<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/a2k/front-page/search_rss">
  <title>Access To Knowledge (A2K)</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1911 to 1925.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/global-partners-meeting-london"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/global-freedom-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/global-censorship-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/giga-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/global-partners-meeting-london">
    <title>Global Partners Meeting @ London</title>
    <link>https://cis-india.org/news/global-partners-meeting-london</link>
    <description>
        &lt;b&gt;Privacy International is organizing the Global Partners Meeting in London from March 22 to 25, 2013. The workshop will be held at the London School of Economics and Political Science. Sunil Abraham and Malavika Jayaram will be participating in this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/global-partners-meeting-london.pdf" class="internal-link"&gt;Click to read the full details published by Privacy International here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The meeting is an opportunity to connect global partners with each other and with researchers, human rights advocates, and privacy and technology experts from over 20 countries. This will provide an opportunity for discussion and debate, that will enrich global research and advocacy agenda for the next two years.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Workshop Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the three day workshop is as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;To understand the privacy discourse and identify the challenges faced in advancing the right to privacy across the globe.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To consolidate our network and look for opportunities for collaboration and cross-pollination for research and advocacy initiatives.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To share experiences about research, dissemination and advocacy strategies that influence policy change.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;We envisage this workshop as a launching pad for the work that Privacy International and our global partners will conduct over the next two years under the ambit of the Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project, funded by the International Development&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research Centre. The focus of the SAFEGUARD project is to understand what are the threats, challenges and obstacles to, and opportunities for, the protection of privacy in developing countries.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background to the SAFEGUARD project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nowhere are the challenges to, and opportunities for, privacy protections as dynamic and complex as in the developing world. As these countries seek new measures to develop their economies, build social and technological infrastructures, sustain their social systems, and ensure security they need to consider what are the modern policy frameworks they require to ensure a just society. The windows around these policy frameworks are key opportunities for reflection about rights and democratic values, and in the case of this project, the protection of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast scope and relevance of the right to privacy in this age of technology gives rise to a myriad of challenges and issues, many of which have relevance across, as well as within, borders. This is particularly the case in the developing world, where South-South collaboration is gaining increasing currency in the development sector, and donor countries continue to contribute to and influence policy in recipient countries, particularly with respect to the adoption of new technologies. Many of the trends in developing countries – communications surveillance, biometrics and DNA databases, and identity cards – mirror those being adopted in the global North. Policy laundering and modelling, such as that witnessed with respect to counter-terrorism policies in the aftermath of 9/11 is taking hold in the context of communications surveillance laws and national ID databases. Such phenomena raise concerns not only as to the spread of practices that threaten to undermine privacy, but also with respect to the stifling of national policy discourses and legislative processes.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conceptual framework&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This projects sets out to isolate and understand the challenges to privacy in the developing world. In order to ensure that the research developed is sufficiently targeted to influence policy debates, we have identified a set of themes that cover the range of privacy-related issues and that together will give a comprehensive picture of the difficult relationship between privacy and technology. This set of themes has been developed in collaboration with our partners, who have identified those discussions around which there is perfect storm of advancing surveillance policies and technologies, poor legal and technical safeguards, and a scarcity of research and understanding. We have designed our conceptual framework accordingly.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: center; "&gt;&lt;img src="https://cis-india.org/PI.png" alt="Human Rights &amp;amp; Privacy Laws" class="image-inline" title="Human Rights &amp;amp; Privacy Laws" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Research questions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The legal and constitutional landscape&lt;/b&gt;: What laws and constitutional provisions exist to protect privacy, how are they implemented and monitored, and where are the legal and policy gaps?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data protection&lt;/b&gt;: What is the state of data protection in partner countries, and what are the local and  regional regulatory standards and good practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications surveillance&lt;/b&gt;: What communications surveillance regimes are in  place, how are they designed in law and how do they operate in practice?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adoption of surveillance technologies&lt;/b&gt;: Where are governments buying surveillance technologies, and how are they using them? What legal regimes are in place to establish safeguards over the use of advanced surveillance technologies? What is the state of the art in legal protections?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Political intelligence oversight&lt;/b&gt;: What is the nature and operation of local intelligence services, what oversight mechanisms are in place, and how can these mechanisms be implemented or enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Politics, Identity, sexual and reproductive health and social sorting&lt;/b&gt;: To what the extent do governments misuse personal information to pursue social sorting practices?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Delivery of public services&lt;/b&gt;: What is the state of privacy protections in public service delivery, particularly those related to e-health systems and social protection programmes, and how can protections be improved?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;ID, DNA and biometrics&lt;/b&gt;: What privacy risks are associated with the collection and use of personal information for ID and biometric systems?&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Partners&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;span&gt;Africa&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Latin America&lt;/span&gt;&lt;/th&gt;&lt;th&gt;&lt;span&gt;Asia&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Zimbabwe Human Rights Forum, Zimbabwe&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Kenyan Ethical and Legal Issues Network, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Media Institute of Southern Africa, Namibia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Jonction, Senegal &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centre for Social Sciences Research, University of Cape Town&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;African Platform for Social Protection, Kenya&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Dejusticia, Columbia&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Asociacion por los Derechos Civiles, Argentina&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Autonomous University of Mexico State, Mexico&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Centro de Tecnologia y Sociedad, Universidad San Andres, Argentina, in collaboration with the Centro de Tecnologica da Escola de Direito da Fundacao Getulio Vargas, Brasil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Instituto NUPEF, Brazil&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: left; "&gt;Derechos Digitales, Chile&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;VOICE, Bangladesh&lt;/li&gt;
&lt;li&gt;University of Hong Kong, Hong Kong&lt;/li&gt;
&lt;li&gt;Centre for Internet and Society, India&lt;/li&gt;
&lt;li&gt;Thai Netizen Network, Thailand&lt;/li&gt;
&lt;li&gt;Thai Media Policy Center, Thailand&lt;/li&gt;
&lt;li&gt;Bytes For All, Pakistan&lt;/li&gt;
&lt;li&gt;Centre for Cyber Law Studies, Indonesia&lt;/li&gt;
&lt;li&gt;Foundation for Media Alternatives, Philippines&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Participants&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Ababacar Diop&lt;/li&gt;
&lt;li&gt;Allan Maleche&lt;/li&gt;
&lt;li&gt;Anna Fielder&lt;/li&gt;
&lt;li&gt;Anthony Jackson&lt;/li&gt;
&lt;li&gt;Arthit Suriyawongkul&lt;/li&gt;
&lt;li&gt;Arthur Gwagwa&lt;/li&gt;
&lt;li&gt;Ben Hayes&lt;/li&gt;
&lt;li&gt;Ben Wagner&lt;/li&gt;
&lt;li&gt;Benjamin Barretto&lt;/li&gt;
&lt;li&gt;Carly Nyst&lt;/li&gt;
&lt;li&gt;Carolin Moeller&lt;/li&gt;
&lt;li&gt;Charles Dhewa&lt;/li&gt;
&lt;li&gt;Claudio Ruiz&lt;/li&gt;
&lt;li&gt;Clement Chen&lt;/li&gt;
&lt;li&gt;Danilo Doneda&lt;/li&gt;
&lt;li&gt;Eric King&lt;/li&gt;
&lt;li&gt;Farjana Akter&lt;/li&gt;
&lt;li&gt;Fieke Jansen&lt;/li&gt;
&lt;li&gt;Graciela Sulamein&lt;/li&gt;
&lt;li&gt;Gus Hosein&lt;/li&gt;
&lt;li&gt;Helen Wallace&lt;/li&gt;
&lt;li&gt;Juan Camilo Rivera&lt;/li&gt;
&lt;li&gt;Karelle Dagon&lt;/li&gt;
&lt;li&gt;Katitza Rodriguez&lt;/li&gt;
&lt;li&gt;Kevin Donovan&lt;/li&gt;
&lt;li&gt;Levinson Kabwato&lt;/li&gt;
&lt;li&gt;Malavika Jayaram&lt;/li&gt;
&lt;li&gt;Mathias Vermeulen&lt;/li&gt;
&lt;li&gt;Michael Rispoli&lt;/li&gt;
&lt;li&gt;Nelson Arteaga Botello&lt;/li&gt;
&lt;li&gt;Pablo Palazzi&lt;/li&gt;
&lt;li&gt;Pirongrong Ramasoota&lt;/li&gt;
&lt;li&gt;Ramiro Alvarez Ugarte&lt;/li&gt;
&lt;li&gt;Richie Tynan&lt;/li&gt;
&lt;li&gt;Sam Smith&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Shahzad Ahmed&lt;/li&gt;
&lt;li&gt;Sinta Dewi Rosadi&lt;/li&gt;
&lt;li&gt;Sunil Abraham&lt;/li&gt;
&lt;li&gt;Stephanie Perrin&lt;/li&gt;
&lt;li&gt;Tavengwa Nhongo&lt;/li&gt;
&lt;li&gt;Vera Franz&lt;/li&gt;
&lt;li&gt;Vicky Nida&lt;/li&gt;
