindia.com/1121" title="http://www.telegraphindia.com/1121"&gt;http://www.telegraphindia.com/1121&lt;/a&gt; 203/jsp/frontpage/story_16268138.jsp&lt;/p&gt;
&lt;p&gt;2 Sunil Abraham (2012): "The Five Monkeys and Ice Cold Water," Centre for Internet and Society, 26 September, visited on 3 April 2015, 	&lt;a href="http://cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water" title="http://cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water"&gt; http://cis-india.org/internet-governance/www-deccan-chronicle-sep-16-201... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3 Gautam Bhatia (2015): "The Striking Down of 66A: How Free Speech Jurisprudence in India Found Its Soul Again," Indian Constitutional Law and Philosophy,	&lt;i&gt; &lt;/i&gt;26 March, visited on 4 April 2015, 	&lt;a href="https://indconlawphil.wordpress.com/2015/03/26/the-striking-down-of-section-66a-how-indian-free-speech-jurisprudence-found-its-soul-again/" title="https://indconlawphil.wordpress.com/2015/03/26/the-striking-down-of-section-66a-how-indian-free-speech-jurisprudence-found-its-soul-again/"&gt; https://indconlawphil.wordpress.com/2015/03/26/the-striking-down-of-sect... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;4 &lt;i&gt;Ramjilal Modi vs State of UP&lt;/i&gt;, 1957, SCR 860.&lt;/p&gt;
&lt;p&gt;5 &lt;i&gt;Kedar Nath Singh vs State of Bihar&lt;/i&gt;, 1962, AIR 955.&lt;/p&gt;
&lt;p&gt;6 &lt;i&gt;Ram Manohar Lohia vs State of UP&lt;/i&gt;, AIR, 1968 All 100.&lt;/p&gt;
&lt;p&gt;7 &lt;i&gt;S Rangarajan vs P Jagjivan Ram, &lt;/i&gt;1989, SCC(2), 574.&lt;/p&gt;
&lt;p&gt;8 &lt;i&gt;Arup Bhuyan vs Union of India, &lt;/i&gt;(2011), 3 SCC 377.&lt;/p&gt;
&lt;p&gt;9 Lawrence Liang, Alternative Law Forum, personal communication to author, 6 April 2015.&lt;/p&gt;
&lt;p&gt;10 &lt;i&gt;K A Abbas vs Union of India, &lt;/i&gt;1971 SCR (2), 446.&lt;/p&gt;
&lt;p&gt;11 &lt;i&gt;Ranjit Udeshi vs State of Maharashtra,&lt;/i&gt;1965 SCR (1) 65.&lt;/p&gt;
&lt;p&gt;12 Pranesh Prakash (2015): "Three Reasons Why 66A Verdict Is Momentous"&lt;i&gt;/ Times of India&lt;/i&gt;/(29 March). Visited on 6 April 2015, 	&lt;a href="http://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/Three-reasons-why-66A-verdict-is-momentous/articleshow/46731904.cms" title="http://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/Three-reasons-why-66A-verdict-is-momentous/articleshow/46731904.cms"&gt; http://timesofindia.indiatimes.com/home/sunday-times/all-that-matters/Th... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;13 Pranesh Prakash (2011): "Invisble Censorship: How the Government Censors Without Being Seen," The Centre for Internet and Society, 14 December, visited 	on 6 April 2015, 	&lt;a href="http://cis-india.org/internet-governance/blog/invisible-censorship" title="http://cis-india.org/internet-governance/blog/invisible-censorship"&gt; http://cis-india.org/internet-governance/blog/invisible-censorship &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;14 Rishabh Dara (2012): "Intermediary Liability in India: Chilling Effects on Free Expression on the Internet," The Centre for Internet and Society, 27 	April, visited on 6 April 2015, 	&lt;a href="http://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet" title="http://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet"&gt; http://cis-india.org/internet-governance/chilling-effects-on-free-expres... &lt;/a&gt; .&lt;/p&gt;
&lt;p&gt;15 Rule 75, Copyright Rules, 2013.&lt;/p&gt;
&lt;p&gt;16 The Draft Counter Proposal is available at 	&lt;a href="http://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf/view" title="http://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf/view"&gt; http://cis-india.org/internet-governance/counter-proposal-by-cis-draft-i... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;17 According to Facebook's transparency report, there were 4,599 requests in the first half of 2014, followed by 5,473 requests in the latter half. 	Available at &lt;a href="https://govtrequests.facebook" title="https://govtrequests.facebook"&gt;https://govtrequests.facebook&lt;/a&gt;. com/country/India/2014-H2/ 	also see Google's transparency report available at http: //www.google. com/transparencyreport/removals/government/IN/?hl=en and Twitter's report, available 	at https:// transparency.twitter.com/country/in&lt;/p&gt;
&lt;p&gt;18 Surabhi Agarwal (2015): "Transparency Reports of Internet Companies are Skewed: Gulashan Rai," &lt;i&gt;Business Standard, &lt;/i&gt;31 March, viewed on 5 April 	2015, 	&lt;a href="http://www.business-standard.com/article/current-affairs/transparency-reports-of-internet-companies-are-skewed-gulshan-rai-115033000808_1.html" title="http://www.business-standard.com/article/current-affairs/transparency-reports-of-internet-companies-are-skewed-gulshan-rai-115033000808_1.html"&gt; http://www.business-standard.com/article/current-affairs/transparency-re... &lt;/a&gt; .&lt;/p&gt;
&lt;p&gt;19 	&lt;a href="http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reveal-more/" title="http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reveal-more/"&gt; http://sflc.in/deity-says-2341-urls-were-blocked-in-2014-refuses-to-reve... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;20 "32 Websites Go Blank&lt;i&gt;,&lt;/i&gt;"&lt;i&gt; The Hindu, &lt;/i&gt;1 January 2015, viewed on 6 April 2015, 	&lt;a href="http://www.thehindu.com/news/national/now-modi-govt-blocks-32-websites/article6742372.ece" title="http://www.thehindu.com/news/national/now-modi-govt-blocks-32-websites/article6742372.ece"&gt; http://www.thehindu.com/news/national/now-modi-govt-blocks-32-websites/a... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;21 Pranesh Prakash (2012): "Analysing Latest List of Blocked Sites (Communalism and Rioting Edition)," 22 August, viewed on 6 April 2015, 	&lt;a href="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism" title="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism"&gt; http://cis-india.org/internet-governance/blog/analysing-blocked-sites-ri... &lt;/a&gt; . Also, see Part II of the same series at 	&lt;a href="http://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii" title="http://cis-india.org/internet-governance/analyzing-the-latest-list-of-blocked-sites-communalism-and-rioting-edition-part-ii"&gt; http://cis-india.org/internet-governance/analyzing-the-latest-list-of-bl... &lt;/a&gt; and analysis of blocking in February 2013, at 	&lt;a href="http://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot" title="http://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"&gt; http://cis-india.org/internet-governance/blog/analyzing-latest-list-of-b... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;22 Gautam Bhatia (2015): "The Supreme Court's IT Act Judgment, and Secret Blocking," Indian Constitutional Law and Philosophy, 25 March, viewed on 6 April 	2015, 	&lt;a href="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/" title="https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act-judgment-and-secret-blocking/"&gt; https://indconlawphil.wordpress.com/2015/03/25/the-supreme-courts-it-act... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;23 Apar Gupta (2015): "But What about Section 69A?," &lt;i&gt;Indian Express, 27 &lt;/i&gt;March, viewed on 5 April 2015,	&lt;a href="http://indianexpress" title="http://indianexpress"&gt;http://indianexpress&lt;/a&gt;. com/article/opinion/ columns/but-what-about-section-69a/&lt;/p&gt;
&lt;p&gt;24 Pranesh Prakash (2011): DIT's Response to RTI on Website Blocking, The Centre for Internet and Society, 7 April, viewed on 6 April 2015, 	&lt;a href="http://cis-india.org/internet-governance/blog/rti-response-dit-blocking" title="http://cis-india.org/internet-governance/blog/rti-response-dit-blocking"&gt; http://cis-india.org/internet-governance/blog/rti-response-dit-blocking &lt;/a&gt; ). Also see 	&lt;a href="http://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking" title="http://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-rti-blocking"&gt; http://cis-india.org/internet-governance/blog/analysis-dit-response-2nd-... &lt;/a&gt; and 	&lt;a href="http://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951" title="http://cis-india.org/internet-governance/resources/reply-to-rti-application-on-blocking-of-website-and-rule-419a-of-indian-telegraph-rules-1951"&gt; http://cis-india.org/internet-governance/resources/reply-to-rti-applicat... &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;25 	&lt;a href="http://sflc.in/wp-content/uploads/2015/04/RTI-blocking-final-reply-from-DEITY.pdf" title="http://sflc.in/wp-content/uploads/2015/04/RTI-blocking-final-reply-from-DEITY.pdf"&gt; http://sflc.in/wp-content/uploads/2015/04/RTI-blocking-final-reply-from-... &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a'&gt;http://editors.cis-india.org/internet-governance/blog/economic-and-political-weekly-sunil-abraham-april-11-2015-shreya-singhal-and-66a&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-19T08:09:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really">
