The IRHR Curriculum is a series of training modules concerned with the relationship between human rights, ICTs and the internet. These modules are intended to help those who work on human rights and/or ICTs, stakeholders with an interest in the issues and students, to understand ways in which the internet is affecting the enjoyment and protection of rights – now and in the future – and explore how these affect their work and lives.
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...Alexander Decker
This document provides an overview of the Right to Information Act 2005 in India. It discusses how access to information is important for democracy and accountability. It outlines how the Indian judiciary has recognized a fundamental right to information. It also summarizes the key events that led to the passage of the Right to Information Act in 2005, including grassroots movements that highlighted the need for transparency. However, it notes that corruption levels still remain high, showing that implementation of the Act needs improvement.
Content blocking and filtering: A Technical approach to solve Socio/Political...APNIC
This document discusses content blocking and filtering at the national level. It notes that governments are interested in controlling the internet to curb issues like child protection, religion, culture, politics, and fake news. Content blocking can occur at the national, carrier/ISP, local network, and end user levels. The document outlines technical challenges with content blocking like breaking the internet or blocking access wholesale. It also discusses sociopolitical issues like threats to privacy and freedom of speech from nationwide filtering and shutdowns. The conclusion questions if technical filtering can truly solve socio-political problems or if alternative solutions are needed.
The document discusses freedom of speech and expression in Kashmir. It summarizes the right to freedom of speech as enshrined in the constitutions of India, Pakistan, and the US. It then discusses how internet bans and restrictions in Kashmir following the revocation of Article 370 have undermined this right and led to significant economic and educational losses. The Supreme Court of India ruled that access to the internet is a fundamental right, but the damage of the prolonged bans and slow internet access in Kashmir remains unquantifiable.
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
The document discusses the concept of privacy in relation to social media and technology. It covers several topics related to privacy rights in India and other countries, the threats to privacy posed by new technologies, and initiatives by industry and governments to protect privacy. It also discusses how personal information is increasingly being collected and used online through social networks and digital footprints, posing risks to individual privacy that laws and regulations aim to address.
11.role of right to information act 2005www.iiste.org call for paper in the h...Alexander Decker
This document discusses the Right to Information Act 2005 in India and its role in human development. Some key points:
- The Act aims to ensure transparency and accountability in government by giving citizens the right to access government-held information. It recognizes that access to information is essential for a functioning democracy.
- The Act provides a statutory framework for the fundamental right to information, which is part of the constitutional right to free speech. It lays out procedures for citizens to request and access information from public authorities.
- Some restrictions apply to information regarding national security, law enforcement, and private individuals' privacy. However, most government information should be disclosed unless it meets a specific exemption.
- The Indian judiciary has
1. Cyber law governs rules related to use of the internet and addresses legal issues like intellectual property, privacy, freedom of expression, and jurisdiction.
2. Cyber law encompasses laws around cyber crimes, digital signatures, intellectual property, data protection, and privacy. The Information Technology Act, 2000 was enacted in India to regulate e-commerce, cyber crimes, and other cyber activities.
3. Regulation of cyber space can occur through norms, law, architecture (technological design), or market forces. As online interactions increase, cyber law is important to balance individual privacy with organizations' interests while addressing new legal challenges of technology.
The document discusses the history and current status of the right to information in India. It notes that while India is one of the world's largest democracies, most state information lies with governing bodies rather than being publicly available. Several movements have advocated for internet access to be used to secure citizens' right to information. Examples are provided of how land records have been digitized, allowing farmers online access, and how certain programs enable citizens to access real-time government information via the internet or phones. While examples show the internet's potential, challenges remain due to lack of infrastructure and citizens' ability to utilize information and communication technologies.
1. Several copyright issues arise in cyberspace, including linking, framing, protection of content on websites, and international treaties. Deep linking and framing can undermine the rights of website owners if they divert traffic or create confusion between sites.
2. Software piracy, distribution of pirated software, and copying of code violate copyright. Databases containing raw data are also protected, as is the design and content of websites.
3. Determining what constitutes private versus public use of copyrighted material is challenging online. Reproduction that occurs during internet transmission may infringe on copyright depending on legal interpretation. Permission is advised when linking to or displaying copyrighted content from other sites.
11.0006www.iiste.org call for paper.[41-47]role of right to information act 2...Alexander Decker
This document provides an overview of the Right to Information Act 2005 in India. It discusses how access to information is important for democracy and accountability. It outlines how the Indian judiciary has recognized a fundamental right to information. It also summarizes the key events that led to the passage of the Right to Information Act in 2005, including grassroots movements that highlighted the need for transparency. However, it notes that corruption levels still remain high, showing that implementation of the Act needs improvement.
Content blocking and filtering: A Technical approach to solve Socio/Political...APNIC
This document discusses content blocking and filtering at the national level. It notes that governments are interested in controlling the internet to curb issues like child protection, religion, culture, politics, and fake news. Content blocking can occur at the national, carrier/ISP, local network, and end user levels. The document outlines technical challenges with content blocking like breaking the internet or blocking access wholesale. It also discusses sociopolitical issues like threats to privacy and freedom of speech from nationwide filtering and shutdowns. The conclusion questions if technical filtering can truly solve socio-political problems or if alternative solutions are needed.
The document discusses freedom of speech and expression in Kashmir. It summarizes the right to freedom of speech as enshrined in the constitutions of India, Pakistan, and the US. It then discusses how internet bans and restrictions in Kashmir following the revocation of Article 370 have undermined this right and led to significant economic and educational losses. The Supreme Court of India ruled that access to the internet is a fundamental right, but the damage of the prolonged bans and slow internet access in Kashmir remains unquantifiable.
Itechlaw conferene presentation 15th feb 2013 the quest over identity the iss...Prof. (Dr.) Tabrez Ahmad
The document discusses the concept of privacy in relation to social media and technology. It covers several topics related to privacy rights in India and other countries, the threats to privacy posed by new technologies, and initiatives by industry and governments to protect privacy. It also discusses how personal information is increasingly being collected and used online through social networks and digital footprints, posing risks to individual privacy that laws and regulations aim to address.
11.role of right to information act 2005www.iiste.org call for paper in the h...Alexander Decker
This document discusses the Right to Information Act 2005 in India and its role in human development. Some key points:
- The Act aims to ensure transparency and accountability in government by giving citizens the right to access government-held information. It recognizes that access to information is essential for a functioning democracy.
- The Act provides a statutory framework for the fundamental right to information, which is part of the constitutional right to free speech. It lays out procedures for citizens to request and access information from public authorities.
- Some restrictions apply to information regarding national security, law enforcement, and private individuals' privacy. However, most government information should be disclosed unless it meets a specific exemption.
- The Indian judiciary has
1. Cyber law governs rules related to use of the internet and addresses legal issues like intellectual property, privacy, freedom of expression, and jurisdiction.
2. Cyber law encompasses laws around cyber crimes, digital signatures, intellectual property, data protection, and privacy. The Information Technology Act, 2000 was enacted in India to regulate e-commerce, cyber crimes, and other cyber activities.
3. Regulation of cyber space can occur through norms, law, architecture (technological design), or market forces. As online interactions increase, cyber law is important to balance individual privacy with organizations' interests while addressing new legal challenges of technology.
The document discusses the history and current status of the right to information in India. It notes that while India is one of the world's largest democracies, most state information lies with governing bodies rather than being publicly available. Several movements have advocated for internet access to be used to secure citizens' right to information. Examples are provided of how land records have been digitized, allowing farmers online access, and how certain programs enable citizens to access real-time government information via the internet or phones. While examples show the internet's potential, challenges remain due to lack of infrastructure and citizens' ability to utilize information and communication technologies.
1. Several copyright issues arise in cyberspace, including linking, framing, protection of content on websites, and international treaties. Deep linking and framing can undermine the rights of website owners if they divert traffic or create confusion between sites.
2. Software piracy, distribution of pirated software, and copying of code violate copyright. Databases containing raw data are also protected, as is the design and content of websites.
3. Determining what constitutes private versus public use of copyrighted material is challenging online. Reproduction that occurs during internet transmission may infringe on copyright depending on legal interpretation. Permission is advised when linking to or displaying copyrighted content from other sites.
This document discusses cyber law and cybercrime in India. It provides definitions of cybercrime from international organizations and Indian law. It notes that cybercrime spans national boundaries and discusses the need for international cooperation between law enforcement agencies. It also analyzes cybercrime statistics in India and discusses challenges in investigating and prosecuting cybercrimes like ensuring legally admissible digital evidence. It emphasizes the importance of training police and judiciary on technology issues to effectively address cybercrime.
This document discusses cyber law and ethics. It begins by explaining the need for cyber law due to the rise of cybercrimes like hacking, viruses, and online fraud as internet use has increased. It then discusses key concepts in cyber law like digital signatures, encryption, and the Information Technology Act of 2000 in India which provides legal recognition for e-commerce transactions. The document also covers cyber ethics, discussing ethical practices for computer users, professionals, businesses and information services. It emphasizes avoiding software piracy and unauthorized access. Intellectual property rights and concepts like copyright, fair use, and public domain works are also explained.
This document provides notes on the Law of Information Technology. It discusses key concepts like information technology, cybercrime, cybercrime mapping, and the roles of police under the IT Act 2000. It also explains theories around jurisdiction in cyberspace, including types of jurisdiction recognized in international law. The document notes objectives of the IT Act 2000 and aspects it covers, like electronic governance, electronic records, and various cyber offenses and their punishments. It concludes with explaining e-commerce and its legal aspects, including e-taxation and e-banking.
