India Internet Shutdowns 'Violate Human Rights'

India Government starts to use arbitrary powers to shutdown telecoms networks, including the internet to quell public disorder.

Human Rights Watch (HRW) has said India needs to cease "arbitrary restrictions" on Internet and phone services. The organisation said State governments had imposed 20 temporary Internet shutdowns in 2017. Authorities say they shut Internet and telecommunications services to stop rumours during times of unrest.

But the rights group said arbitrary Internet shutdowns "violated India's obligations under international human rights law". Indian authorities frequently shut telecommunication services in Indian-administered Kashmir. Earlier this month, the government in the western state of Maharashtra shut down Internet services after protests led by farmers turned violent.

Meenakshi Ganguly, South Asia director at Human Rights Watch, said the authorities' concern about misuse of social media "should not be the default option to prevent social unrest". 
"The lack of transparency and failure to explain these shutdowns only further the perception that they are meant to suppress non-violent reporting and criticism of the government," she added.

The organisation, however, said that social media in India, "has at times fueled rumours leading to violence".
But it advised the government to not fully shut services during protests.
"Instead of fully shutting down networks, authorities can use social media to discourage violence and restore public order," it said.

BBC
 

You Might Also Read:

Indian Police In A Cyberwar:

Cybersecurity Skills Gap in India:

Turkish Coup: Attempt To Block Internet Fails:

Great Wall: China Bans Foreign Online Publishing:

 

 

 

« Petya Cyber Attack Hits EU & US
Scenarios For Predicting Terrorist Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Infosec Global

Infosec Global

Infosec Global provides technology innovation, thought leadership and expertise in cryptographic life-cycle management.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.