    <title>Big win for freedom of speech. Really?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really</link>
    <description>
        &lt;b&gt;The 66A ruling was historic, but what about the provisions regulating speech online and offline that still exist within the ITA, the IPC and other laws.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.bangaloremirror.com/columns/views/Big-win-for-freedom-of-speech-Really/articleshow/46730694.cms"&gt;Bangalore Mirror&lt;/a&gt; on March 29, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;The &lt;i&gt;Shreya Singhal v.  Union of India&lt;/i&gt; ruling on the Information Technology Act 2000 (ITA) was  truly a historic moment in Indian free speech jurisprudence. Few  anticipated the striking down of the draconian Sec. 66A in its entirety,  for introducing additional unconstitutional limits to free speech  through its vague and imprecise language. The Supreme Court also read  down Sec. 79(3)(b) and the intermediary liability rules — requiring a  court order or a government notification to take down content and  relieving intermediaries of the responsibility for determining legality  of content. However, the court left the provision for website blocking,  69A, as it stood.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;66A criminalised those  that use a computer resource or a communication device to send one of  the three classes of information listed below — some of which was  redundant as they were already offences under the IPC (sections  indicated in brackets below) or other sections of the ITA: &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Information that was grossly offensive or menacing in character;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;False information for causing annoyance, inconvenience, danger,  obstruction, insult, injury [44], criminal intimidation [506], enmity,  hatred [295A] or ill will.&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Annoying or inconvenient message - to  deal spam OR to deceive or to mislead the addressee or recipient about  the origin of such messages - presumably for phishing, which  incidentally is dealt with more properly in Sec. 66D of ITA. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The regulatory vacuum  created by the striking down of 66A can be addressed by parliament by  ITA to reintroduce a well-crafted anti-spam provision that does not  infringe upon human rights.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;The intermediary liability  section 79 and the associated rules were introduced to encourage free  speech by granting immunity to intermediaries for content created by  their users, unless they failed to act on take down notices. However,  this provision proved to have a chilling effect on free speech, with  risk-aversive intermediaries over-complying with takedown notices as  they were unable to distinguish between legal and illegal content.  Shreya Singhal solves half the problem - whether intermediaries decide  either to remove or retain content in response to take down notices sent  by non-government entities and individuals they remain immune from  liability. But government entities can continue to censor speech using  takedown notices without any oversight, transparency or adherence to the  principles of natural justice. The recently launched Manila Principles  developed by the CIS and others gives a more complete set of best  practices that could be used to fix Sec. 79 through an amendment. For  example - "abusive or bad take down notices should be penalized."&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Website-blocking under 69a  is mostly an opaque procedure as per the letter of the law as it does  not require the user to be informed [because the alternative of  informing the intermediary is deemed sufficient], and given a chance to  be heard, and a secrecy rule prevents all documentation related to the  procedure from being disclosed to the public. There is both an  optimistic and a pessimistic view on what the bench has said when it  upheld this section. Constitutional law expert Gautam Bhatia is of the  view that the judge has made informing the user mandatory and has also  overridden the secrecy provision by requiring a written order that can  be assailed through writ petitions. But a more pessimistic reading is  that the bench found the section constitutional and was satisfied with  the safeguards and was only reiterating the procedure in the judgment.  The trouble is the opacity of the procedure is worse than the current  text of the law - there is no evidence that users have ever been  notified and RTI requests for documentation related to block orders have  been rejected using the secrecy rule.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;Does the striking down of  66A mean that speech on the internet is completely free and completely  unregulated? No, several provisions that regulate speech online and  offline still exist within the ITA, the IPC and other laws. Within the  ITA - infringing the privacy of individuals [ 66E], transmission of  obscene material [67], including sexually explicit material [Sec. 67A],  and also child pornography [67B], the Cyber Cafe Rules which require  intermediaries to install web filters.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;In the IPC, several  sections regulate speech that define closely the intent and ingredients  required in a precise way, something 66A did not do. Sedition is defined  in Sec. 124A, with restrictions on speech in the case of causing  hatred, contempt or disaffection towards the state. Promoting enmity  between different groups on grounds of religion, race, place of birth,  residence, language etc is criminalised [153A], and imputations or  assertions prejudicial to national integration are also prohibited  [153B]. Certain restrictions on speech have also been made in terms of  protecting the privacy and dignity of individuals for ex. disclosure of a  victim's identity in sensitive cases [228], insulting the modesty of a  woman [509]. Defamation [499] and conduct intended to cause public  mischief by way of statements, rumours, reports [505] remain  criminalized; and in 2013 cyber stalking [354D] has also been added. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;&lt;b&gt;[with inputs from Vidushi Marda] The author is the director of The Centre for Internet and Society&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really'&gt;http://editors.cis-india.org/internet-governance/blog/bangalore-mirror-march-29-2015-sunil-abraham-big-win-for-freedom-of-speech-really&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-29T01:20:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-march-26-2015-sunil-abraham-fear-uncertainty-doubt">
    <title>Fear, Uncertainty and Doubt</title>
    <link>http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-march-26-2015-sunil-abraham-fear-uncertainty-doubt</link>
    <description>
        &lt;b&gt;Much confusion has resulted from the Section 66A verdict. Some people are convinced that online speech is now without any reasonable restrictions under Article 19 (2) of the Constitution. This is completely false. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There are many other provisions within the IT Act that still regulate speech online, for example the section on obscenity (Sec. 67) and also the data protection provision (Sec. 43A). Additionally there are provisions within the Indian Penal Code and other Acts that regulate speech both online and offline. For example, defamation remains a criminal offence under the IPC (Sec. 499), and disclosing information about children in a manner that lowers their reputation or infringes their privacy is also prohibited under the Protection of Children from Sexual Offences Act, 2012 (Sec. 23).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others are afraid that the striking down of Section 66A results in a regulatory vacuum where it will be possible for bad actors to wreak havoc online because the following has been left unaddressed by the IT Act.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Criminal Intimidation: The phrase "criminal intimidation" was included in Sec. 66A(b), but the requirement was that intimidation should be carried out using "information which he knows to be false". Sec. 506 of the IPC which punishes criminal intimidation does not have this requirement and is therefore a better legal route for affected individuals, even though the maximum punishment is a year shorter than the three years possible under the IT Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Cyber-stalking: A new section for stalking - Sec. 345 D - was added into the IPC in 2013 which also recognised cyber stalking. The definition within Sec.345D is more precise compared to the nebulous phrasing in Sec. 66A, which read - "monitors the use by a woman of the internet, email or any other form of electronic communication, commits the offence of stalking". &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Phishing: Sec. 66A (c) dealt with punishment to people who "deceive or mislead the addressee or recipient about the origin of such messages". Sec.66D, which will be the operative section after this verdict, deals with "cheating by impersonation" and forms a more effective safeguard against phishing.