Disputes are an inevitable reality in business. There is no business without disputes and hence one of the major business Governance issue is how to effectively manage a dispute resolution mechanism in a corporate environment.
Major disputes in a corporate environment are between the management and the employees and between the Company and the Consumers.
With growing E Business concepts, consumers buy and sell online and hence when disputes arise, the first option for them is to seek the dispute resolution also online. Normally the dispute resolutions extend to a chain of e-mails extending over a period. Often the call centers which are better equipped to handle service issues are clogged with the complaints from irate customers.
Even in the employer-employee scenario, often employees who have left the organization and have a dispute to settle with their previous employers find it difficult to resolve differences over e-mails when they have moved out to a different location on a new assignment.
When disputes go out of hand they land up in Courts and everyone including the Courts themselves know that the legal process is very painful and better avoided. Hence ADR (Alternate Dispute Resolution Concepts) are gaining ground . Mediation and Arbitration are therefore becoming the preferred methods of dispute resolution which even the Civil Procedure Code is recommending in every civil dispute.
Having accepted the concept of ADR, there is still a need for ensuring that the cost of dispute resolution in terms of the time, effort and money spent by the disputing parties to be brought down.
Travelling from place to place to attend an arbitration meeting in a hotel, cost of hosting the meeting in a hotel, cost of stay of the participants and the arbitrators in comfortable accommodation are all issues that add cost to the ADR process beyond the professional fees payable to the Arbitrators and the advocates who represent the disputing parties.
To ease the pain of this physical ADR process, there is an urgent need for development of the ODR process namely the Online Dispute Resolution Process.
Now there is a solution on hand for the ODR process in the form of the Arbitration.in re-launched by Naavi with some modifications from the earlier model.
The website www.arbitration.in provides the details of the service. In its simple explanation, Arbitration.in provides an online meeting place to conduct online Arbitration or Mediation, for a fee which is cheaper than renting a hotel conference room. Participants need not travel but connect through internet and conduct the transactions.
Additionally, Arbitration.in is supported by ceac.in which provides a soft copy of the proceedings recorded as a video under the presence of an observer who is the Registrar of the session and duly certified as required under Section 65B of Indian Evidence Act .
Thus the ODR sessions of Arbitration.in are not only convenient and cost effective but also legally sound.
Kindly note that Arbitration.in is not intended to a competing Arbitration Council to the existing systems. It is only a platform for individual Arbitrations and Mediations and can be used by the Arbitration Councils for the benefit of its members.
I invite Arbitration Councils to make use of this service for the general good of the community.
I request visitors to check out www.arbitration.in and give their feedback as to how it can be made more useful.
The service is just now launched in its new form and yet to be marketed. Any suggestions for marketing the service in India and outside are welcome.
(P.S: This post tries to explain the “e-sign” system of authentication of an electronic document as per the provisions of Information Technology Act 2000 as amended in 2008 -ITA 2000/8, for the benefit of students and teachers of Cyber Law.
This is also an addendum to the e-Books published by Naavi such as Cyber Laws for Engineers”, “Cyber Crimes and ITA 2008” and “Cyber Laws for Everyone”.
I would like to however add a caveat that Naavi considers that some of the provisions of e-Sign are not completely compliant to the parent law namely ITA 2000/8 and hence can be questioned for its legality. I have brought this to the attention of CCA and sought clarifications but have failed to receive any response.
It looks strange that I have to raise Cyber Law related questions on CCA which itself is a statutory authority to frame the laws of digital signature. It is perhaps like Carrying Coal to Newcastle!. But when the law makers themselves seem to be faltering in law compliance, it is difficult not to voice the opinion even if it is futile.
These academic discussions about the legality apart, students of Cyber Law may kindly note that even if it is a bad law, the law related to e-sign is a reality and they may take cognizance of the same for academic purpose.
It may take several years before a Cyber Law understanding Supreme Court Judge will emerge in India who will try to provide necessary legal guidance to the Government on how to properly interpret the law as in the books.
