<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 41 to 55.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/privacy-v-transparency"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/a2k/blogs/access-to-knowledge-in-market-place"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/privacy-v-transparency">
    <title>Privacy vs. Transparency: An Attempt at Resolving the Dichotomy</title>
    <link>http://editors.cis-india.org/openness/blog-old/privacy-v-transparency</link>
    <description>
        &lt;b&gt;The right to privacy has been articulated in international law and in some national laws. In a few countries where the constitution does not explicitly guarantee such a right, courts have read the right to privacy into other rights (e.g., the right to life, the right to equal treatment under law and also the right to freedom of speech and expression).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;With feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;. I would like to apologize for not providing proper citation to Julian Assange when the first version of this blog entry was published. I would also like to thank Micah Sifry for drawing this failure to his attention. The blog post originally published by Omidyar Network &lt;a class="external-link" href="http://www.openup2014.org/privacy-vs-transparency-attempt-resolving-dichotomy/"&gt;can be read here&lt;/a&gt;. Also see &lt;a class="external-link" href="http://newint.org/features/2015/01/01/privacy-transparency/"&gt;http://newint.org/features/2015/01/01/privacy-transparency/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In other countries where privacy is not yet an explicit or implicit  right, harm to the individual is mitigated using older confidentiality  or secrecy law. After the Snowden affair, the rise of social media and  the sharing economy, some corporations and governments would like us to  believe that “privacy is dead”. Privacy should not and cannot be dead,  because that would mean that security is also dead. This is indeed the  most dangerous consequence of total surveillance as it is technically  impossible to architect a secure information system without privacy as a  precondition. And conversely, it is impossible to guarantee privacy  without security as a precondition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to transparency [also known as the right to information or  access to information] – while unavailable in international law – is  increasingly available in national law. Over the last twenty years this  right has become encoded in national laws – and across the world it is  being used to hold government accountable and to balance the power  asymmetry between states and citizens. Independent and autonomous  offices of transparency regulators have been established. Apart from  increasing government transparency, corporations are also increasingly  required to be transparent as part of generic or industry specific  regulation in the public interest. For instance, India’s Companies Act,  2013, requires greater transparency from the private sector. Other areas  of human endeavor such as science and development are also becoming  increasingly transparent though here it is still left up to  self-regulation and there isn’t as much established law. Within science  and research more generally, the rise of open data accompanied the  growth of the Open Access and citizen science movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So the question before us is: Are these two rights – the right to  transparency and the right to privacy – compatible? Is it a zero-sum  game? Do we have to sacrifice one right to enforce the other?  Unfortunately, many privacy and transparency activists think this is the  case and this has resulted in some conflict. I suggest that these  rights are completely compatible when it comes to addressing the  question of power. These rights do not have to be balanced against one  another. There is no need to settle for a sub-optimal solution. &lt;b&gt;Rather this is an optimization problem and the solution is as follows: privacy protections must be inversely proportionate to power and as Julian Assange says transparency requirements should be directly proportionate to power.&lt;/b&gt;&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most privacy laws, the public interest is an exception to privacy. If  public interest is being undermined, then an individual privacy can be  infringed upon by the state, by researchers, by the media, etc. And in  transparency law, privacy is the exception. If the privacy of an  individual can be infringed, transparency is not required unless it is  in the public interest. In other words, the “public interest” test  allows us to use privacy law and transparency law to address power  asymmetries rather than exacerbate them. What constitutes “public  interest” is of course left to courts, privacy regulators, and  transparency regulators to decide. Like privacy, there are many other  exceptions in any given transparency regime including confidentiality  and secrecy. Given uneven quality of case law there will be a temptation  by the corrupt to conflate exceptions. Here the old common-law  principle of “there is no confidence as to the disclosure of iniquity” –  which prevents confidentiality law from being used to cover malfeasance  or illegality – can be adopted in appropriate jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 years ago, the transparency movement gave birth to yet another  movement – the open government data movement. The tension between  privacy and transparency is most clearly seen in the open government  data movement. The open government data movement in some parts of the  world is dominated by ahistorical and apolitical technologists, and some  of them seem intent on reinventing the wheel. In India, ever since the  enactment of the Right to Information Act, 2003, 30 transparency  activists are either killed, beaten or criminally intimidated every  year. This is the statistic from media coverage alone. Many more  silently suffer. RTI or transparency is without a doubt one of the most  dangerous sectors within civil society that you could choose to work in.  In contrast, not a single open data activist has ever been killed,  beaten or criminally intimidated. I suspect this is because open data  activists do not sufficiently challenge power hierarchies. Let us look a  little bit closely at their work cycle. When a traditional transparency  activist asks a question, that is usually enough to get them into  trouble. When an open data activist publishes an answer [a dataset  nicely scrubbed and machine readable, or a visualization, or a tool]  they are often frustrated because nobody seems interested in using it.  Often even the activist is unclear what the question is. This is because  open data activist works where data is available. Open data activists  are obsessed with big datasets, which are easier to find at the bottom  of the pyramid. They contribute to growing surveillance practices [the  nexus between Internet giants, states, and the security establishment]  rather that focusing on sousveillance [citizen surveillance of the  state, also referred to as citizen undersight or inverse surveillance].  They seem to be obsessed only with tools and technologies, rather than  power asymmetries and injustices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, a case study to make my argument easier to understand – Aadhaar  or UID, India’s ambitious centralized biometric identity and  authentication management system. There are many serious issues with its  centralized topology, proprietary technology, and dependence on  biometrics as authentication factors – all of which I have written about  in the past. In this article, I will explain how my optimization  solution can be applied to the project to make it more effective in  addressing its primary problem statement that corruption is a necessary  outcome of power asymmetries in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its current avatar – the Aadhaar project hopes to assign  biometric-based identities to all citizens. The hope is that, by doing  authentication in the last mile, corruption within India’s massive  subsidy programmes will be reduced. This, in my view, might marginally  reduce retail corruption at the bottom of the pyramid. It will do  nothing to address wholesale corruption that occurs as subsidies travel  from the top to the bottom of the pyramid. I have advocated over the  last two years that we should abandon trying to issue biometric  identities to all citizens, thereby making them more transparent to the  state. Let us instead issue Aadhaar numbers to all politicians and  bureaucrats and instead make the state more transparent to citizens.  There is no public interest in reducing privacy for ordinary citizens –  the powerless – but there are definitely huge public interest benefits  to be secured by increasing transparency of politicians and bureaucrats,  who are the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has recently introduced a biometric-based  attendance system for all bureaucrats and has created a portal that  allows Indian citizens to track if their bureaucrats are arriving late  or leaving early. This unfortunately is just bean counting [for being  corrupt and being punctual are not mutually exclusive] and public access  to the national portal was turned off because of legitimate protests  from some of the bureaucrats. What bureaucrats do in office, who they  meet, and which documents they process is more important than when they  arrive at or depart from work. The increased transparency or reduced  privacy was not contributing to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of first going after small-ticket corruption at the bottom of  the pyramid, maximization of public interest requires us to focus on the  top, for there is much greater ROI for the anti-corruption rupee. For  example: constructing a digital signature based on audit trails that  track all funds and subsidies as they move up and down the pyramid.  These audit trails must be made public so that ordinary villagers can be  supported by open data activists, journalists, social entrepreneurs,  and traditional civil society in verification and course correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope open data activists, data scientists, and big data experts will  draw inspiration from the giants of the transparency movement in India. I  hope they will turn their attention to power, examine power asymmetries  and then ask how the Aadhaar project can be leveraged to make India  more rather than less equal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Videos&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/tDf8TFjxqiQ" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/lPHWkYZjqzo" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The videos can also be watched on Vimeo:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111729069"&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111748146"&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://prospect.org/article/real-significance-wikileaks"&gt;http://prospect.org/article/real-significance-wikileaks&lt;/a&gt; “Transparency should be proportional to the power that one has.”&lt;/p&gt;
&lt;p&gt;Read the presentation on Risky Business: Transparency, Technology, Security and Privacy made at the Pecha Kucha session &lt;a href="http://editors.cis-india.org/openness/blog-old/risky-business.odp" class="internal-link"&gt;here&lt;/a&gt;. (ODP File, 35 kb)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclaimer: The views, opinions, and positions expressed by             the author(s) of this blog are theirs alone, and do not             necessarily reflect the views, opinions, or positions of             Omidyar Network. We make no representations as to accuracy,             completeness, timeliness, suitability or validity of any             information presented by individual authors of the blogs and             will not be liable for any errors, omissions, or delays in             this information or any losses, injuries or damages arising             from its display or use.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/privacy-v-transparency'&gt;http://editors.cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-03-08T06:26:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way">
    <title>Net Freedom Campaign Loses its Way</title>
    <link>http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way</link>
    <description>
