<?xml version="1.0" encoding="UTF-8"?>
<rss  xmlns:atom="http://www.w3.org/2005/Atom" 
      xmlns:media="http://search.yahoo.com/mrss/" 
      xmlns:content="http://purl.org/rss/1.0/modules/content/" 
      xmlns:dc="http://purl.org/dc/elements/1.1/" 
      version="2.0">
<channel>
<title>pranesh.in</title>
<link>https://pranesh.in/scholarly.html</link>
<atom:link href="https://pranesh.in/scholarly.xml" rel="self" type="application/rss+xml"/>
<description></description>
<generator>quarto-1.9.36</generator>
<lastBuildDate>Fri, 21 Jun 2024 00:00:00 GMT</lastBuildDate>
<item>
  <title>Internet blocking and shutdowns in India and international human rights law</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/articles/internet-blocking-and-shutdowns-in-india-and-international-human-rights-law.html</link>
  <description><![CDATA[ 






<section id="introduction" class="level2" data-number="1">
<h2 data-number="1" class="anchored" data-anchor-id="introduction"><span class="header-section-number">1</span> Introduction</h2>
<div data-align="right">
<p><em>पुरुषस्य वाग्रसो</em></p><em>
<p><br>Puruṣasya vāgraso</p>
<p><br>“Speech is the essence of human beings”</p>
</em><p><em></em></p>
<p><br>– Chāndogya Upaniṣad, 1.1.2</p>
</div>
<p>The advent of the Internet has allowed for the communication of speech and expression at an unprecedented scale and speed.</p>
<p>In India, for instance, more people now have the opportunity to speak to a larger audience via the Internet than ever did via print, radio, television, and all other media combined in all the decades since Independence. Such rapid democratization of speech amplifies tensions that are inherent in freedom of speech, freedom of assembly, and the right to privacy.</p>
<p>Restrictions on speech, especially in the form of social sanction, are as old as speech itself. However, in liberal democracies, limitations are placed by constitutional principles, as also by socio-cultural norms, on what restrictions may be placed on expressive freedoms. Through a few different laws, the Indian government and the courts have granted themselves—and through laws such as the Intermediary Guidelines Rules, the general public as well—the power to regulate online speech, which has often taken the form of shutting down of Internet access and blocking entire websites.</p>
<p>International human rights law (IHRL), which has developed since World War II, seeks to restrict the principle of sovereignty to the extent that a country’s domestic laws and practices fall afoul of international norms around human rights <sup>1</sup>. This paper seeks to look at whether IHRL provides a valuable and usable framework for looking at the regime of Internet blocking and filtering in India.</p>
<p>In order to do so, the paper first looks at the laws surrounding website blocking and Internet shutdowns in India, sketching out a brief history of website blocking and Internet shutdowns in India. After that, we explore the applicability of IHRL in India and the extent to which international norms can be applied to the domestic situation in India. Thereafter, we examine the IHRL related to Internet filtering and shutdowns and see where Indian courts have failed short of apply these standards. The paper concludes by noting the challenges in applying IHRL in relation to Internet filtering and shutdowns in India and proposes potential steps that could be taken.</p>
<section id="laws-relating-to-blocking-and-internet-shutdowns-in-india" class="level3" data-number="1.1">
<h3 data-number="1.1" class="anchored" data-anchor-id="laws-relating-to-blocking-and-internet-shutdowns-in-india"><span class="header-section-number">1.1</span> Laws Relating to Blocking and Internet Shutdowns in India</h3>
<p>There are, and have been, several bases for Internet shutdowns in India, including:</p>
<ol type="1">
<li>Section 144 of the Criminal Procedure Code;</li>
<li>Section 5 of the Telegraph Act, 1885, read with the Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017;</li>
<li>Sections 20 and 21 of the Telecommunications Act, 2023 (yet to be notified);</li>
<li>State-level Police Acts.</li>
</ol>
<p>Similarly, multiple legal provisions have been claimed for website blocking in India:</p>
<ol type="1">
<li>Section 67 of the (unamended) IT Act, 2000, read with Gazette Notification no. GSR. 181(E), dated February 27, 2003;</li>
<li>Indian Copyright Act;</li>
<li>The Civil Procedure Code and courts’ inherent powers;</li>
<li>Section 69A of the IT Act, 2000 (as amended in 2008), read with the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009;</li>
<li>Section 79(3)(b) of the IT Act;</li>
<li>State-level Police Acts.</li>
</ol>
<p>It is not always clear what each provision is meant to cover. For instance, while the Telegraph Act is legally used for Internet shutdowns, and Section 69A of the IT Act is legally used to block access to thousands of specific websites and hundreds of mobile apps, the plain reading of the provisions doesn’t make it apparent why this should be so. Provisions relating to intermediary liability, thanks to some judgments, may also be used in conjunction with a court order to block websites. Thus, there’s a lot of ambiguity in the way that the laws are interpreted and applied. Some of these legal bases have been created by legislatures specifically for the purposes of blocking websites and access to the Internet, while others were evolved by the higher judiciary, and yet others evolved by police and magistrates.</p>
<section id="history-of-website-blocking-in-india" class="level4" data-number="1.1.1">
<h4 data-number="1.1.1" class="anchored" data-anchor-id="history-of-website-blocking-in-india"><span class="header-section-number">1.1.1</span> History of Website Blocking in India</h4>
<section id="blocking-before-69a" class="level5" data-number="1.1.1.1">
<h5 data-number="1.1.1.1" class="anchored" data-anchor-id="blocking-before-69a"><span class="header-section-number">1.1.1.1</span> Blocking Before 69A</h5>
<p>The Information Technology Act, as passed in 2000, did not contain any provisions relating to governmental blocking or filtering of the Internet. However, that did not prevent citizens from seeking blocking of Internet content, the government from blocking websites, nor the court from ordering website blocks <span class="citation" data-cites="chimaRegulationInternet2008">(Chima 2008)</span>. During the Kargil War, the only Internet service provider (ISP) in India at that time—Videsh Sanchar Nigam Limited (VSNL)—blocked access to the website of the Pakistani newspaper <em>Dawn</em> <span class="citation" data-cites="chimaRegulationInternet2008">(Chima 2008, 50–52)</span>, and had prior to that, blocked access by some subscribers to the Middle Eastern Socialist Network (MESN). When the blocking of the MESN was noticed and challenged in the Delhi High Court, VSNL did not deny it, but said they were empowered by the Telegraph Act. That writ petition seems to eventually have disappeared into judicial limbo, with circumstances having changed but no verdict having been pronounced <span class="citation" data-cites="chimaRegulationInternet2008">(Chima 2008, 51)</span>.</p>
<p>Eventually, in 2003, a government notification was published by the Department of Information Technology, under section 88 read with section 67 (on obscenity), which enabled the Indian Computer Emergency Response Team (CERT-In) to block websites “after verifying the authenticity of the complaint and after satisfying that action of blocking of website is absolutely essential” <span class="citation" data-cites="ministryofelectronicsandinformationtechnologygovernmentofindiaITAct2003">(IT Act Notification No 181 2003)</span>. Interestingly, section 67 of the IT Act did not provide for blocking of websites, nor did GSR 181(E) limit itself to the blocking of obscene material. Clearly, the government felt there was some inherent, unenumerated power to block websites, in addition to what powers had been delegated by Parliament.<sup>2</sup></p>
<p>In August 2005, an expert committee constituted for this purpose, working in part on the recommendations of an “Inter-Ministerial Working Group on Cyber Laws &amp; Cyber Forensics” <span class="citation" data-cites="ministryofcommunicationsanditDITSets2005">(Ministry of Communications and IT 2005)</span>, in turn recommended multiple amendments to to IT Act <span class="citation" data-cites="expertcommitteeonamendmentstotheitact2000ReportExpert2005">(Expert Committee on Amendments to the IT Act 2000 2005)</span>. However, there was no recommendation for a provision relating to blocking of websites or Internet shutdowns.</p>
<p>Based on the recommendations of the expert committee, the Information Technology (Amendment) Bill was introduced in the Lok Sabha on December 15, 2006. While this did mention a source of international soft norms (the United Nations Commission on International Trade’s Model Law on Electronic Commerce), it did not include section 69A, and the only reference to “remov[ing] or disabl[ing] access to [] material [being used to commit an unlawful act]” on a computer resource, was section 79(3)(b), which dealt with intermediary liability. The Parliamentary Standing Committee that studied the Bill and provided its recommendations did not raise the issue of Internet blocking or content removal.</p>
<p>However, in the amendments that were introduced in the Lok Sabha on December 16, 2008, section 69A, in its current form, was present. Eventually, amidst din in both the Lok Sabha and the Rajya Sabha, the IT (Amendment) Act, 2008, was passed by voice vote, without any discussion.<sup>3</sup></p>
</section>
<section id="internet-shutdowns" class="level5" data-number="1.1.1.2">
<h5 data-number="1.1.1.2" class="anchored" data-anchor-id="internet-shutdowns"><span class="header-section-number">1.1.1.2</span> Internet Shutdowns</h5>
<p>It is unclear when the first Internet shutdown order was passed in India. However, on January 26, 2012, a news report noted that “Mobile phone and portable Internet services were shut down from 9 AM till noon to ensure that no electronically controlled remote control devices were operated by militants.” <span class="citation" data-cites="ptiRDayMobile2012">(PTI 2012)</span> That same report also seemed to suggest that this was a regular occurrence: “These services remain shut on Republic Day and Independence Day after militants used a mobile phone to trigger a bomb blast outside Bakshi Stadium in 2005.” <span class="citation" data-cites="ptiRDayMobile2012">(PTI 2012)</span> In August 2012, in multiple cities in India, including Bengaluru and Hyderabad, bulk SMS facilities (sending text messages to more than five people) were prohibited by the government when there was a mass panic amongst people from the North-East of India, based on rumours that circulated over SMS, Facebook, etc. At that time, a number of individual websites were blocked <span class="citation" data-cites="prakashAnalysingLatest2012a">(Prakash 2012)</span>. However, the government ruled out the option of blocking entire social media websites, despite requests by some members of parliament that they do so <span class="citation" data-cites="chaturvediFiveArrested2012">(Chaturvedi 2012)</span>. Nor, importantly, did the government shut down the Internet.</p>
<p>In the years since, especially after its use in 2015 during protests in Gujarat <span class="citation" data-cites="munjalIndiaAre2021">(Munjal 2021)</span>, Internet shutdowns have become increasingly frequent and have been ordered for a variety of reasons, including in advance of protests and school/job examinations <span class="citation" data-cites="timesnewsnetworkNoMore2018">(Times News Network 2018)</span>. There have also been prolonged shutdowns, as was the case in Jammu &amp; Kashmir <span class="citation" data-cites="munjalIndiaAre2021">(Munjal 2021)</span>.</p>
</section>
</section>
<section id="provisions-under-the-it-act-telegraph-act-and-other-laws" class="level4" data-number="1.1.2">
<h4 data-number="1.1.2" class="anchored" data-anchor-id="provisions-under-the-it-act-telegraph-act-and-other-laws"><span class="header-section-number">1.1.2</span> Provisions under the IT Act, Telegraph Act, and Other Laws</h4>
<section id="website-blocking" class="level5" data-number="1.1.2.1">
<h5 data-number="1.1.2.1" class="anchored" data-anchor-id="website-blocking"><span class="header-section-number">1.1.2.1</span> Website Blocking</h5>
<p>It is worth quoting section 69A fully:</p>
<blockquote class="blockquote">
<p>69A. Power to issue directions for blocking for public access of any information through any computer resource.–</p>
<blockquote class="blockquote">
<ol type="1">
<li>Where the Central Government or any of its officers specially authorised by it in this behalf is satisfied that it is necessary or expedient so to do, in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above, it may subject to the provisions of sub-section (2), for reasons to be recorded in writing, by order, direct any agency of the Government or intermediary to block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource.</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<ol start="2" type="1">
<li>The procedure and safeguards subject to which such blocking for access by the public may be carried out, shall be such as may be prescribed.</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<ol start="3" type="1">
<li>The intermediary who fails to comply with the direction issued under sub-section (1) shall be punished with an imprisonment for a term which may extend to seven years and also be liable to fine.</li>
</ol>
</blockquote>
</blockquote>
<p>The scope of Section 69A is very wide. The provision itself does not speak of the Internet; instead, it talks of government agencies or intermediaries being ordered to “block for access by the public or cause to be blocked for access by the public any information generated, transmitted, received, stored or hosted in any computer resource.” However, the language does seem to suggest that it refers to specific information available over the Internet, since it has to be accessible to “the public”—which requirement a private network, even a large one, presumably, wouldn’t satisfy. While some have argued that the power to block Internet access can be found within Section 69A <span class="citation" data-cites="hariharanLegalValidity2015">(Hariharan and Baruah 2015)</span>, others have argued that it isn’t clear whether Section 69A can cover Internet shutdowns <span class="citation" data-cites="softwarefreedomlawcentreInternetShutdowns2021">(Software Freedom Law Centre 2021)</span>. The Rules drafted under Section 69A don’t seem to contemplate Internet shutdowns since they require the Designated Officer to contact the person or intermediary who has <em>hosted</em> the contentious information, and not just transmitted it.<sup>4</sup> In 2020, the Supreme Court of India held that “The aim of the section [69A] is not to restrict/block the internet as a whole, but only to block access to particular websites on the internet. Recourse cannot, therefore, be made by the Government to restrict the internet generally under this section.” <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶ 81)</span>.</p>
<p>In 2009, the Information Technology (Procedure and Safeguards for Blocking for Access of Information By Public) Rules (“Blocking Rules”) were notified. The Blocking rules broadly modelled on the procedure laid down by the Supreme Court in the PUCL v. Union of India for phone tapping <span class="citation" data-cites="PUCLUnion1996">(<em>PUCL v. Union of India</em> 1996)</span>, which were in turn incorporated into Rule 419A of the Telecom Rules in 1999, which was subsequently amended in 2007 and 2014. The Blocking Rules allow any person to make a request to a ‘Nodal Officer’, which if approved by the Chief Secretary of the state (or if the blocking request is made <em>suo motu</em> by the Nodal Officer), shall be forwarded to a “Designated Officer” (“DO”, currently, the head of CERT-In). The DO places this before a committee. The DO also identifies the person/intermediary hosting the content, and issues notice for them to make a representation to committee within 48 hours regarding the content. The committee must then rule on whether the request is justifiable under Section 69A and give specific recommendations in writing, which in turn are to be reviewed by the Secretary of the Department of Information Technology. While Section 69A itself doesn’t consider court orders, the Blocking Rules state that a court order for blocking shall be enforced by the DO. There are also procedures noted for emergency blocking, which would have to be placed before the committee for its consideration within 48 hours.</p>
<p>The provisions that protect Internet intermediaries from liability have also, paradoxically, been used to block websites. Section 79(1) and (2) provide broad protections for Internet intermediaries from liability and list conditions they must satisfy for such protection to apply. Thereafter, Section 79(3) states:</p>
<blockquote class="blockquote">
<p>79(3): The provisions of sub-section (1) shall not apply if–<br>
… (b) upon receiving actual knowledge, or on being notified by the appropriate Government or its agency that any information, data or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit the unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.<br>
…</p>
</blockquote>
<p>It’s quite clear that Section 79(3) doesn’t by itself grant the government the power to block websites. It merely provides that the exemption from liability that is provided to intermediaries under Section 79(1) <em>would not apply</em> in case an intermediary fails to “expeditiously remove or disable access” to material “being used to commit the unlawful act” as notified by the government. Thus, one way to interpret the provision would be: if an intermediary fails to disable access to specific content as directed by the government under Section 69A, it will lose its protection from liability for that specific content. However, that interpretation was rejected when this provision was used as the basis for the Intermediary Guidelines Rules, 2011, which empowered members of the public to use the Rules to require intermediaries to remove content (which was partially struck down by the Supreme Court <span class="citation" data-cites="ShreyaSinghal">(<em>Shreya Singhal v. Union of India</em>, n.d.)</span>), and the Intermediary Guidelines Rules, 2021 and the Intermediary Guidelines Rules 2023, both of which, again, empowered the public to require content removal, though on more limited grounds <span class="citation" data-cites="IntermediaryGuidelines2021">(Intermediary Guidelines and Digital Media Ethics Code Rules 2021, Rule 5)</span>. The 2021 and 2023 Rules also have provisions for blocking of information “in case of emergency” (Rule 16), as well as provisions (Rule 15) for the Ministry of Information and Broadcasting to impose content blocking orders upon online news and current affairs content publishers and online curated content publishers (which is meant to cover companies like Netflix and Hotstar), despite such powers not being granted explicitly under Section 79. The grounds for ordering the deletion or modification of content are the prevention of “incitement to the commission of a cognisable offence relating to public order”, and the grounds for ordering the blocking of content are those laid down in Section 69A of the IT Act.</p>
<p>The 2011 Rules allowed for a completely opaque system of content removal that in effect provided for “invisible censorship” <span class="citation" data-cites="prakashInvisibleCensorship2011">(Prakash 2011b)</span>. Though the Supreme Court struck down the portion of the 2011 Rules that provided the ability for individuals to request that intermediaries remove or disable access to content, they still enabled the government to require intermediaries to remove or disable content under Section 79. The court didn’t clarify the consequences of an intermediary failing to implement the Intermediary Guidelines Rules—which also require intermediaries to modify their terms of service.</p>
<p>Though Section 69A remains the only provision that explicitly empowers the government to block content online, as per my analysis of informally collated ISP blocklists, the largest category among websites blocked in India is court-ordered blocking through interim ‘John Doe’ orders under the Copyright Act, even without formal findings of infringement. The Copyright Act doesn’t by itself permit website blocking, and indeed scholars have argued that the courts have misused their powers in blocking websites in such a manner <span class="citation" data-cites="padmanabhanCanJudges2014a padmanabhanCanJudges2014b">(Padmanabhan 2014a, 2014b)</span>.</p>
</section>
</section>
<section id="internet-shutdowns-1" class="level4" data-number="1.1.3">
<h4 data-number="1.1.3" class="anchored" data-anchor-id="internet-shutdowns-1"><span class="header-section-number">1.1.3</span> Internet Shutdowns</h4>
<p>Before 2017, there were no clear provisions for shutting down Internet access. When the government did so, it was usually done by District Magistrates using the powers under Section 144 of the Criminal Procedure Code <span class="citation" data-cites="munjalIndiaAre2021">(Munjal 2021)</span>, which enable a District Magistrate, a Sub-Divisional Magistrate, or an Executive Magistrate specially empowered by the state government in this behalf, to order a person to take an action “with respect to certain property in his possession or under his management”, if the Magistrate “considers that such direction is likely to prevent, or tends to prevent, obstruction, annoyance or injury to any person lawfully employed, or danger to human life, health or safety, or a disturbance of the public tranquility, or a riot, of an affray.” It is apparent that this provision doesn’t enable Internet shutdowns, at least not for the reasons and in the manner that various governments were using them <span class="citation" data-cites="softwarefreedomlawcentreLegalityInternet2016 bhardwajRisingInternet2020">(Software Freedom Law Centre 2016; Bhardwaj et al. 2020)</span>.</p>
<p>The Temporary Suspension of Telecom Services (Public Emergency or Public Safety) Rules, 2017 (“Suspension Rules”, hereinafter)—which allow the union and state governments to order temporary shutdown of the Internet due to a public emergency or for public safety—derive their power from section 7 of the Indian Telegraph Act, 1885. These Rules empower only a Home Secretary to order Internet shutdowns, via orders that lay down clear reasons, and only in cases where “necessary” or “unavoidable” due to a “public emergency” or “in the interest of public safety”. Any order passed by the Home Secretary must be sent to a Review Committee within 24 hours, and that committee must accept or revoke the Home Secretary’s order within five days.</p>
<p>Even the passing of the Suspension Rules has not prevented the misuse of Section 144 of the Criminal Procedure Code for carrying out Internet shutdowns <span class="citation" data-cites="munjalIndiaAre2021">(Munjal 2021)</span>. Investigations have shown that a state had ordered an Internet shutdown without having constituted the necessary committee under the Suspension Rules <span class="citation" data-cites="softwarefreedomlawcentreRTIApplication2022">(Software Freedom Law Centre 2022a)</span>, and even uncovered an instance where “during the citizenship law protests in December 2019, the order to cut off the internet in Delhi was issued by the deputy commissioner of police–who is neither a home secretary nor a district magistrate.” <span class="citation" data-cites="munjalIndiaAre2021">(Munjal 2021)</span>. In <em>Faheema Shirin</em> <span class="citation" data-cites="FaheemaShirin2019">(<em>Faheema Shirin R.K. v. State of Kerala</em> 2019, this case will be discussed in detail in Section 2.4.9 of this paper)</span>, which concerned restrictions put on Internet access within a girls’ hostel, the Kerala High Court held the right to access the Internet to be a fundamental right. In 2020, in the case of <em>Anuradha Bhasin</em>, wherein a newspaper editor from Kashmir challenged the arbitrary shutdown of Internet, the Supreme Court held that any restriction on Internet access by the government must be temporary, limited in scope, lawful, necessary and proportionate, and transparent <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, this case will be discussed in greater detail in Section 2.4.4.3 of this paper)</span>.</p>
<p>In 2023, Parliament passed the Telecommunications Act, which repeals the Indian Telegraph Act, but saves existing rules including the Suspension Rules, unless they are superseded. Sections 20 and 21 of the Telecommunications Act provide for suspension of telecommunications services (including Internet services). Section 20 of the Telecommunications Act is largely similar to Section 5 of the Telegraph Act, though it even more clearly allows for suspension of Internet services. The Telecommunications Act hasn’t yet been notified, and thus isn’t yet in effect.</p>
</section>
</section>
</section>
<section id="international-human-rights-law" class="level2" data-number="2">
<h2 data-number="2" class="anchored" data-anchor-id="international-human-rights-law"><span class="header-section-number">2</span> International Human Rights Law</h2>
<section id="applicability-of-ihrl-in-india" class="level3" data-number="2.1">
<h3 data-number="2.1" class="anchored" data-anchor-id="applicability-of-ihrl-in-india"><span class="header-section-number">2.1</span> Applicability of IHRL in India</h3>
<p>India was a founding member of the United Nations, having signed the Declaration by United Nations at Washington in January 1942 <span class="citation" data-cites="rajanIndiaMaking1973">(Rajan 1973, 430)</span>, and having participated in the UN Conference of International Organization at San Francisco from 25 April to 26 June 1945 <span class="citation" data-cites="mohanIndiaUnited2013">(Mohan 2013)</span>. On June 26, 1945, India was among 50 countries to sign the UN Charter, which it joined after ratifying the Charter on October 30, 1945 <span class="citation" data-cites="rajanIndiaMaking1973">(Rajan 1973, 430)</span>.</p>
<p>India participated actively in the drafting of the Universal Declaration of Human Rights and has ratified six of the nine key international human rights treaties,<sup>5</sup> including the International Covenant on Civil and Political Rights (ICCPR). India was also a member of the former UN Commission on Human Rights since its inception in 1947, and after the Commission was replaced by the Human Rights Council (UNHRC) in 2006, India has been elected to UNHRC five times, with the latest stint being from 2019–2022 <span class="citation" data-cites="ministryofexternalaffairsindiaIndiaUnited2020">(Ministry of External Affairs, India 2020)</span>. Thus, it’s clear that India has been a keen participant in and supporter of the international human rights regime.</p>
<p>When it comes to the applicability of international human rights law, as with all international law, three important questions arise: (a) who has the power to bind India to international commitments: the Parliament or the executive?; (b) can international treaty obligations be enforced in India in the absence of a law specifically incorporating such obligations or of specific executive actions (such as ratification of a treaty); (c) can international human rights law be enforced even in the absence of a specific treaty?</p>
<p>The Constitution of India refers to international law and treaties in Article 51, as part of the Directive Principles of State Policy.<sup>6</sup> Under India’s Constitution, specifically, Article 246 read with entries 10–14 of the Union List, the power to enter into international treaties and to implement them domestically, along with the power to implement decisions undertaken at international bodies, lies with the Parliament. Furthermore, Article 253 clarifies that this is the case even for matters that are domestically within the legislative competence of state governments. However, Article 73 of the Indian Constitution has been interpreted to mean that the executive has the same powers as Parliament in terms of entering into binding international obligations and enforcing them <span class="citation" data-cites="chandraIndiaInternational2017">(Chandra 2017, 32–34)</span>. This has thus resulted in what one scholar terms “formal monism, functional dualism” <span class="citation" data-cites="chandraIndiaInternational2017">(Chandra 2017)</span>.</p>
<p>Traditionally, this was understood by Indian jurists, as Justice Krishna Iyer put it in <em>Jolly George v. Bank of Cochin</em> (1980), that “until the municipal Law is changed to accommodate the [treaty], what binds the courts is the former not the latter.” However, this understanding was upended by the Supreme Court engaging in judicial activism in the form of judicial interpretation, and granting itself the power to directly incorporate international law into domestic law, even from conventions that India is not a party to, as long as the law is not in contravention of any specific domestic law <span class="citation" data-cites="chandraIndiaInternational2017">(Chandra 2017, pt. 4.2)</span>. This expansion happened through series of cases: <em>Gramophone Company of India v. Birendra Bahadur Pandey</em> (1984), <em>M.V. Elisabeth v Harwan Investment and Trading</em> (1992), <em>Vellore Citizens Welfare Forum v. Union of India</em> (1996), <em>People’s Union for Civil Liberties v. Union of India</em> (1997), <em>Vishaka v. State of Rajasthan</em> (1998), <em>State of West Bengal v. Kesoram Industries Ltd</em> (2004), <em>Kuldip Nayar v. Union of India</em> (2006), and others <span class="citation" data-cites="chandraIndiaInternational2017">(Chandra 2017, pt. 4.2)</span>.</p>
<p>Notably, some Indian human rights statutes themselves refer to international covenants. The Protection of Human Rights Act, 1993, for instance, provides an explicit reference to international covenants such as the ICCPR via its definition of the term “human rights”<sup>7</sup></p>
<blockquote class="blockquote">
<p>2(d) “human rights” means the rights relating to life, liberty, equality and dignity of the individual guaranteed by the Constitution or embodied in the International Covenants and enforceable by courts in India;</p>
<p>2(f) “International Covenants” means the International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights adopted by the General Assembly of the United Nations on the 16th December, 1966 and such other Covenant or Convention adopted by the General Assembly of the United Nations as the Central Government may, by notification, specify.</p>
</blockquote>
<p>That a covenant like the ICCPR applies to all state parties is underscored by the UN Human Rights Committee’s General Comment 31, which states: “The obligations of the [ICCPR] in general and article 2 in particular are binding on every State party as a whole. All branches of government (executive, legislative and judicial), and other public or governmental authorities, at whatever level – national, regional or local are in a position to engage the responsibility of the State party.” <span class="citation" data-cites="unhumanrightscommitteeGeneralComment2004">(UN Human Rights Committee 2004, para. 4)</span></p>
<p>While some scholars have seen the incorporation of international law and norms into Indian jurisprudence as a part of the “strategic choice for national courts determined to protect their own authority and to reclaim domestic democratic processes” <span class="citation" data-cites="benvenistiReclaimingDemocracy2008">(Benvenisti 2008)</span>, it could also be seen as ad-hoc and haphazard.<sup>8</sup></p>
</section>
<section id="sources-of-ihrl" class="level3" data-number="2.2">
<h3 data-number="2.2" class="anchored" data-anchor-id="sources-of-ihrl"><span class="header-section-number">2.2</span> Sources of IHRL</h3>
<p>The sources of international human rights law, including as it relates to the freedoms of opinion, expression, assembly, and association, are varied and numerous <span class="citation" data-cites="jayawickramaJudicialApplication2002">(Jayawickrama 2002, chaps. 21–22)</span>.</p>
<p>As Toby Mendel notes, “The office of the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression is the only specialised UN mandate that focuses exclusively or even primarily on the fundamental right to freedom of expression.”<span class="citation" data-cites="mendelSpecialRapporteur2015">(2015)</span> Since 2011, successive UN Special Rapporteurs on freedom of expression have been focusing extensively on issues pertaining to digital censorship.</p>
<p>Another source of international standards on freedom of expression is the Joint Declarations that have been adopted annually since 1999 by the (originally three, but now four) special international mandates: the UN Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Cooperation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression, and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information.</p>
<p>Indian courts have also relied on the judgments of the European Court of Human Rights <span class="citation" data-cites="AnujGarg2007">(<em>Anuj Garg v. Hotel Association of India</em> 2007)</span>, European Court of Human Rights, the Court of Justice of the European Union and the Inter-American Court of Human Rights <span class="citation" data-cites="PuttaswamyUnion2017">(<em>Puttaswamy v. Union of India</em> 2017)</span>, along with national decisions of courts in the United Kingdom, United States of America, South Africa, and Canada.</p>
</section>
<section id="ihrl-related-to-website-blocking-and-internet-shutdowns" class="level3" data-number="2.3">
<h3 data-number="2.3" class="anchored" data-anchor-id="ihrl-related-to-website-blocking-and-internet-shutdowns"><span class="header-section-number">2.3</span> IHRL related to Website Blocking and Internet Shutdowns</h3>
<p>While website blocking and Internet shutdowns affect people’s civil and political rights as well as economic, social, and cultural rights, there have not been any significant pronouncements in terms of international human rights law on economic, social, and cultural rights impacts of website blocking and Internet shutdowns. Hence, in this paper, I look mainly at the two aspects of civil and political rights that have been the subject of international human rights law pronouncements: freedom of expression and freedom of assembly, association, and public participation.</p>
<section id="freedom-of-expression" class="level4" data-number="2.3.1">
<h4 data-number="2.3.1" class="anchored" data-anchor-id="freedom-of-expression"><span class="header-section-number">2.3.1</span> Freedom of Expression</h4>
<p>There are two main primary texts on the freedom of expression at the international level: the Universal Declaration of Human Rights (UDHR), and Article 19 of the International Covenant on Civil and Political Rights (ICCPR). Other relevant texts include Article 9 of the African (Banjul) Charter on Human and Peoples’ Rights; Article 10 of the European Convention on Human Rights; Article 11 of the Charter of Fundamental Human Rights of the European Union; Article IV of the American Declaration of the Rights and Duties of Man; Articles 13 and 14 of the American Convention on Human Rights; and Article 11 of the Convention on Human Rights and Fundamental Freedoms of the Commonwealth of Independent States <span class="citation" data-cites="martinInternationalHuman2006">(see, Martin et al. 2006, 750–53)</span>, Article 22 of the ASEAN Human Rights Declaration; and Article 21 of the 2021 Cairo Declaration of the OIC on Human Rights.</p>
<p>Article 19 of the UDHR,<sup>9</sup> and Article 19 of the ICCPR<sup>10</sup> provide for the freedom of opinion and expression. Article 29(2) of the UDHR,<sup>11</sup> and Article 19(3) of the ICCPR<sup>12</sup> provide for limitations on the freedom of expression.</p>
<p>In 2011, the UNHRC underscored the applicability of the ICCPR for online expression by noting that:</p>
<blockquote class="blockquote">
<p>Any restrictions on the operation of websites, blogs or any other internet-based, electronic or other such information dissemination system, including systems to support such communication, such as internet service providers or search engines, are only permissible to the extent that they are compatible with paragraph 3. Permissible restrictions generally should be content-specific; generic bans on the operation of certain sites and systems are not compatible with paragraph 3. It is also inconsistent with paragraph 3 to prohibit a site or an information dissemination system from publishing material solely on the basis that it may be critical of the government or the political social system espoused by the government <span class="citation" data-cites="unhumanrightscommitteeGeneralComment2011">(UN Human Rights Committee 2011, para. 43)</span>.</p>
</blockquote>
<p>And since 2012, the UNHRC has held across multiple resolutions that “the same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice, in accordance with articles 19 of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights.” <span class="citation" data-cites="unhumanrightscouncilResolution202012">(UN Human Rights Council 2012b)</span></p>
<p>Any restriction on freedom of expression, must, under international law, fulfil the three criteria laid down in Article 19(3) of the ICCPR: legality, legitimate objective, and necessity and proportionality.</p>
</section>
<section id="freedom-of-assembly-association-and-political-participation" class="level4" data-number="2.3.2">
<h4 data-number="2.3.2" class="anchored" data-anchor-id="freedom-of-assembly-association-and-political-participation"><span class="header-section-number">2.3.2</span> Freedom of Assembly, Association, and Political Participation</h4>
<p>The freedoms of assembly,<sup>13</sup> association<sup>14</sup> and political participation<sup>15</sup> are closely linked to one another as well as to the freedom of expression, opinion, and thought.</p>
<p>These rights apply online just as they do offline. In a recent report titled, “Ending Internet shutdowns: a path forward”, the Special Rapporteur on the rights to freedom of peaceful assembly and of association, Clément Nyaletsossi Voule, noted that,</p>
<blockquote class="blockquote">
<p>The right to access and use internet and other digital technologies for the purposes of peaceful assembly is protected under article 20 of the Universal Declaration of Human Rights and article 21 of the International Covenant on Civil and Political Rights. As indicated in general comment No.&nbsp;37 of the Human Rights Committee on Article 21: The Right to Peaceful Assembly, “[a]lthough the exercise of the right of peaceful assembly is normally understood to pertain to the physical gathering of persons, article 21 protection also extends to remote participation in, and organization of, assemblies, for example online.” This protection covers those activities associated with peaceful assemblies that “happen online or otherwise rely upon digital services,” including planning and organizing a gathering, mobilizing resources; disseminating information, preparing for and traveling to the event; communicating with other organizers and participants leading up to and during the assembly; monitoring or broadcasting the assembly. In turn, interference with such technologies can result in the violation of this fundamental freedom<span class="citation" data-cites="vouleEndingInternet2021">(Voule 2021, para. 8)</span>.</p>
</blockquote>
</section>
</section>
<section id="application-of-ihrl-principles-in-the-indian-context" class="level3" data-number="2.4">
<h3 data-number="2.4" class="anchored" data-anchor-id="application-of-ihrl-principles-in-the-indian-context"><span class="header-section-number">2.4</span> Application of IHRL Principles in the Indian Context</h3>
<section id="legality" class="level4" data-number="2.4.1">
<h4 data-number="2.4.1" class="anchored" data-anchor-id="legality"><span class="header-section-number">2.4.1</span> Legality</h4>
<p>Article 19 of the ICCPR, as well as Articles 20, 21, and 22, all require that restrictions be provided by law. In this section, it will be mostly Article 19 that is examined, but the same principle applies to the other articles as well.</p>
<p>The UN Human Rights Committee’s General Comment 34 notes the following requiresments for legality <span class="citation" data-cites="unhumanrightscommitteeGeneralComment2011">(UN Human Rights Committee 2011, paras. 24–25)</span>:</p>
<ul>
<li>Restrictions must be provided by law, which does not include restrictions enshrined in traditional, religious or other such customary law;</li>
<li>The law must be “formulated with sufficient precision to enable an individual to regulate his or her conduct accordingly”;</li>
<li>The law must be “made accessible to the public”;</li>
<li>The law may not “confer unfettered discretion for the restriction of freedom of expression on those charged with its execution”;</li>
<li>The law must “provide sufficient guidance to those charged with their execution to enable them to ascertain what sorts of expression are properly restricted and what sorts are not”;</li>
<li>The law “be compatible with the provisions, aims and objectives” of the ICCPR, apart from complying with Art. 19(3) of the ICCPR (on legitimate aims);</li>
<li>The law must “not violate the non-discrimination provisions” of the ICCPR;</li>
<li>The law must “not provide for penalties that are incompatible with the Covenant, such as corporal punishment.”</li>
</ul>
<p>Thus, the burden falls upon the legislature to lay down clear guidelines, which are not overly broad, for the executive as to when they may restrict freedom of expression. It is apparent that Section 5 of the Telegraph Act and Section 69A of the IT Act as well as Section 20 of the Telecommunications Act do not lay down clear guidelines, and indeed they confer upon the union government great discretion for the restriction of freedom of expression.</p>
<p>In the Supreme Court case of <em>K.A. Abbas v. Union of India</em> <span class="citation" data-cites="AbbasUnion">(<em>K.A. Abbas v. Union of India</em>, n.d.)</span>, this exact objection had been taken up by the petitioners, who based it additionally on the theory of separation of powers. The petitioners in that case argued that because Section 5B(1) of the Cinematograph Act copies the language of Article 19(2) and authorises the central government to issue directions to the film censorship board on that basis, it showed that the “legislature has not indicated any guidance to the Central Government” <span class="citation" data-cites="AbbasUnion">(<em>K.A. Abbas v. Union of India</em>, n.d., 468)</span>. However, the five-judge bench did not examine the issue of the wholesale copying of the language of Article 19(2). They rejected the argument about delegated legislation, holding that “Of course, Parliament can adopt the directions and put them in schedule to the Act (and that may still be done), it cannot be said that there is any delegation of legislative function.” <span class="citation" data-cites="AbbasUnion">(<em>K.A. Abbas v. Union of India</em>, n.d., 469)</span> So unfortunately, this practice of copying the principles laid down in Article 19(2) of the Constitution and turning those principles into statutory law to guide the executive seems to be unobjectionable to the Supreme Court of India, though this would go against the IHRL requirements as stated by the UNHRC in General Comment 34.</p>
</section>
<section id="legitimate-aims" class="level4" data-number="2.4.2">
<h4 data-number="2.4.2" class="anchored" data-anchor-id="legitimate-aims"><span class="header-section-number">2.4.2</span> Legitimate Aims</h4>
<p>Article 19(2) of the Constitution of India allows the state to impose “reasonable restrictions” on the exercise of freedom of expression “in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence.Under the UDHR and ICCPR, which allow for restrictions to be provided by law in cases of necessity”for respect of the rights or reputations of others; for the protection of national security or of public order (ordre public), or of public health or morals.” Thus the legimate aims under the Indian Constitution are greater than those provided under IHRL.</p>
<p>Section 5(2) of the Telegraph Act reproduces five of the grounds under the Constitution:</p>
<ol type="a">
<li>sovereignty and integrity of India;</li>
<li>security of the State;<sup>16</sup></li>
<li>friendly relations with foreign states;</li>
<li>public order; and</li>
<li>preventing incitement to the commission of an offence</li>
</ol>
<p>But it also mandates a prerequisite in the form of</p>
<ol type="a">
<li>occurrence of any public emergency; or</li>
<li>in the interest of the public safety.</li>
</ol>
<p>Section 69A too reproduces five of the constitutional grounds:</p>
<ol type="a">
<li>sovereignty and integrity of India;</li>
<li>security of the State;</li>
<li>friendly relations with foreign States;</li>
<li>public order; and</li>
<li>preventing incitement to the commission of any cognizable offence relating to above.<sup>17</sup></li>
</ol>
<p>But it also adds:</p>
<ol start="6" type="a">
<li>defence of India.</li>
</ol>
<p>Specifically, it <em>does not apply</em> to:</p>
<ol type="a">
<li>Decency or morality;</li>
<li>Contempt of court.</li>
</ol>
<p>Instead of clarifying what conditions qualify as breaches of “public order” or harm to “friendly relations with foreign States” or threats to “security of the State”, the legislature has wrongly conferred all the discretion that it has under the Constitution on to the executive. It does not clarify what the distinction is between a restriction framed to safeguard the “sovereignty and integrity of India” and one framed to provide for the “defence of India”. There are no guidelines provided by the legislature as to what may constitute a “public emergency” or what may be “in the interest of the public safety”, nor broad phrases such as “public order” or “friendly relations with foreign States”.</p>
<p>This clearly goes against the UNHRC’s General Comment 34’s stated requirement that “laws must provide sufficient guidance to those charged with their execution to enable them to ascertain what sorts of expression are properly restricted and what sorts are not.” <span class="citation" data-cites="unhumanrightscommitteeGeneralComment2011">(UN Human Rights Committee 2011, para. 26)</span> Indeed, the Suspension Rules neither lay down the specific kinds of circumstances under which the Home Secretary may invoke the powers granted under the Rules; they merely require that the Review Committee ensure that the orders are in conformance with Section 5(2) of the Telegraph Act.</p>
<p>Further, the history of website blocking and Internet shutdowns in India, recounted above, shows that district magistrates, ISPs, and even entities like the CERT-In, have engaged in website blocking and Internet shutdowns despite not having been granted the power to do so by Parliament. Moreover, Internet shutdowns have even been ordered during democratic non-violent protests <span class="citation" data-cites="internetfreedomfoundationStatementOngoing2024">(Internet Freedom Foundation 2024)</span>, to prevent cheating during exams <span class="citation" data-cites="softwarefreedomlawcentreSFLCWrit2022">(Software Freedom Law Centre 2022b)</span>, and other such reasons that are clearly do not pertain to legitimate aims as laid down either under Art. 19(3) of the UDHR, Art. 19(2) of the Indian Constitution, Section 69A of the Information Technology Act, nor Section 5(2) of the Telegraph Act. This points to a deficit in the rule of law.</p>
</section>
<section id="necessity" class="level4" data-number="2.4.3">
<h4 data-number="2.4.3" class="anchored" data-anchor-id="necessity"><span class="header-section-number">2.4.3</span> Necessity</h4>
<p>The language used in Section 69A is that the central government should be satisfied that it is “necessary or expedient” to block or cause to be blocked. “Expedience”—the quality of being fit or suitable to cause some desired end <span class="citation" data-cites="Expedient2021">(<em>Wiktionary</em> 2021, <span>“expedient”</span>)</span>—is clearly a far lesser standard than “necessity”. International law rules out expedience as a standard for restriction of the freedom of expression, given that it requires necessity be demonstrated. Special Rapporteur David Kaye elaborated on the meaning of “necessity” by stating:</p>
<blockquote class="blockquote">
<p>The State must establish a direct and immediate connection between the expression and the threat said to exist. Restrictions must target a specific objective and not unduly intrude upon other rights of targeted persons, and the ensuing interference with third parties’ rights must be limited and justified in the light of the interest supported by the intrusion. The restriction must be the least intrusive instrument among those which might achieve the desired result <span class="citation" data-cites="kayeReportSpecial2016a">(Kaye 2016a, para. 17, references omitted.)</span>.</p>
</blockquote>
<p>In another report to the Human Rights Council, Kaye added “Network shutdowns invariably fail to meet the standard of necessity. Necessity requires a showing that shutdowns would achieve their stated purpose, which in fact they often jeopardize.… In Kashmir, police have reported on the positive role of mobile phones in locating people trapped during terrorist attacks.” <span class="citation" data-cites="kayeReportSpecial2017">(Kaye 2017, para. 14.)</span></p>
<p>Interestingly, in the <em>Shreya Singhal</em> judgment, the Supreme Court didn’t seem to notice the words “or expedient” in the text of the provision; while discussing Section 69A, they state, “First and foremost, blocking <em>can only be resorted to where the Central Government is satisfied that it is necessary so to do</em>” <span class="citation" data-cites="ShreyaSinghal">(<em>Shreya Singhal v. Union of India</em>, n.d., emphasis added.)</span>. One might be tempted to argue that this is, in effect, a reading down of Section 69A. But given that this isn’t explicitly noted by the court as a reading down of Section 69A, it is hard to justify that argument, tempting though it may be. Further, the court’s wording suggests that what it considers important is the <em>satisfaction</em> of the union government as to “necessity”, rather than a public <em>demonstration</em> to the citizenry by the union government of “necessity”.</p>
<p>Similarly, Section 5(2) of the Telegraph Act also uses the phrase “necessary or expedient” while talking about the standard required for satisfaction of the central government before ordering the blocking or interception of telegraphs. Even academic commentators on the provision’s constitutionality <span class="citation" data-cites="ramachandranPUCLUnion2014">(See, e.g., Ramachandran 2014)</span> don’t seem to have highlighted the vast difference between necessity as a standard and expediency.</p>
<p>The judiciary even seems to have read the phrase “necessary or expedient” into Section 144 of the Criminal Procedure Code, even though that section doesn’t mention either word <span class="citation" data-cites="MdGulam1977">(<em>Md. Gulam Abbas v. Md. Ibrahim</em> 1977, which holds that “It may however be noted that the Magistrate is not concerned with individual rights in performing his duty under Section 144 but he has to determine what may be reasonably necessary or expedient in a situation of which he is the best judge.”)</span>. Indeed, the phrase “necessary or expedient” is used in thousands of sections of Indian law <span class="citation" data-cites="NecessaryExpedient">(Indian Kanoon, n.d.)</span>, including in other provisions relating to the restriction of speech, such as Sections 19 and 20 of the Cable Television Networks (Regulation) Act, which allow the central government to ban specific TV programmes or even to ban entire cable networks <span class="citation" data-cites="CableTelevision1995">(The Cable Television Networks (Regulation) Act 1995)</span>.</p>
<p>The office of the UNHCHR put out a report on Internet shutdowns in 2022 <span class="citation" data-cites="officeoftheunitednationshighcommissionerforhumanrightsInternetShutdowns2022">(Office of the United Nations High Commissioner for Human Rights 2022)</span>. In that report, India was criticised for blocking Internet access during protests and exams <span class="citation" data-cites="officeoftheunitednationshighcommissionerforhumanrightsInternetShutdowns2022">(Office of the United Nations High Commissioner for Human Rights 2022, paras. 11, 13)</span>. Further, the report notes that:</p>
<blockquote class="blockquote">
<p>Network shutdowns invariably fail to meet the standard of necessity. Necessity requires a showing that shutdowns would achieve their stated purpose, which in fact they often jeopardize. Some governments argue that it is important to ban the spread of news about terrorist attacks, even accurate reporting, in order to prevent panic and copycat actions. Yet it has been found that maintaining network connectivity may mitigate public safety concerns and help restore public order. During public disturbances in London in 2011, for example, authorities used social media networks to identify perpetrators, disseminate accurate information and conduct clean-up operations. <em>In Kashmir, police have reported on the positive role of mobile phones in locating people trapped during terrorist attacks.</em> [emphasis added]</p>
</blockquote>
<p>It is also worth noting that courts in India very often pass <em>ex parte</em> orders for the blocking of all websites listed by a plaintiff, without scrutinising whether each of the websites listed actually violates any law, or the necessity of such blocking. This is how a website like Google Docs came to be ordered to be blocked by the Delhi High Court in 2014 in a copyright infringement case <span class="citation" data-cites="praneshprakashWhoBlame2014">(Pranesh Prakash 2014)</span>, an order that was thankfully reverted later.</p>
<p>The UNHRC’s General Comment 34 <span class="citation" data-cites="unhumanrightscommitteeGeneralComment2011">(UN Human Rights Committee 2011, para. 34)</span>, as well as various human rights courts’ judgments <span class="citation" data-cites="KonateBurkina2014 SundayTimes1979">(<em>Konaté v. Burkina Faso</em> 2014, ¶¶ 148–149, <em>The Sunday Times v. The United Kingdom</em> 1979, ¶ 62)</span> hold that proportionality is implicit in the concept of “necessity”. So even though Article 19 of the ICCPR only uses the term “necessity” and not “proportionality”, the latter concept has been read into the former.</p>
</section>
<section id="proportionality" class="level4" data-number="2.4.4">
<h4 data-number="2.4.4" class="anchored" data-anchor-id="proportionality"><span class="header-section-number">2.4.4</span> Proportionality</h4>
<p>As noted above, in IHRL, proportionality analysis has become central to analysis of permissible limitations or restrictions, even in circumstances where “proportionality” isn’t explicitly mentioned in the text. Much of this has been driven by courts in Latin America and Europe. This has led to entire books devoted to the proportionality principle <span class="citation" data-cites="barakProportionalityConstitutional2012 bradyProportionalityDeference2012 hulsrojPrincipleProportionality2013 huscroftProportionalityRule2014 jacksonProportionalityNew2017 klattConstitutionalStructure2012 sullivanProportionalityPrinciples2009">(Barak 2012; Brady 2012; Hulsroj 2013; Huscroft et al. 2014; Jackson and Tushnet 2017; Klatt and Meister 2012; Sullivan and Frase 2009)</span>, including works that analyse it from a comparative perspective, <span class="citation" data-cites="kremnitzerProportionalityAction2020 stonesweetProportionalityBalancing2019 yapProportionalityAsia2020">(Kremnitzer et al. 2020; Stone Sweet and Mathews 2019; Yap 2020)</span>, as well as works that develop critiques of the principle <span class="citation" data-cites="duarteProportionalityLaw2018 urbinaCritiqueProportionality2017">(Duarte and Sampaio 2018; Urbina 2017)</span>.</p>
<section id="proportionality-analysis-in-indian-courts" class="level5" data-number="2.4.4.1">
<h5 data-number="2.4.4.1" class="anchored" data-anchor-id="proportionality-analysis-in-indian-courts"><span class="header-section-number">2.4.4.1</span> Proportionality Analysis in Indian Courts</h5>
<p>Traditionally, “proportionality” analysis has been quite alien to Indian courts. Instead, Indian courts have been guided by UK common law, which follows the standard of ‘reasonableness’, which in the UK is guided by the doctrine of <em>Wednesbury</em> unreasonableness <span class="citation" data-cites="chughSupremeCourt2004 chandrachudWednesburyReformulated2013">(Chugh 2004; Chandrachud 2013, 192)</span>. However, since the early 2000s, Indian courts have occasionally turned to the term “strict scrutiny” (borrowed from US judgments) <span class="citation" data-cites="khaitanReasonablenessRigorous2008">(Khaitan 2008, 179)</span>, though it is unclear whether they have either followed the same standard as the US, nor how exactly this seemingly higher standard has been employed differently from “reasonableness” <span class="citation" data-cites="khaitanReasonablenessRigorous2008">(Khaitan 2008, 179–81)</span>. Additionally, at around the same time, Indian courts seem to also have increasingly turned to the term “proportionality” in their judgments, mirroring a similar shift in the UK since the 1980s. As Chandra <span class="citation" data-cites="chandraProportionalityIndia2020">(2020)</span> notes, “even at its lowest level of scrutiny, proportionality requires the court to determine that the measure was legitimate, suitable, necessary and balanced.” This, she notes “implies a deeper level of scrutiny of the State’s reasons as compared to Wednesbury and places a greater restriction on the scope of State power. At higher levels of scrutiny, the court signals that rights are extremely important, that rights-infringing State action is presumptively illegitimate, and that the State is tasked with justifying, based on clear and cogent evidence, that it infringed the right only in very exceptional circumstances.” But, as Chandrachud <span class="citation" data-cites="chandrachudWednesburyReformulated2013">(2013)</span> convincingly argues, “the proportionality test in India, however, is merely <em>Wednesbury</em> unreasonableness in disguise. Though the Supreme Court of India has transplanted the language of ‘proportionality’ into its decisions, perhaps to borrow from the global legitimacy associated with the proportionality doctrine, the Court applies a veiled <em>Wednesbury</em> standard of review and calls it proportionality.”</p>
<p>Despite the explicit (apparent) adoption of proportionality as a limiting standard by both the majority and the minority in the <em>Puttaswamy</em> (Aadhaar) case, the judges seem to have applied the standard very differently. As correctly noted by Chandra <span class="citation" data-cites="chandraProportionalityIndia2020">(2020)</span>, “On the one hand, the Court articulates a very high standard of substantive scrutiny, implying thereby that rights are of great normative significance and can be overcome only in exceptional circumstances. However, at the same time, the Court is highly deferential to the State and places minimal evidential burdens on it.”</p>
</section>
<section id="proportionality-and-blocking-of-specific-content" class="level5" data-number="2.4.4.2">
<h5 data-number="2.4.4.2" class="anchored" data-anchor-id="proportionality-and-blocking-of-specific-content"><span class="header-section-number">2.4.4.2</span> Proportionality and Blocking of Specific Content</h5>
<p>With respect to blocking of Internet content, in 2011, Special Rapporteur Frank La Rue noted that:</p>
<blockquote class="blockquote">
<p>States’ use of blocking or filtering technologies is frequently in violation of their obligation to guarantee the right to freedom of expression, as the criteria mentioned under chapter III are not met. Firstly, the specific conditions that justify blocking are not established in law, or are provided by law but in an overly broad and vague manner, which risks content being blocked arbitrarily and excessively. Secondly, blocking is not justified to pursue aims which are listed under article 19, paragraph 3, of the International Covenant on Civil and Political Rights, and blocking lists are generally kept secret, which makes it difficult to assess whether access to content is being restricted for a legitimate purpose. <em>Thirdly, even where justification is provided, blocking measures constitute an unnecessary or disproportionate means to achieve the purported aim, as they are often not sufficiently targeted and render a wide range of content inaccessible beyond that which has been deemed illegal</em>. Lastly, content is frequently blocked without the intervention of or possibility for review by a judicial or independent body <span class="citation" data-cites="larueReportSpecial2011b">(La Rue 2011a)</span>.</p>
</blockquote>
<p>Privacy-enhancing technologies are often censorship-resistance technologies as well, and make it more difficult for governments to target censorship more specifically (especially against uncooperative entities that lie outside their jurisdictions). For instance, secure protocols like HTTPS effectively prevent the government from ordering an ISP to block a particular page within a website rather than blocking the entire website, because they prevent the ISP from learning which particular page within a website a user is seeking access to. This consequence of security/privacy is not analysed in the commentary on proportionality.</p>
<p>Another aspect of proportionality that only finds a little mention in IHRL analysis is that of time: how long is particular content to be blocked? This too is a necessary part of proportionality. I am yet to see a content-blocking order issued by any Indian court or executive that contains any instructions on how long that content is to be blocked. The Blocking Rules do not contain any time-limiting provisions either, and do not require the block orders to be reviewed to see if they are still relevant. In many cases, websites that have long disappeared off the face of the Web are still blocked by ISPs. This does not apply only to executive-initiated blocks: even courts block websites using ex-parte orders without any time limits.</p>
</section>
<section id="proportionality-and-internet-shutdowns" class="level5" data-number="2.4.4.3">
<h5 data-number="2.4.4.3" class="anchored" data-anchor-id="proportionality-and-internet-shutdowns"><span class="header-section-number">2.4.4.3</span> Proportionality and Internet Shutdowns</h5>
<p>With respect to Internet shutdowns, in their ‘Joint Declaration on Freedom of Expression and Responses to Conflict Situations’ <span class="citation" data-cites="unsrJointDeclaration2015">(2015)</span>, four special rapporteurs on freedom of expression noted that “filtering of content on the Internet, using communications ‘kill switches’ (i.e.&nbsp;shutting down entire parts of communications systems) and the physical takeover of broadcasting stations are measures which can never be justified under human rights law.” <span class="citation" data-cites="unsrJointDeclaration2015">(UN Special Rapporteur on Freedom of Opinion and Expression et al. 2015, para. 4(c))</span></p>
<p>This position seems to be based on the idea that shutting down of Internet access, even when provided for by law, can never be either “necessary”—being the only option available—nor proportionate in terms of being balanced with the state’s interest. They continue:</p>
<blockquote class="blockquote">
<p>We wish to express our concerns over the adverse effects that the shutting down of the internet and telecommunication networks, as well as landline and television channels, may have on these rights, especially on the right to disseminate and receive information and the right to peacefully assemble and associate, including online. With particular regard to internet access, we recall that the same rights that people have offline must also be protected online… <em>The complete shutdown of the internet and telecommunication networks would appear to contravene the fundamental principles of necessity and proportionality that must be met by any restriction on freedom of expression. Shutdowns fail to reach the established test for restrictions to the right to freedom of opinion and expression under article 19(3) of the ICCPR, as well as for restrictions on the freedom of peaceful assembly and of association under articles 21 and 22(2) ICCPR.</em></p>
<p>Access to the internet and telecommunications networks are crucial to prevent disinformation, and they are crucial to protect the rights to health, liberty and personal integrity, by allowing access to emergency help and other necessary assistance. Access to telecommunications networks is also crucial to ensure accountability of authorities for possible human rights violations, including the excessive use of force against peaceful protesters and others. We express our deep concern that the network disruptions will fuel chaos and unrest in Jammu and Kashmir, and that they contribute to a climate fear and uncertainty in the population <span class="citation" data-cites="vice-chairoftheworkinggrouponarbitrarydetentionLetterHuman2019">(Vice-Chair of the Working Group on Arbitrary Detention et al. 2019)</span>. [emphases added]</p>
</blockquote>
<p>This was reiterated by the Special Rapporteur David Kaye in 2016 when he noted that:</p>
<blockquote class="blockquote">
<p>Service shutdowns and associated restrictions are a particularly pernicious means of enforcing content regulations. Such measures are frequently justified on the basis of national security, the maintenance of public order or the prevention of public unrest. In 2015, the Special Rapporteur, together with representatives of the Organization for Security and Cooperation in Europe, the Organization of American States and the African Commission on Human and Peoples’ Rights condemned as unlawful Internet “kill switches”. In one year alone, there were reports of shutdowns in Bangladesh, Brazil, Burundi, the Democratic Republic of the Congo, India and Pakistan <span class="citation" data-cites="kayeReportSpecial2016">(Kaye 2016b, para. 48)</span>.</p>
</blockquote>
<p>In 2021, the Special Rapporteur on the rights to freedom of peaceful assembly and of association noted in his report to the Human Rights Council that</p>
<blockquote class="blockquote">
<p>Shutdowns are thus inconsistent with proportionality requirements. They impose extreme burdens on those exercising expression and peaceful assembly rights and exert significant chilling effects on decisions regarding whether to participate in public assemblies <span class="citation" data-cites="vouleEndingInternet2021">(Voule 2021, para. 20)</span>.</p>
</blockquote>
<p>In 2021, India voted in favour of a Human Rights Council resolution which</p>
<blockquote class="blockquote">
<p>condemn[ed] unequivocally measures in violation of international human rights law that prevent or disrupt an individual’s ability to seek, receive or impart information online, including Internet shutdowns and online censorship, call[ed] upon all States to refrain from and to cease such measures, and also call[ed] upon States to ensure that all domestic laws, policies and practices are consistent with their international human rights obligations with regard to freedom of opinion and expression, and of association and peaceful assembly, online <span class="citation" data-cites="unhumanrightscouncilResolution472021">(UN Human Rights Council 2021, para. 11)</span>.</p>
</blockquote>
<p>Just a few years before, the Indian government strengthened its powers to engage in Internet shutdowns. Further, in 2023, the Telecommunications Act was passed which explicitly allows for Internet shutdowns. While they seemingly fall short of IHRL, are they in line with the Constitution of India? Unfortunately, the Supreme Court did not get a chance to examine the constitutionality of the Suspension Rules in the <em>Anuradha Bhasin</em> case, as none of the parties seem to have raised it <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶ 84)</span>. Thus, for the time being it has to be assumed that Indian law doesn’t prohibit Internet shutdowns, and thus they can be seen as a necessary and proportionate executive action in exercise of legitimate state interests <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶¶ 86–100)</span>. After a lengthy analysis of the powers under Section 144 of the Cr.P.C., the Supreme Court noted in 2017, with the passage of the Suspension rules, “the position has changed,” and that “with the promulgation of the Suspension Rules, the States are using the aforesaid Rules to restrict telecom services including access to the internet.” <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶ 83)</span>. However, the reality remains that despite the introduction of the Suspension Rules which in effect denude district magistrates of the power to suspend Internet access, district magistrates across India have continued to issue orders suspending Internet access <span class="citation" data-cites="internetfreedomfoundationAmendmentTelecom2020">(Internet Freedom Foundation 2020)</span>, displaying the problem with rule of law in India.</p>
<p>Quite interestingly, some human rights courts have taken into account the lack of rule of law as a factor when engaging in necessity and proportionality analysis. For instance, in the case of <em>Tolstoy Miloslavsky v. The United Kingdom</em>, the European Court of Human rights held that the imposition of excessive penalties had a deterrent effect on the exercise of the freedom of expression and was of the view that the granting of excessive damages for defamation constituted a violation of Article 10 of the European Convention of Human Rights <span class="citation" data-cites="TolstoyMiloslavsky1995">(<em>Tolstoy Miloslavsky v. The United Kingdom</em> 1995)</span>. The African Court on Human and Peoples’ Rights crucially noted that even when specific restrictions were allowed (such as criminal damages for defamation), “they are not necessary in a democratic society, when there is no guarantee, given the magnitude of the combined lethargic state of the domestic rule of law at the time, a reasonable relationship of proportionality to the legitimate goal pursued” <span class="citation" data-cites="KonateBurkina2014">(<em>Konaté v. Burkina Faso</em> 2014, ¶ 154)</span></p>
<p>Thus, there’s an argument to be made that the weak rule of law in India only calls for heightened scrutiny by the judiciary, and a higher standard must be applied when proportionality analysis is required.</p>
</section>
</section>
<section id="transparency" class="level4" data-number="2.4.5">
<h4 data-number="2.4.5" class="anchored" data-anchor-id="transparency"><span class="header-section-number">2.4.5</span> Transparency</h4>
<p>The issue of transparency of law hasn’t received much focus in IHRL, with a UN Human Rights Council resolution on ‘Human rights, democracy and the rule of law’<span class="citation" data-cites="unhumanrightscouncilResolution192012">(UN Human Rights Council 2012a)</span> being a limited exception. In this section, I argue that transparency is a core part not only of rule of law but also IHRL due to the requirement under IHRL that any restrictions on freedom of expression by “promulgated by law”.</p>
<p>In the Second Treatise of Government, John Locke notes that “whoever has the legislative or supreme power of any commonwealth, is bound to govern by established standing laws, promulgated and known to the people, and not by extemporary decrees” <span class="citation" data-cites="lockeSecondTreatise1690">(Locke 1690, para. 131)</span>. Similarly, Lon Fuller in his book ‘The Morality of Law’, held that a law that is not publicly promulgated does not count as a genuine law <span class="citation" data-cites="fullerMoralityLaw1969">(Fuller 1969)</span>. In India, if a law is not published in the official gazette, it can be held not to be in force. Thus, publicity and transparency of a law is an inherent requirement of legality.</p>
<p>One Special Rapporteur noted, “States should provide full details regarding the necessity and justification for blocking a particular website, and determination of what content should be blocked should be undertaken by a competent judicial authority or a body which is independent of any political, commercial, or other unwarranted influences to ensure that blocking is not used as a means of censorship” <span class="citation" data-cites="larueReportSpecial2011a">(La Rue 2011c, para. 70)</span>. Another Special Rapporteur noted, “‘a detailed and evidence-based public justification’ is critical to enable transparent public debate over restrictions that implicate and possibly undermine freedom of expression.” <span class="citation" data-cites="kayeReportSpecial2015">(Kaye 2015, para. 35)</span></p>
<p>Thus, any restriction of freedom of speech must provide adequate information to the public, as well as those whose speech is being restricted, to challenge it. Secret orders cannot be held to be “provided by law”. Accordingly, the law must be clear, precise and publicly accessible in order to provide individuals with adequate guidance.</p>
<p>This seeming requirement of transparency is in stark contrast to Rule 16 of the Blocking Rules, which mandates that “strict confidentiality shall be maintained regarding all the requests and complaints received and actions taken thereof.” It is notable that this rule has not been observed strictly by MEITY at all times, since they have in the past responded to RTI requests, even post-2009, asking for details of blocked websites, including how many of those requests came from the judiciary, and some details about the deliberations of the committee for the examination of requests <span class="citation" data-cites="prakashDITResponse2011">(Prakash 2011a)</span>.</p>
<p>Notably, in the case of <em>Shreya Singhal v. Union of India</em>, the court seems not to have examined the implication of Rule 16, even though it was mentioned in paragraphs 107 and 108. In paragraph 109, however, the court notes that under Section 69A, “reasons have to be recorded in writing in such blocking order so that they may be assailed in a writ petition under Article 226 of the Constitution.” This seems to imply that the blocking order and the reasons therefor need to be available to the public such that they may be assailed in a writ petition under Article 226 of the Constitution.</p>
<p>In his 2016 report, the UN Special Rapporteur specifically highlighted the harms of Rule 16 of the Blocking rules, when he noted:</p>
<blockquote class="blockquote">
<p>Transparency can help ensure that subjects of Internet regulation are able to meaningfully predict their legal obligations and challenge them where appropriate. Gaps in compliance with these standards threaten the ability of individuals to understand the limits placed on their freedom of expression online and seek appropriate redress when their rights are violated.</p>
<p>Despite multiple reform attempts, transparency concerning government requests is still lacking…. Several States prohibit disclosures concerning government requests for content removal or access to user data. India, for example, prohibits online intermediaries from disclosing details of government orders to block access to Internet content, as well as any action they take in response to such orders <span class="citation" data-cites="kayeReportSpecial2016">(Kaye 2016b, paras. 64–65)</span>.</p>
</blockquote>
<p>In the <em>Anuradha Bhasin</em> case, which concerned Internet shutdown orders in Jammu &amp; Kashmir, the government was notably frank and stated outright that it would not produce orders that had been used to block Internet and mobile access and claimed privilege. Eventually, the government provided the court with a few sample orders, claiming that it could not produce all the orders, as they kept changing. The court rejected this reasoning, citing two reasons: (1) a “democracy, which is sworn to transparency and accountability, necessarily mandates the production of orders as it is the right of an individual to know. Moreover, fundamental rights itself connote a qualitative requirement wherein the State has to act in a responsible manner to uphold Part III of the Constitution and not to take away these rights in an implied fashion or in casual and cavalier manner” <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶ 16)</span>; and (2) that “there is not only a normative expectation under the Constitution, but also a requirement under natural law, that no law should be passed in a clandestine manner.” <span class="citation" data-cites="AnuradhaBhasin2020">(<em>Anuradha Bhasin v. Union Of India</em> 2020, ¶ 17)</span></p>
<p>Despite the <em>Anuradha Bhasin</em> judgment, it has been noted that governments have been lax in actually publishing Internet shutdown orders, and thus on-ground compliance with the judgment remains low <span class="citation" data-cites="malhotraSupremeCourt2023 mishraGreatIndian2021">(Malhotra 2023; Mishra 2021)</span>. Further, it is worth noting that the <em>Anuradha Bhasin</em> judgment only applies to Internet shutdown orders, and not to website blocking orders. Thus, while the judiciary has ordered a limited amount of transparency, there is still far to go both in terms of compliance with that order, as well as with getting transparency for website blocking orders.</p>
</section>
<section id="remedy-for-violation-of-rights" class="level4" data-number="2.4.6">
<h4 data-number="2.4.6" class="anchored" data-anchor-id="remedy-for-violation-of-rights"><span class="header-section-number">2.4.6</span> Remedy for Violation of Rights</h4>
<p>Article 2(3) of the ICCPR requires state parties to ensure that persons whose rights under the Covenant have been violated have an effective remedy <span class="citation" data-cites="iccpr">(International Covenant on Civil and Political Rights 1966, Art. 2(3))</span>. The idea of “an effective remedy” can be taken to be two-fold. First, there’s the remedy of the speech restriction ceasing to be. Further, there is also the remedy of restitution for the wrongful deprivation of rights.</p>
<p>In 2011, the Centre for Internet and Society documented how they misused the 2011 Intermediary Guidelines Rules (under Section 79 of the IT Act) to invisibly remove content from search engines, e-commerce platforms, etc., without any right-of-reply or right-to-reinstate content having been given to those whose right were violated <span class="citation" data-cites="daraIntermediaryLiability2011">(Dara 2011)</span>. While the revised Intermediary Guidelines Rules have a provision that a significant social media intermediary provides an “adequate and reasonable opportunity to dispute the action being taken by such intermediary and request for the reinstatement of access to such information, data or communication link” <span class="citation" data-cites="IntermediaryGuidelines2021">(Intermediary Guidelines and Digital Media Ethics Code Rules 2021)</span> None of the laws that provide Internet shutdowns or website blocking provide any means of restitution or damages for the loss suffered.</p>
<p>Courts have often seen the existence of procedural remedies as a sufficient safeguard despite the existence of substantive infirmities. Thus, allowing affected parties to challenge a government ban has been seen as being a sufficient safeguard in both <em>Shreya Singhal</em> (in upholding 69A, on the basis of it having procedural safeguards that allow the orders to be challenged) and in <em>Anuradha Bhasin</em>. That however shifts the onus from the government having to justify a restriction of human rights by showing that its decision is proportionate to a petitioner having to display that the government’s actions are not proportionate. This, thus, inverts the proportionality test.</p>
<p>Rightfully, the existence of remedies ought to be seen as an independent requirement. The existence of procedural remedies such as a right of appeal (often to the same executive branch that passed the order) ought not be used to defeat proportionality analysis as they have been used in Indian cases. If that were to be allowed, then the Constitutional right (under Articles 32 and 226) to petition the higher judiciary for violation of rights would protect all laws from questions of procedural infirmity, since it could be argued the very existence of a right to petition a law provides a “sufficient safeguard”.</p>
<p>Further, even on purely procedural grounds, such procedural remedies cannot rightfully be said to exist as safeguards, since there is a lack of transparency. This lack of transparency often effectively prevents affected parties from challenging a ban, since even if they come to know of a ban, they have no clarity on which entity ordered the ban, when and on what grounds, who they have to approach for a remedy, and who has standing as an affected party. Thus, “invisible censorship” is effectively enabled by provisions such as Section 79 of the IT Act <span class="citation" data-cites="prakashInvisibleCensorship2011">(Prakash 2011b)</span>, and Rule 16 of the Blocking Rules <span class="citation" data-cites="groverContentTakedown2020">(Grover and Sarkar 2020)</span>.</p>
</section>
<section id="jurisdictional-spillover" class="level4" data-number="2.4.7">
<h4 data-number="2.4.7" class="anchored" data-anchor-id="jurisdictional-spillover"><span class="header-section-number">2.4.7</span> Jurisdictional Spillover</h4>
<p>In a report on online censorship, the Special Rapporteur noted that “Even if content regulations were validly enacted and enforced, users may still experience unnecessary access restrictions. For example, content filtering in one jurisdiction may affect the digital expression of users in other jurisdictions. While companies may configure filters to apply only to a particular jurisdiction or region, there have been instances where they were nevertheless passed on to other networks or areas of the platform. For instance, in 2013 State-mandated filtering carried out by Airtel India led to restrictions on the same content on several networks in Oman belonging to its partner, Omantel.” <span class="citation" data-cites="kayeReportSpecial2016">(Kaye 2016b, para. 47)</span>. The Airtel India example he cited was one of inadvertent spillover. However, there have been a number of cases where the courts have explicitly argued that geographically limited content removals or blocking would not suffice <span class="citation" data-cites="RamdevFacebook2019 UnionIndia2021">(<em>Ramdev v. Facebook</em> 2019, <em>X v. Union of India</em> 2021)</span>/ These cases seek to apply geographically limited laws and geographically limited jurisdiction of Indian courts beyond such geographical limitations, setting the stage for conflict of laws.</p>
</section>
<section id="mandatory-restrictions" class="level4" data-number="2.4.8">
<h4 data-number="2.4.8" class="anchored" data-anchor-id="mandatory-restrictions"><span class="header-section-number">2.4.8</span> Mandatory Restrictions</h4>
<p>Apart from <em>allowing</em> certain restrictions, under international law states are also under an <em>obligation to prohibit</em> certain forms of speech. For instance, Article 20 of the ICCPR requires states to place specific prohibitions:</p>
<blockquote class="blockquote">
<ol type="1">
<li>Any propaganda for war shall be prohibited by law.</li>
<li>Any advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence shall be prohibited by law.</li>
</ol>
</blockquote>
<p>In addition, Article 34 of the UN Convention on the Rights of the Child states:</p>
<blockquote class="blockquote">
<p>States Parties undertake to protect the child from all forms of sexual exploitation and sexual abuse. For these purposes, States Parties shall in particular take all appropriate national, bilateral and multilateral measures to prevent:</p>
</blockquote>
<blockquote class="blockquote">
<blockquote class="blockquote">
<ol type="a">
<li>The inducement or coercion of a child to engage in any unlawful sexual activity;</li>
<li>The exploitative use of children in prostitution or other unlawful sexual practices;</li>
<li>The exploitative use of children in pornographic performances and materials.</li>
</ol>
</blockquote>
</blockquote>
<p>The UN Security Council Resolution 1624 requires states to “Prohibit by law incitement to commit a terrorist act or acts.” <span class="citation" data-cites="unsecuritycouncilResolution16242005 shiryaevCyberterrorismContext2012 ronenIncitementTerrorist2010">(UN Security Council 2005; for analysis of the international law on free speech consequent to this resolution, see Shiryaev 2012; and Ronen 2010)</span></p>
<p>The international law on what forms of speech are required to be be prohibited was summarised by UN Special Rapporteur Frank La Rue <span class="citation" data-cites="larueReportSpecial2011">(La Rue 2011b, paras. 20–36)</span> as:</p>
<ol type="1">
<li>Child pornography</li>
<li>Direct and public incitement to commit genocide</li>
<li>Advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence</li>
<li>Incitement to terrorism</li>
</ol>
<p>All the limitations discussed above—legality, necessity, proportionality, transparency, and remedies—continue to apply even when the restrictions are mandatory.</p>
</section>
<section id="cases-applying-ihrl-on-freedom-of-expression" class="level4" data-number="2.4.9">
<h4 data-number="2.4.9" class="anchored" data-anchor-id="cases-applying-ihrl-on-freedom-of-expression"><span class="header-section-number">2.4.9</span> Cases Applying IHRL on Freedom of Expression</h4>
<p>Most of the landmark Indian cases on Internet censorship—<em>MySpace v. Super Cassettes</em>, <em>Shreya Singhal v. Union of India</em>, <em>Ramdev v. Facebook</em>, <em>Anuradha Bhasin v. Union of India</em>—make no use of international human rights instruments or standards, nor do they refer to India’s international human rights obligations.</p>
<p>One notable exception is the case of <em>Faheema Shirin R.K. v. State of Kerala</em> <span class="citation" data-cites="FaheemaShirin2019">(<em>Faheema Shirin R.K. v. State of Kerala</em> 2019)</span>, in which the Kerala High Court was adjudicating on restrictions applied by a public university on the usage of mobile phones and laptops by students staying in the university’s hostels. The court refers quite extensively to international human rights standards, and in particular quotes two resolutions by the Human Rights Council (which the judge mistakenly attributes to the United Nations General Assembly): Resolution 26/13, which “affirms that the same rights that people have off-line must also be protected online, in particular freedom of expression…” <span class="citation" data-cites="unhumanrightscouncilResolution262014">(UN Human Rights Council 2014)</span>, and Resolution 23/2 which calls upon states to “ensure that women and girls exercising their right to freedom of opinion and expression are not discriminated against” <span class="citation" data-cites="unhumanrightscouncilResolution232013">(UN Human Rights Council 2013)</span>. But the judge also mistakenly holds that “the Human Rights Council of the United Nations have found that right to access to Internet is a fundamental freedom,” whereas Human Rights Council has merely held that Internet facilitates freedom of expression, and that all rights such as freedom of expression must be protected online as well. Based on these, Justice P.V. Asha went on to hold that “… the international conventions and norms are to be read into the fundamental rights guaranteed in the Constitution of India in the absence of enacted domestic law occupying the fields when there is no inconsistency between them. Going by the aforesaid dictum laid down in the said judgment, the right to have access to Internet becomes the part of right to education as well as right to privacy under Article 21 of the Constitution of India.” Thus, the right to have access to the Internet was held to be a fundamental right under Articles 21 and 21A of the Constitution, and emphasis was placed on international covenants while doing so.</p>
<p>A search on the legal search engine Indian Kanoon leads to only one case in which a UN Special Rapporteur on freedom of expression’s report was cited by a high court <span class="citation" data-cites="NedunchezhianBar2015">(<em>M. Nedunchezhian v. Bar Council of Tamil Nadu</em> 2015)</span> and only one in which a petitioner invoked them <span class="citation" data-cites="ShibuBaby2020">(<em>Shibu Baby John v. State of Kerala</em> 2020)</span>. Is the general lack of reliance on IHRL because lawyers don’t use them as part of their arguments or because the judges don’t see them as being very relevant? This question is difficult to answer, since the writ petitions and amicus curiae briefs placed before the Supreme Court are not available in the public domain, so it is difficult to say whether it is the judges or the parties before the court that fail to use IHRL.</p>
</section>
</section>
</section>
<section id="conclusion" class="level2" data-number="3">
<h2 data-number="3" class="anchored" data-anchor-id="conclusion"><span class="header-section-number">3</span> Conclusion</h2>
<p>International human rights law provides an interesting framework for analysis of where to strike the balance between competing claims of rights and permissible restrictions—albeit usually limited, though sometimes useful. While Internet shutdowns and blocking of websites affect people’s civil and political rights as well as economic, social, and cultural rights (ESCR), there have not been any significant IHRL pronouncements on ESCR when it comes to Internet shutdowns, but there has been important IHRL analysis under civil and political rights frameworks.</p>
<p>This paper establishes that Indian laws relating to Internet shutdowns and content blocking fall short of the requirements imposed by IHRL in terms of legality, legitimate aims, necessity, proportionality, transparency, and provision of remedies.</p>
<ol type="1">
<li>Internet shutdowns orders and content blocking orders are often promulgated in violation of existing laws;</li>
<li>Indian laws and delegated legislation do not provide precise guidance to the executive on the circumstances under which they may legally restrict speech;</li>
<li>Such laws do not conform to the standards of necessity and proportionality, do not set time limits on website blocks, and even allow completely disproportionate actions such as Internet shutdowns which, as multiple international authorities have noted <span class="citation" data-cites="larueReportSpecial2011b unsrJointDeclaration2015 kayeReportSpecial2016">(La Rue 2011a; UN Special Rapporteur on Freedom of Opinion and Expression et al. 2015; Kaye 2016b)</span>, contravene IHRL;</li>
<li>They restrict transparency and do not make it known why any particular website is blocked nor allow ISPs and other intermediaries to make such information public; and</li>
<li>They do not provide remedies such as a right of reinstatement of content.</li>
</ol>
<p>In order to bring these laws into conformity with IHRL, some of them need to be completely rewritten and others amended. In many cases, it is judicial overreach that needs to be curbed. Thus, laws such as the Copyright Act and the Civil Procedure Code need to be amended to lay down grounds for when the judiciary may and may not order the blocking of websites. Given the serious human rights concerns raised by suppression of speech via blocking of websites, the IT Act should be amended to require that <em>ex parte</em> blocking should not be ordered either by the judiciary or by the executive. Instead, it could be achieved either with the state attorney general’s office—or amicus curiae appointed by the court if the matter is before a court—being required to mount a defence against the blocking of websites, similar to the role performed by public defenders in criminal cases.</p>
<p>Requirements of necessity and proportionality need to be embedded into the legal process—for instance, by requiring time limits placed for each website block along with periodic reviews of each blocked website. Internet shutdowns should be expressly prohibited by law. To further transparency, orders for the blocking of websites should be published online, along with the minutes of the meetings in which the blocking has been discussed as well as the evidence presented before the committee to substantiate the need for blocking. The orders should contain information on each website with a justification of how its blocking is compliant with constitutional and IHRL obligations: more specifically whether and how the block falls under the grounds provided for under Indian law, whether there are no other means of countering the harm from the speech expressed, whether a block is the least restrictive means to counter the harm, and whether this will have undesirable consequences outside of Indian jurisdiction. This should apply both to the original block orders, as well as the periodic reappraisals. The government should not only proactively make public the orders that the executive has passed but also the orders the judiciary has passed (and passed on to the executive for enforcement).</p>
<p>Additionally, there need to be penalties for unlawful blocking of websites, apps, and internet access, which need to be enforced, along with remedies for those who have had their freedom to seek and impart information unlawfully denied, including monetary recompense.</p>
<p>IHRL is only as useful as its use in both popular and political discourse and judicial pronouncements: if IHRL is widely used, it is useful; conversely, if it is not widely used, it is not useful. Currently, the application of IHRL in India has been haphazard. While NGOs are quite fond of quoting IHRL, it isn’t clear whether lawyers are making arguments based on IHRL in the courtrooms. At any rate, it is apparent that courts aren’t making much use of IHRL. Arguably, a more systematic engagement with IHRL would benefit Indian statutory and constitutional interpretation.</p>


