The document summarizes new IT rules introduced by the Indian government for social media platforms, OTT platforms, and digital news media. Key points include:
- Rules distinguish between regular and "significant" social media platforms based on user thresholds and impose additional due diligence on the latter.
- All platforms must have robust grievance redressal, publish compliance reports, and remove unlawful content promptly.
- Significant social media and messaging platforms must enable tracing of original senders for certain messages.
- OTT and digital news platforms face new regulations around content labeling and publisher code of conducts.
- Experts have raised concerns around privacy, encryption, and lack of legislative backing for regulating news media.
How to safe online (presented by abhinav pathak)Abhinav Pathak
This document provides information about staying safe online and using social media securely. It defines popular social media platforms like Facebook, Snapchat, Instagram, and Twitter. It outlines both benefits of social media like communicating with others, and risks like cyberbullying, inappropriate content, and online predators. The document advises users to use strong privacy settings, keep personal information private, verify links and attachments before opening them, and report any harassment. It also provides statistics about registered cyber crime cases in India and examples of common cyber crimes like defamation, bullying, theft, and fraud. Finally, it explains how to file an online complaint about a cyber crime on India's National Cyber Crime Reporting Portal.
This document discusses security issues related to social networking sites. It notes that personal information shared on social media can be exploited by criminals if privacy settings are not used properly or accounts are inactive. The document outlines Indian laws around privacy and security, including sections of the Information Technology Act that protect privacy, allow government surveillance, and define cyber crimes and offenses. It concludes by recommending various measures that individuals and organizations can take to improve security on social media and protect personal information, such as using strong privacy settings, auditing procedures, and education campaigns.
The Intersection of Social Media, HIPAA, and the WorkplacePolsinelli PC
Using Social Media in the workplace can enhance business operations by expanding communication, providing education, and improving services. Social Media, however, despite its advantages, can create potential risks to employees and employers. These risks are exacerbated in the healthcare space, as patient privacy concerns are paramount. This webinar will discuss social media and its appropriate use in the healthcare industry, navigate the interaction between freedom of speech, patient rights, and employment law, and provide information on how to draft and implement a workable and practical Social Media Policy
On our agenda:
-Social Media Statistics
-Benefits of Social Media in the Workplace
-Potential Patient Privacy and Security Social Media Pitfalls, including Real World Examples
-Employee Rights
-Adopting a Social Media Policy
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
This document summarizes the existing Sri Lankan legal framework regarding cybercrimes. It outlines several key cybercrime offenses recognized under Sri Lankan law, including computer hacking, computer cracking, unauthorized modification of computers, crimes against national security/economy/public order, unlawful acquisition of information, illegal interception of data, and use of unlawful devices. It discusses the elements and penalties for each offense based on provisions in the Computer Crimes Act and other Sri Lankan legislation such as the Intellectual Property Act and Sri Lanka Telecommunications Act.
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Cyber crime has increased with the growth of internet usage. While the internet initially aimed to improve communication and research, it now enables crimes to be committed remotely from a computer. Some criminals began exploiting the internet for illegal acts in the 1980s, termed "cyber crimes". These can include hacking, theft of information, computer viruses, and other online offenses. While laws have been implemented to address cyber crimes, legislation alone cannot eliminate all criminal acts. Continued education of legal rights and responsibilities, as well as stringent enforcement of laws, are needed to help control cyber crime.
How to safe online (presented by abhinav pathak)Abhinav Pathak
This document provides information about staying safe online and using social media securely. It defines popular social media platforms like Facebook, Snapchat, Instagram, and Twitter. It outlines both benefits of social media like communicating with others, and risks like cyberbullying, inappropriate content, and online predators. The document advises users to use strong privacy settings, keep personal information private, verify links and attachments before opening them, and report any harassment. It also provides statistics about registered cyber crime cases in India and examples of common cyber crimes like defamation, bullying, theft, and fraud. Finally, it explains how to file an online complaint about a cyber crime on India's National Cyber Crime Reporting Portal.
This document discusses security issues related to social networking sites. It notes that personal information shared on social media can be exploited by criminals if privacy settings are not used properly or accounts are inactive. The document outlines Indian laws around privacy and security, including sections of the Information Technology Act that protect privacy, allow government surveillance, and define cyber crimes and offenses. It concludes by recommending various measures that individuals and organizations can take to improve security on social media and protect personal information, such as using strong privacy settings, auditing procedures, and education campaigns.
The Intersection of Social Media, HIPAA, and the WorkplacePolsinelli PC
Using Social Media in the workplace can enhance business operations by expanding communication, providing education, and improving services. Social Media, however, despite its advantages, can create potential risks to employees and employers. These risks are exacerbated in the healthcare space, as patient privacy concerns are paramount. This webinar will discuss social media and its appropriate use in the healthcare industry, navigate the interaction between freedom of speech, patient rights, and employment law, and provide information on how to draft and implement a workable and practical Social Media Policy
On our agenda:
-Social Media Statistics
-Benefits of Social Media in the Workplace
-Potential Patient Privacy and Security Social Media Pitfalls, including Real World Examples
-Employee Rights
-Adopting a Social Media Policy
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
This document summarizes the existing Sri Lankan legal framework regarding cybercrimes. It outlines several key cybercrime offenses recognized under Sri Lankan law, including computer hacking, computer cracking, unauthorized modification of computers, crimes against national security/economy/public order, unlawful acquisition of information, illegal interception of data, and use of unlawful devices. It discusses the elements and penalties for each offense based on provisions in the Computer Crimes Act and other Sri Lankan legislation such as the Intellectual Property Act and Sri Lanka Telecommunications Act.