Cyber law deals with legal issues related to communications technology and the internet. It involves many areas of law due to the internet intersecting issues like intellectual property, privacy, and jurisdiction. Net neutrality, which affects internet infrastructure regulation, is an important aspect of cyber law. Jurisdiction and sovereignty are also major issues as a single online transaction can involve the laws of multiple countries. Free speech online raises questions about regulating speech through cyberspace.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
This document provides an overview of the Information Technology Act 2000 and amendments made in 2008 regarding penalties, offences, and case studies in India. It discusses the objectives and structure of the IT Act, defines cybercrime, and outlines various sections of the Act pertaining to offences and penalties. Several case studies are presented for sections 43, 65, 66, 66A, 66C, and 66D to illustrate the application of these legal provisions. The document aims to inform readers about the relevant provisions of the IT Act and how it has been applied in practice.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Thank you for the insightful discussion. Here are a few thoughts on balancing security and privacy:
- With new technologies come new challenges and opportunities. An open dialogue between all stakeholders is important to navigate these issues responsibly.
- Both security and privacy are important values, and reasonable people can disagree on where to draw the lines. There are good-faith arguments on multiple sides.
- Strong encryption and anonymity tools are critical for human rights defenders and dissidents in repressive regimes. However, they can also be misused to harm others or violate the law.
- Governments have a duty to protect citizens, but also have historically overreached in ways that erode trust and civil liberties. New policies should be narrowly targeted
The document discusses various legal issues related to rights and obligations in cyberspace. It is authored by Dr. Tabrez Ahmad and covers topics like digital revolution and its effect on management of rights, rights and duties in cyberspace, cyber trespass, privacy in cyberspace, cyber libel, cyber stalking, spamming, cybersquatting, data protection and identity theft. It provides an overview of these topics, relevant cases, legislations and the challenges in governing cyberspace. The document also discusses two schools of thought on regulation of cyberspace and the relationship between law and social change.
- The internet originated from ARPANET in the 1960s and used TCP/IP protocols to determine data transfer. Tim Berners-Lee developed the World Wide Web in the 1980s using HTML, URLs, and HTTP. HTML is the publishing language of the web and uses tags to structure and lay out web documents. HTTP transfers data openly while HTTPS adds encryption for security.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
E-governance, Issues Concerning Democracy, National Sovereignty, Personal
Freedom, Emerging Social Issues from Cyberspace, Digital Divide, Promotion of
Global Commons, Open Source Movement, Laws and Entities Governing
Cyberspace, Domestic Laws: Background of IT ACT – Part I, IT Act – Part II,
International Treaties, Conventions and Protocols Concerning Cyberspace,
Guidelines Issued by Various Ministries
Civil Liability on the Internet discusses the increasing harms caused by internet fraud, defective software, and failure to secure online data. It argues that traditional negligence principles can and should be applied to intermediaries like internet service providers and websites to allocate liability for cyber harms. However, successfully bringing a negligence claim is challenging due to issues like economic loss rules and safe harbors for intermediaries in laws like the Communications Decency Act. The common law will need to continue evolving to address unremedied online consumer injuries.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
This document discusses the evolving role of intermediaries on the internet and challenges of regulating their liability for user-generated content. It provides examples of early court cases that established intermediary liability principles and summarizes safe harbor provisions and other legislation that have sought to limit intermediary liability by implementing notice-and-takedown regimes and graduated response policies for copyright infringement. It also discusses ongoing legal cases and policy debates around intermediary liability and how countries are approaching regulation.
Cyber warfare and identity theft pose significant threats to privacy. International treaties and domestic laws like India's IT Act protect privacy to some degree but lack comprehensive data protection. The 2019 Personal Data Protection Bill aims to address this but remains pending. Strong cybersecurity practices like multi-factor authentication can help prevent privacy breaches and identity theft if implemented properly. Strengthening privacy protections would also support cybersecurity goals by promoting trust and responsible data use.
The document discusses human rights issues related to cyberspace and the internet. It covers the right to freedom of speech and expression online, the right to internet access, the right to privacy, and data protection laws in India. It also discusses some issues with law enforcement, including that existing laws may not keep up with the speed of the internet and resolving disputes can be difficult due to jurisdictional complexities.
This document discusses cyber law and cybercrime in India. It provides definitions of cybercrime from international organizations and Indian law. It notes that cybercrime spans national boundaries and discusses the need for international cooperation between law enforcement agencies. It also analyzes cybercrime statistics in India and discusses challenges in investigating and prosecuting cybercrimes like ensuring legally admissible digital evidence. It emphasizes the importance of training police and judiciary on technology issues to effectively address cybercrime.
This document discusses cyber law and ethics. It begins by explaining the need for cyber law due to the rise of cybercrimes like hacking, viruses, and online fraud as internet use has increased. It then discusses key concepts in cyber law like digital signatures, encryption, and the Information Technology Act of 2000 in India which provides legal recognition for e-commerce transactions. The document also covers cyber ethics, discussing ethical practices for computer users, professionals, businesses and information services. It emphasizes avoiding software piracy and unauthorized access. Intellectual property rights and concepts like copyright, fair use, and public domain works are also explained.
This document provides notes on the Law of Information Technology. It discusses key concepts like information technology, cybercrime, cybercrime mapping, and the roles of police under the IT Act 2000. It also explains theories around jurisdiction in cyberspace, including types of jurisdiction recognized in international law. The document notes objectives of the IT Act 2000 and aspects it covers, like electronic governance, electronic records, and various cyber offenses and their punishments. It concludes with explaining e-commerce and its legal aspects, including e-taxation and e-banking.
Cyber law deals with legal issues related to communications technology and the internet. It involves many areas of law due to the internet intersecting issues like intellectual property, privacy, and jurisdiction. Net neutrality, which affects internet infrastructure regulation, is an important aspect of cyber law. Jurisdiction and sovereignty are also major issues as a single online transaction can involve the laws of multiple countries. Free speech online raises questions about regulating speech through cyberspace.
The Internet has become closely associated with freedom of expression and the global economy. Today, it plays a direct or indirect role in almost every aspect of life. Yet many fear the Internet as we have come to know it is at risk, with restrictions forcing fragmentation along political, corporate, or cultural lines. Despite growing concerns about the future of the Internet, discussion surrounding online freedom remains largely mired in a handful of issues: the necessity and appropriateness of government surveillance in the United States, digital privacy in Europe, and censorship in authoritarian states such as China. However, between them, the United States, Europe, and China account for less than half of the world’s Internet users. For much of the rest of the world, any discussion of Internet freedom falls at the complex intersection of political and social liberties, nation-building, security threats, economic development, and resource constraints.
Asia’s biggest developing democracies - India, Indonesia, Bangladesh, the Philippines, and Thailand - account for a quarter of the world’s people, but only about one-tenth of the global online population. The policy decisions these states make going forward will be of considerable importance for the future of the Internet and offer some useful lessons about the limitations and vulnerabilities of the global Internet freedom agenda as it is currently being pursued by the United States and Europe.
From a survey of these countries’ experiences, six broad conclusions or principles can be drawn. First, the online world is an outgrowth of the offline world, rather than a distinct phenomenon. Internet policy cannot be considered in a vacuum, or divorced from other relevant aspects of public policy, such as security, economic policy, or governance. Second, laws, norms, and cultural attitudes related to Internet use vary widely, even among democracies. A one-size-fits-all approach to Internet freedom will not work and may even prove counterproductive. Third, online freedoms and greater security are not inherently at odds with one another in open societies. Discourse that presents a false choice between security and freedom is harmful for both, as well as for state legitimacy and economic growth.
Fourth, while much discussion of Internet freedom frames the issue as a conflict between governments, corporations, and civil society, each sector is divided on the merits of unfettered Internet freedom. Fifth, current legislation pertaining to the Internet in many democratic countries is deeply flawed, even in the context of their own constitutional rights pertaining to freedom of expression. By and large, Internet-related legislation is vague, making implementation arbitrary, and undermining public trust in state institutions. And sixth, users are often not adequately informed of the privileges and restrictions associated with Internet use in their native countries. Policies and initiat
(1) The Electronic Transactions Act was enacted to regulate electronic records and digital signatures by providing them legal validity and recognition.
(2) Key terms like electronic form, electronic record, digital signature, originator, addressee etc. are defined to have the same meaning when used in reference to electronic records as they would have in reference to physical documents.
(3) The act provides for legal recognition of electronic records and digital signatures by establishing them as valid alternatives to physical documents signed using handwritten signatures when prevailing law requires written, printed or signed records.
This document provides an overview of the Information Technology Act 2000 and amendments made in 2008 regarding penalties, offences, and case studies in India. It discusses the objectives and structure of the IT Act, defines cybercrime, and outlines various sections of the Act pertaining to offences and penalties. Several case studies are presented for sections 43, 65, 66, 66A, 66C, and 66D to illustrate the application of these legal provisions. The document aims to inform readers about the relevant provisions of the IT Act and how it has been applied in practice.
This document provides an introduction to cyber law. It discusses how the internet and technology have evolved over time to connect people to information and each other. It also notes some of the risks that have emerged with technology, such as cyber crimes. The document then defines cyberspace and discusses some key aspects of it, such as its lack of boundaries and potential for anonymity. It concludes by outlining some penalty provisions under cyber law for offenses related to unauthorized access and harming computers/networks.
Thank you for the insightful discussion. Here are a few thoughts on balancing security and privacy:
- With new technologies come new challenges and opportunities. An open dialogue between all stakeholders is important to navigate these issues responsibly.
- Both security and privacy are important values, and reasonable people can disagree on where to draw the lines. There are good-faith arguments on multiple sides.
- Strong encryption and anonymity tools are critical for human rights defenders and dissidents in repressive regimes. However, they can also be misused to harm others or violate the law.