</section>
<section id="bibliography" class="level1 unnumbered">


</section>


<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-bibliography"><h2 class="anchored quarto-appendix-heading">References</h2><div id="refs" class="references csl-bib-body hanging-indent">
<div id="ref-AnujGarg2007" class="csl-entry">
Anuj Garg v. Hotel Association of India, AIR 2008 SC 663 ___ (2007). <a href="https://indiankanoon.org/doc/845216/">https://indiankanoon.org/doc/845216/</a>.
</div>
<div id="ref-AnuradhaBhasin2020" class="csl-entry">
Anuradha Bhasin v. Union Of India, 2019 SCC Online SC 1725 ___ (Supreme Court of India 2020). <a href="https://indiankanoon.org/doc/82461587/">https://indiankanoon.org/doc/82461587/</a>.
</div>
<div id="ref-barakProportionalityConstitutional2012" class="csl-entry">
Barak, Aharon. 2012. <em>Proportionality: Constitutional Rights and Their Limitations</em>. Cambridge Studies in Constitutional Law. Cambridge University Press.
</div>
<div id="ref-benvenistiReclaimingDemocracy2008" class="csl-entry">
Benvenisti, Eyal. 2008. <span>“Reclaiming Democracy: The Strategic Uses of Foreign and International Law by National Courts.”</span> <em>The American Journal of International Law</em> 102 (2): 241–74. <a href="https://doi.org/10.2307/30034538">https://doi.org/10.2307/30034538</a>.
</div>
<div id="ref-bhardwajRisingInternet2020" class="csl-entry">
Bhardwaj, Shrutanjaya, Nakul Nayak, Sarvjeet Singh, Raja Venkata Krishna Dandamudi, and Veda Handa. 2020. <span>“Rising Internet Shutdowns in India: A Legal Analysis.”</span> <em>Indian Journal of Law and Technology</em> 16 (1): 122–58. <a href="https://www.ijlt.in/journal/rising-internet-shutdowns-in-india%3A-a-legal-analysis">https://www.ijlt.in/journal/rising-internet-shutdowns-in-india%3A-a-legal-analysis</a>.
</div>
<div id="ref-bradyProportionalityDeference2012" class="csl-entry">
Brady, Alan D. P. 2012. <em>Proportionality and Deference Under the UK Human Rights Act: An Institutionally Sensitive Approach</em>. Cambridge University Press. <a href="https://doi.org/10.1017/CBO9781139003445">https://doi.org/10.1017/CBO9781139003445</a>.
</div>
<div id="ref-chandraIndiaInternational2017" class="csl-entry">
Chandra, Aparna. 2017. <span>“India and International Law: Formal Dualism, Functional Monism.”</span> <em>Indian Journal of International Law</em> 57 (1): 25–45. <a href="https://doi.org/10.1007/s40901-017-0069-0">https://doi.org/10.1007/s40901-017-0069-0</a>.
</div>
<div id="ref-chandraProportionalityIndia2020" class="csl-entry">
Chandra, Aparna. 2020. <span>“Proportionality in India: A Bridge to Nowhere?”</span> <em>University of Oxford Human Rights Hub Journal</em> 3 (2): 55–86.
</div>
<div id="ref-chandrachudWednesburyReformulated2013" class="csl-entry">
Chandrachud, Abhinav. 2013. <span>“Wednesbury Reformulated: Proportionality and the Supreme Court of India.”</span> <em>Oxford University Commonwealth Law Journal</em> 13 (1): 191–208. <a href="https://doi.org/10.5235/14729342.13.1.191">https://doi.org/10.5235/14729342.13.1.191</a>.
</div>
<div id="ref-chaturvediFiveArrested2012" class="csl-entry">
Chaturvedi, Amit. 2012. <span>“Five Arrested in Bangalore for Rumours, Social Media Told to Be Alert.”</span> <em>NDTV.com</em>, August 18. <a href="https://www.ndtv.com/india-news/five-arrested-in-bangalore-for-rumours-social-media-told-to-be-alert-497149">https://www.ndtv.com/india-news/five-arrested-in-bangalore-for-rumours-social-media-told-to-be-alert-497149</a>.
</div>
<div id="ref-chimaRegulationInternet2008" class="csl-entry">
Chima, Raman Jit Singh. 2008. <em>The Regulation of the Internet with Relation to Speech and Expression by the Indian State</em>. SSRN Scholarly Paper. Social Science Research Network. <a href="http://papers.ssrn.com/abstract=1237262">http://papers.ssrn.com/abstract=1237262</a>.
</div>
<div id="ref-chughSupremeCourt2004" class="csl-entry">
Chugh, Ashish. 2004. <span>“Is the Supreme Court Disproportionately Applying the Proportionality Principle?”</span> <em>SCC Journal</em> 8: 33. <a href="https://www.ebc-india.com/lawyer/articles/2004_8_33.htm">https://www.ebc-india.com/lawyer/articles/2004_8_33.htm</a>.
</div>
<div id="ref-daraIntermediaryLiability2011" class="csl-entry">
Dara, Rishabh. 2011. <em>Intermediary Liability in India: Chilling Effects on Free Expression on the Internet</em>. Centre for Internet and Society. <a href="https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf">https://cis-india.org/internet-governance/intermediary-liability-in-india.pdf</a>.
</div>
<div id="ref-duarteProportionalityLaw2018" class="csl-entry">
Duarte, David, and Jorge Silva Sampaio, eds. 2018. <em>Proportionality in Law: An Analytical Perspective</em>. Springer International Publishing. <a href="https://doi.org/10.1007/978-3-319-89647-2">https://doi.org/10.1007/978-3-319-89647-2</a>.
</div>
<div id="ref-expertcommitteeonamendmentstotheitact2000ReportExpert2005" class="csl-entry">
Expert Committee on Amendments to the IT Act 2000. 2005. <em>Report of the Expert Committee: Proposed Amendments to the Information Technology Act 2000</em>. <a href="https://www.meity.gov.in/content/report-expert-committee-amendments-it-act-2000">https://www.meity.gov.in/content/report-expert-committee-amendments-it-act-2000</a>.
</div>
<div id="ref-FaheemaShirin2019" class="csl-entry">
Faheema Shirin R.K. V. State of Kerala, WP (C) 19716/2019-L (Kerala HC September 19, 2019). <a href="https://indiankanoon.org/doc/188439981/">https://indiankanoon.org/doc/188439981/</a>.
</div>
<div id="ref-fullerMoralityLaw1969" class="csl-entry">
Fuller, Lon Luvois. 1969. <em>The Morality of Law</em>. Yale University Press.
</div>
<div id="ref-groverContentTakedown2020" class="csl-entry">
Grover, Gurshabad, and Torsha Sarkar. 2020. <span>“Content Takedown and Users’ Rights.”</span> The Leaflet, February 12. <a href="https://theleaflet.in/content-takedown-and-users-rights/">https://theleaflet.in/content-takedown-and-users-rights/</a>.
</div>
<div id="ref-hariharanLegalValidity2015" class="csl-entry">
Hariharan, Geetha, and Padmini Baruah. 2015. <span>“The Legal Validity of Internet Bans: Part II.”</span> Centre for Internet and Society, October 8. <a href="https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii">https://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii</a>.
</div>
<div id="ref-hegdeIndianCourts2010" class="csl-entry">
Hegde, V. G. 2010. <span>“Indian Courts and International Law.”</span> <em>Leiden Journal of International Law</em> 23 (1): 53–77. <a href="https://doi.org/10.1017/S0922156509990331">https://doi.org/10.1017/S0922156509990331</a>.
</div>
<div id="ref-hulsrojPrincipleProportionality2013" class="csl-entry">
Hulsroj, Peter. 2013. <em>The Principle of Proportionality</em>. Vol. 7. SpringerBriefs in Law. Springer Netherlands. <a href="https://doi.org/10.1007/978-94-007-5775-2">https://doi.org/10.1007/978-94-007-5775-2</a>.
</div>
<div id="ref-huscroftProportionalityRule2014" class="csl-entry">
Huscroft, Grant, Bradley W. Miller, and Gregoire Webber. 2014. <em>Proportionality and the Rule of Law: Rights, Justification, Reasoning</em>. Cambridge University Press. <a href="https://doi.org/10.1017/CBO9781107565272">https://doi.org/10.1017/CBO9781107565272</a>.
</div>
<div id="ref-NecessaryExpedient" class="csl-entry">
Indian Kanoon. n.d. <span>“<span>‘Necessary or Expedient’</span> Doctypes: Laws.”</span> Accessed November 29, 2021. <a href="https://indiankanoon.org/search/?formInput=%22necessary+or+expedient%22+doctypes%3Alaws">https://indiankanoon.org/search/?formInput=%22necessary+or+expedient%22+doctypes%3Alaws</a>.
</div>
<div id="ref-IntermediaryGuidelines2021" class="csl-entry">
Intermediary Guidelines and Digital Media Ethics Code Rules (2021). <a href="https://prsindia.org/files/bills_acts/bills_parliament/2021/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf">https://prsindia.org/files/bills_acts/bills_parliament/2021/Intermediary_Guidelines_and_Digital_Media_Ethics_Code_Rules-2021.pdf</a>.
</div>
<div id="ref-iccpr" class="csl-entry">
International Covenant on Civil and Political Rights (1966). <a href="https://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx">https://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx</a>.
</div>
<div id="ref-internetfreedomfoundationAmendmentTelecom2020" class="csl-entry">
Internet Freedom Foundation. 2020. <span>“Amendment to the Telecom Suspension Rules Offers Little Protection Against Arbitrary and Prolonged Internet Shutdowns #KeepUsOnline.”</span> Internet Freedom Foundation, November 12. <a href="https://internetfreedom.in/telecom-suspension-rules-amendment-15-day-time-limit/">https://internetfreedom.in/telecom-suspension-rules-amendment-15-day-time-limit/</a>.
</div>
<div id="ref-internetfreedomfoundationStatementOngoing2024" class="csl-entry">
Internet Freedom Foundation. 2024. <span>“Statement: The Ongoing Internet Shutdowns in the States of Haryana &amp; Rajasthan, &amp; Online Censorship in Response to Farmers Protest.”</span> Internet Freedom Foundation, February 13. https://web.archive.org/web/20240610113059/internetfreedom.in/the-ongoing-internet-shutdowns-in-the-states-of-haryana-rajasthan-online-censorship-in-response-to-farmers-protest/. <a href="https://internetfreedom.in/the-ongoing-internet-shutdowns-in-the-states-of-haryana-rajasthan-online-censorship-in-response-to-farmers-protest/">https://internetfreedom.in/the-ongoing-internet-shutdowns-in-the-states-of-haryana-rajasthan-online-censorship-in-response-to-farmers-protest/</a>.
</div>
<div id="ref-ministryofelectronicsandinformationtechnologygovernmentofindiaITAct2003" class="csl-entry">
IT Act Notification No 181, G.S.R.181(E) (2003). <a href="https://www.meity.gov.in/content/it-act-notification-no-181">https://www.meity.gov.in/content/it-act-notification-no-181</a>.
</div>
<div id="ref-jacksonProportionalityNew2017" class="csl-entry">
Jackson, Vicki C., and Mark Tushnet, eds. 2017. <em>Proportionality: New Frontiers, New Challenges</em>. Cambridge University Press. <a href="https://doi.org/10.1017/9781316691724">https://doi.org/10.1017/9781316691724</a>.
</div>
<div id="ref-jayawickramaJudicialApplication2002" class="csl-entry">
Jayawickrama, Nihal. 2002. <em>The Judicial Application of Human Rights Law: National, Regional and International Jurisprudence.</em> Cambridge University Press. <a href="http://dx.doi.org/10.1017/CBO9780511494017">http://dx.doi.org/10.1017/CBO9780511494017</a>.
</div>
<div id="ref-AbbasUnion" class="csl-entry">
K.A. Abbas v. Union of India, 1971 AIR 481 ___. Accessed December 8, 2021. <a href="https://indiankanoon.org/doc/1719619/">https://indiankanoon.org/doc/1719619/</a>.
</div>
<div id="ref-kayeReportSpecial2015" class="csl-entry">
Kaye, David. 2015. <span>“Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, David Kaye.”</span> A/HRC/29/32. UN Human Rights Council, May 22. <a href="https://doi.org/10.1163/2210-7975_HRD-9970-2016149">https://doi.org/10.1163/2210-7975_HRD-9970-2016149</a>.
</div>
<div id="ref-kayeReportSpecial2016a" class="csl-entry">
Kaye, David. 2016a. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression</em>. A/71/373. UN Human Rights Council. <a href="https://undocs.org/A/71/373">https://undocs.org/A/71/373</a>.
</div>
<div id="ref-kayeReportSpecial2016" class="csl-entry">
Kaye, David. 2016b. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression</em>. A/HRC/32/38. UN Human Rights Council. <a href="https://undocs.org/A/HRC/32/38">https://undocs.org/A/HRC/32/38</a>.
</div>
<div id="ref-kayeReportSpecial2017" class="csl-entry">
Kaye, David. 2017. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression</em>. A/HRC/35/22. UN Human Rights Council. <a href="https://undocs.org/A/HRC/35/22">https://undocs.org/A/HRC/35/22</a>.
</div>
<div id="ref-khaitanReasonablenessRigorous2008" class="csl-entry">
Khaitan, Tarunabh. 2008. <span>“Beyond Reasonableness – a Rigorous Standard of Review for Article 15 Infringement.”</span> <em>Journal of the Indian Law Institute</em> 50 (2): 177–208. <a href="https://www.jstor.org/stable/43952433">https://www.jstor.org/stable/43952433</a>.
</div>
<div id="ref-klattConstitutionalStructure2012" class="csl-entry">
Klatt, Matthias, and Moritz Meister. 2012. <em>The Constitutional Structure of Proportionality</em>. 1st ed. Oxford University Press.
</div>
<div id="ref-KonateBurkina2014" class="csl-entry">
Konaté v. Burkina Faso, [2014] AfCHPR 004/2013 50 (African Court of Human and Peoples’ Rights 2014). <a href="http://www.ijrcenter.org/wp-content/uploads/2015/02/Konate-Decision-English.pdf">http://www.ijrcenter.org/wp-content/uploads/2015/02/Konate-Decision-English.pdf</a>.
</div>
<div id="ref-kremnitzerProportionalityAction2020" class="csl-entry">
Kremnitzer, Mordechai, Talya Steiner, and Andrej Lang, eds. 2020. <em>Proportionality in Action: Comparative and Empirical Perspectives on the Judicial Practice</em>. Cambridge Studies in Constitutional Law. Cambridge University Press. <a href="https://doi.org/10.1017/9781108596268">https://doi.org/10.1017/9781108596268</a>.
</div>
<div id="ref-larueReportSpecial2011b" class="csl-entry">
La Rue, Frank. 2011a. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, Frank La Rue</em>. A/HRC/17/27. UN Human Rights Council. <a href="https://undocs.org/A/HRC/17/27">https://undocs.org/A/HRC/17/27</a>.
</div>
<div id="ref-larueReportSpecial2011" class="csl-entry">
La Rue, Frank. 2011b. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression</em>. A/66/290/E. UN General Assembly. <a href="https://undocs.org/A/66/290">https://undocs.org/A/66/290</a>.
</div>
<div id="ref-larueReportSpecial2011a" class="csl-entry">
La Rue, Frank. 2011c. <em>Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression</em>. A/HRC/17/27. UN Human Rights Council. <a href="https://undocs.org/A/HRC/17/27">https://undocs.org/A/HRC/17/27</a>.
</div>
<div id="ref-lockeSecondTreatise1690" class="csl-entry">
Locke, John. 1690. <em>Second Treatise of Government</em>. Project Gutenberg. <a href="https://www.gutenberg.org/ebooks/7370/pg7370-images.html">https://www.gutenberg.org/ebooks/7370/pg7370-images.html</a>.
</div>
<div id="ref-NedunchezhianBar2015" class="csl-entry">
M. Nedunchezhian v. Bar Council of Tamil Nadu, W.P. 10673/2015 (2015). <a href="https://indiankanoon.org/doc/141782083/">https://indiankanoon.org/doc/141782083/</a>.
</div>
<div id="ref-malhotraSupremeCourt2023" class="csl-entry">
Malhotra, Gayatri. 2023. <span>“Supreme Court Refuses to Hear Miscellaneous Application Seeking Compliance with Internet Shutdown Guidelines Laid Out in the Anuradha Bhasin Judgement.”</span> Internet Freedom Foundation, December 13. https://web.archive.org/web/20240610112307/internetfreedom.in/sc-anuradha-bhasin-fmp-update/. <a href="https://internetfreedom.in/sc-anuradha-bhasin-fmp-update/">https://internetfreedom.in/sc-anuradha-bhasin-fmp-update/</a>.
</div>
<div id="ref-martinInternationalHuman2006" class="csl-entry">
Martin, Francisco Forrest, Stephen J. Schnably, Richard Wilson, Jonathan Simon, and Mark Tushnet, eds. 2006. <em>International Human Rights and Humanitarian Law: Treaties, Cases, and Analysis</em>. Cambridge University Press. <a href="https://doi.org/10.1017/CBO9780511808746">https://doi.org/10.1017/CBO9780511808746</a>.
</div>
<div id="ref-MdGulam1977" class="csl-entry">
Md. Gulam Abbas v. Md. Ibrahim, 1978 SCR (2) 419 ___ (1977). <a href="https://indiankanoon.org/doc/177888/">https://indiankanoon.org/doc/177888/</a>.
</div>
<div id="ref-mendelSpecialRapporteur2015" class="csl-entry">
Mendel, Toby. 2015. <span>“The UN Special Rapporteur on Freedom of Opinion and Expression: Progressive Development of International Standards Relating to Freedom of Expression.”</span> In <em>The United Nations and Freedom of Expression and Information: Critical Perspectives</em>, edited by Tarlach McGonagle and Yvonne Donders. Cambridge University Press. <a href="https://doi.org/10.1017/CBO9781316018552.009">https://doi.org/10.1017/CBO9781316018552.009</a>.
</div>
<div id="ref-ministryofcommunicationsanditDITSets2005" class="csl-entry">
Ministry of Communications and IT. 2005. <span>“DIT Sets up Expert Committee on Information Technology Act.”</span> Press Informaiton Bureau, January 7. <a href="https://pib.gov.in/newsite/erelcontent.aspx?relid=6372">https://pib.gov.in/newsite/erelcontent.aspx?relid=6372</a>.
</div>
<div id="ref-ministryofexternalaffairsindiaIndiaUnited2020" class="csl-entry">
Ministry of External Affairs, India. 2020. <span>“India and United Nations.”</span> June 1. <a href="https://mea.gov.in/Portal/ForeignRelation/India_UN_2020.pdf">https://mea.gov.in/Portal/ForeignRelation/India_UN_2020.pdf</a>.
</div>
<div id="ref-mishraGreatIndian2021" class="csl-entry">
Mishra, Anandita. 2021. <span>“Behind the Great Indian Internet Shutdown.”</span> Comment. <em>The Hindu</em>, September 14. https://web.archive.org/web/20240612184126/www.thehindu.com/opinion/op-ed/behind-the-great-indian-internet-shutdown/article62105487.ece. <a href="https://www.thehindu.com/opinion/op-ed/behind-the-great-indian-internet-shutdown/article62105487.ece">https://www.thehindu.com/opinion/op-ed/behind-the-great-indian-internet-shutdown/article62105487.ece</a>.
</div>
<div id="ref-mohanIndiaUnited2013" class="csl-entry">
Mohan, Archis. 2013. <span>“India and the United Nations.”</span> September 20. <a href="https://mea.gov.in/in-focus-article.htm?22231/India+and+the+United+Nations">https://mea.gov.in/in-focus-article.htm?22231/India+and+the+United+Nations</a>.
</div>
<div id="ref-munjalIndiaAre2021" class="csl-entry">
Munjal, Diksha. 2021. <span>“In India, Are Internet Shutdowns in Accordance with Law? Not Always.”</span> <em>Newslaundry</em>, October 29. <a href="https://www.newslaundry.com/2021/10/29/in-india-are-internet-shutdowns-in-accordance-with-law-not-always">https://www.newslaundry.com/2021/10/29/in-india-are-internet-shutdowns-in-accordance-with-law-not-always</a>.
</div>
<div id="ref-officeoftheunitednationshighcommissionerforhumanrightsInternetShutdowns2022" class="csl-entry">
Office of the United Nations High Commissioner for Human Rights. 2022. <em>Internet Shutdowns: Trends, Causes, Legal Implications and Impacts on a Range of Human Rights</em>. A/HRC/50/55. https://web.archive.org/web/20240608185934/documents.un.org/doc/undoc/gen/g22/341/55/pdf/g2234155.pdf?token=L9doL61eepdE5K1nxj&amp;fe=true (A/HRC/50/55). <a href="https://undocs.org/a/hrc/50/55">https://undocs.org/a/hrc/50/55</a>.
</div>
<div id="ref-padmanabhanCanJudges2014a" class="csl-entry">
Padmanabhan, Ananth. 2014a. <span>“Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 1).”</span> Centre for Internet and Society, January 30. <a href="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-1">https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-1</a>.
</div>
<div id="ref-padmanabhanCanJudges2014b" class="csl-entry">
Padmanabhan, Ananth. 2014b. <span>“Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2).”</span> Centre for Internet and Society, February 5. <a href="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2">https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2</a>.
</div>
<div id="ref-prakashDITResponse2011" class="csl-entry">
Prakash, Pranesh. 2011a. <span>“DIT’s Response to RTI on Website Blocking.”</span> Centre for Internet and Society, April 7. <a href="https://cis-india.org/internet-governance/blog/rti-response-dit-blocking">https://cis-india.org/internet-governance/blog/rti-response-dit-blocking</a>.
</div>
<div id="ref-prakashInvisibleCensorship2011" class="csl-entry">
Prakash, Pranesh. 2011b. <span>“Invisible Censorship: How the Government Censors Without Being Seen.”</span> Centre for Internet and Society, December 14. <a href="https://cis-india.org/internet-governance/invisible-censorship">https://cis-india.org/internet-governance/invisible-censorship</a>.
</div>
<div id="ref-prakashAnalysingLatest2012a" class="csl-entry">
Prakash, Pranesh. 2012. <span>“Analysing Latest List of Blocked Sites (Communalism &amp; Rioting Edition).”</span> Centre for Internet and Society, August 22. <a href="https://cis-india.org/about/internet-governance/blog/analysing-blocked-sites-riots-communalism">https://cis-india.org/about/internet-governance/blog/analysing-blocked-sites-riots-communalism</a>.
</div>
<div id="ref-praneshprakashWhoBlame2014" class="csl-entry">
Pranesh Prakash. 2014. <span>“Who to blame for blocking sites like Google Docs? Blame should fall on MarkScan, Multi Screen Media, the lawyers, &amp; Delhi HC. All complicit.”</span> Tweet. Twitter, July 8. <a href="https://twitter.com/pranesh/status/486424696356098048">https://twitter.com/pranesh/status/486424696356098048</a>.
</div>
<div id="ref-ptiRDayMobile2012" class="csl-entry">
PTI. 2012. <span>“R-Day: Mobile Phone, Internet Service Jammed in Kashmir.”</span> <em>Governance Now</em>, January 27. <a href="https://www.governancenow.com/gov-next/egov/r-day-mobile-phone-internet-service-jammed-kashmir">https://www.governancenow.com/gov-next/egov/r-day-mobile-phone-internet-service-jammed-kashmir</a>.
</div>
<div id="ref-PUCLUnion1996" class="csl-entry">
PUCL v. Union of India, 1997 SC AIR 568 (Supreme Court of India 1996). <a href="https://indiankanoon.org/doc/31276692/">https://indiankanoon.org/doc/31276692/</a>.
</div>
<div id="ref-PuttaswamyUnion2017" class="csl-entry">
Puttaswamy v. Union of India, AIR 2017 SC 4161 ___ (2017). <a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf">https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf</a>.
</div>
<div id="ref-rajanIndiaMaking1973" class="csl-entry">
Rajan, M. S. 1973. <span>“India and the Making of the UN Charter.”</span> <em>International Studies</em> 12 (3): 430–59. <a href="https://doi.org/10.1177/002088177301200303">https://doi.org/10.1177/002088177301200303</a>.
</div>
<div id="ref-ramachandranPUCLUnion2014" class="csl-entry">
Ramachandran, Chaitanya. 2014. <span>“PUCL v. Union of India Revisited: Why India’s Surveillance Law Must Be Redesigned for the Digital Age.”</span> <em>NUJS Law Review</em> 7: 105–19.
</div>
<div id="ref-RamdevFacebook2019" class="csl-entry">
Ramdev v. Facebook, CS (OS) 27/2019 (Delhi HC October 23, 2019). <a href="https://indiankanoon.org/doc/63056689/">https://indiankanoon.org/doc/63056689/</a>.
</div>
<div id="ref-ronenIncitementTerrorist2010" class="csl-entry">
Ronen, Yaël. 2010. <span>“Incitement to Terrorist Acts and International Law.”</span> <em>Leiden Journal of International Law</em> 23 (3): 645–74. <a href="https://doi.org/10.1017/S0922156510000269">https://doi.org/10.1017/S0922156510000269</a>.
</div>
<div id="ref-sheeranRelationshipInternational2013" class="csl-entry">
Sheeran, Scott. 2013. <span>“The Relationship of International Human Rights Law and General International Law.”</span> In <em>Routledge Handbook of International Human Rights Law</em>. Routledge.
</div>
<div id="ref-ShibuBaby2020" class="csl-entry">
Shibu Baby John v. State of Kerala, WP(C) 25793 of 2020(S) (2020). <a href="https://indiankanoon.org/doc/115732174/">https://indiankanoon.org/doc/115732174/</a>.
</div>
<div id="ref-shiryaevCyberterrorismContext2012" class="csl-entry">
Shiryaev, Yaroslav. 2012. <span>“Cyberterrorism in the Context of Contemporary International Law.”</span> <em>San Diego International Law Journal</em> 14 (1): 139. <a href="https://digital.sandiego.edu/ilj/vol14/iss1/5">https://digital.sandiego.edu/ilj/vol14/iss1/5</a>.
</div>
<div id="ref-ShreyaSinghal" class="csl-entry">
Shreya Singhal v. Union of India, AIR 2015 SC 1523 ___. Accessed December 8, 2021. <a href="https://indiankanoon.org/doc/110813550/">https://indiankanoon.org/doc/110813550/</a>.
</div>
<div id="ref-softwarefreedomlawcentreLegalityInternet2016" class="csl-entry">
Software Freedom Law Centre. 2016. <span>“Legality of Internet Shutdowns Under Section 144 CrPC.”</span> SFLC.in, October 2. <a href="https://sflc.in/legality-internet-shutdowns-under-section-144-crpc">https://sflc.in/legality-internet-shutdowns-under-section-144-crpc</a>.
</div>
<div id="ref-softwarefreedomlawcentreInternetShutdowns2021" class="csl-entry">
Software Freedom Law Centre. 2021. <span>“Internet Shutdowns Tracker.”</span> Internet Shutdowns Tracker by - SFLC.in. <a href="https://internetshutdowns.in/">https://internetshutdowns.in/</a>.
</div>
<div id="ref-softwarefreedomlawcentreRTIApplication2022" class="csl-entry">
Software Freedom Law Centre. 2022a. <span>“RTI Application Response from Rajasthan Shows Procedural Lapses and Arbitrary Orders.”</span> SFLC.in, January 17. <a href="https://sflc.in/rti-application-response-rajasthan-shows-procedural-lapses-and-arbitrary-orders">https://sflc.in/rti-application-response-rajasthan-shows-procedural-lapses-and-arbitrary-orders</a>.
</div>
<div id="ref-softwarefreedomlawcentreSFLCWrit2022" class="csl-entry">
Software Freedom Law Centre. 2022b. <em>SFLC’S Writ Petition Challenging Arbitrary Internet Shutdowns During Examinations in the Supreme Court of India</em>. September 14. https://web.archive.org/web/20240610112710/sflc.in/sflcins-writ-petition-challenging-arbitrary-internet-shutdowns-during-examinations-supreme-court/. <a href="https://sflc.in/sflcins-writ-petition-challenging-arbitrary-internet-shutdowns-during-examinations-supreme-court/">https://sflc.in/sflcins-writ-petition-challenging-arbitrary-internet-shutdowns-during-examinations-supreme-court/</a>.
</div>
<div id="ref-stonesweetProportionalityBalancing2019" class="csl-entry">
Stone Sweet, Alec, and Jud Mathews. 2019. <em>Proportionality Balancing and Constitutional Governance: A Comparative and Global Approach</em>. 1st ed. Oxford University Press. <a href="https://doi.org/10.1093/oso/9780198841395.001.0001">https://doi.org/10.1093/oso/9780198841395.001.0001</a>.
</div>
<div id="ref-sullivanProportionalityPrinciples2009" class="csl-entry">
Sullivan, E. Thomas, and Richard S. Frase. 2009. <em>Proportionality Principles in American Law: Controlling Excessive Government Actions</em>. Oxford University Press.
</div>
<div id="ref-CableTelevision1995" class="csl-entry">
The Cable Television Networks (Regulation) Act (1995). <a href="https://www.indiacode.nic.in/bitstream/123456789/1928/1/A1995-07.pdf">https://www.indiacode.nic.in/bitstream/123456789/1928/1/A1995-07.pdf</a>.
</div>
<div id="ref-SundayTimes1979" class="csl-entry">
The Sunday Times v. The United Kingdom, [1979] ECHR 6538/74 ___ (ECHR (1979) 1979). <a href="https://www.bailii.org/eu/cases/ECHR/1979/1.html">https://www.bailii.org/eu/cases/ECHR/1979/1.html</a>.
</div>
<div id="ref-timesnewsnetworkDinLS2008" class="csl-entry">
Times News Network. 2008. <span>“Amid Din, LS Passes 8 Bills in 17 Minutes Without Debate.”</span> <em>The Times of India</em>, December 24. <a href="https://timesofindia.indiatimes.com/india/amid-din-ls-passes-8-bills-in-17-minutes-without-debate/articleshow/3883245.cms">https://timesofindia.indiatimes.com/india/amid-din-ls-passes-8-bills-in-17-minutes-without-debate/articleshow/3883245.cms</a>.
</div>
<div id="ref-timesnewsnetworkNoMore2018" class="csl-entry">
Times News Network. 2018. <span>“<span>‘No More Internet Ban During Exam’</span>.”</span> <em>The Times of India</em>, November 29. <a href="https://timesofindia.indiatimes.com/city/jodhpur/no-more-internet-ban-during-exam/articleshow/66855691.cms">https://timesofindia.indiatimes.com/city/jodhpur/no-more-internet-ban-during-exam/articleshow/66855691.cms</a>.
</div>
<div id="ref-TolstoyMiloslavsky1995" class="csl-entry">
Tolstoy Miloslavsky v. The United Kingdom, [1995] ECHR 25 ___ (ECHR 1995). <a href="https://www.bailii.org/eu/cases/ECHR/1995/25.html">https://www.bailii.org/eu/cases/ECHR/1995/25.html</a>.
</div>
<div id="ref-unhumanrightscommitteeGeneralComment2004" class="csl-entry">
UN Human Rights Committee. 2004. <em>General Comment No. 31: The Nature of the General Legal Obligation Imposed on States Parties to the Covenant</em>. CCPR/C/21/Rev.1/Add.13. UN Human Rights Committee. <a href="https://doi.org/10.1016/B978-0-444-87911-0.50085-4">https://doi.org/10.1016/B978-0-444-87911-0.50085-4</a>.
</div>
<div id="ref-unhumanrightscommitteeGeneralComment2011" class="csl-entry">
UN Human Rights Committee. 2011. <em>General Comment No.&nbsp;34</em>. CCPR/C/GC/34. UN Human Rights Committee. <a href="https://undocs.org/CCPR/C/GC/34">https://undocs.org/CCPR/C/GC/34</a>.
</div>
<div id="ref-unhumanrightscouncilResolution192012" class="csl-entry">
UN Human Rights Council. 2012a. <em>Resolution 19/36: Human Rights, Democracy and the Rule of Law</em>. A/HRC/RES/19/36. https://web.archive.org/web/20240612173732/documents.un.org/doc/resolution/gen/g12/131/66/pdf/g1213166.pdf?token=IAeEgLCJLCwJUW96T8&amp;fe=true (A/HRC/RES/19/36). <a href="https://undocs.org/A/HRC/RES/19/36">https://undocs.org/A/HRC/RES/19/36</a>.
</div>
<div id="ref-unhumanrightscouncilResolution202012" class="csl-entry">
UN Human Rights Council. 2012b. <em>Resolution 20/8: The Promotion, Protection and Enjoyment of Human Rights on the Internet</em>. A/HRC/RES/20/8. UN Human Rights Council. <a href="https://undocs.org/A/HRC/RES/20/8">https://undocs.org/A/HRC/RES/20/8</a>.
</div>
<div id="ref-unhumanrightscouncilResolution232013" class="csl-entry">
UN Human Rights Council. 2013. <em>Resolution 23/2: The Role of Freedom of Opinion and Expression in Women’s Empowerment</em>. A/HRC/RES/23/2. UN Human Rights Council. <a href="https://undocs.org/A/HRC/RES/23/2">https://undocs.org/A/HRC/RES/23/2</a>.
</div>
<div id="ref-unhumanrightscouncilResolution262014" class="csl-entry">
UN Human Rights Council. 2014. <span>“Resolution 26/13: The Promotion, Protection and Enjoyment of Human Rights on the Internet.”</span> A/HRC/RES/26/13. UN Human Rights Council, July 14. <a href="https://doi.org/10.1163/2210-7975_HRD-9970-2016149">https://doi.org/10.1163/2210-7975_HRD-9970-2016149</a>.
</div>
<div id="ref-unhumanrightscouncilResolution472021" class="csl-entry">
UN Human Rights Council. 2021. <em>Resolution 47/16: The Promotion, Protection and Enjoyment of Human Rights on the Internet</em>. A/HRC/RES/47/16. Geneva. <a href="https://undocs.org/pdf?symbol=en/A/HRC/RES/47/16">https://undocs.org/pdf?symbol=en/A/HRC/RES/47/16</a>.
</div>
<div id="ref-unsecuritycouncilResolution16242005" class="csl-entry">
UN Security Council. 2005. <em>Resolution 1624</em>. UN Security Council. <a href="https://undocs.org/S/RES/1624(2005)">https://undocs.org/S/RES/1624(2005)</a>.
</div>
<div id="ref-unsrJointDeclaration2015" class="csl-entry">
UN Special Rapporteur on Freedom of Opinion and Expression, OSCE Representative on Freedom of the Media, OAS Special Rapporteur on Freedom of Expression, and ACHPR Special Rapporteur on Freedom of Expression and Access to Information. 2015. <em>Joint Declaration on Freedom of Expression and Responses to Conflict Situations</em>. Riga. <a href="https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=15921&amp;LangID=E">https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=15921&amp;LangID=E</a>.
</div>
<div id="ref-urbinaCritiqueProportionality2017" class="csl-entry">
Urbina, Francisco J. 2017. <em>A Critique of Proportionality and Balancing</em>. Cambridge University Press.
</div>
<div id="ref-vandervyverSovereignty2013" class="csl-entry">
Van der Vyver, Johan D. 2013. <span>“Sovereignty.”</span> In <em>The Oxford Handbook of International Human Rights Law</em>, edited by Dinah Shelton. Oxford University Press. <a href="https://doi.org/10.1093/law/9780199640133.003.0017">https://doi.org/10.1093/law/9780199640133.003.0017</a>.
</div>
<div id="ref-verdirameHumanRights2013" class="csl-entry">
Verdirame, Guglielmo. 2013. <span>“Human Rights in Political and Legal Theory.”</span> In <em>Routledge Handbook of International Human Rights Law</em>. Routledge.
</div>
<div id="ref-vice-chairoftheworkinggrouponarbitrarydetentionLetterHuman2019" class="csl-entry">
Vice-Chair of the Working Group on Arbitrary Detention, Chair-Rapporteur of the Working Group on Enforced or Involuntary Disappearances, Special Rapporteur on extrajudicial, summary or arbitrary executions, Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Special Rapporteur on the rights to freedom of peaceful assembly and of association, and Special Rapporteur on the situation of human rights defenders. 2019. <span>“Letter from UN Human Rights Experts to Indian Government on Situation in Kashmir.”</span> August 16. <a href="https://spcommreports.ohchr.org/TMResultsBase/DownLoadPublicCommunicationFile?gId=24803">https://spcommreports.ohchr.org/TMResultsBase/DownLoadPublicCommunicationFile?gId=24803</a>.
</div>
<div id="ref-vouleEndingInternet2021" class="csl-entry">
Voule, Clément N. 2021. <em>Ending Internet Shutdowns: A Path Forward: Report of the Special Rapporteur on the Rights to Freedom of Peaceful Assembly and of Association</em>. A/HRC/47/24/Add.2. UN Human Rights Council. <a href="https://undocs.org/A/HRC/47/24/Add.2">https://undocs.org/A/HRC/47/24/Add.2</a>.
</div>
<div id="ref-Expedient2021" class="csl-entry">
<em>Wiktionary</em>. 2021. <span>“expedient.”</span> July 25. <a href="https://en.wiktionary.org/w/index.php?title=expedient&amp;oldid=63393589">https://en.wiktionary.org/w/index.php?title=expedient&amp;oldid=63393589</a>.
</div>
<div id="ref-UnionIndia2021" class="csl-entry">
X v. Union of India, W.P.(CRL) 1082/2020 (Delhi HC April 20, 2021). <a href="https://indiankanoon.org/doc/190535334/">https://indiankanoon.org/doc/190535334/</a>.
</div>
<div id="ref-yapProportionalityAsia2020" class="csl-entry">
Yap, Po Jen, ed. 2020. <em>Proportionality in Asia</em>. Cambridge University Press. <a href="https://doi.org/10.1017/9781108862950">https://doi.org/10.1017/9781108862950</a>.
</div>
</div></section><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>See, e.g., <span class="citation" data-cites="vandervyverSovereignty2013">Van der Vyver (2013)</span>, Part 3, “State sovereignty is thus no longer an absolute right. Even insofar as it remains a prominent principle in international relations, its implementation has, at least <em>de facto</em> if not <em>de jure</em>, become subordinate to the values embedded in the human rights doctrine.”; <span class="citation" data-cites="verdirameHumanRights2013">Verdirame (2013)</span>, p.&nbsp;33-34, “Human rights are conceived mainly as limits to the sovereignty of states which can be enforced by other states. Their violation is a matter of ‘international concern’ and a potential basis for interference.”; <span class="citation" data-cites="sheeranRelationshipInternational2013">Sheeran (2013)</span>, section 4.5, “The growing inﬂuence of the inherent dignity of the human being has successfully eroded state sovereignty. It has developed human rights both as a constitutive principle within the UN Charter and arguably as a secondary foundation of the international legal order.”↩︎</p></li>
<li id="fn2"><p>The use and misuse of this power are examined in depth in a monograph by Raman Jit Singh Chima <span class="citation" data-cites="chimaRegulationInternet2008">(Chima 2008)</span>.↩︎</p></li>
<li id="fn3"><p>The author’s personal recollection, watching the proceedings live on television <span class="citation" data-cites="timesnewsnetworkDinLS2008">(Times News Network 2008)</span>.↩︎</p></li>
<li id="fn4"><p>Rule 8(1): “On receipt of request under rule 6, the Designated Officer shall make all reasonable efforts to identify the person or intermediary who has hosted the information or part thereof as well as the computer resource on which such information or part thereof is being hosted and where he is able to identify such person or intermediary and the computer resource hosting the information or part thereof which have been requested to be blocked for public access, he shall issue a notice by way of letters or fax or e-mail signed with electronic signatures to such person or intermediary in control of such computer resource to appear and submit their reply and clarifications, if any, before the committee referred to in rule 7, at a specified date and time, which shall not be less than forty-eight hours from the time of receipt of such notice by such person or intermediary.”↩︎</p></li>
<li id="fn5"><p>These being: the International Covenant on Civil and Political Rights (ICCPR); the International Covenant on Economic, Social and Cultural Rights (ICESCR); the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD); the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) and the Convention on the Rights of the Child (CRC); the Convention on the Rights of Persons with Disabilities (CRPD). India has also signed, but not ratified, the International Convention for the Protection of all Persons from Enforced Disappearance (ICPPED); and the UN Convention against Transnational Organized Crime (UNTOC).↩︎</p></li>
<li id="fn6"><p>Article 51 states:</p>
<blockquote class="blockquote">
<p>Article 51.— The State shall endeavour to</p>
<blockquote class="blockquote">
<ol type="a">
<li>promote international peace and security;</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<ol start="2" type="a">
<li>maintain just and honourable relations between nations;</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<ol start="3" type="a">
<li>foster respect for international law and treaty obligations in the dealings of the organized peoples with one another; and</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<ol start="4" type="a">
<li>encourage settlement of international disputes by arbitration.</li>
</ol>
</blockquote>
</blockquote>
<p>While first draft of that provision had stronger language, which said, “The State shall…” in place of “The State shall endeavour to…” <span class="citation" data-cites="hegdeIndianCourts2010">(Hegde 2010, 58)</span>, the Article was passed with the weaker language and as part of the non-justiciable Directive Principles of State Policy.↩︎</p></li>
<li id="fn7"><p>The Protection of Human Rights Act, 1993:↩︎</p></li>
<li id="fn8"><p>Even Benvenisti <span class="citation" data-cites="benvenistiReclaimingDemocracy2008">(2008, 261)</span> admits that an Indian High Court once mistook the Rio Declaration on Environment and Development, a mere declaration—and thus a soft norm—for an “agreement” that was “enacted”. This demonstrates a lack of serious engagement with international law.↩︎</p></li>
<li id="fn9"><p>Article 19 of the UDHR states:</p>
<blockquote class="blockquote">
<p>Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.</p>
</blockquote>
↩︎</li>
<li id="fn10"><p>Clauses 1 and 2 of Article 19 of the ICCPR state:</p>
<blockquote class="blockquote">
<ol type="1">
<li>Everyone shall have the right to hold opinions without interference.</li>
<li>Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally, in writing or in print, in the form of art, or through any other media of his choice.</li>
</ol>
</blockquote>
↩︎</li>
<li id="fn11"><p>Clause 2 of Article 29 of the UDHR states:</p>
<blockquote class="blockquote">
<ol start="2" type="1">
<li>In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedoms of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society.</li>
</ol>
</blockquote>
↩︎</li>
<li id="fn12"><p>Clause 3 of Article 19 of the ICCPR allows for ‘certain restrictions’:</p>
<blockquote class="blockquote">
<ol start="3" type="1">
<li>The exercise of the rights provided for in paragraph 2 of this article carries with it special duties and responsibilities. It may therefore be subject to certain restrictions, but these shall only be such as are provided by law and are necessary:</li>
</ol>
</blockquote>
<blockquote class="blockquote">
<blockquote class="blockquote">
<ol type="a">
<li>For respect of the rights or reputations of others;</li>
<li>For the protection of national security or of public order (ordre public), or of public health or morals.</li>
</ol>
</blockquote>
</blockquote>
↩︎</li>
<li id="fn13"><p>Article 20(1) of the UDHR states:</p>
<blockquote class="blockquote">
<ol type="1">
<li>Everyone has the right to freedom of peaceful assembly and association.</li>
</ol>
</blockquote>
<p>Article 21 of the ICCPR states:</p>
<blockquote class="blockquote">
<p>Article 21. The right of peaceful assembly shall be recognized. No restrictions may be placed on the exercise of this right other than those imposed in conformity with the law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others.</p>
</blockquote>
↩︎</li>
<li id="fn14"><p>Article 22 of the ICCPR states:</p>
<blockquote class="blockquote">
<ol type="1">
<li>Everyone shall have the right to freedom of association with others, including the right to form and join trade unions for the protection of his interests.</li>
<li>No restrictions may be placed on the exercise of this right other than those which are prescribed by law and which are necessary in a democratic society in the interests of national security or public safety, public order (ordre public), the protection of public health or morals or the protection of the rights and freedoms of others. This article shall not prevent the imposition of lawful restrictions on members of the armed forces and of the police in their exercise of this right.</li>
</ol>
</blockquote>
↩︎</li>
<li id="fn15"><p>Article 21(2) of the UDHR states:</p>
<blockquote class="blockquote">
<ol start="2" type="1">
<li>Everyone has the right to equal access to public service in his country.</li>
</ol>
</blockquote>
<p>Article 27(1) of the UDHR states:</p>
<blockquote class="blockquote">
<ol type="1">
<li>Everyone has the right freely to participate in the cultural life of the community, to enjoy the arts and to share in scientific advancement and its benefits.</li>
</ol>
</blockquote>
↩︎</li>
<li id="fn16"><p>The Telecommunications Act 2023 changes this to “defence and security of the State”.↩︎</p></li>
<li id="fn17"><p>It is to be noted that Section 69A doesn’t speak of “incitement to the commission of an offence”, but “incitement to the commission of any cognizable offence relating to the above [five grounds]”. This is an noteworthy and welcome difference from the wording of both Section 5(2) of the Telegraph Act, as well as Article 19(2) of the Constitution.↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@article{prakashInternetBlocking2024,
  author = {Prakash, Pranesh},
  title = {Internet Blocking and Shutdowns in {India} and International
    Human Rights Law},
  journal = {Indian Public Policy Review},
  volume = {5},
  number = {3 (May-Jun)},
  pages = {38-76},
  date = {2024-06-21},
  urldate = {2024-06-22},
  url = {https://ippr.in/index.php/ippr/article/view/282},
  doi = {10.55763/ippr.2024.05.03.002},
  langid = {en-IN},
  abstract = {This paper examines the provision for Internet blocking
    and shutdowns in Indian law, and compares it with international
    human rights law (IHRL). It finds that IHRL potentially offers a
    useful lens through which to view these actions; that IHRL is widely
    accepted by the Indian state, including the judiciary; and that IHRL
    provides a useful complement to constitutional analysis. It also
    finds that the Indian laws and practices around Internet shutdowns
    and online content blocking fall short of IHRL in significant ways,
    including when it comes to the principles of legality, legitimate
    aims, necessity, proportionality, transparency, and remedies for
    violation of rights. Finally, it offers suggestions on how to
    improve the laws and practices in each of these areas, so as to
    comply with India’s IHRL obligations.}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashInternetBlocking2024" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2024. <span>“Internet Blocking and Shutdowns in India
and International Human Rights Law.”</span> <em>Indian Public Policy
Review</em> 5 (3 (May-Jun)).
https://web.archive.org/web/20240622073734/https://ippr.in/index.php/ippr/article/view/282
(3 (May-Jun)). <a href="https://doi.org/10.55763/ippr.2024.05.03.002">https://doi.org/10.55763/ippr.2024.05.03.002</a>.
</div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/articles/internet-blocking-and-shutdowns-in-india-and-international-human-rights-law.html</guid>
  <pubDate>Fri, 21 Jun 2024 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Glaring errors in UIDAI’s rebuttal</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/articles/glaring-errors-in-uidais-rebuttal.html</link>
  <description><![CDATA[ 






