►
Description
The Internet ecosystem – including infrastructure, devices, applications and services, and relevant policies and regulations – is in a constant state of flux. Governments and businesses are increasingly making decisions that could adversely affect the Internet. This session will feature community members from different regions who will explain how the Internet Impact Assessment Toolkit helps them evaluate the effect of specific policies on the Internet.
Speakers: Amrita Choundhury, Neeti Biyani
A
Good
morning,
good
afternoon,
good
evening,
wherever
you
are
welcome
to
day
two
of
community
week
at
the
internet
society,
we're
very,
very
thrilled
to
have
you
here,
you're
at
the
internet,
way
of
networking
session
on
day
two,
I'm
neeti,
I'm
going
to
be
your
moderator.
For
today
I
work
with
the
internet
society
as
policy
and
advocacy
manager,
I'm
joined
by
amrita
chaudhary,
who
is
of
the
very
many
hats
that
she
wears
is
the
president
of
the
isoc
delhi
chapter.
A
A
few
housekeeping.
You
know
rules
to
remind
you
of
before
we
jump
into
the
internet
way
of
networking
session.
Is
that
we're
on
social
media?
We
have
a
hashtag,
it's
communityweek21,
please,
please
do
tweet
at
us
and
feel
free
to
join
in
the
banter.
That's
happening
on
social
media
around
community
week.
There's
a
interpretation
into
spanish
and
french
available
for
you.
You
just
need
to
go
to
your
agenda,
select
your
preferred
language
and
then
you
will
be
able
to
join
the
corresponding
session.
A
There's
also
closed
captioning
available
to
increase
accessibility,
we're
very
grateful
to
amazon
and
flex
optics,
who
are
our
event,
sponsors
and
bring
interpretation
and
captioning
to
you
today.
A
This
is
a
reminder
to
all
of
you
if
I
could
take
a
chance
to
please
request
you
to
engage
very
very
enthusiastically
with
all
of
us,
but
respectfully
and
responsibly
as
well
use
the
chat.
Please
for
sharing
any
comments,
any
questions
you
can
do
that
in
english,
french
and
spanish,
and
you
could
please
format
your
questions
with
your
name
and
country
first.
So
if
you're
jane
from
kenya,
for
example,
please
introduce
yourself
like
that
first
and
then
this
session
is
being
recorded.
A
So
if
you're
unable
to
catch
all
of
it,
there
will
be
a
recording
that'll,
be
made
available
on
the
platform
here
afterwards.
So
with
that,
I
think
we'll
jump
into
the
internet
way
of
networking
session
and
chris
could
I
request
my
slides
now
thanks.
So
you
know
a
question
to
all
of
you.
What
holds
us
together
in
the
last
couple
of
years
at
least
I
can
very
confidently
say
it's:
the
internet.
We've
used
it
to
not
only
work
and
learn
online.
A
We've
used
it
to
come
to
each
other's
aid.
In
times
of
trouble
and
crisis,
we've
used
it
to
avail
healthcare
services.
We've
used
it
to
keep
in
touch
with
loved
ones.
Transact
online,
you
know
avail
entertainment
services
online,
so
there's
there's
very
little
that
we
possibly
cannot
imagine
doing
on
the
internet
today
and
that
has
really
really
made
the
internet
a
force
that
holds
us
together
next
slide.
Please.
A
So
one
of
the
things
that
you
know
we
kind
of
tend
to
forget
when
we
think
about
the
internet,
even
though
it's
such
a
crucial
resource
in
our
lives
is
that
you
know,
while
it
empowers
users
to
do
absolutely
fantastic
things
right,
what
is
it
that
has
made
the
internet
so
successful?
And
the
answer
is
to
be
found
here
at
the
internet
way
of
networking
session.
It
is
a
unique
fundamental
properties
of
the
internet
that
hold
it
up
and
that
make
it
as
amazing
as
it
is.
So.
A
The
internet
society
has
identified
five
critical
properties
that
make
the
internet
work
for
everyone,
and
these
critical
properties
that
we
possibly
don't
even
think
about
on
a
day-to-day
basis
are
all
under
threat
and
if
they're
threatened,
then
the
internet
that
we
know
of
the
internet
that
we
use
is
going
to
be
under
threat,
and
we
all
need
to
therefore
come
together
to
promote
and
defend
the
internet.
Next
slide.
Please.
A
All
right
so
on
your
screen
are
the
five
critical
properties
of
the
internet
way
of
networking.
There
may
be
other
ways
of
networking,
but
we've
identified
the
internet
way
of
networking
as
upholding
the
ideal
internet
and,
among
those
properties,
are
accessible
infrastructure
with
a
common
protocol.
There's
an
open
and
interoperable
architecture
of
the
internet,
there's
a
decentralized
management
of
the
internet
and
distributed
routing
systems.
There
are
common
global
identifiers,
so
you
know
we
all
know
where
to
go
without
really
knowing
exactly
what
the
ib
address,
etc
is
and
then.