- Governments have a duty to protect citizens, but also have historically overreached in ways that erode trust and civil liberties. New policies should be narrowly targeted
The document discusses various legal issues related to rights and obligations in cyberspace. It is authored by Dr. Tabrez Ahmad and covers topics like digital revolution and its effect on management of rights, rights and duties in cyberspace, cyber trespass, privacy in cyberspace, cyber libel, cyber stalking, spamming, cybersquatting, data protection and identity theft. It provides an overview of these topics, relevant cases, legislations and the challenges in governing cyberspace. The document also discusses two schools of thought on regulation of cyberspace and the relationship between law and social change.
- The internet originated from ARPANET in the 1960s and used TCP/IP protocols to determine data transfer. Tim Berners-Lee developed the World Wide Web in the 1980s using HTML, URLs, and HTTP. HTML is the publishing language of the web and uses tags to structure and lay out web documents. HTTP transfers data openly while HTTPS adds encryption for security.
Cyber law governs all legal aspects of the internet and cybersecurity. As internet usage has increased globally for activities like business, banking, and social interaction, it has also been misused for criminal activities, necessitating cyber laws. If someone becomes a victim of a cybercrime, they should preserve electronic evidence and report the breach to authorities. However, victims still have a legal duty to exercise due diligence. Challenges include criminals operating across international borders where different laws apply. While no international cyber laws exist, some countries have bilateral agreements, and national laws vary in their scope and coverage of issues like privacy and infrastructure protection. Companies should inform customers of breaches and advise them on appropriate steps.
Cyber crime a potential threat and remediesIJARIIT
Cybercrime is an illegal activity performed by an individual or by a group of experts in computer technology using
the Internet. It ranges from stealing money online from an individual to big corporate using the internet. In the present era of
information technology, the computer has made the life easy. People use computer or mobile to perform various jobs on the
Internet. So it is necessary to know how to perform various transactions on the internet safely. Everyone is prone to the attack
from the cyber criminals. One must be aware and should have knowledge of cybercrime.
E-governance, Issues Concerning Democracy, National Sovereignty, Personal
Freedom, Emerging Social Issues from Cyberspace, Digital Divide, Promotion of
Global Commons, Open Source Movement, Laws and Entities Governing
Cyberspace, Domestic Laws: Background of IT ACT – Part I, IT Act – Part II,
International Treaties, Conventions and Protocols Concerning Cyberspace,
Guidelines Issued by Various Ministries
Civil Liability on the Internet discusses the increasing harms caused by internet fraud, defective software, and failure to secure online data. It argues that traditional negligence principles can and should be applied to intermediaries like internet service providers and websites to allocate liability for cyber harms. However, successfully bringing a negligence claim is challenging due to issues like economic loss rules and safe harbors for intermediaries in laws like the Communications Decency Act. The common law will need to continue evolving to address unremedied online consumer injuries.
Navigating Indonesia's Information HighwayICT Watch
This document provides an overview of internet freedom standards and issues related to regulating online content in Indonesia. It discusses how Indonesia has made progress on freedom of expression since 1998 but also increased attempts to crack down on internet freedoms. Laws around pornography, defamation, blasphemy and a pending cybercrime bill threaten online speech. The report examines internet filtering, access issues, and recommends legal reforms to bring laws in line with international standards on freedom of expression.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
This document provides an overview and introduction to cyber laws in India, specifically the Information Technology Act 2000. Some key points:
- The IT Act was passed in 2000 and aimed to provide legal recognition for electronic records and transactions to facilitate e-commerce. It amended several other acts related to evidence and records.
- A major amendment was made in 2008 to address criticisms and keep up with technological changes. It focused on data privacy, information security, and added new cyber crimes like child pornography.
- The document discusses some notable Indian cases where sections of the IT Act like Section 66A were used, sometimes controversially, to arrest individuals for online speech or dissent.
- Other acts amended by the IT Act
This document discusses the evolving role of intermediaries on the internet and challenges of regulating their liability for user-generated content. It provides examples of early court cases that established intermediary liability principles and summarizes safe harbor provisions and other legislation that have sought to limit intermediary liability by implementing notice-and-takedown regimes and graduated response policies for copyright infringement. It also discusses ongoing legal cases and policy debates around intermediary liability and how countries are approaching regulation.
Cyber warfare and identity theft pose significant threats to privacy. International treaties and domestic laws like India's IT Act protect privacy to some degree but lack comprehensive data protection. The 2019 Personal Data Protection Bill aims to address this but remains pending. Strong cybersecurity practices like multi-factor authentication can help prevent privacy breaches and identity theft if implemented properly. Strengthening privacy protections would also support cybersecurity goals by promoting trust and responsible data use.
The document discusses human rights issues related to cyberspace and the internet. It covers the right to freedom of speech and expression online, the right to internet access, the right to privacy, and data protection laws in India. It also discusses some issues with law enforcement, including that existing laws may not keep up with the speed of the internet and resolving disputes can be difficult due to jurisdictional complexities.
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
Waihiga is a serial social entrepreneur, accredited digital journalist, and communications expert working to tackle poverty in Africa through social enterprises and stories. They have extensive experience running both online and offline campaigns around issues like ending police brutality, advocating for digital rights, and challenging internet shutdowns in countries like Nigeria, Sudan, and Zambia. The document provides an overview of Waihiga's background and campaigns and outlines some of the key issues, actors, and trends related to internet governance and digital rights in Africa.
Internet Privacy Essay
Internet Privacy Essays
Internet Privacy
Essay On Internet Privacy
Internet and Personal Privacy Essay
Essay on Internet Privacy
Internet Privacy Essay
Internet Privacy.
Internet Privacy Essay
Internet Privacy Analysis
The document discusses key concepts related to the internet ecosystem. It defines the internet as a global system of interconnected computer networks using TCP/IP. The internet ecosystem refers to the organizations and communities that help the internet work and evolve. Internet governance involves managing the internet through multistakeholderism and diversity. The Charter of Human Rights and Principles for the Internet establishes 10 principles for rights online including universality, privacy, and network equality. ICANN is introduced as the organization responsible for coordinating the internet's domain name system and IP addresses through a multistakeholder approach.
PRIVACY RIGHTS ARE HUMAN RIGHTS (2).pdflinda gichohi
This is an article/blog on the Privacy Symposium Africa 2022 on Privacy Rights and Digital rights as Human Rights. It also talks about Online Gender Based Violence , this is gender based violence that manifests in the Digital Space and Online world ie; phishing, non-consensual sharing, harrassment. This article explains why Privacy rights are essential in the modern world.
iSPIRT’s Response- White Paper on Data Protection Framework for IndiaProductNation/iSPIRT
It is widely known that the amount of data generated daily worldwide is rising at an incredibly exponential rate. Yet, what remains shrouded is how this data, particularly those data types concerning or generated by us, as individuals, are being used and stored by both the public and private sector. As we move into a data-driven world, it is crucial that the laws developed around Data center on the premise of both empowering and protecting the individual. In fact, the main purpose of the 4th layer of India Stack, the “consent layer”, is just this: to provide for a set of tools and utilities, as part of the Data Empowerment and Protection Architecture (DEPA), that empower citizens to assert control over their data.
The Justice Srikrishna led committee of experts has released a White Paper articulating their provisional thoughts on the Data Protection Framework, and are seeking public comments on the subject. iSPIRT has submitted a formal response to the White Paper. You can also read the blog post lays out our current views regarding Data Protection here: http://pn.ispirt.in/india-in-a-digital-world/
The document discusses the debate around privacy vs convenience with Internet of Things (IoT) technology. It notes that while IoT provides increased connectivity and efficiency, it also raises privacy concerns as more personal data is collected. The document explores issues like identity management, data usage and ownership, and calls for balancing privacy and convenience. It provides examples of approaches like self-sovereign identity that could allow more individual control over personal data and addresses both sides of the important debate around privacy and convenience with emerging technologies.
Role of right to information act 2005 in the human developmentAlexander Decker
This document summarizes the role of the Right to Information Act 2005 in human development in India. It discusses how the right to information empowers citizens and fosters accountability and transparency, strengthening democracy. It traces the history of freedom of information laws globally and in India. It describes how the Indian judiciary has recognized the right to information as part of free speech protections in the constitution. It also outlines some reasonable restrictions on the right to information related to issues like national security, privacy, and confidential sources. Overall, the document analyzes how the Right to Information Act supports human development in India by promoting an informed citizenry and accountable governance.
The document discusses issues around internet censorship including the controversies surrounding censorship and differing views on whether restricting certain materials benefits society or limits freedom of expression. It also outlines the mission of the Global Network Initiative to respect freedom of expression and privacy through frameworks to ensure accountability of internet and communication technology companies. The debate around internet censorship and what role, if any, governments should play in regulating online content remains ongoing.
SAFEnet is a network of digital rights defenders in Southeast Asia established in 2013 in response to criminalization of online expression in Indonesia. SAFEnet initially focused on advocacy for freedom of expression online but has expanded to other digital rights issues. SAFEnet's 2020 report found that Indonesia has entered stage one of "digital authoritarianism" as technological oppression like internet shutdowns undermine freedoms of expression and assembly. The report identifies challenges including online censorship, problematic internet regulations, and mass surveillance. Draconian laws in Indonesia have led to undemocratic situations as cases involving activists, journalists and academics charged under the country's IET Law have increased in recent years.
Cyber law deals with legal issues related to the internet, computers, and technology. It aims to prevent cybercrimes like hacking and protect privacy and intellectual property online. Laws regulating cyber activities vary by jurisdiction and can be challenging to enforce. The Information Technology Act of 2000 in India recognizes electronic transactions and digital signatures to facilitate e-governance and commerce while also addressing cybercrime. It was later amended in 2008 to address new issues and security concerns as technology advanced.