In the meantime, some Judges may even uphold the law as made by the Government and ignore the inconsistencies with the ITA 2000/8.
Hence students who write examinations in Cyber Law and teachers who teach Cyber Laws may teach what the Government has proposed which is contained here in… Naavi)
When Information Technology Act 2000 (ITA 2000) was drafted as “Draft E-Commerce Act 1998”, by the then Union Commerce Ministry, the draft was focussed on providing legal recognition to Electronic Commerce Transactions.
Hence the Act was drafted keeping in view the need to provide legal recognition to Electronic Documents and a method of authentication of electronic documents.
The very first draft of the “Draft E Commerce Act 1998” drew heavily on the then present laws of Malaysia and Singapore besides adopting the E-Contract related provisions in the UNCITRAL Model Act 1996. (The developments have been traced by Naavi here).
This “Draft E Commerce Act 1998” was an excellent provision and the next replacement draft in the form of “Information Technology Bill 1999” which later became the “Information Technology Act 2000” (ITA 2000) was not as good as the draft of the Commerce department. Nevertheless it is the law of the land which became effective from 17th October 2000. This was further amended with effect from 27th October 2009 which we call as the ITA 2008.
ITA 2000 adopted a form of authentication which was called “Digital Signature” based on the PKI system. This used Hashing of a document and its encryption with the use of the Private key of an individual created in an Asymmetric Crypto System as the system of authentication of an electronic document recognized as equivalent to a physical signature.
After the digital signature system was adopted in law as the only form of authentication of an electronic document, several voices were raised that authentication system in ITA 2000 was digital signature technology dependent and is not “Technology neutral”. It is interesting to observe that the original draft in the “Draft E Commerce Act 1998” was completely technology neutral as it stated:
8. Electronic Signatures.Except as provided in Section 4, where any rule of law requires that a record bear a signature, or provides for certain consequences if a record is not signed, an electronic signature satisfies that rule of law if:
(a) a method is used to identify the originator and to indicate the originator’s approval of the information contained in the electronic record; and
(b) that method is as reliable as was appropriate for the purpose for which the electronic record was generated or communicated, in light of all of the circumstances, including any relevant agreements among the parties involved.
The cry of technologists for the system of authentication to be “Technology neutral” was addressed in the amendments of 2008 when new enabling provisions were introduced to enable alternative technologies to the PKI system adopted by Digital Signatures. The system of approved authentication was termed as “Electronic Signature” and the PKI based digital signature was declared as one of the types of Electronic Signatures and continued to be the sole system then recognized.
Though an alternate electronic signature technology that could be used either as a replacement of or as a modification of the digital signature system was possible since 27th October 2009, it was not until 2015 that an alternate system came into reckoning in the form of “e-sign”.
This discussion is on this new system which has been notified as an “Electronic Signature” in the Second Schedule of the ITA 2008 (the version of ITA 2000 after incorporating the amendments of 2008) and recommended to be used in the “Digi-Locker” system of the Government of India and also the e-KYC system using Aadhar which is likely to be used extensively in the coming days in many critical electronic commerce activities.
The undersigned has brought to the attention of the CCA (Controller of Certifying Authorities) certain doubtsabout the compliance of the proposed system to Information Technology Act 2000/8 but has not been able to get a reply. Let’s ignore these objections for the time being and see what is the new law of e-sign.
These rules added the following into the Second Schedule of Information Technology Act 2000 (21 of 2000).
(P.S: This version of ITA 2000 is the 2008 version of the Act in which the earlier Schedules numbered as First, Second, Third and Fourth Schedules were replaced with a set of new schedules numbered as First and Second Schedule.)
Sl No
Description
Procedure
1
e-authentication technique using Aadhaar e-KYC services
Authentication of an electronic record by e-authentication Technique which shall be done by-
(a) the applicable use of e-authentication, hash, and asymmetric crypto system techniques, leading to issuance of Digital Signature Certificate by Certifying Authority
(b) a trusted third party service by subscriber’s key pair-generation, storing of key pairs on hardware security module and creation of digital signature provided that the trusted third party shall be offered by the certifying authority. The trusted third party shall send application form and certificate signing request to the Certifying Authority for issuing a Digital Signature Certificate to the subscriber.