A
A
So
what
the
internet
society
did
this
year
after
talking
about
the
critical
properties
and
presenting
it
to
the
rest
of
the
world
last
year,
is
talk
about
the
enablers
of
an
open
globally
connected
secure
and
trustworthy
internet.
Now,
the
internet,
in
its
present
form
in
its
ideal
form,
is
open,
secure,
trustworthy
and
globally
connected
and
we've
identified
some
of
the
enablers
which
are
which
are
on
the
on
the
chart
in
front
of
you
as
things
that
ensure
that
the
internet
remains
open
and
secure
and
trustworthy
and
globally.
A
A
Along
with
like
information
services
and
applications,
there
should
be
integrity
of
information,
application
services
and
the
internet
should
be
reliable,
resilient
available
accountable
and
there
should
be
privacy
on
the
internet
next
slide.
Please.
A
So
very
similarly,
what
we're
requesting
policymakers
to
do
and
our
community
to
enable
them
to
do
that
is
analyze
any
policy
consideration
or
development
or
decision
or
legislation
for
the
internet
through
this
toolkit.
You
know,
use
this
assessment
framework
to
see
if
what
the
stated
objectives
are
through
that
policy,
what
their
effects
on
the
internet
would
look
like
and
therefore,
then,
are
the
trade-offs
worth.
It
are
the
trade-offs
to
compromise
on
an
open,
interoperable
internet
worth
the
policy
decisions
that
lawmakers
are
trying
to
make
next
slide.
Please.
A
So,
where
we
need
your
help
as
the
internet
society
community,
with
all
of
your
extremely
crucial
voices,
is
to
promote
and
defend
the
internet
right.
The
internet
impact
assessment
that
we
we
enable
through
this
toolkit
is
helping
people
understand
how
policy
decisions
could
harm
the
internet
and,
of
course,
protecting
the
internet's
foundations
will
help
it
help
it
reach
its
full
potential
as
a
force
for
good.
A
So
with
that,
I'd
like
to
bring
in
amrita
in
amrita
is
one
of
the
one
of
the
co-authors
on
a
screening
report,
an
impact
brief
that
we
recently
conducted
on
an
indian
policy
decision
and
I'd
request
amrita
to
talk
about
how
she
used
the
expanded
toolkit
to
assess
the
decisions
that
were
made
in
india.
B
So,
as
niti
mentioned,
this
is
something
which
we
wanted
to
see
as
to
you
know,
we
wanted
to
use
the
toolkit
and
see
a
particular
policy
from
the
indian
perspective,
which
is
currently
which
has
been
launched
in
february
of
this
year,
but
there
is
a
lot
of
conversation
happening,
so
we
it
is,
and
we
wanted
to
see
using
this
toolkit
as
to
is
it
helping
in
promoting
an
open,
globally
connected
secured
and
trustworthy
internet
which
we
all
want
and
which
the
policy
also
wants.
B
Actually,
so
you
know
you
may
not
be
from
india,
but
we
are
just
sharing
it
as
an
example,
and
you
can
use
it
in
your
own
respective
countries
in
the
various
policies
which
are
being
framed.
Can
we
go
to
the
next
slide.
B
Yes,
so
the
policy
which
we
are
discussing
is
the
information
technology
act
of
2021,
which
is
known
as
the
indian
intermediary
guidelines
or
the
information
technology
guidelines,
intermediary
guidelines
and
digital
media
ethics
code
rules
2021
the
next
slide.
This
is
mostly
for
the
intermediaries,
so
in
india
we
have,
in
you
know
all
kinds
of
intermediaries.
B
There
are
cyber
cafes,
there
are
social
media
companies,
so
you
know
there
was
a
lot
of
related
to
fake
news
and
a
lot
of
information
coming
in
and-
and
there
is
a
particular
you
know-
the
aim
to
regulate
the
social
media
intermediaries,
and
that
is
when
the
guidelines
were
brought
in.
As
I
mentioned,
it
was
brought
in
announced
in
february
2021
and
it
came
into
effect
in
may.
B
This,
india
has
an
information
technology
act
and
this
is
a
part
of
that
parent
legislation.
B
So
the
aim,
more
though
it
is
for
intermediaries,
is
more
to
regulate
social
media
intermediaries,
messaging
services,
media
companies,
digital
media
houses
and
it
also
labels
social
media
companies
of
a
particular
stature
as
significant
social
media
companies
like
the
facebooks
and
the
others
who
are
in
that
category,
and
it
also
requests
what
the
intermediary
liability
protection
of
the
safeguards
safe
harbor,
which
intermediaries
are
you
know,
are
liable
to
get
in
india.
The
next
slide.
B
So
there
are
various
provisions
in
this,
but
the
main
provisions
which
we
wanted
to
look
at
is
the
content
takedown,
so
that
the
guidelines
particularly
slate
state
that
any
content
which
is
found
objectionable
and
obviously
there
are
certain
criteria
given
it
has
to
be
taken
down
by
social
media
companies
or
the
intermediary
within
36
hours,
the
one
which
is
a
bit
crucial
and
tricky
and
is
the
the
rule
4.2,
which
says
that
you
need
to
identify
the
first
originator
of
information
on
an
end-to-end
encrypted
messaging
platform,
which
means
if
a
particular
message
has
been
sent.