<hr>
<p>While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).</p>
<p>The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) “flattens” with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate “threshold distance” which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).</p>
<p>However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises).</p>
<p>Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper “Role of Biometric Technology in Aadhaar Enrollment,” the UIDAI states: “FPIR rate grows linearly with the database size” (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else). Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.</p>
<p>If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.</p>
<p>In their paper they note that “although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores” (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed “manageable values,” they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.</p>
<section id="references" class="level2">
<h2 class="anchored" data-anchor-id="references">References</h2>
<p>UIDAI (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique Identification Authority of India, Government of India, New Delhi, viewed on 18 August 2016, <a href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology" class="uri">https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology</a></p>
</section>
<section id="related-links" class="level2">
<h2 class="anchored" data-anchor-id="related-links">Related Links</h2>
<ul>
<li>Flaws in the UIDAI Process <a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html" class="uri">http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html</a></li>
<li>Erring on Aadhaar <a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html" class="uri">http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html</a></li>
<li>Request for Specifics <a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html" class="uri">http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html</a></li>
<li>Glaring Errors in UIDAI’s Rebuttal <a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html" class="uri">http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html</a></li>
<li>Overlooking the UIDAI Process <a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html" class="uri">http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html</a></li>
</ul>


</section>

<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@article{prakashGlaringErrors2015,
  author = {Prakash, Pranesh},
  title = {Glaring Errors in {UIDAI’s} Rebuttal},
  journal = {Economic and Political Weekly},
  pages = {7-8},
  date = {2015-09-03},
  urldate = {2019-01-12},
  url = {https://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html},
  langid = {en},
  abstract = {The article questions Unique Identification Authority of
    India’s response, which found “serious mathematical errors” in
    “Flaws in the UIDAI Process” (EPW,12 March 2016).}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashGlaringErrors2015" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2015. <span>“Glaring Errors in UIDAI’s
Rebuttal.”</span> <em>Economic and Political Weekly</em>, September 3,
7–8. <a href="https://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html">https://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html</a>.
</div></div></section></div> ]]></description>
  <category>Identity</category>
  <guid>https://pranesh.in/scholarly/articles/glaring-errors-in-uidais-rebuttal.html</guid>
  <pubDate>Thu, 03 Sep 2015 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Global censorship: shifting modes, persisting paradigms</title>
  <link>https://pranesh.in/scholarly/books/2015_global-censorship-shifting-modes-persisting-paradigms.html</link>
  <description><![CDATA[ 






<p><a href="./a2k_global-censorship.pdf" class="external" target="_blank"><img src="https://pranesh.in/scholarly/books/a2k_global-censorship_book-cover.jpg" class="img-fluid" style="width:50.0%" alt="Global censorship: shifting modes, persisting paradigms"></a></p>
<p>In 2014, while on a fellowship with the Yale Law School’s Information Society Project, I was the lead editor for the book <em>Global censorship: shifting modes, persisting paradigms</em>, which was brought out by the A2K Global Academy (Information Society Project, Yale Law School; Access to Knowledge for Development Centre, American University, Cairo; and Instituto de Technologia &amp; Sociedade do Rio).</p>
<p>That book followed from ‘Global Censorship’ conference at Yale in 2012, and was published as the 2nd installment of the Access to Knowledge Research Series. It had contributions from:</p>
<table class="caption-top table">
<colgroup>
<col style="width: 25%">
<col style="width: 25%">
<col style="width: 49%">
</colgroup>
<thead>
<tr class="header">
<th>Author(s)</th>
<th>Country</th>
<th>Chapter title</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td>Margot Kaminski &amp; Pranesh Prakash</td>
<td></td>
<td>Introductory Framework</td>
</tr>
<tr class="even">
<td>Laura DeNardis</td>
<td></td>
<td>The Privatization of Free Expression</td>
</tr>
<tr class="odd">
<td>Anjali Dalal</td>
<td>United States of America</td>
<td>The Rise of Indirect Censorship</td>
</tr>
<tr class="even">
<td>Christina Mulligan</td>
<td>United States of America</td>
<td>Using Copyright Law to Censor Speech</td>
</tr>
<tr class="odd">
<td>Caroline Ncube &amp; Eve Gray</td>
<td>South Africa &amp; Zimbabwe</td>
<td>Silencing Critical Voices</td>
</tr>
<tr class="even">
<td>Andrew Rens</td>
<td>South Africa</td>
<td>Censorship on Demand: Failure of Due Process in ISP Liability and Takedown Procedures</td>
</tr>
<tr class="odd">
<td>Rebecca Wexler</td>
<td>Sri Lanka</td>
<td>Censorship through Forensics: Video Evidence in Post-War Crises</td>
</tr>
<tr class="even">
<td>Pranesh Prakash</td>
<td>India</td>
<td>Visible and Invisible Censorship</td>
</tr>
<tr class="odd">
<td>Hong Xue</td>
<td>China</td>
<td>E-Commerce Third-Party Platforms as Gatekeepers of Information Flows</td>
</tr>
<tr class="even">
<td>Erin Biel</td>
<td>Myanmar</td>
<td>Bans, Blaming &amp; Buddhist Monks: Censorship Concerns around Myanmar’s Ethno-Religious Violence and Democratic Transition</td>
</tr>
<tr class="odd">
<td>Mônica Steffen Guise Rosina &amp; Alexandre Pacheco da Silva</td>
<td>Brazil</td>
<td>Challenges for Freedom of Speech Online</td>
</tr>
<tr class="even">
<td>Nagla Rizk</td>
<td>Egypt</td>
<td>Behind Egypt’s Communication Outage of 2011: Censorship and Economic Liberty</td>
</tr>
</tbody>
</table>



<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@book{prakashGlobalCensorship2014,
  author = {},
  editor = {Prakash, Pranesh and Rizk, Nagla and Affonso Souza, Carlos},
  title = {Global Censorship: Shifting Modes, Persisting Paradigms},
  series = {Access to Knowledge Research Series},
  number = {2},
  pages = {230},
  date = {2014},
  url = {https://cis-india.org/a2k/a2kga-global-censorship},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashGlobalCensorship2014" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh, Nagla Rizk, and Carlos Affonso Souza, eds. 2014.
<em>Global Censorship: Shifting Modes, Persisting Paradigms</em>. Access
to Knowledge Research Series 2. <a href="https://cis-india.org/a2k/a2kga-global-censorship">https://cis-india.org/a2k/a2kga-global-censorship</a>.
</div></div></section></div> ]]></description>
  <category>Access to knowledge</category>
  <category>Freedom of expression</category>
  <guid>https://pranesh.in/scholarly/books/2015_global-censorship-shifting-modes-persisting-paradigms.html</guid>
  <pubDate>Fri, 01 May 2015 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Introductory framework</title>
  <dc:creator>Margot Kaminski</dc:creator>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/kaminski-and-prakash_2015_introductory-framework.html</link>
  <description><![CDATA[ 






<p>In 2006, during the Access to Knowledge conference organized by the Yale Information Society Project, Jack Balkin gave a speech in which he identified three broad points about the theory of access to knowledge:</p>
<ul>
<li><p>First, Access to Knowledge is a demand of justice.</p></li>
<li><p>Second, Access to Knowledge is both an issue of economic development and an issue of individual participation and human liberty.</p></li>
<li><p>Third, Access to Knowledge is about intellectual property, but it is also about far more than that.<sup>1</sup></p></li>
</ul>
<p>In his 2007 address at the second Access to Knowledge conference, Balkin provided some ideas about what that “far more than that” consisted of. He situated access to knowledge as the goal of a broader ‘knowldege and information policy’, of which freedom of speech is a part. Freedom of speech and access to knowledge depend on what Balkin identifies as an ‘infrastructure of free expression’,<sup>2</sup> which enable ‘democratic access to and participation in cultures’.</p>
<p>This book seeks to address that larger view of access to knowledge by bringing together a series of case studies that provide a broader picture of what censorship is today. One of the most difficult problems faced by individuals working in this area is definitional.<sup>3</sup> Given the broad range of speech-related tactics that different countries use, what do we mean when we use the word “censorship?”</p>
<p>At the Global Censorship conference held at Yale Law School in March 2010, which laid the foundation for this book, Balkin, once again, presented a useful framework for beginning to answer this question.<sup>4</sup> Censorship — which Balkin calls ‘speech regulation’, to avoid the pejorative connotations that word carries — can be divided into two rough types: “old school” and “new school”. Old-school censorship has characteristics of direct and salient use by the state of its power to detain, block, or destroy. For instance, the police could show up at a journalist’s home, confiscate all written materials, and throw the journalist in jail. This is the type of censorship that is instantly recognizable as censorship. Likewise, using a state agent to black out objectionable passages in all copies of a book, or to use the court system to prevent distribution of the book altogether, is old-school censorship. Even when the state co-opts private parties — as happened during the McCarthy witch-hunts against communists in the United States — the censorship that takes place is still quite visible, and easily identifiable as censorship.</p>
<p>New-school censorship is markedly different in several ways. It is often not performed by the state itself, but is either outsourced through third-parties — such as internet service providers, web services, or financial intermediaries — or is performed by private actors without the active direction or involvement of the state. It is often indirect, and communication is blocked through less obvious means. It also tends to rely on digital surveillance, and in many cases on state access to infrastructure and authority over digital infrastructure providers.</p>
<p>Old-school censorship is a dying breed in many democracies where freedom of expression is guaranteed by a constitution or a bill of rights. New-school censorship, on the other hand, occurs regularly, but is often not readily identified as ‘censorship’ — hence, the definitional problem. In more repressive regimes, new school censorship interacts with the old in deeply problematic ways. A state may pursue both forms of censorship at the same time: outsource certain kinds of censorship to private parties, and still arrest journalists on false charges and throw them in jail. The two types of censorship also share common features; surveillance has played a role in both types, and it is arguably more ubiquitous today than ever before.</p>
<p>Despite these notable differences, this book does not claim that there is a bright-line division between old- and new-school censorship, nor between digital and non-digital censorship, nor does it claim that all experiences of censorship are equivalent in harm or scope. Rather, it seeks to illustrate the range of tactics used by states — and corporations — today and recently, that control and restrict the present knowledge environment, and the infrastructure of free expression, both online and offline, and through them to illuminate some of the changes we are seeing in the nature of censorship itself.</p>
<p>The chapters of this book address a wide variety of censorship activities taking place around the world, across nine countries in four continents. Some of the country chapters focus exclusively on digital case studies, while others look at both digital and offline censorship as inseparable. In these chapters, two important questions are repeatedly addressed, implicitly or explicitly. First, what is meant by censorship, and what shapes and forms does it take in actual practice? Second, how do organs of the state and civil society engage with the practice and contours of that censorship, and create possibilities for accountability and for change?</p>
<section id="defining-censorship" class="level2">
<h2 class="anchored" data-anchor-id="defining-censorship">Defining censorship</h2>
<p>The first question of “what is meant by censorship” can be answered along three observable axes: the justifications provided, the actors involved, and the methods used. Censors regularly offer justifications for censorship, ranging from preventing criticisms of the government, to protecting national security, to balancing speech against other rights such as privacy, or intellectual property, or personal dignity. Each case in this book addresses one or more of the justifications states give for creating censorship regimes. Some of these directly target expression, while for others restrictions on free expression is a collateral cost. Sometimes a technical regime that is built with one justification in mind — say, curbing online distribution of child pornography — may end up serving another — enforcement of maximalist interpretations of copyright law.</p>
<p>In identifying what is meant by censorship in each case study, the authors have paid close attention to which actors are involved. States increasingly do not regulate speech directly. They employ intermediaries, encourage private contracting, or permit private censorship. Censorship can involve multiple actors in different capacities. An actor-oriented categorization of censorship could divide it up as: direct state censorship, state-directed censorship, state-enabled censorship, state-independent private censorship, societal censorship, and self-censorship. In each of these categories — with the exception of societal and self-censorship — the act of censorship can be seen as being lawful, unlawful, or even extra-legal. Most laws protect against state censorship, but in mature democracies like the United States of America or India there is little naked state censorship, with state-directed, state-enabled, state-independent private, societal and self-censorship being the more important conceptual categories.</p>
<p>States also employ vastly different methods for censoring. Some go after communications infrastructure by employing broad ‘kill switches’, as in Egypt. Others engage in surveillance, thereby on occasion chilling the speech of journalists or activists or minorities, as in the USA and Myanmar. Some establish liability regimes, whether criminal or civil, directed at users or communication intermediaries, as in South Africa, India, and China. Others revise right to information laws to prevent journalists from accessing government information. Some continue to perpetuate old school censorship by employing the enforcement powers of the state, as has been done in Brazil through the judiciary. Each case study in this book addresses one or more censorship method chosen by the state, or in some cases private entities, to stop or shape some kind of speech, or that is chosen for other reasons, but structurally achieves the result of interfering with free expression. Importantly, by using the word ‘censorship’ we do not necessarily impute malicious motivations to the actor that is censoring. In some cases, it is a lack of understanding of the implications of their actions that leads to censorship, as we see in some of the case studies, for example, from South Africa and India.</p>
</section>
<section id="overview-of-chapters" class="level2">
<h2 class="anchored" data-anchor-id="overview-of-chapters">Overview of Chapters</h2>
<p>While there is no way of succinctly capturing all the different ideas contained in the various chapters of this book, we will briefly walk through the themes that they touch upon. Dr.&nbsp;Laura DeNardis’s chapter titled “The Privatization of Free Expression”, kicks off the book, and in it she explores the role of Internet governance, especially its technical governance and what she terms “private public policy”, in determining whether the “technical characteristics providing infrastructures of free expression” are preserved and promoted on the Internet.</p>
<p>In her chapter on the United States of America, Anjali Dalal looks at the evolution of the chilling effects doctrine in American free speech law, and some of the adverse consequences of domestic mass surveillance, especially on minority populations. In the second chapter to look at the USA, Prof.&nbsp;Christina Mulligan writes of the use of copyright law to remove non-copyright-infringing material, including political speech and cultural speech, through intermediary liability-linked content removal requests, and through “seizures” of domain names: a step unprecedented in other countries. She notes how our inherent sense that censorship ostensibly for copyright reasons bring forth lesser vigilance: “the public would likely have been up in arms”, she notes, if in the scenario she describes, “a magazine printing press” had been seized “instead of a domain name”.</p>
<p>In their joint chapter on Zimbabwe and South Africa, Prof.&nbsp;Caroline Ncube and Dr.&nbsp;Eve Gray paint a broad-brush overview of the law relating to access to information, official secrets, intermediary liability, and insult of the state by going through a wide assortment of instances of censorship. They examine different kinds of instances of censorship, ranging from direct (“old-school”) state censorship through arrest of journalists to self-censorship due to the atmosphere created by a political party.</p>
<p>Expanding on one of the threads that Dr.&nbsp;Gray touches upon in that chapter, Andrew Rens presents detailed analysis of the intermediary liability regime and its constitutionality. By doing so, he answers the question of whether “interdiction of the means of speech be characterized as censorship, when it is carried out by one non-state actor at the behest of another?”</p>
<p>In a markedly different take on the theme, the chapter by Rebecca Wexler looks not at direct state censorship, but at the environment required for informed political debate in a free society by focussing on standards when it comes to video forensic evidence, and its role in truth-making. They examine in depth the forensic examination of a set of videos that purportedly show the cold-blooded shooting of Tamil Tigers by the Sri Lankan armed forces during the civil war, and how opaque technical procedures go on to determine “truth” in political discourse.</p>
<p>The next chapter is that on India by Pranesh Prakash. In that chapter he presents an overview of online censorship in India since the mid-1990s, from direct state censorship to state-directed and private state-independent censorship, and then focusses on the new intermediary liability regime that brings about what he terms “invisible censorship”.</p>
<p>Prof.&nbsp;Hong Xue continues with the theme of intermediary liability in China, focussing on the hugely successful e-commerce ‘third-party platforms’. In it she traces the evolution of the Chinese law in this regard, thus explaining the difficulty that courts have faced of striking a fair balance between consumer protection, protection of trademark, and encouraging innovation in these online shopping malls.</p>
<p>Myanmar’s censorship and surveillance regimes form the basis of Erin Biel’s chapter, and she examines these regimes through the lens of the ethno-religious conflicts there. Her chapter shows the faultlines and the similarities between the regimes that regulate the traditional press and the digital public sphere — telecom surveillance is even easier to conduct than physical surveillance, hate speech is as readily disseminated online — using platforms like Facebook — as offline, and reporters can be arrested for challenging state corruption. It also shows that the existence of the digital sphere doesn’t accomplish much in countries where the Internet penetration is low and where ” government that is accustomed to maintaining state control over the media and telecommunications industries may have difficulty embracing all that freedom of the press and freedom of speech encompass.”</p>
<p>Profs. Mônica Steffen Guise Rosina and Alexandre Pacheco da Silva study the decidedly ‘old-school’ means employed in Brazil by corporations and state officials to prevent their critics from challenging them. In both the cases they examine, the defendants were critics who were ordered by the judiciary to refrain from using particular online social networks to communicate their message, leading the authors to look at the importance of the infrastructure of free expression.</p>
<p>Rounding off the book, Dr.&nbsp;Nagla Rizk explores a period of approximately a week in great detail: the period in January–February 2012 when access to the Internet and various telecom services were shut down in Egypt by the authorities. She presents one of the most detailed accounts of the actual mechanism through which the blocks took place, and then examines a part of the economic impact of this outage of communication channels.</p>
</section>
<section id="dangers-of-new-school-censorship" class="level2">
<h2 class="anchored" data-anchor-id="dangers-of-new-school-censorship">Dangers of New School Censorship</h2>
<p>A common theme that emerges out of this book as a whole is that in new school censorship, restrictions imposed on speech and expression, or on the infrastructures of speech and expression, do not constitute the entirety of the problem. Censorship never results in restrictions alone; it simultaneously results in the production of new discourses around the object of censorship, as well as its discursive limits.<sup>5</sup> As film studies scholar Annette Kuhn notes, “Censorship is not reducible to a circumscribed and predefined set of institutions and institutional activities, but is produced within an array of constantly shifting discourses, practices and apparatuses . . . [it] is an ongoing process embodying complex and often contradictory relations of power.”<sup>6</sup> The productive nature of censorship is seen in the fact that we often create satire with which to mock censorship,<sup>7</sup> as well as the increased attention that which is sought to be censored gets, which on the Internet is often referred to as the “Streisand Effect”.<sup>8</sup></p>
<p>Society will never be free of censorship, nor of resistance to censorship. Indeed, the very technologies that seem to liberate our communications and form the means of our modern self-expression are the selfsame technologies that enable states and corporations greater powers of censorship and surveillance.<sup>9</sup> Old-school censorship, it would seem, is simultaneously both non-productive — since it often does not work well at being a restriction — as well as productive, since it often results in counter-speech, both directly critical and subversive. Citizens may not always have been able to legally challenge old-school censorship in non-democratic regimes, but they could very often see it and galvanize against it, and in many cases, subvert it in myriad ways.</p>
<p>There are indications that in many circumstances new-school censorship may be more effective than old-school censorship by making invisible the fact that speech regulation is happening, and thus depriving speakers and the audience of the ability to engage with the fact of censorship and to indulge in counter-speech. Even where new-school censorship is visible, it has not always received the same treatment with respect to principles of process and court access, due to it happening mostly through private parties, and not readily being seen as ‘censorship’. Thus, the constitutional safeguards that citizens in a democracy use to protect themselves against the state, are not as readily available against private entities such as internet service providers, domain name hosting services, web hosting services, and social media platforms. Given this, civic engagement with processes of censorship assumes the highest importance. However, such engagement with censorship must be studied not merely at the social and cultural levels, but must be accounted for in legal and procedural terms as well.<sup>10</sup></p>
<p>This shift in relative importance of the actor that controls expression is also a shift that signifies the changes in state ownership of media and communications infrastructure — from the time when many governments exercised monopolies over telecommunications networks and radio stations and television channels, and some of which are still controlled by licensing regimes in many parts of the world. The advent of the Internet as a network of largely privately-owned networks, with a large part of people’s daily interactions being on servers owned by private corporations, without licensing requirements in most parts of the world, further reduces the opportunities for direct state censorship. States desirous of censoring material must, for it to be effective, seek the cooperation of these private entities, as police action is far less likely to be effective. Equally, the spectre of private censorship becomes omnipresent online since private corporations — especially the ones with millions of users — now often have the regulatory reach of state, but very often do not have restrictions placed upon them in the form of the freedom of expression or privacy rights that we often enjoy against the state.</p>
<p>The case studies that are contained in the rest of this book bring to the forefront the legal hurdles we currently encounter and must cross if we are to ever effectively safeguard ourselves against the harms of censorship.</p>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>Jack Balkin, <em>What is Access to Knowledge?</em>, <span class="smallcaps">Balkinization</span> (Apr.&nbsp;21, 2006), <a href="http://balkin.blogspot.com/2006/04/what-is-access-to-knowledge.html">http://​balkin.blogspot.com/​2006/​04/​what-is-access-to-knowledge.html</a>.↩︎</p></li>
<li id="fn2"><p>Jack Balkin, <em>Two Ideas for Access to Knowledge — The Infrastructure of Free Expression and Margins of Appreciation</em>, <span class="smallcaps">Balkinization</span> (Apr.&nbsp;30, 2007), <a href="http://balkin.blogspot.in/2007/04/two-ideas-for-access-to-knowledge.html">http://​balkin.blogspot.in/​2007/​04/​two-ideas-for-access-to-knowledge.html</a>. In this, Balkin elaborates on what he means by ‘infrastructure of free expression’:</p>
<p>What is in that infrastructure? It includes government policies that promote the creation and delivery of information and knowledge. It concerns government policies that promote transparency and sharing of government created knowledge and data. It involves government and private sector investments in information provision and technology, including telephones, telegraphs, libraries, and Internet access. It includes policies like subsidies for postal delivery, education, and even the building of schools.↩︎</p></li>
<li id="fn3"><p><em>See</em> Derek Bambauer, <em>Cybersieves</em>, 59 <span class="smallcaps">Duke L.J.</span> 377, 384–386 (2009). Also, see generally Helen Freshwater, <em>Towards a Redefinition of Censorship</em>, <em>in</em> <span class="smallcaps">Censorship &amp; Cultural Regulation in the Modern Age</span> 225 (Beate Müller, ed. 2004).↩︎</p></li>
<li id="fn4"><p>Jack Balkin, <em>Old-School/New-School Speech Regulation</em>, 127 <span class="smallcaps">Harv. L. Rev.</span> 2296 (2014), <em>available at</em> <a href="http://cdn.harvardlawreview.org/wp-content/uploads/2014/06/vol127_balkin.pdf">http://​cdn.harvardlawreview.org/​wp-content/​uploads/​2014/06/​vol127_balkin.pdf</a>.↩︎</p></li>
<li id="fn5"><p><span class="smallcaps">Michel Foucault, 1 The History of Sexuality</span> 15–18↩︎</p></li>
<li id="fn6"><p><span class="smallcaps">Annette Kuhn, Cinema, Censorship, and Sexuality</span> 127.↩︎</p></li>
<li id="fn7"><p>Foucault dismisses this “illicit discourse” as less important. <em>See</em> <span class="smallcaps">Foucault</span>, <em>supra</em> note 5, at 18.↩︎</p></li>
<li id="fn8"><p>T.C., <em>The Economist Explains: What is the Streisand Effect?</em>, <span class="smallcaps">The Economist</span> (Apr.&nbsp;15 2013), http://www.economist.com/blogs/economist-explains/2013/04/economist-explains-what-streisand-effect.↩︎</p></li>
<li id="fn9"><p><em>See generally</em> <span class="smallcaps">Evgeny Morozon, The Net Delusion</span> (2011) (detailing the usage of digital technologies by authoritarian regimes). <em>See also</em> Jack Balkin, <em>supra</em> note 4, at 2304–05 (“Many of the same features of the digital infrastructure that democratize speech also make the digital infrastructure the most powerful and most tempting target for speech regulation and surveillance. Although the digital infrastructure frees speakers from dependence on older media gatekeepers, it does so through the creation of new intermediaries that offer both states and private parties new opportunities for control and surveillance.”).↩︎</p></li>
<li id="fn10"><p><em>See generally</em> Bambauer, <em>supra</em> note 3, at 390–410.↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{kaminskiIntroductoryFramework2014,
  author = {Kaminski, Margot and Prakash, Pranesh},
  editor = {Prakash, Pranesh and Rizk, Nagla and Affonso Souza, Carlos},
  title = {Introductory Framework},
  booktitle = {Global censorship: shifting modes, persisting paradigms},
  pages = {1-10},
  date = {2014},
  url = {https://cis-india.org/a2k/a2kga-global-censorship#page=15},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-kaminskiIntroductoryFramework2014" class="csl-entry quarto-appendix-citeas">
Kaminski, Margot, and Pranesh Prakash. 2014. <span>“Introductory
Framework.”</span> In <em>Global Censorship: Shifting Modes, Persisting
Paradigms</em>, edited by Pranesh Prakash, Nagla Rizk, and Carlos
Affonso Souza. <a href="https://cis-india.org/a2k/a2kga-global-censorship#page=15">https://cis-india.org/a2k/a2kga-global-censorship#page=15</a>.
</div></div></section></div> ]]></description>
  <category>Access to knowledge</category>
  <category>Freedom of expression</category>
  <guid>https://pranesh.in/scholarly/books/kaminski-and-prakash_2015_introductory-framework.html</guid>
  <pubDate>Fri, 01 May 2015 00:00:00 GMT</pubDate>
</item>
<item>
  <title>India: visible and invisible censorship</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/prakash_2014_india-visible-and-invisible-censorship.html</link>
  <description><![CDATA[ 