&lt;li&gt;Vivian Newman Pont&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;Friday, March 22, 2013: Reception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Meet with Privacy International staff members and advisors, and workshop participants from more than 20 countries in Latin America, Asia, Africa, Europe and Central Asia. Food and drinks will be provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Time: 6.00 p.m.&lt;br /&gt;Location: 2nd Floor, 46 Bedford Row, London WC1R 4LR&lt;br /&gt;Contact: 0207 242 2836&lt;br /&gt;Getting there: Our office is a short walk 10 minute from your hotel. See &lt;b&gt;Map 1&lt;/b&gt; below for directions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Saturday, March 23, 2013: Day 1 (Objectives and Reviewing the Landscape)&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Welcome Breakfast: Setting The Scene&lt;/b&gt;&lt;br /&gt;Location: Mercure London Bloomsbury restaurant&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Welcome and introduction&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Overview of PI’s work in developing countries&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Participant introductions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Setting the agenda&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12:30 p.m. - Session 1: Reviewing The Landscape&lt;br /&gt;&lt;/b&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mapping privacy in constitutions&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 1: communications surveillance laws around the world&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Break-out groups on assigned topics, and reporting back&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Afternoon tea&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Privacy quiz&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 2: SIM card registration&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Building a network: how can PI facilitate your work?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 3: Oversight of intelligence agencies&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Drinks&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7:00 p.m. - Dinner&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Location: Tohbang, 164 Clerkenwell Road&lt;br /&gt;&lt;a class="external-link" href="http://www.tohbang.com/sub_eng/main.php"&gt;http://www.tohbang.com/sub_eng/main.php&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Sunday, March 24: Day 2 (Research Topics and Strategies)&lt;/h3&gt;
&lt;p&gt;Location: Old Building, Room 3.21, London School of Economics and Political Science, Houghton Street, London WC2A 2AE&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10:00 a.m. - Recap of day one&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Masterclass 4 - The UN Universal Periodic Review&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Open-space - research and policy priorities&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;br /&gt;1:00 p.m. - Lunch&lt;br /&gt;&lt;/b&gt;Location: Ship Tavern, Holborn&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2:30 p.m. - Reconvene&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Open space - research, dissemination and communication strategies&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Wrapping up and going forward&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;6:00 p.m. - Dinner&lt;br /&gt;&lt;/b&gt;Location: Wahaca, Charlotte St, &lt;a class="external-link" href="http://www.wahaca.co.uk/"&gt;http://www.wahaca.co.uk/&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/global-partners-meeting-london'&gt;https://cis-india.org/news/global-partners-meeting-london&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-20T06:37:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights">
    <title>Global Networks, Individual Freedoms: A Peer Forum on Internet Freedom and Human Rights</title>
    <link>https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights</link>
    <description>
        &lt;b&gt;In Connection with the 2012 Internet Freedom Fellows Program, the United States Mission to the United Nations in Geneva is pleased to invite Pranesh Prakash to a peer forum at the United States Mission to the United Nations on Thursday, June 21, 2012, from 9 a.m. to 3 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Join the Internet Freedom Fellows, diplomats, UN representatives, civil society, technologists and social media experts, Geneva media and other professionals engaged in the intersection of human rights, internet freedom and technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This peer forum is part of the Internet Freedom Fellows program, which brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S. and international government leaders, and members of civil society and the private sector engaged in technology and human rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Freedom Fellows, all human rights activists and active practitioners of digital media, are from Syria, India, Burkina Faso, Cambodia, Venezuela and Azerbaijan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional information on the program, please visit &lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://geneva.usmission.gov/us-hrc/internet-freedom-fellows-2012/"&gt;Internet Freedom Fellows&lt;/a&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;h3 id="_mcePaste"&gt;Program&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;9:00 a.m.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Welcome and introduction&lt;/strong&gt;&lt;br /&gt;David Kennedy / John Horniblow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:15 - 10:15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Freedom to Connect and Freedom from Fear: The problem of surveillance in a networked world&lt;/strong&gt;. &lt;br /&gt;&lt;span class="visualHighlight"&gt;&lt;a class="external-link" href="http://consentofthenetworked.com/author/"&gt;Rebecca MacKinnon&lt;/a&gt;&lt;/span&gt; – Co Founder Global Voices Online, Author “Consent of  the Networked”, Boards of Directors of the Committee to Protect Journalists and the Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15 - 10:45&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Developing Networked Voices and Promoting the protection of Human Rights &lt;/strong&gt;&lt;br /&gt;Andreas Harsono, blogger and human rights activist (Indonesia), and Rosebell Kagumire, multimedia journalist working on peace and conflict issues in the Eastern Africa region (Uganda)  &lt;br /&gt;2011 Internet Freedom Fellows and journalists (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:45 - 11:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Coffee break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 12:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Moderated Panel Discussion – How Do we Protect Human Rights in a world of global networks? How do the needs of the grassroots, civil society and business inform the process of upholding the UDHR and IHL in networks and technologies?&lt;/strong&gt;&lt;br /&gt;Dr. Robert Whelan (ICRC), Pranesh Prakash, Salil Trepathi (IHRB), Nicolas Seidler (ISOC), Emin Milli  Moderated Panel Discussion followed by Q &amp;amp;A&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00 - 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Buffet Luncheon&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 13:30&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Open Internet - Empowering Digital Humanitarianism&lt;/strong&gt;&lt;br /&gt;Paul Conneally - Head of Communications for ITU and a former Red Cross delegate (in various positions, locations and with IFRC plus ICRC and the Irish Red Cross).&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:40 - 14:10&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Global Network Initiative and the multistakeholder approach ensuring an Open Internet&lt;br /&gt;David Sullivan -Policy and Communications Director &lt;br /&gt;Global Network Initiative&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;14.15 &lt;span style="text-align: left; "&gt;- &lt;/span&gt;14.40&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;The Silicon Valley Standard and implications for technology companies in the protection of Human Rights and other freedoms &lt;/strong&gt;&lt;br /&gt;Brett Solomon -Exec Director Access Now  (via Skype)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: left; "&gt;15:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;&lt;strong&gt;Twiplomacy &lt;/strong&gt;&lt;br /&gt;Matthias Luefkins  &lt;i&gt;Managing Director, Digital, EMEA&lt;/i&gt;– Burson Marstellar&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;div style="text-align: justify; "&gt;Participation is limited.  Please RSVP by noon on Friday, June 15 to &lt;span class="visualHighlight"&gt;&lt;a class="mail-link" href="mailto:iff@usmission.ch"&gt;iff@usmission.ch&lt;/a&gt;. &lt;/span&gt;When responding, please indicate whether you will also join us for the luncheon buffet.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights'&gt;https://cis-india.org/news/peer-forum-on-internet-freedom-and-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-28T09:12:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi">
    <title>Global Governance Futures 2027 - Session 3, New Delhi</title>
    <link>https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi</link>
    <description>
        &lt;b&gt;The Global Governance Futures program (GGF) initiated by Global Public Policy Institute and supported by Robert Bosch Stiftung brings together young professionals to look ahead ten years and recommend ways to address global challenges. Sumandro Chattapadhyay will join Ankhi Das (Facebook) and Arun Mohan Sukumar (Observer Research Foundation) on Tuesday, January 17, to discuss the "data governance" scenarios developed by the GGF 2027 Fellows.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;About the Programme: &lt;a href="http://www.ggfutures.net/about/ggf-program/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Fellows: &lt;a href="http://www.ggfutures.net/current-fellows/"&gt;External Link&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;GGF 2027 Session 3, New Delhi - Agenda: &lt;a href="http://cis-india.org/internet-governance/files/ggf-2027-session-3-new-delhi-agenda/at_download/file"&gt;Download&lt;/a&gt; (PDF).&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi'&gt;https://cis-india.org/internet-governance/news/global-governance-futures-2027-session-3-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>Digital Rights</dc:subject>
    

   <dc:date>2017-01-15T11:46:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc">
    <title>Global Commission on the Stability of Cyberspace (GCSC)</title>
    <link>https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc</link>
    <description>
        &lt;b&gt;The Global Commission on the Stability of Cyberspace organized a meeting on November 21, 2017 in New Delhi. The meeting took place at Taj Diplomatic Enclave Hotel on the sidelines of the 5th Global Conference on Cyberspace. Pranesh Prakash participated in the event.&lt;/b&gt;
        &lt;p&gt;GSC commissioners engaged in discussions with leading experts on cyber diplomacy, cyber norms and counter-proliferation. See the Draft Agenda &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyber-security-hearings-gsc"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc'&gt;https://cis-india.org/internet-governance/news/global-commission-on-the-stability-of-cyberspace-gcsc&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-11-23T14:38:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/global-freedom-expression">
    <title>Global Challenges to Freedom of Expression</title>
    <link>https://cis-india.org/events/global-freedom-expression</link>
    <description>
        &lt;b&gt;The Centre for Culture, Media &amp; Governance, Jamia Millia Islamia, Delhi, Human Rights Law Network, Delhi and the Centre  for Internet &amp; Society, Bangalore are pleased to invite you to a public lecture by Mr. Frank La Rue, President of the Central American Institute for Studies of Social Democracy  and UN Special Rapporteur on Freedom of Expression on March 4, 2011, 6 pm at the Constitutional Club in New Delhi.