        &lt;b&gt;A recent global meet was a victory for governments and the private sector over civil society interests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehindubusinessline.com/todays-paper/tp-opinion/net-freedom-campaign-loses-its-way/article5994906.ece"&gt;published in the Hindu Businessline&lt;/a&gt; on May 10, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;One word to describe NetMundial: Disappointing! Why? Because despite the promise, human rights on the Internet are still insufficiently protected. Snowden’s revelations starting last June threw the global Internet governance processes into crisis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Things came to a head in October, when Brazil’s President Dilma Rousseff, horrified to learn that she was under NSA surveillance for economic reasons, called for the organisation of a global conference called NetMundial to accelerate Internet governance reform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NetMundial was held in São Paulo on April 23-24 this year. The result was a statement described as “the non-binding outcome of a bottom-up, open, and participatory process involving … governments, private sector, civil society, technical community, and academia from around the world.” In other words — it is international soft law with no enforcement mechanisms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The statement emerges from “broad consensus”, meaning governments such as India, Cuba and Russia and civil society representatives expressed deep dissatisfaction at the closing plenary. Unlike an international binding law, only time will tell whether each member of the different stakeholder groups will regulate itself.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Again, not easy, because the outcome document does not specifically prescribe what each stakeholder can or cannot do — it only says what internet governance (IG) should or should not be. And finally, there’s no global consensus yet on the scope of IG. The substantive consensus was disappointing in four important ways:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass surveillance&lt;/b&gt; : Civil society was hoping that the statement would make mass surveillance illegal. After all, global violation of the right to privacy by the US was the &lt;i&gt;raison d'être&lt;/i&gt; of the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the statement legitimised “mass surveillance, interception and collection” as long as it was done in compliance with international human rights law. This was clearly the most disastrous outcome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access to knowledge:&lt;/b&gt; The conference was not supposed to expand intellectual property rights (IPR) or enforcement of these rights. After all, a multilateral forum, WIPO, was meant to address these concerns. But in the days before the conference the rights-holders lobby went into overdrive and civil society was caught unprepared.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end result — “freedom of information and access to information” or right to information in India was qualified “with rights of authors and creators”. The right to information laws across the world, including in India, contains almost a dozen exemptions, including IPR. The only thing to be grateful for is that this limitation did not find its way into the language for freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Intermediary liability:&lt;/b&gt; The language that limits liability for intermediaries basically provides for a private censorship regime without judicial oversight, and without explicit language protecting the rights to freedom of expression and privacy. Even though the private sector chants Hillary Clinton's Internet freedom mantra — they only care for their own bottomlines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Net neutrality:&lt;/b&gt; Even though there was little global consensus, some optimistic sections of civil society were hoping that domestic best practice on network neutrality in Brazil’s Internet Bill of Right — also known as Marco Civil, that was signed into law during the inaugural ceremony of NetMundial — would make it to the statement. Unfortunately, this did not happen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost a decade since the debate between the multi-stakeholder and multilateral model started, the multi-stakeholder model had produced absolutely nothing outside ICANN (Internet Corporation for Assigned Names and Numbers, a non-profit body), its technical fraternity and the standard-setting bodies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The multi-stakeholder model is governance with the participation (and consent — depending on who you ask) of those stakeholders who are governed. In contrast, in the multilateral system, participation is limited to nation-states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil society divisions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inability of multi-stakeholderism to deliver also resulted in the fragmentation of global civil society regulars at Internet Governance Forums.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in the run-up to NetMundial more divisions began to appear. If we ignore nuances — we could divide them into three groups. One, the ‘outsiders’ who are best exemplified by Jérémie Zimmermann of the La Quadrature du Net. Jérémie ran an online campaign, organised a protest during the conference and did everything he could to prevent NetMundial from being sanctified by civil society consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the ‘process geeks’ — for these individuals and organisations process was more important than principles. Most of them were as deeply invested in the multi-stakeholder model as ICANN and the US government and some who have been riding the ICANN gravy train for years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even worse, some were suspected of being astroturfers bootstrapped by the private sector and the technical community. None of them were willing to rock the boat. For the ‘process geeks’, seeing politicians and bureaucrats queue up like civil society to speak at the mike was the crowning achievement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the ‘principles geeks’ perhaps best exemplified by the Just Net Coalition who privileged principles over process. Divisions were also beginning to sharpen within the private sector. For example, Neville Roy Singham, CEO of Thoughtworks, agreed more with civil society than he did with other members of the private sector in his interventions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, the ‘outsiders’ couldn't care less about the outcome and will do everything to discredit it, the ‘process geeks’ stood in ovation when the outcome document was read at the closing plenary and the ‘principles geeks’ returned devastated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the multi-stakeholder model to survive it must advance democratic values, not undermine them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This will only happen if there is greater transparency and accountability. Individuals, organisations and consortia that participate in Internet governance processes need to disclose lists of donors including those that sponsor travel to these meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way'&gt;http://editors.cis-india.org/internet-governance/blog/the-hindu-business-line-may-10-2014-sunil-abraham-net-freedom-campaign-loses-its-way&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>NETmundial</dc:subject>
    

   <dc:date>2014-05-27T11:07:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother">
    <title>Very Big Brother</title>
    <link>http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, the organization I work for, currently serves on a committee established by the Government of India's Department of Biotechnology, Ministry of Science and Technology in January 2013. The committee has been charged with preparing a report on the draft Human DNA Profiling Bill.&lt;/b&gt;
        &lt;p&gt;The article was originally &lt;a class="external-link" href="http://www.councilforresponsiblegenetics.org/GeneWatch/GeneWatchPage.aspx?pageId=525"&gt;published in GeneWatch&lt;/a&gt; (January - April 2014) issue.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Why should an organization that focuses on the Internet be invited to such a committee? There are some obvious reasons related to data protection and big data. CIS had previously served on the Justice AP Shah committee that was tasked by the Planning Commission to make recommendations on the draft Privacy Bill in 2012. There are also some less obvious connections, such as academic research into cyborgs wherein the distinction between human and machine/technology is blurred; where an insulin pump makes one realize that the Internet of Things could include the Internet of Body Parts. But for this note I will focus on biometrics - quantifiable data related to individual human characteristics - and their gate-keeping function on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The bouquet of biometric options available to technologists is steadily expanding - fingerprint, palm print, face recognition, DNA, iris, retina, scent, typing rhythm, gait, and voice. Biometrics could be used as authentication or identification to ensure security and privacy. However, biometrics are different from other types of authentication and identification factors in three important ways that have implications for human rights in information societies and the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, biometrics allow for non-consensual authentication and identification. Newer, more advanced and more expensive biometric technologies usually violate human rights more extensively and intensively than older, more rudimentary and inexpensive biometrics. For example, it is possible to remotely harvest iris information when a person is wide awake without even being aware that their identification or authentication factors have been compromised. It isn't difficult to imagine ways to harvest someone's fingerprints and palm prints without their knowledge, and you cannot prevent a security camera from capturing your gait. You could use specialized software like Tor to surf the World Wide Web anonymously and cover your digital tracks, but it is much harder to leave no trail of DNA material in the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, biometrics rely on probabilistic matching rather than discrete matching - unlike, for example, a password that you use on a social media platform. In the 2007 draft of India's current Human DNA Profiling Bill, the preamble said "the Deoxyribose Nucleic Acid (DNA) analysis of body substances is a powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead, without any doubt." This extract from the bill was quoted in an ongoing court case to use tampered chain of custody for DNA as the means to seek exoneration of the accused. And the scientists on the committee insist that the DNA Data Bank Manager "...shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency ... as to whether the DNA profile received is already contained in the Data Bank" - in other words, a "yes" or "no" answer. This is indeed odd for those who come from the world of Internet policy - especially when one DNA lab worker confidentially shared that after a DNA profile was generated the "standard operating procedure" included checking it against the DNA profile of the lab worker to ensure that there was no contamination during the process of generating the profile. This would not be necessary for older forms of biometrics such as the process of developing a photograph. In other words, chain of custody issues with every generation of biometric technology are getting more and more complex. In the developing world, the disillusioned want to believe that "technology is the solution." The fallibility of technology must determine its evidentiary status.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, biometrics are only machine-scrutable. This means machines and not human beings will determine whether you are guilty or innocent; whether you should get subsidized medicine, grain, or fuel; whether you can connect to the Internet via mobile phone, cybercafe or broadband. DNA evidence is not directly observable by judges and therefore the technology and equipment have to be made increasingly transparent so that ordinary citizens as well as the scientific community can audit their effectiveness. In 2009, the Second District Court of Appeal and Circuit Court in Florida upheld a 2005 ruling requiring CMI Inc, the manufacturer of Intoxilyzer 5000, to release source code, failing which evidence from the breathalyzer would be rendered inadmissible in more than 100 drunk driving cases. If the transparency of machines is important when prosecuting misdemeanors then surely this is something we must advocate for when culpability for serious crimes is determined through DNA evidence and other types of biometric technologies. This could be accomplished by the triad of mandates for free/open source software, open standards and open hardware. This is not necessary for all DNA technology and equipment that is used in the market, but only for a small sub-set of these technologies that impinge on our rights as human beings via law enforcement and the judicial system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been nine years since India started the process of drafting this bill. We hope that the delays will only result in a robust law that upholds human rights, justice and scientific progress.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham is Executive Director of the Centre for Internet and Society, based in Bangalore, India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother'&gt;http://editors.cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-14T11:39:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security">
    <title>Who Governs the Internet? Implications for Freedom and National Security</title>
    <link>http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security</link>
    <description>