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Cyber-bulling of children is arguably left unaddressed. Most importantly, spam, the original intention behind 66A, now cannot be tackled using any existing provision of the law. However, the poorly drafted section made it impossible for law enforcement to crack down on spammers. A 2005 attempt by the ITU to produce model law for spam based on a comparative analysis of national laws resulted in several important best practices that were ignored during the 2008 Amendment of the Act. For example, the definition of spam must cover the following characteristics - mass, unsolicited and commercial. All of which was missing in 66A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Good quality law must be drafted by an open, participatory process where all relevant stakeholders are consulted and responded to before bills are introduced in parliament.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt; &lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;A scanned copy of the article was published in the Deccan Chronicle on March 26, 2015. &lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="http://editors.cis-india.org/home-images/FearUncertaintyanddoubt.png/@@images/9871b918-5bc2-4957-8e23-5f9ae0eaa3d6.png" alt="Fear, Uncertainty and Doubt" class="image-inline" title="Fear, Uncertainty and Doubt" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-march-26-2015-sunil-abraham-fear-uncertainty-doubt'&gt;http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-march-26-2015-sunil-abraham-fear-uncertainty-doubt&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-04-17T01:44:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion">
    <title>Internet censorship will continue in opaque fashion</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion</link>
    <description>
        &lt;b&gt;A division bench of the Supreme Court has ruled on three sections of the Information Technology Act 2000 - Section 66A, Section 79 and Section 69A. The draconian Section 66A was originally meant to tackle spam and cyber-stalking but was used by the powerful elite to crack down on online dissent and criticism.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Sunil Abraham was published in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bengaluru/Internet-censorship-will-continue-in-opaque-fashion/articleshow/46681490.cms"&gt;Times of India&lt;/a&gt; on March 25, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Section 79 was meant to give immunity to internet intermediaries for  liability emerging from third-party speech, but it had a chilling effect  on free speech because intermediaries erred on the side of caution when  it came to deciding whether the content was legal or illegal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Section 69A was the web blocking or internet censorship provision,  but the procedure prescribed did not adhere to the principles of natural  justice and transparency. For instance, when books are banned by  courts, the public is informed of such bans but when websites are banned  in India, there's no clear message from the Internet Service Provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court upheld 69A, so web blocking and internet censorship in  India will continue to happen in an opaque fashion which is worrying.  But on 66A and 79, the landmark judgment protects the right to free  speech and expression. It struck down 66A in entirety, saying the vague  and imprecise language made the provision unconstitutional and it  interfered with "the right of the people to know - the market place of  ideas - which the internet provides to persons of all kinds". However,  it only read down Section 79 saying "unlawful acts beyond what is laid  down" as reasonable restrictions to the right to free speech in the  Constitution "obviously cannot form any part" of the section. In short,  the court has eliminated any additional restrictions for speech online  even though it admitted that the internet is "intelligibly different"  from traditional media and might require additional laws to be passed by  the  Indian Parliament."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion'&gt;http://editors.cis-india.org/internet-governance/blog/the-times-of-india-march-25-2015-sunil-abraham-internet-censorship-will-continue-in-opaque-fashion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-03-26T02:07:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain">
    <title>Availability and Accessibility of Government Information in Public Domain</title>
    <link>http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain</link>
    <description>
        &lt;b&gt;The information provided on most Government websites such as Acts, notifications, rules, orders, minutes of meetings and consultations, etc. is usually in the form of electronic documents. However, these lack authenticity and  accessibility and cannot be (text) searched., This policy brief identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications  to make them easy to locate, authentic and accessible.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prepared by Sunil Abraham, Nirmita Narasimhan, Beliappa, and Anandhi Viswanathan and with inputs from Dipendra Manocha, Saksham, and Deepak Maheshwari, Symantec. Download the text as&lt;b&gt; &lt;a href="http://editors.cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf" class="external-link"&gt;PDF here&lt;/a&gt;&lt;/b&gt;. (96 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problem Statement&lt;/b&gt;: The information published on most  government websites exist in the form of document files [including but  not limited to the Acts, Rules and Regulations, Government Orders and  Notifications, Consultation Papers, Reports etc.] which, even when  published, more often than not lack authenticity and accessibility and  cannot be (text) searched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysis: The current workflow towards publishing documents on government websites is broadly as follows:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital – that means it is created on a computer.&lt;/li&gt;
&lt;li&gt;The document is printed.&lt;/li&gt;
&lt;li&gt;The document is stamped with the official seal and signed in ink by the authorized person(s).&lt;/li&gt;
&lt;li&gt;The paper document is scanned.&lt;/li&gt;
&lt;li&gt;The scanned image is converted into a PDF file.&lt;/li&gt;
&lt;li&gt;The document is uploaded on the website and thereby published in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In fact, at times, even gazette notifications and other printed documents are also scanned as images.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This approach has numerous problems, including the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;First and foremost, such a practice is against the letter and spirit of Section 4 (1) (a) of the Right to Information Act, 2005.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;that inter alia, mandates every public authority to “maintain all its records duly catalogued and indexed in a manner and form which facilitates the right to information under this Act and ensure that all records that are appropriate to be computerised are, within a reasonable time and subject to availability of resources, computerised and connected through a network all over the country on different systems so that access to such records is facilitated”.&lt;/li&gt;
&lt;li&gt;This does not realize the enabling provision of the Information Technology Act, 2000&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; which gives legal sanctity to digital signatures. The digital image of a physical signature is not a digital signature in the eye of the law, though at times it is mistakenly believed to be so.&lt;/li&gt;
&lt;li&gt;This does not address the problem of repudiation. That means a government official can say “I didn't sign that document” and there is no way to tell whether what he or she is saying is true. One of the key features of digital signatures is non-repudiability.&lt;/li&gt;
&lt;li&gt;Scanned images of printed text cannot be searched for specific text (character, word or phrase) even by people without disabilities but for people with disabilities, the documents become totally inaccessible since the accessibility software cannot parse such scanned images – against the underlying tenets and objectives of the National Universal Electronic Accessibility Policy 2013.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;As an extension, content of such documents cannot be indexed by search engines (such as Google, Bing and Raftaar, etc.) and hence, unlikely to be located even if technically the same are in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proposed Solution&lt;/b&gt;: The following work flow is proposed for publishing documents electronically on government websites:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital by preparing it in or through a computer system. Documents in Indian languages should be produced using Unicode based fonts.&lt;/li&gt;