<p>I find it a useful thought experiment to think of the number of Indians who have published in a newspaper or have had their voice or image broadcast over radio or television since India’s independence in 1947, and to compare that with the number of Indians who have published on the Web since 1995, when India’s first public-access Internet service provider started functioning. The latter number is surely larger. The Internet, as anyone who has ever experienced the wonder of going online would know, is a very different communications platform from any that has existed before. The medium enables those who have access to it an unprecedented ability to directly share their thoughts with millions of others in an instant, even while it replicates many of the inequities of other media.</p>
<p>The various kinds of state, corporate, and societal regulations and impositions that existed in pre-digital times continue to exist, albeit they have changed, though not necessarily for better. In this chapter, I hope to show the regulatory architecture of digital censorship in India. In particular, through the examples of the Intermediary Guidelines Rules, the ham-handed curbs on SMS and web pages in August 2012, arrests under the IT Act, and websites blocked under copyright enforcement, I shall make the argument that the most important safeguard against censorship is visibility and that we are fast losing that feature. The examples I explore shall demonstrate that public reaction to a censorship law depends less on how damaging it is (seen as how much speech can be curbed without sufficient justification and due process of law) and more on how direct it is and how visible it is.</p>
<section id="brief-chronology-of-direct-state-censorship-of-the-internet-in-india" class="level2">
<h2 class="anchored" data-anchor-id="brief-chronology-of-direct-state-censorship-of-the-internet-in-india">Brief Chronology of Direct State Censorship of the Internet in India</h2>
<p>India has had censorship of the Internet since the middle of the nineteen nineties.<sup>1</sup> At that time the only way of accessing the Internet was through Videsh Sanchar Nigam Limited (VSNL), the state monopoly internet service provider (ISP). During this period, access to websites of certain voice-over-IP (VoIP) providers (like Vocaltec, Net2Phone, etc.) was blocked alongside VoIP itself, leading to the first case filed on Internet censorship in Indian courts, in 1998.<sup>2</sup> VSNL argued that it had the authority to block access to regulate Internet telephony and block access to VoIP provider websites under the Indian Telegraph Act, 1885.<sup>3</sup> It is unclear what statutory powers it was using to block access to the website of the hacker collective Cult of the Dead Cow in 1998,<sup>4</sup> or to block access to the website of one of Pakistan’s leading newspapers, <em>Dawn,</em> during the Kargil war between Pakistan and India in 1999,<sup>5</sup> even though it denied having taken such an action.<sup>6</sup> In 2000, while a VSNL employee initially admitted having blocked e-mails from and to the ‘Middle East Socialist Network’ (MESN) mailing list,<sup>7</sup> in an affidavit to the court in the <em>Arun Mehta</em> case, VSNL denied ever having blocked access to the eGroups.com website (which hosted the archives of the MESN list), but noted that “in view of the problem of spamming on the internet, temporarily the e-mail operations of egroups.com was stopped,” and later restored.<sup>8</sup></p>
<p>Since 2000, the licence — provided under the Indian Telegraph Act — that ISPs in India must enter into to provide Internet services includes clauses that require the ISP to take measures to prevent “objectionable” content and “anti-national activities”,<sup>9</sup> and take down websites that unspecified “enforcement agencies” ask them to remove.<sup>10</sup> The Indian Telegraph Act is still in force, and it is still unclear what provision in it empowers the government to block websites.</p>
<section id="information-technology-act-and-after" class="level3">
<h3 class="anchored" data-anchor-id="information-technology-act-and-after">Information Technology Act and After</h3>
<p>In 2000, the Information Technology Act (IT Act) was passed, primarily being a law derived from the UNCITRAL Model Law on Electronic Commerce. While it contained a provision criminalizing the electronic publication of obscene materials,<sup>11</sup> it did not provide the government the power to block websites for obscenity, or for any other reason.<sup>12</sup> However, in 2003, the Department of Information Technology issued an executive order, citing powers under section 67 (the provision on obscenity) and section 87 (the provision on subordinate legislation), empowering the newly-created Indian Computer Emergency Response Team (CERT-In)<sup>13</sup> to block websites,<sup>14</sup> even though the statute itself didn’t provide the government any such powers. Extraordinarily, the Indian government accepted as much in another gazette notification, that soon followed:</p>
<p>As already noted there is no explicit provision in the IT Act, 2000, for blocking of websites. In fact, blocking is taken to amount to censorship. Such blocking can be challenged if it amounts to restriction of freedom of speech and expression. But websites promoting hate content, slander or defamation of others, promoting gambling, promoting racism, violence and terrorism and other such material, in addition to promoting pornography, including child pornography, and violent sex can reasonably be blocked since all such websites may not claim constitutional right of free speech. Blocking of such websites may be equated to “balanced flow of information” and not censorship.<sup>15</sup></p>
<p>This presented a novel idea in Indian freedom of expression jurisprudence which has traditionally had an expansive view on what constitutes speech,<sup>16</sup> but then has at times been equally expansionary as to what kind of speech may be rightfully restricted.<sup>17</sup> This interpretation by the Department of Information Technology seems to indicate that there are some speech that may not count as speech itself, rather than as speech that may rightfully be restricted. Given this, they state that they do not need statutory powers to engage in blocking of websites, since blocking of websites of a certain sort does not amount to ‘blocking’. As per government, it is not a matter of rightfully restricting speech — for which to be constitutionally valid, they would need statutory authority — but instead, it is a matter of promoting a “balanced flow of information”<sup>18</sup> — for which, seemingly, executive powers seem to suffice.</p>
<p>The first notable action subsequent to these notifications was when CERT-In ordered Yahoo and all Indian ISPs to block access to a mailing list with around 160 members called “Kynhun” on Yahoo Groups,<sup>19</sup> which was being used by the Hynniewtrep National Liberation Council, a little-known proscribed separatist group from Meghalaya, to publish a newsletter called the <em>Voice</em>. According to one commentator, that newsletter contained articles on “how the corrupt government is building non-existent roads and public utilities (and swallowing money in the process), how this minority is being victimized and such.”<sup>20</sup> Lacking the technical capabilities of blocking a single group, multiple ISPs blocked web access to all of Yahoo Groups instead. This made it possible to keep receiving mails from that mailing list (and other mailing lists on Yahoo Groups), but prevented all web access to Yahoo Groups. In a matter of a few weeks, the excessive blocking was rectified without any public statements by either the government or the ISPs that over-blocked.</p>
<p>In 2004, the U.S.-based right-wing website HinduUnity.org was blocked by Indian ISPs on orders of the Mumbai police, though at least one ISP apparently refused to, citing lack of legal authority in the Mumbai police to request such a ban.<sup>21</sup> In 2001, it had been dropped by its American web host due to hate speech concerns.<sup>22</sup> But none of these events gave rise to much mainstream media attention to Internet censorship. That happened for the first time in 2006, in the aftermath of train bombings in Mumbai, when the Department of Telecommunications issued orders to ISPs to block 17 domains and web pages.<sup>23</sup> The timing gave rise to many rumours about the blocks having been occasioned by the bombings. However, by going through (the non-public) list one saw that the list included mostly obscure sites: a site arguing for Dalit separatism,<sup>24</sup> a personal website of a right-leaning Indian American,<sup>25</sup> little-known right-leaning American blogs which had nothing to do with India,<sup>26</sup> a web-based SMS gateway service,<sup>27</sup> and some domains that didn’t even exist on the day they were blocked,<sup>28</sup> amongst others. The most notable website that was included in the list was HinduUnity.org (which, as noted earlier, had already been ordered to be blocked in 2004).<sup>29</sup> Despite the lack of popularity or notability of those 17 sites, this secretive order was noticed by ordinary Web users because of a gigantic mistake.</p>
<p>Amongst the 17 sites ordered to be blocked were specific blogs and pages hosted on Blogspot.com, and Typepad.com. Instead of those particular blogs being blocked, all blogs and pages hosted on Blogspot.com, Typepad.com (and Geocities, inexplicably) were blocked. This resulted in the block being noticed by a large number of people, and garnering a larger amount of media coverage than in the past. However, the only response of the government to the media furore was that of pinning the blame on the ISPs for over-blocking,<sup>30</sup> rather than seeking to justify the blocking of those 17 URLs, which contained perfectly legitimate websites that didn’t seem to <em>prima facie</em> violate any Indian laws.</p>
<p>The next time that these issues sprang into prominence of some sort was when the website of Savitha Bhabhi, an erotic webcomic, was blocked in 2009, just before a large amendment of the IT Act came into force.<sup>31</sup> The anonymous UK-based author of the cartoon series outed himself and contacted lawyers in India to defend his creation, but due to pressure from his embarrassed family, he dropped the matter.</p>
<p>In the 2008 amendment to the IT Act (which were brought into effect in October 2009), a new provision — section 69A — was added which granted the government powers to block websites if it “is satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above”.</p>
</section>
</section>
<section id="transparency-around-website-blocking" class="level2">
<h2 class="anchored" data-anchor-id="transparency-around-website-blocking">Transparency around Website Blocking</h2>
<p>In 2011, I submitted a right to information (RTI) request about what websites had been blocked since the new law came into force. The government of India’s reply to this RTI request was groundbreaking in a way, since it was the first time the government had provided an official list of URLs that it had blocked in India.<sup>32</sup> Even the publication of this list did not result in much mainstream media coverage. All eleven blocked URLs had been ordered to be blocked by courts — constituting direct state regulation — however the courts and the attorneys had done an amazingly shoddy job: some of the URLs were for Google search results rather than the web pages themselves, the whole of the Indymedia portals for San Francisco and Arizona instead of just the pages the High Court found to be defamatory, and similarly all of Webs.com was blocked instead of a specific URL. The rationale for most of these was not clear even after circumventing the blocks and visiting those pages which continued to exist.</p>
<p>Later, in May 2012, the Internet collective Anonymous released a list of URLs blocked by Reliance Communications.<sup>33</sup> Since none of the blocks that CERT-In has ordered has been published by them, whether in the Gazette of India or on their website, this was the first time that a list of all websites blocked in India — and not just under the IT Act, since 2008 — was available in the public domain. Going through the list the same evening they were released, I found, as alleged by Anonymous, that there were more than a dozen links — mostly alluding to the involvement of a senior Reliance official, who was then in prison, in a telecommunications spectrum corruption scandal — that were blocked if one used a Reliance Communications connection but not on other ISPs.<sup>34</sup> However, by the next morning those links were working on Reliance networks too. This leak, even though it was reported on a prominent independent political blog, as also a blog run by a mainstream news magazine, did not get much traction in the wider mainstream media.</p>
<p>Apart from detailing private censorship, that leak also made it clear that BuyDomains, Fabulous Domains and Sedo.co.uk — domain name marketplaces — were being blocked on orders of the Indian government. What is less clear is whether the government had any legal authority to do so.<sup>35</sup></p>
<p>By far the largest category of blocked websites is entertainment and files-sharing websites. One set of those (104 domains) were blocked by an interim order of the Calcutta High Court.<sup>36</sup> The rest of them, however, were blocked by private requests by entertainment companies subsequent to generic “John Doe” orders from courts. There is a strong case to be made that this private extension of John Doe orders is unlawful and far beyond the scope of the orders themselves.<sup>37</sup> Further, even if one were to argue that they were lawful, there are numerous clear examples of indefensible overreach — where sites that are clearly not engaging in copyright infringement of music or films have been blocked.<sup>38</sup> Thus, it is plain to see that perfectly lawful and non-infringing websites are being censored in the guise of copyright infringement.</p>
<p>Importantly, these private blocks defeat currently-available means of transparency. Thanks to the Right to Information Act, 2005, the list of blocked websites under section 69A is available to the public upon request, even if the IT Act does not require proactive publication of the list, as it should. This provides the opportunity for a constant vigil against direct state-ordered censorship, even if through less-than-ideal means. However, a right to information request would not cover the sites that were blocked through private requests by entertainment companies. For access to those, we had to count on leaks to the press and civil society organizations by industry insiders and unauthorized access to ISP servers.</p>
<p>So far in this brief history, I’ve covered mostly direct state censorship, and one instance of state-allowed private censorship undertaken by some entertainment companies. In the next section, I will deal with the regulations made under the intermediary liability law in India, and focus on how those regulations greatly expand the scope of state-enabled private censorship, and undermine the possibility of challenging censorship.</p>
</section>
<section id="indirect-censorship-intermediary-liability" class="level2">
<h2 class="anchored" data-anchor-id="indirect-censorship-intermediary-liability">Indirect Censorship: Intermediary Liability</h2>
<p>In India, section 79 of the IT Act is the provision that provides Internet intermediaries<sup>39</sup> protection from liability for their users’ actions. Before the 2008 amendment, it covered “network service providers”, but then was expanded and re-drafted quite extensively,<sup>40</sup> with the jailing of Avnish Bajaj, the CEO of Bazee.com, — for one of its users offering an illegally-obtained pornographic CD for sale — being a major impetus for the provision’s amendment.</p>
<p>On February 7th 2011, the Department of Information Technology under the Ministry of Communications and Information Technology published draft regulations under section 70 on its website (initially titled “Information Technology (Due Diligence Observed by Intermediaries Guidelines) Rules, 2011” and “Information Technology (Guidelines for Cyber Cafe) Rules, 2011”) in exercise of the powers conferred by section 87(2)(zg), IT Act, read with section 79(2). Comments were invited from the public till February 25, 2011.</p>
<p>The Centre for Internet and Society submitted comments noting, <em>inter alia</em>, that the proposed rules were <em>ultra vires</em> the parent statute, and that some of the provisions of the draft Intermediaries Guidelines rules were plainly unconstitutional since they enabled the government to require Internet intermediaries to remove content on grounds that were far beyond those contained in Article 19(2) of the Constitution of India,<sup>41</sup> while the draft Cyber Cafe rules greatly encroached upon the right to privacy.<sup>42</sup> At that point, the draft of the Intermediaries Guidelines rules allowed only an “authority mandated under the law for the time being in force” to complain to intermediaries and require them to “remove access” to the offending material.</p>
<p>The government not only ignored the problems that were highlighted by civil society organizations, but introduced far greater ones. The final version of the Information Technology (Intermediary Guidelines) Rules (hereinafter ‘Intermediary Guidelines’), which have been in effect since April 2011, give not only an “authority mandated under the law”, but all “affected persons”<sup>43</sup> great powers to censor the Internet!</p>
<section id="policy-sting-operation" class="level3">
<h3 class="anchored" data-anchor-id="policy-sting-operation">Policy Sting Operation</h3>
<p>Since there is no reporting mechanism contained in the Intermediary Guidelines, there is no means of gathering information about the usage of the rules: no one, not even the government, knows how often the rules are being used, and what content is being removed. Given that, we at the Centre for Internet and Society decided to test the censorship powers of the new rules through a ‘policy sting operation’, by sending frivolous and plainly defective complaints to a number of intermediaries.<sup>44</sup>&nbsp; Six out of seven intermediaries removed content, including search results listings, on the basis of the most ridiculous complaints. The people whose content was removed were not told — none wrote to us asking why we objected to their content — nor was the general public informed that the content was removed. If we hadn't kept track, it would be as though that content never existed.<sup>45</sup> Yet, not only was what the Internet companies did legal under the Intermediary Guideline Rules, but if they had not, they would have lost the protection from being punished for the content put up by their users.<sup>46</sup></p>
</section>
<section id="fundamental-problems-with-the-intermediary-guidelines" class="level3">
<h3 class="anchored" data-anchor-id="fundamental-problems-with-the-intermediary-guidelines">Fundamental Problems with the Intermediary Guidelines</h3>
<p>There are many problems with the Intermediary Guidelines, but the fundamental issues are discussed below.<sup>47</sup></p>
<p>First, it shifts the burden for exemption from liability on to intermediaries. Until the Intermediary Guidelines were brought into force, an intermediary who fell within the ambit of section 79(2) of the IT Act did not have to engage in a positive act to be able to claim exemption from liability for the words and deeds of their users. However, the Intermediary Guidelines require that intermediaries publish the terms of service contained in Rule 3(2) of the Guidelines, appointing a Grievance Redressal Officer as under Rule 3(11), follow reasonable security practices as required by Rule 3(8), report “cyber security incidents” to CERT-In, and perform other such acts to be able to claim the exemption from liability. This might mean that non-Indian intermediaries who fail to publish new terms of service in accordance with the Intermediary Guidelines would automatically fall afoul of the law and could be held liable for their users’ actions in Indian courts.</p>
<p>Second, it seems to pin liability on intermediaries for failing to perform acts unrelated to liability. Many of the requirements of the Intermediary Guidelines have nothing to do with the speech or conduct that may give rise to liability. The question then arises if failure to perform them could result in exemption from liability being denied. For instance, if a web hosting company failed to follow reasonable security practices or failed to report a particular ‘cyber security incident’, could that result in it being liable for all the defamatory content on its servers?</p>
<p>Third, it denies users any chance to defend their speech. The Intermediary Guidelines require that intermediaries that receive a complaint, “shall act within thirty six hours and where applicable, work with user or owner of such information to disable such information that is in contravention of sub-rule (2)”. It leaves it unclear what “where applicable” means in this case. It doesn’t seem to categorically state that the complainees need to be informed about complaints that the intermediary receives, nor does it categorically state that the complainee should be provided a chance to defend against the complaint. As noted above, during our policy sting operation, we did not receive a single complaint from any of the parties that might have been affected by our complaints. It seems as though none of the intermediaries ever informed those who would be affected about our complaints. The Supreme Court of India has held, “[i]n considering the reasonableness of laws imposing restrictions on fundamental right, both the substantive and procedural aspects of the impugned law should be examined from the point of view of reasonableness and the test of reasonableness, wherever prescribed, should be applied to each individual statute impugned”.<sup>48</sup> Given this, there is a strong argument to be made that a system for removal of content which does not embed core principles of natural justice such as the <em>audi alteram partem</em> doctrine, would fail the reasonable test of Article 19(2).<sup>49</sup></p>
<p>Fourth, the Intermediary Guidelines greatly expand the grounds under which content can be deemed unlawful. The prior means of blocking a website required a person to approach a statutory authority under section 69A of the IT Act citing one of six grounds, mostly to do with national security. But with the Intermediary Guidelines, there are thirty-two distinct grounds, a great many of which are not constitutionally justifiable. For instance, disparaging speech — as long as it isn't defamatory — is not unlawful in India; however the Intermediary Guidelines list that as a category of prohibited speech. Advertisements promoting gambling are not unlawful in India — indeed, various state governments regularly take out print advertisements and put up billboards about their lottery schemes — but now all Internet intermediaries are required to remove content that are about gambling, even if it doesn’t promote it.</p>
<p>Fifth, the Intermediary Guidelines make the intermediaries the judge of whether any particular content is in compliance with the law or not, rather than a judicial, or even quasi-judicial, body. This relegates speech regulation to private actors. While speech regulation by private actors isn’t in itself harmful (just as speech regulation by the state by itself isn’t), private actors are generally subject to far less accountability than the state.</p>
<p>Sixth, the law promotes a complete lack of transparency and accountability. No public notice is required to be provided that content has been removed, nor is there any reporting mechanism provided for the government to gather information about requests from intermediaries. So even the government does not know how many requests have been made after these Guidelines have come into effect, nor what content has been removed subsequent to those requests. This means that even the RTI Act, which has proven a powerful transparency tool to pry open the government, cannot be used. It also means that even the government doesn’t have the information necessary to judge the law’s successes and failings. In essence, this allows for invisible censorship.<sup>50</sup></p>
<p>In the Centre for Internet and Society’s proposed alternative to the government’s Intermediary Guidelines, we suggest that the government run an open and central takedown request monitoring system similar to the Chilling Effects Clearinghouse,<sup>51</sup> to which all those who receive notices — under the notice-and-notice provisions we’ve advanced — would be required to contribute.<sup>52</sup></p>
<p>Seventh, the differentiations between categories of intermediaries is removed. A one-size-fits-all system is followed where an e-mail provider is equated with an online newspaper, which is equated with a video upload site, which is equated with a search engine: they all have to include Rule 3(2) of the Intermediary Guidelines and its thirty-two speech restrictions in their terms of service, and they will all lose exemption from liability if they fail to comply. This is like equating the post office and a book publisher as being equivalent in terms of liability for, say, defamatory speech. This is violative of Article 14 of the Constitution, which requires that unequals not be treated equally by the law.<sup>53</sup></p>
<p>Eighth, the Intermediary Guidelines don’t require a proportionality test. A DNS provider is an intermediary who can be asked to ’disable access' to a website on the basis of a single page, even though the rest of the site has nothing objectionable. Given the way the DNS system works, it is not possible for a DNS provider to selectively prohibit access to a single page. However, there is nothing in the law that would prevent such an abuse, or require the hosting provider to be contacted instead of the DNS provider in such a case.</p>
<p>Ninth, the Intermediary Guidelines seem to be based on a presumption of illegality of content where any allegation of unlawful content is sufficient to constitute “actual knowledge” of the content’s unlawfulness.<sup>54</sup> In a case on defamation, the Delhi High Court held, “Rule 3(4) of the said rule provides obligation of an intermediary to remove such defamatory content within 36 hours from receipt of actual knowledge.”<sup>55</sup> In that case the complaint to the website (Hubpages.com) contained allegations of defamation, but those allegations were held to be sufficient to constitute “actual knowledge” on the part of the website of defamation. If the Court’s interpretation is correct, the Guidelines are based on the presumption that all complaints (and resultant mandatory taking down of the content) are correct, and that the incorrectness of the takedowns can be disputed in court if the complainee ever discovers that her content has been removed/blocked, etc.<sup>56</sup> While this was at one point the interpretation of the Department of Electronics and Information Technology, it no longer is.<sup>57</sup></p>
<p>Tenth, the Intermediary Guidelines are atemporal, assuming that any content removal / block has to last forever. On the other hand, many blocks, such as those relating to copyright infringement of a sporting event, are temporal in nature. Material removed or blocked due to a temporal event end up becoming permanent.</p>
<p>Eleventh, governmental diktat cannot just mirror industry “best practices” without any regard to constitutional validity. The Indian government has justified the Intermediary Guidelines as, “best practices followed internationally by well-known mega corporations operating on the Internet.”<sup>58</sup> However, that ignores the fact that speech restrictions that may be imposed by “well-known mega corporations” aren’t restricted by the Indian Constitution in the same manner as it restricts the actions of the government. Further, it ignores the fact that different corporations choose to have widely differing terms of service. Even different services provided by a single corporation may have different policies on what is acceptable on that platform.<sup>59</sup> The Intermediary Guidelines homogenizes those terms of service and makes it mandatory upon all intermediaries to include the government-prescribed terms, regardless of the services they provide and regardless of what the intermediaries consider as acceptable speech.</p>
<p>Twelfth, the Intermediary Guidelines do not bar governmental actors from using it to send takedown requests. Previously governmental actors would have to comply with the requirments of section 69A of the IT Act, or approach the courts — which seemingly are bound by no limits in terms of ordering the blocking of websites. Now, if they so choose, governmental actors can choose to go for the notice-and-takedown route which provides them far greater leeway — including the ability to block content it would be unconstitutional for the government to directly block under section 69A — while also providing statutory sanctions against intermediaries who fail to comply. This means that the government can get far more material removed without turning up in transparency reports of the kind that Google, Twitter, Yahoo, Facebook, and others issue.</p>
<p>And lastly, there are no penalties for filing frivolous complaints of the sort that we at the Centre for Internet and Society filed, nor for filing malicious complaints. This creates a perverse incentive structure that privileges complainants over complainees — who aren’t even required to be told about the complaints, and are not required to be afforded a chance to defend themselves.</p>
<p>In 1984, the then-Prime Minister of India, Indira Gandhi, was forced to sue Salman Rushdie for defamation in a London court in order to ensure one sentence was expurgated from his novel <em>Midnight’s Children</em>. Today Gandhi wouldn’t need to win a lawsuit against publishers. She would merely have to send a complaint to websites selling the book and it would be removed from sale unless the website wants to waive its exemption from liability.</p>
<p>What is astounding is not that such badly drafted subordinate legislation could be put forward by the government; it is that it could be passed despite cogent and trenchant criticism being provided as part of the public consultation process, as well as those criticisms being aired prominently in newspaper op-eds and editorials.</p>
</section>
</section>
<section id="conclusion" class="level2">
<h2 class="anchored" data-anchor-id="conclusion">Conclusion</h2>
<p>While the concerns with the Intermediary Guidelines were covered by the press, they mostly ignored the nuances involved in it — such as the fact that it did not require the complainee to be told, that it could lead to undetectable and invisible censorship, and other such procedural matters.<sup>60</sup> By contrast, the publicity provided to instances of direct state censorship has been far greater. The four instances where the press provided the most coverage for Internet censorship over the past few years were instances of direct state censorship, state-directed private censorship, and state-enabled private censorship.</p>
<p>Example 1: In December 2011, the Minister for Communications and Information Technology told Indiatimes, Google, Yahoo, Facebook, and Microsoft, in closed-door meetings that they should come up with a code of self-regulation using which they should pre-screen certain kinds of objectionable content, noting that the government would come up with a ‘self-regulation’ code for them if they didn’t do so on their own.<sup>61</sup> This was leaked to the New York Times, and that led to constant coverage that month.<sup>62</sup></p>
<p>Example 2: In December 2011, a journalist named Vinay Rai filed a criminal complaint against Google, Yahoo, Microsoft, and a number of other companies for hosting content that “promoted enmity between communities”, as well as for hosting obscene content,<sup>63</sup> while former journalist named Aijaz Ashraf Qasmi filed a civil lawsuit against them. These two court cases, following soon on the heels of the government’s attempts to muzzle those companies, allegedly for similar kinds of content, led to a great deal of mainstream media coverage.<sup>64</sup></p>
<p>Example 3: In the aftermath of the violence that erupted in southern Assam in July and August 2012,<sup>65</sup> and a rumour-fuelled panic that spread in Bangalore and elsewhere as to the physical safety of residents from the north-east of India,<sup>66</sup> the government of India placed curbs on SMSes, and over a period of four days ordered 309 specific items (those being URLs, Twitter accounts, HTML tags,<sup>67</sup> blog posts, blogs, and a handful of websites) to be blocked.<sup>68</sup> This was the first time that such a large number of websites and web pages were ordered to be blocked by the government, and this led to plenty of mainstream news media coverage.</p>
<p>Example 4: In September 2012, a little-known cartoonist named Aseem Trivedi was charged under multiple statutes, including under section 66A of the IT Act, and arrested, followed two months later by the arrest of two girls from Mumbai for posting and ‘liking’ a comment on Facebook about the city-wide <em>bandh</em> (general strike) observed in Mumbai after the politician Bal Thackeray’s death.<sup>69</sup> These outrageous arrests in September and November 2012 led to widespread condemnation of section 66A of the IT Act, which penalizes the sending of offensive messages through communication services.<sup>70</sup></p>
<p>Instances of state-directed censorship, like those mentioned above, which can be observed much more easily, and conform to more traditional ideas of what constitutes censorship, get a fair amount of media coverage than state-enabled private censorship through the Intermediary Guidelines or through copyright infringement claims by entertainment companies, though in actuality the latter might be far more widespread than the former and affect much greater amounts of speech, and may affect far greater range of speech.</p>
<p>While private actors have always been involved in speech regulation, the centrality of the role that they now occupy is something new, but is also inevitable. Those who believe that all speech regulation must be done by the state, following due process, are trying to prop up the procedural standards of a bygone world. Instead of harking back to the procedures that exist for censorship of books, and demanding that they be followed in all cases of online content, we must find new ways of countering the complete lack of transparency and accountability of private actors. We must find a way to appropriately extend the civil and political rights we enjoy against the state — which were writ when the state was the predominant actor in the silencing of speech — to act as guarantees against certain kinds of private action as well. And central to that endeavour would be the shining of light and removing the cloak of invisibility under which most forms of private censorship, whether conducted at the behest of governments, subsequent to enabling laws, or otherwise, occur. Not doing so immediately will undoubtedly make it more difficult to counter this brave new world of invisible censorship that we are transitioning into.</p>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>The most detailed overview of this history is presented in a monograph produced by Raman Jit Singh Chima as part of his Sarai fellowship. <span class="smallcaps">Raman Jit Singh Chima, The Regulation of the Internet With Relation to Speech and Expression by the Indian State</span> <em>(</em>2008), <a href="http://dx.doi.org/10.2139/ssrn.1237262" class="uri">http://dx.doi.org/10.2139/ssrn.1237262</a>. For a shorter history, see Shivam Vij, <em>Internet Censorship in India Has a Long, Murky Past</em>, <span class="smallcaps">Sunday Guardian</span> (Dec.&nbsp;11, 2011), <a href="http://www.sunday-guardian.com/technologic/internet-censorship-in-india-has-a-long-murky-past">http://​www.sunday-guardian.com/​technologic/​internet-censorship-in-india-has-a-long-murky-past</a>.↩︎</p></li>
<li id="fn2"><p>Arun Mehta v. Videsh Sanchar Nigam Ltd., Writ Petition (Civil) No.&nbsp;4732 of 1998 (New Delhi), on file with the author.↩︎</p></li>
<li id="fn3"><p>Arun Mehta, <em>Status of VSNL Censorship of IP-Telephony Sites</em>, <span class="smallcaps">India GII</span>, <a href="http://members.tripod.com/~india_gii/statusof.htm">http://​members.tripod.com/​~india_gii/​statusof.htm</a> (last updated Aug.&nbsp;9, 2001), <em>archived at</em> <a href="https://archive.today/8LJqQ">https://​archive.today/​8LJqQ</a>.↩︎</p></li>
<li id="fn4"><p><em>Id</em>.↩︎</p></li>
<li id="fn5"><p>Siddharth Varadarajan, <em>Dawn Website Blocked as VSNL Plays Big Brother</em>, <span class="smallcaps">Times of India</span> (July 3, 1999), <em>available at</em> <a href="http://svaradarajan.com/1999/07/03/dawn-website-blocked-as-vsnl-plays-big-brother/" class="uri">http://svaradarajan.com/1999/07/03/dawn-website-blocked-as-vsnl-plays-big-brother/</a>.↩︎</p></li>
<li id="fn6"><p>An erstwhile employee of Satyam Infoway, India’s first private ISP, told me that the <em>Dawn</em> incident was merely one that was highly visible and hence reported in the press. He told me that Satyam Infoway would receive numerous requests — mostly unofficial and unrecorded — that would come from the Department of Telecommunication in those days, leading to websites being blocked without the press finding out.↩︎</p></li>
<li id="fn7"><p>Seema Kazi, the VSNL subscriber who brought this to light, noted that she, a Muslim, was told by a VSNL manager that this step was taken because “[m]uslims have links with Pakistan and because of reasons of security”. Seema Kazi, Letter to the Editor, <em>Covert Censorship</em>, <span class="smallcaps">Hindu</span> (Nov.&nbsp;11, 2000), <a href="http://www.thehindu.com/2000/11/11/stories/05111305.htm">http://​www.thehindu.com/​2000/11/11/​stories/​05111305.htm</a>.↩︎</p></li>
<li id="fn8"><p><em>See</em> VSNL Further Aff. ¶6, in Arun Mehta v. Videsh Sanchar Nigam Ltd., <em>available at</em> <a href="https://docs.google.com/View?docid=dc72g763_15d4hj95">https://​docs.google.com/​View?docid=dc72g763_15d4hj95</a>↩︎</p></li>
<li id="fn9"><p>The clause covering this in various licence agreements and “guidelines” covering different actors is different, and has also varied across time. I know of no comprehensive analysis of these licences as they pertain to freedom of speech and surveillance. The licence for ‘Internet service (Including Internet Telephony)’ as on April 19, 2002 included these clauses:</p>
<p><em>1.12.09. The [licensee] shall ensure that objectionable, obscene, unauthorised or any other content, messages or communications infringing copyright, [i]ntellectual property right and international &amp; domestic cyber laws, in any form or inconsistent with the laws of India, are not carried in his network, the ISP should take all necessary measures to prevent it. In particular, [the licensee] is obliged to provide, without delay, all the tracing facilities of the nuisance[-causing] or malicious messages or communications transported through [its] equipment and network, to authorised officers of [the] Government of India/State Government, when such information is required for investigations of crimes or in the interest of national security. The licence shall be governed by the provisions of the Information Technology (IT) Act 2000, as modified from time to time. Any damages arising out of default on the part of licensee in this respect shall be sole responsibility of the licensee.</em></p>
<p>1.12.10. The use of the network for anti-national activities would be construed as an offence punishable under the Indian Penal Code or other applicable law. The networks cannot be used in such a manner as to endanger or make vulnerable [] networked infrastructure. Acts such as break-ins or attempted break-ins of Indian networks shall be regarded as an anti-national act and shall be dealt with in accordance with the Indian Penal Code. ISPs must ensure that their services are not used for such purposes.</p>
<p><em>Licence Agreement for Provision of Internet Service (Including Internet Telephony)</em>, <span class="smallcaps">Dep’t of Telecomm.</span> (April 19, 2002), <a href="http://dot.gov.in/sites/default/files/internet_telephony_lce.doc">http://​dot.gov.in/​sites/default/files/​internet_telephony_lce.doc</a>. Nearly identical clauses are found in the 2007 licence as well. <em>Licence Agreement for Provision of Internet Services,</em> <span class="smallcaps">Dep’t of Telecomm.</span> (Oct.&nbsp;16, 2007), <a href="http://dot.gov.in/sites/default/files/internet-licence-dated%2016-10-2007_0.pdf">http://​dot.gov.in/​sites/​default/files/​internet-licence-dated%2016-10-2007_0.pdf</a> [hereinafter <em>2007 ISP Licence</em>].</p>
<p>Clause 27 of the 2007 Internet Service Guideline document, which formed the basis for the 2007 ISP licence, clarifies:</p>
<p>Flow of obscene, objectionable, unauthorised or any other content infringing copy-rights, intellectual property right and international &amp; domestic [c]yber laws in any form over the ISP’s network is not permitted and the ISP is supposed to take such measures as to prevent it. Any damages/claim arising out of default on the part of the licensee in this respect shall be the sole responsibility of the licensee.</p>
<p>This pinning of liability in the licence terms is in direct opposition with the exemption from liability contained in section 79 of the IT Act. This is just one of the numerous instances of lack of coherence — and outright contradictions — in Indian information and telecommunications policy and law.↩︎</p></li>
<li id="fn10"><p>Clause 33.3, <em>2007 ISP Licence</em>, <em>supra</em> note 9, states:</p>
<p>The LICENSEE shall take necessary measures to prevent objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright, intellectual property etc., in any form, from being carried on his network, consistent with the established laws of the country. Once specific instances of such infringement are reported to the [licensee] by the enforcement agencies, the [licensee] shall ensure that the carriage of such material on [its] network is prevented immediately.↩︎</p></li>
<li id="fn11"><p>Information Technology Act, 2000, Section 67.↩︎</p></li>
<li id="fn12"><p>This contrasts with the way section 95 of India’s Code of Criminal Procedure provides for the seizure of books declared to be punishable under sections 124A, 153A, 153B, 292, 293, and 295A of the Indian Penal Code.↩︎</p></li>
<li id="fn13"><p>Computer Emergency Response Teams are groups that handle computer security breaches, and the Indian CERT [hereinafter CERT-In] describes itself as the “national nodal agency for responding to computer security incidents as and when they occur.” <span class="smallcaps">Indian Computer Emergency Response Team</span>, <a href="http://www.cert-in.org.in/" class="uri">http://www.cert-in.org.in/</a> (last visited Dec.&nbsp;28, 2014).↩︎</p></li>
<li id="fn14"><p>The Gazette of India Extraordinary Part II – Section 3(i), Notification no. GSR. 181(E), Ministry of Communications and Information Technology (Department of Information Technology) – Government of India, Feb.&nbsp;27, 2003, <em>available at</em> <a href="http://deity.gov.in/content/it-act-notification-no-181" class="uri">http://deity.gov.in/content/it-act-notification-no-181</a> (last visited Jan.&nbsp;14, 2014). This was rescinded in May 2010 by another notification, after provisions on website blocking were introduced into the statute. The Gazette of India Extraordinary Part II – Section 3(i), Notification no. G.S.R. 410(E), Ministry of Communications and Information Technology (Department of Information Technology) – Government of India, May 17, 2010, <em>available at</em> <a href="http://www.egazette.nic.in/WriteReadData/2010/E_257_2011_010.pdf">http://​www.egazette.nic.in/​WriteReadData/​2010/E_257_2011_010.pdf</a>.↩︎</p></li>
<li id="fn15"><p>The Gazette of India Extraordinary Part II – Section 3(i), Notification no. G.S.R. 529(E), Ministry of Communications and Information Technology (Department of Information Technology) – Government of India, July 7, 2003.↩︎</p></li>
<li id="fn16"><p><em>See, e.g.,</em> Bennett Coleman v. Union of India, (1972) 2 SCC 788 (holding that restrictions on newsprint constituted a restriction on freedom of expression, and that the right to receive information is part of the right to freedom of speech and expression). <em>Compare</em> Sec’y, Min. of Info. &amp; Broadcasting v. Cricket Ass’n, (1995) 2 SCC 161 (holding that scarcity of spectrum does means the government has to act as a ‘custodian’ of the airwaves and must act in the public interest). It is instructive to note the contrast between the Supreme Court’s decisions that scarcity of foreign exchange and newsprint cannot lead to greater government regulation of speech via newspapers, while also ruling that scarcity of spectrum may legitimately lead to increased government regulation of the airwaves.↩︎</p></li>
<li id="fn17"><p>Article 19(2) of the Constitution provides for the exceptions to the right to freedom of speech and expression enshrined in Article 19(1)(a). Post two amendments in 1951 and 1963, Article 19(2) states:</p>
<p>Article 19(2) — Nothing in sub clause (a) of clause ( 1 ) shall affect the operation of any existing law, or prevent the State from making any law, in so far as such law imposes reasonable restrictions on the exercise of the right conferred by the said sub clause in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality or in relation to contempt of court, defamation or incitement to an offence.</p>
<blockquote class="blockquote">
<p>The Supreme Court has sometimes been very inconsistent in its application of Article 19(2): sometimes being very strict in its interpretation and sometimes loose. This is perhaps inevitable given the fact that the Indian Supreme Court hardly ever sits <em>en banc</em>, and this has caused many problems. <em>See</em> T.R. Andhyarujina, <em>Restoring the Supreme Court’s Exclusivity</em>, <span class="smallcaps">Hindu</span> (Aug.&nbsp;31, 2013), <a href="http://www.thehindu.com/" class="uri">http://www.thehindu.com/</a>​todays-paper/​tp-opinion/​restoring-the-supreme-courts-exclusivity/article5077644.ece (“With the increasing load of appeals from High Court decisions the number of judges have had to be increased periodically from eight judges in 1950 when the Constitution came into force to 31 in 2008. Presently, the Supreme Court is composed of one bench of the Chief Justice’s Court of three judges and 13 or 14 benches of two judges in 13 or 14 courtrooms sitting regularly day after day. In no Supreme Court of other jurisdictions are there benches of 13 to 14 courts of two judges each as the Indian Supreme Court now has.”); <em>see also</em> T.R. Andhyarujina, <em>Studying the U.S. Supreme Court's Working,</em> (1994) 4 S.C.C. <span class="smallcaps">J.</span> 1, <em>available at</em> <a href="http://www.ebc-india.com/lawyer/articles/94v4a1.htm" class="uri">http://www.ebc-india.com/lawyer/articles/94v4a1.htm</a>. Traditionally, the Supreme Court has been seen as the bulwark of protection against governmental encroachment into fundamental rights, while the lower courts, including sometimes the High Courts (which are also constitutional courts, and have the power of judicial review of legislation), have not always enjoyed the same reputation.</p>
</blockquote>
↩︎</li>
<li id="fn18"><p>Notification GSR181(E), <em>supra</em> note 15.↩︎</p></li>
<li id="fn19"><p><em>See</em> Ministry of Communications and Information Technology, <em>Blocking of Website</em>, <span class="smallcaps">Press Info. Bureau</span> (Sept.&nbsp;22, 2003), <a href="http://pib.nic.in/archieve/lreleng/lyr2003/rsep2003/22092003/r2209200314.html">http://​pib.nic.in/archieve/​lreleng/lyr2003/rsep2003/​22092003/​r2209200314.html</a>; <em>see also</em> <em>Yahoo! Groups Blocked in India</em>, <span class="smallcaps">Sun. Morning Herald</span> (Sep.&nbsp;26, 2003), <a href="http://www.smh.com.au/articles/2003/09/26/1064083178553.html">http://​www.smh.com.au/​articles/​2003/​09/​26/​1064083178553.html</a>.↩︎</p></li>
<li id="fn20"><p>Suresh Ramasubramanian, <em>Re: Dishnet Blocking Yahoogroups – More</em>, <span class="smallcaps">India-GII Mailing List (</span>Sept.&nbsp;20, 2003, <span class="smallcaps">04:39)</span>, <a href="http://permalink.gmane.org/gmane.org.telecom.india-gii/2863">http://​permalink.gmane.org/​gmane.org.telecom.india-gii/​2863</a>.↩︎</p></li>
<li id="fn21"><p><span class="smallcaps">Chima</span>, supra note 1, at 54.↩︎</p></li>
<li id="fn22"><p>Dean A. Murphy, <em>Two Unlikely Allies Come Together in Fight Against Muslims</em>, <span class="smallcaps">N.Y. Times</span> (June 2, 2001), <a href="http://www.nytimes.com/2001/06/02/nyregion/two-unlikely-allies-come-together-in-fight-against-muslims.html" class="uri">http://www.nytimes.com/2001/06/02/nyregion/two-unlikely-allies-come-together-in-fight-against-muslims.html</a>.↩︎</p></li>
<li id="fn23"><p><em>Directions to Block Internet Websites</em>, <span class="smallcaps">Dep’t of Telecomm.</span> (July 13, 2006), <em>available at</em> <a href="https://www.flickr.com/photos/22315040@N05/15091167867/">https://​www.flickr.com/​photos/​22315040@N05/15091167867/</a>.↩︎</p></li>
<li id="fn24"><p><a href="http://www.dalitstan.org" class="uri">http://www.dalitstan.org</a>.↩︎</p></li>
<li id="fn25"><p><a href="http://rahulyadav.com" class="uri">http://rahulyadav.com</a>.↩︎</p></li>
<li id="fn26"><p><a href="http://princesskimberly.blogspot.com" class="uri">http://princesskimberly.blogspot.com</a>, <a href="http://mypetjawa.mu.nu" class="uri">http://mypetjawa.mu.nu</a>, <a href="http://pajamaeditors.blogspot.com" class="uri">http://pajamaeditors.blogspot.com</a>, <a href="http://exposingtheleft.blogspot.com" class="uri">http://exposingtheleft.blogspot.com</a>, <a href="http://www.thepiratescove.us" class="uri">http://www.thepiratescove.us</a>, <a href="http://www.bamapachyderm.com" class="uri">http://www.bamapachyderm.com</a>, <a href="http://merrimusings.typepad.com" class="uri">http://merrimusings.typepad.com</a>, and <a href="http://mackers-world.com" class="uri">http://mackers-world.com</a>.↩︎</p></li>
<li id="fn27"><p><a href="http://www.clickatell.com" class="uri">http://www.clickatell.com</a>↩︎</p></li>
<li id="fn28"><p><a href="http://www.nndh.com" class="uri">http://www.nndh.com</a> and <a href="http://imamali8.com" class="uri">http://imamali8.com</a>.↩︎</p></li>
<li id="fn29"><p>Vij, supra note 1.↩︎</p></li>
<li id="fn30"><p>Ministry of Communications &amp; Information Technology, <em>DoT Orders Internet Service Providers to Block Only the Specified Webpages/Websites</em>, <span class="smallcaps">Press Info. Bureau</span> (July 20, 2006), <a href="http://pib.nic.in/newsite/erelease.aspx?relid=18954" class="uri">http://pib.nic.in/newsite/erelease.aspx?relid=18954</a>.↩︎</p></li>
<li id="fn31"><p>Venkatesan Vembu, <em>Save Our Savitha Bhabhi</em>, DNA (July 3, 2009), <a href="http://​www.dnaindia.com/​analysis/​column-save-our-savita-bhabhi-1270664" class="uri">http://​www.dnaindia.com/​analysis/​column-save-our-savita-bhabhi-1270664</a>.↩︎</p></li>
<li id="fn32"><p>Pranesh Prakash, <em>DIT's Response to RTI on Website Blocking</em>, <span class="smallcaps">Centre for Internet and Society</span> (Apr.&nbsp;07, 2011), <a href="http://cis-india.org/internet-governance/blog/rti-response-dit-blocking" class="uri">http://cis-india.org/internet-governance/blog/rti-response-dit-blocking</a>.↩︎</p></li>
<li id="fn33"><p>Isac, <em>List of URLs Blocked by Reliance Infocomm</em>, <span class="smallcaps">Anonymous</span> (May 25, 2012), <a href="http://pastehtml.com/view/bywiha3f9.txt">http://​pastehtml.com/​view/​bywiha3f9.txt</a>, <em>archived at</em> <a href="https://archive.today/Is7Sn">https://​archive.today/​Is7Sn</a>.↩︎</p></li>
<li id="fn34"><p>I tried three ISPs: BSNL, Tata Indicom, and ACT Broadband.↩︎</p></li>
<li id="fn35"><p>Smitha Krishna Prasad, <em>DoT Blocks Domain Sites — But Reasons and Authority Unclear</em>, <span class="smallcaps">Centre for Internet and Society</span> (Nov 21, 2012), <a href="http://cis-india.org/internet-governance/blog/dot-blocks-domain-sites">http://​cis-india.org/​internet-governance/​blog/​dot-blocks-domain-sites</a>.↩︎</p></li>
<li id="fn36"><p>Nikhil Pahwa, <em>List of 104 Music Sites That The Indian Music Industry Wants Blocked</em>, <span class="smallcaps">Medianama</span> (Mar.&nbsp;15, 2012), <a href="http://www.medianama.com/2012/03/223-list-of-104-music-sites-that-the-indian-music-industry-wants-blocked/" class="uri">http://www.medianama.com/2012/03/223-list-of-104-music-sites-that-the-indian-music-industry-wants-blocked/</a>↩︎</p></li>
<li id="fn37"><p><em>See</em> Ananth Padmanabhan, <em>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 1)</em>, <span class="smallcaps">Centre for Internet and Society</span> (Jan.&nbsp;30, 2014), <a href="http://cis-india.org/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1">http://cis-india.org/​a2k/​blog/​john-doe-orders-isp-blocking-websites-copyright-1</a>.↩︎</p></li>
<li id="fn38"><p>Sites like Pastebin.com (which only hosts text content, not audio), and sites which have content that goes far beyond the limited copyright infringing material they may have, like Vimeo.com (a general video-hosting website) and Chakpak.com (a general entertianment website), have also been blocked.↩︎</p></li>
<li id="fn39"><p>The term “intermediary” is very broadly defined in s.2(w) of the IT Act: “‘intermediary’ with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecommunications service providers, network service providers, internet service providers, web-hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes”.↩︎</p></li>
<li id="fn40"><p>Pranesh Prakash, <em>Short Note on IT Amendment Act, 2008</em>, <span class="smallcaps">Centre for Internet and Society</span> (Feb.&nbsp;2009), <a href="http://cis-india.org/internet-governance/publications/it-act/short-note-on-amendment-act-2008">http://​cis-india.org/​internet-governance/​publications/​it-act/​short-note-on-amendment-act-2008</a>.↩︎</p></li>
<li id="fn41"><p>Pranesh Prakash, <em>CIS Para-wise Comments on Intermediary Due Diligence Rules, 2011</em>, <span class="smallcaps">Centre for Internet and Society</span> (Feb 25, 2011, 04:45), <a href="http://cis-india.org/internet-governance/blog/intermediary-due-diligence">http://cis-india.org/internet-governance/​blog/​intermediary-due-diligence</a>.↩︎</p></li>
<li id="fn42"><p>Prashant Iyengar, <em>CIS Para-wise Comments on Cyber Café Rules, 2011</em>, <span class="smallcaps">Centre for Internet and Society</span> (Feb 25, 2011, 03:30), <a href="http://cis-india.org/internet-governance/blog/cyber-cafe-rules">http://​cis-india.org/​internet-governance/​blog/​cyber-cafe-rules</a>.↩︎</p></li>
<li id="fn43"><p>The rules do not define the term.↩︎</p></li>
<li id="fn44"><p>Rishabh Dara, <em>Intermediary Liability in India: Chilling Effects on Free Expression on the Internet</em>, <span class="smallcaps">Centre for Internet and Society</span> (Nov.&nbsp;16, 2013), <a href="http://cis-india.org/" class="uri">http://cis-india.org/</a><a href="http://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet/intermediary-liability-in-india.pdf">​internet-governance/​chilling-effects-on-free-expression-on-internet/​intermediary-liability-in-india.pdf</a> (explaining the methodology of the experiment and its results).↩︎</p></li>
<li id="fn45"><p>This brings to mind the way Klement Gottwald, the Czech communist leader, had Vladimír Clementis, a fellow senior member of the Communist Party of Czechoslovakia, erased from a photograph of the two of them standing next to each other, after Clementis was indicted in the Slánský show trial. In his novel The Book of Laughter and Forgetting, Milan Kundera describes this episode, and then has a character state the book’s most famous line: “The struggle of man against power is the struggle of memory against forgetting.” <span class="smallcaps">Milan Kundera, The Book of Laughter and Forgetting</span> 4 (Aaron Asher trans., HarperPerennial 1996) (1978).↩︎</p></li>
<li id="fn46"><p>Dara, <em>supra</em> note 44.↩︎</p></li>
<li id="fn47"><p>This section includes material I’ve previously published on the Centre for Internet and Society’s Internet Governance blog.↩︎</p></li>
<li id="fn48"><p>State of Madras v. V.G. Row, 1952 S.C.R. 597, 598.↩︎</p></li>
<li id="fn49"><p>In another chapter of this book, Andrews Rens considers the South African law (which is similar) and the principles of natural justice in some detail.↩︎</p></li>
<li id="fn50"><p><em>See</em> Pranesh Prkash, <em>E-Books Are Easier to Ban Than Books</em>, <span class="smallcaps">Outlook Mag.</span> (Jan.&nbsp;27, 2012), <a href="http://www.outlookindia.com/article/EBooks-Are-Easier-To-Ban-Than-Books-/279712">http://www.outlookindia.com/article/Ebooks-Are-Easier-To-Ban-Than-Books-/279712</a>.↩︎</p></li>
<li id="fn51"><p><em>See</em> <em>About Us</em>, <span class="smallcaps">Chilling Effects Clearinghouse</span>, <a href="https://www.chillingeffects.org/about" class="uri">https://www.chillingeffects.org/about</a> (last visited May 15, 2014).↩︎</p></li>
<li id="fn52"><p><em>See</em> Pranesh Prakash &amp; Rishabh Dara, <em>Counter-proposal by the Centre for Internet and Society: Draft Information Technology (Intermediary Due Diligence and Information Removal) Rules, 2012</em>, <span class="smallcaps">Centre for Internet and Society</span>, <a href="http://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf" class="uri">http://cis-india.org/internet-governance/counter-proposal-by-cis-draft-it-intermediary-due-diligence-and-information-removal-rules-2012.pdf</a>↩︎</p></li>
<li id="fn53"><p><em>See</em> Venkateshwara Theatre v. State of Andhra Pradesh and Ors., (1993) 3 S.C.R. 616. (“Just a difference in treatment of persons similarly situate leads of discrimination, so also discrimination can arise if persons who are unequals, i.e.&nbsp;differently placed, are treated similarly . . . . A law providing for equal treatment of unequal objects, transactions, or persons would be condemned as discriminatory if there is absence of rational relation to the object intended to be achieved by the law.”)↩︎</p></li>
<li id="fn54"><p>“Actual knowledge” is a requirement of Section 79(3)(b) of the IT Act, which states: “upon receiving actual knowledge, or on being notified by the appropriate Government or its agency that any information, data or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit the unlawful act, the intermediary fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner.”↩︎</p></li>
<li id="fn55"><p>Nirmaljit Singh Narula v. Indijobs at Hubpages.com, CS (OS) No.871/2012 (Delhi H.C., Mar.&nbsp;30, 2012), 187234253 Indian Kanoon ¶ 15, <a href="http://indiankanoon.org/doc/187234253/" class="uri">http://indiankanoon.org/doc/187234253/</a>.↩︎</p></li>
<li id="fn56"><p>The Delhi High Court’s reading of the law seems to be contradictory to the ‘clarification’ that the Department of Electronics and Information Technology offered in March 2013 through a statement on its website: “It is clarified that the intended meaning of the said words is that the intermediary shall respond or acknowledge to the complainant within thirty six hours of receiving the complaint/grievances about any such information as mentioned in sub-rule (2) of Rule 3 and initiate appropriate action as per law. Further, the Grievance Officer of the intermediary shall redress such complaints promptly but in any case within one month from the date of receipt of complaint.” <em>Clarification on the Information Technology (Intermediary Guidelines) Rules, 2011 under Section 79 of the Information Technology Act, 2000</em>, <span class="smallcaps">Dep’t of Electronics &amp; Info. Tech.,</span> <a href="http://deity.gov.in/sites/upload_files/dit/files/Clarification%2079rules(1).pdf">http://​deity.gov.in/​sites/​upload_files/​dit/​files/​Clarification%2079rules%281%29.pdf</a>. Interestingly, in May 2011 the Department of Electronics and Information Technology had stated, “In case any issue arises concerning the interpretation of the terms used by the Intermediary, which is not agreed to by the user or affected person, the same can only be adjudicated by a Court of Law. The Government or any of its agencies have no power to intervene or even interpret.” But it proceeded to do exactly that in its “Clarification” of March 2013, essentially disagreeing both the with court’s interpretation as well as its own previous statement.↩︎</p></li>
<li id="fn57"><p><em>Id</em>.↩︎</p></li>
<li id="fn58"><p>Ministry of Communications &amp; Information Technology, <em>Exemption from Liability for Hosting Third Party Information: Diligence to be Observed under Intermediary Guidelines Rules</em>, <span class="smallcaps">Press Info. Bureau</span> (May 11, 2011, 16:36), <a href="http://pib.nic.in/newsite/erelease.aspx?relid=72066">http://​pib.nic.in/​newsite/​erelease.aspx?relid=72066</a>.↩︎</p></li>
<li id="fn59"><p>Nicholas Bramble explores this idea in depth in his forthcoming paper tentatively titled, “Speech and Safety Laboratories”, which he presented at the Freedom of Expression Scholars Conference 2014 held at Yale University in May 3, 2014.↩︎</p></li>
<li id="fn60"><p>The mainstream media also completely ignored the Cyber Cafe Rules, though those rules not only barred anonymous usage of cybercafes, but also required cybercafe operators to record the web-browsing histories of all their customers.↩︎</p></li>
<li id="fn61"><p><em>See</em> Heather Timmons, <em>India Asks Google, Facebook to Screen User Content</em>, <span class="smallcaps">N.Y. Times: India Ink</span> (Dec.&nbsp;5, 2011, 06:33), <a href="http://india.blogs.nytimes.com/2011/12/05/india-asks-google-facebook-others-to-screen-user-content/">http://​india.blogs.nytimes.com/​2011/12/05/​india-asks-google-facebook-others-to-screen-user-content/</a>.↩︎</p></li>
<li id="fn62"><p><em>See</em> Pranesh Prakash, <em>Press Coverage of Online Censorship Row</em>, <span class="smallcaps">Centre for Internet and Society</span> (Dec.&nbsp;8, 2011), <a href="http://cis-india.org/internet-governance/blog/press-coverage-online-censorship" class="uri">http://cis-india.org/internet-governance/blog/press-coverage-online-censorship</a>↩︎</p></li>
<li id="fn63"><p>Judge Kumar notes in his summons order:</p>
<p>It seems that instead of regulating the undesirable and offensive content they have promoted the same for increasing the profits and promoting their business. They have closed their eyes and promoted obscene[,] derogatory[,] defamatory[,] and inflammatory material continuously on their network. It appears from a bare perusal of the documents that prima facie the accused in connivance with each other and other unknown persons are selling, publicly exhibiting[,] and have put into circulation obscene, lascivious content which also appeals to the prurient interests and tends to deprave and corrupt the persons who are likely to read, see or hear the same.</p>
<blockquote class="blockquote">
<p>Vinay Rai v. Facebook India and Ors., Summons Order, Dec.&nbsp;23, 2011, <em>available at</em> <a href="http://cis-india.org/internet-governance/resources/vinay-rai-v-facebook-summons-order-2011-12-23">http://cis-india.org/​internet-governance/​resources/​vinay-rai-v-facebook-summons-order-2011-12-23</a>.</p>
</blockquote>
↩︎</li>
<li id="fn64"><p><em>See, e.g.</em>, Danish Raza, <em>Sibal Not a Lone Crusader for Internet Censorship: Meet the Others</em>, <span class="smallcaps">Firstpost</span> (Dec.&nbsp;26, 2011), <a href="http://www.firstpost.com/india/sibal-not-a-lone-crusader-for-internet-censorship-meet-the-others-166052.html" class="uri">http://www.firstpost.com/india/sibal-not-a-lone-crusader-for-internet-censorship-meet-the-others-166052.html</a>; Amol Sharma, Is India Ignoring its own Internet Protections?, <span class="smallcaps">Wall St.&nbsp;J.: India Real Time</span> (Jan.&nbsp;16, 2012), <a href="http://blogs.wsj.com/" class="uri">http://blogs.wsj.com/</a><a href="http://blogs.wsj.com/indiarealtime/2012/01/16/is-india-ignoring-its-own-internet-protections/">​indiarealtime/​2012/01/16/​is-india-ignoring-its-own-internet-protections</a>/; Aparna Viswanathan, Op-ed, <em>The Curious Case of Vinay Rai</em> , <span class="smallcaps">Hindu</span> (Feb.&nbsp;15, 2012), <a href="http://www.thehindu.com/todays-paper/tp-opinion/the-curious-case-of-vinay-rai/article2894391.ece">http://​</a><a href="http://www.thehindu.com/">www.thehindu.com/</a><a href="http://www.thehindu.com/todays-paper/tp-opinion/the-curious-case-of-vinay-rai/article2894391.ece">​todays-paper/​tp-opinion/​the-curious-case-of-vinay-rai/​article2894391.ece</a>; and Danish Raza, <em>Vinay Rai vs Facebook: Govt Uses Courts to Censor the Internet</em>, <span class="smallcaps">Firstpost</span> (Jan.&nbsp;13, 2012), <a href="http://www.firstpost.com/india/vinay-rai-vs-facebook-govt-uses-courts-to-censor-the-internet-181603.html">http://​www.firstpost.com/​india/​vinay-rai-vs-facebook-govt-uses-courts-to-censor-the-internet-181603.html</a>.↩︎</p></li>
<li id="fn65"><p>There are various linkages between the violence in Assam and in Myanmar, and the resultant censorship. For a comparison of the similarities and differences in two situations, see Subir Bhaumik, <em>Assam Violence Reverberates Across India</em>, <span class="smallcaps">Al Jazeera</span> (Aug.&nbsp;16, 2012), <a href="http://www.aljazeera.com/indepth/features/2012/08/201281572950685537.html">http://​www.aljazeera.com/​indepth/​features/​2012/08/​201281572950685537.html</a>. <em>Compare</em> B. Raman, Op-ed, <em>India: Fissures in Assam: Sons of Soil vs Bangladesh Intruders</em>, <span class="smallcaps">Eurasia Rev.</span> (July 29, 2012), <a href="http://www.eurasiareview.com/">http://​www.eurasiareview.com/</a>​29072012-india-fissures-in-assam-sons-of-soil-vs-bangladesh-intruders-oped/ (equating the Muslims in Rakhine and in Assam as illegal immigrants from Bangladesh). There were also instances of photos from an earthquake in Tibet, and other such images being falsely circulated in Pakistan, India, and elsewhere as evidence of the mass murder of Rohingyas in Myanmar, while, as an example, gruesome photos of two rape-murder victims in El Salvador were circulated as being photos of Hindus decapitated and dismembered by Muslims in Assam. <em>See</em> Yousuf Saeed, <em>How to Start a Riot out of Facebook</em>, <span class="smallcaps">Kafila</span> (Aug.&nbsp;13, 2012), <a href="http://kafila.org/2012/08/13/how-to-start-a-riot-out-of-facebook-yousuf-saeed/">http://​kafila.org/​2012/08/13/​how-to-start-a-riot-out-of-facebook-yousuf-saeed/</a>; <em>see also</em> Faraz Ahmed, <em>Social Media Is Lying to Your About Burma’s Muslim ‘Cleansing’</em>, Express Tribune: Media Watchdog (July 19, 2012), <a href="http://blogs.tribune.com.pk/story/12867/social-media-is-lying-to-you-about-burmas-muslim-cleansing/">http://​blogs.tribune.com.pk/​story/​12867/​social-media-is-lying-to-you-about-burmas-muslim-cleansing/</a>; and Pranesh Prakash, <em>Pranesh Prakash on Twitter: Gruesome &amp; graphic example of hate speech &amp; incitement to violence using lies abt Hindu women being raped &amp; decapitated <a href="http://goo.gl/TdGnA" class="uri">http://goo.gl/TdGnA</a></em>, Twitter (Aug 22, 2012, 16:27), <a href="https://twitter.com/pranesh_prakash/status/238417175965212672">https://​twitter.com/​pranesh_prakash/​status/​238417175965212672</a>.↩︎</p></li>
<li id="fn66"><p><em>See, e.g.</em>, Harichandan Arakali, <em>Thousands Flee Bangalore over Assam Violence</em>, <span class="smallcaps">Reuters</span> (Aug.&nbsp;16, 2012), <a href="http://in.reuters.com/article/2012/08/16/bangalore-assam-north-east-bodo-idINDEE87F0BU20120816">http://​in.reuters.com/​article/​2012/08/16/​bangalore-assam-north-east-bodo-idINDEE87F0BU20120816</a>.↩︎</p></li>
<li id="fn67"><p>Even things that couldn’t be blocked by ISPs, like HTML tags and Twitter user handles were requested to be blocked by the government’s orders. <em>See</em> Prakash, <em>infra</em> note 68.↩︎</p></li>
<li id="fn68"><p><em>See</em> Pranesh Prakash, <em>Analysing the Latest List of Blocked Sites (Communalism &amp; Rioting Edition)</em>, <span class="smallcaps">Centre for Internet and Society</span> (Aug.&nbsp;22, 2012), <a href="http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism" class="uri">http://cis-india.org/internet-governance/blog/analysing-blocked-sites-riots-communalism</a>.↩︎</p></li>
<li id="fn69"><p><em>See</em> Pranesh Prakash, <em>Arbitrary Arrests for Comments on Bal Thackeray’s Death</em>, <span class="smallcaps">Centre for Internet and Society</span> (Nov.&nbsp;19, 2012), <a href="http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A" class="uri">http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A</a>.↩︎</p></li>
<li id="fn70"><p><em>See</em> Pranesh Prakash, <em>Breaking Down Section 66A of the IT Act</em>, <span class="smallcaps">Centre for Internet and Society</span> (Nov.&nbsp;25, 2012), <a href="http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act" class="uri">http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</a>.↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{prakashIndiaVisible2014,
  author = {Prakash, Pranesh},
  editor = {Prakash, Pranesh and Rizk, Nagla and Affonso Souza, Carlos},
  title = {India: Visible and Invisible Censorship},
  booktitle = {Global censorship: shifting modes, persisting paradigms},
  pages = {107-130},
  date = {2014},
  url = {https://cis-india.org/a2k/a2kga-global-censorship#page=121},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndiaVisible2014" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2014. <span>“India: Visible and Invisible
Censorship.”</span> In <em>Global Censorship: Shifting Modes, Persisting
Paradigms</em>, edited by Pranesh Prakash, Nagla Rizk, and Carlos
Affonso Souza. <a href="https://cis-india.org/a2k/a2kga-global-censorship#page=121">https://cis-india.org/a2k/a2kga-global-censorship#page=121</a>.
</div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/books/prakash_2014_india-visible-and-invisible-censorship.html</guid>
  <pubDate>Fri, 01 May 2015 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Independence: global media | print version</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/prakash_2014_independence-global-media_printed.html</link>
  <description><![CDATA[ 