&lt;/b&gt;
        
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/frank_la_rue_121.jpg/image_preview" alt="Frank La Rue" class="image-inline" title="Frank La Rue" /&gt;&lt;/p&gt;
&lt;h3&gt;Frank La Rue&lt;/h3&gt;
&lt;p&gt;Mr. La Rue is the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression for the Office of the United Nations High Commissioner for Human Rights. &amp;nbsp;He has worked on human rights for the past 25 years. &amp;nbsp;He is the founder of the Centre for Legal Action for Human Rights (CALDH), both in Washington DC and Guatemala, which became the first Guatemalan NGO to bring cases of human rights violations to the Inter-American System. &amp;nbsp;CALDH was also the first Guatemalan NGO to promote economic, social and cultural rights. &amp;nbsp;Mr. La Rue also brought the first genocide case against the military dictatorship in Guatemala. &amp;nbsp;As a human rights activist, his name was presented to the Nobel Peace Prize committee in 2004.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;La Rue has previously served as a Presidential Commissioner for Human Rights in Guatemala, as a Human Rights Adviser to the Minister of Foreign Affairs of Guatemala and as a consultant to the Office of the High Commissioner for Human Rights. &amp;nbsp;He is President of Instituto Demos in Guatemala City. La Rue holds a BA in Legal and Social Sciences from the University of San Carlos, Guatemala and a postgraduate degree in U.S. foreign policy from Johns Hopkins University.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The entrance is free. Refreshments will be served from 5.30 pm onwards.&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/global-freedom-expression'&gt;https://cis-india.org/events/global-freedom-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-04T07:17:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/global-censorship-conference">
    <title>Global Censorship Conference</title>
    <link>https://cis-india.org/internet-governance/global-censorship-conference</link>
    <description>
        &lt;b&gt;The Abrams Institute for Freedom of Expression at Yale Law School is holding a conference on global censorship from March 30 to April 1, 2012, at Yale Law School. The programme is sponsored by the Information Society Project at Yale Law School and Thomson Reuters. &lt;/b&gt;
        
&lt;p&gt;"This conference is the first major event for the Abrams Institute 
for Freedom of Expression, and it brings together an exciting group of 
thinkers from law, political science, computer science, business and the
 non-profit sector to discuss the lessons of the past few years,” 
explained Yale Law Professor Jack Balkin, director of the Abrams 
Institute and the Information Society Project. “We think the study of 
free expression in the digital age should be international and 
interdisciplinary."&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Rishabh Dara, Google Policy Fellow who worked at CIS office in 
Bangalore on freedom of expression and internet-related policy issues is
 participating in the event as a speaker in the panel on Case Studies of
 Censorship. The panel will explore recent instances of censorship in 
the United States, Egypt, Syria, Brazil, and India and the common themes
 and important differences that emerged.&lt;/p&gt;
&lt;p&gt;This conference will consider how censorship has changed in a networked world, exploring how networks have altered the practices of both governments and their citizens. Panels will include discussions of how governments can and do censor and how speakers can command technical and legal tools to preserve their ability to speak.&amp;nbsp; The conference will conclude with a discussion of new controversies in censorship, including laws designed to prevent online bullying and intellectual property infringement.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Friday March 30, 2012 &lt;/strong&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;2:00&lt;/td&gt;
&lt;td&gt;Begin Registration&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:15 – 4:45&lt;/td&gt;
&lt;td&gt;The Means of Change, Familiar and New&lt;br /&gt;
(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;) &lt;br /&gt;
In the popular story of the political upheavals in the Middle East and 
North Africa, information technology stands out as the new factor that 
was critical to rapid mass mobilization for demanding change. The media 
have been credited with making popular demands for change contagious. 
Enthusiasts for the potential of technology to foster progressive change
 have labeled these apparently sudden developments a Facebook 
revolution. Governments responded by seeking to curtail the use of 
mobile phones and the Internet. What role has technology played in 
igniting, sustaining and shaping recent political changes in the Arab 
world? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Anupam Chander, Professor of Law, University of California, Davis and Director, California International Law Center&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation&amp;nbsp;&lt;/li&gt;&lt;li&gt;John Pollock, journalist &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5:00–&lt;br /&gt;
6:30&lt;/td&gt;
&lt;td&gt;Keynote Lecture &lt;br /&gt;

(&lt;em&gt;co-sponsored by Sponsored by the Orville H. Schell, Jr. Center for International Human Rights&lt;/em&gt;)&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Irwin Cotler, Canadian Parliament, former Attorney General of Canada &lt;/li&gt;&lt;/ul&gt;
&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:30– 9:00&lt;/td&gt;
&lt;td&gt;Reception for Panelists of the Global Censorship Conference &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Saturday March 31, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 10:00&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Registration and Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00–&lt;br /&gt;
11:30&lt;/td&gt;
&lt;td&gt;Panel One: Old and New Forms of Censorship &lt;br /&gt;
Years ago, activists met in person to plan protests and quietly shared 
subversive texts. Now, events can be planned over social networking 
sites, and arguments for change are posted online. How have governments 
responded to these changes? How have activist practices and governments’
 reactions changed the way we conceptualize censorship? &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Jack Balkin, Yale Law School&lt;/li&gt;&lt;li&gt;Yochai Benkler, Harvard Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Navid Hassanpour, Yale Political Science Deptartment&amp;nbsp;&lt;/li&gt;&lt;li&gt;Rebecca MacKinnon, Bernard L. Schwartz Senior Fellow, New America Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:45 – 1:15&lt;/td&gt;
&lt;td&gt;Panel Two: Technical Architectures of Censorship&lt;br /&gt;
There are a number of choke points across the Internet and a number of 
different censorship mechanisms that can be deployed at various points 
across the network. Censorship can be executed at the router level, the 
Internet Service Provider (ISP) level, the Internet Content Provider 
(ICP) level, or the device level. Additionally, countries can employ a 
number of different technologies at each level. This panel will explore 
the many technical options for censorship and the strategic value of 
different choices. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Laura DeNardis, Associate Professor of Communication at American 
University, and Affiliated Fellow, Information Society Project at Yale 
Law School&lt;/li&gt;&lt;li&gt;Nagla Rizk, American University in Cairo&amp;nbsp;&lt;/li&gt;&lt;li&gt;Hal Roberts, Fellow at Berkman Center for Internet &amp;amp; Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Ashkan Soltani, Independent Researcher and Consultant on Privacy and Security &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:15 – 2:15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2:15 – 3:45&lt;/td&gt;
&lt;td&gt;Panel Three: Case Studies of Censorship &lt;br /&gt;

In the wake of censorship both domestically and abroad, many questions 
emerged about how the censorship was executed, what effects it had, if 
and how activists were able to route around the it, and how, if it all, 
it was eventually stopped. This panel will explore recent instances of 
censorship in the United States, Egypt, Syria, Brazil, and India and the
 common themes and important differences that emerged. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Sherwin Siy, Deputy Legal Director and the Kahle/Austin Promise Fellow at Public Knowledge&lt;/li&gt;&lt;li&gt;Lina Attalah, Journalist, Managing Editor of Al-Masry Al-Youm&amp;nbsp;&lt;/li&gt;&lt;li&gt;Anas Qtiesh, Blogger, Editor of Global Voices&amp;nbsp;&lt;/li&gt;&lt;li&gt;Carlos Affonso Pereira de Souza, Vice-Coordinator of the Center for 
Technology &amp;amp; Society (CTS) at the Fundação Getulio Vargas (FGV) Law 
School&lt;/li&gt;&lt;li&gt;Rishabh Dara, Researcher at Indian Institute of Management, Ahmedabad &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4:00 –&lt;br /&gt;
5:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Panel Four: Technical Methods of Circumventing Censorship &lt;br /&gt;

New technology may provide governments with new tools to censor, but it 
also creates opportunities for speakers and “hactivists” everywhere. How
 can individuals evade identification online and access blocked content?
 Can activists circumvent attempts to shut down the internet during 
periods of political unrest? What new methods are being developed to 
preserve free speech online?&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Roger Dingledine, The Tor Project&lt;/li&gt;&lt;li&gt;Peter Fein, Telecomix&lt;/li&gt;&lt;li&gt;Alex Halderman, University of Michigan, Dept. of Computer Science&lt;/li&gt;&lt;li&gt;Sascha Meinrath, Open Technology Initiative Director, New America Foundation&lt;/li&gt;&lt;li&gt;Wendy Seltzer, Senior Fellow, Information Society Project at Yale Law School &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6:00 – 9:00&lt;/td&gt;
&lt;td&gt;Dinner for Speakers &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Sunday, April 1, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;9:00 – 9:30&lt;/td&gt;
&lt;td&gt;&amp;nbsp;Breakfast&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9:30 – 11:00&lt;/td&gt;
&lt;td&gt;Panel Five: Legal Solutions to Censorship &lt;br /&gt;

Given the way censorship technologies have slowly crept into acceptable 
use because of concerns like piracy, child pornography, or national 
security, there is much debate about the role and capacity of law in 
combatting these new, digital forms of government censorship, 
domestically and internationally. This panel will discuss if and how 
legal solutions to censorship can be deployed most effectively.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Derek Bambauer, Brooklyn Law School&lt;/li&gt;&lt;li&gt;Jim Dempsey, Vice President of Public Policy at the Center for Democracy and Technology&amp;nbsp;&lt;/li&gt;&lt;li&gt;Molly Land, New York Law School&amp;nbsp;&lt;/li&gt;&lt;li&gt;Linda Lye, ACLU Northern California&amp;nbsp;&lt;/li&gt;&lt;li&gt;Jillian York, Director for International Freedom of Expression at the Electronic Frontier Foundation &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15 – 12:45&lt;/td&gt;
&lt;td&gt;Panel Six: New Controversies in Censorship &lt;br /&gt;

Does new technology change the appropriate scope of free expression 
rights? Can policing intellectual property infringement burden free 
speech interests? Does surveillance ever have a censoring effect? This 
panel will wrestle with whether a variety of government activities 
constitutes inappropriate censorship or necessary actions to protect the
 public interest. &lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Rebecca Bolin, Fellow at Information Society Project, Yale Law School&lt;/li&gt;&lt;li&gt;Mark MacCarthy, Vice President for Public Policy, Software and 
Information Industry Association; Adjunct Professor, Communication, 