B
You
need
to
identify
who
was
the
first
one
who
sent
it
and
if
it
had
been
sent
originally
overseas,
the
first
person
in
india
who
starts
to
send
it
has
to
be
found.
Now
this
you
know,
if
you
are
trying
to
break
into
an
encryption,
there
is
a
concern.
Of
course
there
are
some
legal.
You
know
this
particular
piece
has
been
challenged
in
the
court
by
whatsapp
and
by
various
other
civil
society
entities
and
media.
B
But
this
is
a
very
tricky
you
know
area
the
other
is
it
asks
the
intermediaries
to
automatically
filter
content.
Now
the
intent
is
to
filter,
csam
or
terrorist
or
fake
news,
but
obviously
rules
can
be
used
in
different
ways
and
the
rule
4.7,
which
asks
social
media
companies
to
ask
their
users
to
voluntarily
identify
themselves.
Now
it
plays
a
bit
with
the
anonymity.
B
Interestingly,
I
would
also
like
to
say
that
when
we
are
talking
about
rule
4.2
of
breaking-
and
you
know
giving
information
on
end-to-end
encryption,
the
government
clearly
says
that
we
do
not
want
to
break
encryption.
We
do
not
want
to
see
the
messages,
but
we
only
want
to
know
the
originator.
B
So
while
they
say
that
there
are
also
concerns
which
are
there,
but
these
were
the
primary
areas
which
we
wanted
to
see
and
view
if
they
fall
and
and
how
it
maintains
the
open,
interoperable
secure
trusted
internet.
The
next
slide.
B
So
if
we
are
talking
about
an
open
internet-
and
we
are
talking
about
a
particular
platform
having
access
to
all
kinds
of
information
which
you
and
I
are
sharing,
does
it
actually
help
in
you
know
somehow
stopping
the
information
from
being
shared
or
you
know,
is
it
allowing
the
particular
governments,
or
you
know,
even
companies
to
get
a
lot
of
information
which
was
private,
so
we
found
that
the
particular
rules
and
but
are
actually
allowing
the
com?
B
You
know
the
companies
or
even
the
government
to
have
a
lot
of
information
which
they
actually
do
not
need,
and
this
is
against
basic.
You
know
the
privacy
and
the
human
rights
which
we
all
enjoy
the
next
slide.
Please.
B
So
we
wanted
to
see
whether
it
is
improving
the
reliability,
resilience
and
availability
of
the
internet.
So
we
found
these
were
a
bit
challenged
because
if
you
know,
for
example,
a
conversation
which
is
flowing
from
me
to
niti
and
someone
wants
to
trace
who
has
originated
it,
it
is
breaking
in
the
trust
it
is
making
the
internet
less
reliable.
B
If,
for
example,
someone
is
trying
to
read
the
conversation
between
niti
and
me
for
legitimate
purposes,
there
can
be
bad
actors
who
also
can
break
in
and
look
at
that
message,
so
it
also
undermines
the
reliance
resilience
of
the
internet
it.
You
know,
you
know
it
breaks,
it
makes
it
less
secure
and
when
we
are
talking
about
content
being
filtered
or
content,
you
know
proactively.
B
It
may
lead
to
a
lot
of
censorship
or
surveillance
which
may
actually
hamper
the
availability
of
content
to
everyone,
for
example.
Today
it
may
be
for
a
genuine
in
requirement,
but
tomorrow,
if,
for
example,
there
is
a
particular
community
whose
information
wants
to
be
read
wants
to
be
seen
and
they
may
not
be
able
to
get
that
particular
information
to
see
it
will
lead
to
censorship
and
it
will
actually
hamper
the
open,
interoperable
internet
which
we
want.
So
this
is
also
an
area
which
we,
where
we
found
there
were
concerns.
The
next
slide.
B
So
we
looked
at
it
from
the
accountability.
Obviously
there
was
an
issue
because
if
you
know
if
the
conversation
for
example,
if
someone
wants
to
trace
the
originator
of
a
particular
message,
many
messages
would
be
looked
at
and
who
is
accountable
for
it?
Are
there
the
checks
and
balances
to
see
that
you
know,
I
mean
even
not
be
able
to
know
that
whether
my
account
has
been
looked
at
or
my
information
has
been
looked
at,
so
there
is
a
concern
of
accountability.
B
For
example,
if
you
are
allowing
an
intermediary
to
look
at
all
the
content
which
you
are
sending
or
sharing
or
even
pictures
which
are
sharing,
are
they
actually?
If,
for
example,
a
picture
is
taken
down
on
a
particular
ground
that
you
know
it
is
obscene,
whereas
it
may
not
be
obscene
for
many
people,
so
is
the
intermediary
also
liable
a
simple
example?
A
picture
of
a
breastfeeding
woman
in
many
countries
may
be
taken
as
obscene
in
some
places
it
may
be
taken
in
a
very
natural
way.