The house believes that internet acces is a human rightAgustina
The document discusses whether teachers should be allowed to interact with students via social networking websites. The affirmative side argues that such interaction is ineffective and may discourage direct communication between teachers and students. It could also potentially lead to cybercrime, decreased sensitivity, health issues like maag disease, and laziness in students. The negative side counters that social media allows teachers to know students better and understand any problems they may be facing. It also helps teachers to communicate with students outside of school hours.
Government as a platform: engaging the public with social mediaPatrick McCormick
The document discusses the use of social media by governments to engage with the public. It outlines how citizens' expectations are changing with new technologies and the internet, requiring governments to also change how they operate. Governments need to embrace new tools and become more transparent, collaborative platforms to build trust with the public. The presentation provides examples from the government of Victoria, Australia of how social media is being used for emergency response, public engagement and improving access to government services and information.
Debasis Pandit, a student, was arrested for hacking into eBay India's website and stealing credit card information from over 700 users. Pandit used XSS scripting to access customers' payment details and purchase goods, which were delivered to an accomplice. Pandit and the accomplice were charged under sections of the Indian Penal Code and Information Technology Act for offenses including cheating, dishonestly inducing delivery of property, and sending information to harm a computer system. Cybercrime greatly impacts individuals, businesses, and national security. Increased public awareness, police training, cyber cells, and international cooperation are needed to effectively combat cybercrime.
Freedom of Expression our Internet Rights and Principle by Shreedeep Rayamajh...Shreedeep Rayamajhi
Freedom of Expression our Internet Rights and Principle is a presentation on interpretation, practice and understand ability. Asia is a growing economy the interpretation and practice is very much independent and unique as per country and location.
Here in this presentation we have tried to highlight some of the basic concept of FoE, Internet rights and principle
This presentation was presented in Sri Lankan IGF2016
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
The document discusses how digital technologies are transforming behaviors and raising citizen expectations of government services. It notes that Australians now spend significant time online and use various digital services. This has led to changing expectations where citizens want essential, discretionary, and participatory services from government. The document argues that governments need to adopt a more open, collaborative and user-centered approach to meet these rising expectations, including through the use of social media, open data, and new digital identity systems that give citizens more control over their personal information.
This document discusses cyber jurisdiction in India. It begins with an introduction to cyber jurisdiction and defines cyber crimes. It then provides background on the history and development of cyber law in India, including the passage of the Information Technology Act of 2000. The document discusses the key issues around jurisdiction of cyber crimes, as the internet has no boundaries. It notes that the IT Act provides for extraterritorial jurisdiction over cyber crimes impacting India or involving Indian computers. However, the boundaryless nature of the internet still poses challenges to jurisdiction. The document aims to understand the position of cyber jurisdiction in India.
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
Similar to Internet Rights are Human Rights Case Booklet (20)
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".Christina Parmionova
The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
DI SEGUITO SONO PUBBLICATI, AI SENSI DELL'ART. 11 DELLA LEGGE N. 3/2019, GLI IMPORTI RICEVUTI DALL'ENTRATA IN VIGORE DELLA SUDDETTA NORMA (31/01/2019) E FINO AL MESE SOLARE ANTECEDENTE QUELLO DELLA PUBBLICAZIONE SUL PRESENTE SITO
This report explores the significance of border towns and spaces for strengthening responses to young people on the move. In particular it explores the linkages of young people to local service centres with the aim of further developing service, protection, and support strategies for migrant children in border areas across the region. The report is based on a small-scale fieldwork study in the border towns of Chipata and Katete in Zambia conducted in July 2023. Border towns and spaces provide a rich source of information about issues related to the informal or irregular movement of young people across borders, including smuggling and trafficking. They can help build a picture of the nature and scope of the type of movement young migrants undertake and also the forms of protection available to them. Border towns and spaces also provide a lens through which we can better understand the vulnerabilities of young people on the move and, critically, the strategies they use to navigate challenges and access support.
The findings in this report highlight some of the key factors shaping the experiences and vulnerabilities of young people on the move – particularly their proximity to border spaces and how this affects the risks that they face. The report describes strategies that young people on the move employ to remain below the radar of visibility to state and non-state actors due to fear of arrest, detention, and deportation while also trying to keep themselves safe and access support in border towns. These strategies of (in)visibility provide a way to protect themselves yet at the same time also heighten some of the risks young people face as their vulnerabilities are not always recognised by those who could offer support.
In this report we show that the realities and challenges of life and migration in this region and in Zambia need to be better understood for support to be strengthened and tuned to meet the specific needs of young people on the move. This includes understanding the role of state and non-state stakeholders, the impact of laws and policies and, critically, the experiences of the young people themselves. We provide recommendations for immediate action, recommendations for programming to support young people on the move in the two towns that would reduce risk for young people in this area, and recommendations for longer term policy advocacy.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Food safety, prepare for the unexpected - So what can be done in order to be ready to address food safety, food Consumers, food producers and manufacturers, food transporters, food businesses, food retailers can ...
World Food Safety Day 2024- Communication-toolkit.
Internet Rights are Human Rights Case Booklet
1.
2. Internet Rights are Human Rights
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
You can modify and build upon this document non-commercially, as long as you give
credit to the original authors and license your new creation under the identical terms.
Contributing Authors: Rajat Kumar & Niki A. Shah
Martus Cases Compiled by Bijo P. Abraham
Design & Layout: Ravi KumarYadav
Contact:
Digital Empowerment Foundation
House No. 44, 2nd & 3rd Floor (Next to Naraina IIT Academy)
Kalu Sarai, (Near IIT Flyover), New Delhi – 110016
Tel: 91-11-26532786 / Fax: 91-11-26532787
Email: def@defindia.net | URL: www.defindia.org
Published & Printed by
INOMY Media Pvt. Ltd.
APC is an international network and non-profit organisation that wants everyone to have access to a
free and open internet to improve our lives and create a more just world.
Supported by the European Union under the Instrument for Democracy and Human Rights (EIDHR)
DEF is a not-for-profit organization with an aim to find solutions to bridge the digital divide with
Information Communication andTechnology.
5. Contents
Deconstructing Internet Rights Human Rights (IRHR)
Deconstructing Freedom of Expression (FoE) online
Exploring Freedom of Expression
CASES
Theme 1: Human Right, ICTs andThe Internet
Scenario 1 – Regulation of content by the Government of India on Google,
Facebook,Twitter and other platforms
Additional information
Questions for Discussion
Scenario 2 – Blocking based on obscenity
Additional information
Questions for Discussion
Scenario 3 – Government orders ISPs to block 32 websites
Additional information
Questions for Discussion
Selected Cases from Martus
Mapping the Legal Framework
Theme 2: Freedom of Expression and Freedom of Information
Scenario 1 – Online debates about the PK Movie
Additional information
Questions for Discussion
Scenario 2 – Right to Information and Open Data Initiative India
Additional Information
Questions for Discussion
Scenario 3 –Testing the restrictions to free online speech in India
Additional information
Questions for Discussion
7
8
9
10
12
14
16
18
19
20
21
6. Scenario 4 – Cyber Bullying –The case of Kavita Krishnan
Additional information
Questions for Discussion
Selected Cases from Martus
Mapping the Legal Framework
Theme 3: RightTo Privacy
Scenario 1 – India’s Central Monitoring System
Additional information
Questions for Discussion
Scenario 2 – Real Name Registration and Data Retention in Cyber Cafes
Additional information
Questions for Discussion
Selected Cases from Martus
Mapping the Legal Framework
Theme 4: Freedom of Association and Freedom of Assembly
Scenario 1 –The Pink Chaddi Campaign
Additional information
Questions for Discussion
Scenario 2 – Savetheinternet.in –The Battle for Net Neutrality in India
Additional information
Questions for Discussion
Scenario 3 – Anonymous #OpIndia… Engaged!
Additional Information
Questions for Discussion
Selected Cases from Martus
Mapping the Legal Framework
23
25
27
28
29
30
31
33
35
36
37
38
7. Internet Rights Are Human Rights 7
Objective:
To make people aware that FoE online is a basic human right
1. Group exercise to set a context and deconstruct IRHR-Venn Diagram
Conceptsto be introduced
Freedom of Expression – Article 19
Right to Life and Personal Liberty – Article 21
a. What does the internet mean to you? (Purposes, benefits, negative implications/effects)
b. What are rights?
c. What are human rights?
d. What do you think is the prerequisite for people to access their rights?
e. Do these rights apply online
2. Discussion about the concept of IRHR and FoE
3. Materials needed
a. Prints of cases to be discussed
b. Chart Paper for group activities – contingent on number of learners
c. A4 sheets for notes and miscellaneous requirements
How do human rights interact online?
Deconstructing Internet Rights
Human Rights (IRHR)
What are
human
rights?
What are
rights?
What is the
Internet?
8. Internet Rights Are Human Rights8
Objective:
Garner thoughts/views about FoE online
Explain the concept of FoE
A. Accessing information and schemes, entertainment, education, career or jobs
related rights
Do you think that you or we have the right to express ourselves online?
What does the word “freedom” mean to you?
What does the word “expression” mean to you?
What are personal things we communicate or express online about?
What are public things we communicate or express online about?
B. International Human Rights Instruments
International Covenant on Civil and Political Rights
Universal Declaration on Human Rights
Resolution 20/8 on Promotion, Protection and Enjoyment of Human Rights on the Internet
C. FoE Rights in India
• The Constitution of India 1949
Article 19W(1) of The Constitution of India 1949
Article 19(2) reasonable restrictions under The Constitution of India 1949
Article 21:
Article 25: Freedom of Religion
• Indian Penal Code 1860
Section 124A
Section 153
Section 295A
Section 500
• IndianTelegraph Act 1885
Section 5
• InformationTechnology Act (IT Act)
Deconstructing Freedom of Expression
(foE) online
9. Internet Rights Are Human Rights 9
Group Exercise
Questions to be answered
What is expression?