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Cyber crime has increased with the growth of internet usage. While the internet initially aimed to improve communication and research, it now enables crimes to be committed remotely from a computer. Some criminals began exploiting the internet for illegal acts in the 1980s, termed "cyber crimes". These can include hacking, theft of information, computer viruses, and other online offenses. While laws have been implemented to address cyber crimes, legislation alone cannot eliminate all criminal acts. Continued education of legal rights and responsibilities, as well as stringent enforcement of laws, are needed to help control cyber crime.
The document discusses protests against sections of the Philippines' Cybercrimes Prevention Act (CPA) as unconstitutional and infringing on free speech. Specifically, sections relating to online libel and aiding those who spread libelous content online are criticized as too vague and limiting of free expression. While the government maintains the law is needed to address cybercrimes, internet users and journalists argue certain sections need amendment to avoid misinterpretation and limiting legal online discourse. The Supreme Court has issued a temporary restraining order on the assailed sections until the petitions questioning them are resolved.
This document discusses cyber defamation under Indian law. It provides an overview of cyber crimes and defamation, and examines the liabilities, remedies, and damages available. The Information Technology Act of 2000 is the primary legislation covering cyber crimes, though it does not specifically address cyber defamation. Defamation cases can be civil or criminal in nature. The document analyzes several relevant court cases and discusses challenges around key concepts like publication and the liability of internet service providers.
Defamation & Online Defamation; Why Internet for Defamation; Legislations related to defamatory; Freedom of Speech; Freedom of Speech under International Conventions and its limitation; Freedom of Speech under Federal Constitution of Malaysia and its limitation; Freedom of speech in Internet and Cyber Harassment; Instances of online defamation; Internet Content Regulation and Censorship.
Recommendation & Conclusion.
The document outlines an internet usage policy for the Fiji government. It discusses management and administration of internet access, technical provisions, and security. Key points include that internet access is primarily for business purposes, personal usage is limited to breaks, and all usage may be monitored. Downloading is restricted and requires approval. Strict password security and virus scanning is required. No sensitive systems can be directly connected to the internet. All employees must sign that they understand and will comply with the policy.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
Group 2 privacy and me in a web 2.0 world finalshanikosh
The document discusses privacy and security issues related to using the internet and social media. It provides definitions of key concepts like internet security, privacy, confidentiality, and consent. It also lists laws and rights related to privacy and discusses dimensions of privacy that can be impacted online. The document gives tips for protecting privacy online including using proxy servers, independent search engines, and adjusting website privacy settings. It warns about risks of oversharing personal information on social media and how criminals use social media information to target users.
This document provides information from a presentation on internet safety given to students. It discusses laws in Virginia related to computer use and harassment, as well as dangers of the internet like cyberbullying, sexting, and inappropriate messages. It provides strategies for safe internet use such as only interacting with known individuals, avoiding sharing personal information, and reporting any inappropriate behavior.
Cyber defamation involves defamation or slander conducted via digital media like the internet. The document discusses cyber defamation under Indian law. It notes that the Indian Penal Code contains provisions regarding defamation that apply to electronic forms. Defamation must lower the reputation of a person in the eyes of others. Key cases established that emails and online chats can be treated as admissible evidence in defamation cases. Courts have granted injunctions to prevent further cyber defamation and convicted individuals for posting defamatory messages online. While laws address cyber defamation, more defined criteria may be needed given the unique nature and widespread reach of content on the internet.
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
This is my talk on Legal and Cybersecurity issues of Disclosure on the Internet. The Internet Society was invited to co-host this event "Unraveling the Panama Papers (and Bahamas Leaks) - Secrecy for Sale" organized by REAL Analytics Pte Ltd.
This document discusses cyber crimes committed against children, including types like trafficking, pornography, morphing, kidnapping, and exploitation. It provides statistics on issues like child trafficking in India and cases of cyber bullying. The document outlines vulnerabilities children face, side effects of cyber crimes, and laws/legislations in place. It discusses the work of NGO Love146 and concludes by emphasizing the importance of parental involvement and guidance in protecting children from cyber crimes.
The document discusses cyber laws in Pakistan. It provides an overview of two key pieces of legislation: the Electronic Transaction Ordinance of 2002, which recognized electronic documentation and established rules around digital signatures; and the Electronic/Cyber Crime Bill of 2007, which defined 17 types of cyber crimes and assigned punishments including imprisonment and fines. It also presents some statistics on cyber crimes reported in Pakistan and globally.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
This document discusses internet and email policies in companies. It provides an overview of why companies have these policies, examples of real policies, and the pros and cons. The presentation concludes that companies should have written internet policies to protect both the business and employees and reduce security risks. The policies outline appropriate internet and email use as well as potential consequences for violations.
This document discusses popular cyber crimes committed in education. It begins by defining cyber crime as any criminal offense committed using information and communication technologies. The first recorded cybercrime in the Philippines was the "I Love You" virus released in 2000. According to a 2010 report, 87% of Filipino internet users had been victims of online crimes like malware, phishing scams, sexual predation, and fraudulent social media activities. Common cyber crimes in education include computer-related fraud like hacking accounts, identity theft by creating fake profiles, cybersex, posting child pornography online, and online bullying/libel.