Culture and Technology Program, Georgetown University&amp;nbsp;&lt;/li&gt;&lt;li&gt;Preston Padden, Senior Fellow at the Silicon Flatirons Center and an
 Adjunct Professor at the University Of Colorado's Law School and 
Interdisciplinary Telecommunications Program&amp;nbsp;&lt;/li&gt;&lt;li&gt;David Post, Temple University, Beasley School of Law&amp;nbsp;&lt;/li&gt;&lt;li&gt;Christopher Soghoian, Graduate Fellow, Center for Applied Cybersecurity Research, Indiana University &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:45&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&amp;nbsp; Bagged Lunch Available&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
[&lt;a href="https://cis-india.org/internet-governance/global-censorship-conference#fr1" name="fn1"&gt;1&lt;/a&gt;].Global
 Censorship Conference to be Held March 30-April 1 at Yale Law School | 
Yale Law School, last accessed on March 30, 2012, &lt;a class="external-link" href="http://www.law.yale.edu/news/15140.htm"&gt;http://www.law.yale.edu/news/15140.htm&lt;/a&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.law.yale.edu/intellectuallife/censorship12.htm"&gt;Read the original posted in Yale Law School website&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/global-censorship-conference'&gt;https://cis-india.org/internet-governance/global-censorship-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-30T11:34:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw">
    <title>Glaring Errors in UIDAI's Rebuttal</title>
    <link>https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw</link>
    <description>
        &lt;b&gt;This response note by Pranesh Prakash questions Unique Identification Authority of India’s reply to Hans Verghese Mathews' article titled “Flaws in the UIDAI Process” (EPW, March 12, 2016), which found “serious mathematical errors” in the article.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The article was &lt;a class="external-link" href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt; Vol. 51, Issue No. 36, September 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;While I am not a statistician, I have followed the technical debate between Hans Verghese Mathews and the UIDAI closely, and see a number of glaring errors in the latter’s so-called rebuttal in EPW (March 12, 2016).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The UIDAI alleges Mathews to have ignored the evidence that the Receiver Operating Characteristic (ROC) "flattens" with more factors. However, Mathews cannot be accused of ignorance if the flattening of the ROC is not relevant to his argument. To explain this in simple terms, the ROC curve is used to choose the appropriate "threshold distance" which determines false positives and false negatives, and belongs to a stage which precedes the estimation of the false positive identification rates (FPIR).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, Mathews has used the FPIR estimates provided by the UIDAI (based on evidence from the enrolment of 84 million persons), and calculated how the FPIR changes when extrapolated for a population of 1.2 billion persons. In other words, he did not need to look at the ROC curve as that factor is not relevant to his argument, since he has used UIDAI data (which has presumably been estimated on the basis of all 12 factors : 10 fingerprints and 2 irises). &lt;br /&gt;&lt;br /&gt;Further, UIDAI asks why Mathews has assumed a linear curve for his extrapolation. Mathews has done no such thing. In fact, in their paper "Role of Biometric Technology in Aadhaar Enrollment," the UIDAI states: "FPIR rate grows linearly with the database size" (nd, 19). Thus, this is an assumption formerly made by them (without providing rationale for it to be a linear curve as opposed to anything else).&amp;nbsp; Mathews mathematically derives bounds for the FPIR in his paper, that is, the range within which the FPIR lies. One gets a linear curve only if they use the upper bound and not on the usage of anything else. So while Mathews does, as he explains, provide the results of the calculation based on the upper bound for the sake of simplicity, he nowhere asserts nor assumes a linear curve.&lt;br /&gt;&lt;br /&gt;If, as the UIDAI claims, one cannot perform such an extrapolation and needs to depend on “empirical evidence” instead, the question arises as to how the UIDAI decided to scale up the programme to 1.3 billion people given the error rates. One could also ask if the machines being used to capture biometrics are good enough for the enlargement. Surely they would have performed some extrapolations to decide this.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In their paper they note that "although it [FPIR] is expected to grow as the database size increases, it is not expected to exceed manageable values even at full enrolment of 120 crores" (UIDAI nd, 13). They do not illustrate the extent to which the FPIR is expected to grow—neither in their initial paper, nor in their rebuttal to Mathews—whereas Mathews provides a method of estimating the increase of FPIR. Even if UIDAI is correct in its appraisal of FPIR and that it will not exceed "manageable values," they need to either exemplify their calculations or release the latest data. They have done neither, and that is quite unfortunate.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
&lt;div id="stcpDiv" style="text-align: justify;"&gt;UIDAI  (nd): “Role of Biometric Technology in Aadhaar Enrollment,” Unique  Identification Authority of India, Government of India, New Delhi,  viewed on 18 August 2016,  &lt;a class="external-link" href="https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology"&gt;https://uidai.gov.in/images/FrontPageUpdates/role_of_biometric_technology&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Related Links&lt;/strong&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="stcpDiv"&gt;
&lt;ol&gt;
&lt;li&gt;Flaws in the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Erring on Aadhaar &lt;a href="http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html"&gt;http://www.epw.in/journal/2016/11/discussion/erring-aadhaar.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Request for Specifics &lt;a href="http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-uidai.html"&gt;http://www.epw.in/journal/2016/36/documents/request-specifics-rebuttal-u...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Glaring Errors in UIDAI's Rebuttal &lt;a href="http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/glaring-errors-uidais-rebutt...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Overlooking the UIDAI Process &lt;a href="http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathews-and-pranesh-prakashs-rebuttal.html"&gt;http://www.epw.in/journal/2016/36/documents/response-hans-verghese-mathe...&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw'&gt;https://cis-india.org/internet-governance/blog/glaring-errors-in-uidai-rebuttal-epw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-18T03:22:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password">
    <title>Giving out your fingerprint for Aadhar payments is as bad as telling the seller your banking password</title>
    <link>https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password</link>
    <description>
        &lt;b&gt;PRS India recently released a report card enlisting the status of all the major policy announcements made by the President on India in his address to the Parliament on 23 February 2016. The policies cover all the major sectors including economy and finance, industry and manufacturing, governance and legal reform, skill development, science and innovation among others.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Nimish Sawant was published by &lt;a class="external-link" href="http://tech.firstpost.com/news-analysis/giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password-360658.html"&gt;First Post Tech 2&lt;/a&gt; on February 3, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since the current government has come into power, there has     been a concerted effort to take India on the information highway     with technology-backed initiatives. Projects such as Digital India,     Smart City Project, Startup India to the latest policy announcements     post the demonetisation on 8 November 2016, a lot of has been said     about technology.&lt;br /&gt; &lt;br /&gt; But there are still areas of improvement, for instance we are yet to     have a privacy and data protection law, there is an alarming     shortage of cybersecurity experts and we have seen our fair share of     government as well as personal data being under jeopardy in the     years gone by.&lt;br /&gt; &lt;br /&gt; Pranesh Prakash, policy director of the Centre for Internet and     Society, has his reservations against the speed at which we are     moving towards the dream of a digitised India, without covering the     core policies on security, legal frameworks and more. Here is what     Prakash has to say.&lt;br /&gt; &lt;br /&gt; “All in all, we in India are in a really precarious situation when     it comes to Digital India, especially from a legal and regulatory     perspective. While the push for digitisation is to be welcome, it     should make this more convenient for citizens and that can’t be     accomplished by forcing digitisation on people without giving them     options.&lt;br /&gt; &lt;img src="https://cis-india.org/home-images/copy_of_Tweet.jpg" alt="Tweet" class="image-inline" title="Tweet" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Planning Commission put together a group of experts chaired by     Justice AP Shah, which came out with a report on privacy principles     which were to inform a privacy and data protection law that the     government was to introduce in Parliament. That report came out in     2012. In 2017, we are no closer to a privacy and data protection     law. The data security practices at the levels of the government and     of the private sector are very worrying.&lt;br /&gt; &lt;br /&gt; For instance, the Narendra Modi app, which is operated by the BJP,     for many months was leaking the personal details of more than 7     million users.&lt;br /&gt; &lt;br /&gt; Another example: the government, as per press reports, is going     ahead with using fingerprints for authentication of Aadhaar Enabled     Payment Systems (AEPS) transactions. While the security architecture     of AEPS might in itself be good, the idea of providing your     fingerprints to merchants for financial transactions is a terrible     idea since that is like asking you to give your bank password to a     merchant, and the merchant can reuse that password, and you can’t     ever change the password.&lt;br /&gt; &lt;br /&gt; Last year Symantec revealed that for more than two years a     cyberespionage project (that Symantec called “SuckFly“) had     penetrated deep into Indian systems, including Indian government and     banking systems.  Yet, the government didn’t conduct an enquiry     about this and reassure the public on actions being taken to     mitigate this.&lt;br /&gt; &lt;br /&gt; So while digitisation initiatives are great, there also needs to be     a concerted effort to have a secure framework, and there has to be     an ease in onboarding the non tech-savvy population as well.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password'&gt;https://cis-india.org/internet-governance/news/first-post-february-3-2017-nimish-sawant-giving-out-your-fingerprint-for-aadhar-payments-is-as-bad-as-telling-the-seller-your-banking-password&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-07T16:09:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me">
    <title>Girls' schools, women's PGs: The shocking results when you Google 'bitches near me'</title>
    <link>https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me</link>
    <description>
        &lt;b&gt; Considering the monopoly and clout that Google enjoys, it must be held accountable for promoting such stereotypes and values, experts say.