(c) Issuance of Digital Signature Certificate by Certifying Authority shall be based on e-authentication, particulars specified in Form C of Schedule IV of the Information Technology (Certifying Authorities) Rules, 2000, digitally signed verified information from Aadhaar e-KYC services and electronic consent of Digital Signature Certificate applicant.
(d) The manner and requirements for e-authentication shall be as issued by the Controller from time to time.
(e) The security procedure for creating the subscriber’s key pair shall be in accordance with the e-authentication guidelines issued by the Controller.
(f) The standards referred to in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 shall be complied with, in so far as they relate to the certification function of public key of Digital Signature Certificate applicant.
(g) The manner in which information is authenticated by means of digital signature shall comply with the standards specified in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 in so far as they relate to the creation, storage and transmission of Digital Signature Certificate.”
The key aspects of this notification are :
This notification was issued in order to provide acceptance of the Aadhar E-KYC services.
The issuance of Digital Certificate was by a Certifying authority but based on the e-authentication of the application form of the subscriber using the e-KYC services of Aadhar
The e-KYC process included “Digital Signature of the Aadhar authorities” but only an “E-Consent” of the subscriber.
In other words, the subscriber application did not carry the authentication as required by ITA 2000/8 but the UIDAI sending the KYC information such as the name, address, e-mail address etc as contained in the subscriber’s application form with UIDAI’s digital signature.
The request for digital signature certificate will be received by the Certifying authority from a “Trusted Third Party” who generates the key pair in a “hardware security module”. (It is understood that the trusted third party should be a Registration Authority appointed by the Certifying Authority)
Further detailed instruction to be issued by the Controller from time to time.
CCA issued the more detailed instructions on the use of the e-sign process in its e-authentication guidelinesissued on 24th June 2015.
In this entire process, the Certifying Authority is receiving a “Request for issue of digital certificate” from its own agent namely the Regisration authority. (e-Sign Service Provider).
In the normal digital signature certificate issue process, the agent would be responsible for doing the KYC process. In the e-sign process, the agent is using a verification of the subscriber information from the UIDAI authorities under their digital signature.
The request for digital signature is however triggered by the aadhar holder who wants to avail some online service where there is a need for digital signature. It could be a digi-locker service or a banking service. Then that service provider would send a request for digital signature issue online to the Certifying authority through its designated registration agency which is capable of issuing online digital certificates.
This request from the e-sign user agency may come in the form of an API integration of its own service with the e-sign issue service. i.e. Let’s say Mr X requests a Bank Y to withdraw some money from his account. Bank Y wants the request to be digitally signed and wants to use the e-sign system. It then contracts with a Certifying Authority for issue of e-sign certificates. The Certifying authority requests a Registration Authority to manage the application processing. The registration authority will develop an API to be used by the Bank to deliver its service.
Let’s now look at the process in the light of a use case where a customer of an online Bank is using a withdrawal service from the Bank supported by an e-sign.
When the customer Mr X completes the form for withdrawal of money from the Bank, simultaneous to the completion of the online withdrawal form, a request for e-sign certificate is generated with the particulars of the customer of the Bank already available.
This is sent by the Bank to the registration authority and then on to the Certifying authority.
When the registration authority sends the application form to the certifying authority, it sends the application along with a public key generated from the pair of keys randomly generated by its HSM (hardware security module).
The private key generated in the process remains in the HSM and the public key comes back as a e-sign digital certificate.
The bank withdrawal form will be signed with the e-sign in the name of the subscriber but by the use of the private key pulled from the HSM in the control of the Registration Authority. The Bank based on this e-sign digital signature request acts on the withdrawal form and dispenses the amount.
In the above process, it must be recognized that e-Sign digital signature process is rendered subordinate to the Aadhar system. For example, the authentication of the subscriber is done with reference to the records about the subscriber held by the UIDAI. The request for this records is generated by the API upon the subscriber providing either his biometric details or through the use of OTP.