<section id="overview" class="level2">
<h2 class="anchored" data-anchor-id="overview">Overview</h2>
<p>Independence of journalists and of media outlets has continued to be dynamic and uneven around the world, and has become increasingly challenged by the fluidity of what constitutes ‘media’ and the application online of ‘press freedom,’ and by who count as ‘journalists’ due to lowering of production and dissemination barriers by online media, the conversion of some off-line publications to online publications, and the two-way flow of information between the online and traditional media. Changes to existing business models for global and transnational media have led to an increased reliance on state funding, which has been closely associated with risks of overt dependence and governmental ‘capture.’</p>
</section>
<section id="independence-of-international-news-services" class="level2">
<h2 class="anchored" data-anchor-id="independence-of-international-news-services">Independence of international news services</h2>
<p>The largest news agencies, newspapers, and news channels have all been governed by different models although there has been a trend towards state-owned international media since 2006 and online volunteer news collectives [see Pluralism: Global]. Among the models are Agence France-Presse, which is owned by the State and media professionals, the Spanish-language Agencia EFE that is privately owned, Associated Press collectively owned by its subscribers, Bloomberg privately owned, Reuters privately owned (since 2008 as part of Thomson Reuters), and Xinhua which is state-owned. Different degrees of editorial independence from owners have been operational within these media companies. Within the state-owned global news broadcasters – the larger ones being Al Arabiya, Al Jazeera, BBC (via a trust), CCTV, China Radio International, Deutsche Welle, France24, RT (formerly Russia Today), and Voice of America (VOA) – there have been different frameworks both legally and in practice, as well as by platform. Given this range, broad trends have been difficult to pinpoint, although it has been observed that the performance of international broadcasting has been related to complexities of foreign policy and their relationship to the geopolitical environment. As such, some international and foreign broadcasting has tended to reflect the interests of the respective governments. The reliance on government funding by many international broadcasters has raised questions about their ability to provide neutral and impartial reporting. Public institutions with multi-year charters and ownership by an independent trust (BBC, SVT) have helped insulate some global media outlets from governmental pressures.<sup>1</sup> In another case, outlets have been legally guaranteed editorial independence and statutes have set out the government’s policies conduct, with audiences perceiving the news as credible. Audience perceptions are important if a foreign news service is to be seen as credible, and this factor has been seen to counterbalance some of the influence from governments. At different times, some international state-owned networks have been accused of avoiding stories that are critical of their backing State; however, there has been a lack of comparative studies in this area, and it is difficult to confirm alleged bias with detailed evidence, nor is there sufficient material to suggest specific trends.</p>
<p>Internationally, political influence and commercial pressure have been seen at times also to have compromised independence in both domestic and international media. Corporate ownership, as distinct from state-ownership and strict government regulation, is not a guarantee of editorial independence. A 2011 study by two scholars at New York University of public media in 14 developed countries suggested that commercial pressures have been far more deleterious there than partisan political meddling. Commercial pressures have impacted also on state-owned media, encouraging these outlets to appeal to a middle-class urban audience, potentially at the expense of public service values and rural, poor or minority audiences. Private news broadcasters (both international and domestic) especially have turned to entertainment programming to boost ratings.</p>
<p>Global media independence of a news organization has been impacted upon by the relatively recent demise of many existing media business models, leading to a re-evaluation across the industry of where the ‘value’ in media content lies and an increase in government development programmes, corporate benefactors and other ‘special interests’ funding or cross-funding media content. This kind of funding has by no means been uncommon historically in international broadcasting, and it may influence actual media content, framing, and the ‘red lines’ that reporters feel unable to cross.</p>
<p>While larger media companies have relied on attracting their own advertisers online, many online intermediaries like Google Ads now exist, which effectively has meant that small online media companies can get by without having to have dedicated facilities. While a large advertiser can threaten independent reporting by a news organization, the advertiser loses this leverage if the online news service uses an intermediary; but this has also meant that the organization concerned can no longer control what advertisements are shown.</p>
</section>
<section id="professionalism-and-the-broader-media-ecosystem" class="level2">
<h2 class="anchored" data-anchor-id="professionalism-and-the-broader-media-ecosystem">Professionalism and the broader media ecosystem</h2>
<p>International governmental and non-governmental organizations have generally played an important role in media research, bringing attention to issues, and providing support, training, etc. Their activities contribute to a global environment for independence. The International Federation of Journalists, a global federation of journalists’ trade unions, has been one of the more influential professional bodies, with more than 600,000 members.<sup>2</sup> While some transnational press ethics bodies have existed, such as the World Association of Press Councils and the Organization of News Ombudsmen (which concerns self-regulation at an enterprise-level), they have not appeared to exert much influence over the larger media.<sup>3</sup> Most of the more influential international and regional institutions dedicated to journalists and journalism have continued to be headquartered either in Europe or North America. In the global internet intermediary space, a voluntary embryonic self-regulatory system has emerged in the form of the Global Network Initiative.<sup>4</sup> Another relevant development that appears indicative of the trend towards self-regulation at this level was the European Commission’s 2013 publication ICT Sector Guide on Implementing the UN Guiding Principles on Business and Human Rights. The majority of the large media donors have also continued to be located in the West, and were, more often than not, governments.</p>
<p>While there have been a number of codes of ethics for journalists that aspire to universal status, and even some for ‘online journalists’ and bloggers, most transnational news agencies and broadcasters have had their own codes. Notably among the larger news agencies and broadcasters, Al Arabiya, CCTV, CNN, and Xinhua have not appeared to publish specific codes of ethics online.</p>
<p>Over the past six years, one notable trend has been the increase in online training material for journalism. For instance, UNESCO has published extensive guides for journalists on a range of topics from conflict-sensitive reporting to investigative reporting and produced online curricula, including a model curricula for journalism education and an online media and information literacy course. In 2013, UNESCO began exploring with ORBICOM, the network of UNESCO chairs in communication, a Global Initiative for Excellence in Journalism Education, as a framework to group together and deepen international work in this area. The BBC has launched initiatives to provide journalism and social media training to members of local communities, while its ‘College of Journalism’ website includes resources for aspiring citizen journalists. Such initiatives add to the online materials and courses offered by the Centre for International Media Assistance, the European Journalism Centre, International Center for Journalists (ICFJ) Anywhere, Knight Center for Journalism in the Americas, Poynter Online, and others.</p>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>British Broadcasting Corporation (BBC) and Sveriges Television (SVT) are the British and Swedish, respectively, public service broadcasters.↩︎</p></li>
<li id="fn2"><p>IFJ’s headquarters are in Belgium.↩︎</p></li>
<li id="fn3"><p>WAPC’s headquarters are in Turkey and ONO’s headquarters are in Canada.↩︎</p></li>
<li id="fn4"><p>GNI’s headquarters are in the USA.↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{prakashIndependenceGlobal2014,
  author = {Prakash, Pranesh},
  editor = {Radsch, Courtney},
  publisher = {UNESCO},
  title = {Independence: Global Media},
  booktitle = {World trends in freedom of expression and media
    development},
  date = {2014-07-14},
  url = {https://unesdoc.unesco.org/ark:/48223/pf0000227025},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndependenceGlobal2014" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2014. <span>“Independence: Global Media.”</span> In
<em>World Trends in Freedom of Expression and Media Development</em>,
edited by Courtney Radsch. UNESCO. <a href="https://unesdoc.unesco.org/ark:/48223/pf0000227025">https://unesdoc.unesco.org/ark:/48223/pf0000227025</a>.
</div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/books/prakash_2014_independence-global-media_printed.html</guid>
  <pubDate>Mon, 14 Jul 2014 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Indien: Selbst die Regierung vertraut der Regierung nicht</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/prakash_2014_Indien-Selbst-die-Regierung-vertraut-der-Regierung-nicht.html</link>
  <description><![CDATA[ 






<hr>
<section id="teil-1" class="level2">
<h2 class="anchored" data-anchor-id="teil-1">Teil 1</h2>
<p>Es gab Berichte darüber, dass die indische Regierung seit 2009 die Einrichtung eines zentralisierten Überwachungssystems (CMS) vorantreibt”<sup>1</sup>. Aber das hat keine große Debatte über Privatsphäre ausgelöst. Selbst Nachrichten über die Inbetriebnahme des CMS im April 2013 haben keine große Aufmerksamkeit erfahren. Nachdem ein Kollege am CIS darüber geschrieben hat und es von Human Rights Watch scharf kritisiert wurde”<sup>2</sup>, begannen mehr Reporter, es als Problem für die Privatsphäre anzuerkennen. Aber es waren letztlich die Enthüllungen von Edward Snowden, die dazu geführt haben, dass die Menschen, zumindest für einen kurzen Zeitraum, aufgehorcht haben und sich gefragt haben: Wie funktionieren Indiens Geheimdienste? Und haben wir ähnliche Systeme zur Massenüberwachung?</p>
<section id="wenig-öffentliche-bekanntmachung" class="level3">
<h3 class="anchored" data-anchor-id="wenig-öffentliche-bekanntmachung">Wenig öffentliche Bekanntmachung</h3>
<p>In Indien – dem Heimatland des wohl ältesten Geheimdienstes der Welt, dem Intelligence Bureau – gibt es eine seltsame Mischung von großer Transparenz und sehr wenig Rechenschaftspflicht, was Überwachung und Geheimdienste angeht. Viele hochrangige Beamte geben Reportern bereitwillig anonym Auskunft<sup>3</sup>, was zu einer Menge an ‘inoffiziellem’ Wissen über den Stand der Überwachung in Indien führt. Hingegen gibt es nur sehr wenig, was offiziell berichtet wird und noch weniger davon wird in der nationalen Presse und im Parlament diskutiert. Diese fehlende Verantwortlichkeit wird im gleichen Kontext gesehen wie die Art und Weise, in der die Big-Brother-Akronyme (CMS, NATGRID, TCIS, CCTNS, etc.) sowie der Status der Geheimdienstbehörden in Indien eingeführt wurden: Keine davon wurde jemals durch einen Parlamentsbeschluss mit klaren Regeln und Kompetenzgrenzen eingerichtet. Es gibt überhaupt keine öffentliche Rechenschaftspflicht oder Überprüfung, auBer durch eben denjenigen Flügel der Regierung, der die Institutionen und Projekte zuerst eingerichtet hat.</p>
</section>
<section id="zentralisiertes-überwachungssystem" class="level3">
<h3 class="anchored" data-anchor-id="zentralisiertes-überwachungssystem">Zentralisiertes Überwachungssystem</h3>
<p>Dieser Mangel an Verantwortlichkeit hat dazu geführt, dass die Regierung seit 2006 an einem zentralisierten Überwachungssystem (CMS) gearbeitet hat, das in das ebenfalls eingeführte Telefon-Abörsystem TCIS integriert wurde. Die Kosten betragen mehr als 8 Milliarden Rupien (mehr als das Vierfache der anfänglichen Schätzung von 1,8 Milliarden Rupien) und noch viel wichtiger: Es kostet unser aller Privatsphäre und unsere persönliche Freiheit. Momentan müssen alle Internet Service Provider und Telefonanbieter (zusammengefasst: Telcos) der Regierung direkten Zugriff auf alle Kommunikation geben, die über ihre Leitungen läuft. Das geschieht jedoch im Moment auf dezentrale Art und Weise, und in den meisten Fällen muss die Regierung die Telcos nach den Metadaten fragen (detaillierte Anrufdaten wie: Wer hat wen wie lange wann angerufen? Welche Webseiten wurden besucht? Wem wurde eine bestimmte IP zugewiesen) oder sie zum Abhören aufforden, damit sie die Daten der Regierung zur Verfügung stellen. Darüber hinaus benutzt die Regierung Instrumente (darunter jene, die von Narus erworben wurden, einer Tochtergesellschaft von Boeing, die aus dem israelischen Geheimdienst entsprungen ist), um Zugriff auf riesige Datenmengen zu bekommen, die zwischen mehreren Städten ’hin- und hergehen, was die Daten der Unterseekabel, die in Bombay ankommen, mit einschließt. Mit dem CMS wird die Regierung von zentraler Stelle aus Zugriff auf alle Metadaten und Inhalte von Kommunikation erhalten, die indische Telekommunikationsnetze durchlaufen. Das bedeutet, dass die Regierung all deine Anrufe mithören kann, all deine SMS, Emails und Chats lesen kann. Sie kennt all deine Googlesuchen, Webseitenafrufe, Benutzernamen und Passwörter, wenn deine Kommunikation nicht verschlüsselt ist.</p>
<p>Man könnte sich fragen: Warum ist das ein Problem, wo die Regierung doch bereits jetzt dezentralen Zugriff hat? Um diese Frage zu beantworten, muss man zuerst in die Gesetze schauen.</p>
</section>
<section id="überwachungsgesetze-in-indien" class="level3">
<h3 class="anchored" data-anchor-id="überwachungsgesetze-in-indien">Überwachungsgesetze in Indien</h3>
<p>Es gibt keine Gesetze in Indien, die Massenüberwachung erlauben. Die beiden Gesetze, die sich mit Abhörung beschäftigen sind der Indian Telegraph Act, 1885 (unter Absatz 5(2) zusammen mit Regel 419A) und der Information Technology Act (IT Act’s Absatz 69 zusammen mit den betreffenden Regeln). Beide erlauben die gezielte Überwachung im genehmigten Einzelfall (in nicht dringlichen Situationen) durch den Innenminister oder den Minister in der Abteilung Informationstechnologie. Der Telegraph Act von 1885 weist an, dass das</p>
<p>Abhören von Kommunikation nur im Fall eines Notfalls oder der Bedrohung der öffentlichen Sicherheit zulässig ist. Wenn eine dieser beiden Voraussetzungen erfüllt ist, kann sich die Regierung auf einen der folgenden fünf Gründe berufen: »Die Souveränitat und Integrität Indiens, die Staatssicherheit, freundschaftliche Beziehungen zu anderen Staaten oder die öffentliche Ordnung oder die Verhinderung der Anstiftung zum Begehen einer Straftat«.</p>
<p>2008 hat der Information Technology Act viele der Vorkehrungen zur Abhörung aus dem Telegraph Act kopiert, aber diese beiden Voraussetzungen entfernt. (Oh, welch’ Ironie, wenn ein koloniales Gesetz die Privatsphäre besser schützt, als eines, das nach Erreichen der Unabhängigkeit verabschiedet wurde!) Der IT Act setzt daher die Schranke für das Abhören hinab. Da die meiste Kommunikation digital ist, Mobilfunk-Telefonate inbegriffen, ist unklar, in welchen Fällen der Telegraph Act angewandt wird und in welchen der IT Act.</p>
<p>Abgesehen von diesen beiden Bestimmungen, die das Abhören betreffen (ohne Berücksichtigung spezieller Antiterrorgesetze), gibt es viele Gesetze, die gespeicherte Metadaten behandeln, und sie alle haben weitaus niedrigere Anforderungen. Laut der Strafprozessordnung benötigt man keinen Gerichtsbeschluss, es sei denn, der Gegenstand ist eine »Post- oder Telefonbehörde« – in der Regel werden Email-Anbieter und soziale Netzwerke nicht als solche betrachtet.</p>
<p>Unbefugter Zugriff auf Kommunikationsdaten ist nicht per se strafbar. Das ist der Grund dafür, dass der Privatdetektiv, der sich Zugriff auf die Anrufprotokolle von Arun Jaitley, einem Führer der Bharatiya Janata Partei, verschafft hat, unter Vorwand des Betruges angeklagt wurde und nicht wegen Eindringens in die Privatsphäre. Es gibt zwar eine Bestimmung im Telegraph Act zur Bestrafung unbefugten Abhörens, diese beinhaltet jedoch wesentlich geringere Strafen – bis zu drei Jahren Haft – als diejenige, die einen Bürger trifft, der einer Behörde, die abhören, überwachen oder entschlüsseln will, die Mithilfe verweigert – bis zu sieben Jahre Haft gibt es dann laut Abschnitt 69 des IT Acts. Ja, sieben Jahre Haft.</p>
<p>Um die Lächerlichkeit der harten Sanktionen und sowie die Lächerlichkeit von ‚Abschnitt 69 des IT Act ins rechte Licht zu rücken, betrachte man Folgendes: Ein Geheimdienstbeamter, der nationale Geheimnisse preisgibt, könnte für drei Jahre ins Gefängnis gehen; wenn man ein Dokument nicht aushändigen kann, bei dem man gesetzlich dazu verpflichtet ist, kann man laut indischem Strafgesetzbuch mit bis zu einem Monat Haft belangt werden. Weiterhin könnte ein Bürger, der einer Behörde verweigert, seine Daten zu entschlüsseln, einfach von seinem Recht Gebrauch machen, sich nicht selbst belasten zu müssen.</p>
<p>Aber wie schlecht der IT Act auch sein mag, die Regierung hat gesetzmäßig weitaus Schlimmeres getan. In den Lizenzen, welche die Telekommunikationsbehörde ISPs, Mobilfunkanbietern etc. ausstellt, finden sich Regelungen, die sie zwingen, auch ohne richterlichen Beschluss Zugriff auf alle Kommunikationsdaten und -inhalte zu gewähren. Das wird von den existierenden Abhörgesetzen nicht erlaubt. Die Lizenzen nötigen die Mobilfunkbetreiber auch, Verschlüsselung mit weniger als 40 Bit zu benutzen. (Da GSM Netzwerkverschlüsselung-Systeme wie A5/1, A5/2, und A5/3 feste Schlüssellängen von 64 Bit haben, benutzen die Anbieter scheinbar A5/0, das heißt, überhaupt keine Verschlüsselung. Das bedeutet, dass jeder – nicht nur die Regierung – Techniken zum Abfangen aus der Luft benutzen kann, um Anrufe mitzuhören.)</p>
<p>Laut Regeln, die von der Regierung erlassen wurden, sind Internetcafds – aber nicht Telefonzellen-Betreiber – verpflichtet, detaillierte Daten zu den Indentitätsnachweisen ihrer Kunden, zu deren Fotos und den Webseiten, die sie besucht haben, für mindestens ein Jahr zu speichern. Gemäß den Regeln, die als Indisches Datenschutzgesetzt (oh, welch’ Ironie!) erlassen wurden, müssen den Regierungsbehörden sensible persönliche Daten mitgeteilt werden, wenn sie »für die Verifizierung der Identität oder das Verhindern, Erkennen, Ermitteln, Verfolgen und Berstrafen von Vorfällen, eingeschlossen Cyber-Kriminalität« erforderlich sind.</p>
<p>In den Regelungen, die beschreiben, wann ein Internet-Intermediär für die Aktionen seiner Nutzer verantwortlich ist, gibt es eine Bestimmung mit ähnlicher Begründung, die von Internetfirmen verlangt, dass sie »befugten Regierungsbehörden Informationen und Unterstützung in Sachen investigativer, protektiver Cybersicherheits-Aktivitäten bieten«. (Inkohärente, vage und grammatikalisch falsche Sätze sind ein konsistenter Bestandteil von Gesetzen, die vom Kommunikations- und IT-Ministerium verfasst wurden; eine der Telekommunikationslizenzen besagt: »Der Lizenznehmer sollte Vorkehrungen zum Überwachen gleichzeitiger Anrufe der Sicherheitsbehörden treffen«, wobei sicherlich »zum gleichzeitigen Überwachen von Anrufen duch die Sicherheitsbehörden« gemeint war.)</p>
<p>Der Indische Obergerichtshof hat darauf hingewiesen: »Telefonüberwachung ist ein tiefer Eingriff in die Privatsphäre. Natürlich führt jede Regierung, sei sie noch so demokratisch, bis zu einem gewissen Grad Sub Rosa Operationen als Teil ihres Geheimdienstprogrammes durch, aber gleichzeitig muss das Bürgerrecht auf Privatsphäre vor Missbrauch durch die derzeitigen Authoritäten geschützt werden.« Demnach müssen Regierungen zweifelsohne eine explizite Erlaubnis der Gesetzgebung haben, um ihre elektronischen Überwachungsmöglichkeiten auf welche Art auch immer zu erweitern. Dennoch hat die Regierung sich ohne die Einführung neuer Gesetze wiederholt selbst das Recht zur Abhörung gegeben – ohne, dass das Parlament zugestimmt hat -, indem sie die Berechtigungen in Vertragsbestimmungen und abgeleitete Rechtsvorschriften eingeschleust hat.</p>
<p>Man könnte einwenden, dass die meisten dieser Gesetze den Datenschutzrichtlinien zuwiderlaufen, die in einem Report der Justice A.P. Shah-geführten Gruppe von Datenschutzexperten verkündet wurden, welche der Regierung im Oktober 2012 vorgelegt wurden.</p>
</section>
</section>
<section id="teil2" class="level2">
<h2 class="anchored" data-anchor-id="teil2">Teil2</h2>
<section id="warum-wir-der-regierung-nicht-vertrauen-können" class="level3">
<h3 class="anchored" data-anchor-id="warum-wir-der-regierung-nicht-vertrauen-können">Warum wir der Regierung nicht vertrauen können</h3>
<p>Die Reaktion der Regierung auf Kritik an dem CMS könnte sein, dass die bloße Möglichkeit zur Massenüberwachung noch nicht bedeutet, dass sie auch durchgeführt wird. Die Bürokraten werden argumentieren, dass sie sich immer noch an die (schwachen) Gesetze halten werden und sicherstellen, dass jede Überwachungsinstanz befugt ist. Vielmehr werden sie sogar behaupten, dass das CMS Dinge verbessern wird. Es wird die Telcos ausschließen, die Quelle von Datenlecks sein können; es wird sicherstellen, dass jede Abhöranfrage aufgezeichnet wird und der mitgeschnittene Inhalt ordnungsgemäß innerhalb von sechs Monaten gelöscht wird, wie es das Recht verlangt; es wird schnellere Abhörmaßnahmen ermöglichen, die mehr Leben retten werden.</p>
<p>Hier kommen Gründe, warum wir solche Behauptungen zurückweisen sollten:</p>
<ol type="1">
<li><p>Der Ausschluss der Telcos wird nicht helfen, uns vor Überwachung zu schützen, da die Telcos immer noch die notwendige Infrastruktur zur Durchführung von Überwachung besitzen. Solange die Abhörinfrastruktur existiert, werden Telco-Mitarbeiter sie missbrauchen. In einem gründlichen Bericht aus dem Jahr 2010 bemerkte der Journalist M. A. Arun<sup>4</sup>, dass »erschreckenderweise auch diese Korrespondenz durch die Hände mehrerer Angestellter von Serviceprovidern lief, die unberechtigt die persönliche Kommunikation der Kunden abhören.« Als K. K. Paul Sonderpolizeikommissar für Aufklärung war, machte er eine Aktennotiz, in der er die Beschwerden von Mobilfunkanbietern darüber notierte, dass Privatpersonen ihre Kontakte zur Polizei missbrauchten, um Telefongespräche von »Geschäftsrivalen oder zerstrittenen Ehepartnern« abzuhören.</p></li>
<li><p>Man braucht keine zentralisierten Abhöreinrichtungen, um Abhörnachfragen zentral zu verwalten. Die Dateien sollten zu jeder Zeit mit einer Public-Key Infrastruktur verschlüsselt sein, um unautorisierten Zugriff auf Kommunikationsinhalte, die abgefangen wurden, zu verhindern. Es existieren technische Möglichkeiten, um eine Verarbeitungskette sicher zu überwachen und sicherzustellen, dass das abgefangene Material pünktlich nach sechs Monaten zerstört wird, wie es das Gesetz verlangt. Solche technischen Vorkehrungen und nicht das Zentralisieren der Abhörkapazitäten müssen verpflichtend gemacht werden, um unberechtigten Zugriff zu verhindern.</p></li>
<li><p>Momentan werden Abhöranordnungen von den zentralen und regionalen Innenministerien ohne angemessene Abwägung erlassen. Nimmt man den Fakt, dass auf zentraler Ebene jeden Monat zwischen 7.000 und 9.000 Telefonüberwachungen autorisiert oder reautorisiert werden, würde es 15 Stunden pro Tag (ohne Einbeziehung von Wochenenden und Feiertagen) dauern, diese 9.000 Anfragen zu bearbeiten, selbst wenn man von nur drei Minuten zur Bewertung jedes Falles ausgeht. Das ließe dem Innenministerium nur wenig Zeit für irgendetwas Anderes. Und wir wissen, dass die Zahlen bei den Bundesstaaten noch viel schlimmer aussehen, jedoch wissen wir nichts Genaueres, da es keine indienweite Statistik über Überwachung gibt.</p>
<p>Das kann nur bedeuten, dass man sich ungenügend damit beschäftigt, oder dass das Verfahren als Regel 419A der Telegraph Rules (das grünes Licht vom Innenministerium für jeden Abhörvorgang erfordert) nicht befolgt wird. Es gibt Gerüchte von Anfragen, die nichts außer einer Telefonnummer beinhalten, gänzlich ohne Erklärung, warum eine Abhörung erforderlich ist. Wir wissen nicht, ob jemals eine Anfrage vom Innenministerium abgelehnt wurde.</p></li>
<li><p>In einem Verfahren von 1975 hat der Oberste Gerichtshof beschlossen, dass ein »wirtschaftlicher Notfall« nicht einem »öffentlichen Notfall« gleichkommt. Dennoch sehen wir, dass von den neun zentralen Regierungsbehörden, die Presseberichten zufolge das Recht haben, Abhörmaßnahmen durchzuführen – das Central Board of Direct Taxes (CBDT), Intelligence Bureau, Central Bureau of Investigation, Narcotics Control Bureau, Directorate of Revenue Intelligence, Enforcement Directorate, Research &amp; Analysis Wing, National Investigation Agency und die Defence Intelligence Agency sowie die Staatspolizei – drei sich ausschließlich mit Wirtschaftsdelikten beschäftigen (beziehungsweise vier, wenn man das Central Economic Intelligence Bureau mit einschließt).</p>
<p>Der Verdacht auf Steuerhinterziehung kann keinen Grund zur Telefon-überwachung darstellen. Deshalb rechtfertigte die Regierung das Ausspionieren von Niira Radia, einem Unternehmenslobbyisten, mit der Begründung, er stehe unter dem Verdacht, pakistanischer Spion zu sein. In einem Bericht des Kabinettssekretär von 2011, nach dem Radia-Fall, hat dieser darauf hingewiesen, dass Wirtschaftsverstöße nicht als »öffentliche Notfälle« zählen und dass das Central Board of Direct Taxes keine Berechtigung zur Kommunikationsüberwachung besitzen sollte; seitdem hat sich nichts verändert, denn die Abteilung befindet sich weiterhin auf der Liste derjenigen Behörden, die zur Durchführung von Abhörmannahmen befähigt sein. Das deutet darauf hin, dass man nicht davon ausgehen kann, die Regierung würde sich auch nur im Entferntesten an geltendes Recht halten.</p></li>
<li><p>Selbst die Regierung vertraut der Regierung nicht. Die Abteilung für Informationstechnologie hat sich kürzlich bei der nationalen Sicherheitsaufsicht darüber beschwert, dass sich die National Technical Research Organisation (NTRO) in die NIC Infrastruktur gehackt habe und auf sensible Daten mehrerer Minsterien zugegriffen habe. Laut der NTRO wurden 2012 hunderte von Email-Konten führender Beamter kompromittiert, einschließlich »dem Innenminister, dem Marineattache von Tehran, mehreren indischen Delegationen im Ausland, Topermittlern des Central Bureau of Investigation und bewaffneten Streitkräften«. Die indische Armee wurde kürzlich beschuldigt, seine Technical Support Division zu benutzen, um illegal aus der Luft die Telefonanrufe von Politikern in den Bundesstaaten Jammu und Kashmir abzuhören.</p>
<p>Wie können wir davon ausgehen, dass die Regierung die himalayaartigen Informationsmengen schützen wird, die sie mit dem CMS sammelt, wenn Regierungsbehörden und das Militär andere Regierungsabteilungen und Politiker hacken und ganz offensichtlich nicht einmal der Email-Account des Innenministers sicher ist?</p></li>
<li><p>Regierungseinheiten nehmen inoffizielle und illegale Überwachung vor, und das CMS wird dem vermutlich kein Ende bereiten.</p>
<p>A. In einem Artikel, der 2010 in Outlook erschien, hat der Journalist Saikat Datta enthüllt, dass verschiedene Bundes- und Landesgeheimdienstbehörden in Indien (illegale) Luft-Abfanggeräte benutzen. »Diese Systeme werden regelmäßig im muslimisch dominierten Stadtgebieten installiert, wie Delhi, Lucknow und Hyderabad. Die Systeme, die in Autos eingebaut sind, werden auf ‘Fischfang’ geschickt, sie schalten sich zufällig in die Gespräche von Bürgern und versuchen so, Terroristen auzuspüren.</p>
<p>Die National Technical Research Organization (NTRO), die sich nicht einmal in der Liste der abhörberechtigten Institutionen befindet, ist eine der größten Überwachungseinrichtungen Indiens. Der Mint berichtete im letzten Jahr, »NTROs Überwachungsgerät wurden entgegen der Anweisungen öfter in der Nationalhauptstadt installiert als in Grenzregionen« und »gemäß neuer Standardrichtlinien, die früher im Jahr erlassen wurden, darf NTRO nur Signale an den internationalen Grenzen abfangen.«</p>
<p>Die NTRO betreibt mehrere Einrichtungen in Bombay, Bangalore, Delhi, Hyderabad, Lucknow und Kolkata, in denen monumentale Mengen an Internetverkehr abgefangen werden. In Bombay wird aller Verkehr aus den Unterseekabeln abgefangen. Diese schockierende Enthüllung wurde weit vor den Enthüllungen in den Vereinigten Staaten gemacht, dass die NSA die Internet Backbones abschnorchelt, aber sie hat für weitaus weniger Furore gesorgt.</p>
<p>B. Kürzlich wurden in Himachal Pradesh nach einem Regierungswechsel durch die Behörden des Crime Investigation Department (CID) Festplatten beschlagnahmt. Diese enthielten aufgezeichnete Telefongespräche von prominenten Führern der Congress- und Bharatiya Janata Partei, einschließlich dreier früherer Kabinettminister und naher Verwander mehrerer Ministerpräsidenten, einem Journalisten, vielen hohen Polizeibeamten und dem Generaldirektor der Polizei. Obwohl solche Aufzeichnung laut Gesetz nach sechs Monaten vernichtet werden müssen, wurde das Recht ignoriert und Gespräche bis zurück ins Jahr 2009 wurden gespeichert. Das was uns beunruhigen sollte, ist nicht die Abhörung an sich, sondern die Tatsache, dass ob dieser Telefonabhörung keine Anklage erhoben wurde, was darauf hindeutete, dass sie aus politischen Gründen durchgeführt wurde.</p>
<p>C. In Gujarat enthüllt eine aktuelle Ermittlung des Generaldirektors der Polizei, Amitabh Pathak, dass innerhalb eines Zeitraums von weniger als sechs Monaten mehr als 90.000 Anfragen nach Anrufdetails eingingen, auch für die Telefone führender Beamter von Polizei und öffentlichem Dienst. Diese hohe Zahl lässt sich nicht allein durch die Ermittlung von Straftaten begründen. Und wieder scheint es keinerlei Anklagen gegen irgendeine der Personen gegeben zu haben, deren Daten herausgegeben wurden.</p>
<p>D. Es gibt mehr Überwachungsgeräte, als die Regierung verfolgen kann. Mehr als 73.000 Off-Air-Abhörgeräte wurden seit 2005 nach Indien importiert, und 2021 bat die Bundesregierung verschiedene Landesregierungen, Privatunternehmen, die Armee und Geheimdienstbehörden, diese der Regierung zu überlassen und wies sie darauf hin, dass die Benutzung solcher Geräte illegal sei. Wir wissen nicht, wie viele Geräte tatsächlich eingezogen wurden.</p>
<p>Diese Arten der Verletzung von Privatsphäre kann ernsthafte Konsequenzen nach sich ziehen. Laut dem früheren Geheimdienstchef R.B. Sreekumar aus Gujarat wurden die Anrufprotokolle einer Mobilfunknummer, die von dem früheren Innenminister Gujarats, Haren Pandya, verwendet wurde, zur Bestätigung dafür genutzt, dass er gegenüber dem Concerned Citizens’ Tribunal – dem auch ein früherer Richter des Obersten Gerichts angehörte – eine geheime Zeugenaussage gemacht hatte. Dieses Tribunal führte unabhängige Frmittlungen zu der sektiererischen Gewalt 2002 durch, die zum Tod von 2.000 Menschen im Bundesstaat geführt hatte. Haren Pandya wurde 2003 ermordet.</p></li>
</ol>
</section>
<section id="politisches-händeringen" class="level3">
<h3 class="anchored" data-anchor-id="politisches-händeringen">Politisches Händeringen</h3>
<p>Wir wissen, dass viele Politiker illegalerweise zum Ziel von Überwachung wurden. Nach dem Indischen Notstand beschrieb die Shah-Kommission, dass der Geheimdienst seine Abhörbefugnisse ungezügelt missbrauchte. Das L. P. Singh Komitee – berufen von der Regierung Janatas – veröffentlichte einen Bericht, der Reformen vorschlug, diese aber wurden niemals umgesetzt. Zahlreiche Politiker von Jagjivan Ram zu HD Deve Gowda und Prakash Karat wurden Gegenstand widerrechtlicher Überwachung. Ramakrishna Hegde trat in den achtziger Jahren des 20. Jahrhunderts sogar zurück, unter Anschuldigung weitreichender illegaler Telefonüberwachung politischer Rivalen, Geschäftsleute und Journalisten.</p>
<p>Dahingegen gab es 2010 großen Aufruhr über die illegale Telefonüberwachung von Bihars Ministerpräsidenten Nitish Kumar, CPM Generalsekretär Prakash Karat und NCP Vorsitzenden Sharad Pawar, der aber zu keinerlei Rücktritten und schließlich auch zu keiner Überholung der Rechenschaftspflichten der Geheimdiensten geführt hat. Der erste Politiker, der eine solche Überholung ansprach, war Vizepräsident Hamid Ansari. Infolgedessen verlangte auch Kongress-Sprecher Manish Tewari öffentlich Reformen und schlug 2001 einen Gesetzesentwurf vor, der eine Rechenschaftspflicht einführen sollte.</p>
<p>Mit diesem Entwurf passierte dasselbe, wie mit allen anderen Gesetzesentwürfen: Nichts. 2012 richtete die Planungskommission eine Expertengruppe unter Justice A. P. Shah ein (Enthüllung: das Centre for Internet and Society war Teil der Gruppe), um existierende Regierungsprojekte zu untersuchen und Grundsätze zu erarbeiten, wie man ein Datenschutzgesetz unter Berücksichtigung internationaler Erfahrungen einführen könnte. Dennoch hat die Regierung den Privacy Act immer noch nicht verabschiedet, der schon so lange in der Schwebe hängt. Als Konsequenz der ständigen Rufe von Datenschutzaktivisten und Anwälten nach einer größeren Rechenschaftspflicht und nach parlamentarischer Aufsicht über die Arbeitsweise und die Ausgaben von Geheimdienstbehörden im Februar 2013 hat das Centre for Public Interest Litigation Klage beim Obersten Gerichtshof eingereicht. Diese würde, so hofft man, zu Reformen führen.</p>
</section>
<section id="was-bürger-tun-sollten" class="level3">
<h3 class="anchored" data-anchor-id="was-bürger-tun-sollten">Was Bürger tun sollten</h3>
<ol type="1">
<li><p><em>Verlangt, dass ein starker Privacy Act inkrafttritt</em></p>
<p>1991 hat der Leak eines Berichts des Central Bureau of Investigation mit dem Titel »Abhörung der Telefone von Politikern« zu einer Klageschrift der People’s Union of Civil Liberties (PUCL) geführt. Diese hat ausgelöst, dass der Oberste Gerichtshof das Recht auf Privatsphäre in der indischen Verfassung als Bürgerrecht unter Artikel 19(1)(a) (Recht auf freie Rede und MeinungsäuBerung) sowie als Menschenrecht unter Artikel 21 (Recht auf Leben und persönliche Freiheit) anerkannt hat, ferner unter den Artikeln 17 der ICCPR und 12 der UDHR.</p>
<p>Trotzdem hat die Regierung durch die Änderungen des Information Technology Act im Jahr 2008, den im Jahr 2011 erlassenen IT Rules und den Telekommunikationslizenzen das Recht auf Privatsphäre, so wie es 1996 im Fall der People’s Union for Civil Liberties vom Obersten Gerichtshof interpretiert wurde, massiv geschwächt.</p>
<p>Wir müssen verlangen, dass dieser Schaden durch starke Datenschutzgesetze rückgängig gemacht wird, die unsere Privatsphäre sowohl gegenüber dem Staat als auch gegenüber Unternehmen schützen. Das Gesetz sollte nicht nur rechtliche Schritte vorsehen, sondern auch sicherstellen, dass Technologien, die diese in Frage stellen, nicht von der Regierung eingesetzt werden dürfen.</p>
<p>Das Gesetz sollte uns auch eine starke Rechtsgrundlage geben, auf der die Massenüberwachung von Indern (über 12.1 Milliarde Datensätze in einem Monat) klar als ungesetzlich benannt werden kann. Das Gesetz sollte sicherstellen, dass das Parlament und die indischen Bürger in regelmäßigen Abständen über die Ausmaße der Überwachung in Indien informiert werden – nicht nur auf zentraler Ebene – und darüber, wie viele Verurteilungen aus dieser Überwachung hervorgingen. Personen, deren Kommunikationsdaten- oder inhalte überwacht oder abgefangen wurden, sollten darüber nach Ablauf einer angemessenen Zeit informiert werden. Und zuletzt sollen Daten nur zur Strafverfolgung von Personen gesammelt werden. Wenn kein Strafantrag gestellt wird, sollte die Person über das Eindringen in ihre Privatsphäre in Kenntnis gesetzt werden.</p>
<p>Das Gesetz sollte sicherstellen, dass jegliche Überwachung den folgenden Grundsätzen entspricht: Legitimität (Hat die Überwachung eine legitime, demokratische Grundlage?), Notwendigkeit (Ist die Überwachung notwendig, um irgendeinen bestimmten Zweck zu erfüllen? Gibt es weniger invasive Maßnahmen?), Proportionalität und Schadensminimierung (Ist es das minimal mögliche Eingreifen in die Privatsphäre?), Spezifizität (Ist die Überwachungsanordnung begrenzt auf spezifische Daten, Orte oder Personen?), Transparenz (Wird das Eindringen in die Privatsphäre aufgezeichnet und am Ende der betroffenen Person mitgeteilt?), Zweckgebundenheit (Werden die Daten nur für den erklärten Zweck gesammelt?) und unabhängige Aufsicht (Wird über die Überwachung bei einem Gesetzgebungsausschuss oder einem Datenschutzbeauftragten Bericht erstattet? Werden über die durchgeführte Überwachung und die Strafverfolgungsfälle Statistiken erhoben?).</p>
<p>Diese Bestimmungen sollten von einem Verfassungsgericht getroffen werden, also einem Oberlandesgericht oder dem Obersten Gerichtshof. Bürger sollten bei Verstößen gegen die Überwachungsgesetze außerdem das Recht auf Zivilklagen und strafrechtliche Maßnahmen haben. All diese Grundsätze und Praktiken sollten sowohl für Metadaten als auch für Inhalte von Kommunikation gelten, auf Landes- sowie Bundesebene.</p>
<p>Wären das die aktuellen Verfahrensweisen, hätte ein Richter des Obersten Gerichtshofs der Regierung von Gujarat den Zugriff auf diejenigen Metadaten entziehen müssen, die aufgedeckt haben, dass Haren Pandya vor dem Citizen Tribunal ausgesagt hat.</p>
<p>Das Centre for Internet and Society hat einen Gesetzesentwurf ausgearbeitet, der unserer Meinung nach im Sinne der Bürger ist und wir sammeln im Moment Feedback (wir haben bereits alle möglichen Menschen um Rat gefragt von einem früheren Generalanwalt bis zum Ex-Chef einer Geheimdienstbehörde). Wir hoffen, dass unser Vorschlag zum Vergleich herangezogen werden kann, sobald die Regierung ihren Gesetzesentwurf preisgibt.</p></li>
<li><p><em>Wir müssen uns durch Technologie stärken</em></p>
<p>Anstatt sich auf eine Rechtsreform zu verlassen und Hoffnung in die Regierung zu legen, sollten indische Bürger anfangen, sich mehr um ihre eigene Privatsphäre zu kümmern und ihre Kommunikation zu schützen. Die Lösung ist, Mobiltelefone so selten wie möglich zu benutzen (diese sind Überwachungsgeräte, mit denen man außerdem telefonieren kann, wie es der Gründer der Free Software Foundation Richard Stallman und Andere ausgedrückt haben) und von Anonymisierungstechniken und Ende-zu-Ende-Verschlüsselung Gebrauch zu machen, wenn man über das Internet kommuniziert. Freie und quelloffene Software wie GnuPG (eine Implementierung von OpenPGP) können Emails sicher machen.</p>
<p>Auf ähnliche Weise kann man Technologien wie Off-the-Record Messaging (OTR) benutzen, das in Anwendungen wie ChatSecure und Pidgin verwendet wird, um Chatgespräche zu schützen. Außerdem TextSecure für SMS, HTTPS Everywhere und Virtual Private Networks, um ISPs vom Schnüffeln abzuhalten sowie Tor und 12P, um den Internetverkehr zu anonymisieren. Es gibt überall in Indien CryptoParties, um Menschen beizubringen, wie sie diese und andere freie und quelloffene Software benutzen können, um die Vertraulichkeit ihrer Kommunikation sicherzustellen (speziell jenen, die von Verschlüsselung abhängig sind wie Journalisten, Anwälte, Ärzte etc.).</p>
<p>Auch, wenn jeder seine lokalen Daten verschlüsseln sollte, ist das bei Daten, die ausgetauscht werden, schwieriger. Der Fluch bei Ende-zu-Ende-Verschlüsselung ist, dass beide Enden Verschlüsselung verwenden müssen: Ein Journalist kann kein Off-the-Record Messaging benutzen, wenn seine Quelle es nicht auch benutzt. Solange die Technologie nicht zum Mainstream werden, bleiben sie von denen ungenutzt, die sie wirklich brauchen.</p></li>
</ol>
</section>
<section id="schlussfolgerung" class="level3">
<h3 class="anchored" data-anchor-id="schlussfolgerung">Schlussfolgerung</h3>
<p>Die Reaktionen der indischen Regierung auf die Enthüllungen von Snowden sowie die Enthüllungen, dass die Festplatten indischer Botschaften betroffen waren, nahmen die US-Regierung auf erschreckende Weise in Schutz”<sup>5</sup><sup>6</sup><sup>7</sup> – ganz im Gegensatz zu dem Standpunkt, den Brasilien klar gemacht hat.</p>
<p>Zwei indische Firmen, die für große Teile der weltweiten Unterseekabel verantwortlich sind, Reliance Communications und die vormals staatseigene Videsh Sanchar Nigam Limited (heute Tata Communications) haben sogar tatsächlich eine Reihe von ‘National Security Agreements’ unterzeichnet, die sie verpflichten, der US-Regierung bei der Überwachung behilflich zu sein’<sup>8</sup>.</p>
<p>Während wir die Art und Weise beklagen, wie die US-Regierung den Rest der Welt als Untermenschen behandelt, die kein Recht auf Privatsphäre haben, wie es in der Allgemeinen Erklärung der Menschenrechte garantiert wird, müssen wir doch auch sehen, dass die indische Regierung mit Hilfe indischer Unternehmen und unserer Geheimdienste regelmäßig die Privatsphäre indischer Bürger ohne rechtliche Grundlage verletzt. Diese Rechtsverweigerung verschlimmert sich noch durch Projekte wie das CMS, NATGRID etc. Es ist an der Zeit, dass wir uns selbst aufhalten, in schlafwandlerischer Manier auf einen Überwachungsstaat zuzusteuern.</p>
<p><em>Dieser Text wurde von der Redaktion ins Deutsche übersetzt.</em></p>