&lt;/b&gt;
        &lt;p&gt;The blog post by Geetika Mantri was published in &lt;a class="external-link" href="https://www.thenewsminute.com/article/girls-schools-women-s-pgs-shocking-results-when-you-google-bitches-near-me-92244"&gt;News Minute&lt;/a&gt; on November 26, 2018. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there’s a question you don’t know the answer to, more often than  not, you’ll turn to Google. The search engine’s monopoly over the  market, and data pool at hand, are almost unparalleled in public  perception – which makes it all the more alarming when it tends to feed  into dangerous and misogynistic values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is what seems to have happened, as pointed out by Twitter user  @AHappyChipmunk, when someone opened Google Maps and typed “bitches near  me.” The results show up addresses of girls’ schools, women’s and  girls’ hostels and PGs, and women’s clothing shops. Not only is this  shocking because ‘bitches’ is often used as a derogatory phrase for  women, but also these Google search results of schools put minors at  risk.&lt;/p&gt;
&lt;p&gt;The tweet caused much outrage and alarm among people, who did the  search themselves and posted screenshots of the real time results that  they got.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Why would Google show these results?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and Society,  points out that this was telling of the fact that Google knows that  ‘bitches’ can be a slang for women. “For many years now, Google has been  trying to understand and search for what you meant, than what you may  have typed,” he explains. “However, if you enclose this search phrase in  quotes, you will not get the same results, because then it will look  for the phrase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He also notes that if you were to look for “girls near me”, you would  get similar search results on Google Maps, though more specific to  women’s accommodations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast, it you were to Google, “bitch near me”, you would not get  Google Map results. “I think that’s because Google understands that  ‘bitches’ is more likely to mean women, than singular ‘bitch’,” Pranesh  says.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Tech giants need to be held accountable&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Pranesh thinks that the search results are not ‘dangerous’ per  se in the sense that a potential abuser was more likely to Google ‘girls  schools’ than ‘bitches near me’, he agrees that these search results  are telling of the misogynistic language in use online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, is it okay for tech giants to wash the responsibility off  their hands because this is the language that their algorithm picked up?  Nayantara R, who works with the Internet Democracy Project in  Bengaluru, says, “This reminds me of the book &lt;i&gt;Algorithms of Oppression: How Search Engines Reinforce Racism&lt;/i&gt;."  The book challenges the idea that platforms like Google are level  playing fields for different ideas and ideologies. Author Safiya Umoja  Noble argues that due to data discrimination, private interests in  promoting certain sites, as well as the monopoly of a few online search  engines, results in biased search algorithms which discriminate against  women of colour while painting favourable portraits of whiteness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such bias came to light in July last year where many people,  including Congress MP Shashi Tharoor pointed out how a Google search for  ‘south Indian masala’ led to a pictures of skimpily clad women, while  ‘north Indian masala’ led to photos of spices and dishes. At the time,  Google had maintained that this wasn’t its fault and that Google’s  search worked by learning from the keywords people use and the results  they click on to predict just what people are searching for.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Nayantara asserts that considering the monopoly and clout  that Google enjoys, it must be held accountable for promoting such  stereotypes and values. “The Google page ranking is one of the most  protected patents. No one knows how or why certain pages come before the  others. In this case, certain search results coming first does not mean  that Google is misogynistic. But the algorithmic decision that is taken  by someone at Google to rank certain pages which promote certain values  before others does have a social impact. All technology is a result of  how it is used. Accountability is required there,” she argues.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A conversation about what search results mean&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nayantara also points out that apart from accountability, there needs  to be a conversation about what these search results mean. “Search  results do embed political values. However, people need to understand  that if they Google something and some pages are ranked before the  others, it is not reflective of the truth or right or wrong, but  reflection of an opinion,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We need popular perception to wrap its head around what a search  engine is, and that there are alternatives to Google. We also need more  algorithmic diversity in search results,” she adds.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me'&gt;https://cis-india.org/internet-governance/news/girls-schools-womens-pgs-the-shocking-results-when-you-google-bitches-near-me&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-28T01:34:50Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice">
    <title>Girls just wanna have... a voice </title>
    <link>https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice</link>
    <description>
        &lt;b&gt;Many Indian women have taken to Twitter, the micro-blogging site, to air their views. And some of them have become social media celebrities by virtue of their wise and witty tweets. Prasun Chaudhuri looks at the women who matter in India’s Twitterverse.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1140308/jsp/calcutta/story_18064724.jsp"&gt;published in the Telegraph&lt;/a&gt; on March 8, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Everyone knows that movie stars like Priyanka Chopra and Deepika Padukone, media celebs like Barkha Dutt and Sagarika Ghose have hundreds of thousands of followers on social media who hang on to their every word. But Malini Agarwal, Priyanka Sachar? Vidyut Kale? You may not have heard of them otherwise, but these women are rockstars of India’s Twitterverse too — not because they are famous in their day jobs, but because their tweets have that special something that keeps the followers coming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take Malini Agarwal (@MissMalini), a former radio jockey and head of digital content for Channel V in India, who has over 2,00,000 followers on Twitter. In fact, she has a larger-than-life presence on virtually all social media platforms. Agarwal tweets about Bollywood, the fashion world and the Page 3 circuit. Her Twitter bio says: “She who controls the spice, controls the universe. Bollywood, Fashion &amp;amp; Lifestyle with a Desi Girl Twist.” This “desi girl” with the insider’s take on the glamour world is now an industry of sorts. She has her own website called missmalini.com in which she has employed nine enthusiastic young bloggers — “a happy mix of Bollywood Junkies, Fashionistas and Party Animals” representing “the young, modern (and pretty!) face of India”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Far removed from the glamour circuit is Vidyut Kale (@Vidyut), a stay-at-home mom raising an infant with cerebral palsy. She has over 14,000 followers for her unusual takes on “issues of socio-political interest”. Says Kale, who describes herself as an “intellectual anarchist”, “Twitter is just amazing because I can actually comment on something and get instant replies. I think I get followed mainly because I say what many will tiptoe around, and that can feel like a big relief when an issue is bugging you badly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her “firebrand” tweeting — on women’s issues, politics, and indeed, pretty much everything under the sun — has turned her into quite a celebrity and she often gets invited to speak at events. Even though she avoids most of these “real-life” gatherings, sometimes her fans force her to attend them. She says, “I have been paid travel expenses to attend an event when I said I couldn’t afford the travel. I have been interviewed, I have had people make an effort to understand a [social] cause if I bring it up.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clearly, a social media platform like Twitter has become a fantastic forum for women — a section of society that has traditionally been voiceless. Those who shine on it, says Sunil Abraham, Centre for Internet and Society (a Bangalore-based organisation that researches the impact of digital media), do so by virtue of their “authentic voice”. He adds, “Unlike in the traditional media, there’s no editor to moderate their views and they don’t have any guidelines to follow.” In other words, what their fans get to read or see are unfiltered views — something that’s often missing in mainstream media. Besides, their tweets are often edgy and politically incorrect. And men — and women — fed on the traditional image of women propagated by the mainstream media, find that refreshing and engaging.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Adds social media enthusiast and avid blogger Harsh Ajmera, “People appreciate the bold and politically incorrect approach of these Twitter stars, as opposed to the sugar-coated comments aired in news channels and various other media outlets.” Agrees Kale, “Unlike in lengthy blog posts or newspaper columns, it is easier to make comments on news or challenge views through Twitter. It also enables direct interaction with readers.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ask Chinmayi Sripada (@chinmayi), a Chennai-based singer whose bold and frank tweets have earned her more than 2,40,000 Twitter followers. And a fair number of trolls and abusive enemies too. When she spoke out in support of Tamil Nadu fishermen who were attacked by the Sri Lankan Navy, she was flooded with abusive tweets that were tantamount to sexual harassment. But she took on her abusers (one of them was a professor at a top fashion institute) head on. “I filed a case under Section 66A of the IT Act and they were in jail for about two weeks. That was when I saw the full extent of cyber bullying on the basis of caste and community.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, Sripada doesn’t owe her fame to Twitter alone. She is a popular playback singer in south India and got famous across India for her recent Bollywood hit in Chennai Express. “I haven’t become famous because of social media. I am recognised primarily as a singer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Actress and former Miss India Gul Panag (@GulPanag) is yet another Twitter star who was already a celebrity. But with a staggering 7,84,000 followers, and with tweets that are unfailingly sharp and intelligent, maybe her Twitter stardom outshines her Bollywood one. A recent survey by an agency named her as one of the most influential persons on the micro-blogging site. News anchor Barkha Dutt — one of the country’s top media celebrities — also boasts a whopping 12.3 lakh followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Kaveri Ahuja (@ikaveri) is a regular wife and mom who has gone on to become a Twitter celeb. A cancer survivor, her takes on everyday life and the stories of her battle against colorectal cancer (“I love a good fight. How else would I have kicked the big C’s butt?”) attract over 25,000 followers. She even runs a separate Twitter handle for her fan club (@ikaverifc). “Being recognised on Twitter has expanded my offline social circle as well. I can count many online friends as my real-life friends now,” she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of India’s earliest Twitter stars was Priyanka Sachar. If her real name doesn’t ring a bell, her Twitter handle, @TwilightFairy, might. This erstwhile IT professional and part-time wedding photographer left her day job riding on the fame earned by her 140-character tweets. Her quirky takes on a wide range of topics — ranging from everyday outrages (“Bought passionfruit cake for parents’ anniversary from jaypeehotels and got long human hair baked in it for free. Never again!”) to instant reaction to news (“Sahara boss gets ink on his face. Reminds me of school time ink pen wars!”) — are lapped up by her 21,000+ followers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thanks to her fame on Twitter, she is often recognised by strangers. “It is a strange experience and I really don’t know how to react, except to say ‘yes, that’s me, how did you know!’