The UIDAI system checks the biometric or the OTP and then confirms the information that is available in the e-Sign application form as correct or not. If it says Mr X is Mr X and his address and e-mail address matches the UIDAI records, then the e-Sign process will issue the digital certificate in that person’s name. If the e-mail address is not available with the UIDAI or is a shared e-mail address, the Aadhar authentication is done with reference to such un available or shared e-mail address.
Since the e-KYC system can be used even with an OTP, the system will send a PIN to a mobile number given by the subscriber Mr X in his service application form and if it is received back, will assume that Mr X is what he claims to be.
If the mobile number available in the Aadhar registration is a shared mobile, then the OTP authentication is done with reference to the shared mobile. Also the authenticity based on the mobile means that the KYC of the mobile operator becomes the reference point for the KYC under the e-KYC system of Aadhar which in turn becomes the reference point for the e-Sign subscriber identification.
While the above records the way the e-sign system is supposed to work, let’s now look at how e-Sign compares to the normal digital signature in terms of the “Non Repudiable Nature”.
The “Non Repudiable” nature of the digital signature as recognized under ITA 2000 was a result of two factors
The Private Key is always under the control of the subscriber. It is generated in the system of the subscriber during the application process and never leaves the system. In the case of “Secured Digital Signature”, it is produced in the Cryptographic USB device and remains trapped there. Only the public key moves out and comes back in the form of a digital certificate and can be exported from the device.
The technology of the Asymmetric encryption system and the hash algorithm ensures that the “Hash Value of a document encrypted with the private key of the person” is unique both to the person and to the content of the document and hence accepted as a “Non Repudiable Authentication” of the person for the document.
In the e-Sign system, the private key is not entirely under the control of the subscriber. It is generated in the HSM owned and operated by an agent of the Certifying Authority and hence it is compromised ab-initio. It can be misused by an authorized employee of the e-Sign Service Provider.
Since under the proposed guideline, the e-Sign private key is a one time key and is destroyed within 30 minutes, once the transaction is completed, there is no way of verifying the signature after 30 minutes except with reference to the meta information associated with the transaction without the private key. The non verifiability of the e-Sign signature after 30 minutes and the generation and storing of the private key in the HSM makes e-Sign “Repudiable”. It is therefore to be considered as inferior to digital signature from the point of view of legal validity.
In practical terms this means that the e-Sign is not a legally acceptable authentication like a digital signature. It is only another form of the mobile number based OTP authentication and is only camouflaged as a legally valid digital authentication.
Unless there is a major modification of law, it is not possible to equate the e-Sign with digital signature and all the statutory authorities including the CCA are parties to this mis-representation of e-Sign as a legal equivalent of digital signature.
However, since CCA has endorsed the system, we can consider e-Sign as a “Second Class Digital Signature” some thing similar to an “Implied Digital Signature”. It is open to the Courts of the future to decide what value is to be ascribed to evidence digitally signed with e-Sign.
Of late, Section 65B of Indian Evidence Act is under focus in the Judicial and Law Enforcement circles. In this context, Naavi has put across his views on the section and how it needs to be understood in the above video available on You Tube.
The main points that Naavi makes here are
a) Section 65B (as well as 65A) of Indian Evidence Act refer to the special provisions of the Act in respect of Electronic Documents. Though Section 65 is referring to “Secondary” documents in paper form, there is no such distinction made as to the electronic document.
b) There is no need to distinguish Primary and Secondary and all documents need to be interpreted by a human being which takes the form of a Section 65B certificate.
c) A “Hard disk” which may contain an electronic document also cannot be considered the “Primary Document” since it is only a “Container” and the real Electronic document is an expression in binary language which cannot be read by a human being and needs to be interpreted with the assistance of a binary reading device (Computer + operating system +Application)
d) Section 65B explains the conditions under which an electronic document can be considered as “Admissible” in a Court as a “Document” and it needs to be suitably confirmed for the Court to accept the document, which is often termed as “Section 65B certificate or Statement”
e) Section 65B refers to a process of producing a “Computer Output” of the electronic document which is the evidence to be admitted and such computer output can be either in the form of a “Print Out” or a “Copy”.