B
B
And
obviously,
if
you're
talking
about
privacy-
and
it
underlines
the
privacy
most
of
the
particular
rules
which
we
are
looking
at,
for
example,
if
you're
talking
about
automatic
filter
blocking
of
c-stand
material
or
taking
down
content
of
violence
against
women,
while
these
are
actually
good,
but
this
may
actually
lead
to
you
know
infringing
the
privacy
of
people,
for
example,
even
traceability
as
in.
B
If
I
am
having
some
conversation
going
on
an
end-to-end
encrypted
platform,
I
may
want
confidentiality,
but
such
acts
of
you
know
allowing
traceability
in
encrypted
devices
actually
threatens
a
user's
privacy,
so
we
found
it
lacking
in
that
manner.
The
next
slide,
please.
B
So
you
know
what
we
feel
you
know
and
is
that
the
internet
assessments
such
kind
of
internet
assessments
will
actually
help
you
and
me
to
know
how
a
policy
could
harm
the
internet.
As
in
I'm
not
saying
you
know,
there
are
various
things
which
are
being
discussed.
There
are
various
parameters,
you
don't
even
have
to
look
at
all
of
them
and
it
is
not
mandatory
for
any
government
or
anyone
to
use.
I
would
say
it's
like
a
checklist
as
in.
B
B
Will
it
actually
help
you
and
me,
and
even
people
who
are
newly
connecting
to
the
internet,
get
to
use
the
internet
in
the
full
way?
Will
it
help
small
businesses
run
in
a
secure
manner,
or
will
you
know,
say,
for
example,
getting
access
to
encryption
or
encrypted
data
harm
those
you
know
the
even
a
business
to
operate
in
a
particular
way.
B
For
example,
many
people
do
business
over
whatsapp.
Will
it
actually
harm
the
business
and
also
to
look
at
once?
We
look
at
these
checklists
and
we
look
at
it.
Can
we
help
to
in
our
way
in
a
small
way
to
ensure
the
internet
is
open
globally
connected?
We
can
use
it
in
a
secure
and
trustworthy
nature,
because
that
is
what
we
all
want
from
the
internet.
So
nithya
I'll
go
back
to
you
and
you
know
we
can
discuss
the
other
things.
A
Thanks
so
much
amrita,
that
was
fantastic.
I
think
this
sort
of
like
impact
assessment,
you
know
taking
one
sort
of
policy
into
question
and
then
looking
at
it
through
the
entire
framework
of
you,
know
the
critical
properties
first
and
then
the
enablers,
often
of
a
globe
open
globally,
connected
secure,
trustworthy
internet
is
exactly
the
aim
of
the
internet
way
of
networking
toolkit.
But
I
also
wanted
to
just
gather
your
thoughts
about
you
know
there
are
going
to
be
people
who
find
it
difficult.
A
You
know
for
very
many
reasons
to
maybe
use
the
toolkit
in
its
entirety
or
to
or
to
you
know,
analyze
every
single
policy
decision
through
the
lens
of
the
toolkit.
So
you
know
having
used
the
toolkit
from
front
to
back
yourself,
what
is
sort
of
like
what
are
the
top
recommendations
or
what
are
your
top
thoughts
on
on?
You
know
how
people
can
use
this
toolkit,
even
if
they
don't
have
the
time
and
the
resources
to
use
it
in
completion
and
produce
an
impact
report
like
you.
B
Did
sorry
I
was
muted,
so
I
think
niti
you
don't
need
to
use
it
in
a
great
in
a
very
detailed
manner.
I
think
and
correct
me
if
I'm
wrong
internet
society
is
not
made
it
only
to
be
used
by
policy
makers
or
researchers
to
look
at
it
on
entirety,
but
anyone
for
example.
If
there
is
a
new
policy
coming
up
in
any
of
your
countries,
you
can
you
can
just
look
at
it
not
even
go
to
the
checklist.
B
B
Even
if
the
intent
is
trustworthy?
Is
it
act
the
end
result
going
to
make
it
more
trusted,
or
is
it
going
to
erode
the
trust
somewhere?
Is
my
privacy
going
to
be
in
you
know,
enshrined
or,
if
particular
in
you
know,
legislation
is
there?
What
are
the
checks
and
balances
to
see
if
my
privacy
is
protected?
Will
it
be
making
me
more
secured
while
using
the
internet?
So
these
are
certain
questions
and
I
think
I'm
sorry,
I
don't
have
the
chat,
but
there.
B
If
you
go
to
the
internet
society
website,
they
have
a
particular
list
and
it
is
very
detailed.
Don't
get
in,
don't
be
overwhelmed
by
it,
but
look
at
the
questions.
There
are
various
sections
and
look
at
the
questions
and
just
you
know
in
your
mind,
think
that
this
particular
legislation
is
this
helping.
Is
it
going
to
reduce
the
overall
or
or
increase
overall
level
of
internet's
resilience
to
malfunctions?
B
You
know,
look
at
how
accountable
it
will
be.
Will
it
make
it
the
internet
more
non-transparent,
or
will
it
encourage
hidden
actors?
Will
it
like
you
know
if
it
is
giving
a
particular
government
or
say
law
enforcement,
certain
rights?