… Twitter has made sure that so many interesting (and seemingly inaccessible) people are accessible instantly.” Apart from these “life-altering changes”, she keeps getting invited to some activity or the other, organised by brands that regularly invite “influencers”. “The recognition on Twitter/social media has affected me in massive ways. I left my IT industry job in order to figure out if I can take up a different profession and be a freelancer. And the moment I left my job, an opportunity landed straight in my lap, simply because of my Twitter id! I got offered a job as a social media consultant at a digital media agency,” she says.&lt;br /&gt;So have social media platforms such as Twitter really done wonders for women’s empowerment? Yes and no.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Sachar, Twitter did offer unprecedented freedom of speech in its early days. But now that a lot of politicians and political parties have come on board and the Indian IT laws are being tweaked, tweets can be misused by anyone in power. “Even though one can say what one wants, people do tread a tad more cautiously compared to, let’s say, two year back,” says Sachar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi agrees. “There is nothing called total freedom of speech. Even if one chooses that path, the trolls are waiting to see who can be cut to size. I am guarded about what I write on social media.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice'&gt;https://cis-india.org/news/telegraphindia-march-8-2014-girls-just-wanna-have-a-voice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-04-01T11:21:47Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail">
    <title>Girls arrested for Facebook post on Thackeray get bail</title>
    <link>https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail</link>
    <description>
        &lt;b&gt;Two girls who were arrested for making a Facebook comment protesting the closure of shops in the wake of Shiv Sena supremo Bal Thackeray‘s death, have been released on bail bonds of Rs 15,000 each.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://www.firstpost.com/india/girls-arrested-for-facebook-post-on-thackeray-get-bail-528178.html"&gt;published in the FirstPost&lt;/a&gt; on November 19, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The duo, one of whom had reportedly updated her Facebook status to read  “People like Thackeray are born and die daily and one should not observe  a bandh for that” and the other one who ‘liked’ it, were initially  booked under section 295A (hurting the religious sentiment of others)  and were reportedly remanded to judicial custody for 14 days, &lt;a href="http://www.ndtv.com/article/world/two-girls-arrested-for-facebook-post-on-mumbai-shutdown-granted-bail-294239?pfrom=home-lateststories" rel="nofollow" target="_blank"&gt;NDTV reported.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;The two girls were arrested after a complaint made to the Palghar police station in neighbouring Thane district by a local Sena leader. &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;A group of Shiv Sainiks attacked and ransacked the girl’s uncle’s orthopaedic clinic at Palghar, even though she withdrew her comment and apologised. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;span&gt;In comments to &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;Firstpost&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span&gt;, Pranesh Prakash of the Centre for Internet and Society, said that the arrest was a gross misapplication of the Indian Penal Code, and said that this particular provision had been misused on multiple occasions by the state of Maharashtra. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;“What makes this seem ironic, and almost a parodic news report, is the fact that &lt;a href="http://www.firstpost.com/topic/person/bal-thackeray-profile-22424.html" target="_blank"&gt;Bal Thackeray&lt;/a&gt; probably violated this provision more times than most other politicians, but was only charged under it once or twice”, he said. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The arrest has predictably elicited outrage from across the spectrum. Many took to social media to express their disgust, while &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span&gt;&lt;span&gt;NDTV&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span&gt; reported that Maharashtra police HQ in Mumbai was very upset with the action taken by the Palghar police.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Press Council of India Chairman Markandey Katju had also called for the immediate release of the girls and wrote to Maharashtra Chief Minister Prithviraj Chavan asking him to ensure it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out that people were not living under a fascist dictatorship, he said that the act of arrest appeared to be a criminal act since it was a violation under sections of the Indian Penal Code to wrongfully arrest or confine anyone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The PCI chief said that legal consequences would follow if the Chief Minister failed to take action.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail'&gt;https://cis-india.org/news/first-post-nov-19-2012-girls-arrested-for-facebook-post-on-thackeray-get-bail&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-30T05:18:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media">
    <title>Girl's arrest draws flak on social media</title>
    <link>https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media</link>
    <description>
        &lt;b&gt;The arrest of a 21-year-old girl by Mumbai police for criticizing the shutting down of the city following the death of Bal Thackeray come under fire from netizens.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Arun Dev's article was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Girls-arrest-draws-flak-on-social-media/articleshow/17286575.cms"&gt;published in the Times of India&lt;/a&gt; on November 20, 2012. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;Many tweets and  &lt;a href="http://timesofindia.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt; posts popped up soon after the news of her arrest played on TV and  social media networks, some even reposting what she first posted on her  page.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, programme manager, Centre for Internet and Society, told TOI this case was a clear case of misapplication of Section 295A of the Indian Penal Code. "This provision has been frivolously used numerous times in Maharashtra. Even the banning of James Laine's book, 'Shivaji: Hindu King in Islamic India', happened this section. The ban was subsequently deemed unlawful by both the Bombay high court and the Supreme Court. Indeed, Section 295A has not been applied in cases where it's more apparent," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the CIS blog, he commented, "Interestingly, the question arises of the law under which the friend who 'liked' the Facebook status update was arrested. It would take a highly clever lawyer and a highly credulous judge to make 'liking' of a Facebook status update an act capable of being charged with electronically sending ... any information that is grossly offensive or has menacing character".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is absolutely ridiculous. Regardless of the fact she was given bail, she was sent to 14 days of judicial custody for a mere comment. We have allowed our social media to be free and open but we have laws which are ancient," said Lawrence Liang, a lawyer working on media laws with the Alternative Law Forum in Bangalore. "Such cases don't stand a chance in a court of law. We need procedural safeguards which will ensure cases which are not relevant are not be allowed to be filed," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The open letter to the chief minister of the Maharashtra by Justice Katju, Chairman, Press Council of India, and former Judge, &lt;a href="http://timesofindia.indiatimes.com/topic/Supreme-Court"&gt;Supreme Court&lt;/a&gt; of India too was widely circulated on social media. Some posted this excerpt: "We are living in a democracy, not a fascist dictatorship. In fact this arrest itself appears to be a criminal act since under sections 341 and 342 it is a crime to wrongfully arrest or wrongfully confine someone who has committed no crime."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media'&gt;https://cis-india.org/news/times-of-india-arun-dev-nov-20-2012-girl-arrest-draws-flak-on-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-11-20T11:04:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/giga-conference">
    <title>GIGA International Conference Series - 1</title>
    <link>https://cis-india.org/news/giga-conference</link>
    <description>
        &lt;b&gt;The Institute of Global Internet Governance and Advocacy (GIGA) at NALSAR University will hold the first International Conference in association with Department of Electronics and Information Technology (DEIT) of Government of India on the theme "Revisiting Internet Governance - Lessons Learnt and Road Ahead" at NALSAR University of Law, Justice City Campus, Shameerpet on April 5 &amp; 6 of 2012.  &lt;/b&gt;
        
&lt;p&gt;Lex Witness, India's first magazine on legal and corporate affairs is the media partner for the conference, Sunil Abraham will be speaking in this conference,&lt;/p&gt;
&lt;p&gt;The first International Conference on Internet Governance of GIGA aims to:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;To map the emergence of Internet Governance globally in the last two decades and to analyse its high points and low points in terms of its development, dynamism, diversity, divide and deficit.&lt;/li&gt;&lt;li&gt;To map the multiple definitions of Internet Governance and its rapid evolutionary trajectory of consolidating convergence and confronting challenges of divergence.&lt;/li&gt;&lt;li&gt;To critically evaluate the creative disruption of processes of accountability, empowerment and governance processes.&lt;/li&gt;&lt;li&gt;To levitate the legislative landscape for connecting the real life citizens and virtual life netizens.&lt;/li&gt;&lt;li&gt;To reshape the emergent issues of privacy vs. social responsibility, freedom of expression vs.social &amp;amp; cultural harmony, self conduct vs. legislative intervention, adolescence vs. adult behavior.&lt;/li&gt;&lt;li&gt;To reconcile the sovereign principles with Universal principles.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;h2&gt;&amp;nbsp;Conference Schedule&lt;/h2&gt;
&lt;h3&gt;Day 1, April 5, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;S.No.&lt;/td&gt;
&lt;td&gt;Time&lt;/td&gt;
&lt;td&gt;Inaugural&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.00-10.15&lt;/td&gt;
&lt;td&gt;Welcome Address by&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. V. C. Vivekanandan Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Prof. Faizan Mustafa&lt;br /&gt;Vice Chancellor, NALSAR&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Mr. N. Ravi Shanker Additional Secretary, DOT, Govt. of India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Address by&lt;/td&gt;
&lt;td&gt;Dr. Ajay Kumar&lt;br /&gt;Jt. Secretary DEIT, Govt. of India&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address by&lt;/td&gt;