What is Freedom of expression (FoE)
What is FoE offline?
What is FoE online?
Conceptsto be introduced
Article 19 (1) of the Constitution of India – in detail
A/HRC/RES/12/16 – Freedom of Expression according to the UN Human Rights Council
Resolution 20/8 on Promotion, Protection and Enjoyment of Human Rights on the Internet
Article 19 (2) of the Constitution of India – in detail
Group Discussion
Questions to be answered
Does the individual have personal responsibility viz Article 19 (1) and A/HRC/RES/12/16 and
A/HRC/RES/20/8 ?
Discuss why/ why not
Exploring Freedom of Expression
10. Internet Rights Are Human Rights10
Scenario 1
Regulation of content bythe Government
of India on Google, Facebook,Twitter and
other platforms
Section 69A of the InformationTechnology Act (IT Act) 2011, gives the Central Government the
power to issue orders to intermediaries to block information for public access when it deems
it necessary in the interest of national security, sovereignty and integrity; to maintain friendly
relations with foreign states or public order, or to prevent “incitement to the commission of
any cognizable offence”.
The InformationTechnology (Intermediaries Guidelines) Rules, 2011 places the responsibility
on these intermediaries to inform users not to host, display, upload, modify, publish, transmit,
update or share any information” that:
Infringes upon personal privacy of the users
Harms minors
Content that is grossly offensive, defamatory, obscene, libelous, hateful, or racially or ethnically objec-
tionable;
Relates to money laundering
Infringes upon patent, copyright, trademark or other proprietary rights
Threatens national security or integrity of India
Contains viruses, files or codes that has the potential to harm computers and systems
Intermediaries like Facebook,Twitter and Google have argued that since they deal with
large amounts of content and data; any move towards monitoring content and data by the
intermediaries themselves would be extremely difficult and unsustainable.
Section 79 of the IT Act places certain exemptions through which intermediaries would not
be liable for any content that contravenes the provisions in Section 69A and the Intermediary
Guidelines.These exemptions provide respite for intermediaries against liability on content on
their websites.
Theme 1: Human Right, ICTs andThe Internet
11. Internet Rights Are Human Rights 11
However, these exemptions are deemed void in case an intermediary is shown to have any
part to play in;
a) Ownership – initiating the transmission (of infringing content),
b) Select the receiver of the transmission and
c) Editorial acts – (selecting or modifying information in the transmission)
The Indian Government sends take down/ removal requests to intermediaries. Google,
Facebook andTwitter publish transparency reports that deal with the number of removal
requests.
The numbers of content blocking/ removal requests received by the three biggest
intermediaries are:
Removal Requests Received (for the period of July – December 2013)
Intermediary Name Details
Google 154 requests (540 items)
Facebook 4765 items
Twitter 8 items
Additional information
http://indiankanoon.org/doc/1965344/
http://www.google.com/transparencyreport/removals/government/IN/?hl=en.
https://transparency.twitter.com/removal-requests/2014/jul-dec
https://govtrequests.facebook.com/country/India/2013-H2/
Questions for Discussion
1. In your opinion, can the removal of content by intermediaries at the request of the
government be rationalised in light of the tenets of human rights as laid down in the
Constitution of India and the UDHR the ICCPR?
2. Given the evolution of the internet in India and the rising number of internet users; will the
Indian government be able to continue with the practice of takedown/removal notices?
12. Internet Rights Are Human Rights12
Scenario 2
Blocking based on obscenity
Pornography in India has a rocky relationship with the legal framework. Section 292 of the
Indian Penal Code (IPC) prohibits the production and distribution of any material that is
deemed obscene. Sections 67 and 67A of the InformationTechnology Act, 2000 (IT Act) extend
the provisions of Section 292 of the IPC to electronic forms of production and distribution.
The Protection of Children From Sexual Offences Act (2012) heavily penalises the production,
distribution and viewership of child pornography.
Further, the Indecent Representation Of Women (Prohibition) Act, 1986 (IRWPA) prohibits the
production and distribution of material, where women are depicted in an indecent manner.
The IRWPA defines indecent as “depiction in any manner of the figure of a woman; her form or
body or any part thereof in such way as to have the effect of being indecent, or derogatory to,
or denigrating women, or is likely to deprave, corrupt or injure the public morality or morals”.
Despite all these laws, there is no law that makes the watching of pornography in private
illegal.
However, in 2009, the Department ofTelecommunications (DoT) blocked the online
pornographic cartoon-strip, Savita Bhabi. In 2013, the DoT sent a circular to internet service
providers (ISPs) in India with a list of 39 websites that contained pornographic content, with
orders to block the sites listed.The ISPs followed the orders and promptly blocked access to the
websites.
In 2014,The Cyber Regulation Advisory Committee invited the Internet and Mobile Association
of India (IAMAI) to create a list of porn sites from various sources and turn this list over to the
Department of Electronics and InformationTechnology (DeITy), who would then move forward
on blocking them.
Additional information
http://indiankanoon.org/doc/1704109/
http://indiankanoon.org/doc/1318767/
http://www.lawzonline.com/bareacts/information-technology-act/section67A-information-
technology-act.htm
http://wcd.nic.in/childact/childprotection31072012.pdf
http://wcd.nic.in/irwp.htm
http://www.cuttingthechai.com/2011/02/4828/savita-bhabhi-blocked-again-in-india-also-
typepad-and-mobango/
http://archives.scroll.in/article/703746/blocking-online-porn-who-should-make-constitutional-
decisions-about-freedom-of-speech
http://www.gizbot.com/tech-biz/indian-government-bans-32-porn-websites-012726.html
13. Internet Rights Are Human Rights 13
Questions for Discussion
1. Given the information on the legality of pornography, do you think the government was
right in ordering ISPs to block the websites?
2. Do you believe that the blocking of these sites affected legitimate expression on the
internet?
3. Do you think that blocking is an effective deterrent to accessing pornographic content?
14. Internet Rights Are Human Rights14
Scenario 3
Government orders ISPsto block 32 websites
In mid-December 2014, the Government of India, through the Department of
Telecommunications (DoT) sent a circular to ISPs ordering the blocking of 32 websites. A detail
of some major websites and the traffic generated from India is below:
The Government of India later revealed that the websites were blocked because they contained
information and recruitment propaganda from the extremist terrorist group Islamic State of
Iraq and the Levant (ISIS/ISIL). Additionally, they contained posts from certain people who were
arrested by the police in connection to activities of ISIS.
While certain URLs in the circular were to specific webpages, most of the URLs listed were of
entire websites.This was seen as an extreme measure undertaken by the government.
Historically, in cases of website blocking, the government does not release the reasons behind
the block. However, in this situation, a representative of the ruling political party (BJP) tweeted:
“The websites that have been blocked were based on an advisory by Anti-Terrorism Squad,
and were carrying Anti India content from ISIS.The sites that have removed objectionable
content and/or cooperated with the on-going investigations, are being unblocked.”
On the 31st of December, the Ministry of Communications InformationTechnology released
a press release stating that they had contacted the administrators of the websites in the table
above and the admins has instituted measures to block propaganda information from their
websites.
Subject to this move by the website administrators, the government issued notices to unblock
the sites.
Major websites block in DoT Circular in December 2014
Website (Type) Global Rank on Alexa.com Traffic Generated from
India (Percentage)
Dailymotion.com (Video) 86 10.4%
Vimeo.com (Video) 170 5%
Github.com (Code Sharing) 97 15.7%
Weebly.com (Web Hosting) 263 17.3%
15. Internet Rights Are Human Rights 15
Additional information
https://www.techdirt.com/articles/20141231/02075529554/indian-government-or-
ders-32-web-sites-blocked-including-github-archiveorg-pastebin-dailymotion-vimeo.shtml
http://thenextweb.com/in/2014/12/31/vimeo-github-30-sites-blocked-india-content-isis/
https://i.imgur.com/81vaZbP.png - Circular ordering the block
http://pib.nic.in/newsite/mbErel.aspx?relid=114259
Questions for Discussion
1. Do you think the blanket banning of websites was an effective way of dealing with the
infringing content?
2. Is the Government’s silence on the reasons for blocking a website acceptable?
3. Was the blocking of websites a proportionate response?
16. Internet Rights Are Human Rights16
Selected Cases from Martus
Blocking Websites
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: India
Key Words: Website, Webpage, Blocking, Islamic State for Iraq and Syria,
Social Media, Religious Intolerance, InformationTechnology
Date of Event: July26th 2015
Date Created: July 31st, 2015
Summary ofthe Incident:
Government has ordered the blocking of at least 40 web pages with inflammatory content
relating to a minority community including posts on social media and popular video sharing
platforms.
Statingthe Problem:
Internet is the prime source for the terror groups to incite religious intolerance among people.
The Government of India has ordered the blocking of 40 websites which share inflammatory
content relating to a minority community, including posts on social media and popular
video sharing platforms.The Government issued the order under the InformationTechnology
(Procedure and Safeguards for Blocking Access of Information by Public) Rules 2009.
The order came on 29th June 2015 was issued to all internet service providers who have
complied with the order.The DoT issued another order on July 8th directing the ISPs to
block the social media accounts and posts as well as videos posted on popular video sharing
platforms, which were found to be covering content aimed at provoking a particular minority
community in the neighbouring country, Myanmar.