        &lt;b&gt;The second half of last year has been quite momentous for Internet governance thanks to Edward Snowden. German Chancellor Angela Merkel and Brazilian President Dilma Rousseff became aware that they were targets of US surveillance for economic not security reasons. They protested loudly.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article was published in Yojana (April 2014 Issue). &lt;a href="http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-who-governs-the-internet.pdf" class="external-link"&gt;Click to download the original here&lt;/a&gt;. (PDF, 177 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The role of the US perceived by some as the benevolent dictator or primary steward of the Internet because of history, technology, topology and commerce came under scrutiny again. The I star bodies also known as the technical community - Internet Corporation for Assigned Names and Numbers (ICANN); five Regional Internet Registries (RIRs) ie. African,  American, Asia-Pacific, European and Latin American; two standard setting organisations - World Wide Web Consortium (W3C) &amp;amp; Internet Engineering Task Force (IETF); the Internet Architecture Board (IAB); and Internet Society (ISOC) responded by issuing the Montevideo Statement &lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; on the 7th of October. The statement expressed "strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance." It called for  "accelerating the globalization of ICANN and IANA functions..." - did this mean that the I star bodies were finally willing to end the special role that US played in Internet governance? However, that dramatic shift in position was followed with the following qualifier "...towards an environment in which all stakeholders, including all governments, participate on an equal footing." Clearly indicating that for the I star bodies multistakeholderism was non-negotiable.  Two days later President Rousseff after a meeting with Fadi Chehadé, announced on Twitter that Brazil would host "an international summit of governments, industry, civil society and academia." &lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt; The meeting has now been dubbed Net Mundial and 188 proposals for “principles” or “roadmaps for the further evolution of the Internet governance ecosystem” have been submitted for discussion in São Paulo on the 23rd and 24th of April. The meeting will definitely be an important milestone for multilateral and multi-stakeholder mechanisms in the ecosystem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been more than a decade since this debate between multilateralism and multi-stakeholderism has ignited. Multistakeholderism is a form of governance that seeks to ensure that every stakeholder is guaranteed a seat at the policy formulation table (either in consultative capacity or in decision making capacity depending who you ask). The Tunis Agenda, which was the end result of the 2003-05 WSIS upheld the multistakeholder mode. The 2003–2005 World Summit on the Information Society process was seen by those favouring the status quo at that time as the first attempt by the UN bodies or multilateralism - to takeover the Internet. However, the end result i.e. Tunis Agenda &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; clarified and reaffirmed multi-stakeholderism as the way forward even though multilateral governance mechanisms were also accepted as a valid component of Internet governance. The list of stakeholders included states, the private sector, civil society, intergovernmental organisations, international standards organisations and the “academic and technical communities within those stakeholder groups mentioned” above. The Tunis Agenda also constituted the Internet Governance Forum (IGF) and the process of Enhanced Cooperation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IGF was defined in detail with a twelve point mandate including to “identify emerging issues, bring them to the attention of the relevant bodies and the general public, and, where appropriate, make recommendations.” In brief it was to be a learning Forum, a talk shop and a venue for developing soft law not international treaties. Enhanced Cooperation was defined as “to enable governments, on an equal footing, to carry out their roles and responsibilities, in international public policy issues pertaining to the Internet, but not in the day-to-day technical and operational matters, that do not impact on international public policy issues” –  and to this day, efforts are on to define it more clearly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Seven years later, during the World Conference on Telecommunication in Dubai, the status quoists dubbed it another attempt by the UN to take over the Internet. Even those non-American civil society actors who were uncomfortable with US dominance were willing to settle for the status quo because they were convinced that US court would uphold human rights online more robustly than most other countries. In fact, the US administration had laid a good foundation for the demonization of the UN and other nation states that preferred an international regime. "Internet freedom" was State Department doctrine under the leadership of Hillary Clinton. As per her rhetoric – there were good states, bad states and swing states. The US, UK and some Scandinavian countries were the defenders of freedom. China, Russia and Saudi Arabia were examples of authoritarian states that were balkanizing the Internet. And India, Brazil and Indonesia were examples of swing states – in other words, they could go either way – join the good side or the dark side.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Internet freedom rhetoric was deeply flawed. The US censorship regime is really no better than China’s. China censors political speech – US censors access to knowledge thanks to the intellectual property (IP) rightsholder lobby that has tremendous influence on the Hill. Statistics of television viewership across channels around the world will tell us how the majority privileges cultural speech over political speech on any average day. The great firewall of China only affects its citizens – netizens from other jurisdictions are not impacted by Chinese censorship. On the other hand, the US acts of censorship are usually near global in impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because the censorship regime is not predominantly based on blocking or filtering but by placing pressure on identification, technology and financial intermediaries thereby forcing their targets offline. When it comes to surveillance, one could argue that the US is worse than China. Again, as was the case with censorship, China only conducts pervasive blanket surveillance upon its citizens – unlike US surveillance, which not only affects its citizens but targets every single user of the Internet through a multi-layered approach with an accompanying acronym soup of programmes and initiatives that include malware, trojans, software vulnerabilities, back doors in encryption standards, over the top service providers, telcos, ISPs, national backbone infrastructure and submarine fibre optic cables.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Security guru Bruce Schneier tells us that "there is no security without privacy. And liberty requires both security and privacy.” Blanket surveillance therefore undermines the security imperative and compromises functioning markets by make e-commerce, e-banking, intellectual property, personal information and confidential information vulnerable. Building a secure Internet and information society will require ending mass surveillance by states and private actors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Opportunity for India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unlike the America with its straitjacketed IP regime, India believes that access to knowledge is a precondition for freedom of speech and expression. As global intellectual property policy or access to knowledge policy is concerned, India is considered a leader both when it comes to domestic policy and international policy development at the World Intellectual Property Organisation. From the 70s our policy-makers have defended the right to health in the form of access to medicines. More recently, India played a critical role in securing the Marrakesh Treaty for Visually Impaired Persons in June 2013 which introduces a user right [also referred to as an exception, flexibility or limitation] which allows the visually impaired to convert books to accessible formats without paying the copyright-holder if an accessible version has not been made available. The Marrakesh Treaty is disability specific [only for the visually impaired] and works specific [only for copyright]. This is the first instance of India successfully exporting policy best practices. India's exception for the disabled in the Copyright Act unlike the Marrakesh Treaty, however, is both disability-neutral and works-neutral.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that the Internet is critical to the successful implementation of the Treaty ie. cross border sharing of works that have been made accessible to disabled persons in one country with the global community, it is perhaps time for India to broaden its influence into the sphere of Internet governance and the governance of information societies more broadly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Post-Snowden, the so called swing states occupy the higher moral ground. It is time for these states to capitalize on this moment using strong political will. Instead of just being a friendly jurisdiction from the perspective of access to medicine, it is time for India to also be the enabling jurisdiction for access to knowledge more broadly. We could use patent pools and compulsory licensing to provide affordable and innovative digital hardware [especially mobile phones] to the developing world. This would ensure that rights-holders, innovators, manufactures, consumers and government would all benefit from India going beyond being the pharmacy of the world to becoming the electronics store of the world. We could explore flat-fee licensing models like a broadband copyright cess or levy to ensure that users get content [text, images, video, audio, games and software] at affordable rates and rights-holders get some royalty from all Internet users in India. This will go a long way in undermining the copyright enforcement based censorship regime that has been established by the US. When it comes to privacy – we could enact a world-class privacy law and establish an independent, autonomous and proactive privacy commissioner who will keep both private and state actors on a short lease. Then we need a scientific, targeted surveillance regime that is in compliance with human rights principles. This will make India simultaneously an IP and privacy haven and thereby attract huge investment from the private sector, and also earn the goodwill of global civil society and independent media. Given that privacy is a precondition for security, this will also make India very secure from a cyber security perspective. Of course this is a fanciful pipe dream given our current circumstances but is definitely a possible future for us as a nation to pursue.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is the scope of Internet Governance?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Part of the tension between multi-stakeholderism and multilateralism is that there is no single, universally accepted definition of Internet governance. The conservative definitions of Internet Governance limits it to management of critical Internet resources, including the domain name system, IP addresses and root servers – in other words, the ICANN, IANA functions, regional registries and other I* bodies. This is where US dominance has historically been most explicit. This is also where the multi-stakeholder model has clearly delivered so far and therefore we must be most careful about dismantling existing governance arrangements. There are very broadly four approaches for reducing US dominance here – a) globalization [giving other nation-states a role equal to the US within the existing multi-stakeholder paradigm], b) internationalization [bring ICANN, IANA functions, registries and I* bodies under UN control or oversight], c) eliminating the role for nation states in the IANA functions&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and d) introducing competitors for names and numbers management. Regardless of the final solution, it is clear that those that control domain names and allocate IP addresses will be able to impact the freedom of speech and expression. The impact on the national security of India is very limited given that there are three root servers &lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt; within national borders and it would be near impossible for the US to shut down the Internet in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For a more expansive definition – The Working Group on Internet Governance report&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;has four categories for public policy issues that are relevant to Internet governance:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(a) Issues relating to infrastructure and the management of critical Internet resources, including administration of the domain name system and Internet protocol addresses (IP addresses), administration of the root server system, technical standards, peering and interconnection, telecommunications infrastructure, including innovative and convergent technologies, as well as multilingualization. These issues are matters of direct relevance to Internet governance and fall within the ambit of existing organizations with responsibility for these matters;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) Issues relating to the use of the Internet, including spam, network security and cybercrime. While these issues are directly related to Internet governance, the nature of global cooperation required is not well defined;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c)Issues that are relevant to the Internet but have an impact much wider than the Internet and for which existing organizations are responsible, such as intellectual property rights (IPRs) or international trade. ...;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) Issues relating to the developmental aspects of Internet governance, in particular capacity-building in developing countries.