&lt;td&gt;Mr. J. Satyanarayana&lt;br /&gt;Secretary, DEIT Govt. of India&lt;br /&gt;(to be confirmed)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Vote of Thanks by&lt;/td&gt;
&lt;td&gt;Prof. M. Sridhar&lt;br /&gt;Faculty, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.15-10.45&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet-Comparative Perspective&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Ajit Balakrishnan&lt;br /&gt;Chairman-Board of Governors, IIM Calcutta &amp;amp; CEO-Rediff.com&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. Internet as key to development-an African perspective&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Jean Jacques SUBRENAT&lt;br /&gt;ALAC Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. Adding a Billion-Challenges in Asia Pacific world&lt;/td&gt;
&lt;td&gt;Dr. Katim Seringe Touray&lt;br /&gt;Former Board Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;C. Indian policy response to Internet Governance&lt;/td&gt;
&lt;td&gt;Prof. Hong Xue&lt;br /&gt;Director- IIPL- Beijing&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen speak&lt;/td&gt;
&lt;td&gt;Dr. Govind&lt;br /&gt;Sr.Director, DEIT, CEO-NIXI&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Technology&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Sanjay Jaju&lt;br /&gt;Secretary (IT) AP Govt.&lt;br /&gt;(to be confirmed)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;gTLDs- Managing the genie out of the bottle-Techno-Legal issues&lt;/td&gt;
&lt;td&gt;Mr. N. Ravi Shanker Additional Secretary, DOT&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. The business of gTLDS-Roses &amp;amp; Thorns&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. IDN Challenges – Unity in Diversity- Indian Response&lt;/td&gt;
&lt;td&gt;Mr. Akshat Joshi&lt;br /&gt;GIST, CDAC-Pune&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Society&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Ranbir Singh&lt;br /&gt;Vice Chancellor, NLU, Delhi&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;Balancing the Privacy-Transparency Conundrum in Internet Governance&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr. Carlton A. Samuels&lt;br /&gt;ALAC Member, ICANN&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;A. Brahma-Vishnu-Shiva- Trinity as the State&lt;/td&gt;
&lt;td&gt;Mr.U.Ramamohan&lt;br /&gt;SP, Cyber Crimes, A.P.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;B. Digital Natives Vs. Digital Naivety&lt;/td&gt;
&lt;td&gt;Mr. Sunil Abraham&lt;br /&gt;Executive Director, CIS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;C. A development agenda for global Internet governance&lt;/td&gt;
&lt;td&gt;Mr. Parminder Jeet Singh&lt;br /&gt;Executive Director,&lt;br /&gt;IT for Change&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Chair / Panelist&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel Panorama - Internet Governance - Crossroads or crossing the Road&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Panelists - 15 minutes each&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Amita Dhanda&lt;br /&gt;Professor of Law, NALSAR&lt;br /&gt;&lt;br /&gt;Dr. Anindya Sircar&lt;br /&gt;AVP &amp;amp; Head IP , Infosys&lt;br /&gt;&lt;br /&gt;Prof. Srividhya Ragavan&lt;br /&gt;Professor of Law, University of Oklahoma College of Law&lt;br /&gt;&lt;br /&gt;Prof. S. Matilal&lt;br /&gt;RGSOIPL-IIT, Kharagpur&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Closing Remarks of the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Day 2, April 6, 2012&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;9.00-9.05&lt;/td&gt;
&lt;td&gt;Internet Governance &amp;amp; Law&lt;br /&gt;Opening Remarks from the Chair&lt;/td&gt;
&lt;td&gt;Prof. R. Venkata Rao&lt;br /&gt;Vice Chancellor&lt;br /&gt;NLSIU, Bangalore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.05-9.25&lt;/td&gt;
&lt;td&gt;Key Note Address&lt;br /&gt;Whose Privacy is it Anyway?&lt;/td&gt;
&lt;td&gt;Prof. Graham Greenleaf&lt;br /&gt;Co-Director, Aust LII&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.25-9.40&lt;/td&gt;
&lt;td&gt;A. Netizen vs. Citizen-the Sumo Game&lt;/td&gt;
&lt;td&gt;Prof.Izumi AIZU&lt;br /&gt;TAMA University,Japan&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.40-9.55&lt;/td&gt;
&lt;td&gt;B. Number or Name- Shift in Domain Names&lt;/td&gt;
&lt;td&gt;Dr. V. K. Unni&lt;br /&gt;Associate Prof., IIM,Calcutta&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;9.55-10.10&lt;/td&gt;
&lt;td&gt;C. Dial M for Internet Governance&lt;/td&gt;
&lt;td&gt;Mr. Pavan Duggal&lt;br /&gt;Advocate, Supreme Court of India&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.10-10.25&lt;/td&gt;
&lt;td&gt;D. Chartering rights in Unchartered waters&lt;/td&gt;
&lt;td&gt;Mr.Na.Vijaya Shankar&lt;br /&gt;Cyber Law Consultant&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.25-10.35&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.35-10.45&lt;/td&gt;
&lt;td&gt;Closing Remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;10.45-11.15&lt;/td&gt;
&lt;td&gt;Coffee Confluence&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;Chair / Speaker&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;11.15-11.20&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Internet Governance &amp;amp; Media&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening Remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof.V.Vijaya Kumar&lt;br /&gt;Vice Chancellor, TNDALU-Chennai&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.20-11.40&lt;/td&gt;
&lt;td&gt;Keynote Address&lt;br /&gt;&lt;br /&gt;Social Media- a New Wine in a New Bottle&lt;/td&gt;
&lt;td&gt;Prof. Ang Peng Hwa&lt;br /&gt;NTU, Singapore&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.40-11.55&lt;/td&gt;
&lt;td&gt;A. The Republic of Facebook –The Bill of Frights&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;11.55-12.10&lt;/td&gt;
&lt;td&gt;B. Objecting the Objectionable-the chronicles of criminology&lt;/td&gt;
&lt;td&gt;Dr.K.V.K.Santhy&lt;br /&gt;Co-investigator, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.10-12.25&lt;/td&gt;
&lt;td&gt;C. Street Talk vs. Social Talk-Loud Decibels&lt;/td&gt;
&lt;td&gt;Prof. M. Sridhar&lt;br /&gt;Co-investigator, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.25-12.35&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.35-12.45&lt;/td&gt;
&lt;td&gt;Closing remarks from the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;12.45 -2.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;Theme&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;2.00-2.05&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Wrap Up – Internet dreams &amp;amp; delusions – Setting the agenda for the new decade&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Opening remarks from the Chair&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof. S. Sivakumar&lt;br /&gt;Director In-charge,&lt;br /&gt;Indian Law Institute&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;2.05 – 3.20&lt;/td&gt;
&lt;td&gt;Panelists -15 minutes each&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Mr.G.R.Raghavender&lt;br /&gt;Registrar of Copyrights&lt;br /&gt;Copyright office&lt;br /&gt;&lt;br /&gt;Ms. Ankhi Das&lt;br /&gt;Head of Public Policy, Facebook India&lt;br /&gt;&lt;br /&gt;Ms. Tulika Pandey&lt;br /&gt;Addl.Director- DEIT&lt;br /&gt;&lt;br /&gt;Mr.R.Muralidharan&lt;br /&gt;Advocate- Bangalore&lt;br /&gt;&lt;br /&gt;Mr. Raman Jit Singh Chima&lt;br /&gt;Policy Analyst , Google India Pvt Ltd&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.20 –3.30&lt;/td&gt;
&lt;td&gt;Netizen Speak&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.30 – 3.40&lt;/td&gt;
&lt;td&gt;Closing remarks of the Chair&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;3.40 – 4.00&lt;/td&gt;
&lt;td&gt;Summing Up - The Hyderabad Declaration&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Prof.V.C.Vivekanandan&lt;br /&gt;Director, GIGA&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;td&gt;4.00&lt;/td&gt;
&lt;td&gt;Coffee Musings &amp;amp; Farewell&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/giga-conference'&gt;https://cis-india.org/news/giga-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-04-03T06:18:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right">
    <title>Getting the (Digital) Indo-Pacific Economic Framework Right</title>
    <link>https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right</link>
    <description>
        &lt;b&gt;On the eve of the Tokyo Quad Summit in May 2022, President Biden unveiled the Indo-Pacific Economic Framework (IPEF), visualising cooperation across the Indo-Pacific based on four pillars: trade; supply chains; clean energy, decarbonisation and infrastructure; and tax and anti-corruption. Galvanised by the US, the other 13 founding members of the IPEF are Australia, Brunei Darussalam, India, Indonesia, Japan, Republic of Korea, Malaysia, New Zealand, Philippines, Singapore, Thailand and Vietnam. The first official in-person Ministerial meeting was held in Los Angeles on 9 September 2022.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://directionsblog.eu/getting-the-digital-indo-pacific-economic-framework-right/"&gt;originally published in Directions&lt;/a&gt; on 16 September 2022.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is still early days. Given the broad and noncommittal scope of the &lt;a href="http://indiamediamonitor.in/ViewImg.aspx?rfW3mQFhdxZsqXnJzK5Xi5+XYlnW6zXnPDF3Ad56Y/KdgI1zvICzrodtLI85MPKdVO1fIh79GUlPfyXY2/bE2g==" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;, it is unlikely that the IPEF will lead to a trade deal among members in the short run. Instead, experts believe that this new arrangement is designed to serve as a ‘&lt;a href="https://indianexpress.com/article/opinion/columns/building-on-common-ground-7963518/" rel="noreferrer noopener" target="_blank"&gt;framework or starting point&lt;/a&gt;’ for members to cooperate on geo-economic issues relevant to the Indo-Pacific, buoyed in no small part by the United States’ desire to make up lost ground and counter Chinese economic influence in the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;United States Trade Representative (USTR) Katherine Tai has underscored the relevance of the Indo-Pacific digital economy to the US agenda with the IPEF. She has emphasized the &lt;a href="https://www.whitehouse.gov/briefing-room/press-briefings/2022/05/23/on-the-record-press-call-on-the-launch-of-the-indo-pacific-economic-framework/" rel="noreferrer noopener" target="_blank"&gt;importance of&lt;/a&gt; collaboratively addressing key connectivity and technology challenges, including standards on cross-border data flows, data localisation and online privacy, as well as the discriminatory and unethical use of artificial intelligence. This is an ambitious agenda given the divergence among members in terms of technological advancement, domestic policy preferences and international negotiating stances at digital trade forums. There is a significant risk that imposing external standards or values on this evolving and politically-contested digital economy landscape will not work, and may even undermine the core potential of the IPEF in the Indo-Pacific. This post evaluates the domestic policy preferences and strategic interests of the Framework’s member states, and how the IPEF can navigate key points of divergence in order to achieve meaningful outcomes.