Will
bad
actors
be
using
it?
So
these
are
small
questions
we
normally
converse
with.
Those
are
just
listed
down
in
a
particular
way
and
you
can
look
at
it.
You
need
not
look
at
the
entire
thing.
Just
take
up
two
three
things
and
if
you
need
help
you
know
niti,
you
are
there
or
others.
B
Are
there
in
internet
society
who
can
help
out,
you
know,
have
a
more
detailed
conversation
and
you
can
reach
out
to
people
who
have
used
it
also
to
kind
of
ask
them
how
to
use
it
or
how
you
know
you
can
do
it
as
an
it's
very
flexible,
and
it's
not
even
that
you
have
to
use
it.
It's
something
which
has
been
made.
If
you
want
to
use
it,
it
is
great.
B
A
Thanks
amrita,
I'm
also
wondering
you
know
in
a
context
where
we're
seeing
more
and
more
attacks
on
the
internet
right.
We're
seeing
law
enforcement
agencies
talk
about
back
doors,
for
example,
to
encrypted
communication,
we're
seeing
very
often
a
change
in
the
way
that
intermediary
liability
protection
has
been
perceived
for
so
long
and-
and
I'm
wondering
what
all
of
this
means,
of
course,
for
like
service
providers,
firstly,
but
what
it
means
for
the
user,
what
it
means
for
small
businesses,
especially
those
that
are
built
on
top
of
these
services
right
very
recently.
A
I
think
an
example
that
comes
easily
to
mind
and
and
is
extremely
relevant,
is
that
there
was
an
outage
of
you
know
this
large
social
media
company
and
all
of
its
all
of
its
associated
services
right
and
in
the
days
that
followed
that
outage.
It
lasted
a
few
hours.
But
in
the
days
that
followed
that
outage,
it
resulted
in
economic
losses
not
just
for
that
particular
intermediary
and
its
services.
A
But
it
also
meant
that
so
many
people
couldn't
get
in
touch
with
you
know
their
family
couldn't
transact,
couldn't
conduct
business
because
they
were
built
on
top
of
these
services
and
in
some
cases
you
know
there
were
some
services
that
were
built
to
enable
emergency
support
to
say,
abuse,
survivors
or
you
know,
people
who
were
experiencing
extreme
distress.
So
you
know
when
we
try
and
fragment
the
internet,
or
you
know
how
we
call
it
in
in
our
circles
the
splinternet,
you
know,
we've
looked
at
a
splintered
view
of
the
internet.
B
So
that's
a
very
loaded,
question
niti
and
that
it
has
a
lot
of
questions
in
it.
So
I'll
try
to
take
one
by
one:
okay,
I'll
come
to
splinternet,
but
you
first
mentioned
small
businesses
and
encrypted
platform.
Yes,
as
in
security,
is
very
much
needed,
for
example,
today
and
pandemic
has
highlighted
it
more.
Even
for
children,
for
example,
for
whom
we
are
saying.
Okay,
we
need
to
break
encryption
for
csam,
but
these
children
are
also
studying
online
the.
B
If
and
if
it's
a
trusted
encrypted
platform,
many
people
cannot
get
into
those
platforms
and
understand
until
you
share
things
right,
the
passwords,
etc.
They
will
not
be
able
to
access
and
you
can
keep
them
secure
their
communication
secure
as
in
so
we
and
encryption
is
not
just
limited
to
big
companies.
Smaller
companies,
as
you
mentioned,
are
using
it
you
for
you
and
me
to
do
banking.
We
need
a
trusted
platform.
If,
today,
you-
and
I
know
that
someone
can
look
at
it,
we
will
not
want
to
do
our
internet
banking
right.
B
We
will
then
want
to
go
to
the
bank
and
do-
and
I
don't
think
any
nation
or
any
company
wants
that
kind
of
load
in
their
offices.
So
we
need
to
look
at
the
encryption
issue
as
in
and
like
we
were
discussing
in
the
other
session
earlier
that
there
are
content
related
issues
like
hate
speech,
misinformation,
you
know
terrorist
content,
they
have
to
be
dealt
in
a
different
way.
These
are
social
issues
manifested
by
with
the
help
of
technology.
B
Of
course,
you
can
use
technology
to
kind
of
curb
them
to
a
certain
extent,
but
technology
is
not
the
only
solution
and
technology
cannot
solve
these
issues.
So
we
need
to
be
aware
and
try
to
divide
issues.
That's
one
thing
now
intermediaries
when
they
started
what
a
different
breed.
Today,
however,
a
big
social
media
company
is
not
merely
an
intermediary.
Who
is
just
allowing
conversations
to
happen?
They
are
look
you
know,
but
because
of
the
governments
and
also
their
policies,
they're.
B
Also,
looking
at
the
content
which
is
flowing
in
their
pipes,
they
are
also
allowing
you,
because
of
advertisements,
to
see
certain
information
pushing
you
information
which,
as
an
intermediary
you,
you
cannot
do
as
in.