The websites purportedly contained material about an alleged ISIS member, who was arrested
by NIA, and three other suspected to be associated with other terror groups.The website was
being used to recruit Indian youth to join ISIS and for spreading news about purported death of
certain persons while fighting Allied Forces in counties like Afghanistan and Iraq
QUESTIONS FOR DISCUSSION:
1. Is using the internet to incite religious intolerance protected by the freedom of expression?
2. What. in your view, is the proper response by the government to this situation?
Source: http://timesofindia.indiatimes.com/tech/tech-news/Government-orders-ISPs-to-block-
websites-with-inflammatory-content/articleshow/48223714.cms
17. Internet Rights Are Human Rights 17
Porn Ban In India
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: India
Key Words: Website, Webpage, Blocking, Porn, Right to liberty
Date of Event: Aug 3rd 2015
Date Created: Aug 12th, 2015
Summary ofthe Incident:
The India government has banned access to 857 porn sites.
Statingthe Problem:
The Department of Electronics and InformationTechnology has asked the Department of
Telecom to notify internet service providers to block access to 857 URLs, under the provision
of Section 73(3)(b) of the InformationTechnology Act.They claim that the content on these
websites relate to a breach of morality decency as given in Article 19(2) of the Constitution
of India.The ban takes place after the Supreme Court refused to order a ban on pornographic
websites saying such an order would intrude upon fundamental freedoms. However, after
criticism from all parts of the country, the Government has partially revoked the order to block
these pornographic websites.The government has ordered internet service providers to shut
down sites that promote child pornography.
QUESTIONS FOR DISCUSSION:
1. What rights are at stake in this case?
2. What is the proper response by the government to protect personal liberty and prevent the
objectifications of women?
Source: http://indiatoday.intoday.in/story/its-official-government-has-banned-these-857-porn-
sites/1/455899.html
19. Internet Rights Are Human Rights 19
Scenario 1
Online debates aboutthe PK Movie
PK, a satirical science fiction comedy film was released in Indian in December, 2014.
Promotional material released before the commercial release of the film showed the lead
actor posing almost nude with a radio covering his genitals.This poster created a furore online
as well as offline. A Writ Petition filed in the Supreme Court of India demanded blocking the
release of the film.This petition was dismissed by the Court.
After its release, this debate was fuelled by what some Hindu nationalist organisations being
enflamed by content that they felt was against their religious sentiments. A Public Interest
Litigation (PIL) was filed in the Delhi High Court sought blocking the exhibition of the film on
these grounds. While this PIL was rejected by the Court, the online debate raged.
Spokespersons for various Hindu nationalist organisations and other private individuals raised
questions about the financing of the film, BJP spokesperson Subramanian Swamy tweeted
“Who financed the PK film? According to my sources it is traceable to Dubai and ISI. DRI must
investigate”
Additional information
http://lobis.nic.in/rtidhc/RSE/judgement/12-01-2015/RSE07012015CW1122015.pdf
https://twitter.com/swamy39/status/549500620118319104
http://www.thehindu.com/news/national/bajrang-dal-members-vandalise-theatres-screening-
pk-in-ahmedabad/article6735632.ece
http://www.thehindu.com/news/national/bajrang-dal-members-vandalise-theatres-screening-
pk-in-ahmedabad/article6735632.ece
http://www.dailymail.co.uk/indiahome/indianews/article-2725459/Let-art-remain-art-SC-judge-
refuses-ban-film-based-vulgar-nudity.html
Questions for Discussion
1. Do you think that the poster for PK was offensive enough to deem banning the film?
2. Do you believe that a discussion online can allow for a similar breadth of conversation as those
offline?
3. Do you believe that the tweet posted by the BJP leader was ethical? Why/ why not?
Theme 2: Freedom of expression and
Freedom of Information
20. Internet Rights Are Human Rights20
Scenario 2
Rightto Information and Open Data
Initiative India
The Indian Government passed the Right to Information Act in 2005 with the aim to provide an
avenue for citizens to access information about government departments and agencies. It also
provides a mandate to government bodies to be proactive about disclosing certain information.
The RTI Act, 2005 has had its fair share of supporters and detractors. Its overall impact still
remains a matter for considerable debate.
The National Data Sharing and Accessibility Policy was approved by the Government in early
2012 to encourage and govern the publication of government created and owned datasets,
from various organisations, in open data formats and accessible through a single portal.
The Open Government Data Platform of India was launched later that year to collect and
publish government data.The Portal has also rich mechanism for citizen engagement. Besides
enabling citizens to express their need for specific datasets or APPs, it also allows them to rate
the quality of datasets, seek clarification or information from respective data controller.
In addition, to support wider reach and dissemination of datasets, anyone can share the
information about any dataset published on the portal with his/her social media pages on a
press of a click.
Several innovative and useful apps across platforms and devices ranging from Mobile/Tablet,
SMS to Voice-based applications using Open Government Data have been created which help
the government serve its citizens better.Therefore, we see the advent of innovation building
in India using government data through various types of APPs, mash-ups, info-graphics,
visualizations and even services.
Additional Information
https://data.gov.in/sites/default/files/brochure.pdf
http://www.opendataresearch.org/sites/default/files/publications/sumandro_oddc_
project_report_0.pdf
http://www.unece.org/fileadmin/DAM/stats/documents/ece/ces/ge.50/2014/Topic_3_India.
pdf
https://data.gov.in
Questions for Discussion
1. Do you believe proactive information and data disclosure mechanisms are a good
direction for the government to be taking?
2. What information would you access from such a platform?
3. Do you think this platform has a positive impact on transparency and accountability of
government bodies?
21. Internet Rights Are Human Rights 21
Scenario 3
Testingthe restrictionsto free online
speech in India
Section 66A of the InformationTechnology Act (IT Act) 2000 (Amend. 2008), establishes
the punishment for sending offensive messages through any communication service.The
particulars that this specific provision highlights in subsection (a) are about information
that is “grossly offensive” or has a “menacing character”.Then it goes on in sub section (b)
to include information that causes “annoyance, inconvenience, danger, obstruction, insult,
injury, criminal intimidation, enmity, hatred, or ill will”. Broadly, it brings under its jurisdiction
all kind of digital activity including (but not exhaustive of) status updates, tweets, wall posts,
group messages, emails and picture shares across any online platform and using any kind of
communication device. When created it was looked at like a game changer in the domain of
Internet communication and content regulation about individuals, associations, companies
and the Government at large. However, it turns out that it was never used like it was supposed
to. Within four years, the first PIL against this law was filed and it was demanded that such a
provision be abolished.
This jurisdiction in the times of WhatsApp did not lose its stand when Sayed Waqar, an MBA
student from Bhatkal, Karnataka was arrested based on a complaint by JayantTinaikar against
an image he received that showed BJP leaders LK Advani, Rajnath Singh, Sushma Swaraj,
Baba Ramdev, Maneka Gandhi, Varun Gandhi and others attending the final rites of Narendra
Modi.This picture was captioned ‘Na Jeet Paye Jhooton Ka Sardar — Ab Ki Baar Antim Sanskar
(A false leader will never win, this time it’s final rites)’. Even Sayed’s roommates were brought
in for questioning but were released the same day.The case never saw trial because Sayed was
Table 1: Incidents of Section 66A ofThe IT Act, 2000
November 2011: Manoj Oswal - for
allegedly having caused ‘inconvenience’ to
relatives of Nationalist Congress Party chief
Sharad Pawar for allegations made on his
website. Section 500 of (Defamation), Indian
Penal Code, 1860 also used.
April 2012: University Professor Ambikesh
Mahapatra arrested for a political cartoon
about West Bengal Chief Minister Mamata
Banerjee.
November 2012: Two girls arrested over
a comment questioning the total shutdown
in the city for a political leader’s death.
Section 295A, IPC also used.
March 2015: Vicky Khan was arrested for
sharing a critical post about senior minister
Azam Khan of Samajwadi Party
22. Internet Rights Are Human Rights22
found not to be the originator. Roughly, around 18 arrests were made during the general
election for circulating Anti-Modi digital content. However, the constitutionality of such
arrests in terms of equality and fairness is questionable.
Finally in 2015, by means of a doctrine in law, as a result of the PIL in 2012, Section 66A
has been shadowed totally. Shocks to the support of freedom of online speech came even
after that when the Supreme Court ruled that any speech going against any “historically
respectable figure” will be considered “putatively obscene”.
Additional information
http://bangalore.citizenmatters.in/articles/know-this-law-well-it-can-arrest-you-for-a-
facebook-post-or-text-message
http://timesofindia.indiatimes.com/city/bengaluru/MBA-student-arrested-for-anti-Modi-
message/articleshow/35610877.cms
http://cyberblogindia.in/autobiography-of-section-66a-of-the-it-act2008/
http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-
surveillance-and-digital-evidence-in-india.pdf
http://www.telegraphindia.com/1140617/jsp/nation/story_18520612.jsp#.VXlwEnWlyko
Questions for Discussion
1. In your opinion, what is the correct replacement for this law relating to freedom
of online speech; what are the exact words that can demarcate a crime apart from
“offensive, ill-will, hatred” etc.?
2. Do you think that there should be a limit on the freedom of speech online; is it that
Internet is a free platform for whatever is to be shared?
3. Do you believe Section 66A was barbaric or was it just an exaggeration or misuse of
the law?
4. Should there be a replacement to Section 66A in the law?
23. Internet Rights Are Human Rights 23
Scenario 4
Cyber Bullying –The case of Kavita Krishnan
Sec 66A introduced via InformationTechnology Act Amendment 2008 talked about Punishment
for sending offensive messages through communication service, etc. According to it any
person who sends, by means of a computer resource or a communication device
any information that is grossly offensive or has menacing character;
any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity,
hatred, or ill will, persistently makes by making use of such computer resource or a
communication device,
any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the origin of
such messages (Inserted vide ITAA 2008) shall be punishable with imprisonment for a
term which may extend to two to three years and with fine.