f) There is a “Process” by which the electronic document becomes the “Computer output” and Section 65B identifies this as the subject activity which needs to be conducted by a person having lawful control over the computer producing such output and that during the period of such production, the Computer should be working properly etc.
g) The focus of Section 65B is the activity of conversion of the electronic document residing inside a system which can be seen by an observer into a “Computer Output”.
h) The other clarifications contained in the Section 65B such as that the the Computer Output could be produced by a combination of computers, acting in succession etc are relating to dynamic creation of an electronic document from a data base and routing it through multiple devices onto a final visible form in the computer of the observer and thereafter its porting into a Printer.
i) Considering these interpretations, the Section 65B certification is a “matter of fact” certification to the effect that “What I saw is what I reproduced as a computer output faithfully” and this can be done by any person who is observing an electronic document in his computer and wants it to be produced as an evidence. It is not necessary that a document from yahoo website has to be certified only by a Yahoo server administrator. Similarly, a statement of account downloaded from an ICICI bank website need not be certified only by the ICICI Bank manager but by any person who can lawfully access the document in electronic form.
j) There is also an important distinction that “Content Owner” is different from “Content Viewer” and Section 65B is meant to be produced by a content viewer. On the other hand the content owner in respect of say a Bank statement is the official Bank manager and he can provide a print out as the owner of the content who understands the content and is considered as an “Expert” in the domain. Any body else who views the document provides a Section 65B certificate that the print out (or a soft copy) is a faithful reproduction.
It is very important that the legal fraternity and the Judiciary interprets the section properly. Any interpretation that only a “Server Administrator” can provide a certificate under Section 65B is considered incorrect. The server administrator can however provide the certificate but it is not mandatory. The Section 65B certifier is like a photographer who captures a photograph of an event and confirms the process of taking the photograph though he may not be aware of who is there in the picture and what they are doing. It is left to other “Experts” to interpret the “Content” and impute meaning as only a subject matter expert can do.
The undersigned has been running the Cyber Evidence Archival Center (www.ceac.in) since 2002 and has produced evidence under Section 65B certification in many legal proceedings. The first case in which an accused was convicted under the provisions of ITA2000 namely the State of Tamil Nadu Vs Suhas Katti happened in 2004 and in that case, the undersigned had produced a print copy of an electronic document which was then present in yahoo server with the appropriate certification. It was accepted and the accused was convicted.
In that case, the undersigned was also examined an “Expert” since as a part of the certification, he had also interpreted the IP address visible in the document as belonging to a specific ISP in Mumbai etc.
The current interest in the Section 65B has come because of the Supreme Court making a mention recently about the need for such certification whenever an electronic document is produced as evidence.
It is however felt that it is necessary for all the Courts to have proper understanding of the Section since otherwise mistakes can occur in acceptance or rejection of electronic documents in Courts.
The embedded video in YouTube contains the above discussion.
When a customer uses a debit card online, the card payment is authenticated by a system of payment gateways and money transferred from the card issuing Bank to the Merchant so that the Merchant can release the service. Normally the authentication happens instantly and the customer can avail the service without any delay.
However, there could be occasions when the authentication process encounters technical problems such as lack of connectivity and the authentication may fail. In some cases, the bank account is not debited and the Merchant also has received the payment and hence the customer may re-try the payment and complete it.
Occasionally the amount gets debited from the Bank account but the Merchant reports non receipt of money. In one of the recent instances the undersigned encountered, the merchant even issued an invoice confirming the completion of the transaction but when the subject service did not come through and I raised a query, indicated that the authentication had failed.
This could mean that the Merchant is lying in which case it is a question of fraud.