They
are
also
publishers
now
so
governments
also-
and
it
is
rightly
so-
they
are
looking
at
redefining
the
intermediaries
or
what
these
social
media
company
big
companies,
big
tech
are
doing
and
they
they're
also
creating
their
own.
B
I
would
say
silos
and,
as
you
mentioned,
a
particular
company
goes
down.
It
hurts
everyone,
and
that
concerns
everyone.
Governments
are
also
legitimate
in
their
concerns,
but
whether
they
are
you
know,
the
particular
thing
which
they
are
doing
is
going
to
address.
That
issue
is
a
concern.
You
know,
for
example,
will
that
particular
rule?
For
example,
you
know,
looking
at
the
first
originator,
helped
to
resolve
the
issue.
I
we
have
our
doubts.
There
are
other
ways
in
which
you
can
actually
look
at
it.
B
So,
and
so
there
are,
there
is
some
kind
of
a
splinter
net
to
some
extent
happening,
not
only
because
of
companies
trying
to
who
are
huge,
bigger
than
nations
who
are
trying
to
look
at.
You
know
whom
we
are
all
using
because
we
like
their
services
and
they
give
us
a
lot
of
service.
B
But
governments
are
also
becoming
concerned
that
their
sovereign
interests
are
not
being
protected,
so
they
are
trying
to
look
at
data
localization,
whether
that's
a
solution-
I
don't
think
so,
but
those
are
issues
which
are
being
looked
at
and
and
those
are
harming
the
internet.
So
the
conversations
has
to
happen
as
to
you
know,
can
there
be
mutually
agreeable
treaties
through
which
these
issues
can
be
resolved
because
mlats
need
revision?
Are
the
you
know
the
jurisdiction
issues
which
come
out?
B
Can
those
be
solved
at
you
know
at
a
more
global
level,
because
everyone
is
not
into
the
budapest
convention
or
any
other
conventions.
So
there
are
gaps,
those
need
to
be
addressed
and
it
has
to
happen
at
a
global
level.
Closing
your
nation,
or
you
know,
splintering.
The
net
is
not
going
to
solve
the
issue
and
the
internet,
which
we
all
want,
and
most
governments
also
want.
B
They
will
not
get
the
benefit
which
you
know
the
internet
is
today
giving
a
level
playing
field
even
to
a
developing
country
as
much
as
it
is
to
a
developed
country.
Of
course,
there
are
digital
divides
and
there
are
technological
divides,
but
still
it
is
helping
countries
to
leapfrog
from,
but
if
we
start
closing
it,
we
may
lose
those
benefit.
I
hope
I
have
been
able
to
answer
some
parts
of
your
question.
A
No,
absolutely
you
have,
and
I
think,
even
drawing
attention
to
the
fact
that
you
know
there
is
a
difference
between
the
problems
that
are
presented
to
us
by
a
few
actors
that
you
know
we've
already
spoken
about
and
the
larger
internet.
I
mean,
I
think
the
problem
arises
where
policymakers
confuse
a
large
actor
for
the
internet,
but
the
internet
essentially
is
an
infrastructure
right.
It
is
the
hardware
as
well
as
how
all
of
that
hardware
interacts
with
one
another.
That
brings
us.
A
You
know
in
a
room
like
this,
where
we're
able
to
look
at
each
other
on
the
screen
in
real
time
and
have
this
conversation
like
we're
sitting
in
front
of
each
other
and
be
able
to
broadcast
this
to
the
rest
of
the
world.
You
know
so
so
I
think
under
that
also
taking
from
what
you
mentioned
about,
you
know
that
that
technology
may
have
a
role
to
play,
but
then
these
are
essentially
social
issues
that
you
know.
A
Governments
are
trying
to
look
for
solutions
and
very
often
what
we
hear
from
law
enforcement
agencies
is
that
the
only
way
they
can
do,
that
is
by
tracking
monitoring,
et
cetera
people
on
the
internet.
Now
that's
to
me
sounds
very
similar,
like
tracking
and
monitoring
what
you
know
you
and
I
are
doing
in
our
day-to-day
lives.
A
So
you
know
like
if
I'm
sitting
here
as
a
as
a
private
citizen,
then
you
know
I'm
coming
to
more
constitutional
questions
but
like
as
a
private
citizen,
then
does
the
government
have
the
capability
to
install
a
camera
and
see
what
I'm
doing
in
my
own
home,
because
you
know
now,
our
lives
are
so
deeply
intertwined
with
the
internet.
There's
practically
no
aspect
of
our
lives
that
are
separate.
A
Sorry,
sorry,
what
I'm
trying
to
get
at
is
you
know
the
security
versus
privacy
narrative
and
you
know
how
it's
false
our
online
versus
offline
lives.
You
know
why
are
we
more
surveyed
when
it
comes
to
our
online
lives,
and
I
think
these
are
the
two
questions
that
I'll
stop
at
right
now.
B
Yeah,
so
the
security
security
is
always
looked
at
as
security
versus
privacy,
but
you
cannot
be
secured
if
you
cannot
ensure
privacy
of
every
individual,
so
I
would
say
these
these
go
hand
in
hand.