This chapter discusses computer forensics and the investigation of digital evidence. It covers the basics of crimes involving computers, including early cases like the Morris worm. Crimes are divided into felonies and misdemeanors. Cybercrime categories include crimes against persons, property, and government. Laws and acts like the Computer Fraud and Abuse Act help address cybercrime. The chapter also distinguishes between civil and criminal cases as well as the roles of law enforcement in investigating digital threats.
Information technology (intermediary guidelines and digital media ethics code...ZahidManiyar
The document summarizes new guidelines for social media and digital media platforms in India. Key points:
- The rules aim to make social media and digital media platforms more accountable for content on their sites and provide grievance redressal mechanisms for users.
- Major platforms like WhatsApp, YouTube, Facebook and Twitter have large user bases in India but need to comply with Indian laws and the constitution.
- The rules establish due diligence requirements for platforms and require grievance officers to resolve complaints within 15 days.
- Platforms must remove content involving nudity, impersonation or privacy violations within 24 hours of complaints.
- The rules distinguish requirements for smaller and larger social media platforms based on
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
The document discusses protests against sections of the Philippines' Cybercrimes Prevention Act (CPA) as unconstitutional and infringing on free speech. Specifically, sections relating to online libel and aiding those who spread libelous content online are criticized as too vague and limiting of free expression. While the government maintains the law is needed to address cybercrimes, internet users and journalists argue certain sections need amendment to avoid misinterpretation and limiting legal online discourse. The Supreme Court has issued a temporary restraining order on the assailed sections until the petitions questioning them are resolved.
This document discusses cyber defamation under Indian law. It provides an overview of cyber crimes and defamation, and examines the liabilities, remedies, and damages available. The Information Technology Act of 2000 is the primary legislation covering cyber crimes, though it does not specifically address cyber defamation. Defamation cases can be civil or criminal in nature. The document analyzes several relevant court cases and discusses challenges around key concepts like publication and the liability of internet service providers.
Defamation & Online Defamation; Why Internet for Defamation; Legislations related to defamatory; Freedom of Speech; Freedom of Speech under International Conventions and its limitation; Freedom of Speech under Federal Constitution of Malaysia and its limitation; Freedom of speech in Internet and Cyber Harassment; Instances of online defamation; Internet Content Regulation and Censorship.
Recommendation & Conclusion.
The document outlines an internet usage policy for the Fiji government. It discusses management and administration of internet access, technical provisions, and security. Key points include that internet access is primarily for business purposes, personal usage is limited to breaks, and all usage may be monitored. Downloading is restricted and requires approval. Strict password security and virus scanning is required. No sensitive systems can be directly connected to the internet. All employees must sign that they understand and will comply with the policy.
This document summarizes several cases related to cybercrime laws in India. It discusses cases involving online credit card fraud on eBay, an SMS scam that defrauded 50,000 people of 400 million rupees, the first conviction in an Indian cybercrime case involving the website Sony-sambandh.com, a call center fraud targeting Citibank customers, and India's first ATM card fraud case. The document provides details on the nature of the crimes and outcomes like arrests in these landmark cybercrime cases in India.
Group 2 privacy and me in a web 2.0 world finalshanikosh
The document discusses privacy and security issues related to using the internet and social media. It provides definitions of key concepts like internet security, privacy, confidentiality, and consent. It also lists laws and rights related to privacy and discusses dimensions of privacy that can be impacted online. The document gives tips for protecting privacy online including using proxy servers, independent search engines, and adjusting website privacy settings. It warns about risks of oversharing personal information on social media and how criminals use social media information to target users.
This document provides information from a presentation on internet safety given to students. It discusses laws in Virginia related to computer use and harassment, as well as dangers of the internet like cyberbullying, sexting, and inappropriate messages. It provides strategies for safe internet use such as only interacting with known individuals, avoiding sharing personal information, and reporting any inappropriate behavior.
Cyber defamation involves defamation or slander conducted via digital media like the internet. The document discusses cyber defamation under Indian law. It notes that the Indian Penal Code contains provisions regarding defamation that apply to electronic forms. Defamation must lower the reputation of a person in the eyes of others. Key cases established that emails and online chats can be treated as admissible evidence in defamation cases. Courts have granted injunctions to prevent further cyber defamation and convicted individuals for posting defamatory messages online. While laws address cyber defamation, more defined criteria may be needed given the unique nature and widespread reach of content on the internet.
Legal and cybersecurity issues in whistleblowing (Panama Papers)Benjamin Ang
This is my talk on Legal and Cybersecurity issues of Disclosure on the Internet. The Internet Society was invited to co-host this event "Unraveling the Panama Papers (and Bahamas Leaks) - Secrecy for Sale" organized by REAL Analytics Pte Ltd.
This document discusses cyber crimes committed against children, including types like trafficking, pornography, morphing, kidnapping, and exploitation. It provides statistics on issues like child trafficking in India and cases of cyber bullying. The document outlines vulnerabilities children face, side effects of cyber crimes, and laws/legislations in place. It discusses the work of NGO Love146 and concludes by emphasizing the importance of parental involvement and guidance in protecting children from cyber crimes.