&lt;li&gt;The government official authorized to sign the same, must sign it digitally.&lt;/li&gt;
&lt;li&gt;The document is uploaded in an open standard based format such as EPUB using a content management system and made available on the website such that it is available, accessible, indexable and searchable.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This will ensure democratization of information in its truest sense – making available information to the public at large and ensuring that it can be easily located and remains accessible to one and all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of formatting should be standardized in such a way that semantics (such as heading styles, lists and tables) can be added to the text of the document. The Web Style Guide provides information on good practices for creating well-structured documents:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standardizing the formatting process by creating different templates for different types of documents will ensure uniform accessibility of the documents as well as provide a standard look and feel across government documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India became a global pioneer by making the legal provision for computerised, indexed and duly catalogued public records. It is high time that India takes the lead by living up to the legislative intent under the Right to Information Act, Information Technology Act and the National University of Educational Planning and Administration, and thereby establishes a global best practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, legacy documents should also be converted electronically to accessible formats though before such a rendering, due editorial oversight may be necessary along with use of technologies such as Optical Character Recognition (OCR).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Government of India. The Right to Information Act, 2005. No. 22 of 2005. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://rti.gov.in/webactrti.htm"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Government of India. The Information Technology Act, 2000. No. 21 of 2000. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Government of India. National Policy on Universal Electronic Accessibility. 2013. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain'&gt;http://editors.cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Government Information</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-12-30T01:25:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/privacy-v-transparency">
    <title>Privacy vs. Transparency: An Attempt at Resolving the Dichotomy</title>
    <link>http://editors.cis-india.org/openness/blog-old/privacy-v-transparency</link>
    <description>
        &lt;b&gt;The right to privacy has been articulated in international law and in some national laws. In a few countries where the constitution does not explicitly guarantee such a right, courts have read the right to privacy into other rights (e.g., the right to life, the right to equal treatment under law and also the right to freedom of speech and expression).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;With feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;. I would like to apologize for not providing proper citation to Julian Assange when the first version of this blog entry was published. I would also like to thank Micah Sifry for drawing this failure to his attention. The blog post originally published by Omidyar Network &lt;a class="external-link" href="http://www.openup2014.org/privacy-vs-transparency-attempt-resolving-dichotomy/"&gt;can be read here&lt;/a&gt;. Also see &lt;a class="external-link" href="http://newint.org/features/2015/01/01/privacy-transparency/"&gt;http://newint.org/features/2015/01/01/privacy-transparency/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In other countries where privacy is not yet an explicit or implicit  right, harm to the individual is mitigated using older confidentiality  or secrecy law. After the Snowden affair, the rise of social media and  the sharing economy, some corporations and governments would like us to  believe that “privacy is dead”. Privacy should not and cannot be dead,  because that would mean that security is also dead. This is indeed the  most dangerous consequence of total surveillance as it is technically  impossible to architect a secure information system without privacy as a  precondition. And conversely, it is impossible to guarantee privacy  without security as a precondition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to transparency [also known as the right to information or  access to information] – while unavailable in international law – is  increasingly available in national law. Over the last twenty years this  right has become encoded in national laws – and across the world it is  being used to hold government accountable and to balance the power  asymmetry between states and citizens. Independent and autonomous  offices of transparency regulators have been established. Apart from  increasing government transparency, corporations are also increasingly  required to be transparent as part of generic or industry specific  regulation in the public interest. For instance, India’s Companies Act,  2013, requires greater transparency from the private sector. Other areas  of human endeavor such as science and development are also becoming  increasingly transparent though here it is still left up to  self-regulation and there isn’t as much established law. Within science  and research more generally, the rise of open data accompanied the  growth of the Open Access and citizen science movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So the question before us is: Are these two rights – the right to  transparency and the right to privacy – compatible? Is it a zero-sum  game? Do we have to sacrifice one right to enforce the other?  Unfortunately, many privacy and transparency activists think this is the  case and this has resulted in some conflict. I suggest that these  rights are completely compatible when it comes to addressing the  question of power. These rights do not have to be balanced against one  another. There is no need to settle for a sub-optimal solution. &lt;b&gt;Rather this is an optimization problem and the solution is as follows: privacy protections must be inversely proportionate to power and as Julian Assange says transparency requirements should be directly proportionate to power.&lt;/b&gt;&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most privacy laws, the public interest is an exception to privacy. If  public interest is being undermined, then an individual privacy can be  infringed upon by the state, by researchers, by the media, etc. And in  transparency law, privacy is the exception. If the privacy of an  individual can be infringed, transparency is not required unless it is  in the public interest. In other words, the “public interest” test  allows us to use privacy law and transparency law to address power  asymmetries rather than exacerbate them. What constitutes “public  interest” is of course left to courts, privacy regulators, and  transparency regulators to decide. Like privacy, there are many other  exceptions in any given transparency regime including confidentiality  and secrecy. Given uneven quality of case law there will be a temptation  by the corrupt to conflate exceptions. Here the old common-law  principle of “there is no confidence as to the disclosure of iniquity” –  which prevents confidentiality law from being used to cover malfeasance  or illegality – can be adopted in appropriate jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 years ago, the transparency movement gave birth to yet another  movement – the open government data movement. The tension between  privacy and transparency is most clearly seen in the open government  data movement. The open government data movement in some parts of the  world is dominated by ahistorical and apolitical technologists, and some  of them seem intent on reinventing the wheel. In India, ever since the  enactment of the Right to Information Act, 2003, 30 transparency  activists are either killed, beaten or criminally intimidated every  year. This is the statistic from media coverage alone. Many more  silently suffer. RTI or transparency is without a doubt one of the most  dangerous sectors within civil society that you could choose to work in.  In contrast, not a single open data activist has ever been killed,  beaten or criminally intimidated. I suspect this is because open data  activists do not sufficiently challenge power hierarchies. Let us look a  little bit closely at their work cycle. When a traditional transparency  activist asks a question, that is usually enough to get them into  trouble. When an open data activist publishes an answer [a dataset  nicely scrubbed and machine readable, or a visualization, or a tool]  they are often frustrated because nobody seems interested in using it.  