It is also possible that the authentication was first confirmed and then reversed by the agency responsible for authentication. This could be a correction of a mistake or a result of a bug. The responsibility however lies with the Card issuing Bank.
If the authentication is through in the first instance and the Merchant releases the service it becomes a dispute between the Merchant and the Card issuing Bank. If the service is not delivered, the customer has a double jeopardy. He loses the execution of the service and if it is a time sensitive transaction, he may suffer a real and substantial loss. Additionally, the customer would have to fight for refund with the Bank.
In the recent transaction which the undersigned encountered, though the Merchant who had issued an invoice confirmed after a delay of about a day that the transaction had failed, the Bank has refused to provide the charge back instantly.
They have suggested that the charge back may take upto 36 days.
As a customer, this means that I will be denied of the service and the money for 36 days. If so, the question arises about who enjoys the money during this interim period.
We all know that Banks work under an opportunity cost of about 3% per month and it therefore enjoys the wrongful gain of 3% per month until the amount is reversed back into the account of the customer. Since we can expect that there could be lakhs of failed transaction at any point of time it appears that a substantial amount of money of umpteen customers lie with the Bank as “Unsettled” amounts. Though the individual amounts may be small, collectively it may be substantial.
If the Card is a Credit Card and the customer is not vigilant, the amount would be debited to the account and interest charged there on in the usual course of accounting. If it is a debit card, it will deny the customer of interest for say upto a month on the SB account when the amount is debited even for a day.
I have therefore requested the RBI to clarify their own views on how such float monies are accounted for by the Banks.
I have also asked RBI to let me know an estimate of such float but it is possible that RBI may not have such data.
I have also asked for clarification from the Card issuing Bank and the Merchant who are yet to respond.
I request visitors to let me know if they have come across similar experiences.
After the incident in which a Corporation Bank employee was assaulted in an ATM in Bangalore, there was some discussion on provision of additional security at ATMs. Police said that it was the responsibility of the Banks and Banks said they cannot afford to post guards at all ATMs.
Ultimately, banks started charging more for ATM transactions to cover the additional expense but did not provide any additional security….
……They cheated the public and RBI allowed them to cheat.
Now, an incident has been reported from the Electronic City which indicates that there is a mafia that is working to rob customers at ATMs. I reproduce the information posted by the victim in another forum for public information.
Quote:
BEWARE OF THIEVES & ROBBERS AROUND ATM IN BANGALOR
My son who is working in Infosys, Electronic City, Bangalore had a bitter experience on 20th Dec. His 2 friends had withdrawn cash and come out of ATM at midnight near electronic city after their shift is over. On their exit from the ATM, 3 rogues had intercepted them and snatched the money and costly smart phones. When my son went for their help, he was beaten. He had resisted and bounced back. All the 3 clashed with 3 robbers. One of them escaped and brought about 10 local rowdies to the spot immediately. My son and his another friend were kidnapped to a play ground at a secluded place and marred them. His head, face, hands, back, hip and all over the body were full of bruises and contusions. Both of them were unconscious for a long time. When another friend became conscious, he was able to move and get an auto to drop my son at his house without making any complaint to the Police. My son and his friends are afraid to make a complaint to the Police, saying “the Police are hand in glove” and there would be of no use, except mental agony from the Police and further threat from the rowdies and robbers. I informed the matter to my local friend at Bangalore and a Legal Person and requested to help. They also said the same thing is happening everyday and particularly the next day one Mr. Vinayak had experienced with the same incident. Govt. is not at taking steps to prevent these atrocities. Are these politicians running the Govt. like this? I wonder. Only God can punish these culprits, it seems. Why I am posting this incident is, just to caution our people not to use ATM beyond 9 p.m. Because of the growing robbery and atrocities, the ATMs at the outskirts can be shut down between 10 p.m. and 7 a.m. More over, whoever happens to move around at the midnight should not hold the costly smart phones.
Unquote
It is unfortunate that law and order in Bangalore is deteriorating day by day. We are aware of motorcycle borne chain snatchers roaming the city during the early mornings and now these ATM robbers in the evening. In between we have robbers posing as Police attacking people in Nice Road, not to talk of bag snatchers every where.