The document discusses cyber laws in Pakistan. It provides an overview of two key pieces of legislation: the Electronic Transaction Ordinance of 2002, which recognized electronic documentation and established rules around digital signatures; and the Electronic/Cyber Crime Bill of 2007, which defined 17 types of cyber crimes and assigned punishments including imprisonment and fines. It also presents some statistics on cyber crimes reported in Pakistan and globally.
The document discusses cybercrime in Bangladesh. It provides an overview of the history of cybercrime, common types of cybercrimes, cyber laws in Bangladesh and other countries, and cybersecurity technologies. It notes that cybercrime is increasing in Bangladesh, with most victims being women aged 15-25 facing cyber harassment. While law enforcement is trying to tackle the problem, the conviction rate for cybercrime in Bangladesh is only 3%. The document calls for recommendations to address cybercrime and increase cybersecurity.
This document discusses internet and email policies in companies. It provides an overview of why companies have these policies, examples of real policies, and the pros and cons. The presentation concludes that companies should have written internet policies to protect both the business and employees and reduce security risks. The policies outline appropriate internet and email use as well as potential consequences for violations.
This document discusses popular cyber crimes committed in education. It begins by defining cyber crime as any criminal offense committed using information and communication technologies. The first recorded cybercrime in the Philippines was the "I Love You" virus released in 2000. According to a 2010 report, 87% of Filipino internet users had been victims of online crimes like malware, phishing scams, sexual predation, and fraudulent social media activities. Common cyber crimes in education include computer-related fraud like hacking accounts, identity theft by creating fake profiles, cybersex, posting child pornography online, and online bullying/libel.
This chapter discusses computer forensics and the investigation of digital evidence. It covers the basics of crimes involving computers, including early cases like the Morris worm. Crimes are divided into felonies and misdemeanors. Cybercrime categories include crimes against persons, property, and government. Laws and acts like the Computer Fraud and Abuse Act help address cybercrime. The chapter also distinguishes between civil and criminal cases as well as the roles of law enforcement in investigating digital threats.
Information technology (intermediary guidelines and digital media ethics code...ZahidManiyar
The document summarizes new guidelines for social media and digital media platforms in India. Key points:
- The rules aim to make social media and digital media platforms more accountable for content on their sites and provide grievance redressal mechanisms for users.
- Major platforms like WhatsApp, YouTube, Facebook and Twitter have large user bases in India but need to comply with Indian laws and the constitution.
- The rules establish due diligence requirements for platforms and require grievance officers to resolve complaints within 15 days.
- Platforms must remove content involving nudity, impersonation or privacy violations within 24 hours of complaints.
- The rules distinguish requirements for smaller and larger social media platforms based on
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
I. INTRODUCTIONA. Purpose of DocumentThis paper1 was des.docxwilcockiris
I. INTRODUCTION
A. Purpose of Document
This paper1 was designed to accompany the Model Policy on
Social Media established by the IACP National Law Enforcement
Policy Center. This paper provides essential background materi-
al and supporting documentation to impart greater understand-
ing of the developmental philosophy and implementation
requirements for the model policy. This material will be of value
to law enforcement executives in their efforts to tailor the model
policy to the requirements and the circumstances of their com-
munities and their law enforcement agencies.
B. Background
Personal Internet access has grown exponentially over the last
decade, facilitating the growth in popularity of the World Wide
Web and, more recently, social media. For the purpose of this dis-
cussion paper, social media is defined as a category of Internet-
based resources that integrate user-generated content and user
participation. Social media tools have become synonymous with
popular culture and new waves of personal communication.
People of all ages and organizations of all types are using these
tools like never before.
Social media has many uses for government agencies includ-
ing law enforcement agencies. The characteristics of community
collaboration and interactive communication that are at the core
of social media, lend directly to the core of democratic culture,
and allow for positive community interaction and effective deliv-
ery of services. Community policing, investigations, and other
strategic initiatives can all be enhanced with the effective use of
social media.
The increase in personal social media usage across demo-
graphics also means that more and more law enforcement per-
sonnel are engaging in these tools on a personal level. Misuse of
social media can lead to harsh consequences for both the indi-
vidual and his or her agency.
The IACP Model Policy on Social Media was established in order
to assist law enforcement agencies in developing appropriate
procedures and guidelines for both official department use of
social media tools as well as personal use by agency employees.
The purpose of this discussion paper is to educate law enforce-
ment managers and executives on the uses and abuses of social
media. As the age of technology continues to expand, the use of
social media should be supervised closely in order to ensure eth-
ical, effective, and lawful police applications.
C. Policy Development
In response to the rise in use of social media, police depart-
ments should draft and implement policies that regulate social
media use among employees, as well as determine proper and
effective department use. The model social media policy was
developed to establish an agency’s position on the utility and
management of social media tools as well as provide guidelines
for personal usage of social media for agency personnel.
As noted above, many of the legal issues surrounding social
media have not yet been settled in the court sy.
Government as a platform: engaging the public with social mediaPatrick McCormick
The document discusses the use of social media by governments to engage with the public. It outlines how citizens' expectations are changing with new technologies and the internet, requiring governments to also change how they operate. Governments need to embrace new tools and become more transparent, collaborative platforms to build trust with the public. The presentation provides examples from the government of Victoria, Australia of how social media is being used for emergency response, public engagement and improving access to government services and information.