Often even the activist is unclear what the question is. This is because  open data activist works where data is available. Open data activists  are obsessed with big datasets, which are easier to find at the bottom  of the pyramid. They contribute to growing surveillance practices [the  nexus between Internet giants, states, and the security establishment]  rather that focusing on sousveillance [citizen surveillance of the  state, also referred to as citizen undersight or inverse surveillance].  They seem to be obsessed only with tools and technologies, rather than  power asymmetries and injustices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, a case study to make my argument easier to understand – Aadhaar  or UID, India’s ambitious centralized biometric identity and  authentication management system. There are many serious issues with its  centralized topology, proprietary technology, and dependence on  biometrics as authentication factors – all of which I have written about  in the past. In this article, I will explain how my optimization  solution can be applied to the project to make it more effective in  addressing its primary problem statement that corruption is a necessary  outcome of power asymmetries in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its current avatar – the Aadhaar project hopes to assign  biometric-based identities to all citizens. The hope is that, by doing  authentication in the last mile, corruption within India’s massive  subsidy programmes will be reduced. This, in my view, might marginally  reduce retail corruption at the bottom of the pyramid. It will do  nothing to address wholesale corruption that occurs as subsidies travel  from the top to the bottom of the pyramid. I have advocated over the  last two years that we should abandon trying to issue biometric  identities to all citizens, thereby making them more transparent to the  state. Let us instead issue Aadhaar numbers to all politicians and  bureaucrats and instead make the state more transparent to citizens.  There is no public interest in reducing privacy for ordinary citizens –  the powerless – but there are definitely huge public interest benefits  to be secured by increasing transparency of politicians and bureaucrats,  who are the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has recently introduced a biometric-based  attendance system for all bureaucrats and has created a portal that  allows Indian citizens to track if their bureaucrats are arriving late  or leaving early. This unfortunately is just bean counting [for being  corrupt and being punctual are not mutually exclusive] and public access  to the national portal was turned off because of legitimate protests  from some of the bureaucrats. What bureaucrats do in office, who they  meet, and which documents they process is more important than when they  arrive at or depart from work. The increased transparency or reduced  privacy was not contributing to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of first going after small-ticket corruption at the bottom of  the pyramid, maximization of public interest requires us to focus on the  top, for there is much greater ROI for the anti-corruption rupee. For  example: constructing a digital signature based on audit trails that  track all funds and subsidies as they move up and down the pyramid.  These audit trails must be made public so that ordinary villagers can be  supported by open data activists, journalists, social entrepreneurs,  and traditional civil society in verification and course correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope open data activists, data scientists, and big data experts will  draw inspiration from the giants of the transparency movement in India. I  hope they will turn their attention to power, examine power asymmetries  and then ask how the Aadhaar project can be leveraged to make India  more rather than less equal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Videos&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/tDf8TFjxqiQ" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/lPHWkYZjqzo" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The videos can also be watched on Vimeo:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111729069"&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111748146"&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://prospect.org/article/real-significance-wikileaks"&gt;http://prospect.org/article/real-significance-wikileaks&lt;/a&gt; “Transparency should be proportional to the power that one has.”&lt;/p&gt;
&lt;p&gt;Read the presentation on Risky Business: Transparency, Technology, Security and Privacy made at the Pecha Kucha session &lt;a href="http://editors.cis-india.org/openness/blog-old/risky-business.odp" class="internal-link"&gt;here&lt;/a&gt;. (ODP File, 35 kb)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclaimer: The views, opinions, and positions expressed by             the author(s) of this blog are theirs alone, and do not             necessarily reflect the views, opinions, or positions of             Omidyar Network. We make no representations as to accuracy,             completeness, timeliness, suitability or validity of any             information presented by individual authors of the blogs and             will not be liable for any errors, omissions, or delays in             this information or any losses, injuries or damages arising             from its display or use.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/privacy-v-transparency'&gt;http://editors.cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-03-08T06:26:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother">
    <title>Very Big Brother</title>
    <link>http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, the organization I work for, currently serves on a committee established by the Government of India's Department of Biotechnology, Ministry of Science and Technology in January 2013. The committee has been charged with preparing a report on the draft Human DNA Profiling Bill.&lt;/b&gt;
        &lt;p&gt;The article was originally &lt;a class="external-link" href="http://www.councilforresponsiblegenetics.org/GeneWatch/GeneWatchPage.aspx?pageId=525"&gt;published in GeneWatch&lt;/a&gt; (January - April 2014) issue.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Why should an organization that focuses on the Internet be invited to such a committee? There are some obvious reasons related to data protection and big data. CIS had previously served on the Justice AP Shah committee that was tasked by the Planning Commission to make recommendations on the draft Privacy Bill in 2012. There are also some less obvious connections, such as academic research into cyborgs wherein the distinction between human and machine/technology is blurred; where an insulin pump makes one realize that the Internet of Things could include the Internet of Body Parts. But for this note I will focus on biometrics - quantifiable data related to individual human characteristics - and their gate-keeping function on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bouquet of biometric options available to technologists is steadily expanding - fingerprint, palm print, face recognition, DNA, iris, retina, scent, typing rhythm, gait, and voice. Biometrics could be used as authentication or identification to ensure security and privacy. However, biometrics are different from other types of authentication and identification factors in three important ways that have implications for human rights in information societies and the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, biometrics allow for non-consensual authentication and identification. Newer, more advanced and more expensive biometric technologies usually violate human rights more extensively and intensively than older, more rudimentary and inexpensive biometrics. For example, it is possible to remotely harvest iris information when a person is wide awake without even being aware that their identification or authentication factors have been compromised. It isn't difficult to imagine ways to harvest someone's fingerprints and palm prints without their knowledge, and you cannot prevent a security camera from capturing your gait. You could use specialized software like Tor to surf the World Wide Web anonymously and cover your digital tracks, but it is much harder to leave no trail of DNA material in the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, biometrics rely on probabilistic matching rather than discrete matching - unlike, for example, a password that you use on a social media platform. In the 2007 draft of India's current Human DNA Profiling Bill, the preamble said "the Deoxyribose Nucleic Acid (DNA) analysis of body substances is a powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead, without any doubt." This extract from the bill was quoted in an ongoing court case to use tampered chain of custody for DNA as the means to seek exoneration of the accused. And the scientists on the committee insist that the DNA Data Bank Manager "...shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency ... as to whether the DNA profile received is already contained in the Data Bank" - in other words, a "yes" or "no" answer. This is indeed odd for those who come from the world of Internet policy - especially when one DNA lab worker confidentially shared that after a DNA profile was generated the "standard operating procedure" included checking it against the DNA profile of the lab worker to ensure that there was no contamination during the process of generating the profile. This would not be necessary for older forms of biometrics such as the process of developing a photograph. In other words, chain of custody issues with every generation of biometric technology are getting more and more complex. In the developing world, the disillusioned want to believe that "technology is the solution." The fallibility of technology must determine its evidentiary status.