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of these categories are addressed via state regulation that has cascaded from multilateral bodies that are associated with the United Nations such as the World Intellectual Property Organisation for "intellectual property rights" and the International Telecommunication Union for “telecommunications infrastructure”. Other policy issues such as  "cyber crime" are currently addressed via plurilateral instruments – for example the Budapest Convention on Cybercrime – and bilateral arrangements like Mutual Legal Assistance Treaties. "Spam" is currently being handled through self-regulatory efforts by the private sector such as Messaging, Malware and Mobile Anti-Abuse Working Group.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt; Other areas where there is insufficient international or global cooperation include "peering and interconnection" - the private arrangements that exist are confidential and it is unclear whether the public interest is being adequately protected.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;So who really governs the Internet?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;So in conclusion, who governs the Internet is not really a useful question. This is because nobody governs the Internet per se. The Internet is a diffuse collection of standards, technologies and actors and dramatically different across layers, geographies and services. Different Internet actors – the government, the private sector, civil society and the technical and academic community are already regulated using a multiplicity of fora and governance regimes – self regulation, coregulation and state regulation. Is more regulation always the right answer? Do we need to choose between multilateralism and multi-stakeholderism? Do we need stable definitions to process? Do we need different version of multi-stakeholderism for different areas of governance for ex. standards vs. names and numbers? Ideally no, no, no and yes. In my view an appropriate global governance system will be decentralized, diverse or plural in nature yet interoperable, will have both multilateral and multistakeholder institutions and mechanisms and will be as interested in deregulation for the public interest as it is in regulation for the public interest.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Montevideo Statement on the Future of Internet Cooperation &lt;a class="external-link" href="https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm"&gt;https://www.icann.org/en/news/announcements/announcement-07oct13-en.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Brazil to host global internet summit in ongoing fight against NSA surveillance &lt;a class="external-link" href="http://rt.com/news/brazil-internet-summit-fight-nsa-006/"&gt;http://rt.com/news/brazil-internet-summit-fight-nsa-006/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Tunis Agenda For The Information Society &lt;a class="external-link" href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;http://www.itu.int/wsis/docs2/tunis/off/6rev1.html&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Roadmap for globalizing IANA: Four principles and a proposal for reform: a submission to the Global Multistakeholder Meeting on the Future of Internet Governance by Milton Mueller and Brenden Kuerbis March 3rd 2014  See: &lt;a class="external-link" href="http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf"&gt;http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Mumbai (I Root), Delhi (K Root) and Chennai (F Root). See: &lt;a class="external-link" href="http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers"&gt;http://nixi.in/en/component/content/article/36-other-activities-/77-root-servers&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Report of the Working Group on Internet Governance to the President of the Preparatory Committee of the World Summit on the Information Society, Ambassador Janis Karklins, and the WSIS Secretary-General, Mr Yoshio Utsumi. Dated:  14 July 2005 See: &lt;a class="external-link" href="http://www.wgig.org/WGIG-Report.html"&gt;http://www.wgig.org/WGIG-Report.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].Messaging, Malware and Mobile Anti-Abuse Working Group website See: &lt;a class="external-link" href="http://www.maawg.org/"&gt;http://www.maawg.org/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author is is the Executive Director of the Centre for Internet and Society (CIS), Bangalore. He is also the founder of Mahiti, a 15 year old social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. He is an Ashoka fellow. For three years, he also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security'&gt;http://editors.cis-india.org/internet-governance/blog/yojana-april-2014-sunil-abraham-who-governs-the-internet-implications-for-freedom-and-national-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-05T16:23:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal">
    <title>Privacy worries cloud Facebook's WhatsApp Deal</title>
    <link>http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal</link>
    <description>
        &lt;b&gt;Privacy activists in the United States have asked the competition regulator or the Federal Trade Commission to put on hold Facebook's acquisition of WhatsApp. Why have they done this when Facebook has promised to leave WhatsApp untouched as a standalone app?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-03-14/news/48222166_1_whatsapp-facebook-users-privacy-worries"&gt;Read the original published in the Economic Times on March 14, 2014&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Activists have five main concerns.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Facebook has a track record of not keeping its promises to users. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ethos of both companies when it comes to privacy is diametrically opposite. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The probability that WhatsApp messages and content will be intercepted because of Facebook's participation in NSA's PRISM spying programme. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Facebook slurping WhatsApp's large repository of phone numbers. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Two hundred trackers already monitor your internet use when you are not using Facebook and now they tracking mobile use much more granularly. This week the Indian competition regulator (CCI) also told the media that the acquisition would be subject to scrutiny. However, unlike the US regulator the Indian regulator does not have the mandate to examine the acquisition from a privacy perspective.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;LIRNEAsia research in Indonesia paints a very similar picture to one we have in India. When Indonesian mobile phone users were asked if they used Facebook they answered in affirmative. Then the very same users were asked if they used the internet and they replied in negative. A large number of Facebook users in these other similar economies are trapped within what are called "walled gardens."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Walled gardens allow mobile phone subscribers without data connections to get access to a single over-the-top service provider like Facebook because their telcom provider has an arrangement. Software such as Facebook on every phone makes it possible for feature phone users to also enter the walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Facebook it "is a fast and easyto-use native app that works on more than 3,000 different types of feature phones from almost every handset manufacturer that exists today."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike North American and European users of Facebook - who freely roam the "world wild web" and then choose to visit Facebook when they want to many Indian users will first experience data services in a domesticated fashion within a walled garden.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whether or not they will wander in the wild when they are have full access to the internet remains to be seen. But given our poor rates of penetration, dogmatic insistence on network neutrality at this early stage of internet adoption may not be the right way to maximise welfare and consumer interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fortunately for Facebook and unfortunately for us, India still does not have a comprehensive data protection or horizontal privacy law. The Justice AP Shah Committee that was constituted by the Planning Commission in October 2012 recommended that the Privacy Act articulate national privacy principles and establish the office of the Privacy Commissioner. It further recommended that data protection and surveillance be regulated for both the private sector and the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since then the Department of Personnel and Training has updated the draft bill to implement these recommendations and has been working towards consensus within government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since we still don't have our own privacy regulator we will have to depend on foreign data protection authorities and privacy commissioners to protect us from the voracious appetite for personal data of over-the-top service providers like Facebook This is woefully insufficient because they will not act on harm caused to Indian consumers or be aware of how Facebook acts differently in the Indian market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we approach the first general election in India when social media will play a small but influential role it would have been excellent if we had someone to look out for our right to privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal'&gt;http://editors.cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:59:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty">
    <title>The Fight for Digital Sovereignty</title>
    <link>http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty</link>
    <description>
        &lt;b&gt;It is time to incorporate free software principles to address the issue of privacy. Thanks to the revelations of Edward Snowden, a former contractor to the United States (US) National Security Agency (NSA) who leaked secrets about the agency’s surveillance programmes, a 24-year-old movement aimed at protecting the rights of software users and developers has got some fresh attention from policymakers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.epw.in/postscript/fight-digital-sovereignty.html"&gt;published in the Economic &amp;amp; Political Weekly&lt;/a&gt;, Vol-XLVIII No. 42, October 19, 2013&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The free and open source software movement (often collectively labelled  as FOSS or sometimes FLOSS, with the “l” standing for “libre”)  guarantees four freedoms through a copyright licence – the freedom to  use for any purpose, the freedom to study the code, the freedom to  modify it and the freedom to distribute the modified code gratis or for a  fee. Free software principles have permeated the world in the form of  movements around open standards, open content, open access and open  data. The second freedom is the most critical in an open society.  Privacy, security and integrity are best achieved through the  transparency guaranteed by free software rather than the opacity of  proprietary software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Free software is directly useful in deciding on the software required  for your device operating system and applications. NSA’s surveillance  programme covered operating system vendors like Microsoft and Apple, and  application vendors like Skype. The concerns raised by such  surveillance programmes are best addressed by shifting to free software.  