</section>
</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>http://pib.nic.in/newsite/erelease.aspx?relid-54679↩︎</p></li>
<li id="fn2"><p>http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights↩︎</p></li>
<li id="fn3"><p>http://www.outlookindia.com/article.aspx?265192↩︎</p></li>
<li id="fn4"><p>http://www.deccanherald.com/content/94085/big-brother-smaller-siblings-watching.html↩︎</p></li>
<li id="fn5"><p>http://www.thehindu.com/opinion/op-ed/indias-cowardly-display-of-servility/article4874219.ece↩︎</p></li>
<li id="fn6"><p>http://www.thehindu.com/opinion/op-ed/delivering-us-from-surveillance/article5197660.ece↩︎</p></li>
<li id="fn7"><p>http://forbesindia.com/blog/technology/dear-milind-deora-prakash-javadekar-deserved-the-truth/↩︎</p></li>
<li id="fn8"><p>http://www.£rontline.in/the-nation/indian-help/article4982631.ece↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{prakashIndienSelbst2013,
  author = {Prakash, Pranesh},
  editor = {Beckedahl, Markus and Meister, Andre},
  publisher = {newthinking communications},
  title = {Indien: Selbst die Regierung vertraut der Regierung nicht},
  booktitle = {Überwachtes Netz: Edward Snowden und der größte
    Überwachungsskandal der Geschichte},
  edition = {1st edition},
  date = {2013-12-16},
  address = {Berlin},
  url = {https://pranesh.in/scholarly/books/prakash_2014_Indien-Selbst-die-Regierung-vertraut-der-Regierung-nicht.html},
  langid = {de},
  abstract = {Mit unserem Sammelband zum NSA-Überwachungsskandal wollen
    wir die Debatte weiterführen, die Entwicklungen und Leaks aus
    verschiedenen Perspektiven und Blickwinkeln national und
    international reflektieren, was da genau passiert und vor allem: Was
    daraus zu lernen ist und wie wir unser Netz und unsere Privatsphäre
    von den Geheimdiensten und der allumfassenden Überwachung unserer
    digitalen Kommunikation zurückerobern können.Mit Beiträgen von Erik
    Albers, Markus Beckedahl, Yochai Benkler, Benjamin Bergemann, Kai
    Biermann, Caspar Bowden, Ian Brown, Andreas Busch, Johannes Caspar,
    Gabriella Coleman, Kirsten Fiedler, Georg C. F. Greve, Richard
    Gutjahr, Dirk Heckmann, Arne Hintz, Christian Humborg, Rikke Frank
    Jørgenson, Jan-Peter Kleinhans, Torsten Kleinz, Constanze Kurz,
    Daniel Leisegang, Lorenz Matzat, Andre Meister, Erich Moechel, Glyn
    Moody, Annette Mühlberg, Pranesh Prakash, Frank Rieger, Katitza
    Rodriguez, Anne Roth, Alexander Sander, Peter Schaar, Bruce
    Schneier, Edward Snowden, Thomas Stadler, Felix Stalder, Richard
    Stallman, Moritz Tremmel, Ot van Daalen, Thilo Weichert, Rüdiger
    Weis, Krystian Woznicki, Jillian C. York und Jérémie Zimmermann.}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndienSelbst2013" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2013. <span>“Indien: Selbst die Regierung vertraut der
Regierung nicht.”</span> In <em>Überwachtes Netz: Edward Snowden und der
größte Überwachungsskandal der Geschichte</em>, 1st edition, edited by
Markus Beckedahl and Andre Meister. Newthinking communications. <a href="https://pranesh.in/scholarly/books/prakash_2014_Indien-Selbst-die-Regierung-vertraut-der-Regierung-nicht.html">https://pranesh.in/scholarly/books/prakash_2014_Indien-Selbst-die-Regierung-vertraut-der-Regierung-nicht.html</a>.
</div></div></section></div> ]]></description>
  <category>Privacy</category>
  <category>Security</category>
  <category>Surveillance</category>
  <guid>https://pranesh.in/scholarly/books/prakash_2014_Indien-Selbst-die-Regierung-vertraut-der-Regierung-nicht.html</guid>
  <pubDate>Mon, 16 Dec 2013 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Spam and internet abuse in India</title>
  <dc:creator>Suresh Ramasubramanian</dc:creator>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/articles/spam-and-internet-abuse-in-india_a-brief-history.html</link>
  <description><![CDATA[ 






<section id="the-internet-in-india" class="level2">
<h2 class="anchored" data-anchor-id="the-internet-in-india">The Internet in India</h2>
<p>India’s first exposure to the Internet was relatively late, compared to regional pioneers such as Korea (1981-82). At various stages from 1986 to 1992, the Government of India established three wide area networks, INDONET (to interconnect IBM mainframes running at different government, academic and industry installations around the country), ERNET, (Education and Research Network, to interconnect universities and research institutions) and NICNET (National Informatics Centre Network, to interconnect Government departments).</p>
<p>Meanwhile, companies with offshore development centers in India, with Texas Instruments being the first to set up a software design centre in Bangalore in 1985<sup>1</sup>, were allowed to establish VSAT connectivity back to their US headquarters. These were expensive and subject to strict Government regulations<sup>2</sup>, till the Software Technology Parks of India was established in 1991 to provide Internet connectivity to India’s growing computer software industry.</p>
<p>Internet rather than WAN connectivity was first established in 1987, with email over UUCP, and Internet connectivity using TCP over X25 through UUNET in Falls Church VA and CWI in Amsterdam<sup>3</sup>, first over dialup and in 1989, over a 9600 bps leased line to UUNET. India’s .in ccTLD, originally established on 8 May 1989<sup>4</sup>, was first hosted at UUNET and later operated locally in India by the National Centre for Software Technology (NCST)<sup>5</sup>. X400 based email was also available from 1994, provided by the National Informatics Centre, government owned telecom provider Videsh Sanchar Nigam Limited and Sprint RPG, There was further a thriving local BBS community across several Indian cities.</p>
<p>All these networks, particularly the UUCP based mail systems, continued to be in operation for several years after 1995, when the Government monopoly telecom provider Videsh Sanchar Nigam Limited (VSNL) first provided dialup connectivity with two classes of service, shell accounts that could be accessed over a terminal emulator like HyperTerminal as well as SLIP/PPP connectivity. The shell accounts came with a server hosted mailbox that could be read using the PINE console email program, while PPP accounts were given a limited quota (20 MB) POP3/SMTP email account.</p>
<p>The Indian market was opened up to private ISPs in 1998 and broadband (then 64 Kbps) first appeared on the Indian market in 2003, with the Government of India formulating its first Broadband policy in 2004.</p>
<p>Homegrown websites such as portals (1995), newspapers (1996), free email (1996), newspapers (1997), online banking (1997) and online ticketing (2001) quickly followed, to compete with their international counterparts such as Hotmail and Yahoo, which were increasingly adopted by a growing population of Internet users.</p>
</section>
<section id="history-of-spam-in-india" class="level2">
<h2 class="anchored" data-anchor-id="history-of-spam-in-india">History of spam in India</h2>
<p>Spam was not a major problem in India till the introduction of TCP/IP based connectivity. The usual problem in those days was that slow UUCP links to Indian universities would often be saturated by just a few students exchanging email and usenet posts with their friends in the United States.</p>
<p>The first usenet and email spam campaigns worldwide date back to 1994-95<sup>6</sup>, more or less coinciding with the introduction of TCP/IP internet connectivity in India, and the consequent widespread availability of email addresses from local as well as foreign email providers.</p>
<p>This was a particularly bad situation for Indian Internet users, who were faced with the problem of downloading large amounts of spam on slow, noisy and expensive dialup lines.</p>
<p>Indian ISPs initially operated usenet servers to provide NNTP access, but quickly withdrew such services and, in some cases, firewalled access to the NNTP port 119 to block usenet access from their service, because of massive amounts of abuse originated by a unknown but probably New Delhi based Internet vandal and author of Usenet and email spam software, who was only known by the moniker “HipCrime ”<sup>7</sup>.</p>
<p>HipCrime’s activities<sup>8</sup>, such as forged cancel floods and “sporgeries”<sup>9</sup> (spam forgeries) with steganographic / Markov Chain generated random gibberish content caused widespread havoc on usenet newsgroups in the mid to late 1990s. This led to several Usenet operators refusing to peer (that is, exchange traffic) with NNTP servers operated by Indian providers, or in some cases, even refusing to accept usenet posts originating from IP addresses controlled by Indian ISPs VSNL and SILNET – a so-called “UDP” or “Usenet Death Penalty”<sup>10</sup>.</p>
<p>Indian email marketers quickly saw the economies of scale they could achieve with email spam, Commercial spam originating from India was then, and still is, primarily used to advertise legitimate goods and services, advertising everything from used computers to real estate and holiday timeshares.</p>
<p>Spamming Indian users was quite simple in the early days of dialup connectivity in India, as the monopoly ISP VSNL had set up an “allusers” alias<sup>11</sup> that mapped to all users on their service. This “allusers” alias existed, presumably from the beginning of VSNL’s service, till 1998, when it was disabled following a hoax email sent out to all VSNL users by an unknown student, offering VSNL TCP/IP accounts at INR 2000 (about USD 34 at current exchange rates) for 500 hours, compared to the actual cost of a 500 hour account at that time – INR 10,000 (USD 165) – which, at the time, was a whole month’s salary for a fresh graduate entering an engineering or computer related job.</p>
<p>By the time the allusers account was disabled, it, and other vulnerabilities in VSNL’s email system, had allowed various spammers to download a copy of their complete user database. A wide variety of indigenously produced bulk mailers<sup>12</sup> and email harvesters<sup>13</sup> were released within a few years of the VSNL POP3/SMTP based email service. Several of these included filter avoidance techniques such as “direct to MX mail relay”, which would avoid detection by using a mailserver installed on the spammer’s desktop rather than routing mail through the ISP’s smtp servers, as well as header forgery and the use of open mail relays and HTTP and SOCKS proxies to anonymize the spammer’s identity.</p>
<p>Ironically, such software was generally used to advertise legitimate goods and services, with the spam including the advertiser’s full contact information including phone numbers as well as postal, website and email addresses.</p>
<p>These bulk mailers’ features, as well as their intended use of spamming violated the acceptable use policies of the mostly US based providers the bulk mail vendors’ and their customers’ websites were hosted on, which lead to several bulk mailer vendor and customer websites getting suspended<sup>14</sup> by their providers. Additionally, marketers hiring a spammer to promote their product faced vitriolic hostility from internet users, who would often call or email them back with abusive comments, when they were not using free tools such as Spamcop<sup>15</sup> to report the spam to the spam vendor and spammers’ ISPs.</p>
<p>This mirrored a growing trend among US-based Internet users, so that US spammers increasingly began to include a so- called “Murkowski Disclaimer”<sup>16</sup> or “Murk” for short, at the bottom of their spam emails, citing a bill that was introduced in the 105th US congress by Senator Frank Murkowski to claim that their emails should not be considered spam.</p>
<blockquote class="blockquote">
<p>In accordance with Bill S.1618 Title III passed by the 105th U. S. Congress, this letter can not be considered spam as long as we include: (1) Contact information and (2) a way to be removed from future mailings.</p>
</blockquote>
<p>Indian bulk mailers introduced a variant of this disclaimer that they began to include in their spam templates, and text like this was found in Indian origin spam till the mid- to late-2000s:</p>
<p>Since India has no anti-spamming law,<sup>17</sup> we follow the US directive passed in Bill.1618 Title III by the 105th US Congress, which states that mail cannot be considered spam if it contains contact information.</p>
<p>Not too surprisingly, the presence of such a disclaimer became a popular rule deployed in various spam filters, which would classify any email containing such a disclaimer, or even the URL of Senator Murkowski’s website, as spam. For example, early versions of the popular open source filter, SpamAssassin, had a rule called “MURKOWSKI_CRUFT”<sup>18</sup>.</p>
<p>Indian unsolicited email marketing has evolved since then, with several local<sup>19</sup> vendors<sup>20</sup> allegedly providing “snowshoe” spam services that use a succession of randomized domains and continuously switch from one cheap colocation service to another, as and when their existing IP addresses and domains get listed in widely used DNS block lists such as Spamhaus<sup>21</sup> and SURBL<sup>22</sup>, or suspended by their providers.</p>
<p>Even legitimate Indian email marketers face spam related issues due to a widespread lack of awareness of industry best practices<sup>23</sup>, as well as a reluctance to audit paying customers’ mailing lists, let alone suspend service to a paying customer for spamming. The same issues – lack of awareness of best practices<sup>24</sup> and a reluctance to penalize paying customers, have plagued local ISPs, for whom the effect of a DNS blocklist or ISP listing their IP space may actually last long after the spammer that caused the issue has been removed. Large, legitimate Indian ISPs and online marketers are members of nationwide industry associations such as ISPAI<sup>25</sup> and IAMAI<sup>26</sup>, which are working on promoting best practices among their members. Some Indian ISPs and marketers are also joining the broader community of email marketers in international industry associations such as M3AAWG<sup>27</sup>, and/or participating in M3AAWG’s India outreach<sup>28</sup> initiatives.</p>
<p>Additionally, several best practice documents published by industry associations such as M3AAWG<sup>29</sup>, as well as international organizations such as the OECD<sup>30</sup>, London Action Plan<sup>31</sup> (in association with CAUCE and M3AAWG), APECTEL (in association with the OECD)<sup>32</sup> and ITU<sup>33</sup>, are widely available online.</p>
<p>The challenge remains – as it does around the world, for multistakeholder cooperation between governments, Internet service providers, email marketers and the business community to work together and put in place on the ground implementations of these best practices, suitably customized to suit varying local conditions.</p>
</section>
<section id="malware-hacker-wars-and-cybercrime" class="level2">
<h2 class="anchored" data-anchor-id="malware-hacker-wars-and-cybercrime">Malware, hacker wars and cybercrime</h2>
<p>An increasing number of viruses originating in South Asia began to emerge, beginning with the first known PC virus, the fully stealthed “Brain”<sup>34</sup> written by two Pakistani brothers Basit and Amjad Alvi<sup>35</sup> in January 1986. In May 1990, the first Indian virus “Happy Birthday Joshi”<sup>36</sup> was discovered. Both these viruses were mostly harmless with data loss, if any, being entirely accidental. Brain did no intentional damage beyond making an infected PC run slowly, and Joshi was a harmless “joke” that did not do much more than make infected PC users wish its creator, Manav Joshi, a happy birthday. The Joshi virus actually prevented PCs that it infected from being infected with the much more damaging “Stoned”<sup>37</sup> virus, which was also prevalent on floppy discs circulating in India at the time.</p>
<p>The first well publicized instance in India of the potential damage caused by cybercrime was in 1998, when members of an anti-nuclear collective of hackers called milw0rm<sup>38</sup> compromised servers belonging to the Bhabha Atomic Research Centre (BARC), and downloaded classified documents about India’s nuclear weapons program, some pages of which they published along with a detailed description of the method they used to break into BARC’s servers. The milw0rm crew was apparently later approached by a terrorist calling himself Khalid Ibrahim<sup>39</sup>.</p>
<p>With an active hacker community in India and Pakistan, and with a decades old enmity between the two countries dating back to from when they were partitioned from colonial India when it became independent in 1947, it was not long before, in 2002, the first hostile virus targeted at Pakistan was released by a group of Indian hackers and spread worldwide - a worm called “Yaha”<sup>40</sup>, which was sent out as spam that pretended to offer you a free screensaver, and would rebroadcast itself from infected machines.</p>
<p>Pakistani government websites and the Karachi stock exchange were severely affected by DoS attacks triggered by this worm, and Yaha variants were, in 2002, consistently on the worldwide top 10 virus charts by volume. A Belgian hacker, in fact, released a counter-worm called “Yahasux”<sup>41</sup>, which spread by much the same method and would remove the Yaha worm on any PC that it infected.</p>
<p>Malware with political or geostrategic goals is extremely common in the region, with hackers from different countries being accused, and trading mutual accusations of installing malware on computers owned by government agencies<sup>42</sup>, industries<sup>43</sup><sup>44</sup> and religious or politically sensitive groups<sup>45</sup>.</p>
<p>There are also reports of the Indian government recruiting a “cyber army”<sup>46</sup> to breach systems in hostile countries, and promising immunity against prosecution to volunteer hackers hired to do so, and sponsoring a hacking contest<sup>47</sup> with cash awards for breaking into the command and control server of a hostile Advanced Persistent Threat that was targeted at Indian government agencies.</p>
<p>Under normal conditions, this would be immediately seen as unethical and would be widely condemned. However, the situation is much more complicated, given similar policies adopted by other countries, including the alleged use of malware to damage critical infrastructure in hostile countries, such as nuclear power plants<sup>48</sup> and water utility companies<sup>49</sup>. The difference between state and non-state actors is much thinner in online cyberattacks. Further, plausible deniability is much easier to achieve, and much more difficult to trace back and attribute to a government source, than when a regime uses non state actors (such as civilian armed militant groups and terrorist splinter cells) for a physical attack on a hostile country’s soil and citizens.</p>
<p>On the surface, there is not much difference between recruiting a civilian militant group armed with army surplus weaponry, and recruiting a group of independent hackers driven by patriotic or monetary considerations, whose only weapons are computers and the Internet. The latter is much easier to achieve, and much more difficult to defend against. Digging deeper, the differences are in the targeted nature of the attack, the executive control and chain of command over the attackers, and the avoidance of harm to civilians and innocent parties. The first two are easy enough to achieve, but on the Internet, the third – avoidance of collateral damage – is extremely difficult if not impossible.</p>
<p>A lot of malware is hosted on compromised servers that have other innocent users on them. Other malware is hosted on sites that have lots of legitimate users, but are also lax in enforcing their acceptable use policies against Internet abuse. Taking down such resources can have, and has had, significant amounts of collateral damage<sup>50</sup>. Attacks targeted at critical infrastructure such as electricity and water utility plants can cause radioactive incidents or floods if the malware goes out of control, or spread into the wild and affect utilities in countries the worm was never targeted at in the first place<sup>51</sup>. The situation becomes even more precarious when the country adopting such tactics has millions of malware infected machines and poorly secured government and critical infrastructure within its own borders, making it vulnerable to retaliatory or first strike cyberattacks.</p>
<p>The malware threat to India is exacerbated by the fact that a large number of PCs in India use old and unsupported operating system versions, and frequently use pirated software and operating systems. This threat, coupled with poor implementation of security architecture and policies at ISPs, and a rapid growth in India’s broadband penetration, has led to India being listed by the widely used Spamhaus CBL<sup>52</sup> blocklist as the world #1, ahead of China and Iran, in terms of the amount of malware infected devices as well as virus-generated spam. This is based on the absolute number of infected IPs, and countries in the CBL statistics page<sup>53</sup> that have a far lower number of blocked IP addresses may emit much more spam per infected IP. When measured on a pure volume basis, India moves down to #11 in the list<sup>54</sup> and #13 based on the number of infections per capita<sup>55</sup>.</p>
<p>This may be due to a wide variety of reasons - local ISPs not implementing port 25 filtering on their dynamic IP addresses and reassigning IP addresses frequently with short lease times, ISPs providing relatively slower connectivity (such as older 2G cellular networks in small town and rural India) The graphs on the next page are provided courtesy of the Spamhaus CBL.</p>
<div class="quarto-figure quarto-figure-center">
<figure class="figure">
<p><img src="https://pranesh.in/scholarly/articles/spam-and-internet-abuse-in-india_a-brief-history_figure-1.png" class="img-fluid figure-img"></p>
<figcaption>Virus generated spam from Indian IPs</figcaption>
</figure>
</div>
<div class="quarto-figure quarto-figure-center">
<figure class="figure">
<p><img src="https://pranesh.in/scholarly/articles/spam-and-internet-abuse-in-india_a-brief-history_figure-2.png" class="img-fluid figure-img"></p>
<figcaption>Virus infected Indian IPs in the CBL</figcaption>
</figure>
</div>
</section>
<section id="crime-and-punishment" class="level2">
<h2 class="anchored" data-anchor-id="crime-and-punishment">Crime and Punishment</h2>
<p>The Information Technology Act, a law based primarily on the UNCITRAL Model Law on Electronic Commerce was passed by the Indian legislature in 2000. While that statute had no provisions directly relating to spam, it did have provisions on hacking and on ’damage to computer, computer system, etc.’ that were remarkably broad.</p>
<p>Section 66 of the IT Act 2000, a criminal provision relating to ‘hacking’, provided that any person who ‘diminishes [any information residing on a computer resource’s] value or utility or affects it injuriously by any means, commits hack’. Further, Section 43 of the Act provided that a person who unauthorizedly ‘disrupts or causes disruption of any computer, computer system or computer network’ is liable under that provision, with no definition having been provided of what would constitute a ‘disruption’. These provisions, which could potentially be stretched to include spam, have never, at the time of writing, been tested against spam. In 2005, efforts were underway to overhaul the Information Technology Act, and to shift its focus from being mainly a law on e-commerce and digital signatures to including many aspects of online crime. An ‘Expert Committee’ was constituted, which in August 2005 proposed amendments to the Information Technology Act. The committee did not propose any amendments specifically on spam, despite there having been software industry representation on the committee. It did however propose that the extant Section 66, which provided for the criminal offence of ‘diminishing the value’ of any information residing on a computer resource be replaced by another similar to the extant Section 43. Based in part on the recommendations of the Expert Committee, in 2006 the government introduced a bill amending the Information Technology Act. The Parliamentary Standing Committee reviewing that bill noted that:</p>
<blockquote class="blockquote">
<p>While examining the Information Technology (Amendment) Bill, 2006, the Committee were apprised by the industry representatives/legal experts that ‘spam’ or the issue of receiving unwanted and unwarranted e-mails have not been addressed under the proposed amendments. In the above context, the Committee asked whether it would not be prudent to incorporate specific provisions in the proposed law to protect the e-mail account holders from unwarranted mails. In reply, the Department of Information Technology stated that Sub-Section (b) of Section 66A and Clause (i) of Section 43 of the IT Act addressed the issues pertaining to spam. As a close scrutiny of the above said two Sections revealed that the issue of spam had not been adequately covered, the Committee in evidence desired to know how could the menace of spam be appropriately tackled with. In response, the Secretary, DIT replied that unwarranted e-mails could be generated from anywhere in the world.</p>
</blockquote>
<p>The sections that the Department of Information Technology was referring to — Sections 66A (b) and 43(i) — had been newly introduced in the amending bill, and they read as follows:</p>
<blockquote class="blockquote">
<ol start="43" type="1">
<li>If any person without permission of the owner or any other person who is in-charge of a computer, computer system or computer network —</li>
</ol>
<blockquote class="blockquote">
<ol type="i">
<li>destroys, deletes or alters any information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means, he shall be liable to pay damages by way of compensation not exceeding one crore<sup>56</sup> rupees to the person so affected.</li>
</ol>
</blockquote>
</blockquote>
<p>and</p>
<blockquote class="blockquote">
<p>66A. Any person who sends, by means of a computer resource or a communication device, —</p>
<blockquote class="blockquote">
<ol start="2" type="a">
<li>any content which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill will, persistently makes use of such computer resource or a communication device, shall be punishable with imprisonment for a term which may extend to two years and with fine.</li>
</ol>
</blockquote>
</blockquote>
<p>Apparently in response to the Standing Committee’s comment that “the issue of spam had not been adequately covered”, the government, when introducing the Information Technology (Amendment) Bill, 2008 added a new subclause (c) to Section 66A, and increased the maximum punishment to three years:</p>
<blockquote class="blockquote">
<p>66A. Any person who sends, by means of a computer resource or a communication device, —</p>
<blockquote class="blockquote">
<ol start="3" type="a">
<li>any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages, shall be punishable with imprisonment for a term which may extend to three years and with fine.</li>
</ol>
</blockquote>
</blockquote>
<p>The terms “electronic mail” and “electronic mail message” were defined in such a manner as to include all electronic communications and not just those that happen over SMTP, which we normally refer to as e-mail.</p>
<p>The flaws of covering spam with the above provision are obvious. The generally agreed-upon characteristics of spam include that it be (i) unsolicited, and (ii) sent in bulk<sup>57</sup>. Less- agreed upon characteristics that are sometimes associated with spam include that it be (i) commercial, and (ii) anonymous<sup>58</sup>.</p>
<p>However, Section 66A(c) does not address any of those characteristics, and instead focuses on a message having been sent for the purpose of “causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages”. Very few spam e-mails are sent with any of those as a purpose. Most are sent with the purpose of direct marketing, to defraud people of money, and various other purposes that the law does not address.</p>
<p>The elements of Section 66A(c) are disjunctive, (that is, because they use ‘or’, any of them is sufficient to constitute an offence) and not conjunctive (using ‘and’ to ensure that all the elements in the section need to be satisfied). This leaves people who send individual, one to one email that is seen as annoying or inconvenient potentially liable to a heavy fine and a prison term of upto three years. Thus, this provision is undoubtedly unconstitutional.<sup>59</sup></p>
<p>In fact, the provision has never been used for prosecution of spam, while it has been prolifically used for what can be termed suppression of political and free speech. People recently arrested under this provision include a college professor who received and forwarded an email with a cartoon of a chief minister<sup>60</sup> and two young women who questioned, on their facebook pages, the shutdown of the city of Mumbai after the recent death of a regional politician<sup>61</sup>. Charges filed against the two young women<sup>62</sup> and the professors<sup>63</sup> were subsequently dropped. It is also proving to be popular among campaigners for women’s rights as a means of attacking sexist remarks online<sup>64</sup>.</p>
<p>All in all, the supposed anti-spam provision in the Indian law does not appear to cover spam, but is overbroad and subject to abuse that goes against the original intent of the provision.</p>
<p>Interestingly, in November 2012, a legislator from Odisha, Baijayant Panda, moved a private member’s bill to repeal the extant Section 66A,<sup>65</sup> and replace it with a provision much more narrowly targeted at spam:</p>
<blockquote class="blockquote">
<p>66A. Any person who sends, by means of a computer resource or a communication device,- a. any unsolicited commercial electronic message; or b. any commercial electronic message where the the identity of the person on whose behalf the communication has been sent has been disguised or concealed, or where a valid address to which the recipient of the communication may send a request that such communications cease has not been provided, shall be liable to a penalty not exceeding one crore rupees.</p>
</blockquote>
<p>The Telecom Regulatory Authority of India (TRAI) has sought to tackle SMS spam and unsolicited telemarketing through its regulatory powers, rather than using the Information Technology Act.</p>
<p>TRAI has used multiple means to deter SMS spam and unsolicited telemarketing, including mandatory registration for telemarketing and SMS marketing – which includes provisions requiring marketers to respect a nationwide “Do Not Call” list, the Telecom Commercial Communications Customer Preference Portal (NCCP)<sup>66</sup>. TRAI additionally approaches this from a pricing perspective, levying higher termination charges for ‘transactional SMSes’ to raise the costs of bulk SMS and make it uneconomical to send unsolicited SMS campaigns.</p>
<p>Recent TRAI regulations<sup>67</sup> provide strong disincentives to all players in the unsolicited telemarketing and bulk SMS ecosystem, from telecom operators who structure bulk SMS plans that are heavily abused by marketers, to telemarketers as well as the advertisers who hire them for spam campaigns.</p>
<p>TRAI will, going forward, levy a fine of five thousand rupees per complaint, for successive incidents of spam SMS originating from bulk SMS plans allotted to unregistered telemarkters. In addition, all telephone numbers allocated to both the telemarketer as well as the advertiser that hired the telemarketer are subject to disconnection, in an attempt to target the widespread use of throwaway prepaid phone numbers in telemarketing and SMS campaigns.</p>
<p>TRAI earlier attempted to enforce a blanket limit the number of SMSes that could be sent each day, which was halted by the courts stepping in to disallow such a restriction<sup>68</sup>.</p>
<p>While the telecom regulator has, over a period of years, been able to come upon a reasonably functional solution against SMS spam, there still continue to be no useful legislative or regulatory provisions against email spam, and substantial work is required on enforcement against other forms of cybercrime.</p>
<p>Cross border mechanisms for Indian regulators and law enforcement to deal with their foreign counterparts on cybercrime prosecutions are limited.</p>
<p>Though India is not currently a member of the Budapest Convention on Cybercrime<sup>69</sup>, India currently has Mutual Legal Assistance Treaties (MLATs) with thirty countries<sup>70</sup>. These are, in general, limited by a requirement for dual criminality (where the request must be on a matter that is a crime under the laws of both the requestor country and the country from which legal assistance is requested).</p>
<p>However, it is not unknown for information to be requested through an MLAT<sup>71</sup>, particularly from US based messaging and social networking providers, in cases where political or other speech that may fall under US First Amendment protections is sought to be prosecuted.</p>
<p>Such requests have been routinely made, and rejected in the past, and more importantly, are a drain on already scarce resources that might be better focused on cross border cybercrime and spam related prosecutions. Clarifying the current lacunae in the Indian IT act (supra) will go a long way towards remedying this situation.</p>
</section>
<section id="acknowledgment" class="level2">
<h2 class="anchored" data-anchor-id="acknowledgment">Acknowledgment</h2>
<p>Suresh Ramasubramanian thanks his fellow moderators of the India-GII mailing list, Arun Mehta, Vickram Crishna and Udhay Shankar for reviewing and fact checking the section on Internet history in India. He also thanks the staff of CIS India for their reviewing and commenting on the paper, and in particular, Pranesh Prakash of CIS India for consenting to act as a co-author.</p>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>“TI Celebrates 20 Years as a Technology Innovator in India”, Press Release. Available: <a href="http://www.ti.com/wwlinlnewsdetail/200820051newsdetail_sc05161.html" class="uri">http://www.ti.com/wwlinlnewsdetail/200820051newsdetail_sc05161.html</a>.↩︎</p></li>
<li id="fn2"><p>“Emergence of Software Policy”, Software Technology Parks of Bangalore. Available: <a href="http://www.soft.net/background/emrergence-software-policy.html" class="uri">http://www.soft.net/background/emrergence-software-policy.html</a>.↩︎</p></li>
<li id="fn3"><p>Available: <a href="http://netchakra.net/chronology/" class="uri">http://netchakra.net/chronology/</a>.↩︎</p></li>
<li id="fn4"><p>“History of the Internet. ccTLDs in chronological order of Top Level Domain creation at the Internic”, Nov 2002. Available: <a href="http://www.ccwhois.org/ccwhoislcctld/ccTLDs-by-date.html" class="uri">http://www.ccwhois.org/ccwhoislcctld/ccTLDs-by-date.html</a>.↩︎</p></li>
<li id="fn5"><p>Sanjay Pathak Profile Information Technology and Services Professional. Available: <a href="http://www.linkedin.com/pub/sanjay-pathak/16/820/877" class="uri">http://www.linkedin.com/pub/sanjay-pathak/16/820/877</a>.↩︎</p></li>
<li id="fn6"><p>“Keith Lynch’s timeline of spam related terms and concepts”, November 2002. Available: <a href="http://keithlynch.net/snamline.html" class="uri">http://keithlynch.net/snamline.html</a>.↩︎</p></li>
<li id="fn7"><p>Wikipedia Definition of ‘Hipcrime, October 2013. Available: <a href="http://en.wikipedia.org/wiki/hipcrime/usenet" class="uri">http://en.wikipedia.org/wiki/hipcrime/usenet</a>.↩︎</p></li>
<li id="fn8"><p>“Q: Cryptic writings in the Newgroups”, Apr 2002. Available: <a href="http://answers.google.com/answers/threadview?id/6396" class="uri">http://answers.google.com/answers/threadview?id/6396</a>.↩︎</p></li>
<li id="fn9"><p>“[LI] help: Notorious Usenet spammer - who has had India blocked from usenet in the past”, Oct 1999. Available: <a href="http://linux-india.ooenscroll.onr/linux-india-helo/199910/msg:01396.html" class="uri">http://linux-india.ooenscroll.onr/linux-india-helo/199910/msg:01396.html</a>.↩︎</p></li>
<li id="fn10"><p>“UDP History”. Available: <a href="http://www.rahul.net/falk/udphistory.html" class="uri">http://www.rahul.net/falk/udphistory.html</a>.↩︎</p></li>
<li id="fn11"><p>Ganapati Priya and Penn Zasha. Rediff on the Net, October 1998. Available: <a href="http://www.rediff.com/computer/1998/0ctI12vsnl.htm" class="uri">http://www.rediff.com/computer/1998/0ctI12vsnl.htm</a>.↩︎</p></li>
<li id="fn12"><p>“AnonimousEmailBomber removal”, August 2002. Available: <a href="http://www.spywaredb.com/remove-anonimousemailbomber/" class="uri">http://www.spywaredb.com/remove-anonimousemailbomber/</a>.↩︎</p></li>
<li id="fn13"><p>” NUKE: Indian spamware vendor samtecsoft.com “, October 2000. Available: <a href="https://groups.google.com/forum/#/topic/news.admin.net-abuse.emaillCcX6RY6bxa4" class="uri">https://groups.google.com/forum/#/topic/news.admin.net-abuse.emaillCcX6RY6bxa4</a>.↩︎</p></li>
<li id="fn14"><p>Reference #10—an archived post to news.admin.net-abuse.email, quoting an email from a US based ISP, informing me that they have suspended one such vendor of email harvesting software. Note the “Indian Murkowski” disclaimer at the bottom of the spam sample quoted in the post.↩︎</p></li>
<li id="fn15"><p>“Spam Cop”. Available:<a href="http://www.spamcop.net/" class="uri">http://www.spamcop.net/</a>.↩︎</p></li>
<li id="fn16"><p>“Spam and the Law”, October 2002. Available: <a href="http://www.jamesshuggins.com/h/tekl/spamandlaw.htm" class="uri">http://www.jamesshuggins.com/h/tekl/spamandlaw.htm</a>.↩︎</p></li>
<li id="fn17"><p>Importantly, India still does not have an explicit law specifically targeting spam, and there exists no graded system of penalties for e-mail spam – unlike the situation in telemarketing and SMS spam, where a do not call list and a tough enforcement regime exist, but are not widely known by the general public. A detailed discussion of telemarketing and SMS spam in India is presented in section IV of this paper.↩︎</p></li>
<li id="fn18"><p>“SpamAssassin rules file”. Available: <a href="https:llsvn.apache.org/repos/asf/spamassassin/tags/spamassassinrelease150/spamassassin.ct" class="uri">https:llsvn.apache.org/repos/asf/spamassassin/tags/spamassassinrelease150/spamassassin.ct</a>.↩︎</p></li>
<li id="fn19"><p>SpamHaus Main Info. Available: <a href="http://www.spamhaus.org/rokso/evidence/ROK10022/century-infotech/main-info" class="uri">http://www.spamhaus.org/rokso/evidence/ROK10022/century-infotech/main-info</a>.↩︎</p></li>
<li id="fn20"><p>SpamHaus SARV. Available: <a href="http://www.spamhaus.org/rokso/spammer/SPMI282/sarv" class="uri">http://www.spamhaus.org/rokso/spammer/SPMI282/sarv</a>.↩︎</p></li>
<li id="fn21"><p>SpamHaus. Available: <a href="http://www.spamhaus.org/" class="uri">http://www.spamhaus.org/</a>.↩︎</p></li>
<li id="fn22"><p>“Introducing SURBL URI reputation data”. Available: <a href="http://www.surbl.org/" class="uri">http://www.surbl.org/</a>.↩︎</p></li>
<li id="fn23"><p>“MAAWG Sender Best Communications Practices”, September 2011. Available: <a href="http://www.maawg.org/sites/maawg/files/news/maawgsendersbcpver2a-updated.ddt" class="uri">http://www.maawg.org/sites/maawg/files/news/maawgsendersbcpver2a-updated.ddt</a>.↩︎</p></li>
<li id="fn24"><p>SpamHause ISP Area. Available: <a href="http://www.spamhaus.org/isp/" class="uri">http://www.spamhaus.org/isp/</a>.↩︎</p></li>
<li id="fn25"><p>“Promote Internet/Broadband for All”, ISPAI. Available: <a href="http://www.ispai.in/" class="uri">http://www.ispai.in/</a>.↩︎</p></li>
<li id="fn26"><p>“Internet &amp; Mobile Association of India”. Available: <a href="http://www.iamai.in/" class="uri">http://www.iamai.in/</a>.↩︎</p></li>
<li id="fn27"><p>“MAAWG (Messaging Malware Mobile)”. Available: <a href="http://www.maawg.org/" class="uri">http://www.maawg.org/</a>.↩︎</p></li>
<li id="fn28"><p>“India Anti-Abuse Working Group”. Available: <a href="http://www.maawg.org/india" class="uri">http://www.maawg.org/india</a>.↩︎</p></li>
<li id="fn29"><p>“MAAWG Published Documents”. Available: <a href="http://www.maawg.org/published-documents" class="uri">http://www.maawg.org/published-documents</a>.↩︎</p></li>
<li id="fn30"><p>“OECD Anti-Spam Toolkit of Recommended Policies and Measures”, September 2006. Available: <a href="http://www.oecd-ilibrary.org/science-and-technology/oecd-anti-spam-toolkit-of-recommended-policies-and-measures_9789264027176-en" class="uri">http://www.oecd-ilibrary.org/science-and-technology/oecd-anti-spam-toolkit-of-recommended-policies-and-measures_9789264027176-en</a>.↩︎</p></li>
<li id="fn31"><p>London Action Plan. Available: <a href="http://londonactionplan.org/node/35" class="uri">http://londonactionplan.org/node/35</a>.↩︎</p></li>
<li id="fn32"><p>“Malicious Software (Malware): A Security Threat to the Internet Economy”, OECD, June 2008. Available: <a href="http://www.oecd.org/internet/ieconomy/40724457.pdf" class="uri">http://www.oecd.org/internet/ieconomy/40724457.pdf</a>.↩︎</p></li>
<li id="fn33"><p>“ITU Botnet Mitigation Toolkit”. Available: <a href="http://www.itu.int/ITU-D/cyb/cybersecurity/proiects/botnet.html" class="uri">http://www.itu.int/ITU-D/cyb/cybersecurity/proiects/botnet.html</a>.↩︎</p></li>
<li id="fn34"><p>“Brain”, Wikia. Available: <a href="http://malware.wikia.com/wiki/Brain" class="uri">http://malware.wikia.com/wiki/Brain</a>.↩︎</p></li>
<li id="fn35"><p>“Brain: Searching for the First PC Virus in Pakistan”, The Alvi brothers interviewed by Mikko Hyponen Chief Research Officer of F-Secure, 2011. Available: <a href="http://camoaiQ:lls.f-secure.com/brain/" class="uri">http://camoaiQ:lls.f-secure.com/brain/</a>.↩︎</p></li>
<li id="fn36"><p>“Joshi”, Wikia. Available: <a href="http://malware.wikia.com/wiki/Joshi" class="uri">http://malware.wikia.com/wiki/Joshi</a>.↩︎</p></li>
<li id="fn37"><p>“Stoned”, Wikia. Available: <a href="http://malware.wikia.com/wiki/Stoned" class="uri">http://malware.wikia.com/wiki/Stoned</a>.↩︎</p></li>
<li id="fn38"><p>“Wikipedia Definition of ‘Milworm.’”. Available: <a href="http://en.wikipedia.org/wiki/Milw0rm" class="uri">http://en.wikipedia.org/wiki/Milw0rm</a>.↩︎</p></li>
<li id="fn39"><p>McKay Niall, “Do Terrorists Troll the Net?”, November 1998. Available: <a href="http://www.wired.com/politics/law/news/1998/11115812" class="uri">http://www.wired.com/politics/law/news/1998/11115812</a>.↩︎</p></li>
<li id="fn40"><p>Wikidot Definition of Yaha. Available: <a href="http://virus.wikidot.com/yaha" class="uri">http://virus.wikidot.com/yaha</a>.↩︎</p></li>
<li id="fn41"><p>Wikidot Definition of Yahasux. Available: <a href="http://virus.wikidot.com/yahasux" class="uri">http://virus.wikidot.com/yahasux</a>.↩︎</p></li>
<li id="fn42"><p>Malcolm Moore, “China’s global cyber-espionage network GhostNet penetrates 103 countries”, The Telegraph. Available: <a href="http://www.telegraph.co.uk/news/worldnews/asia/china/5071124/Chinas-global-cyber-espionage-network-GhostNet-penetrates-103-countries.html" class="uri">http://www.telegraph.co.uk/news/worldnews/asia/china/5071124/Chinas-global-cyber-espionage-network-GhostNet-penetrates-103-countries.html</a>.↩︎</p></li>
<li id="fn43"><p>Shunal Doke, “BSNL Connecting India”, August 2013. Available: <a href="http://tech.firstpost.com/news-analysis/pakistans-isi-may-have-installed-malware-in-bsnls-database-103695.html" class="uri">http://tech.firstpost.com/news-analysis/pakistans-isi-may-have-installed-malware-in-bsnls-database-103695.html</a>.↩︎</p></li>
<li id="fn44"><p>Norman. Available: <a href="http://blogs.norman.com/2013/security-research/the-hangover-report" class="uri">http://blogs.norman.com/2013/security-research/the-hangover-report</a>.↩︎</p></li>
<li id="fn45"><p>Graham Cluley, “Dockster Mac malware found on Dalai Lama-related website”, Naked Security, December 2012. Available: <a href="http://nakedsecurity.sophos.com/2012112/031dockster-mac-malware-dalai-lama/" class="uri">http://nakedsecurity.sophos.com/2012112/031dockster-mac-malware-dalai-lama/</a>.↩︎</p></li>
<li id="fn46"><p>Harsimran Singh and Joji Thomas Philip, “India Readies Cyber Army to Spy on Hostile Nations”, Times of India, August 2010. Available: <a href="http://timesofindia.indiatimes.com/india/India-readies-cyber-army-to-spy-on-hostile-nations/articleshow/6260783.cms?referral/PM" class="uri">http://timesofindia.indiatimes.com/india/India-readies-cyber-army-to-spy-on-hostile-nations/articleshow/6260783.cms?referral/PM</a>.↩︎</p></li>
<li id="fn47"><p>David Dittrich, “A New Infosec Era? Or a New Infosec Error?”, The Honeynet Project, November 2013. Available: <a href="http://honeynet.org/nodel1031" class="uri">http://honeynet.org/nodel1031</a>.↩︎</p></li>
<li id="fn48"><p>Sanger and E David, “Obama Order Sped Up Wave of Cyberattacks Against Iran”, The New York Times, June 2012. Available: <a href="http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted-allr-0" class="uri">http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted-allr-0</a>.↩︎</p></li>
<li id="fn49"><p>Tim Simonite, “Chinese Hacking Team Caught Taking Over Decoy Water Plant”, Technology Review, August 2013. Available: <a href="http://www.technologyreview.com/news/517786/chinese-hacking-team-caught-taking-over-decoy-water-plant/" class="uri">http://www.technologyreview.com/news/517786/chinese-hacking-team-caught-taking-over-decoy-water-plant/</a>.↩︎</p></li>
<li id="fn50"><p>Michael Sandee, “Critical Analysis of Microsoft Operation B71”, Fox IT, April 2012. Available: <a href="http://blog.fox-it.com/2012/04/12/critical-analysis-of-microsoft-operation-b71/" class="uri">http://blog.fox-it.com/2012/04/12/critical-analysis-of-microsoft-operation-b71/</a>.↩︎</p></li>
<li id="fn51"><p>Anirudh Bhattacharyya, “Stuxnet hits India the most”, Hindustan Times, October 2010. Available: <a href="http://www.hindustantimes.com/world-news/stuxnet-hits-india-the-most/articlel-608334.aspx" class="uri">http://www.hindustantimes.com/world-news/stuxnet-hits-india-the-most/articlel-608334.aspx</a>.↩︎</p></li>
<li id="fn52"><p>“CBL breakdown by Country Highest by count”, CBL, March 2014. Available: <a href="http://cbl.abuseat.org/country.html" class="uri">http://cbl.abuseat.org/country.html</a>.↩︎</p></li>
<li id="fn53"><p>“January 2014 Rankings”, Spam Rankings. Available: <a href="http://www.spamrankings.net/rankv2/2013/06/01/monthly/countries/volume/cbl/all/regular/" class="uri">http://www.spamrankings.net/rankv2/2013/06/01/monthly/countries/volume/cbl/all/regular/</a>.↩︎</p></li>
<li id="fn54"><p>“January 2014 Rankings”, Spam Rankings. Available: <a href="http://www.spamrankings.net/rankv2/2013/06/01/monthly/countries/volume/cbl/all/regular/" class="uri">http://www.spamrankings.net/rankv2/2013/06/01/monthly/countries/volume/cbl/all/regular/</a>.↩︎</p></li>
<li id="fn55"><p>“CBL breakdown by CountryPerCapita Highest by count”, CBL, March 2014. Available: <a href="http://cbl.abuseat.org/countrypercapita.html" class="uri">http://cbl.abuseat.org/countrypercapita.html</a>.↩︎</p></li>
<li id="fn56"><p>Equivalent to ten million.↩︎</p></li>
<li id="fn57"><p>“The Definition of Spam”, SpamHaus. Available: <a href="http://www.spamhaus.org/consumer/definition/" class="uri">http://www.spamhaus.org/consumer/definition/</a>.↩︎</p></li>
<li id="fn58"><p>“What is Spam”, Secure List. Available: <a href="http://www.securelist.com/en/threats/spam?chapter-84" class="uri">http://www.securelist.com/en/threats/spam?chapter-84</a>.↩︎</p></li>
<li id="fn59"><p>For detailed analysis of the provision, see P. Prakash, “Breaking Down Section 66A of the IT Act,” at <a href="http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act" class="uri">http://cis-india.org/internet-governance/blog/breaking-down-section-66-a-of-the-it-act</a>↩︎</p></li>
<li id="fn60"><p>Aparna Viswanathan, “An unreasonable restriction”, The Hindu, February 2013. Available: <a href="http://www.thehindu.com/opinionllead/an-unreasonable-restriction/article4432360.ece" class="uri">http://www.thehindu.com/opinionllead/an-unreasonable-restriction/article4432360.ece</a>.↩︎</p></li>
<li id="fn61"><p>Pranesh Prakash, “Aribtrary Arrests for Comment on Bal Thackeray’s Death”, The Center for Internet &amp; Society, November 2012. Available: <a href="http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A" class="uri">http://cis-india.org/internet-governance/blog/bal-thackeray-comment-arbitrary-arrest-295A-66A</a>.↩︎</p></li>
<li id="fn62"><p>“Facebook row: Court closes case against Palghar girls”, The Economic Times, February 2013.↩︎</p></li>
<li id="fn63"><p>Orin Basu, “Ambikesh Mahapatra knocks on PMO door”, Hindustan Times, May 2013.↩︎</p></li>
<li id="fn64"><p>Richa Kaul Padte, “Section 66A sexual harassment and women’s rights”, Internet Democracy Project, December 2012. Available: <a href="http://internetdemocracy.in/2012/12/section-66a-sexual-harassment-and-womens-rights-2/" class="uri">http://internetdemocracy.in/2012/12/section-66a-sexual-harassment-and-womens-rights-2/</a>.↩︎</p></li>
<li id="fn65"><p>Jay Panda, “A Private Member’s Bill To Amend 66A”, Outlook India, November 2012. Available: <a href="http://www.outlookindia.com/article.aspx?283169" class="uri">http://www.outlookindia.com/article.aspx?283169</a>.↩︎</p></li>
<li id="fn66"><p>Telecom Commercial Communications Customer Preference Por-tal. Available: <a href="http://www.nccptrai.gov.in/nccpregistry/" class="uri">http://www.nccptrai.gov.in/nccpregistry/</a>.↩︎</p></li>
<li id="fn67"><p>Rajeev Agrawal, “The Telecom Commercial Communications Customer Preference (Thirteenth Amendment) Regulations 2013”, TRAI, August 2013. Available: <a href="http://www.trai.gov.in/writereaddata/whatsnew/documents/press%20release%200n%20uccfinal.pdf" class="uri">http://www.trai.gov.in/writereaddata/whatsnew/documents/press%20release%200n%20uccfinal.pdf</a>.↩︎</p></li>
<li id="fn68"><p>Anupam Saxena, “Supreme Court Stays Order Removing 200 SMS/Day Limit”, MediaNama, December 2012. Available: <a href="http://www.medianama.com/2012/12/223-supreme-court-stays-order-removing-200-smsday-limit" class="uri">http://www.medianama.com/2012/12/223-supreme-court-stays-order-removing-200-smsday-limit</a>.↩︎</p></li>
<li id="fn69"><p>“Convention on Cybercrime”, Council of Europe. Available: <a href="http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT-185CL-ENG" class="uri">http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT-185CL-ENG</a>.↩︎</p></li>
<li id="fn70"><p>Central Bureau of Investigation. Available: <a href="http://cbi.nic.in/interoollmlats.php" class="uri">http://cbi.nic.in/interoollmlats.php</a>.↩︎</p></li>
<li id="fn71"><p>“US unable to execute summons to websites including Facebook Google: MHA tells court”, The Economic Times, May 2013.↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/articles/spam-and-internet-abuse-in-india_a-brief-history.html</guid>
  <pubDate>Fri, 01 Nov 2013 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Independence: global media | edited version</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/prakash_2013_edited--independence-global-media_unesco.html</link>
  <description><![CDATA[ 