For
example,
if
you
want
a
secure
transaction
for
a
businessman,
it
has
to
be
private.
I
cannot
be
looking
at
say.
For
example,
you
have
a
business
and
I
am
looking
at
it,
so
they
go
hand
in
hand.
B
I
think
we
need
to
look
at
and
for
governments
trying
to
look
at
it
as
a
security
and
privacy
is
primarily
because
internet
is
so
rapidly.
You
know
growing,
and
you
know
the
issues
get
manifested
so
fast.
It
takes
a
lot
of
time
for
everyone
to
understand
how
it
is
happening
now.
If
so,
what
actually
happens
is
if
you're
not
being
able
to
you
know,
look
at
it
or
understand
or
even
control
it.
B
The
best
part
is
like
you
know:
there
is
a
leak,
let's
close
the
tap,
rather
than
trying
to
seal
the
tap
somewhere
where
you
need
to
seal
it.
So
it's
something
like
that,
which
is
happening.
I
think,
there's
a
need
for
more
capacity
building.
Understanding
of
the
issues
you
know,
law
enforcement
definitely
has
issues.
For
you
know
they
have
legitimate
issues,
and
when
you
speak
to
them,
you
will
find
like,
for
example,
they
there
is
a
csam
issue
and
they
want
to
take
it
down.
B
They
are
not
able
to
reach
the
legitimate
platforms
and
get
the
help
as
soon
as
possible,
so
there
can
be
other
things
which
can
be
done
and
it
is
a
very
genuine
request.
They
have
so
you
know
a
woman
is
harassed.
They
want
to
take
it
down,
they
are
not
being
able
to
take
it
down
so
that
there
has
to
be
accountability
at
different
level,
whereas
breaking
the
encryption
may
not
solve
it.
There
are
process
issues,
there
are
perhaps
more
education
issues
or
proactive
preemptive
issues
needed
not
after
an
issue
has
happened.
A
You
know
the
that
social
versus,
like
social
problems
versus
how
we're
able
to
address
it
via
technology,
but
I
think
you've
already
answered
most
of
it
yeah
through
that.
You
know
I'm
aware
of
time,
so
I
think
the
last
thing
that
I
wanted
to
talk
about,
especially
because
you
know
you've
spent
so
many
years
engaging
in
civic
education
and
you
know
using
different
sorts
of
strategies
and
tactics
and
modes
to
educate
several
stakeholders
and
actors
about
what
may
concern
them
or
you
know
actively
championing
an
open,
interoperable
internet.
A
When
we
take
a
toolkit
like
the
internet,
society
has
produced
on
the
internet
way
of
networking.
You
know
we
realize
that
it
is
an
extremely
crucial
but
easy
to
understand
framework
within
which
we
can
place
an
ideal
internet
right,
an
inter
glo
in
an
open
globally
connected
secure,
trustworthy
internet,
and
I'm
just
wondering
from
your
experience.
How
can
civic
education
help
not
only
our
community
but
also
the
sorts
of
networks
and
people
and
actors?
We
work
with
including
policy
makers
use
this
framework
to
think
about
their
vision
of
the
internet,
so.
B
I
think
this
toolkit
needs
to
be
spread
over
many
times
when
policy
makers
make,
and
I'm
talking
about
policy
makers.
Then
I'll
talk
about
normal.
You
know
people
you
and
me,
so
if
you
want
to
go
to
policy
makers
etc
and
try
to
or
governments
to
explain
or
if
you
just
show
them
that
look,
this
is
how
the
toolkit
is,
and
this
is
where
you
stand.
They
will
not
like
it.
You
know
no
one
likes
to
see
where
you
lag
rather
kind
of
having
the
conversation
of
this
is
the
toolkit.
B
This
is
how
you
can
use
it.
Why
don't
you
use
it
and
see
when
your
next
policies,
your
drafting
or
something
perhaps
having
the
conversation
in
a
different
way,
making
it
more
easier
for
them
to
use,
can
help
for
and
for
genuine
people
like
you
and
me,
or
even
younger
people
who
are
coming
in
and
are
very
interested
in
these
issues,
perhaps
making
it
more
simpler
or
even
showing
them?
B
Examples
like
this
has
been
done
in
a
more
pictorial
manner
or
making
small
bits
of
information
and
sharing
that
have
you
ever
looked
at
your
policy
and
seen
that.
Is
it
going
to
help
you
to
you
know
to
make
it
more
safer
for
you
or
you
know,
breaking
things
down
and
sharing
with
them
perhaps
may
help,
as
in
you
need
different
strokes
for
different
folk.
There
is
a
beautiful
toolkit
which
has
been
made.
It
needs
to
be
used
and
there
is
no
right
answer.
Something
may
work
in
some
place.
B
Something
may
not
work,
but
I
think
you
have
to
speak
the
language
which
people
like
to
speak
and
address
the
issues.
You
know
if
someone
says
that
look.
This
is
the
issue
and
this
is
what
we
are
trying
to
address
and
you
and
you
will
have
to
genuinely
get
down
to
the
level,
to
try
to
understand
the
issue
and
then
try
to
give
your
rationale
for
it.