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
Record keeping rules for mortgage lenders weren’t written with social media in mind. Complying with these rules for loan-related tweets, Facebook messages and LinkedIn communications suggests the proverbial square peg and round hole. Some regulatory agencies mention social media communications but lack rules for it, while others are silent on the subject.
Is social media an unsupervised digital opportunity to advertise and originate mortgages, or a regulatory compliance risk?
IACP Social Media Concepts and Issues Paper September 2010Twittercrisis
This document provides an overview of social media use by law enforcement agencies and personnel. It discusses official department uses such as investigations, community outreach, and recruitment. It emphasizes the need for authorization and administration of official accounts. Regarding legal aspects, it outlines how the First Amendment applies differently depending on whether statements are made in an official capacity or as a private citizen on matters of public concern. It also discusses how personal social media use by law enforcement personnel could potentially be detrimental to their department if sensitive information is revealed or conduct violates policy. The document aims to educate law enforcement on both establishing appropriate social media policies and using social media effectively and lawfully.
This document discusses implementing social media in the public sector. It notes that most government organizations now have Facebook and Twitter accounts, but that social media was designed for private citizens rather than formal organizational communication. There are three key steps to professional social media use: 1) Design a strategy that identifies goals and audiences; 2) Create policies to regulate employee and public behavior; 3) Plan specific tactics like regular posts and monitoring interactions. While regulatory agencies have limitations, social media can still be used to share information and raise awareness of programs to broader audiences. Professional management of social media requires clear strategies and guidelines.
This document summarizes a research paper on applying a human rights framework to online disinformation and political discourse. The paper examines how online campaign techniques like disinformation, exploiting social media algorithms, and microtargeting based on personal data are distorting democratic processes. It argues that international human rights law provides a framework to balance responses to these issues with protections for civil liberties. The paper analyzes how rights to privacy, expression, and participation in public affairs relate to state and platform regulation of online political content and personal data use. It recommends changes like ensuring user consent for data use, more transparency around content policies and targeting, and considering users' rights to privacy and autonomy in platform designs.
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
eParticipation in East Africa: Theory, platforms and a case - Amahoro Mu Matora - from Burundi that is considered in detail. A lecture for the Virtual University of Uganda - www.virtualuni.ac.ug
The document discusses three ways that participatory democracy has been managed in Delhi: 1) Through Bhagidari, a citizen-government partnership initiative to improve services. 2) Through the Delhi Right to Information Act of 2001, which gives citizens the right to information from government departments. 3) Through the Public Grievances Commission, an independent forum for public complaints against government agencies.
The document summarizes three ways that participatory democracy has been managed in Delhi: 1) Through Bhagidari, a citizen-government partnership initiative to improve services. 2) Through the Delhi Right to Information Act of 2001, which gives citizens the right to obtain information from government departments. 3) Through the Public Grievances Commission, an independent forum where citizens can file grievances against government agencies and departments.
As Governments world over embrace Digital- First strategies, we at Intense Technologies help transform citizen services by innovatively connecting processes and people while empowering #departments for #digitalization. Read the article to know more. #government #govt #digitaltransformation #technology #customerexperience #informationtechnology #customersatisfaction #citizens #citizenexperience #citizenengagement #analytics #data #datascience #ai #iot #artificialintelligence #technology #publicsector #publicservices
Disclosure of information about government actions and spending puts government and public officials under the constant watch of the public, allowing them to track what resources are spent, who contracts are awarded to and so on.
When designing proactive disclosure systems or voluntary disclosure has five principles governments should follow. Information needs to be: available, findable, comprehensible, low cost or free, up-to-date and relevant.
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMoving Media
Mobile Internet imbricated in current economic crisis & reshaping of geo-political & communication orders
not just mobiles + Internet, mobile Internet spans a complex assembly of emergent, hybrid media forms. From smartphones, tablets, and the apps phenomena, through new televisual ecologies and locative media, to pervasive computers, connected cars & smart cities.
The document discusses India's potential for electronic democracy (e-democracy) through citizen engagement using social media and mobile technology. It outlines the VOTERS framework for e-democracy, which stands for verifiable, open, transparent, empathetic, responsive, and sensitive. Recent anti-corruption protests in India engaged millions of citizens online and off to demand reforms. If implemented, the VOTERS framework could help the government become more transparent, responsive to citizens, and accountable through open consultation and access to information online.
The document summarizes proposed changes to Section 79 of India's Information Technology Act regarding regulating online content. It discusses draft rules that would require social media platforms like WhatsApp, Facebook, and Twitter to remove unlawful content, trace the origin of information, and deploy tools to identify such content. The draft also mandates data localization, increases record keeping timelines, and allows government orders to access data/assistance. While it aims to curb fake news and increase accountability, critics argue it could infringe privacy and be misused for political goals.
he Contract for the Web was created by representatives from over 80 organizations, representing governments, companies and civil society, and sets out commitments to guide digital policy agendas. To achieve the Contract’s goals, governments, companies, civil society and individuals must commit to sustained policy development, advocacy, and implementation of the Contract text.
Lee Rainie, Director of Internet and Technology Research at the Pew Research Center, presented this material on October 29, 2020 to scholars, policy makers and civil society advocates convened by New York University’s Governance Lab (GovLab). He described findings from two canvassings of hundreds of technology and democracy experts that captured their views about the future of democracy and the future of social and civic innovation by the year 2030. Among other subjects, the experts looked at the impact of misinformation, “techlash” and trust in government institutions.