<section id="overview1" class="level2">
<h2 class="anchored" data-anchor-id="overview1">Overview<sup>1</sup></h2>
<p>Independence of journalists and of media outlets has become increasingly challenging as the fluidity of what constitutes ‘the press’ and who counts as ‘journalists’ due to lowering of production and dissemination barriers by online media, the conversion of some offline publications to online publications, and the two-way flow of information between the online and offline media. The internet has also been the driver behind the challenge to existing media business models, which have led to an increased reliance of global media on strategic foreign policy funding which are closely associated with risks of overt dependence and governmental “capture”.</p>
</section>
<section id="independence-of-international-news-services" class="level2">
<h2 class="anchored" data-anchor-id="independence-of-international-news-services">Independence of International News Services</h2>
<p>The largest news agencies, newspapers, and news channels are all governed by different models although there has been a trend towards state-owned international media since 2006<sup>2</sup> and online volunteer news collectives [see Pluralism:Global]. Agence-France Presse is state-owned, Reuters is privately owned (since 2008 as part of Thomson Reuters), Associated Press is collectively owned by its subscribers, Agencia EFE is privately owned, Bloomberg is privately owned, and Xinhua is state-owned. Different degrees of editorial independence from owners are operational within these media companies. Within the state-owned global news broadcasters — the larger ones being BBC, CCTV, China Radio International, China Russia Today, Voice of America, Al Arabiya, Al Jazeera, Deutsche Welle, and France24 — there are different frameworks both legally and in practice, as well as by platform.<sup>3</sup> Given this, broad trends are difficult to pinpoint, although it has been observed that the performance of international broadcasting is related to complexities of foreign policy and their relationship to the current geopolitical environment.<sup>4</sup> As such, Chinese foreign broadcasting reflects the geopolitical interests of the Chinese government, Al Jazeera has given Qatar a more prominent voice in global policy arenas, while Voice of America (VOA) continues to advance the geopolitical interests of the United States.<sup>5</sup></p>
<p>It is almost inevitable that the government funding received by many international broadcasters has caused some to question their ability to provide neutral and impartial reporting.<sup>6</sup> Public institutions with multi-year charters (BBC, SVT) and ownership by an independent trust (SVT) help insulate state-owned media outlets from governmental pressures.<sup>7</sup> Another case is the VOA. This broadcaster is required by statute to engage in ‘clear and effective presentation of the policies of the United States Government and responsible discussion and opinion on those policies, including editorials […] which present the views of the United States Government.’<sup>8</sup> At the same time, VOA is also legally guaranteed editorial independence,<sup>9</sup> and one study has found the broadcaster to be a credible source of news in its Asian news broadcast.<sup>10</sup> This study went on to point out that audience perceptions of objectivity are important for a foreign news service to be seen as credible, and that this may help counter interference from governments. At different times, international state-owned networks have been accused of being uncritical of their backing state (including Al Jazeera, BBC, CCTV, and Russia Today); however, there is a lack of good comparative studies in this area, and it is therefore difficult to confirm alleged bias with detailed evidence, nor is there any material to suggest any specific trends.</p>
<p>Separate from the issue of editorial independence, although with a bearing on it, the finances of state-owned international broadcasters are often tied to the foreign policy objectives of the state. The interdependence of funding for foreign language broadcasts and foreign policy objectives can be seen from the cuts faced by Voice of America<sup>11</sup>, the BBC's World Service<sup>12</sup>, and Radio Netherlands<sup>13</sup> in the past decade which have led to many languages being dropped at the same time that Arabic-language news services were launched by those and other governments, most of these in the past six years.<sup>14</sup> Meanwhile Iran and Qatar have launched English-language news stations and several global broadcasters started news services in Spanish in same period.<sup>15</sup></p>
<p>Political influence and commercial pressure also compromise independence in both local and international media, and thus corporate ownership as distinct from state-ownership and strict government regulation is not a guarantee of press freedom or editorial independence.<sup>16</sup> A study of public media in 14 democratic and developed states suggests that commercial pressures have been far more deleterious than partisan political meddling.<sup>17</sup> Commercial pressures have impacted also on state-owned media, encouraging these outlets to appeal to a broad audience at the expense of public service values and rural, poor or minority audiences.<sup>18</sup> Especially private news broadcasters (both international and domestic) have turned to entertainment programming to boost ratings.<sup>19</sup></p>
<p>Funding models impact on the financial independence of a news organization.<sup>20</sup> The relatively recent demise of many existing media business models has led to a re-evaluation across the industry of where the ‘value’ in media content lies and an increase in government development programs, corporate benefactors and other ‘special interests’ funding or cross-funding media content.<sup>21</sup> This kind of funding is historically by no means uncommon in international broadcasting, and it may influence actual media content, framing, and the ‘red lines’ which reporters feel unable to cross.<sup>22</sup> While larger media companies rely on attracting their own advertisers online, many online intermediaries like Google Ads exist which effectively mean that small online media companies can get by without having to do so. While a large advertiser can threaten independent reporting by a news broadcaster, the advertiser no longer has such powers if the online news service uses an intermediary like Google Ads; but this also means that the media house can no longer control what advertisements are shown.</p>
</section>
<section id="organizational-ecosystem" class="level2">
<h2 class="anchored" data-anchor-id="organizational-ecosystem">Organizational ecosystem</h2>
<p>International organizations normally play an important role in research, bringing attention to issues, providing support, training, etc. The predominant way these organizations exert influence appears to be through pedagogy.</p>
<p>Most of the more important international and regional institutions dedicated to journalists and journalism continue to be headquartered either in Europe or the United States of America. The majority of the large media donors continue to be located in the West, and are, more often than not, governments.<sup>23</sup> The International Federation of Journalists is a global union federation of journalists' trade unions, and is one of the more influential bodies, with more than 600,000 members. While some transnational press ethics bodies exist, such as the World Association of Press Councils and the Organization of News Ombudsmen, they do not possess much influence over the larger media. In the global internet intermediary space, a voluntary embryonic self-regulatory system has emerged in the form of the Global Network Initiative. Another relevant development is the publication in 2013 by the European Commission of the “ICT Sector Guide on Implementing the UN Guiding Principles on Business and Human Rights”.</p>
<p>While there are a number of codes of ethics for journalists and even some for ‘online journalists’ and bloggers, most transnational news agencies and broadcasters have their own codes. Notably among the larger new agencies and broadcasters, CNN, Xinhua, and CCTV do not appear to publish specific code of ethics online.</p>
<p>Over the past six years, one notable trend is the increase in online training material for journalism. For instance, the BBC has now launched initiatives to provide journalism and social media training to members of local communities, while its 'College of Journalism' website includes resources for the aspiring citizen journalists,<sup>24</sup> adding to the online materials and courses offered by ICFJ Anywhere, Poynter Online, Centre for International Media Assistance, European Journalism Centre, the Global Forum for Media Development, Knight Center for Journalism in the Americas, and others. In 2013, UNESCO began exploring a Global Initiative for Excellence in Journalism Education as a framework to group together and deepen its international work in this area.</p>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>This Overview sub-section presents a synopsis of the main trends in the region; supporting evidence, explanations and footnotes are provided in the text that follows.↩︎</p></li>
<li id="fn2"><p>Mazumdar, S. (2011, October). News Media and Global Influence: The Story of China and India. <em>Asia Research Institute Working Paper Series</em> No.&nbsp;165. p.&nbsp;5. Painter, J. (2007, February). The Boom in Counter-Hegemonic News Channels: <em>A Case Study of Telesur. research paper presented to the Reuters Institute for the Study of Journalism, Oxford University.</em>↩︎</p></li>
<li id="fn3"><p>This last point is underscored by the finding in China that the TV broadcaster CCTV is under far stricter control than official Chinese state news agencies that operate primarily in print, and that the Arabic and English versions of Al Jazeera television and websites differ, although this can vary by subject matter as well. See for example Abdul-Mageed, M., Herring, S. (2008). Arabic and English News Coverage on AlJazeera.net. In F. Sudweeks, H. Hrachovec, and C. Ess (Eds.), <em>Proceedings of Cultural Attitudes Towards Technology and Communication 2008</em>, Nîmes, France,June 24-27. Fahmy, S., Al Emad, M. (2011, April). Al-Jazeera vs Al-Jazeera: A comparison of the network’s English and Arabic online coverage of the US/Al Qaeda conflict. <em>International Communication Gazette.</em> vol.&nbsp;73 no. 3 216-232↩︎</p></li>
<li id="fn4"><p>Price, M. E. et al.&nbsp;(2008). New Technologies and International Broadcasting: Reflections on Adaptations and Transformations. <em>The ANNALS of the American Academy of Political and Social Science</em>, <em>616</em>(1), 150–172.↩︎</p></li>
<li id="fn5"><p>Price, M. (2009). End of television and foreign policy. <em>The ANNALS of the American Academy of Political Science.</em> Price, M. (2002). <em>The Transformation of International Broadcasting.</em> Razón Y Palabra. <a href="http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html" class="uri">http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html</a>. Peterson, J. (2006) Qatar and the World: Branding for a Micro-State Middle East Journal Vol. 60, No.&nbsp;4, pp.&nbsp;732-748 Middle East Institute <a href="http://www.jstor.org/stable/4330320" class="uri">http://www.jstor.org/stable/4330320</a> . Seib, P. (2008). <em>The Al Jazeera effect: how the new global media are reshaping world politics</em>. Potomac Books Incorporated.↩︎</p></li>
<li id="fn6"><p>Grunes, A., Stucke, M. (2012). <em>Plurality of Political Opinion and the Concentration of the Media</em>. General Reports of the XVIIIth Congress of the International Academy of Comparative Law/Rapports Généraux du XVIIIème Congrès de l’Académie Internationale de Droit Comparé.↩︎</p></li>
<li id="fn7"><p>British Broadcasting Company (BBC) and Sveriges Television (SVT) are the British and Swedish, respectively, public service broadcasters.↩︎</p></li>
<li id="fn8"><p>United States International Broadcasting Act of 1994. Title 22, Ch. 71, Sec. 6202(b)(3) <a href="http://uscode.house.gov/download/pls/22C71.txt" class="uri">http://uscode.house.gov/download/pls/22C71.txt</a>↩︎</p></li>
<li id="fn9"><p>Price, M. (2002). <em>The Transformation of International Broadcasting.</em> Razón Y Palabra. <a href="http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html" class="uri">http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html</a>↩︎</p></li>
<li id="fn10"><p>Rampal, K., Adams, W. (1990). Credibility of the Asian News Broadcasts of the Voice of America and the British Broadcasting Corporation. <em>International Communication Gazette</em>, 46/2. pp. 93-111.↩︎</p></li>
<li id="fn11"><p>Kiel, Paul. (2008, 9 July). Voice of America to Cut Language Services. <em>Pro Publica. Journalism in the Public Interest.</em> <a href="http://www.propublica.org/article/voice-of-america-to-cut-language-services-709" class="uri">http://www.propublica.org/article/voice-of-america-to-cut-language-services-709</a>; Broadcasting Bord of Governors (BBG) Watcher. (2012, 25 February). <em>Demoralized Voice of America — Georgian Service.</em> <a href="http://www.usgbroadcasts.com/bbgwatch/2012/02/25/demoralized-voice-of-america-georgian-service/" class="uri">http://www.usgbroadcasts.com/bbgwatch/2012/02/25/demoralized-voice-of-america-georgian-service/</a>; Powers, S. (2010). <em>U.S. International Broadcasting: Un Untapped Resource for Ethnic and Domestic News Organization</em>. Public Policy and Funding the News. A Project of the USC Annenberg Center on Communication Leadership &amp; Policy. http://fundingthenews.usc.edu/related_research/4_Carnegie_USInternationalBroadcasting.pdf↩︎</p></li>
<li id="fn12"><p>Lyall, S. (2011, 26 January)..BBC, Facing Budget Cuts, Will Trim World Service and Lay Off 650. <em>The New York Times.</em> <a href="http://www.nytimes.com/2011/01/27/world/europe/27bbc.html" class="uri">http://www.nytimes.com/2011/01/27/world/europe/27bbc.html</a>; BBC. (2011, 26 January). <em>BBC World Service to cut five language services</em>. <a href="http://www.bbc.co.uk/news/entertainment-arts-12277413" class="uri">http://www.bbc.co.uk/news/entertainment-arts-12277413</a><u>;</u> BBC. (2013, 11 June). <em>BBC World Service in government funding cut.</em> <a href="http://www.bbc.co.uk/news/entertainment-arts-22853598" class="uri">http://www.bbc.co.uk/news/entertainment-arts-22853598</a>;↩︎</p></li>
<li id="fn13"><p>Radio Netherlands Worldwide (RNW). (2012, 29 June). <em>The last day of English broadcasts at RNW. <a href="http://www.rnw.nl/english/article/last-day-english-broadcasts-rnw" class="uri">http://www.rnw.nl/english/article/last-day-english-broadcasts-rnw</a>;</em>↩︎</p></li>
<li id="fn14"><p>The US launched Al Hurra in 2004, France 24 started broadcasting in Arabic in 2007, the UK’s BBC Arabic launched in 2008, China added Arabic broadcasting in 2009 (The Guardian. (2009, 26 July<em>). China launches Arabic-language TV channel.</em> <a href="http://www.guardian.co.uk/world/2009/jul/26/china-arabic-tv-channel" class="uri">http://www.guardian.co.uk/world/2009/jul/26/china-arabic-tv-channel</a> and <a href="http://www.heritage.org/research/reports/2012/06/challenging-america-how-russia-china-and-other-countries-use-public-diplomacy-to-compete-with-the-us#_ftnref38" class="uri">http://www.heritage.org/research/reports/2012/06/challenging-america-how-russia-china-and-other-countries-use-public-diplomacy-to-compete-with-the-us#_ftnref38</a>↩︎</p></li>
<li id="fn15"><p>Painter, J. (2007, Feb). The Boom in Counter-Hegemonic News Channels: A Case Study of Telesur. Research paper presented to the Reuters Institute for the Study of Journalism, Oxford University.↩︎</p></li>
<li id="fn16"><p>Cohen, R. et al.&nbsp;(2005). <em>Who Is in Control?</em> Brussels, Belgium: Hoeilaart for the International Federation of Journalists. p.4.↩︎</p></li>
<li id="fn17"><p>Benson, R., Powers, M. (2011). <em>Public Media and Political Independence: Lessons for the Future of Journalism from Around the World.</em> Free Press. <a href="http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf" class="uri">http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf</a>↩︎</p></li>
<li id="fn18"><p>Benson, R., Powers, M. (2011). <em>Public Media and Political Independence: Lessons for the Future of Journalism from Around the World.</em> Free Press. p.13. <a href="http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf" class="uri">http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf</a>. McQuail, D. (2003). Public Service Broadcasting: Both Free and Accountable. <em>The Public</em>, 10/3. p.&nbsp;27↩︎</p></li>
<li id="fn19"><p>See for example The Economist. (2012). <em>Unbiased and Unloved.</em> <a href="http://www.economist.com/node/21563298" class="uri">http://www.economist.com/node/21563298</a>. Van Der Haak, B. et al. (2012). The Future of Journalism: Networked Journalism. <em>International Journal of Communication. 6.</em> Karlekar, K., Radsch, C. (2010). Adapting concepts of media freedom to a changing media environment: Incorporating new media and citizen journalism into the Freedom of the Press Index<em>. ESSACHESS Journal for Communication Studies</em> 5 (1). See also the chapter in this report on Pluralism in Asia and Western Europe.↩︎</p></li>
<li id="fn20"><p>Chomsky, H. (1988). <em>Manufacturing Consent: The Political Economy of the Mass Media</em>. Pantheon Books.↩︎</p></li>
<li id="fn21"><p>Powers, S. M., Youmans, W. (2012). A New Purpose for International Broadcasting : Subsidizing Deliberative Technologies in Non- transitioning States A New Purpose for International Broadcasting : Subsidizing Deliberative, <em>8</em>(1). Price, M. E., et al.&nbsp;(2008). New Technologies and International Broadcasting: Reflections on Adaptations and Transformations. <em>The ANNALS of the American Academy of Political and Social Science</em>, <em>616</em>(1), 150–172.↩︎</p></li>
<li id="fn22"><p>Davies, N. (2009). F<em>lat Earth news: an award-winning reporter exposes falsehood, distortion and propaganda in the global media</em>. Great Britain: CPI Cox &amp; Wyman. Karlekar, K., Cook, S. (2009). <em>Freedom of the Press 2008 – A Global Survey of Media Independence</em>. Plymouth: Rowman &amp; Littlefield Publishers, Inc.↩︎</p></li>
<li id="fn23"><p>Center for International Media Assistance (CIMA). (2013, 19 March). <em>U.S. Government Funding for Media: Trends and Strategies</em>. Center for International Media Assistance, p.&nbsp;6. Myers, M. (2009) <em>Funding for Media Development by Major Donors Outside the United States</em>. Center for International Media Assistance.↩︎</p></li>
<li id="fn24"><p>Bradshaw, P. (2011.). <em>Mapping Digital Media: Social Media and News.</em> Open Society Foundation. <a href="http://www.opensocietyfoundations.org/sites/default/files/mapping-digital-media-social-media-and-news-20120119.pdf" class="uri">http://www.opensocietyfoundations.org/sites/default/files/mapping-digital-media-social-media-and-news-20120119.pdf</a>↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{prakashIndependenceGlobal2014,
  author = {Prakash, Pranesh},
  editor = {Radsch, Courtney},
  publisher = {UNESCO},
  title = {Independence: Global Media},
  booktitle = {World trends in freedom of expression and media
    development},
  date = {2014-07-14},
  url = {https://unesdoc.unesco.org/ark:/48223/pf0000227025},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndependenceGlobal2014" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2014. <span>“Independence: Global Media.”</span> In
<em>World Trends in Freedom of Expression and Media Development</em>,
edited by Courtney Radsch. UNESCO. <a href="https://unesdoc.unesco.org/ark:/48223/pf0000227025">https://unesdoc.unesco.org/ark:/48223/pf0000227025</a>.
</div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/books/prakash_2013_edited--independence-global-media_unesco.html</guid>
  <pubDate>Fri, 16 Aug 2013 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Independence: global media | unedited version</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/books/prakash_2013_unedited--independence-global-media_unesco.html</link>
  <description><![CDATA[ 






<section id="introduction" class="level2">
<h2 class="anchored" data-anchor-id="introduction">Introduction</h2>
<p>Independence of journalists is any day difficult to measure, especially on a global scale. This is more true today than ever before, with the current fluidity of what constitutes ‘the press’ and who ‘journalists’ are due to lowering of barriers to publication with online media, the conversion of some offline publications to online publications, and the free two-way flow of information between the online and offline media. Most of the indicators used to gauge independence by reports such as the IREX MSI (registration and recognition of journalists in a process that is independent of the government; self-regulatory mechanisms; existence of independent media monitoring organisations; existence of trade-unions; etc.) measure at the level of the nation, and none of these traditional measures can be used while gauging the independence of transnational media.</p>
</section>
<section id="structural-issues" class="level2">
<h2 class="anchored" data-anchor-id="structural-issues">Structural Issues</h2>
<p>The systematic study of pan-regional and transnational news media outlets task is now more difficult due to the breakdown of traditional barriers to the dissemination of news. While before the advent of the Internet, it would have been comparatively easier to study international newswire services and satellite news channels, given the growth of the Internet it has become more difficult to separate 'pan-regional and transnational media outlets' from others. While a few years ago, ‘global’ or ‘transnational’ would have been identified primarily by geographic reach of a channel/newspaper/news agency, etc, now it is defined more by the cross-national and cross-regional focus and the linguistic reach of the content. As an example, according to a study performed by the Pew Research Center's Project for Excellence in Journalism, RT (formerly Russia Today) was the most popular news distributor on YouTube over a period of 15 months from January 2011 to March 2012, managing to supplant more well-established like the BBC, Deutsche Welles, and Voice of America.</p>
<p>While some of the changes cannot yet be called trends, but consolidation and the increase in size of those agencies offering of news as part of a financial package is noticeable, with Reuters merging with Thomson in 2008, and the financial services company Bloomberg increasing its original news gathering as well as the expansion of Dow Jones. There is also an increase in the influence of relatively newer entrants like Telesur, Al Jazeera, RT, CCTV, and CNC World, while the older, traditional state-backed broadcasters like VOA and BBC World Service (Heil Alan Jr., 2011; Voice of America, 2013; BBC, 2011) have been cutting staff and languages, while still broadcasting in far more languages than any of their competitors. One possible reason for this is that newer entrants like Al Jazeera and RT aggressively using social media to establish themselves, and are often succeeding against their larger competitors. Al Jazeera, for instance, licenses many of its broadcast-quality videos, high-resolution photos, and blog articles under a Creative Commons licence, allowing people to re-use them without requiring permission, with only attribution being required.</p>
<p>As noted above, an important trend is the usage of online social media platforms by news agencies and transnational news outlets. As on June 6, 2013, RT is the most popular news broadcaster on YouTube with 865,644 subscribers. (The BBC doesn’t have a dedicated news channel on YouTube, though its general programming attracts more than 1 million subscribers.) Importantly, the most popular social media accounts are the BBC’s Breaking News account on Twitter, which has 6,053,980 followers, Xinhua Viewpoint, which has 5,413,895 fans on Sina Weibo (with CCTV News having 4,040,000 fans), Al Jazeera Arabic, which has 3,543,400 ‘likes’ on Facebook, and on YouTube there is a clear lead by RT. This is leading to ‘disintermediation’ of news agencies, some of whom are increasingly, as the social media statistics of Reuters and AP show, communicating directly with readers and viewers (who become their subscribers) by using social media platforms as intermediaries in addition to their traditional subscribers who are newspapers, television, and radio broadcasters, whose role as intermediaries is on the decline. This ‘disintermediation’ through the introduction of online intermediaries also creates new potential gatekeepers, each with their own standards (expressed in ‘terms of use’) for what kinds of speech are acceptable.</p>
<p>Because of the Internet, the existence of community/volunteer-run <em>global</em> media outlets is now a possibility, though it is not a dominant practice currently and the landscape is still dominated by corporate and state media. While the Independent Media Centre (IndyMedia) did not become as large or as effective a network as its founders had hoped, it did provide the impetus for much participatory journalism efforts, including Global Voices and Wikinews, which aim to be truly global in their reach. There is also a trend towards co-optation of such participatory news reporting into traditional corporate media, as seen by iReport.com by CNN, in which citizen journalism becomes corporate-mediated (Kperogi, 2011). The usage by journalists of Twitter and other platforms to query readers about stories led to the observation that “news is no longer gathered exclusively by reporters and turned into a story but emerges from an ecosystem in which journalists, sources, readers and viewers exchange information.” (The Economist, 2011).</p>
<section id="funding-and-capacity" class="level3">
<h3 class="anchored" data-anchor-id="funding-and-capacity">Funding and Capacity</h3>
<p>Funding is both needed for financial independence of a news organization and is seen as a threat to independence as it is a central component of the ‘propaganda model’ (Herman &amp; Chomsky, 1988). While larger media companies rely on attracting their own advertisers online, many online intermediaries like Google Ads exist which effectively mean that smaller media companies do not have to do so. While a large advertiser can threaten independent reporting by a news broadcaster, the advertiser no longer has such powers if the online news service uses an intermediary like Google Ads; but this also means that the publication can no longer control what advertisements are shown.</p>
<p>One other trend is the increase in online training material for journalism. For instance, the BBC has now launched initiatives to provide journalism and social media training to members of local communities, while its 'College of Journalism' website includes resources for the aspiring citizen journalist (Bradshaw, 2011), adding to the online materials and courses offered by ICFJ Anywhere, Poynter Online, Centre for International Media Assistance, European Journalism Centre, the Global Forum for Media Development, and others.</p>
</section>
<section id="independence-of-international-news-services" class="level3">
<h3 class="anchored" data-anchor-id="independence-of-international-news-services">Independence of International News Services</h3>
<p>The largest news agencies, newspapers, and news channels are all governed by different models, and there seem to be no systematic studies of the linkage between independence of their reportage and ownership models. Agence-France Presse is state-owned, Reuters is privately owned (since 2008 as part of Thomson Reuters), Associated Press is collectively owned by its subscribers, Agencia EFE is privately owned, Bloomberg is privately owned, and Xinhua is state-backed. All state-owned global news broadcasters — the larger ones being BBC, CCTV, China Radio International, China Russia Today, Voice of America, Al Arabiya, Al Jazeera, Deutsche Welle, and France24 — work within a different framework both legally and in practice. Further, state-owned international news media organizations need to be studied separately according to their medium (as suggested by the finding in China, TV broadcaster CCTV is under far stricter control than official Chinese state news agencies that operate primarily in print) (. Given this, broad trends are difficult to pinpoint. Voice of America (VoA) is widely regarded as a tool of American propaganda (Price, 2002) and is required by statute to engage in "clear and effective presentation of the policies of the United States Government and responsible discussion and opinion on those policies, including editorials […] which present the views of the United States Government" (United States International Broadcasting Act, 1994). However, VoA is also legally guaranteed editorial independence (Price, 2002), and a study found the broadcaster to be a credible source of objective news in its Asian news broadcast (Rampal &amp; Adams, 1990). This study went on to point out that perception of objectivity is important for a foreign news service to be seen as credible, and that this may help counter interference from governments. There have not been later studies that would help identifying trends.</p>
<p>At different times, international state-owned networks have been accused of being uncritical of their backing state (including Al Jazeera, Voice of America, CCTV, and Russia Today); however, there is a lack of good comparative studies in this area, and it is therefore difficult to legitimately criticize these media outlets for any apparent bias at this time, nor is there any material to suggest any specific trends.</p>
<p>Separate from the issue of editorial independence, one thing that may be observed is that the finances of state-owned international broadcasters are often tied to the foreign policy objectives of the state, and thus the independent funding for foreign language broadcasts are often in jeopardy, as can be seen from the cuts faced by both Voice of America and the BBC's World Service in the past decade.</p>
<p>A study of public media in fourteen democratic and developed states suggests that commercial pressures are far more deleterious than partisan political meddling (Benson &amp; Powers, 2011). The institutions of multi-year charters (BBC, SVT) and ownership by an independent trust (SVT) help insulate media outlets from governmental pressures. However, commercial pressures result in the "increasing difficulty of balancing the need to appeal to a broad audience (to justify the license fee) and to uphold public service values such as high-quality programming across multiple genres, in-depth information, promotion of democratic citizenship” (Benson &amp; Powers, 2011: p.13) and provision of “access to and reflection of society in diverse or proportional ways” (McQuail, 2003: 27). However, it would not suffice to address issues of independence of only state-owned international broadcasters. As Aidan White, the General Secretary of the International Federation of Journalists, notes, "the evidence is that the market [...] is too easily subject to political or commercial pressure" (Cohen et al., 2005: p.4) and that "exchanging strict government regulation for corporate control is not true press freedom” (p.4). This seems to hold for CNN, which is struggling with its audience numbers in the USA and has slipped to third place behind Fox News and MSNBC, and is turning to entertainment programming to boost its domestic ratings (The Economist, 2012).</p>
<p>It has been reported that the global financial crisis has “taken a terrible toll on … newspapers” (The Economist, 2009), but the big newswires, in contrast, “have been staffing up”. For example, while the Wall Street Journal cut down on staff, its sister company Dow Jones, a newswire, increased its staff (The Economist, 2009). There has been no systematic study of the effect of the global financial crisis on transnational news outlets, but it is clear that the financial downturn has had an impact; but rather than having a detrimental effect across the board, it appears to have precipitated a complex reshuffling of resources. Research prior to the global financial crisis indicates that cutting of costs has resulted in the major news agencies “becoming more influential than they had ever been” (Paterson, 2005).</p>
</section>
</section>
<section id="organizational-ecosystem" class="level2">
<h2 class="anchored" data-anchor-id="organizational-ecosystem">Organizational ecosystem</h2>
<p>[A list of media organizations and associations is provided in Appendix 1.]</p>
<p>The list provided in Appendix 1 is only an attempt at indexing the most important international and regional institutions dedicated to journalists and journalism. Thus national-level organizations (Albanian Media Institute, Mediacentar Sarajevo, Bahrain Center for Human Rights, etc.), have been left out. However, a quick inspection of the international organizations listed will show that they are mostly headquartered either in Europe or the United States of America, and the majority of the large donors are also located in the West, and are, more often than not, Western governments. This has not changed much in the recent past, since most of the funding has gone to create and strengthen national-level organizations.</p>
<p>These international organizations normally play an important role in research, bringing attention to issues, providing support, training, etc., but seem to have little norm-setting powers on issues relating to the profession. The predominant way these organizations exert influence appears to be through pedagogy and in the kind of work that UNESCO does.</p>
<p>While some transnational press ethics bodies (such as the World Association of Press Councils and the Organization of News Ombudsmen) exist, they do not possess much influence over the larger press. The International Federation of Journalists is a global union federation of journalists' trade unions, and is one of the more influential bodies, with more than 600,000 members.</p>
<p>While there are a number of codes of ethics for journalists, including the International Principles of Professional Ethics in Journalism prepared under the auspices of Unesco, and even some for ‘online journalists’ and bloggers, most transnational news agencies and broadcasters have their own codes. Notably among the larger new agencies and broadcasters, CNN, Xinhua, and CCTV don’t seem to publish specific code of ethics online.</p>
</section>
<section id="recommendations" class="level2">
<h2 class="anchored" data-anchor-id="recommendations">Recommendations</h2>
<p>Unesco could:</p>
<ul>
<li>convene a meeting on code of ethics for bloggers and online journalists</li>
<li>collate and popularise different online training courses in multiples languages for journalists through its website</li>
</ul>
</section>
<section id="appendix-1" class="level2">
<h2 class="anchored" data-anchor-id="appendix-1">Appendix 1</h2>
<section id="media-organizations" class="level3">
<h3 class="anchored" data-anchor-id="media-organizations">Media Organizations</h3>
<ul>
<li>Arab Media Centre</li>
<li>Centre for Freedom of the Media: http://www.cfom.org.uk/</li>
<li>Centre for International Media Assistance: http://cima.ned.org/</li>
<li>Center for International Media Ethics</li>
<li>Centro de Estudios de Libertad de Expresion y Acceso a la Informacion (www.palermo.edu/cele)</li>
<li>European Journalism Centre (http://www.ejc.net/ejc/)</li>
<li>Free Press Unlimited (https://www.freepressunlimited.org/en)</li>
<li>Global Forum for Media Development: http://gfmd.info/</li>
<li>International Media Support (http://www.i-m-s.dk/)</li>
<li>International Press Institute http://www.freemedia.at/about-us/ipi-profile.html</li>
<li>Internews</li>
<li>Investigative News Network (http://www.investigativenewsnetwork.org/)</li>
<li>IREX (http://www.irex.org/)</li>
<li>Media Development Loan Fund</li>
<li>Media Freedom International: http://www.mediafreedominternational.org/</li>
<li>Media Institute of Southern Africa</li>
<li>Online News Association</li>
<li>Strengthening Independent Media: http://sim.salzburgglobal.org/?q=page/about-sim</li>
<li>Wikileaks</li>
<li>World Association of Newspapers and News Publishers</li>
<li>World Association of Community Radio Broadcasters (AMARC) (http://www.amarc.org/)</li>
<li>World Press Freedom Committee</li>
<li>World Press Institute (http://www.worldpressinstitute.org/)</li>
</ul>
</section>
<section id="pan-regional-and-international-professional-associations-for-media-workers" class="level3">
<h3 class="anchored" data-anchor-id="pan-regional-and-international-professional-associations-for-media-workers">Pan-regional and international professional associations for media workers:</h3>
<ul>
<li>Association for European Journalist (http://www.aej.org/)</li>
<li>Committee to Project Journalists (www.cpj.org)</li>
<li>Commonwealth Press Union</li>
<li>Cartoonists Rights Network International (http://www.cartoonistsrights.org/)</li>
<li>Federation of Arab Journalists</li>
<li>IFEX (formerly International Freedom of Expression Exchange) (http://ifex.org/)</li>
<li>Inter American Press Association (Sociedad Interamericana de Prensa)</li>
<li>International Association of Broadcasting</li>
<li>International Association of the Periodical Press</li>
<li>International Center for Journalists (www.icfj.org)</li>
<li>International Consortium of Investigative Journalists (http://www.publicintegrity.org)</li>
<li>International Federation of Journalists</li>
<li>International Journalist's Network (part of ICfJ) (http://ijnet.org/)</li>
<li>International News Safety Institute (http://www.newssafety.org/)</li>
<li>International Press Association (www.internationalpress.com)</li>
<li>International Press Institute</li>
<li>International Radio and TV Union</li>
<li>International Women's Media Foundation</li>
<li>North American Broadcasters Association</li>
<li>Online News Association (http://journalists.org/)</li>
<li>Reporters Without Borders: http://en.rsf.org/</li>
<li>World Association of Newspapers and News Publishers: (http://www.wan-ifra.org/)</li>
<li>World Editors Forum (part of WAN) (http://www.wan-ifra.org/microsites/world-editors-forum)</li>
</ul>
</section>
<section id="global-freedom-of-expression-advocacy-groups" class="level3">
<h3 class="anchored" data-anchor-id="global-freedom-of-expression-advocacy-groups">Global freedom of expression advocacy groups</h3>
<ul>
<li>Arabic Network for Human Rights Information</li>
<li>Article 19 (http://www.article19.org/)</li>
<li>Catholic Media Council (http://www.cameco.org/)</li>
<li>Freedom House</li>
<li>Global Voices (http://globalvoicesonline.org/)</li>
<li>Human Rights Watch</li>
<li>Index on Censorship (http://www.indexoncensorship.org)</li>
<li>International Freedom of Expression Exchange (IFEX) (http://www.ifex.org/)</li>
<li>International PEN (http://www.internationalpen.org.uk/)</li>
<li>MediaPolicy.org</li>
<li>PANOS Network</li>
</ul>
</section>
<section id="donors-and-multilateral-organizations" class="level3">
<h3 class="anchored" data-anchor-id="donors-and-multilateral-organizations">Donors and multilateral organizations</h3>
<ul>
<li>BBC Media Action</li>
<li>Ford Foundation</li>
<li>Freedom of Expression Foundation (http://www.fritt-ord.no/en/)</li>
<li>Hivos (www.hivos.org)</li>
<li>John S. and James L. Knight Foundation</li>
<li>Media Development Loan Fund (http://www.mdlf.org/)</li>
<li>OECD</li>
<li>Open Society Media Program (www.soros.org/initiatives/media) and Information Program (www.soros.org/initiatives/ip)</li>
<li>Sigrid Rausing Trust (http://www.sigrid-rausing-trust.org/)</li>
<li>UNDP</li>
<li>UNESCO</li>
<li>USAID, EuropeAid (European Commission, DG Development), AusAID, CIDA, Sida, Norad, JICA, German Federal Ministry for Economic Cooperation and Development, Dutch Ministry of Foreign Affairs, DANIDA, UK DFID.</li>
<li>World Bank Institute</li>
</ul>
</section>
</section>
<section id="bibliography" class="level2">
<h2 class="anchored" data-anchor-id="bibliography">Bibliography</h2>
<p>Akoijam, I. 2012. How Effective Is the Press Council? The Hoot. [online] Available at: &lt;<a href="http://thehoot.org/web/HoweffectiveisthePressCouncil/6292-1-1-9-true.html" class="uri">http://thehoot.org/web/HoweffectiveisthePressCouncil/6292-1-1-9-true.html</a>&gt; [Accessed 25 February 2013].</p>
<p>Benson, R. and Powers, M. 2011. Public Media and Political Independence: Lessons for the Future of Journalism from Around the World. [pdf] Free Press. Available at: &lt;<a href="http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf" class="uri">http://www.freepress.net/sites/default/files/stn-legacy/public-media-and-political-independence.pdf</a>&gt;</p>
<p>Bradshaw, P. 2011. Mapping Digital Media: Social Media and News. [pdf] Open Society Foundation. (Open Society Media Program, Referential Series No.&nbsp;15.) Available at: &lt;<a href="http://www.opensocietyfoundations.org/sites/default/files/mapping-digital-media-social-media-and-news-20120119.pdf" class="uri">http://www.opensocietyfoundations.org/sites/default/files/mapping-digital-media-social-media-and-news-20120119.pdf</a>&gt;</p>
<p>British Broadcasting Corporation. 2011. BBC World Service to cut five language services. [online] Available at: <a href="http://www.bbc.co.uk/news/entertainment-arts-12277413" class="uri">http://www.bbc.co.uk/news/entertainment-arts-12277413</a></p>
<p>Heil, A. Jr.&nbsp;2011. All Quiet on the Western Front: 2012 Challenges and Opportunities in the Five-Year Strategic Plan for U.S. International Broadcasting, American Diplomacy. [online] Available at: <a href="http://www.unc.edu/depts/diplomat/item/2012/0106/ca/heil_quiet.html" class="uri">http://www.unc.edu/depts/diplomat/item/2012/0106/ca/heil_quiet.html</a></p>
<p>Herman, E. &amp; Chomsky, N. 1988. Manufacturing Consent: The Political Economy of the Mass Media, Pantheon Books (page no?).</p>
<p>Herman, E. 2000. The Propaganda Model: A Retrospective. Journalism Studies, Vol. 1, No.&nbsp;1: pp.&nbsp;101–112.</p>
<p>Kolsova, Olessia. 2006. News Media and Power in Russia, Routledge Press Publishing (see generally).</p>
<p>Kperogi, F.A. 2011. Cooperation with the Corporation? CNN and the Hegemonic Cooptation of Citizen Journalism Through iReport.com. New Media &amp; Society, Vol. 13, No.&nbsp;2: pp.&nbsp;314–329.</p>
<p>Josephi, B. 2005. Journalism in the Global Age: Between Normative and Empirical. International Communication Gazette, Vol. 67, No.&nbsp;6: pp. 575-590.</p>
<p>Loffe, Julia. 2010. What is Russia Today, Columbia Journalism Review. [online] Available at: <a href="http://www.cjr.org/feature/what_is_russia_today.php?page=all" class="uri">http://www.cjr.org/feature/what_is_russia_today.php?page=all</a></p>
<p>Lopez, Linette. 2011. RT - Russia’s global media warrior fights dirty, Global Media Wars, Columbia Journalism School. [online] Available at: <a href="http://globalmediawars.com/?page_id=76" class="uri">http://globalmediawars.com/?page_id=76</a></p>
<p>Massey, Nathaneal. 2011. CCTV - The voice of China’s “soft power”Global Media Wars, Columbia Journalism School. [online] Available at: <a href="http://globalmediawars.com/?page_id=61" class="uri">http://globalmediawars.com/?page_id=61</a></p>
<p>Mazumdar, S. 2011. New Media and Global Influence: The Story of China and India. Singapore: Asia Research Institute. (Ari Working Paper No. 165.)</p>
<p>McQuail, D. 2003. Public Service Broadcasting: Both Free and Accountable. The Public, Vol. 10, No.&nbsp;3: pp.&nbsp;13-28.</p>
<p>Pasquali, A. 2005. The South and the Imbalance in Communication. Global Media and Communication, Vol. 1, No.&nbsp;3: pp.&nbsp;289-300.</p>
<p>Price, M. 2002. The Transformation of International Broadcasting. Razón Y Palabra. [online] Available at: &lt;<a href="http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html" class="uri">http://www.razonypalabra.org.mx/anteriores/n23/23_mprice.html</a>&gt; [Accessed 25 February 2013].</p>
<p>Ruduša, R. 2010. Footprint of Financial Crisis in the Media. [pdf] Open Society Foundation. (Open Society Media Program, Footprint of Financial Crisis in the Media No.&nbsp;1.) Available at: &lt;<a href="http://www.opensocietyfoundations.org/sites/default/files/aa-overview-20091201_0.pdf" class="uri">http://www.opensocietyfoundations.org/sites/default/files/aa-overview-20091201_0.pdf</a>&gt;</p>
<p>Schiller, H. 1991. Not Yet the Post-Imperialist Era‖. Critical Studies in Mass Communication, Vol. 8, No.&nbsp;1: pp.&nbsp;13-28.</p>
<p>Scherr, Sonia. 2010. Russian TV Channel Pushes 'Patriot' Conspiracy Theories, Southern Poverty Law Center. [online] Available at: <a href="http://www.splcenter.org/get-informed/intelligence-report/browse-all-issues/2010/fall/from-russia-with-love" class="uri">http://www.splcenter.org/get-informed/intelligence-report/browse-all-issues/2010/fall/from-russia-with-love</a></p>
<p>Scott, J. 2005. America's Propaganda War. Salon. [online] Available at: &lt;<a href="http://www.salon.com/2005/03/03/propaganda_14/" class="uri">http://www.salon.com/2005/03/03/propaganda_14/</a>&gt; [Accessed 25 February 2013].</p>
<p>Watanabe, K. 2011. Dynamics of International News Environments: Comparative Analysis of Online News Services in the US and India. Master's Thesis, Central European University, Hungary.</p>
<p>Xin, X. 2010. Chindia's Challenge to Global Communication: A Perspective From China. Global Media and Communication, Vol. 6, No.&nbsp;3: pp.&nbsp;296-301.</p>
<p>Herman, E. &amp; McChesney, R. 1997. Global Media: The New Missionaries of Global Capitalism. New York: Continuum.</p>
<p>Rampal, K. &amp; Adams, W. 1990. Credibility of the Asian News Broadcasts of the Voice of America and the British Broadcasting Corporation. International Communication Gazette, Vol. 46, No.&nbsp;2: pp.&nbsp;93-111.</p>
<p>Cohen, R., Hart, P., Jackson, J., Petkovic, B., Watch, S. &amp; Williams, G. 2005. Who Is in Control? Brussels, Belgium: Printed by Druk. Hoeilaart for the International Federation of Journalists.</p>
<p>Djankov, S., McLiesh, C., Nenova, T. &amp; Shleifer, A. 2003. Who Owns the Media? Journal of Law and Economics, Vol. 47, pp.&nbsp;341-381.</p>
<p>Williams, G., Collin, A. &amp; Heyeckaus, K. 2005. Media Power in Europe: The Big Picture of Ownership. Brussels, Belgium: Printed by Druk. Hoeilaart for the International Federation of Journalists.</p>
<p>Pew Research Center's Project for Excellence in Journalism. 2012. A New Kind of Visual News. [online] Available at: &lt;<a href="http://www.journalism.org/analysis_report/youtube_news" class="uri">http://www.journalism.org/analysis_report/youtube_news</a>&gt; [Accessed 25 February 2013].</p>
<p>The Economist. 2009. High Wires. [online] Available at: &lt;<a href="http://www.economist.com/node/13109820" class="uri">http://www.economist.com/node/13109820</a>&gt; [Accessed 25 February 2013].</p>
<p>The Economist. 2010. Social Media: The people formerly known as the audience. [online] Available at: &lt;<a href="http://www.economist.com/node/18904124" class="uri">http://www.economist.com/node/18904124</a>&gt; [Accessed 25 February 2013].</p>
<p>The Economist. 2012. Unbiased and Unloved. [online] Available at: &lt;<a href="http://www.economist.com/node/21563298" class="uri">http://www.economist.com/node/21563298</a>&gt; [Accessed 25 February 2013].</p>
<p>The Guardian. 2010. Robert Booth, WikiLeaks cables claim al-Jazeera changed coverage to suit Qatari foreign policy. [online] Available at: <a href="http://m.guardian.co.uk/world/2010/dec/05/wikileaks-cables-al-jazeera-qatari-foreign-policy" class="uri">http://m.guardian.co.uk/world/2010/dec/05/wikileaks-cables-al-jazeera-qatari-foreign-policy</a></p>
<p>United States International Broadcasting Act of 1994. Title 22, Ch. 71, Sec. 6202(b)(3). Available at: &lt;<a href="http://uscode.house.gov/download/pls/22C71.txt" class="uri">http://uscode.house.gov/download/pls/22C71.txt</a>&gt;</p>
<p>Voice of America. 2013. Shayan Rashid, Language Services. [online] Available at: <a href="http://www.insidevoa.com/content/history-languages-111987754/177518.html" class="uri">http://www.insidevoa.com/content/history-languages-111987754/177518.html</a></p>
<p>CUSIB. 2012. Washington Times Op-Ed warns about pro-Putin bias in Voice of America Russian programs, Committee for U.S. International Broadcasting, [online] Available at: <a href="http://www.cusib.org/cusib/2012/02/09/washington-times-op-ed-warns-about-pro-putin-bias-in-voice-of-america-russian-programs/" class="uri">http://www.cusib.org/cusib/2012/02/09/washington-times-op-ed-warns-about-pro-putin-bias-in-voice-of-america-russian-programs/</a></p>
<p>World Press Councils. 2004. Minnesotans For Sustainability. [online] Available at: &lt;<a href="http://www.mnforsustain.org/media_world_press_councils.htm" class="uri">http://www.mnforsustain.org/media_world_press_councils.htm</a>&gt; [Accessed 25 February 2013].</p>
<p>Yushkiavitshus, Henrikas. 2004. The 18th Annual Harold W. Andersen Lecture, Why Press Freedom is Disappearing in the Post-Communist World, Lecture Series On Global Communications Issues, World Press Freedom Committee.</p>


</section>

<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@incollection{prakashIndependenceGlobal2014,
  author = {Prakash, Pranesh},
  editor = {Radsch, Courtney},
  publisher = {UNESCO},
  title = {Independence: Global Media},
  booktitle = {World trends in freedom of expression and media
    development},
  date = {2014-07-14},
  url = {https://unesdoc.unesco.org/ark:/48223/pf0000227025},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndependenceGlobal2014" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2014. <span>“Independence: Global Media.”</span> In
<em>World Trends in Freedom of Expression and Media Development</em>,
edited by Courtney Radsch. UNESCO. <a href="https://unesdoc.unesco.org/ark:/48223/pf0000227025">https://unesdoc.unesco.org/ark:/48223/pf0000227025</a>.
</div></div></section></div> ]]></description>
  <guid>https://pranesh.in/scholarly/books/prakash_2013_unedited--independence-global-media_unesco.html</guid>
  <pubDate>Thu, 06 Jun 2013 00:00:00 GMT</pubDate>
</item>
<item>
  <title>India’s Internet jam</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/articles/indias-internet-jam.html</link>
  <description><![CDATA[ 






<hr>
<blockquote class="blockquote">
<p>As authorities continue to clamp down on digital freedom, politicians and corporations are getting a taste for censorship too. <strong>Pranesh Prakash</strong> reports</p>
</blockquote>
<p>In a matter of three days, in August 2012, India’s central government ordered internet service providers to block around 309 pieces of online content – mostly individual web pages, YouTube videos and Facebook groups. The blocking orders came days after people originally from northeastern India living in Bangalore began fleeing the city in fear of attack. Rumours that some Muslims in the city were planning violence in retaliation for recent clashes between the indigenous Bodo tribe and Muslim settlers in Assam spread quickly via text messages and through the media. The Nepali migrant community in Bangalore also received text messages from their families, warning them that they might be mistaken for northeastern Indians and also be targeted. Indian Railway, catering to the huge demand, organised special trains to Assam for the crowds of people.</p>
<p>Freedom of speech is enshrined in the Constitution of India, which came into force in 1950, and specifically in Article 19(1)(a), which guarantees that ‘all citizens shall have the right to freedom of speech and expression’. While in the United States, it wasn’t until the 1920s that the Supreme Court struck down a law or governmental action on freedom of speech grounds, in India, just one year after the constitution was adopted, government actions against both left- and right-wing political speech were struck down for violating Article 19(1)(a). Enraged, the Congress government then amended Article 19, expanding the list of restrictions to the right to free expression. These included speech pertaining to ‘friendly relations with foreign states’, ‘public order’ and ‘incitement to an offence’. In 1963, in response to the 1962 war with China, the ‘sovereignty and integrity of India’ was also added, taking the number of categories of permissible restrictions up to eight. While the constitution categorically stipulates that no further restrictions should be imposed, courts have on occasion added to the list through judicial interpretation without explicitly stating that they are doing so. Comparisons are often drawn between the constitution’s ‘reasonable restrictions’ and the categorical prohibition enshrined in the US Constitution’s First Amendment: ‘Congress shall make no law … abridging the freedom of speech, or of the press’ – a meaningless comparison as there are indeed many categories of speech that are seen as being protected under the US constitution and even speech that is protected may be restrained in a number of ways.</p>
<p>Today, there are a number of laws that regulate freedom of speech in India, from the Indian Penal Code (IPC), the Victorian legislation meant to codify crimes, to the Information Technology Act, which was amended in 2008 and in some cases makes behaviour that is perfectly legal offline into a criminal activity when online.</p>
<section id="sedition-and-social-harmony" class="level2">
<h2 class="anchored" data-anchor-id="sedition-and-social-harmony">Sedition and social harmony</h2>
<p>The Indian Penal Code criminalises sedition; speech intended to cause enmity between communities; speech intended to ‘outrage religious feelings of any class’; selling, singing or displaying anything obscene; and defamation. It also prohibits ‘causing someone, by words or gestures, to believe they’re the target of divine displeasure’. Each of these provisions has been misused, as there are indeed many catagories of speech that are not seen as being protected under thw US constitution, and even speech that is protected may be restrained in a number of ways.</p>
<p>In recent years, sedition charges have been brought against human rights activists (Binayak Sen and Arundhati Roy), journalists (Seema Azad), cartoonists (Aseem Trivedi) and protesters (thousands of villagers in Koodankulam and neighbouring villages who demonstrated against a nuclear reactor in their area). It is usually the higher judiciary that dismisses such cases, while the lower judiciary seems to be supplicant to the bizarre claims of government, the police and complainants. Similarly, the higher judiciary has had to intervene in cases where books and films have been banned for ‘causing enmity between communities’ or for intentionally hurting the sentiments of a religious group.</p>
<p>Of the last six books banned by the Maharashtra government, all but one (RV Bhasin’s <em>Islam: A Concept of Political World Invasion by Muslims</em>) have been overturned by the Mumbai High Court. In one case, the court criticised the government for using a violent protest (organised by the Sambhaji Brigade, one of many right-wing political groups that frequently stage demonstrations) as reason enough for banning an academic book on the Maratha king Shivaji. In its decision, the judge pointed out that it is the government’s job to provide protection against such violence. Given India’s history of communal violence there is indeed a need for the law to address incitement to violence – but these laws should be employed at the actual time of incitement, not after the violence has already taken place. But, as recent events have shown, the government is willing to censor ‘harmful’ books and films and less likely to take action against individuals who incite violence during demonstrations.</p>
</section>
<section id="online-speech-and-the-law" class="level2">
<h2 class="anchored" data-anchor-id="online-speech-and-the-law">Online speech and the law</h2>
<p>There are regular calls for the government to introduce legislation that deals specifically with online behaviour, despite the fact that the vast majority of the laws regarding sedition and social harmony apply online as well as offline. One example is the recent move to introduce amendments to the Indecent Representation of Women Act (1986) so that it applies to ‘audiovisual media and material in electronic form’.</p>
<p>But the government’s attempts to control online speech began long before the introduction of any internet-specific legislation. Indeed, when state-monopoly internet service provider VSNL censored content, it did so under the terms of a contract it had entered with its customers, not under any law. In 1998, a mailing list called Middle East Socialist Network was blocked on national security grounds. In 1999, Pakistani newspaper <em>Dawn</em>’s website was blocked during the Kargil conflict. In both of the latter cases, the government relied on the Indian Telegraph Act (1885) to justify its actions, though that act contains no explicit provisions for such censorship.</p>
<p>In 2000, the Information Technology (IT) Act was passed and the Indian Computer Emergency Response Team (CERT-In) was created, which (unlawfully) assumed the role of official online censor. Importantly, while the IT Act did make the publication of obscene content online illegal (though it already was under the IPC), it did not grant permission for authorities to block websites. Despite this, an executive order passed on 27 February 2003 granted CERT-In the power to block. Had this been challenged in a court, it may well have been deemed unconstitutional since, in the absence of a statutory law, an executive order cannot reverse the freedom granted under Article 19. And although the telecommunications sector in India was being liberalised around this time, as part of their licence agreements, all internet service providers (ISPs) have to agree to block links upon being requested to do so by the government. In 2008, when the IT Act was amended, it clearly stated that the government can block websites not only when it deems it necessary to do so but also when it is deemed expedient in relation to matters of public interest, national security and with regard to maintaining friendly relations with foreign states. The power to block does not, however, extend to obscenity or defamation offences.</p>
<p>At the same time, further categories of speech crimes were introduced, along with other new offences, including the electronic delivery of ‘offensive messages through communication services’ or anything ‘for the purpose of causing annoyance or inconvenience’. This has often been abused, including by the chief minister of West Bengal, who issued proceedings against a professor for forwarding an email containing a cartoon that mocked him. Under this draconian and unconstitutional provision, the police do not need an arrest warrant and the punishment can be as much as three years’ imprisonment, longer than even the punishment for causing death by negligence. The amendment also granted the government extensive powers to monitor and intercept online speech and data traffic, greatly extending the powers provided under colonial laws such as the Indian Telegraph Act (1885).</p>
<p>As legislation has been introduced, the penalties for online offences have increased significantly. For example, the penalty for the first-time publication of an obscene ebook is up to five years in prison and a 1,000,000 rupee (US$18,800) fine, compared with two years’ imprisonment and a 2,000 rupee (US$38) fine as stipulated in the IPC for publishing that same material in print version. New laws introduced in 2009 pertain specifically to blocking (section 69a), interception, decryption and monitoring (69 and 69b) and are in accordance with the constitution. However, the amendments were brought in without any attempt at transparency or accountability.</p>
</section>
<section id="power-in-the-hands-of-intermediaries" class="level2">
<h2 class="anchored" data-anchor-id="power-in-the-hands-of-intermediaries">Power in the hands of intermediaries</h2>
<p>In April 2011, despite critical submissions received during its public consultation, the government announced new ‘intermediary guidelines’ and ‘cyber cafe rules’, both of which have adverse effects on freedom of expression.</p>
<p>The rules, which were issued by the Department of Information and Technology (DIT), grant not only the government but citizens significant powers to censor the internet. They require all intermediaries – companies that handle content, including web hosts, telecom companies, domain name providers and other such intermediaries – to remove ‘disparaging’ content that could ‘harm minors in any way’. They prohibit everything from jokes (if the person sharing the joke does not own copyright to it) to anything that is disparaging. In a recent case, in December 2011, thousands of people used the hashtag #=IdiotKapilSibal on Twitter to criticise the minister of communications and information technology, Kapil Sibal, who had requested that officials from Google, Microsoft, Yahoo! and Facebook in India pre-screen online content.</p>
<p>These guidelines and rules are badly drafted and unconstitutional, as they go beyond the limits allowed under Article 19 in the constitution. And do so in a manner that lacks any semblance of due process and fairness. They are inconsistent with offline laws, too: for example, because the guidelines also refer to gambling, the government of Sikkim can publish advertisements for its PlayWin lottery in newspapers but not online.</p>
<p>It’s far easier to persuade officials to remove online material than it is to persuade them to remove books from a bookstore or artwork from a gallery. Police are only empowered to seize books if the government or a court has been persuaded that it violates a law and issues such an order. This fact is always recorded, in government or legal records, police files or in the press. By contrast, web content can be removed on the basis of one email complaint; intermediaries are required to ‘disable’ the relevant content within 36 hours of the complaint. A court order is not required, nor is there a requirement to notify the owner of the content that a complaint has been received or that material has been removed. The effect is that of almost invisible censorship.</p>
<p>This assertion – that it only takes one complaint – may seem far-fetched. But a researcher from the Centre for Internet and Society sent complaints to several intermediaries on a number of occasions, resulting in content being removed in a majority of cases. If intermediaries choose not to take action, they risk losing their immunity against punishment for content. In essence, the law is the equivalent of punishing a post office for the letters that people send via the postal service.</p>
</section>
<section id="the-amendments-were-brought-in-without-any-attempt-at-transparency-or-accountability" class="level2">
<h2 class="anchored" data-anchor-id="the-amendments-were-brought-in-without-any-attempt-at-transparency-or-accountability">The amendments were brought in without any attempt at transparency or accountability</h2>
<p>In 1984, Indira Gandhi was forced to sue Salman Rushdie for defamation in a London court in order to ensure one sentence was expurgated from his novel <em>Midnight’s Children</em>. Today Gandhi wouldn’t need to win a lawsuit against publishers. She would merely have to send a complaint to websites selling the book and it would have to be removed from sale. It is easier to block Akbari.in – the online newspaper run by Vinay Rai, who filed a criminal complaint against multiple internet companies in December 2011 for all manner of materials – than it is to prevent its print publication.</p>
<p>There is no penalty for frivolous complaints, such as those sent by researchers from the Centre for Internet and Society, nor is there any requirement for records to be kept of who has removed what. Such great powers of censorship without any penalties for abuse of these powers are a sure-fire way of moving towards greater intolerance, with the internet – that republic of opinions and expressions – being a casualty.</p>
<section id="censorship-outside-the-law" class="level3">
<h3 class="anchored" data-anchor-id="censorship-outside-the-law">Censorship outside the law</h3>
<p>Since 2011, governments and private companies alike have increasingly engaged in internet censorship. In April 2011, in response to a right to information request, the DIT released a list of 11 websites that had been officially blocked under the IT Act since 2009, when the amended act came into force. But, according to a recent Google Transparency Report, government requests for the removal of material far exceeds that number. The report reveals that the government (including state governments) requested that Google remove 358 items from January 2011 to June 2011. Of this number, only eight were considered to be hate speech and only one item was related to concerns over national security. The remaining material, 255 items (71 per cent of all requests), was taken down because of ‘government criticism’. Criticism of the government is protected under the country’s constitution but, nonetheless, Google complied with take-down requests 51 per cent of the time. It’s clear, then, that governmental censorship is far more widespread than officially acknowledged.</p>
<p>In July 2011, Reliance Entertainment obtained a ‘John Doe’ order to protect its intellectual property rights with regard to its film <em>Singham</em>, which was scheduled for release that month. The order prohibited both online and offline infringement of copyright for the film and was sent to a number of ISPs, which then blocked access to file-sharing websites, even though there was no proof of the film having been available on any of them. According to Reliance Entertainment, they merely asked ISPs ‘not to make the film available’ on their networks, even though the order did not authorise it. But a right to information request pertaining to a similar case dealing with the distribution of the film <em>Dhammu</em> showed that the entertainment company’s lawyers had in fact asked for dozens of websites – not just deep-link URLs to infringing content – to be blocked, despite publicly claiming otherwise. If web users encountered any information at all about why access to the sites was blocked, it was that the Department of Telecom had ordered the blocking, which was plainly untrue. In February 2012, following a complaint from the Indian Music Industry (a consortium of 142 music companies), the Calcutta High Court ordered 387 ISPs to block 107 websites for music piracy. At least a few of those, including <a href="http://paktimes.com/">Paktimes.com</a> and <a href="http://filmicafe.com/">Filmicafe.com</a>, were general interest entertainment sites. The most famous of these sites, <a href="http://songs.pk/">Songs.pk</a>, re-emerged shortly after the block as <a href="http://songspk.pk/">Songspk.pk</a>, highlighting the pointlessness of the block. And outside the realm of copyright, in December 2011, the domain name <a href="http://cartoonsagainstcorruption.com/">CartoonsAgainstCorruption.com</a> was suspended based on an unlawful complaint from the Mumbai police requesting its suspension, despite there being no powers for them to do so under any law.</p>
<p>Between August and November 2011, the DIT also went to great efforts to compel big internet companies including Indiatimes, Facebook, Google, Yahoo!, and Microsoft, to ‘self-regulate’. This revealed the department’s desire to gain ever greater powers to control ‘objectionable’ content online, effectively bypassing the IT Act. It’s obvious, too, that by encouraging internet companies to ‘self-regulate’ the government will avoid embarrassing statistics such as those revealed by Google’s Transparency Report.</p>
</section>
<section id="new-dangers" class="level3">
<h3 class="anchored" data-anchor-id="new-dangers">New dangers</h3>
<p>A way forward, at least for internet-specific laws, could be to rekindle the Cyber Regulations Advisory Committee – a multi-stakeholder committee required by the IT Act – and to practise at home what we preach abroad on matters of internet governance: the value of a multi-stakeholder system, which includes industry, academia and civil society and not just governments. The idea of a multi-stakeholder framework has gained prominence since it was placed at the core of the ‘Declaration of Principles’ at the first World Summit on Information Society in Geneva in 2003. It has also been at the heart of India’s pronouncements at the Internet Governance Forum and the India-Brazil-South Africa Dialogue Forum. The Internet Governance Division, which formulates the country’s international stance on internet governance, has long recognised that these decisions must be taken in an open and collaborative manner. It is time the DIT’s Cyber-Law and ESecurity Group, which formulates the country’s national stance on the internet, realises the same.</p>
<p>Freedom of speech means nothing in a democratic society if it does not allow everyone to speak. Despite the internet being a very elite space, the number of people who have used it to express themselves since its introduction in India in 1994 is vast, especially when compared to the number of people in India who have expressed themselves in print since 1947 when the country won its independence. Online speech is indeed a big shift from edited and usually civil discussions in the world of print media. Perhaps this gives us some indication of why there is some support among the mass media for government regulations on speech. Too many discussions of online speech laws in India descend into arguments about the lack of civility online. However, the press – and all of us – would do well to remember that civility and decency in speech, while desirable in many contexts, cannot be the subject of legislation.</p>
<p>But in India, the greatest threat to freedom of expression is not a government clampdown on dissent but threats from political and corporate powers with a range of tools at their disposal, including fostering a climate of self- censorship. The government has passed bad laws that have given way to private censorship. And many of these laws are simply a result of gross ineptitude.</p>
<p>We cannot take sufficient comfort in the fact that, in India, censorship is limited and nowhere on the scale that it is in China or Iran. It is crucial that, from a legal, cultural and technological standpoint we do not open the door for further censorship. And currently, we are failing.</p>
</section>
</section>
<section id="biographies" class="level2">
<h2 class="anchored" data-anchor-id="biographies">Biographies</h2>
<p><strong>Pranesh Prakash</strong> is programme manager at the Centre for Internet and Society in Bangalore. Part of this article appeared in a blog by the author on the centre’s website, <a href="http://cis-india.org/">cis-india.org</a>, in January 2012</p>
<p><strong>Article first published online</strong>: November 30, 2012</p>
<p><strong>Issue published</strong>: December 2012</p>