Increasingly, this is possible on mobile devices because of the  availability of Android derivatives that keep Google’s nose out of your  business and on other personal computing devices through GNU/Linux  distributions such as Ubuntu. Ideally, this should be accomplished by a  mandate for government and public infrastructure in specific areas where  free software alternatives are on par with proprietary competitors. Two  other policy options remain outside procurement policies for hardware –  code escrow and independent audits. Firms that are willing to share  code with the government should be preferred over those that do not,  thereby encouraging proprietary software companies to provide for the  second freedom in free software within a limited context. Code escrow  could improve the quality of the independent audit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, open hardware based on free software principles is  still a fringe phenomenon in terms of market share. The Indian  government cannot afford bans on foreign products, unlike the  intelligence and military of Australia, the US, Britain, Canada and New  Zealand, which recently prohibited the use of Lenovo machines in  “secret” and “top secret” networks. Last October, the US government  banned US telecos from using equipment from Huawei and ZTE. Both these  bans are not based on any credible public evidence regarding back doors  in any of the products manufactured by these Chinese companies. The  Indian government, using funds like the Universal Service Obligation  Fund, should support competitive research to reverse-engineer and  analyse all foreign and indigenous hardware to ensure that there is no  national security threat or infringement on the individual’s right to  privacy. One example would be a research project to determine whether  China-manufactured phones call home when they are used on Indian telecom  networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud and other online services run by corporations could also  completely undermine privacy and security. This again can be partially  addressed through the transparency enabled by free software and open  standards. To begin with, the government must ban the use of Google,  Yahoo, Hotmail, etc, for official purposes by those in public office,  law enforcement and the military, while simultaneously mandating the use  of cryptography for all sensitive material and communication. It should  not, however, mandate the use of National Informatics Centre (NIC)  infrastructure as it may be a single point of failure; instead, a  variety of open-standards-compliant and free-software-based  infrastructure for all public sector information communication  technology (ICT) requirements should be encouraged. This procurement  bias will result in the growth of domestic server administration and  security competence, thus creating and contributing towards the  establishment of a market for affordable privacy and security-enhanced  services that ordinary citizens and private sector organisations can  access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The end objective through means such as free software, open hardware,  code escrow and independent audits is sovereignty over software,  hardware, cloud and network infrastructure. However, the state, the  private sector, the consumer and the citizen may disagree on the  details. Apart from law enforcement and national security concerns that  may require targeted surveillance, there are other occasions when  technological possibilities may have to be curtailed through policy to  protect human rights and the public interest. For example, to implement  the internationally accepted privacy principle of notice on electronic  recording devices, some jurisdictions may require that video recorders  display a blinking red light and that digital cameras make an audible  click sound just like analog cameras. This was first initiated in South  Korea to reduce the incidence of “upskirt photography”. This type of law  may become more commonplace when technologies like Google Glass become  more popular. In other words, absolute digital sovereignty may need to  be curtailed in order to protect human rights in certain circumstances.  But code could be used to resist regulation through law, thereby  converting both the software and hardware layers of devices and networks  into a battleground for sovereignty between the free software hacker  and the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty'&gt;http://editors.cis-india.org/a2k/blogs/epw-vol-xlviii-42-october-19-2013-sunil-abraham-the-fight-for-digital-sovereignty&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2013-10-25T07:29:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill">
    <title>Privacy Law Must Fit the Bill </title>
    <link>http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill</link>
    <description>
        &lt;b&gt;The process of updating Indian privacy policy has gained momentum ever since the launch of the UID project and also the leak of the Radia tapes. The Department of Personnel and Training has lead the drafting of privacy bill for the last three years. This bill will ideally articulate privacy principles and establish the office of the privacy commissioner and most importantly have an over-riding effect over 50 odd existing laws, rules and policies with privacy implications.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dc-epaper.com/PUBLICATIONS/DC/DCB/2013/09/09/ArticleHtmls/Privacy-law-must-fit-the-bill-09092013013016.shtml?Mode=1"&gt;published in the Deccan Chronicle&lt;/a&gt; on September 9, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Given the harmonizing impact of the proposed privacy bill, we must ensure that rigorous debate and discussion happens before the bill is finalized otherwise there may be terrible consequences.&lt;/p&gt;
&lt;p&gt;Here is a short list of what can possibly go wrong:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, the privacy bill ignores the massive power asymmetry in Indian societies undermining the right to information – in other jurisdictions referred to as freedom of information and access to information. The power asymmetry is addressed via a public interest test. The right to privacy would be the same for everyone except when public interest is at stake. This enables protection of the right to privacy to be inversely proportionate to power and almost conversely the requirement of transparency to be directly proportionate to power. In other words, the poor would have greater privacy than a middle-class citizens who in turn would have greater privacy than political and economic elites. And transparency requirements would be greatest for economic and political elites and lower for middle-class citizens and lowest for the poor.  If this is not properly addressed in the language of the bill – privacy activists would have undone the significant accomplishments of the right to information or transparency movement in India over the last decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the privacy bill has chilling effect on free speech. This can happen either by denying the speaker privacy, or by affording those who are spoken about too much privacy. For the speaker - Know Your Customer (KYC) and data retention requirements for telecom and internet infrastructure necessary to participate in the networked public sphere can result in the death of anonymous and pseudonymous speech. Anonymous and pseudonymous speech must be protected as it is a necessary for good governance, free media, robust civil society, and vibrant art and culture in a democracy.  For those spoken about - privacy is clearly required in certain cases to protect the victims of certain categories of crimes. However, the right to privacy could be abused by those occupying public office and those in public life to censor speech that is in the public interest. If for example a sport person does not publicly drink the aerated drink that he or she endorses in advertisements then the public has a right to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the privacy bill has a limited scope. Jurisprudence in India derives the right to privacy from the right to life and liberty through several key judgments including &lt;i&gt;Naz Foundation v. Govt. of NCT of Delhi&lt;/i&gt; decided by the Delhi High Court. The right to life and liberty or Article 21 unlike other constitutionally guaranteed fundamental rights does not distinguish between citizens and non-citizens. As a consequence the privacy bill must also protect residents, visitors and other persons who may never visit India, but whose personal information may travel to India as part of the global outsourcing phenomena. Also the obligations and safeguards under the privacy bill must equally apply to both the state and the private sector entities that could potentially infringe upon the individual's right to privacy. Different levels of protection may be afforded to citizens, residents, visitors and everybody else. Government and private sector data controllers may be subject to different regulations – for ex. an intelligence agency may not require 'consent' of the data subject to collect personal information and may only provide 'notice' after the investigation has cleared the suspect of all charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four, the privacy bill is expected to fix poorly designed technology. There are two diametrically opposite definitions of projects like NATGRID, CMS and UID. The government definition is that all these systems will allow only for targeted interception and surveillance, however the majority of civil society believes that these system will be used for blanket surveillance. If these systems are indeed built in a manner that supports blanket surveillance then legal band-aid in the form of a new law or provision that prohibits blanket surveillance will be a complete failure. The principle of 'privacy by design' is the only way to address this. For ex. shutters of digital cameras are silent and this allows for a particular form of voyeurism called upskirt. Almost a decade ago, the Korean government enacted a law that requires camera and mobile phone manufacturers to ensure that audio recording of a mechanical shutter is played every time the camera function is used. It is also illegal for the user to circumvent or disable this feature. In this example, the principle of notice is hardwired within the technology itself. To remix Spiderman's motto – with great power comes great temptation. We know that a rogue NTRO official installed a spy camera in the office toilet to make recording female colleagues and most recently that NSA officers confessed to spying on their love interests. If the technology can be abused it will be abused. Therefore legal safeguards are a poor substitute for technological safeguards. We need both simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five, the bill does not require compliance with internationally accepted privacy principles including the ones discussed so far 'consent', 'notice' and 'privacy by design'. Apart from human rights considerations – the most important imperative to modernize India privacy laws is trade. We have a vibrant ITES, BPO and KPO sector which handles personal information of foreigners mostly from the North American and European continents.  The Justice AP Shah committee in October 2012 identified privacy principle that required for India - notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. A privacy bill that does include all these principles will increase the regulatory compliance overhead for Indian enterprise with foreign clients and for multinationals operating in India. There is also the risk that privacy regulators in these jurisdictions will ban outsourcing to Indian firms because our privacy laws are not adequate by their standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, it is not sufficient for India to enact a privacy law it is essential that we get it right so that there are no unintended consequences on other equally important rights and dimensions of our democracy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill'&gt;http://editors.cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-12T06:25:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring">
    <title>Freedom from Monitoring: India Inc Should Push For Privacy Laws</title>
    <link>http://editors.cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring</link>
    <description>
        &lt;b&gt;More surveillance than absolutely necessary actually undermines the security objective.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Sunil Abraham was &lt;a class="external-link" href="http://forbesindia.com/article/recliner/freedom-from-monitoring-india-inc-should-push-for-privacy-laws/35911/1"&gt;published in Forbes India Magazine&lt;/a&gt; on August 21, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I think I understand why the average Indian IT entrepreneur or enterprise does not have a position on blanket surveillance. This is because the average Indian IT enterprise’s business model depends on labour arbitrage, not intellectual property. And therefore they have no worries about proprietary code or unfiled patent applications being stolen by competitors via rogue government officials within projects such as NATGRID, UID and, now, the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A sub-section of industry, especially the technology industry, will always root for blanket surveillance measures. The surveillance industry has many different players, ranging from those selling biometric and CCTV hardware to those providing solutions for big data analytics and legal interception systems. There are also more controversial players who provide spyware, especially those in the market for zero-day exploits. The cheerleaders for the surveillance industry are techno-determinists who believe you can solve any problem by throwing enough of the latest and most expensive technology at it.&lt;br /&gt;&lt;br /&gt;What is surprising, though, is that other indigenous or foreign enterprises that depend on secrecy and confidentiality—in sectors such a banking, finance, health, law, ecommerce, media, consulting and communications—also don’t seem to have a public position on the growing surveillance ambitions of ‘democracies’ such as India and the United States of America. (Perhaps the only exceptions are a few multinational internet and software companies that have made some show of resistance and disagreement with the blanket surveillance paradigm.)&lt;br /&gt;&lt;br /&gt;Is it because these businesses are patriotic? Do they believe that secrecy, confidentiality and, most importantly, privacy, must be sacrificed for national security? If that were true then it would not be a particularly wise thing to do, as privacy is the precondition for security. Ann Cavoukian, privacy commissioner of Ontario, calls it a false dichotomy. Bruce Schneier, security technologist and writer, calls it a false zero sum game; he goes on to say, “There is no security without privacy. And liberty requires both security and privacy.”