Policy Development Rough Draft Grading RubricCriteriaLevels.docxharrisonhoward80223
Policy Development: Rough Draft Grading Rubric
Criteria
Levels of Achievement
Content
(70%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not present
Total
%
Answer Specificity
20.5 to 22.5 points:
All key components of the topic are thoroughly discussed in the paper.
18.5 to 20 points:
All key components of the question are largely answered in the paper with few exceptions.
1 to 18 points:
Key portions of assigned questions are left unanswered.
0 points
Not present
Logic & Clarity
13.5 to 15 points:
Clear, logical flow to paper; major points are stately clearly.
12.5 to 13 points:
Clear logical flow to paper; major points are stated clearly for the most part.
1 to 12 points:
Lack of clarity and failure to logically explain and communicate answers is the norm.
0 points
Not present
Research & Support
13.5 to 15 points:
Major points are thoroughly supported by the following:
1.Lecture material or Scripture
2.Good examples (pertinent
conceptual or personal
examples
3.Thoughtful analysis
(considering assumptions,
analyzing implications,
comparing/contrasting
concept)
12.5 to 13 points:
Major points are largely supported by the following:
1.Lecture material or
Scripture
2.Good examples (pertinent
conceptual or personal
examples
3.Thoughtful analysis
(considering assumptions,
analyzing implications,
comparing/contrasting
concept)
1 to 12 points:
Major points are lacking substantial support by the following:
1.Lecture material or
Scripture
2.Good examples
(pertinent
conceptual or personal
examples
3.Thoughtful analysis
(considering
assumptions,
analyzing implications,
comparing/contrasting
concept)
0 points
Not present
Structure (30%)
Advanced
92-100%
Proficient
84-91%
Developing
1-83%
Not present
Total
%
Spelling, Grammar & APA
14.25 to 15.5 points:
Little to no errors in spelling, grammar and APA
13.25 to 14 points:
Some errors in spelling, grammar & APA
1 to 13 points:
Numerous errors in spelling, grammar & APA
0 points
Not present
Sufficient Length
6.5 to 7 points:
5 pages of content and a title page (reference page if needed)
5.5 to 6 points:
Paper runs a bit long or a bit short of page requirements
1 to 5 points:
Paper is more than three pages too long/too short
0 points
Not present
Professor Comments:
Total:
I. INTRODUCTION
A. Purpose of Document
This paper1 was designed to accompany the Model Policy on
Social Media established by the IACP National Law Enforcement
Policy Center. This paper provides essential background materi-
al and supporting documentation to impart greater understand-
ing of the developmental philosophy and implementation
requirements for the model policy. This material will be of value
to law enforcement executives in their efforts to tailor the model
policy to the requirements and the circumstances of their com-
munities and their law enforcement agencies.
B. Background
Personal Internet access has gro.
Similar to New it rules (presented by abhinav pathak) (20)
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. IT Rules (2021)
◦The Ministry for Electronics and IT has notified
Information Technology (Intermediary Guidelines and
Digital Media Ethics Code) Rules 2021. The rules have
been framed under the Information Technology Act, 2000
and will supersede the 2011 guidelines for internet
intermediaries.
3. ◦ Amidst growing concerns around lack of transparency, accountability and rights of users related
to digital media and after elaborate consultation with the public and stakeholders, the
Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021
has been framed in exercise of powers under section 87 (2) of the Information Technology Act,
2000 and in supersession of the earlier Information Technology (Intermediary Guidelines)
Rules 2011.
◦ While finalizing these Rules, both the Ministries of Electronics and Information Technology
and Ministry of Information and Broadcasting undertook elaborate consultations among
themselves in order to have a harmonious, soft-touch oversight mechanism in relation to social
media platform as well as digital media and OTT platforms etc.
◦ Part- II of these Rules shall be administered by Ministry of Electronics and IT, while Part-III
relating to Code of Ethics and procedure and safeguards in relation to digital media shall be
administered by the Ministry of Information and Broadcasting.
4. New Rules (who is covered)
◦ Who Is Covered?
The rules make a distinction between social media platforms based on the number of
users. The threshold of user base, yet to be notified, will determine whether an entity is a
social media intermediary or a significant social media intermediary. The latter will be
required to follow additional due diligence. For OTT and online news platforms, the rules
lay down an ethic s code that will be administered by the Ministry of Information and
Broadcasting.
5. The Digital India programme has now become a movement which is empowering common
Indians with the power of technology. The extensive spread of mobile phones, Internet etc. has
also enabled many social media platforms to expand their footprints in India. Common people
are also using these platforms in a very significant way. Some portals, which publish analysis
about social media platforms and which have not been disputed, have reported the following
numbers as user base of major social media platforms in India:
• WhatsApp users: 53 Crore
• YouTube users: 44.8 Crore
• Facebook users: 41 Crore
• Instagram users: 21 Crore
• Twitter users: 1.75 Crore
6. ◦ These social platforms have enabled common Indians to show their creativity, ask questions, be
informed and freely share their views, including criticism of the Government and its
functionaries. The Government acknowledges and respects the right of every Indian to criticize
and disagree as an essential element of democracy. India is the world’s largest open Internet
society and the Government welcomes social media companies to operate in India, do business
and also earn profits. However, they will have to be accountable to the Constitution and laws of
India.