It encapsulates any message sent via electronic medium or an attachment in the form of text,
images, audio, video and any other electronic record transmitted with the message which
majorly deals with cyber bullying.
In April 2013, activist Kavita Krishnan was invited by Rediff to participate in a chat discussing
violence against women. Being the Secretary of the India Progressive Women’s Association
she willingly accepted the offer.
Questions started popping at her screen as soon as the setting for the chat was done at her
office. After a little while during the session someone with the handle “Rapist” appeared. Like
any other stereotypical men, the first message of the rapist to Krishnan read “Tell women to
not wear revealing clothes, then we will not rape them” followed by a gaali. Krishna replied
back. After a moment of silence, the Rapit replied “Kavita tell me where I should come and
rape you using condom”. Krishna was taken aback and hurriedly replied, ‘Give me your
name and address, and I’ll show you’.This didn’t stop the Rapist and he continued threating
Krishnan because of which she had to leave the chat session in between.
On 24th March 2015, section 66A became a history after Supreme Court’s judgement on arrest
of Vicky Khan for making a critical post about Azam Khan, a senior minister of Samajwadi
Party. It has become hard to convict anyone under our current laws. Vakul Sharma, a New
Delhi-based advocate in Supreme Court who specializes in cyber laws says there is no exact
definition of cyber bullying under the Indian Penal Code (IPC) or the InformationTechnology
(IT) Act. Earlier, these cases were booked under Section 66A of the IT Act but that was
revoked.
24. Internet Rights Are Human Rights24
Additional information
http://www.firstpost.com/living/rape-threats-on-rediff-kavita-krishnan-speaks-
out-727395.html
http://police.pondicherry.gov.in/Information%20Technology%20Act%20
2000%20-%202008%20%28amendment%29.pdf
https://www.parentcircle.com/cms/clip/view/438/
http://cyberblogindia.in/autobiography-of-section-66a-of-the-it-act2008/
http://www.livemint.com/Leisure/lpQCFqjgETbXachoWRxysO/Cyber-bullying-
Nip-it-in-the-bud.html
Questions for Discussion
1. What kind of policies and law can Indian Government adopt on their own or
from other nations to tackle cyber bullying?
2. According to you what steps can be taken to have a genuine identity of every
user in the virtual world?
25. Internet Rights Are Human Rights 25
Selected Cases from Martus
Kovan arrested inTamil Nadu
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: Tamil Nadu
Key Words: Electronic content, Defamatory, Public peace, Free speech
Date of Event: November 16th
2015
Date Created: December 3rd
, 2015
Summary ofthe Incident:
54-year-old Kovan, propagandist singer of Ultra-Left arts and literary outfit ‘Makkal Kalai
Ilakkiya Kazhagam’, was arrested inTiruchirapalli on October 30, 2015 for alleged sedition,
uploading “defamatory” electronic content against Chief Minister J Jayalalithaa and
“disturbing” public peace.
Statingthe incident:
Kovan, a 54 year old propagandist singer was arrested for content centring over the liquor
vending policy of Tamil Nadu government, allegedly referenced Jayalalitha in a bad light.The
allegedly defamatory content in the form of videos were uploaded on someTamil websites and
had also gone viral in messaging mediums like WhatsApp.
QUESTIONS FOR DISCUSSION:
1. Was the government correct to arrest Kovan?
2. What are other possible responses that are in line with freedom of expression?
3. What are the potential consequences of his arrest?
Source: http://www.dnaindia.com/india/report-court-grants-bail-to-kovan-who-is-facing-
sedition-charge-2145869
26. Internet Rights Are Human Rights26
Online intolerance in Kerala
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: Kerala
Key Words: Cyber Crime, Social media, Facebook, Online intolerance
Date of Event: November 26th
2015
Date Created: December 8th
2015
Summary ofthe Incident:
Kerala journalist faces threats for writing about madrasa child abuse
Statingthe incident:
Kozhikode based VP Rajeena is a senior journalist with a prominent Malayalam newspaper.
On November 21, she wrote about child abuse at madrasas on her Facebook page. Shortly
afterwards, she started receiving threats online. She claimed to have witnessed the alleged
immoral conduct of madrasa instructors in her Facebook post. She came under fierce attack on
social media and even her profile has been deactivated by Facebook.
QUESTIONS FOR DISCUSSION:
1. Is there a violation of rights in this case? If so, which rights?
2. What questions about gender does this case highlight?
Source: http://zeenews.india.com/news/kerala/online-intolerance-kerala-journo-faces-threats-
for-writing-about-madrasa-child-abuse_1826499.html
28. Internet Rights Are Human Rights28
Scenario 1
India’s Central Monitoring System
Lawful interception of telephones is permissible under Section 5(2) of the IndianTelegraph Act
1885 which is governed by Rule 419-A of the IndianTelegraph (Amendment) Rules, 2007.
Section 69 of the InformationTechnology (Amendment) Act, 2008, which allows for the
interception of all information transmitted through a computer resource.
Draft Rule 419B under Section 5(2) of the IndianTelegraph (Amendment) Act, 1885, allows for
the disclosure of “message related information” / Call Data Records (CDR) to Indian authorities.
According to draft Rule 419B, directions for the disclosure of Call Data Records can only be
issued on a national level through orders by the Secretary to the Government of India in the
Ministry of Home Affairs, while on the state level; orders can only be issued by the Secretary to
the State Government in charge of the Home Department.
In December 2009, the Home Ministry set up and hosted NATGRID. As a part of this, 21
databases are to feed 11 security agencies for national security.
The Central Monitoring System (CMS), which was largely covered by the media in 2013, was
actually approved by the Cabinet Committee on Security (CCS) on 16th June 2011. Since then
CMS has been operated by India’sTelecom Enforcement Resource and Monitoring (TERM)
cells, and has been implemented by the Centre for Development ofTelematics (C-DOT).
Additional information
https://indialawyers.wordpress.com/tag/indian-telegraph-act-1885/
http://www.sacw.net/article4793.html
http://cis-india.org/internet-governance/blog/india-central-monitoring-system-something-
to-worry-about
Questions for Discussion
1. Do you think there is a need for an authority like CMS to prevent cyber-crimes and
protect national security?
2. Does interception of information violates freedom of speech and expression?
3. How can a country prevent cyber-crimes in absence of information?
Theme 3: rightto Privacy
29. Internet Rights Are Human Rights 29
Scenario 2
Real Name Registration and Data Retention
in Cyber Cafes
In 2011, the Government of India issued the InformationTechnology (Guidelines for Cyber
Café) Rules.These rules govern the establishment and operation of Cyber Cafes in India.
Any user that wishes to avail the services of a cyber café must establish his/her identity by
presenting either:
1. Identity card issued by any School or College; or
2. Photo Credit Card or debit card issued by a Bank or Post Office; or
3. Passport; or
4. Voter Identity Card; or
5. Permanent Account Number (PAN) card issued by Income-Tax Authority; or
6. Photo Identity Card issued by the employer or any Government Agency; or
7. Driving License issued by the Appropriate Government; or
8. Unique Identification (UID) Number issued by the Unique Identification Authority of India
(UIDAI).
A copy of the ID, photo and various details about the user including; log-in time, log-out time,
gender and computer terminal identification must be placed in a log register and submitted
to the government.
Browsing history of all the computers in the café and details of any proxy serve must be
logged and maintained in a secure location for a period of 1 year and must be turned over to
the government in case they ask for them.
The availability of such information, which is personal in nature, with the cyber café could
have negative implications on the right to privacy and personal security of the user.
Additional Information
http://deity.gov.in/sites/upload_files/dit/files/GSR315E_10511(1).pdf
http://trak.in/tags/business/2011/04/26/cyber-cafe-rules-india-guidelines/
Questions for Discussion
1. Are cyber cafés the cheap source of cyber-crimes?
2. Does enforcement of “cyber café laws” prevent cyber-crimes?
3. Does this policy infringe on the rights to privacy?
30. Internet Rights Are Human Rights30
Selected Cases from Martus
Privacy Request from The Estate of Late A.P.J. Abdul Kalam
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: Chennai, India
Key Words: Facebook, APJ Abdul Kalam, Social Media, President
Date of Event: Aug 5th
2015
Date Created: Aug 10th
, 2015
Summary ofthe Incident:
Dr, APJ Abdul Kalam’s office issued a statement saying Srijan Pal Singh, who was
associated with Kalam in his academic pursuits should not give or share any statements in
the media or social networks in the name of the former President of India against the video
shared through Kalam’s official account on July 27th 2015
Statingthe Problem:
After the death of former President Dr. APJ Abdul Kalam, a struggle has come between
his long-time associate, Srijan Pal Singh, who has co-authored books with him, primarily
on handling his official accounts on social networking sites. Kalam’s office has issued
a statement regarding the operation of the social networks in the name of the former
President and Srijan Pal Singh has already been advised to deactivate all Facebook and
Twitter accounts in the name of Dr. Kalam or in his memory immediately.The statement
has issued because of the video related to Kalam’s last hours titled ‘Last Eight Hours with
Kalam” went viral on social media immediately after it was posted on Kalam’s account.
Kalam’s office says that Singh has the right to share his experience with Kalam, but he has
no right to share things through Kalam’s official pages in social media networking sites. He
added that there is an office to take care of it.