&lt;br /&gt;&lt;br /&gt;The reason why the secret recipe of Coca Cola is still secret after over 120 years is the same as the reason why a captured soldier cannot spill the beans on the overall war strategy. Corporations, like militaries, have layers and layers of privacy and secrecy. The ‘need to know’ principle resists all centralising tendencies, such as blanket surveillance. It’s important to note that targeted surveillance to identify a traitor or spy within the military, or someone engaged in espionage within a corporation, is pretty much an essential. However, any more surveillance than absolutely necessary actually undermines the security objective. To summarise, privacy is a pre-condition to the security of the individual, the enterprise, the military and the nation state.&lt;br /&gt;&lt;br /&gt;Most people complaining online about projects like the Central Monitoring System seem to think that India has no privacy laws. This is completely untrue: We have around 50 different laws, rules and regulations that aim to uphold privacy and confidentiality in various domains. Unfortunately, most of those policies are very dated and do not sufficiently take into account the challenges of contemporary information societies. These policy documents need to be updated and harmonised through the enactment of a new horizontal privacy law. A small minority will say that Section 43(A) of the Information Technology Act is the India privacy law. That is not completely untrue, but is a gross exaggeration. Section 43(A) is really only a data security provision and, at that, it does not even comprehensively address data protection, which is only a sub-set of the overall privacy regulation required in a nation. &lt;br /&gt;&lt;br /&gt;What would an ideal privacy law for India look like? For one, it would protect the rights of all persons, regardless of whether they are citizens or residents. Two, it would define privacy principles. Three, it would establish the office of an independent and autonomous privacy commissioner, who would be sufficiently empowered to investigate and take action against both government and private entities. Four, it would define civil and criminal offences, remedies and penalties. And five, it would have an overriding effect on previous legislation that does not comply with all the privacy principles. &lt;br /&gt;&lt;br /&gt;The Justice AP Shah Committee report, released in October 2012, defined the Indian privacy principles as notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. The report also lists the exemptions and limitations, so that privacy protections do not have a chilling effect on the freedom of expression and transparency enabled by the Right to Information Act.&lt;br /&gt;&lt;br /&gt;The Department of Personnel and Training has been working on a privacy bill for the last three years. Two versions of the bill had leaked before the Justice AP Shah Committee was formed. The next version of the bill, hopefully implementing the recommendations of the Justice AP Shah Committee report, is expected in the near future. In a multi-stakeholder-based parallel process, the Centre for Internet and Society (where I work), along with FICCI and DSCI, is holding seven round tables on a civil society draft of the privacy bill and the industry-led efforts on co-regulation.&lt;br /&gt; &lt;br /&gt;The Indian ITES, KPO and BPO sector should be particularly pleased with this development. As should any other Indian enterprise that holds personal information of EU and US nationals. This is because the EU, after the enactment of the law, will consider data protection in India adequate as per the requirements of its Data Protection Directive. This would mean that these enterprises would not have to spend twice the time and resources ensuring compliance with two different regulatory regimes.&lt;br /&gt;&lt;br /&gt;Is the lack of enthusiasm for privacy in the Indian private sector symptomatic of Indian societal values? Can we blame it on cultural relativism, best exemplified by what Simon Davies calls “the Indian Train Syndrome, in which total strangers will disclose their lives on a train to complete strangers”? But surely, when email addresses are exchanged at the end of that conversation, they are not accompanied by passwords. Privacy is perhaps differently configured in Indian societies but it is definitely not dead. Fortunately for us, calls to protect this important human right are growing every day.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring'&gt;http://editors.cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-21T07:04:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech">
    <title>Don’t SLAPP free speech</title>
    <link>http://editors.cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech</link>
    <description>
        &lt;b&gt;IIPM is proving adept at the tactical use of lawsuits to stifle criticism, despite safeguards. THE DEPARTMENT of Telecommunications, on 14 February, issued orders to block certain web pages critical of the Indian Institute of Planning and Management (IIPM).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Sunil Abraham's column with inputs from Snehashish Ghosh was &lt;a class="external-link" href="http://tehelka.com/dont-slapp-free-speech/"&gt;published in Tehelka&lt;/a&gt; on February 3, 2013 (Issue 9 Volume 10)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite our best efforts, we have not managed to get a copy of the court order. Meanwhile, there has been a lot of speculation among Internet policy experts on Twitter. What is the title of the case? Which judge issued the order? Who is the affected party? Why have mainstream media houses like Outlook not been served notice by the court? Is the infamous Section 66A of the IT Act to be blamed? That is highly unlikely. News reports suggest that a lower court in Gwalior has issued an ad interim injunction in a defamation suit. Most experts agree that this is a SLAPP (Strategic Litigation Against Public Participation) suit, where a company uses the cost of mounting a legal defence to silence critics.&lt;/p&gt;
&lt;div&gt;
&lt;p style="text-align: justify; "&gt;Bullies  with deep pockets use the law in very creative ways, such as forum  shopping, forum shifting and the use of proxies. Forum shopping can be  best understood through the example of mining giant Fomento suing Goan  blogger Sebastian Rodrigues for $1 billion at the Kolkata High Court,  even though Goa would have been a more logical location. Though IIPM  lost an earlier case against &lt;i&gt;Careers360&lt;/i&gt; before the Uttaranchal  High Court, the offending URLs from that case are included in the latest  block order, exemplifying successful forum shifting. The doctrine of  ‘res subjudice’ does not permit courts to proceed in a matter which is  “directly and substantially” similar to a previous suit between the same  parties. Proxies are usually employed to circumvent this procedural  doctrine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 19(2) of our Constitution empowers the State to create laws  that place eight types (depending on how you count) of reasonable  restrictions on the freedom of speech and expression. One of these  reasonable restrictions is defamation. Tort law on defamation in India  has been mostly borrowed from common law principles developed in the UK,  which include a series of exceptions where the law cannot be used. In  the present context, the exceptions important for the IIPM case include:  fair and bona fide comment and matter of public interest. In addition,  Section 499 of the Indian Penal Code provides for 10 exceptions to  defamation. The exceptions relevant to this case are: “first: imputation  of truth which public good requires to be made or published”, “ninth:  imputation made in good faith by person for protection of his or other’s  interests” and “tenth: caution intended for good of person to whom  conveyed or for public good”. The criminal law on defamation in India is  based on robust legal principles, but for the sake of public interest  it’d be best to do away with such a law as it has far-reaching, chilling  effects on free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On interim  injunctions in defamation suits, the Delhi High Court set an important  precedent protecting free speech in 2011. While applying the English  principle — the Bonnard Rule — the court in Tata Sons Pvt Ltd versus  Greenpeace International held that a higher standard should be adhered  to while granting an interim injunction in a defamation suit, because  such an injunction might impinge upon freedom of expression and thus  potentially be in violation of the Indian Constitution. This century-old  rule states that “until it is clear that an alleged libel is untrue…  the importance of leaving free speech unfetter – ed is a strong reason  in cases of libel for dealing most cautiously and warily with the  granting of interim injunctions…”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same case, the Court rejected the argument that since it was published online and thus had wider reach and greater permanence, an injunction should be granted. It observed that “publication is a comprehensive term, embracing all forms and mediums — including the Internet”, thus ruling out special treatment for the Inter net in cases of defamation. That is good news for free speech online in India. Now let’s stick to it.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech'&gt;http://editors.cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-28T11:22:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/a2k/blogs/access-to-knowledge-in-market-place">
    <title>Pervasive Technologies: Access to Knowledge in the Market Place — A Presentation by Sunil Abraham</title>
    <link>http://editors.cis-india.org/a2k/blogs/access-to-knowledge-in-market-place</link>
    <description>
        &lt;b&gt;The 2012 Global Congress on Intellectual Property and the Public Interest was organized in Rio de Janeiro from December 15 to 17, 2012. The Centre for Internet &amp; Society partnered FGV, Washington College of Law, the American Embassy, African Information Research and Training and International Centre for Trade and Sustainable Development in this event. Sunil Abraham made a presentation on Pervasive Technologies on the opening day, December 15, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sunil Abraham presented on 13 different smartphones from the Indian market such as: The Classroom in a Box, The Supercharger, The Networker, The Linguist, TV on the Go, The Spy, The Semi-Smartphone, The Trendy, The Boombox, 3D, The Mighty Mini, The Pianist, and the Indian Experience.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the above devices are manufactured in China and imported into India through local companies for domestic consumption and made available for its 900 million mobile subscribers.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://editors.cis-india.org/a2k/blogs/pervasive-technologies.pdf" class="internal-link"&gt;Download the presentation&lt;/a&gt; [PDF, 4.61 Mb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/a2k/blogs/access-to-knowledge-in-market-place'&gt;http://editors.cis-india.org/a2k/blogs/access-to-knowledge-in-market-place&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Pervasive Technologies</dc:subject>
    

   <dc:date>2013-02-13T07:05:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media">
    <title>TV versus Social Media: The Rights and Wrongs</title>
    <link>http://editors.cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media</link>
    <description>
        &lt;b&gt;For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a toilet, and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham's guest column was &lt;a class="external-link" href="http://www.tribuneindia.com/2013/20130120/edit.htm#2"&gt;published in the Tribune &lt;/a&gt;on January 20, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Many in traditional media, especially television, look at social media with a mixture of envy and trepidation. They have been at the receiving end of various unsavoury characters online and consequently support regulation of social media. A common question asked by television anchors is "shouldn't they be subject to the same regulation as us?" This is because they employ the 'principle of equivalence', according to which speech that is illegal on broadcast media should also be illegal on social media and vice versa. According to this principle, criticising a bandh on national TV or in a newspaper op-ed or on social media should not result in jail time and, conversely, publishing obscene content, in either new or old media, should render you a guest of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given that Section 66-A of the Information Technology Act, 2000, places more draconian and arguably unconstitutional limits on free speech when compared to the regulation of traditional and broadcast media, those in favour of civil liberties may be tempted to agree with the 'principle of equivalence' since that will mean a great improvement from status quo. However, we must remember that this compromise goes too far since potential for harm through social media is usually very limited when compared to traditional media, especially when it comes to hate speech, defamation and infringement of privacy. A Facebook update or 'like' or a tweet from an ordinary citizen usually passes completely unnoticed. On rare occasion, an expression on social media originating from an ordinary citizen goes viral and then the potential for harm increases dramatically. But since this is the fringe case we cannot design policy based on it. On the other hand, public persons (those occupying public office and those in public life), including television journalists, usually have tens and hundreds of thousands friends and followers on these social networks and, therefore, can more consistently cause harm through their speech online. For most ordinary Netizens, everyday speech on social media has as much impact as graffiti in a public or residential toilet and therefore employing the 'principle