◦ Proliferation of social media, on one hand empowers the citizens then on the other hand gives
rise to some serious concerns and consequences which have grown manifold in recent years.
These concerns have been raised from time to time in various forums including in the
Parliament and its committees, judicial orders and in civil society deliberations in different
parts of country. Such concerns are also raised all over the world and it is becoming an
international issue.
7. ◦ Of late, some very disturbing developments are observed on the social media platforms. Persistent spread
of fake news has compelled many media platforms to create fact-check mechanisms. Rampant abuse of
social media to share morphed images of women and contents related to revenge porn have often
threatened the dignity of women. Misuse of social media for settling corporate rivalries in blatantly
unethical manner has become a major concern for businesses. Instances of use of abusive language,
defamatory and obscene contents and blatant disrespect to religious sentiments through platforms are
growing.
◦ Over the years, the increasing instances of misuse of social media by criminals, anti-national elements
have brought new challenges for law enforcement agencies. These include inducement for recruitment of
terrorists, circulation of obscene content, spread of disharmony, financial frauds, incitement of violence,
public order etc.
◦ It was found that currently there is no robust complaint mechanism wherein the ordinary users of social
media and OTT platforms can register their complaint and get it redressed within defined timeline. Lack of
transparency and absence of robust grievance redressal mechanism have left the users totally dependent on
the whims and fancies of social media platforms. Often it has been seen that a user who has spent his time,
energy and money in developing a social media profile is left with no remedies in case that profile is
restricted or removed by the platform without giving any opportunity to be heard.
8. Salient Features
Guidelines Related to Social Media to Be Administered by Ministry of Electronics and IT:
Due Diligence To Be Followed By Intermediaries: The Rules prescribe due diligence that must be followed
by intermediaries, including social media intermediaries. In case, due diligence is not followed by the
intermediary, safe harbour provisions will not apply to them.
Grievance Redressal Mechanism: The Rules seek to empower the users by mandating the intermediaries,
including social media intermediaries, to establish a grievance redressal mechanism for receiving resolving
complaints from the users or victims. Intermediaries shall appoint a Grievance Officer to deal with such
complaints and share the name and contact details of such officer. Grievance Officer shall acknowledge the
complaint within twenty four hours and resolve it within fifteen days from its receipt.
Ensuring Online Safety and Dignity of Users, Specially Women Users: Intermediaries shall remove or
disable access withing 24 hours of receipt of complaints of contents that exposes the private areas of
individuals, show such individuals in full or partial nudity or in sexual act or is in the nature of impersonation
including morphed images etc. Such a complaint can be filed either by the individual or by any other person on
his/her behalf.
9. • Two Categories of Social Media Intermediaries: To encourage innovations and enable growth of new
social media intermediaries without subjecting smaller platforms to significant compliance requirement, the
Rules make a distinction between social media intermediaries and significant social media intermediaries.
This distinction is based on the number of users on the social media platform. Government is empowered to
notify the threshold of user base that will distinguish between social media intermediaries and significant
social media intermediaries. The Rules require the significant social media intermediaries to follow certain
additional due diligence.
• Additional Due Diligence to Be Followed by Significant Social Media Intermediary:
• Appoint a Chief Compliance Officer who shall be responsible for ensuring compliance with the Act and Rules.
Such a person should be a resident in India.
• Appoint a Nodal Contact Person for 24x7 coordination with law enforcement agencies. Such a person shall be a
resident in India.
• Appoint a Resident Grievance Officer who shall perform the functions mentioned under Grievance Redressal
Mechanism. Such a person shall be a resident in India.
• Publish a monthly compliance report mentioning the details of complaints received and action taken on the
complaints as well as details of contents removed proactively by the significant social media intermediary.
• Significant social media intermediaries providing services primarily in the nature of messaging shall
enable identification of the first originator of the information that is required only for the purposes of prevention,
detection, investigation, prosecution or punishment of an offence related to sovereignty and integrity of India, the
security of the State, friendly relations with foreign States, or public order or of incitement to an offence relating to
the above or in relation with rape, sexually explicit material or child sexual abuse material punishable with
imprisonment for a term of not less than five years
10. • Intermediary shall not be required to disclose the contents of any message or any other information to the first
originator.
• Significant social media intermediary shall have a physical contact address in India published on its website or mobile
app or both.
• Voluntary User Verification Mechanism: Users who wish to verify their accounts voluntarily shall be provided an
appropriate mechanism to verify their accounts and provided with demonstrable and visible mark of verification.
• Giving Users An Opportunity to Be Heard: In cases where significant social media intermediaries removes or disables
access to any information on their own accord, then a prior intimation for the same shall be communicated to the user
who has shared that information with a notice explaining the grounds and reasons for such action. Users must be provided
an adequate and reasonable opportunity to dispute the action taken by the intermediary.
• Removal of Unlawful Information: An intermediary upon receiving actual knowledge in the form of an order by
a court or being notified by the Appropriate Govt. or its agencies through authorized officer should not host or
publish any information which is prohibited under any law in relation to the interest of the sovereignty and
integrity of India, public order, friendly relations with foreign countries etc.
• The Rules will come in effect from the date of their publication in the gazette, except for the additional due
diligence for significant social media intermediaries, which shall come in effect 3 months after publication of
these Rules.