QUESTIONS FOR DISCUSSION:
1. Is there a human rights violation in this case? If so, which rights were violated?
2. Do public officials deserve the same level of privacy protections as regular citizens?
Source: http://timesofindia.indiatimes.com/city/chennai/Kalams-associates-fight-over-his-FB-
Twitter-accounts/articleshow/48368571.cms?
31. Internet Rights Are Human Rights 31
arrest for sharing obscene photos of a girl child
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: Chennai, India
Key Words: Cyber Crime, Obscene pictures, child pornography, Whatsapp
Date of Event: Aug 12th
2015
Date Created: 8th
, 2015
Summary ofthe Incident:
A man arrested for posting obscene photos of a girl child in WhatsApp
Statingthe Problem:
An employee of a private company was booked by the Cyber Crime wing of the police in
Chennai for purportedly circulating obscene pictures of a girl child in a WhatsApp group
comprising his colleagues. Based on the complaints from two members of the group, including
a woman, Cyber Crime Cell investigators of Crime Branch CID lifted the accused and seized
the phone used for taking the obscene photographs of the child and circulating it.The accused
identified as Vetrivel, who hails from Ariyalur district, allegedly confessed to the crime. A case
has been registered against the man under section 67, 67A, 67B of the InformationTechnology
Act and section 14 of the POCSO Act that deals with child sexual offences.
QUESTIONS FOR DISCUSSION:
1. Was arresting Vetrivel and seizing his phone a legitimate and proportional limitation on freedom of expression?
2. Is there a a difference between sharing an obscene or personal photograph with friends and contacts (via
WhatsApp)
3. Are there any other human rights violations to consider in this case?
Source: http://www.thenewsminute.com/article/man-held-posting-obscene-pictures-child-
chennai-companys-whatsapp-group-33170
33. Internet Rights Are Human Rights 33
Scenario 1
The Pink Chaddi Campaign
In late January 2009, a group of 40 members of right-wing Hindu group Sri Ram Sena attacked
women and men in a pub in the Indian city of Mangalore.The founder of the group, Pramod
Muthalik publicly endorsed the attacks and announced plans that any unmarried couples
spotted in public on Valentines Day will be forcibly married by members of his group. a group
of women formed the “Consortium of Pub-going, Loose, and Forward Women” (PLFW) on
Facebook.
Within a week, the group had 40,000 members. PLFW called on members to participate offline
by sending “pink chaddis” to Muthalik.
The Pink Chaddi campaign mobilised support very quickly; with no leader, they organised
collectively on Facebook. Muthalik received 2000 pink chaddis from India and abroad. Days
before Valentine’s Day, Muthalik called off his threat of Valentine’s Day violence. He and his
supporters were placed in preventive custody by the state government.
Facebook disabled the group’s messaging function (because the membership exceeded 5000)
and later, revoked access after their page got hacked, they had no other means to access their
members.
On reflection, the organisers realised that it was problematic to rely solely on a proprietary
platform like Facebook for organising and managing their membership base. So although
it was a useful tool to target the local audience, Facebook being very popular at the time, it
created new vulnerabilities that the organisers did not have time or experience to foresee.
Additional Information
http://blogs.wsj.com/indiarealtime/2014/03/24/how-pink-underwear-brought-down-
pramod-muthalik/
https://blogs.commons.georgetown.edu/isdyahoofellow/tag/pink-chaddi-campaign/
http://timesofindia.indiatimes.com/india/Pink-chaddi-campaign-a-hit-draws-over-34000-
members/articleshow/4126529.cms
Theme 4: Freedom of Association and
Freedom of Assembly
34. Internet Rights Are Human Rights34
Questions for Discussion
1. Do you believe that the pink chaddi campaign was a successful use of digital
tools to assemble towards a cause online?Yes or No?
2. Do you believe that Facebook is an effective platform for rallying support?
3. Do you think that Facebook was justified to block access to the groups page?
35. Internet Rights Are Human Rights 35
Scenario 2
Savetheinternet.in –The Battle for
Net Neutrality in India
In March, 2015, what has come to be known as the “Battle for the Free Internet” began in
India.
Earlier in 2015, Facebook and Airtel launched their zero-rated internet access services;
Internet.Org Airtel Zero.TheTelecom Regulatory Authority of India (TRAI) released a
consultation paper in March seeking comments on the definition of network neutrality in
India. A comedy group, All India Bakchod, released aYoutube video that garnered over 3.8
million views and sparked an online and eventually, offline debate surrounding the concept
of net neutrality.TRAI received over 1 million responses to their consultation paper
The Cellular Operators Association of India (COAI) soon afterwards launched a counter
campaign called Sabka Internet, Sab ka Vikas. Cellular operators asked consumers to give
them a missed call in support of of their demands.
Later in 2015, Internet.Org was rebranded as FreeBasics and Facebook launched a massive
online and offline campaign to garner support for their initiative.TRAI received over 12
million emails from various sources.
An analysis of a record 24 lakh comments, as disclosed byTRAI, shows that 18.94 lakh replies
are in support of Free Basics, of which 13.5 lakh views are through supportfreebasics.in and
without the sender’s individual e-mail IDs while further 5.44 lakh comments have come from
facebookmail.com.
Additional Information
http://www.trai.gov.in/WriteReadData/ConsultationPaper/
Document/201601090922527372065Comments_data_services.pdf
http://trai.gov.in/WriteReadData/Miscelleneus/Document/201601190319214139629TRAI_
letter_to_FB_dated_18_01_2016.pdf
http://indianexpress.com/article/technology/social/trai-slams-facebook-letter-on-free-
basics-campaign-wholly-misplaced/
http://motherboard.vice.com/read/facebooks-free-internet-program-had-a-rough-week
Questions for Discussion
1. Do you believe that online activism is an effective way to garner support for a cause?
2. Keeping aside personal opinions on the matter, what could Facebook/FreeBasics have
done differently to gather more responses?
3. Do you believe a ‘missed-call’ campaign is an effective tool for activism?
36. Internet Rights Are Human Rights36
Scenario 3
Anonymous #OpIndia… Engaged!
In 2012, the Indian Government blocked various file sharing websites on the basis of a
“John Doe” order by the courts in favour of a Chennai based firm, Copyright Labs to prevent
copyright infringement of an upcoming movie.
Sites like Dailymotion, Vimeo, Pastebin and various torrent tracker websites were blocked in
this proactive move to prevent piracy.
In retaliation, hacktivist group Anonymous targeted the websites of various government
agencies, bodies and political parties.The web sites of the Department of Telecom, the IT
ministry, the BJP and INC parties and the Supreme Court, among others, were all hit by
Distributed Denial of Service (DDoS) attacks lasting over a day using the group’s preferred
weapon: the low orbit ion cannon (LOIC).
Anonymous India had earlier released a video onYouTube warning the Indian government
against the arbitrary blocking of the websites and gave a time of 1 week to reverse the order.
Anonymous released an open letter to the Government of India stating that they considered
the DDoS attack a means of peaceful protest online and it did not constitute hacking.
Additional Information
https://docs.google.com/file/d/0Bxi2TzVXul5ZUl9EclRQZXlRdVdUb3c2S3EwSk1Udw/
edit?pli=1
http://www.bgr.in/news/anonymous-open-letter-to-indian-govt-claims-ddos-attack-on-
sites-are-legal/
http://www.indiancustomers.in/vimeo-dailymotion-pastebin-331.html
http://www.theregister.co.uk/2012/05/21/india_anonymous_cert_ddos/
http://www.theregister.co.uk/2012/05/18/anonymous_ddos_india_sites/
http://arstechnica.com/security/2012/05/indian-supreme-court-orders-pirate-bay-pastebin-
blocks-gets-ddosed/
https://youtu.be/52zwjkSVx2k
Questions for Discussion
1. Do you think that hacktivism is an effective tool for protest?
2. Would you have protested against the blocking of website? If yes, how would you have
rallied individuals online against the order?
3. Do you believe that DDoS attacks are a peaceful form of protest?
37. Internet Rights Are Human Rights 37
Selected Cases from Martus
Whatsapp blocked in Gujarat
Language: English
Author: Impact ResearchTeam
Organisation: Digital Empowerment Foundation
Location: Gujarat
Key Words: Internet, Mobile Internet, Whatsapp, Facebook
Date of Event: August 25th,
2015
Date Created: September 8th
, 2015
Summary ofthe Incident:
The police have blocked WhatsApp and mobile internet in Gujarat after a state-wide bandh
was called out by Patidar Anamat Andolan Samiti leader Hardik Patel.
Statingthe Problem:
A rally was led by 22 year old politician Hardik Patel, the convenor of the Patidar Anamat
Andolan Samiti to demand Other Backward Class (OBC) status for members of the Patidar
community.The aim of the demand is to equal the competition for enrolment at universities
and jobs in government organisations. Police arrested Hardik Patel during the rally where
around 1.5 million Patels joining in the protest. Patel sent out messages via WhatsApp just
after his arrest, urging citizens to maintain peace.
“ I make an appeal to maintain peace and keep calm. I give a call for Gujarat bandh
tomorrow(Wednesday).This dicision has been taken by Patidar Anamat Andolan Samiti
considering widespread violence in the state”
However, his followers ignored his advice and there were reports of large scale violence in
some cities of Gujarat.The police suspect that rumours were being spread through the cross
platform messaging app, WhatsApp, which led to the state government to block all services
including 3G and 4G/LTE to the state of Gujarat.
QUESTIONS FOR DISCUSSION:
1. What human rights violations, if any, took place in this scenario?
2. Was arresting Patel a justified/legitimate response?
3. Was blocking WhatsApp and mobile internet a proportionate response to protect national security and
public order? Was it an effective measure?
Source: http://www.techworm.net/2015/08/india-blocks-mobile-internet-for-63-million-
citizens-amid-protests-in-ahmedabad.html