of equivalence' will result in overregulation of new media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ideally speech regulation should address the asymmetries in the global attention economy by constantly examining the potential for harm. This applies to both 'speech about' public persons and also 'speech by' them. Since 'speech about' public persons is necessary for transparent and accountable governance and public discourse, such speech must be regulated less than 'speech about' ordinary citizens. Let us understand this using two examples: One, a bunch of school kids referring to a classmate as an idiot on a social network is bullying, but citizens using the very same term to criticise a minister or television anchor must be permitted. Two, an ordinary citizen should be allowed to photograph or video-record the acts of a film or sports star at a public location and upload it to a social network, but this exception to the right of privacy based on public interest will not imply that the same ordinary citizen can publish photographs or videos of other ordinary citizens. Public scrutiny and criticism is part of the price to be paid for occupying public office or public life. If speech regulation is configured to prevent damage to the fragile egos of public persons, then it would have a chilling effect on many types of speech that are critical in a democracy and an open society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When it comes to 'speech by' those in public office or in public life - given the greater potential for harm - they should be held more liable for their actions online. For example, an ordinary citizen with less than 100 followers causes very limited harm to the reputation of a particular person through a defamatory tweet. However, if the very same tweet is retweeted by a television anchor with millions of followers, there can be more severe damage to that particular person's reputation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many in television also wish to put an end to anonymous and pseudonymous speech online. They would readily agree with Nandan Nilekani's vision of tagging all - visits to the cyber cafe, purchases of broadband connections and SIM cards and, therefore, all activities from social media accounts with the UID number. I have been following coverage of the Aadhaar project for the past three years. Often I see a 'senior official from the UIDAI' make a controversial point. If anonymous speech is critical to protect India's identity project then surely it is an important form of speech. But, unlike the print media, which more regularly uses anonymous sources for their stories, television doesn't see clearly the connection between anonymous speech and free media. This is because many of the trolls that harass them online often hide behind pseudonymous identities. Television forgets that anonymous speech is at the very foundation of our democracy, i.e., the electoral ballot.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media'&gt;http://editors.cis-india.org/internet-governance/blog/sunday-tribune-january-20-2013-sunil-abraham-tv-vs-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-21T03:09:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship">
    <title>Online Censorship: How Government should Approach Regulation of Speech</title>
    <link>http://editors.cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship</link>
    <description>
        &lt;b&gt;Why is there a constant brouhaha in India about online censorship? What must be done to address this?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham's article was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-12-02/news/35530550_1_internet-censorship-speech-unintended-consequences"&gt;published in the Economic Times&lt;/a&gt; on December 2, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Of course, we must get the basics right â€” bad law has to be amended, read down by courts or repealed, and bad implementation of law should be addressed via reform and capacity building for the police. But most importantly those in power must understand how to approach the regulation of speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To begin with, speech is regulated across the world. Even in the US  â€” contrary to popular impression in India â€” speech is regulated both  online and offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, law is not the basis of most of  this regulation. Speech is largely regulated by social norms. Different  corners of our online and offline society have quite complex forms of  self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The harm caused by speech is often proportionate  to the power of the person speaking â€” it maybe unacceptable for a  politician or a filmstar to make an inflammatory remark but that very  same utterance from an ordinary citizen may be totally fine.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To  complicate matters, the very same speech by the very same person could  be harmful or harmless based on context. A newspaper editor may share  obscene jokes with friends in a bar, but may not take similar liberties  in an editorial.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal scholar Alan Dershowitz tells us, "The  best answer to bad speech is good speech." More recently the quote has  been amended, with "more speech" replacing "good speech".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Censorship by the state has to be reserved for the rarest of rare  circumstances. This is because censorship usually results in unintended  consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The "Streisand Effect", named after the  singer-actor Barbra Streisand, is one of these consequences wherein  attempts to hide or censor information only result in wider circulation  and greater publicity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Maharashtra police's attempt to censor  the voices of two women has resulted in their speech being broadcast  across the nation on social and mainstream media. If the state had  instead focused on producing good speech and more speech, nobody would  have even heard of these women.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Circumventing Censorship&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Peer-to-peer technologies on the internet mimic the topology of human networks and can also precipitate unintended consequences when subject to regulation. John Gilmore, a respected free software developer, puts it succinctly: "The Net interprets censorship as damage and routes around it."&lt;br /&gt;&lt;br /&gt;Most of the internet censorship in the US is due to IPR-enforcement activities. This is why Christopher Soghoian, a leading privacy activist, attributes the massive adoption of privacy-enhancing technologies such as proxies and VPNs (virtual private networks) by American consumers to the crackdown on online piracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, and even when the government has had legitimate reasons to regulate speech, there have been unintended consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the exodus of people from the North-east, the five SMS per day restriction imposed by the government resulted in another exodus from SMS to alternative messaging platforms such as BlackBerry Messenger (BBM), WhatsApp and Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In both cases the circumvention of censorship by the users has resulted in a worsening situation for law-enforcement organisations â€” VPNs and applications like WhatsApp are much more difficult to monitor and regulate.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mixed Memes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Regulation of speech also cannot be confused with cyber war or security. Speech can occasionally have security implications but that cannot be the basis for enlightened regulation.&lt;br /&gt;&lt;br /&gt;A cyber war expert may be tempted to think of censored content as weapons, but unlike weapons that usually remain lethal, content that can cause harm today may become completely harmless tomorrow. This is unlike a computer virus or malware. For example, during the exodus, the online edition of ET featured the complete list of 309 URLs that were in the four block orders issued by the government to ISPs.&lt;br /&gt;&lt;br /&gt;However, this did not result in fresh harm, demonstrating the fallacy of cyber war analogies. A cyber security expert, on the other hand, may be tempted to implement a 360Â° blanket surveillance to regulate speech, but as Gilmore again puts it, "If you're watching everybody, you're watching nobody."&lt;br /&gt;&lt;br /&gt;In short, if your answer to bad speech is more censorship, more surveillance and more regulation, then as the internet meme goes, "You're Doing It Wrong".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship'&gt;http://editors.cis-india.org/internet-governance/blog/economic-times-december-2-2012-sunil-abraham-online-censorship&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-05T07:06:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water">
    <title>The Five Monkeys &amp; Ice-cold Water</title>
    <link>http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water</link>
    <description>
        &lt;b&gt;The Indian government provides leadership, both domestically and internationally, when it comes to access to knowledge.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Sunil Abraham was published in &lt;a class="external-link" href="http://www.deccanchronicle.com/360-degree/five-monkeys-ice-cold-water-213"&gt;Deccan Chronicle&lt;/a&gt; on September 16, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Our domestic patent policy ensures that generic medicines are available and largely affordable not only within India but also in Africa and elsewhere. It also allows Indians to consume a wide range of technological innovations without worrying about legal bans that are an otherwise common feature in the developed countries, thanks to phenomena such as the ongoing mobile phone patent wars.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Copyright policy, including the last amendment of the copyright act, has ensured that fair dealing and the rights of students, researchers, disabled, etc., are protected. Texts, audio and video for education and entertainment are relatively affordable, especially in comparison to other countries in the Asia-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even at the World Intellectual Property Organisation, other developing countries look to India for guidance. The interventions of the copyright registrar G.R. Raghavender and the Indian team won praise during the most recent round of negotiations for the Treaty for the Visually Impaired. An excellent example of India's soft power protecting public interest at home and abroad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In diametrical contrast, India has a terrible track record when it comes to freedom of expression, especially expression mediated by networked technologies such as telecommunications and the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our policy-makers seem determined to extinguish the privacy of communications and also anonymous/pseudonymous speech through such devices as Know Your Customer (KYC) and data retention requirements for accessing the Internet through cyber-cafes, mobile phones, dial-up or broadband, ban on open wi-fi networks, plans to tie together Aadhaar and NATGRID and Central Monitoring System (CMS) to track a citizen using his/her UID across devices, networks and intermediaries, and requiring real-time interception equipment to be installed at all network and data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these without any horizontal privacy law or a data protection law that is compliant with international best practices. Security hawks argue that this pervasive, multi-tiered surveillance regime helps thwart criminal and terrorist attacks, but its poor design extracts a terrible price in terms of freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Citizens who cannot express themselves anonymously and privately begin to censor themselves, seriously undermining our democracy, which is most importantly founded on an anonymous expression, the electoral ballot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, in April 2011, rules under the amended IT Act were notified for intermediaries that have a chilling effect on free speech via unclear and unconstitutional limits on freedom of expression, encouragement of private censorship without any notice to those impacted, missing procedure for redress, and lack of penalties for those who abuse the rules to target legitimate speech. This was followed by calls for proactive censorship of social media, which caused much outrage amongst the twitterati.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even when the government had legitimate grounds (the recent exodus of North-East Indians) to censor free speech, it overreached and acted incompetently, cracking down on parody accounts on social media rather than carefully configuring the text message ban. As if that weren't enough, the government beats up a cartoonist and jails him for sedition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There’s a plan behind such attacks on free speech. The powerful in India, with their fragile egos, can afford expensive lawyers who can ensure that for those who dare to speak their mind, “the process is the punishment”, as Lawrence Liang of the Alternative Law Forum put it. Needless to say, cartoonists and others that dare to speak their mind cannot usually afford the time and expense of courts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An experiment featuring monkeys, bananas and ice-cold water, commonly attributed to the late American psychologist Harry Harlow, explains what’s being attempted by those who attack free speech. First, five monkeys are put in a cage with bananas hanging from the top that can be reached by climbing a ladder. Every time one of the monkeys try to climb the ladder, ice-cold water is thrown on all of them. Soon, the monkeys learn not to climb the ladder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then, one of them is replaced with a monkey that has never been drenched with ice-cold water. When the new monkey tries to climb the ladder, the other four monkeys attack it and prevent it from reaching the banana. This is continued till all the original monkeys are replaced with new ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When that’s done, although none of the monkeys left in the cage has ever been drenched with ice-cold water, they continue to enforce the regulation on themselves. This is what has happened in China. This is what is being attempted here – to social engineer the Indian netizen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water'&gt;http://editors.cis-india.org/internet-governance/www-deccan-chronicle-sep-16-2012-sunil-abraham-the-five-monkeys-and-ice-cold-water&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-10-30T10:43:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question">