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, biometrics are only machine-scrutable. This means machines and not human beings will determine whether you are guilty or innocent; whether you should get subsidized medicine, grain, or fuel; whether you can connect to the Internet via mobile phone, cybercafe or broadband. DNA evidence is not directly observable by judges and therefore the technology and equipment have to be made increasingly transparent so that ordinary citizens as well as the scientific community can audit their effectiveness. In 2009, the Second District Court of Appeal and Circuit Court in Florida upheld a 2005 ruling requiring CMI Inc, the manufacturer of Intoxilyzer 5000, to release source code, failing which evidence from the breathalyzer would be rendered inadmissible in more than 100 drunk driving cases. If the transparency of machines is important when prosecuting misdemeanors then surely this is something we must advocate for when culpability for serious crimes is determined through DNA evidence and other types of biometric technologies. This could be accomplished by the triad of mandates for free/open source software, open standards and open hardware. This is not necessary for all DNA technology and equipment that is used in the market, but only for a small sub-set of these technologies that impinge on our rights as human beings via law enforcement and the judicial system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been nine years since India started the process of drafting this bill. We hope that the delays will only result in a robust law that upholds human rights, justice and scientific progress.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham is Executive Director of the Centre for Internet and Society, based in Bangalore, India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother'&gt;http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-14T11:39:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security">
    <title>Who Governs the Internet? Implications for Freedom and National Security</title>
    <link>http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security</link>
    <description>
        &lt;b&gt;The second half of last year has been quite momentous for Internet governance thanks to Edward Snowden. German Chancellor Angela Merkel and Brazilian President Dilma Rousseff became aware that they were targets of US surveillance for economic not security reasons. They protested loudly.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was published in Yojana (April 2014 Issue). &lt;a href="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-who-governs-the-internet.pdf" class="external-link"&gt;Click to download the original here&lt;/a&gt;. (PDF, 177 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The role of the US perceived by some as the benevolent dictator or primary steward of the Internet because of history, technology, topology and commerce came under scrutiny again. The I star bodies also known as the technical community - Internet Corporation for Assigned Names and Numbers (ICANN); five Regional Internet Registries (RIRs) ie. African,  American, Asia-Pacific, European and Latin American; two standard setting organisations - World Wide Web Consortium (W3C) &amp;amp; Internet Engineering Task Force (IETF); the Internet Architecture Board (IAB); and Internet Society (ISOC) responded by issuing the Montevideo Statement &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; on the 7th of October. The statement expressed "strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance." It called for  "accelerating the globalization of ICANN and IANA functions..." - did this mean that the I star bodies were finally willing to end the special role that US played in Internet governance? However, that dramatic shift in position was followed with the following qualifier "...towards an environment in which all stakeholders, including all governments, participate on an equal footing." Clearly indicating that for the I star bodies multistakeholderism was non-negotiable.  Two days later President Rousseff after a meeting with Fadi Chehadé, announced on Twitter that Brazil would host "an international summit of governments, industry, civil society and academia." &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; The meeting has now been dubbed Net Mundial and 188 proposals for “principles” or “roadmaps for the further evolution of the Internet governance ecosystem” have been submitted for discussion in São Paulo on the 23rd and 24th of April. The meeting will definitely be an important milestone for multilateral and multi-stakeholder mechanisms in the ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been more than a decade since this debate between multilateralism and multi-stakeholderism has ignited. Multistakeholderism is a form of governance that seeks to ensure that every stakeholder is guaranteed a seat at the policy formulation table (either in consultative capacity or in decision making capacity depending who you ask). The Tunis Agenda, which was the end result of the 2003-05 WSIS upheld the multistakeholder mode. The 2003–2005 World Summit on the Information Society process was seen by those favouring the status quo at that time as the first attempt by the UN bodies or multilateralism - to takeover the Internet. However, the end result i.e. Tunis Agenda &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; clarified and reaffirmed multi-stakeholderism as the way forward even though multilateral governance mechanisms were also accepted as a valid component of Internet governance. The list of stakeholders included states, the private sector, civil society, intergovernmental organisations, international standards organisations and the “academic and technical communities within those stakeholder groups mentioned” above. The Tunis Agenda also constituted the Internet Governance Forum (IGF) and the process of Enhanced Cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IGF was defined in detail with a twelve point mandate including to “identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations.” In brief it was to be a learning Forum, a talk shop and a venue for developing soft law not international treaties. Enhanced Cooperation was defined as “to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues” –  and to this day, efforts are on to define it more clearly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seven years later, during the World Conference on Telecommunication in Dubai, the status quoists dubbed it another attempt by the UN to take over the Internet. Even those non-American civil society actors who were uncomfortable with US dominance were willing to settle for the status quo because they were convinced that US court would uphold human rights online more robustly than most other countries. In fact, the US administration had laid a good foundation for the demonization of the UN and other nation states that preferred an international regime. "Internet freedom" was State Department doctrine under the leadership of Hillary Clinton. As per her rhetoric – there were good states, bad states and swing states. The US, UK and some Scandinavian countries were the defenders of freedom. China, Russia and Saudi Arabia were examples of authoritarian states that were balkanizing the Internet. And India, Brazil and Indonesia were examples of swing states – in other words, they could go either way – join the good side or the dark side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet freedom rhetoric was deeply flawed. The US censorship regime is really no better than China’s. China censors political speech – US censors access to knowledge thanks to the intellectual property (IP) rightsholder lobby that has tremendous influence on the Hill. Statistics of television viewership across channels around the world will tell us how the majority privileges cultural speech over political speech on any average day. The great firewall of China only affects its citizens – netizens from other jurisdictions are not impacted by Chinese censorship. On the other hand, the US acts of censorship are usually near global in impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because the censorship regime is not predominantly based on blocking or filtering but by placing pressure on identification, technology and financial intermediaries thereby forcing their targets offline. When it comes to surveillance, one could argue that the US is worse than China. Again, as was the case with censorship, China only conducts pervasive blanket surveillance upon its citizens – unlike US surveillance, which not only affects its citizens but targets every single user of the Internet through a multi-layered approach with an accompanying acronym soup of programmes and initiatives that include malware, trojans, software vulnerabilities, back doors in encryption standards, over the top service providers, telcos, ISPs, national backbone infrastructure and submarine fibre optic cables.