11. • Code of Ethics for online news, OTT platforms and digital media: This Code of Ethics prescribe the guidelines to be followed by
OTT platforms and online news and digital media entities.
• Self-Classification of Content: The OTT platforms, called as the publishers of online curated content in the rules, would self-classify
the content into five age based categories- U (Universal), U/A 7+, U/A 13+, U/A 16+, and A (Adult). Platforms would be required to
implement parental locks for content classified as U/A 13+ or higher, and reliable age verification mechanisms for content
classified as “A”. The publisher of online curated content shall prominently display the classification rating specific to each content
or programme together with a content descriptor informing the user about the nature of the content, and advising on viewer description
(if applicable) at the beginning of every programme enabling the user to make an informed decision, prior to watching the programme.
• Publishers of news on digital media would be required to observe Norms of Journalistic Conduct of the Press Council of India and
the Programme Code under the Cable Television Networks Regulation Act thereby providing a level playing field between the
offline (Print, TV) and digital media.
• A three-level grievance redressal mechanism has been established under the rules with different levels of self-regulation.
• Level-I: Self-regulation by the publishers;
• Level-II: Self-regulation by the self-regulating bodies of the publishers;
• Level-III: Oversight mechanism.
• Self-regulation by the Publisher: Publisher shall appoint a Grievance Redressal Officer based in India who shall be responsible for
the redressal of grievances received by it. The officer shall take decision on every grievance received by it within 15 days.
• Self-Regulatory Body: There may be one or more self-regulatory bodies of publishers. Such a body shall be headed by a retired judge
of the Supreme Court, a High Court or independent eminent person and have not more than six members. Such a body will have to
register with the Ministry of Information and Broadcasting. This body will oversee the adherence by the publisher to the Code of
Ethics and address grievances that have not be been resolved by the publisher within 15 days.
• Oversight Mechanism: Ministry of Information and Broadcasting shall formulate an oversight mechanism. It shall publish a charter
for self-regulating bodies, including Codes of Practices. It shall establish an Inter-Departmental Committee for hearing grievances.
12. Compliance of Social Media Platforms
All social media intermediaries will have to up their due diligence standards. Their privacy policy, agreements will have
to inform users to not upload, publish, share information that is defamatory, obscene, patently false or misleading, etc.
They’ll need to set up a grievance redressal mechanism for resolving user complaints. A grievance officer must be
appointed to acknowledge the complaint within 24 hours and resolve it within 15 days from its receipt. In case due
diligence is not followed by the intermediary, safe harbour provisions under the IT Act will not apply to it.
They’ll also have to take down unlawful information basis a court direction or a government agency’s order.
Significant social media intermediaries will need to do more. Pointing to the vast number of user base some social
media platforms enjoy, the ministry said they are no longer just intermediaries but often publishers of information.
13. And so, the rules make way for a user threshold, which is yet to be
specified. If a platform crosses that threshold, it’ll have to:
Appoint a resident nodal contact person for 24x7 coordination with
law enforcement agencies.
Appoint a resident grievance officer.
Publish a monthly compliance report detailing the complaints received,
action taken on the complaints, contents removed proactively by the
significant social media intermediary.
14. Is That it
◦ No.
There’s more for social media intermediaries who provide messaging services. These will need to
enable identification of the first originator of the information for the purposes of:
Prevention, detection, investigation, prosecution or punishment of an offence related to
sovereignty and integrity of India, the security of the state, friendly relations with foreign states.
Public order or of incitement to an offence relating to the above or in relation with rape, sexually
explicit material or child sexual abuse material punishable with imprisonment for a term of not
less than five years.
These platforms, however, will not be required to disclose the contents of any message or any
other information of the first originator.
15. Ethics Code for Digital News
OTT Players OTT platforms will need to self-classify content into five age-based categories —
U (Universal), U/A 7+, U/A 13+, U/A 16+, and A (Adult). They’ll be required to implement
parental locks for certain content and display the rating for all programming. Publishers of
news on digital media would be required to observe norms of journalistic conduct of the Press
Council of India and the programme code under the Cable Television Networks Regulation Act,
similar to their print and TV peers.
16. Experts Views
◦ While the fine print of the rules is yet to be made public, some experts said regulation of OTT and
news media platforms through proxy is grossly unconstitutional. “This oversight mechanism [ethics
code] is being created without any clear legislative backing and will now increasingly perform
functions similar to those played by the Ministry of Information and Broadcasting for TV regulation,”
Internet Freedom Foundation has said in its preliminary commentary on the rules. The purview of the
Information Technology Act, 2000, it has said, does not extend to news media, and so the guidelines
do not have the legislative backing to regulate such platforms. The other big concern is that the rules
have introduced a traceability framework for messaging platforms such as WhatsApp, Telegram,
Signal, among others.
17. ◦ The regulations will be applicable even to platforms which may not have a physical
presence in India but are conducting business activity in India by targeting Indian
consumers, Rajat Prakash, managing partner at Athena Legal, said in an emailed statement.
The new rules have introduced the requirement of traceability which would break end-to-
end encryption. In its commentary, IFF has stated that previous proposals that sought to
implement traceability in a manner which is compatible with end-to-end encryption have
been shown to be vulnerable to spoofing where bad actors can falsely modify the
originator information to frame an innocent person.
“Without thought or involving technical experts in an open consultative process, without
any data protection law or surveillance reform, this is being tinkered with by introducing
the requirement of “traceability.”