If
you
negate
someone's
issue
and
say
no,
no,
this
is
not
a
genuine
issue,
even
in
an
encryption
discussion.
B
If
you
say
no,
no,
that's
an
issue,
but
you
can't
break
you
have
to
try
to
give
alternatives
to
people,
but
I
think
it's
a
good
mirror,
I
would
say
the
toolkit
to
help
people
see
where
they
are
versus,
where
they
want
to
be,
because
no
nation
or
no
legislation
wants
to
do
something
wrong.
They
all
want
to
do
something
right
and
they
have
genuine
interest
for
their
a
sovereign
has
an
interest
for
their
people,
but
sometimes
they
overlook
things,
and
I
think
this
can
help.
A
Thanks
amrita,
we
have
a
question
in
the
chat
from
david
who
says:
how
can
we
address
the
society
problem
that
don't
have
the
broadband
internet
access
at
all?
So
I
think,
first
and
foremost,
I'd
like
to
say
david,
you
know
we
are
very,
very
fortunate
and
privileged
to
have
internet
access
in
the
first
place.
A
You
know,
because
we
we
realized
that
there
is
a
genuine
digital
divide,
that
there
are
still
people
who
haven't
used
the
internet
or
do
not
get
a
chance
to
use
the
benefits
that
the
internet
has
to
offer,
and
you
know
that
is
one
of
the
things
that
the
internet
society
also
focuses
on.
You
know
it's
growing
the
internet,
making
sure
that
the
internet
reaches
the
ones
who
are
furthest
away
and
one
of
the
ways
in
which
the
internet
society
is
doing,
that
is
by
building
community
networks.
A
A
You
know,
like
a
small
group
of
people,
a
community
that
sort
of
lives
in
a
certain
part
of
the
world
and
may
not
have
internet
access,
but
the
internet
society
therefore
helps
them
sort
of
build
that
with
you
know,
however,
we
can
help,
but
I'm
wondering
if
you
have
any
thoughts
on
those
who
don't
have
access
yet.
B
Yeah,
so
coming
back
to
I'll
just
speak
about
the
community
networks
which
niti
mentioned.
So
these
are
in
far-flung
areas
where
normally
people
don't
want
to
go
and
set
up
the
internet
connectivity
and
it
empowers
the
community
to
run
and
sustain
it,
because
just
providing
the
internet
is
not
impo
the
end
of
it.
It
is
sustaining
it,
so
they
take
ownership,
they
run
it
and
people
join.
So
that's
the
beauty
of
community
networks
now
various
see
as
niti
mentioned,
the
pandemic
has
further
increased
the
digital
divide
and
the
gender
divide
is
absolutely
screwed.
B
Governments
are
making
efforts,
for
example,
if
I'm
looking
at
india,
there
is
a
way
in
which
various
villages
are
being
connected.
There
is
a
particular
fund
called
which
is
being
pumped
in
there.
There
is
a
wireless
system
which
is
pm
bani,
which
has
come
in,
wherein
there
would
be
shared
buyer
wi-fi
systems
available
for
people
in
the
villages.
So
there
are
in.
B
You
know,
you
know,
measures
being
taken
to
connect
people,
and
I
think
there
has
to
be
more
private
public
partnership
and
civil
society
also
has
to
be
included,
because
just
providing
connectivity
is
not
enough.
People
need
meaningful
connectivity,
for
example.
What
the
covet
has
actually
taught
is
you
know?
Low
bandwidth
is
not
going
to
help.
Students
cannot
study.
You
need
a
particular
amount
of
quality
of
bandwidth,
so
the
availability,
the
accessibility,
the
price
point,
the
quality.
These
are
important.
B
B
Similarly,
capacity
building
in
terms
of
safety
is
important
and
those
are
certain
things
which
many
of
the
internet
society
initiatives
also
do
the
beyond
the
net
projects
etc.
So
those
are
important
allowing
girls,
for
example,
to
learn
internet.
So
there
are
challenges.
Less
than
half
of
the
world
is
still
not
connected.
Everyone
wants
to
connect,
there's
not
no
sure
shot
answers,
but
everyone
is
trying
to
look
at
different
options
to
connect,
and,
incidentally,
in
india,
the
satellite
elon
musk
says
that
with
satellites
they
will
connect.
B
A
That
was,
that
was
amazing,
so
I
want
to
just
say
thank
you
before
I
wrap
up
the
session.
Thank
you
to
amrita
for
joining
us
this
morning
and
thank
you
for
everyone.
All
of
the
voices
from
the
community
who
joined
attended.
The
session
you
know
have
have
joined
us
to
raise
our
voice
in
support
of
an
open,
globally
connected
secure,
trustworthy
internet.
A
I'd
just
like
to
remind
you
that
there
is
a
hashtag
for
social
media
communityweek21,
where
you
can
lend
your
support
to
our
advocacy
online
and
thank
you
so
much
for
taking
out
the
time
to
join
us
at
this
session
on
the
internet
way
of
networking
and
we'll
see
you
soon.