</section>

<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@article{prakashIndiaInternet2012,
  author = {Prakash, Pranesh},
  title = {India’s Internet Jam},
  journal = {Index on Censorship},
  volume = {41},
  number = {4},
  pages = {72-80},
  date = {2012-12},
  urldate = {2019-01-15},
  url = {https://doi.org/10.1177/0306422012467577},
  doi = {10.1177/0306422012467577},
  langid = {en},
  abstract = {As authorities continue to clamp down on digital freedom,
    politicians and corporations are getting a taste for censorship
    too.}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashIndiaInternet2012" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2012. <span>“India’s Internet Jam.”</span> <em>Index
on Censorship</em> 41 (4): 72–80. <a href="https://doi.org/10.1177/0306422012467577">https://doi.org/10.1177/0306422012467577</a>.
</div></div></section></div> ]]></description>
  <category>Freedom of expression</category>
  <guid>https://pranesh.in/scholarly/articles/indias-internet-jam.html</guid>
  <pubDate>Sat, 01 Dec 2012 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Exhaustion: imports, exports, and the doctrine of first sale in Indian copyright law</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <link>https://pranesh.in/scholarly/articles/exhaustion_imports-exports-and-the-doctrine-of-first-sale-in-indian-copyright-law.html</link>
  <description><![CDATA[ 






<p>In this short note[^1], I argue that Indian courts have fundamentally misunderstood the doctrine of first sale, and consequently have wrongly held that parallel importation is disallowed by Indian law. I further look at the ingenuity displayed by a court in prohibiting export of low-priced editions from India, and comes to the conclusion that this is also wrong in law. Finally I note that there is an easy way out a way out of this quagmire that we find ourselves in due to judicial inventions: that of accepting a proposed amendment to the Copyright Act.</p>
<section id="i.-can-foreign-works-be-copyrighted-works" class="level2">
<h2 class="anchored" data-anchor-id="i.-can-foreign-works-be-copyrighted-works">I. Can foreign works be copyrighted works?</h2>
<p>Section 13(2) of the Indian Copyright Act states that insofar as published works go, copyright only subsists if “the work is first published in India” or if the work is by an Indian citizen. It does except the application of this section to all those works to which ss.40 and 41 of the Act apply. Section 40 allows for the provisions of the Act to be extended to foreign works and foreign authors by special order of the government. The government is required to do so, being a member of the Berne Convention, the Universal Copyright Convention as well as the TRIPS Agreement, and has fulfilled its requirement via International Copyright Order, the latest such order having been issued in 1999.</p>
<p>Thus, for purposes of our law, we protect not only Indian works, but foreign works as well. It expressly places foreign authors and works published in a foreign country in the same shoes as Indian authors and works published in India, respectively.</p>
</section>
<section id="ii.-import-of-copyrighted-works" class="level2">
<h2 class="anchored" data-anchor-id="ii.-import-of-copyrighted-works">II. Import of copyrighted works</h2>
<p>Thus having established that foreign books enjoy protection under Indian law, we now turn to the question of whether import of foreign works into India is permissible under Indian law. There is no provision of the Copyright Act by which the owner or licensee of copyright given the exclusive right to import a copyrighted work into India. Section 51(b)(iv) does, however, make it illegal to import <em>infringing</em> copies of a work.<sup>1</sup> It is clear that illegally published copies are infringing copies, and thus cannot be imported. But are legally published copies that are legally purchased outside of India also ‘infringing copies’ and is their import also prohibited by the section 51?</p>
<p>This question is laid out in :</p>
<blockquote class="blockquote">
<p><em>We now arrive at one of the most difficult topics in copyright law. It is our ambition to expound this subject as clearly as possible but inevitably this involves exposing some troublesome problems which lurk not far beneath the surface. The basic idea is simple. It has long been the policy of copyright law in the UK and other countries which follow our system that as a rule, mere selling or other secondary dealings with articles manufactured in the home market shall not be treated as copyright infringement unless their marking was piratical in the first place. Further, it is policy that traders should be free to buy and sell goods without getting involved in copyright proceedings, so long as they do so in good faith. “Don’t deal in pirate copies where you can tell they are probably such” is a law anyone can understand. Dealing in pirate copies where you know or have reason to believe that they are such is called secondary infringement in contrast to primary infringement (e.g., manufacturing) where liability is strict.</em></p>
</blockquote>
<blockquote class="blockquote">
<p>*This idea works fine as long as one does not need to examine too closely what one means by pirate copies; it is usually pretty obvious. However, when it comes to parallel imports it is not so obvious, and one has to know precisely what is meant. It is plain that the test cannot be **whether the copy was made piratically in its country of origin because the copyright laws of foreign states are irrelevant so far as rights in the UK are concerned, and in some cases these laws may not even exist. Since foreign copyrights are separate and distinct rights, and since it is commonplace for these to be assigned so as to be exploited by different hands, it cannot matter whether a copy imported from Britannia was lawfully made in its country of origin; this principle has been recognized from an early date.”*</p>
</blockquote>
<p>According to s.2(m) of the Act, a reproduction of a literary, dramatic, musical or artistic work , a copy of a film or sound recording is an ‘infringing copy’ “if such reproduction, copy or sound recording is made or imported in contravention of the provisions of this Act”. So s.2(m) does not clarify matters either, because it applies only to that importation that is “in contravention of the provisions of” the Copyright Act. So we look to s.14 which lays down the meaning of copyright and is read with s.51 when determining what does and does not constitute infringement. Nowhere in s.14 of the Act is a right to import granted to the copyright owner. However, s.14 does clearly lays down that insofar as literary, dramatic or musical works go, it is the copyright owner’s exclusive right “to issue copies of the work to the public not being copies already in circulation”. The explanation to this section goes to clarify that “for the purposes of this section, a copy which has been sold once shall be deemed to be a copy already in circulation.” What this means and how this has been construed by various courts shall be seen in the following sections.</p>
</section>
<section id="iii.-judicial-history-on-importation" class="level2">
<h2 class="anchored" data-anchor-id="iii.-judicial-history-on-importation">III. Judicial history on importation</h2>
<section id="a.-penguin-case" class="level3">
<h3 class="anchored" data-anchor-id="a.-penguin-case">A. <em>Penguin</em> case</h3>
<p>The issue of parallel importation first reached the higher judiciary in 1984 when the Delhi High Court, in the case of <em>Penguin Books Ltd.&nbsp;v. India Book Distributors &amp; Ors.</em>,<sup>2</sup> was called upon to pronounce judgment on whether import by a third party without the express authorization of the copyright owner constitute infringement. The court, bizarrely, ruled that it constituted infringement because it constituted a violation the owner’s right to publish:</p>
<blockquote class="blockquote">
<p><em>While publication generally refers to issue to public, importation for the specified purpose may be a necessary step in the process of issuing to the public, and therefore of publishing. It appears to me that the exclusive right of [the copyright owner] to print, publish and sell these titles in India would extend to the exclusive right to import copies into India for the purpose of selling or by way of trade offering or exposing for sale the hooks in question. This is the true meaning of the word ‘publish’ as used in section 14(1)(a)(4).</em></p>
</blockquote>
<blockquote class="blockquote">
<p><em>It is also an infringement of copyright knowingly to import into India for sale or hire infringing copies of a work without the consent of the owner of the copyright, though they may have been made by or with the consent of the owner of the copyright in the place where they wore made.</em></p>
</blockquote>
<p>It should be noted that prior to the 1994 amendment of the Copyright Act, the first two clauses of s.14 read: “(i)to reproduce the work in any material form; (ii) to publish the work”. Thus this judgment extends the right to “publish the work” (or in the words of the judge, “print, publish and sell”) to include a right of importation out of thin air, simply by stating that it appears so. While the judge notes that “publication” under the Act (in 1984) was defined as meaning: “the issue of copies of the work, either in whole or in part, to the public in a manner sufficient to satisfy the reasonable requirements of the public having regard to the nature of the work”, he does not explain how importation is subsumed under that definition contrary to a plain reading of the law. Finally, the judge does note that, “It is true that India Distributors are not printing these books and are not guilty of what is called primary infringement”, but goes on to state however that “when they issue copies of these titles for public distribution they are guilty of secondary infringement”. These categories are created, but neither explained nor explored in the judgment. One other legal nuance that was examined was the allowance granted to the Registrar of Copyright under s.53 to “order that copies made out of India of the work which if made in India would infringe copyright shall not be imported.” The judge noted that the words “infringing copy” as contained in s.53 could not be different in meaning from the same words contained in s.51(b). The implication of this shall be demonstrated shortly.</p>
<p>Importantly, the judgment does not look into s.16 of the Act which states that there shall be no copyright except as provided by the Act, and how this should prevent a judge from expanding the rights provided in the law to include a new judicially-created right to prevent imports.</p>
<section id="privity-of-contract" class="level4">
<h4 class="anchored" data-anchor-id="privity-of-contract">1. Privity of contract</h4>
<p>Nowhere in the judgment does the judge explain how an exclusive distribution contract between two parties can affect a third party in violation of the well-held principle of privity of contract. This is an important issue because in effect, the judgment makes a third party bound by the contract entered into by two private parties. The parties agree <em>inter se </em>(for example) to ensure that the India distributor does not sell the book outside of India and that the owner of rights will not give the right to sell in India to any other person. How could this contract between those two parties come in way of a third person buying from a foreign market and importing into India? If it was the case of an exclusive UK licensee selling in India, then both the exclusive Indian licensee as well as the owner of the copyright would have cause of action in India on the basis of both violation of contract as well as violation of copyright (for exceeding his territorial licence). However, a third party who buys from a stream of commerce cannot be bound by these contracts because he becomes the owner of the book and not a licensee. Thus, the judgment makes a contract between two private parties, which merely creates a right <em>in personam</em>, applicable to the entire world. By doing this it allows a contract to create a right <em>in rem</em> without any express provision of the law doing do. Indeed, this issue was examined by the United State Supreme Court in 1908 in the case of *Bobbs-Merrill Co.&nbsp;v. **Straus*,<sup>3</sup> in which the doctrine of first sale was judicially evolved.</p>
</section>
<section id="doctrine-of-first-sale-exhaustion" class="level4">
<h4 class="anchored" data-anchor-id="doctrine-of-first-sale-exhaustion">2. Doctrine of first sale / exhaustion</h4>
<p>Importantly, nowhere in the judgment does the judge bother to go into the details of the interaction between the sale of a copy of a book (upon the occurrence of which no further conditions can be laid) and the Copyright Act. If I sell you a bicycle laying down a condition that you cannot re-sell that bicycle, such a condition cannot be upheld in a court of law because by sale I divest all saleable interest I have in the bicycle. This principle is what is embodied in ss.10 and 11 of the Transfer of Property Act. Section 10 states: “Where property is transferred subject to a condition or limitation absolutely restraining the transferee or any person claiming under him from parting with or disposing of his interest in the property, the condition or limitation is void, except in the case of a lease where the condition is for the benefit of the lessor or those claiming under him:. In the same vein, s.11 states: “Where, on a transfer of property, an interest therein is created absolutely in favour of any person, but the terms of the transfer direct that such interest shall be applied or enjoyed by him in a particular manner, he shall be entitled to receive and dispose of such interest as if there were no such direction.” Thus, by selling of a copy of a book (as opposed to a licensing the book), I divest myself of all saleable interests in that particular copy of the book (though not copyright). I cannot prevent you from re-selling that book. However, copyright law would require that you can only re-sell a copy of a book without the owner’s permission, and cannot sell it without the owner’s permission. This is known as the doctrine of first sale, which evolved as a <em>via media</em> between copyright law, which gave the owner of copyright rights in a book, and property law, which gave the buyer of a book rights in her particular copy of the book.</p>
<p>The best appreciation of this doctrine of first sale (also known as ‘exhaustion of rights’) has come in a judgment by Justice Ravindra Bhat,<sup>4</sup> who states the meaning of the doctrine very clearly:</p>
<blockquote class="blockquote">
<p><em>The doctrine of exhaustion of copyright enables free trade in material objects on which copies of protected works have been fixed and put into circulation with the right holder’s consent. The “exhaustion” principle in a sense arbitrates the conflict between the right to own a copy of a work and the author’s right to control the distribution of copies. Exhaustion is decisive with respect to the priority of ownership and the freedom to trade in material carriers on the condition that a copy has been legally brought into trading. Transfer of ownership of a carrier with a copy of a work fixed on it makes it impossible for the owner to derive further benefits from the exploitation of a copy that was traded with his consent. The exhaustion principle is thus termed legitimate by reason of the profits earned for the ownership transfer, which should be satisfactory to the author if the work is not being exploited in a different exploitation field.</em></p>
</blockquote>
<blockquote class="blockquote">
<p><em>Exhaustion of rights is linked to the distribution right. The right to distribute objects (making them available to the public) means that such objects (or the medium on which a work is fixed) are released by or with the consent of the owner as a result of the transfer of ownership. In this way, the owner is in control of the distribution of copies since he decides the time and the form in which copies are released to the public. Content-wise the distribution right are to be understood as an opportunity to provide the public with copies of a work and put them into circulation, as well as to control the way the copies are used. The exhaustion of rights principle thus limits the distribution right, by excluding control over the use of copies after they have been put into circulation for the first time.</em></p>
</blockquote>
</section>
<section id="amendment-to-the-act" class="level4">
<h4 class="anchored" data-anchor-id="amendment-to-the-act">3. 1994 Amendment to the Act</h4>
<p>Interestingly, the <em>Penguin</em> judgment was sought to be overturned by an amendment to s.14 in 1994. That amendment removed the right to “publish”, and instead made it a right to “to issue copies of the work to the public not being copies already in circulation”. It stands to reason that this not only ensures the centrality of the doctrine of first sale in India, but also allows for <em>international </em>exhaustion, thus allowing for parallel import. This is clear from the fact that we, in Indian law (as per s.40), makes it clear that “all or any provisions of this Act shall apply to work first published in any class territory outside India to which the order [under s.40] relates in like manner as if they were first published within India”. Thus even books published internationally are, under the legal fiction under s.40, akin to books published in India. Since we are granting foreign works all the protection under the Act as though they had been published in India by Indian authors, it is but natural that they should be subject to all the same limitations as well (such as the doctrine of first sale).</p>
<p>As one commentator puts it, “with amendments, the decision of the <em>Penguin </em>case is no more the law. Like most other nations, we have also accepted the principle of international exhaustion. This seems to be after taking into view the public interest angle. ”<sup>5</sup> Unfortunately, legal commentators seemed to have paid greater attention to legislative changes than did the courts.</p>
</section>
</section>
<section id="b.-eurokids-case" class="level3">
<h3 class="anchored" data-anchor-id="b.-eurokids-case">B. Eurokids case</h3>
<p>In 2005 the same issue of parallel importation in literary works arose before the Bombay High Court. Highly unfortunately, the decision by the Bombay High Court was even more ill-reasoned than that of the Delhi High Court in the <em>Penguin</em> case. Nowhere in the judgment is the issue of the first sale doctrine, on which the issue of parallel importation rests, even cursorily examined. Nowhere is the amendment to s.14 of the Copyright Act even noted. Indeed, the only time that s.14 is even mentioned is when the section is quoted to establish it as providing the meaning of ‘copyright’ in Indian law. The implications of s.14 in terms of exhaustion of rights are simply not examined. Section 2(m) of the Act, which it is necessary to examine (as shown above) to understand what to make of of the phrase “infringing copy” in s.51, is not even mentioned once. As per the logic of the judgment, any copy that is sold in India by a third party in contravention of a exclusive licence contract is automatically assumed to be infringing. Thus, once again, copyright law magically overrides the concept of privity of contract without so much as an explanation.</p>
<p>Most importantly, because the case relies on the <em>Penguin</em> decision without having noticed and accounting for the subsequent change in the text of the law because of the 1994 amendment, it should be held to be <em>per incuriam</em>, and should not act as a precedent.</p>
</section>
<section id="c.-warner-bros.-case" class="level3">
<h3 class="anchored" data-anchor-id="c.-warner-bros.-case">C. Warner Bros.&nbsp;case</h3>
<p>In 2009, the Delhi High Court pronounced yet another verdict on parallel importation in the case of <em>Warner Bros.&nbsp;v. Santosh V.G</em>. However, this was a case on DVDs, and not on books. While the court correctly understands the meaning of the first sale doctrine in terms of literary works (and thus becoming the first judgment to explicitly talk about this doctrine), it is open to debate whether it was correct in its ruling on the inapplicability of the doctrine when it came to cinematograph films. The reasoning of the court (in paragraphs 77 and 78) as to why parallel importation is not allowed under Indian law is faulty, and is worth quoting <em>in extenso</em>:</p>
<blockquote class="blockquote">
<p><em>In this case the copies that are being let out for rent/hire by the Defendant are not made in India. Rather, they have been made in the US and imported into India. As noticed earlier, copyright in a work published abroad, in a Berne Convention country, like the United States, entitles its owner to assert copyright in India; such rights are “as if” the works were published in India (Section 40 and provisions of the Order). An infringing copy is one “made or imported in contravention of the provisions of this Act”. In this context, the proviso to Section 51(b)(iv), in the court’s view, provides they key to Parliamentary intention. It carves only one exception, permitting “import of one copy of any work for the private and domestic use of the importer”. The plaintiffs’ argument is that there would have been no need to enact this exception, if there were no restriction on import of cinematograph films, genuinely made outside India. The effect of the proviso to Section 51(b)(iv) is plainly, not to relax the importation of genuinely made cinematographic films but to allow for the importation of one copy of any work “for the private and domestic use of the importer” This would mean that the proviso allows for the importation of an infringing work, for private and domestic use of the importer, and not commercial use.</em></p>
</blockquote>
<p>Quite obviously there are some glaring problems in the court’s reasoning. The proviso to section 51(b)(iv) does indeed carve out an exception, but that exception is for <em>infringing</em> copies of a work, and not for <em>non-infringing </em>or ‘genuine’ copies. The plaintiffs’ argument, according to the judge, is: If all genuine copies of the cinematograph film could be legally imported, there would be no need to enact this exception. However, there could well be a need to enact this exception to cover a single <em>non-genuine</em> copy of a cinematograph film. It is precisely because of this that the exception is so very narrow, being for not only private use, as in s.52(1)(a), but of a single copy of a work and that too only for “private and domestic use”. This possibility of allowing import of a non-genuine copy is completely overlooked by the judge. The judgment continues:</p>
<blockquote class="blockquote">
<p><em>The defendant’s argument that the plaintiffs lost the power to deal with the copy, once placed in the market place, in the United States, is also unsupportable as too broad a proposition. In the context of the Act, the argument is more hopeful, than convincing. Even in the United States, it has been held (</em>United States v. Wise<em>, 550 F.2d 1180, 1187 (9th Cir. 1977)) that though, after “first sale,” a vendee “is not restricted by statute from further transfers of that copy”, yet a first sale does not, however, exhaust other rights, such as the copyright holder’s right to prohibit copying of the copy he sells. The Federal Appellate court noted that “other copyright rights (reprinting, copying, etc.) remain unimpaired”. It is clear therefore that the copies in question are infringing copies. Therefore, their importation, and more importantly, use for any of the purposes under Section 51, other than the one spelt out in it the proviso is in contravention of the Act. The question, however, is whether the action of the Defendants amounts to infringement of the copyright of the Plaintiffs. This must be answered independently of the question of whether parallel importation of copyrighted goods is permissible under Indian copyright law.</em></p>
</blockquote>
<p>While the reading of the law is correct (i.e., the first sale doctrine does not exhaust all rights, but merely the right to prevent further transfers), the application of the law to the facts is incorrect. In this case, the fact situation before the court was not of “reprinting, copying, etc.”, but of the physical transfer of copies of a work bought in the US into India. As is noted in <em>United States v. Wise</em>, “after first sale,” the buyer “is not restricted by statute from further transfers of that copy”. Indeed, this was case can be seen as exactly such a “further transfer” (of the rights over that copy from a shop in the US to the buyer in India). How the judge misreads the argument as being about something other than transfer of property rights in a copy (and more as something akin to reproduction), and concludes that “it is clear therefore that the copies in question are infringing copies,” is not clear.</p>
<p>However, the verdict of the court does not proceed on this ground alone, and involves discussion of the doctrine of first sale with regard to cinematograph films, the provisions of s.53, which apply only to cinematograph films, none of which are applicable in case of literary works.</p>
</section>
</section>
<section id="iv.-export-of-copyrighted-works" class="level2">
<h2 class="anchored" data-anchor-id="iv.-export-of-copyrighted-works">IV. Export of copyrighted works</h2>
<p>Now that we have dealt with the traditionally contentious part on imports, we may now examine the rare, but even more contentious issue of exports. Barring a few exceptions, notably the United States, the copyright law in no country regulates exports. Even in the United States, s.602 of their Copyright Act regulates only the export of <em>infringing</em> copies (i.e., works that are ‘manufactured’ without the permission of the author), and not the export of legal copies. In India, though, there are two judgments of the Delhi High Court that seemingly make illegal export from India of legal copies of a copyrighted work. As one of these decisions is an <em>ex parte</em> order without any reasoning—indeed calling the reasoning “bare minimum” would be doing that phrase a disservice—we shall focus only on the other judgement: the one pronounced by Justice Manmohan Singh in <em>John Wiley &amp; Sons v. Prabhat Chander Kumar Jain</em>.<sup>6</sup></p>
<p>The facts of the judgment are rather simple. John Wiley &amp; Sons Inc., based in New York, exclusively licensed the rights over certain books to Wiley India Pvt. Ltd.&nbsp;(all the other plaintiffs follow the same model, so we shall restrict ourselves to the case of the Wiley corporation). These books were sold at a reduced cost in the Indian market and were clearly labelled as being “Wiley Student Edition restricted for sale only in Bangladesh, Myanmar, India, Indonesia, Nepal, Pakistan, Philippines, Sri Lanka and Vietnam”. Another label on the same book read: “The book for sale only in the country to which first consigned by Wiley India Pvt. Ltd and may not be re-exported. For sale only in: Bangladesh, Myanmar, India, Indonesia, Nepal, Pakistan, Phillippines, Sri Lanka and Vietnam.”<sup>7</sup> Quite clearly, John Wiley &amp; Sons, being the owner of the rights, had given exclusive license to Wiley India Pvt. Ltd.&nbsp;to publish and print an English Language reprint edition only in the territories entailed in the agreement and not beyond that. Further, they wished to impose this restriction on all buyers of the book by way of that notice and attached conditionality, and thus prevent exports to the United States.</p>
<p>At this stage, it would do us well to dwell into the facts of the 1908 US Supreme Court case of <em>Bobbs-Merrill Co.&nbsp;v. Straus.</em><sup>8</sup> In this case, the plaintiff-appellant sold a copyrighted novel with a clear notice under the copyright notice stating that, “The price of this book at retail is $1 net. No dealer is licensed to sell it at a lower price, and a sale at a lower price will be treated as an infringement of the copyright”. Macy &amp; Co., a famous retailer, purchased large lots of books both at wholesale prices and at retail prices, and re-sold the books to its customers at 89 cents a copy. This was quite clearly in violation of the condition imposed by the notice.</p>
<p>It may be seen that the facts in this case quite clearly mirror the fact situation in <em>John Wiley &amp; Sons v. Prabhat Chander Kumar Jain</em>. It is only the nature of the conditionality that differentiates the two cases: in the one it was a restriction on price at which the book could be further sold, in the other it was a restriction on where the book could be further sold. How did the judge rule in <em>Bobbs-Merrill Co.&nbsp;v. Strauss</em>? The court ruled that it was on the record that Macy &amp; Co.&nbsp;had knowledge of the notice. However, despite that, the notice was held not to be binding on Macy &amp; Co.&nbsp;The court noted:</p>
<blockquote class="blockquote">
<p><em>The precise question, therefore, in this case is, ‘Does the sole right to vend secure to the owner of the copyright the right, after a sale of the book to a purchaser, to restrict future sales of the book at retail, to the right to sell it at a certain price per copy, because of a notice in the book that a sale at a different price will be treated as an infringement, which notice has been brought home to one undertaking to sell for less than the named sum’? We do not think the statute can be given such a construction … In our view the copyright statutes, while protecting the owner of the copyright in his right to multiply and sell his production, do not create the right to impose, by notice, such as is disclosed in this case, a limitation at which the book shall be sold at retail by future purchasers, with whom there is no privity of contract … To add to the right of exclusive sale the authority to control all future retail sales, by a notice that such sales must be made at a fixed sum, would give a right not included in the terms of the statute, and, in our view, extend its operation, by construction, beyond its meaning, when interpreted with a view to ascertaining the legislative intent in its enactment.</em></p>
</blockquote>
<p>This judgment proceeded on privity of contract, the <em>factum</em> of a sale having occurred, and created what is now known as the doctrine of first sale: an established principle that the exclusive right to sell, distribute, or circulate a copy of the copyrighted work exhausts the moment the item is placed into a stream of commerce through a sale. This can, of course, be contradicted if explicitly stated so in a statute.<sup>9</sup> However, as we noted earlier, the Indian statute explicitly notes that the right to issue copies of a work to the public, guaranteed to the owner of the copyright over a literary, dramatic, or artistic work is restricted to copies not already in circulation. Thus it might seem to one to be quite clear how the court would in the <em>John Wiley &amp; Sons </em>case. One would then be wrong.</p>
<p>In fact, Justice Manmohan Singh, in a very detailed and circuitous judgment, rules that the activity done by the defendant is a violation not of some implied contract between Wiley India Pvt. Ltd.&nbsp;And him, but that it constituted a violation of the Indian Copyright Act, and notably s.51 of the Copyright Act. How does he reach this conclusion?</p>
<p>His reasoning rests on 3 dubious pillars: 1) that the rights of the licensee are distinct from that of the owner, and that the former may get exhausted without affecting the latter; 2) that the licensee cannot pass on better title to those that buy from him than he himself has; 3) that sale or even offer for sale or taking of orders for sale are all forms of putting into circulation or issuance of copies.</p>
<p>First, through a close reading of the various provisions of the Copyright Act he notes that the Act creates a clear difference between the rights of the owner and the rights of the licensee (paras 47–50). He then finally comes to noting that, “A logical corollary drawn from above analysis which needs reiteration at this stage is that for the purposes of Section 51 which is in the preceding chapter, the term owner of the copyright does not include exclusive licensee. Thus, the rights of the owner although may include rights of the exclusive licensee but the court cannot read the term owner of the copyright as that of the exclusive licensee and their rights are different as per the allocation by the owner.” (para 62).</p>
<p>Thus, he establishes that some rights of the licensee may be extinguished (as per the doctrine of exhaustion) without extinguishing that same right of the owner. In other words, while the right of circulation of the licensee get exhausted, the right of circulation of the owner remains unaffected. Justice Singh doesn’t go into the implications of this, but there can be two ways of interpreting what this means. It could mean that by virtue of the circulation rights of the licensee getting exhausted, the circulation right of the owner gets exhausted in those nine countries for which the licensee had been granted rights of circulation. Else, it could mean that the exhaustion of the licensee’s circulation rights does not at all affect the owner’s circulation rights. This latter one is obviously an absurd idea, since that would, in all cases, leave the owner with a cause of action in case of all sales even when the owner is in India. Thus one is left considering the former the only logical meaning.</p>
<p>However, that this can’t possibly be right is demonstrated by the fact that this can easily be applied to an all-in-India transaction as well. Thus, for instance, the owner of rights can decide never to directly sell any book, but only allow its licensees to sell. Thus, it can contractually bind a licensee to sell only in Andhra Pradesh and hold that because of that license contract any buyer who buys from the Andhra Pradesh licensee and decides to re-sell to a second-hand bookstore in Karnataka is actually violating the terms of the license (because the circulation right gets extinguished only insofar as the licensee is concerned, and that license only allows sales in Andhra Pradesh).</p>
<p>That is obviously cannot be held to be the purpose of the law. Thus, the privity of the contract between the owner of the right and the licensee must be upheld and may not be held to bind a third party purchaser.</p>
<p>The second ground on which Justice Singh rules is on the general property law principle that a person cannot pass on a better title than she herself has. Thus, Justice Singh holds that when the licensee sells a book to a person, that person only receives as much of the title to that book that the licensee has. Thus, since the licensee only has title in the book insofar as those nine countries go, the person who buys that book cannot get better title.</p>
<p>The plain fault in this reasoning is the very founding basis of the doctrine of first sale: the differentiation between property rights in a copy of a book and the copyright in the book. No one has contended in this case that the transaction between the licensee and the book purchaser is not a sale. Once a sale happens, all property rights in that copy of the book are alienated to the book purchaser. It must be remembered that this transaction is not the case of the licensee sub-licensing the right to circulate the book. The licensee cannot sub-license to another party the right to sell the book in, say, Australia, because she doesn’t have that right in the first place. However in this case, the licensee is <em>invoking</em> the right to sell the book in India, and is not <em>passing on</em> that right. The right of a book buyer to re-sell comes from the statute—from the doctrine of first sale—and not from a passing on of that right from the licensee.</p>
<p>The last pillar of the judge’s reasoning is that the sale—or even offer for sale, or taking of orders for sale—of a book online are all forms of putting into circulation or issuance of copies. Section 40 does not work two ways. It only deems a foreign work “Indian”, and does not deem a sale in a foreign land the same as sale in India. Thus, even if we are to accept the other two pillars of Justice Singh’s reasoning, it is unclear how an offer made online to sell a book is equated to actually placing a book in circulation in India. How can an India law prohibit circulation on the streets of Bogotá? This is only possible if a separate right of export is recognized. But Justice Singh is extremely clear that he is not creating such a distinct right.</p>
<p>A notice to the buyer that re-exports are prohibited cannot be held to constitute a valid contract because the Transfer of Property Act clearly makes such a prohibition invalid (ss.10 and 11)—after all, it is a sale that takes place and not a license—as does the Copyright Act (s.14).</p>
</section>
<section id="v.-amendment-to-section-2m" class="level2">
<h2 class="anchored" data-anchor-id="v.-amendment-to-section-2m">V. Amendment to Section 2(m)</h2>
<p>There has been much controversy lately with some publishers trying to stop the government from amending s.2(m) of the Indian Copyright Act, clarifying that a parallel import will not be seen as an “infringing copy”. Some lawyers for the publishing industry have made the claim that allowing for parallel importation would legally allow for the exports of low-priced edition and overturn the basis of the <em>Wiley</em> judgment. This is false.</p>
<p>The amendment itself merely adds the following proviso at the end of s.2(m) (which itself defines what an “infringing copy” means):</p>
<blockquote class="blockquote">
<p><em>Provided that a copy of a work published in any country outside India with the permission of the author of the work and imported from that country shall not be deemed to be an infringing copy.</em></p>
</blockquote>
<blockquote class="blockquote">
<p><em>It seems that this is in fact a provision introduced solely to clarify that this (i.e., following international exhaustion) is the position that India holds, and not to change the statute itself. It is merely to clarify that the courts have misread the provisions of the law, or that they have indeed not read the provisions of the law (as in the </em>Eurokids* case).*</p>
</blockquote>
<p>This provision will have no effect whatsoever on the <em>Wiley</em> ruling. While the <em>Wiley</em> ruling deserves to fail on its own merits, the reasoning in that case does not depend on whether we follow international or national exhaustion. Indeed, in para 104, the judge states:</p>
<blockquote class="blockquote">
<p><em>As per my opinion, as the express provision for international exhaustion is absent in our Indian law, it would be appropriate to confine the applicability of the same to regional exhaustion. </em>Be that as it may, in the present case, the circumstances do not even otherwise warrant this discussion as the rights if at all are exhausted are to the extent to which they are available with the licensees as the books are purchased from the exclusive licensees who have limited rights and not from the owner<em>. [emphasis added] In these circumstances, the question of exhaustion of rights of owner in the copyright does not arise at all.</em></p>
</blockquote>
<p><em>Thus the argument that following the principle of international exhaustion will upturn this judgment is faulty. Imports and exports are two distinct things. India’s following of the principle of ‘international exhaustion’ means that the right to first sale is exhausted in India, when the work is legally </em>published* anywhere internationally (i.e., regardless of where that copyrighted work is legally published). The principle of international exhaustion doesn’t not exhaust the right of first sale internationally—the word ‘international’ is used to indicate where the publication has to take place for exhaustion to occur, and not where the exhaustion takes place. After all, Indian law on a matter cannot determine whether a book can or cannot be sold anywhere else in the world (which is precisely what it would do if it is to hold that rights are exhausted internationally by virtue of a book being printed in India).*</p>
</section>
<section id="vi.-conclusion" class="level2">
<h2 class="anchored" data-anchor-id="vi.-conclusion">VI. Conclusion</h2>
<p>I think the best way of concluding this are by quoting, <em>in extenso</em>, a passage from a book on the Indian intellectual property law by Prof.&nbsp;N.S. Gopalakrishnan and Dr.&nbsp;T.G. Agitha:</p>
<blockquote class="blockquote">
<p><em>Under the Indian law there is no express provision recognizing the right of importation. This would in fact enable parallel importation of works. ‘Parallel importation’ means transportation of ‘legitimate’ goods which are available at a cheaper rate in one country by independent buyers (e.g., book sellers), for sale in another country. This could act as an effective check on creating monopoly in the market. Hence it is an important aspect to be borne in mind for a developing country like India. Since there is no international obligation against parallel importation, nothing prevented the court from taking the stand that unless there is an express provision conferring importation rights on the owner of copyright or prohibiting parallel importation, it need not be considered to be prohibited in India. It is pertinent to note that India supported the principle of international exhaustion and not the national exhaustion principle.<sup>10</sup> However, it is submitted that the court [in Penguin Books Ltd.&nbsp;v. India Book Distributors] failed to take note of these aspects while deciding this case.”<sup>11</sup></em></p>
</blockquote>
<p>One can only hope those words by these leading experts on IP law in India are paid heed to, and that the arguments otherwise will fail to convince both the government as well as future court decisions. [^1]: Programme Manager, Centre for Internet and Society.</p>
<pre><code>I wish to apologize for the sparseness of legal and academic citations in this note, as well as the lack of proper structure and any leeways taken in argumentation. I had less than a week’s notice, and much less time, to work on this note. However, given the urgency of this issue and the importance of ensuring debate on the legal ramifications of the proposed amendment to s.2(m), this had to be written, and I hope readers will forgive me these failings.</code></pre>


</section>


<div id="quarto-appendix" class="default"><section id="footnotes" class="footnotes footnotes-end-of-document"><h2 class="anchored quarto-appendix-heading">Footnotes</h2>

<ol>
<li id="fn1"><p>Section 51(b)(iv) states: “Copyright in a work shall be deemed to be infringed (b) when any person (iv) imports into India, any infringing copies of the work .” A proviso to the section reads: “Provided that nothing in sub-clause (iv) shall apply to the import of one copy of any work for the private and domestic use of the importer.”↩︎</p></li>
<li id="fn2"><p>AIR 1985 Del 29, available at http://www.indiankanoon.org/doc/1899039/↩︎</p></li>
<li id="fn3"><p>210 U.S. 339 (1908).↩︎</p></li>
<li id="fn4"><p><em>Warner Bros.&nbsp;Entertainment Inc.&nbsp;v. Santosh V.G.</em>, available at http://www.indiankanoon.org/doc/1382926/↩︎</p></li>
<li id="fn5"><p>Arathi Ashok, Economic Rights of Authors under Copyright Law , 15 J. Intell. Prop. Rights 46 (2010) at 50.↩︎</p></li>
<li id="fn6"><p>http://indiankanoon.org/doc/777762/↩︎</p></li>
<li id="fn7"><p>While the exact countries were different in the case of each of the plaintiffs, there were all restricted to sale in India and a few of its neighbouring countries.↩︎</p></li>
<li id="fn8"><p>210 U.S. 339 (1908).↩︎</p></li>
<li id="fn9"><p>All signatories of the TRIPS Agreement have to ensure a right of rental, over and above a right of first sale, for all video (or what are known as cinematograph films in the Indian law).↩︎</p></li>
<li id="fn10"><p>R.V. Vaidyanatha Ayyar, <em>The Process and Politics of a Diplomatic Conference on Copyright</em> (1998) 1 JWIP 3 at 17, cited in N.S. Gopalakrishnan and T.G. Agitha, <em>Principles of Intellectual Property</em> 256 (2009).↩︎</p></li>
<li id="fn11"><p>N.S. Gopalakrishnan and T.G. Agitha, <em>Principles of Intellectual Property</em> 256 (2009)↩︎</p></li>
</ol>
</section><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@article{prakashExhaustionImports2012,
  author = {Prakash, Pranesh},
  title = {Exhaustion: Imports, Exports, and the Doctrine of First Sale
    in {Indian} Copyright Law},
  journal = {NUJS Law Review},
  volume = {5},
  number = {4},
  pages = {635–664},
  date = {2012-01-01},
  url = {http://www.nujslawreview.org/pdf/articles/2012_3/06_pranesh.pdf},
  langid = {en}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashExhaustionImports2012" class="csl-entry quarto-appendix-citeas">
Prakash, Pranesh. 2012. <span>“Exhaustion: Imports, Exports, and the
Doctrine of First Sale in Indian Copyright Law.”</span> <em>NUJS Law
Review</em> 5 (4): 635–64. <a href="http://www.nujslawreview.org/pdf/articles/2012_3/06_pranesh.pdf">http://www.nujslawreview.org/pdf/articles/2012_3/06_pranesh.pdf</a>.
</div></div></section></div> ]]></description>
  <category>Access to Knowledge</category>
  <category>Copyright</category>
  <category>IPR</category>
  <guid>https://pranesh.in/scholarly/articles/exhaustion_imports-exports-and-the-doctrine-of-first-sale-in-indian-copyright-law.html</guid>
  <pubDate>Sun, 01 Jan 2012 00:00:00 GMT</pubDate>
</item>
<item>
  <title>Engaging on the digital commons</title>
  <dc:creator>Pranesh Prakash</dc:creator>
  <dc:creator>Sunil Abraham</dc:creator>
  <link>https://pranesh.in/scholarly/articles/engaging-the-digital-commons.html</link>
  <description><![CDATA[ 






<hr>
<p>We at the Centre for Internet and Society are very glad to be able to participate in the 13th Biennial Conference of the International Association for the Study of the Commons (IASC). Our interest in the conference arises mainly from our work in the areas of intellectual property rights reform and promotion of different forms of ‘opennesses’ that have cropped up as a response to perceived problems with our present-day regime of intellectual property rights, including open content, open standards, free and open source software, open government data, open access to scholarly research and data, open access to law, etc., our emerging work on telecom policy with respect to open/shared spectrum, and the very important questions around Internet governance. The article by Sunil Abraham and Pranesh Prakash was published in the journal Common Voices, Issue 4.</p>
<p>Our work on intellectual property reform are proactive&nbsp; measures at effecting policy change that go towards protecting&nbsp; and preserving an intellectual, intangible commons. We have opposed the Protection and Utilization of the Public-funded Intellectual Property Bill (an Indian version of the American Bayh-Dole Act) which sought to privatise the fruits of publicfunded research by mandating patents on them. We are working towards reform of copyright law which we believe is lopsided in its lack of concern for consumers and that its current march towards greater enclosure of the public domain is unsustainable. Believing that not all areas of industry and technology are equal, and that patent protection is ill-suited for the software industry, we have worked to ensure that the current prohibitions against patenting of software are effectively followed.</p>
<p>Defensively—that is working within the existing framework of intellectual property law—we seek to promote the various forms of copyright and patent licensing that have arisen as reactions to restrictive IP laws. Free/open source software and open content have arisen as a reaction to the restrictive nature of copyright law, such as the presumption under copyright law that a work is copyrighted by the mere fact of it coming into existence (for instance, this was not so in the United States until 1989, till when a copyright notice was required to assert copyright). While earlier the presumption was that a work was to belong to the public domain, after the Berne Convention, that presumption was reversed. This led to the creation of the idea of special licences, by using which one could allow all others to share his/her work and reuse it. This innovation in using the law to promote, rather than restrict, what others could do with one’s works has enabled the creation and sharing of everything from Wikipedia, to Linux (which powers more than 85 percent of the world’s top 500 supercomputers) and Apache HTTP server (more than 60 percent of all websites). The advent of the Internet has allowed the creation of intangible digital commons.</p>
<p>We are also starting to engage with the question of telecom&nbsp; policy around spectrum allocation, and believe that&nbsp; promotion of a shared spectrum would help make telecom&nbsp; services, including broadband Internet, available to people at&nbsp; reasonable prices. We also believe that Internet governance should not be the prerogative of governments, and should not happen in a top-down fashion.</p>
<p>Comparisons between tangible commons and intangible commons have been made by people like Elinor and Vincent Ostrom, who in 1977 contributed to our understanding of subtractability and public goods. James Boyle has written about the expansion of copyright law as “the second enclosure movement”, following in the footsteps of the first enclosure movement against the take-over of common land which stretched from the fifteenth century till the nineteenth.&nbsp; Yochai Benkler, has written extensively on commons in information and communication systems as well as on spectrum commons. Just as Elinor Ostrom’s work shows how Garrett Hardin’s evocative ‘tragedy of the commons’ and the problems of free-riding are very often avoided in practice, Michael Heller’s equally evocative phrase ‘gridlock economy’ shows that ‘over-propertisation’ of knowledge can lead to a ‘tragedy of the anti-commons’.</p>
<p>Through this conference we wish to learn of the lessons that academic writings on tangible commons have to impart to intangible commons which are configured very differently (in terms of subtractability, for instance). Ostrom’s work shows how individuals can, in a variety of settings, work to find institutional solutions that promote social cooperation and human betterment. As part of her nine design principles of stable local common pool resource management, she lists clearly defined boundaries for effective exclusion of external unentitled parties. How does that work, when even the existing mechanisms of boundary-definition in intellectual property, such as patent claims, are often decried as being ambiguous thanks to the legalese they are written in? What of traditional knowledge for which defining the community holding ownership rights becomes very difficult? As Ostrom and Hess note, “the rules and flow patterns are different with digital information”, but how do these differences affect the lessons learned from CPR studies? How do Ostrom’s pronouncements against uniform top-down approaches to resource management affect the way that copyright and patents seek to establish a uniform system across multiple areas of art, science and industry (musical recordings and paintings, pharmaceuticals and software)? And how can Ostrom’s work on management of natural resources inform us about the management of resources such as spectrum or the Internet itself? These are all very interesting and important questions that need to be explored, and we are glad that this conference will help us understand these issues better.</p>



<div id="quarto-appendix" class="default"><section class="quarto-appendix-contents" id="quarto-reuse"><h2 class="anchored quarto-appendix-heading">Reuse</h2><div class="quarto-appendix-contents"><div><a rel="license" href="https://creativecommons.org/licenses/by-nc/4.0/">CC BY-NC 4.0</a></div></div></section><section class="quarto-appendix-contents" id="quarto-citation"><h2 class="anchored quarto-appendix-heading">Citation</h2><div><div class="quarto-appendix-secondary-label">BibTeX citation:</div><pre class="sourceCode code-with-copy quarto-appendix-bibtex"><code class="sourceCode bibtex">@inproceedings{prakashEngagingDigital2011,
  author = {Prakash, Prakash and Abraham, Sunil},
  publisher = {Foundation for Ecological Security},
  title = {Engaging on the Digital Commons},
  booktitle = {Common Voices},
  volume = {4},
  pages = {22},
  date = {2011-01},
  urldate = {2020-10-26},
  address = {Hyderabad},
  url = {http://iasc2011.fes.org.in/common-voices-4.pdf},
  langid = {en},
  abstract = {This article explores the dual role of Intellectual
    Property Rights (IPRs) in intangible commons, both as incentives for
    knowledge creation and potential tools for privatization and access
    restriction. The authors actively advocate for policy changes to
    preserve intangible commons, opposing initiatives like the
    Protection and Utilization of Public-funded Intellectual Property
    Bill and calling for copyright law reform. They also champion
    alternative licensing models, such as open source software and open
    content, which have fostered collaborative innovation. Additionally,
    the authors address telecom policy and Internet governance issues.
    Drawing parallels between tangible and intangible commons, they pose
    questions about the adaptability of resource management principles
    and ownership rights in the digital age.}
}
</code></pre><div class="quarto-appendix-secondary-label">For attribution, please cite this work as:</div><div id="ref-prakashEngagingDigital2011" class="csl-entry quarto-appendix-citeas">
Prakash, Prakash, and Sunil Abraham. 2011. <span>“Engaging on the
Digital Commons.”</span> <em>Common Voices</em> 4 (January): 22.
https://web.archive.org/web/20230910135250/http://iasc2011.fes.org.in/common-voices-4.pdf.
<a href="http://iasc2011.fes.org.in/common-voices-4.pdf">http://iasc2011.fes.org.in/common-voices-4.pdf</a>.
</div></div></section></div> ]]></description>
  <category>Openness</category>
  <category>A2K</category>
  <category>FOSS</category>
  <category>IPR</category>
  <guid>https://pranesh.in/scholarly/articles/engaging-the-digital-commons.html</guid>
  <pubDate>Sat, 01 Jan 2011 00:00:00 GMT</pubDate>
</item>
</channel>
</rss>