I wish the Government does not allow the situation to further deteriorate and people start referring to Bangalore another jungle Rajya after Bihar.
At the same time, Bankers need to explain why there were no guards near the ATM referred to in the above incident and whether any CCTV footage has been captured. RBI should take immediate punitive action against the Bank owning this ATM for failing in its duty to provide security and causing the robbery.
Police should also file a case against the Bank for negligence in providing security at the ATM without taking refuge under the fact that no complaint has been filed.
If the Citizens feel insecure to approach the Police, it is a shame on the Police and not an omission on the part of the public.
The Free Basics debate in India has reached a crescendo and there is lot of confusion surrounding the service launched by FaceBook in association with Reliance and the consultation paper which TRAI has released on “Net Neutrality”.
It appears that the debate of Free Basics and Net Neutrality getting inter connected and hence the public are finding it difficult whether they should respond to the TRAI consultation paper or not.
It is obvious that Free Basics is an advantage to Reliance and therefore could be a disadvantage to other mobile service operators. Hence there is a business interest involved in opposing the Free Basics which needs to be factored into the analysis.
As far as the consumer is concerned, Free Basics brings to them certain content services for which data is not charged by the mobile service provider.
The user may be a farmer who is looking for some agricultural information or a cricket enthusiast who is looking for CrickInfo scores or a student who is browsing through some academic information.
It is true that at the same time when content offered through Freebasics comes without data charge, similar content outside the platform of Free Basics is charged. to that extent, the “free service” is more attractive than the “Paid service”. Hence some consider this as affecting “Net Neutrality”.
Some time back, some service providers tried to introduce schemes whereby they wanted to give certain premium services free on the mobile by collecting money directly from the beneficiary companies. This was opposed and the proposal was dropped under the consideration of “Net Neutrality”.
The Free Basics however has structured its services differently. Firstly it has presented itself as a “Platform” and any content provider may apply to be part of the platform provided he follows certain content guidelines. As long as this is not discriminatory, there should be no grounds to object. It appears that the present guidelines may favour basic content providers and not fancy websites and e-commerce sites and this is an acceptable criteria so that the data element is kept thin.
As long as there is no discriminatory exclusions, the system may be considered as equitable. In India we are used to “Reservations” of various kinds. Activists who worry about “neutrality” may also address if there is neutrality in the provision of basic services in the physical world, before raising their voice on the free internet that may become available to a limited extent as a result of Free basics.
It is understood that the Freebasics content would pass through a proxy server of FaceBook which will collect some user data which is the value proposition for FaceBook. Though some privacy concerns can be raised on this account, the user himself may not be much worried on this account. Reliance may have increased clientele and also some reverse benefit from Face Book to offset the cost of data that it foregoes. This is a business strategy that is not objectionable per-se.
The low income mobile user may look at this as an opportunity to get some free Internet on the mobile just as the concept of ad supported free internet which was prevalent in the early eighties.
Today every business operator including Google collects information from users and uses it to its business advantage. Some of them may throw back free services to attract more customers since the value of data that the users bring in more than offsets the cost of the service itself. Even Gmail may be running on this principle.
Hence blaming FreeBasics only for the fact that it is making the life of the business rivals more difficult is perhaps incorrect.
On the otherhand, the rival telecom providers can consider collecting their own content packages and deliver them free through their services so that they donot lose their business. Nothing prevents Airtel from providing cricbuzz scores free or Telegram service free of data charges to counter Freebasics-Reliance offers.
The competition may actually benefit the general consumer.
What TRAI has to ensure however is that
a) Free Basics platform is open to all under a public technology based guideline
b) No content provider is discriminated against arbitrarily
c) Other service providers may be encouraged to introduce content packages with their own set of content providers
The net effect of the above is that basic information available on the internet may become available on the mobile without specific data charge. All other services will come with data charge like a premium service.
This may be good to reduce the digital divide and benefit the society in the long run.