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Security guru Bruce Schneier tells us that "there is no security without privacy. And liberty requires both security and privacy.” Blanket surveillance therefore undermines the security imperative and compromises functioning markets by make e-commerce, e-banking, intellectual property, personal information and confidential information vulnerable. Building a secure Internet and information society will require ending mass surveillance by states and private actors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Opportunity for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unlike the America with its straitjacketed IP regime, India believes that access to knowledge is a precondition for freedom of speech and expression. As global intellectual property policy or access to knowledge policy is concerned, India is considered a leader both when it comes to domestic policy and international policy development at the World Intellectual Property Organisation. From the 70s our policy-makers have defended the right to health in the form of access to medicines. More recently, India played a critical role in securing the Marrakesh Treaty for Visually Impaired Persons in June 2013 which introduces a user right [also referred to as an exception, flexibility or limitation] which allows the visually impaired to convert books to accessible formats without paying the copyright-holder if an accessible version has not been made available. The Marrakesh Treaty is disability specific [only for the visually impaired] and works specific [only for copyright]. This is the first instance of India successfully exporting policy best practices. India's exception for the disabled in the Copyright Act unlike the Marrakesh Treaty, however, is both disability-neutral and works-neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that the Internet is critical to the successful implementation of the Treaty ie. cross border sharing of works that have been made accessible to disabled persons in one country with the global community, it is perhaps time for India to broaden its influence into the sphere of Internet governance and the governance of information societies more broadly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Post-Snowden, the so called swing states occupy the higher moral ground. It is time for these states to capitalize on this moment using strong political will. Instead of just being a friendly jurisdiction from the perspective of access to medicine, it is time for India to also be the enabling jurisdiction for access to knowledge more broadly. We could use patent pools and compulsory licensing to provide affordable and innovative digital hardware [especially mobile phones] to the developing world. This would ensure that rights-holders, innovators, manufactures, consumers and government would all benefit from India going beyond being the pharmacy of the world to becoming the electronics store of the world. We could explore flat-fee licensing models like a broadband copyright cess or levy to ensure that users get content [text, images, video, audio, games and software] at affordable rates and rights-holders get some royalty from all Internet users in India. This will go a long way in undermining the copyright enforcement based censorship regime that has been established by the US. When it comes to privacy – we could enact a world-class privacy law and establish an independent, autonomous and proactive privacy commissioner who will keep both private and state actors on a short lease. Then we need a scientific, targeted surveillance regime that is in compliance with human rights principles. This will make India simultaneously an IP and privacy haven and thereby attract huge investment from the private sector, and also earn the goodwill of global civil society and independent media. Given that privacy is a precondition for security, this will also make India very secure from a cyber security perspective. Of course this is a fanciful pipe dream given our current circumstances but is definitely a possible future for us as a nation to pursue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is the scope of Internet Governance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Part of the tension between multi-stakeholderism and multilateralism is that there is no single, universally accepted definition of Internet governance. The conservative definitions of Internet Governance limits it to management of critical Internet resources, including the domain name system, IP addresses and root servers – in other words, the ICANN, IANA functions, regional registries and other I* bodies. This is where US dominance has historically been most explicit. This is also where the multi-stakeholder model has clearly delivered so far and therefore we must be most careful about dismantling existing governance arrangements. There are very broadly four approaches for reducing US dominance here – a) globalization [giving other nation-states a role equal to the US within the existing multi-stakeholder paradigm], b) internationalization [bring ICANN, IANA functions, registries and I* bodies under UN control or oversight], c) eliminating the role for nation states in the IANA functions&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and d) introducing competitors for names and numbers management. Regardless of the final solution, it is clear that those that control domain names and allocate IP addresses will be able to impact the freedom of speech and expression. The impact on the national security of India is very limited given that there are three root servers &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; within national borders and it would be near impossible for the US to shut down the Internet in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a more expansive definition – The Working Group on Internet Governance report&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;has four categories for public policy issues that are relevant to Internet governance:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(a) Issues relating to infrastructure and the management of critical Internet resources, including administration of the domain name system and Internet protocol addresses (IP addresses), administration of the root server system, technical standards, peering and interconnection, telecommunications infrastructure, including innovative and convergent technologies, as well as multilingualization. These issues are matters of direct relevance to Internet governance and fall within the ambit of existing organizations with responsibility for these matters;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Issues relating to the use of the Internet, including spam, network security and cybercrime. While these issues are directly related to Internet governance, the nature of global cooperation required is not well defined;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c)Issues that are relevant to the Internet but have an impact much wider than the Internet and for which existing organizations are responsible, such as intellectual property rights (IPRs) or international trade. ...;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Issues relating to the developmental aspects of Internet governance, in particular capacity-building in developing countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of these categories are addressed via state regulation that has cascaded from multilateral bodies that are associated with the United Nations such as the World Intellectual Property Organisation for "intellectual property rights" and the International Telecommunication Union for “telecommunications infrastructure”. Other policy issues such as  "cyber crime" are currently addressed via plurilateral instruments – for example the Budapest Convention on Cybercrime – and bilateral arrangements like Mutual Legal Assistance Treaties. "Spam" is currently being handled through self-regulatory efforts by the private sector such as Messaging, Malware and Mobile Anti-Abuse Working Group.