    <title>To regulate Net intermediaries or not is the question</title>
    <link>http://editors.cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question</link>
    <description>
        &lt;b&gt;Given the disruption to public order caused by the mass exodus of North-Eastern Indians from several cities, the government has had for the first time in many years, a legitimate case to crackdown on Internet intermediaries and their users.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Sunil's column was &lt;a class="external-link" href="http://www.deccanherald.com/content/274218/to-regulate-net-intermediaries-not.html"&gt;published&lt;/a&gt; in the Deccan Herald on August 26, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There was, of course, much room for improvement in the manner in which the government conducted the censorship. But the policy question that becomes most pertinent now is: do we need to regulate Internet intermediaries further? The answer is yes and no. &lt;br /&gt; &lt;br /&gt; There are areas where these intermediaries need to be regulated in order to protect citizen and consumer interest. But to deal with rumour-mongering and hate speech, there is sufficient provisions in Indian law to deal with the current disruption in public order and any similar disruptions in the future. &lt;br /&gt; &lt;br /&gt; It is a common misunderstanding to assume that all civil society organisations that advocate civil liberties on networked technologies are regulatory doves that wish to dismantle regulation of the private sector and allow them complete free hand for innovation and, perhaps, causing harm to public interest.&lt;br /&gt; &lt;br /&gt; The opposite is also not necessarily true. We are not hawks, those that believe in maximal regulation of the private sector. The state should regulate the private sector in areas where the citizens are unable to protect their own interest and self-regulation is inadequate. But there are many other areas where regulation needs to be dismantled in the interests of citizen and public interest. &lt;br /&gt; &lt;br /&gt; Dr Rohan Samarajiva, founder of  a Colombo-based regional policy think tank LIRNEasia, explains this best using the ‘law of soft toys’. When his daughter was young he told her that in Sri Lanka there was a law which mandated that every time she got a new soft toy, she would have to necessarily give away another one.&lt;br /&gt; &lt;br /&gt; The regulatory lesson here is: the mandate for regulation cannot keep endlessly expanding. As the government moves into new areas of regulation, it should also exit other older areas where regulatory rupee is providing limited returns. These decisions should be based on evidence of harm caused to citizens and consumers. The following are a list of areas where regulation is required for Internet intermediaries:&lt;br /&gt; &lt;br /&gt; Privacy: India needs the office of the privacy commissioner established and an articulation of national privacy principles through the enactment of the long awaited Privacy Act. This privacy commissioner should be able to  investigate complaints against intermediaries, proactively investigate companies, order remedial action and fine companies that violate the principles and other policies in force. Remedial action could require change in policies, features, data retention policies and services etc. &lt;br /&gt; &lt;br /&gt; Competition: Many of these intermediaries have been taken to court on anti-trust complaints, fined and subjected to remedial action by regulators in America and Europe. &lt;br /&gt; &lt;br /&gt; Earlier this year, BharatMatrimony.com has filed a complaint against Google at the Competition Commission of India (CCI) alleging anti-competitive practices in its Adwords program. In addition, based on a report submitted by Consumer Unity &amp;amp; Trust Society (CUTS), a civil society organisation, CCI has initiated an investigation into Google's search engine for anti-competitive practices. If they are found guilty of breaking competition law they could be fined up to 10 per cent of their turnover.&lt;br /&gt; &lt;br /&gt; Speech: Article 19(2) of the Constitution permits Parliament to enact laws that place eight categories of reasonable restrictions on speech. Unfortunately, the Information Technology Act and its associated rules attempts to expand these restrictions and in addition does not comply with the principles of natural justice. Ideally, all those impacted by the censorship should be informed and should be able to seek redress and reinstatement for the censured speech.&lt;br /&gt; &lt;br /&gt; The policy sting operation conducted by the Centre for Internet and Society (CIS) last year demonstrated that intermediaries are risk-averse and tend to over-comply with takedown notices. There is a clear chilling effect on speech online and it is important that the Act and rules be amended at the earliest.&lt;br /&gt; &lt;br /&gt; Intellectual Property: Policies that fall under this inappropriate umbrella term for many differently configured laws make the yet unproven fundamental assumption that granting limited monopolies to rights holders, usually corporations, will result in greater innovation. However, citizen and consumer interest is protected through provisions for exceptions and limitations in laws such as copyright, patent, trademarks etc. Some examples of these safeguards that guarantee access to knowledge in Indian law include compulsory licences, patent opposition, fair-dealing etc. &lt;br /&gt; &lt;br /&gt; There are many other areas where special treatment may be required for intermediaries. For example tax law needs to handle evasion techniques like the Double Irish and the Dutch Sandwich. Given my lengthy wish-list of regulation of Internet intermediaries, why then has CIS become an NGO member of the Global Network Initiative?&lt;br /&gt; &lt;br /&gt; This is because I believe that technological development happen too quickly for us to purely depend on government regulation. Self-regulation has an important role to play in keeping up with these rapid changes. As self-regulatory norms mature they could be formalised into policy by the government.&lt;br /&gt; &lt;br /&gt; Therefore, I consider it a privilege that CIS has been accepted as a member of this self-regulatory initiative and we influence GNI norms using our Indian perspective. However, when self-regulation fails to protect public interest, then the government must step in to regulate Internet intermediaries.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question'&gt;http://editors.cis-india.org/internet-governance/www-deccan-herald-aug-26-2012-to-regulate-net-intermediaries-or-not-is-the-question&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-26T06:12:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet">
    <title>Censoring the Internet: A brief manual</title>
    <link>http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet</link>
    <description>
        &lt;b&gt;Blocking websites on the Internet should be proportionate to harm they intend. However, the government of India's approach is against the principles of natural justice.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.tehelka.com/story_main53.asp?filename=Ws230812Internet.asp"&gt;Tehelka&lt;/a&gt; on August 23, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;When:&lt;/b&gt; Speech should be regulated when there is harm, or when there is clear and imminent harm. The extent of regulation must be in proportion to the harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The mass exodus of people from the Northeast, from certain Indian-cities is clear indication of a ‘public order’ crisis. The government of India, for the very first time, has legitimate reasons for cracking down on intermediaries such as Google and Facebook and their users, unlike in the past when only the egos of politicians, bureaucrats and others in public office or public life were at stake. In most cases temporary restrictions on speech are sufficient to mitigate harm. When potential for harm has dissipated the restrictions should be lifted. Whilst videos and images related to the violations of the human-rights to the Rohingya community might be sensitive material today, there is no reason why such content should be blocked forever, unlike, for example, in the case of child pornography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How:&lt;/b&gt; Does this mean that the Internet rules that were notified in April last year were future-looking policies justified in retrospect? No. When a block is implemented, or a takedown is complied with, three types of notices are required — either immediately or after the imminent harm has been prevented. First, the censored individuals/groups should be informed, so that they can seek redressal and reinstatement; second, those trying to consume the censored material must be warned; and third, the general public has a right to know either immediately or in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in authoritarian states like Saudi Arabia, visitors to blocked websites are given clear reasons why the website was blocked along with contact details to seek redressal. There are, also, safe harbour provisions for intermediaries, meaning that they absolve themselves of liability in exchange for acting upon takedown orders sent by non-state actors. Suitable safeguards are required to prevent over-compliance by intermediaries, and the resulting chilling effect on free speech as demonstrated by CIS's research. The intermediary liability rules under the Indian IT Act 2008 have no such safeguards and therefore does not comply with principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who:&lt;/b&gt; Block and takedown orders need to be very specific. The advisory note issued to Internet intermediaries by the Department of Electronics and Information Technology, Ministry of Communications &amp;amp; Information Technology on the 17 August did not mention details such as URLs, user accounts, group names and content identifiers. Most of the censored material at first glance, appears to be communal in nature. Unfortunately, there are several URLs from mainstream media publications, a few Wikipedia pages and also at least two blog entries debunking rumours in the list, perhaps because of oversight. Images of unrelated human rights violations featuring people with similar racial features are being used to fuel the current rumours. However, blocking all websites featuring such images will not stop such rumour mongering. Censorship must be targeted and proportionate to the potential harm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Why:&lt;/b&gt; Speaking aloud just once in the analog world could either result in harm or good. Imagine shouting “bomb” in a crowded airport. The network effect of technologies such as SMS, social media and micro-blogging amplifies the impact of speech. Article 19(2) of the Constitution of India lists eight reasons for which reasonable restrictions may be applied to the right to free speech. This applies to both analog and speech mediated via networked technologies. Some of these restrictions such as 'public order' and 'incitement to discrimination, hostility or violence' are part of international treaties such as the International Covenant on Civil and Political Rights. Fringe phenomenon and exceptional circumstances should not be the basis for formulating policy. For example — knives used as murder weapons does not necessitate regulations on cutlery. Similarly, criminalising rumour mongering will not prevent false information from going viral, online, and disrupting public order. Videos and photos are doctored and manipulated for a wide variety of legitimate reasons. The existing law regulating speech in the interests of public order are sufficient to deal with the circulation of falsehoods on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sunil Abraham is the Executive Director of Bangalore based research organisation, the Centre for Internet and Society&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet'&gt;http://editors.cis-india.org/internet-governance/www-tehelka-com-sunil-abraham-august-23-2012-censoring-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-08-24T09:39:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