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt; Other areas where there is insufficient international or global cooperation include "peering and interconnection" - the private arrangements that exist are confidential and it is unclear whether the public interest is being adequately protected.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;So who really governs the Internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So in conclusion, who governs the Internet is not really a useful question. This is because nobody governs the Internet per se. The Internet is a diffuse collection of standards, technologies and actors and dramatically different across layers, geographies and services. Different Internet actors – the government, the private sector, civil society and the technical and academic community are already regulated using a multiplicity of fora and governance regimes – self regulation, coregulation and state regulation. Is more regulation always the right answer? Do we need to choose between multilateralism and multi-stakeholderism? Do we need stable definitions to process? Do we need different version of multi-stakeholderism for different areas of governance for ex. standards vs. names and numbers? Ideally no, no, no and yes. In my view an appropriate global governance system will be decentralized, diverse or plural in nature yet interoperable, will have both multilateral and multistakeholder institutions and mechanisms and will be as interested in deregulation for the public interest as it is in regulation for the public interest.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Montevideo Statement on the Future of Internet Cooperation &lt;a class="external-link" href="https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm"&gt;https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Brazil to host global internet summit in ongoing fight against NSA surveillance &lt;a class="external-link" href="http://rt.com/news/brazil-internet-summit-fight-nsa-006/"&gt;http://rt.com/news/brazil-internet-summit-fight-nsa-006/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Tunis Agenda For The Information Society &lt;a class="external-link" href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;http://www.itu.int/wsis/docs2/tunis/off/6rev1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Roadmap for globalizing IANA: Four principles and a proposal for reform: a submission to the Global Multistakeholder Meeting on the Future of Internet Governance by Milton Mueller and Brenden Kuerbis March 3rd 2014  See: &lt;a class="external-link" href="http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf"&gt;http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Mumbai (I Root), Delhi (K Root) and Chennai (F Root). See: &lt;a class="external-link" href="http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers"&gt;http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Report of the Working Group on Internet Governance to the President of the Preparatory Committee of the World Summit on the Information Society, Ambassador Janis Karklins, and the WSIS Secretary-General, Mr Yoshio Utsumi. Dated:  14 July 2005 See: &lt;a class="external-link" href="http://www.wgig.org/WGIG-Report.html"&gt;http://www.wgig.org/WGIG-Report.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Messaging, Malware and Mobile Anti-Abuse Working Group website See: &lt;a class="external-link" href="http://www.maawg.org/"&gt;http://www.maawg.org/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author is is the Executive Director of the Centre for Internet and Society (CIS), Bangalore. He is also the founder of Mahiti, a 15 year old social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. He is an Ashoka fellow. For three years, he also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security'&gt;http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-05T16:23:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal">
    <title>Privacy worries cloud Facebook's WhatsApp Deal</title>
    <link>http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal</link>
    <description>
        &lt;b&gt;Privacy activists in the United States have asked the competition regulator or the Federal Trade Commission to put on hold Facebook's acquisition of WhatsApp. Why have they done this when Facebook has promised to leave WhatsApp untouched as a standalone app?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-03-14/news/48222166_1_whatsapp-facebook-users-privacy-worries"&gt;Read the original published in the Economic Times on March 14, 2014&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Activists have five main concerns.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Facebook has a track record of not keeping its promises to users. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ethos of both companies when it comes to privacy is diametrically opposite. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The probability that WhatsApp messages and content will be intercepted because of Facebook's participation in NSA's PRISM spying programme. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Facebook slurping WhatsApp's large repository of phone numbers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Two hundred trackers already monitor your internet use when you are not using Facebook and now they tracking mobile use much more granularly. This week the Indian competition regulator (CCI) also told the media that the acquisition would be subject to scrutiny. However, unlike the US regulator the Indian regulator does not have the mandate to examine the acquisition from a privacy perspective.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;LIRNEAsia research in Indonesia paints a very similar picture to one we have in India. When Indonesian mobile phone users were asked if they used Facebook they answered in affirmative. Then the very same users were asked if they used the internet and they replied in negative. A large number of Facebook users in these other similar economies are trapped within what are called "walled gardens."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Walled gardens allow mobile phone subscribers without data connections to get access to a single over-the-top service provider like Facebook because their telcom provider has an arrangement. Software such as Facebook on every phone makes it possible for feature phone users to also enter the walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Facebook it "is a fast and easyto-use native app that works on more than 3,000 different types of feature phones from almost every handset manufacturer that exists today."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike North American and European users of Facebook - who freely roam the "world wild web" and then choose to visit Facebook when they want to many Indian users will first experience data services in a domesticated fashion within a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether or not they will wander in the wild when they are have full access to the internet remains to be seen. But given our poor rates of penetration, dogmatic insistence on network neutrality at this early stage of internet adoption may not be the right way to maximise welfare and consumer interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fortunately for Facebook and unfortunately for us, India still does not have a comprehensive data protection or horizontal privacy law. The Justice AP Shah Committee that was constituted by the Planning Commission in October 2012 recommended that the Privacy Act articulate national privacy principles and establish the office of the Privacy Commissioner. It further recommended that data protection and surveillance be regulated for both the private sector and the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since then the Department of Personnel and Training has updated the draft bill to implement these recommendations and has been working towards consensus within government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since we still don't have our own privacy regulator we will have to depend on foreign data protection authorities and privacy commissioners to protect us from the voracious appetite for personal data of over-the-top service providers like Facebook This is woefully insufficient because they will not act on harm caused to Indian consumers or be aware of how Facebook acts differently in the Indian market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we approach the first general election in India when social media will play a small but influential role it would have been excellent if we had someone to look out for our right to privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal'&gt;http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:59:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