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;State of domestic digital policy among IPEF members&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data localisation is a core point of divergence in global digital policymaking. It continues to dominate discourse and trigger dissent at all &lt;a href="https://www.ikigailaw.com/the-data-localization-debate-in-international-trade-law/#acceptLicense" rel="noreferrer noopener" target="_blank"&gt;international trade forums&lt;/a&gt;, including the World Trade Organization. IPEF members have a range of domestic mandates restricting cross-border flows, which vary in scope, format and rigidity (see table below)&lt;strong&gt;. &lt;/strong&gt;Most countries only have a conditional data localisation requirement, meaning data can only be transferred to countries where it is accorded an equivalent level of protection – unless the individual whose data is being transferred consents to said transfer. &lt;a href="https://www.lexology.com/library/detail.aspx?g=ee977f2e-ecfb-45cf-9f63-186a78a49512#:~:text=Australia%20has%20no%20broad%20data,transferred%20or%20processed%20outside%20Australia." rel="noreferrer noopener" target="_blank"&gt;Australia &lt;/a&gt;and the &lt;a href="https://www.acq.osd.mil/dpap/pdi/docs/FAQs_Network_Penetration_Reporting_and_Contracting_for_Cloud_Services_(01-27-2017).pdf" rel="noreferrer noopener" target="_blank"&gt;United States&lt;/a&gt; have sectoral localisation requirements for health and defence data respectively. India presently has multiple sectoral data localisation requirements. In particular, a 2018 Reserve Bank of India (RBI) &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" rel="noreferrer noopener" target="_blank"&gt;directive&lt;/a&gt; imposed strict local storage requirements along with a 24-hour window for foreign processing of payments data generated in India. The RBI imposed a &lt;a href="https://theprint.in/economy/what-is-data-localisation-why-mastercard-amex-diners-club-cant-add-more-customers-in-india/703790/" rel="noreferrer noopener" target="_blank"&gt;moratorium&lt;/a&gt; on the issuance of new cards by several US-based card companies until compliance issues with the data localisation directive were resolved. Furthermore, several iterations of India’s recently &lt;a href="https://www.thehindu.com/sci-tech/technology/internet/explained-why-has-the-government-withdrawn-the-personal-data-protection-bill-2019/article65736155.ece" rel="noreferrer noopener" target="_blank"&gt;withdrawn &lt;/a&gt;Personal Data Protection Bill contained localisation requirements for some categories of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indonesia and Vietnam have &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/" rel="noreferrer noopener" target="_blank"&gt;diluted&lt;/a&gt; the scopes of their data localisation mandates to apply, respectively, only to companies providing public services and to companies not complying with other local laws. These dilutions may have occurred in response to concerted pushback from foreign technology companies operating in these countries. In addition to sectoral restrictions on the transfer of geospatial data, South Korea&lt;a href="https://carnegieendowment.org/2021/08/17/korean-approach-to-data-localization-pub-85165" rel="noreferrer noopener" target="_blank"&gt; retains &lt;/a&gt;several procedural checks on cross-border flows, including formalities regarding providing notice to individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moving onto another issue flagged by USTR Tai, while all IPEF members recognise the right to information privacy at an overarching or constitutional level, the legal and policy contours of data protection are at different stages of evolution in different countries. &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=JP#:~:text=Personal%20Information%20Protection%20Commission,-Kasumigaseki%20Common%20Gate&amp;amp;text=Japan%20does%20not%20have%20a%20central%20registration%20system.&amp;amp;text=There%20is%20no%20specific%20legal,(eg%20Chief%20Privacy%20Officer)." rel="noreferrer noopener" target="_blank"&gt;Japan&lt;/a&gt;, &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=KR" rel="noreferrer noopener" target="_blank"&gt;South Korea&lt;/a&gt;, &lt;a href="https://www.pdp.gov.my/jpdpv2/assets/2020/01/Introduction-to-Personal-Data-Protection-in-Malaysia.pdf" rel="noreferrer noopener" target="_blank"&gt;Malaysia&lt;/a&gt;, &lt;a href="https://www.linklaters.com/en/insights/data-protected/data-protected---new-zealand#:~:text=There%20is%20no%20data%20portability%20right%20in%20New%20Zealand.&amp;amp;text=While%20there%20is%20no%20%22right,a%20correction%20to%20that%20information." rel="noreferrer noopener" target="_blank"&gt;New Zealand,&lt;/a&gt; &lt;a href="https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20(a)%20The%20personal%20information,against%20any%20other%20unlawful%20processing." rel="noreferrer noopener" target="_blank"&gt;Philippines&lt;/a&gt;, &lt;a href="https://www.pdpc.gov.sg/Overview-of-PDPA/The-Legislation/Personal-Data-Protection-Act#:~:text=What%20is%20the%20PDPA%3F,Banking%20Act%20and%20Insurance%20Act." rel="noreferrer noopener" target="_blank"&gt;Singapore&lt;/a&gt; and &lt;a href="https://www.trade.gov/market-intelligence/thailand-personal-data-protection-act#:~:text=The%20legislation%20mandates%20that%20data,1%20million%20in%20criminal%20fines." rel="noreferrer noopener" target="_blank"&gt;Thailand &lt;/a&gt;have data protection frameworks in place. Data protection frameworks in India and Brunei are under consultation. Notably, the US does not have a comprehensive federal framework on data privacy, although there are patchworks of data privacy regulations at both the federal and state levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and strategic thinking on artificial intelligence (AI) are also at varying levels of development among IPEF members. India has produced a slew of policy papers on Responsible Artificial Intelligence. The most recent &lt;a href="https://www.niti.gov.in/sites/default/files/2021-08/Part2-Responsible-AI-12082021.pdf" rel="noreferrer noopener" target="_blank"&gt;policy paper&lt;/a&gt; published by NITI AAYOG (the Indian government’s think tank) refers to constitutional values and endorses a risk-based approach to AI regulation, much like that adopted by the EU. The US National Security Commission on Artificial Intelligence (NSCAI), chaired by Google CEO Eric Schmidt, expressed concerns about the US ceding AI leadership ground to China. The NSCAI’s final &lt;a href="https://www.nscai.gov/" rel="noreferrer noopener" target="_blank"&gt;report &lt;/a&gt;emphasised the need for US leadership of a ‘coalition of democracies’ as an alternative to China’s autocratic and control-oriented model. Singapore has also made key strides on trusted AI, launching &lt;a href="https://www.pdpc.gov.sg/news-and-events/announcements/2022/05/launch-of-ai-verify---an-ai-governance-testing-framework-and-toolkit" rel="noreferrer noopener" target="_blank"&gt;A.I. verify&lt;/a&gt; – the world’s first AI Governance Testing Framework for companies that wish to demonstrate their use of responsible AI through a minimum verifiable product.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;IPEF and pipe dreams of digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some members of the IPEF are signatories to other regional trade agreements. With the exception of Fiji, India and the US, all the IPEF countries are members of the Regional Comprehensive Economic Partnership &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/rcep#:~:text=RCEP%20entered%20into%20force%20on,Australia%20as%20an%20original%20party." rel="noreferrer noopener" target="_blank"&gt;(RCEP)&lt;/a&gt;, which also includes China. Five IPEF member countries are also members of the &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/cptpp/comprehensive-and-progressive-agreement-for-trans-pacific-partnership" rel="noreferrer noopener" target="_blank"&gt;Comprehensive and Progressive Trans-Pacific Partnership (CPTPP)&lt;/a&gt; that President Trump backed out of in 2017. Several IPEF members also have bilateral or trilateral trading agreements among themselves, an example being the &lt;a href="https://www.mfat.govt.nz/en/trade/free-trade-agreements/free-trade-agreements-in-force/digital-economy-partnership-agreement-depa/" rel="noreferrer noopener" target="_blank"&gt;Digital Economic Partnership Agreement (DEPA)&lt;/a&gt; between Singapore, New Zealand and Chile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie.png" alt="Pie" class="image-inline" title="Pie" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these ‘mega-regional’ trading agreements contain provisions on data flows, including prohibitions on domestic legal provisions that mandate local computing facilities or restrict cross-border data transfers. Notably, these agreements also incorporate &lt;a href="https://publications.clpr.org.in/the-philosophy-and-law-of-information-regulation-in-india/chapter/indias-engagement-with-global-trade-regimes-on-cross-border-data-flows/" rel="noreferrer noopener" target="_blank"&gt;exceptions&lt;/a&gt; to these rules. The CPTPP includes within its ambit an exception on the grounds of ‘legitimate public policy objectives’ of the member, while the RCEP incorporates an additional exception for ‘essential security interests’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IPEF members are also spearheading &lt;a href="https://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/" rel="noreferrer noopener" target="_blank"&gt;multilateral efforts &lt;/a&gt;related to the digital economy: Australia, Japan and Singapore are working as convenors of the plurilateral Joint Statement Initiative (JSI) at the World Trade Organization (WTO), which counts 86 WTO members as parties. India (along with South Africa) vehemently &lt;a href="https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/WT/GC/W819.pdf&amp;amp;Open=True" rel="noreferrer noopener" target="_blank"&gt;opposes&lt;/a&gt; this plurilateral push on the grounds that the WTO is a multilateral forum functioning on consensus and a plurilateral trade agreement should not be negotiated within the aegis of the WTO. They fear, rightly, that such gambits close out the domestic policy space, especially for evolving digital economy regimes where keen debate and contestation exist among domestic stakeholders. While wary of the implications of the JSI, other IPEF members, such as Indonesia, have cautiously joined the initiative to ensure that they have a voice at the table.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that the IPEF will lead to a digital trade arrangement in the short run. Policymaking on issues as complex as the digital economy that must respond to specific social, economic and (geo)political realities cannot be steamrolled through external trade agreements. For instance, after the Los Angeles Ministerial India &lt;a href="https://www.business-standard.com/article/economy-policy/india-opts-out-of-joining-ipef-trade-pillar-to-wait-for-final-contours-122091000344_1.html" rel="noreferrer noopener" target="_blank"&gt;opted out&lt;/a&gt; of the IPEF trade pillar citing both India’s evolving domestic legislative framework on data and privacy as well as a broader lack of consensus among IPEF members on several issues, including digital trade. Commerce Minister Piyush Goyal explained that India would wait for the “&lt;a href="https://pib.gov.in/PressReleasePage.aspx?PRID=1858243" rel="noreferrer noopener" target="_blank"&gt;final contours&lt;/a&gt;” of the digital trade track to emerge before making any commitments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, brokering a trade agreement through the IPEF runs a risk of redundancy. Already, there exists a ‘&lt;a href="https://www.rieti.go.jp/en/columns/a01_0193.html" rel="noreferrer noopener" target="_blank"&gt;spaghetti bowl’&lt;/a&gt; of regional trading agreements that IPEF members can choose from, in addition to forming bilateral trade ties with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why Washington has been clear about calling the IPEF an ‘&lt;a href="https://theprint.in/diplomacy/india-set-to-join-us-led-indo-pacific-economic-arrangement-next-week-with-aim-to-counter-china/963795/" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;’ and not a trade agreement. Membership does not imply any legal obligations. Rather than duplicating ongoing efforts or setting unrealistic targets, the IPEF is an opportunity for all players to shape conversations, share best practices and reach compromises, which could feed back into ongoing efforts to negotiate trade deals. For example, several members of RCEP have domestic data localisation mandates that do not violate trade deals because the agreement carves out exceptions that legitimise domestic policy decisions. Exchanges on how these exceptions work in future trade agreements could be a part of the IPEF arrangement and nudge states towards framing digital trade negotiations through other channels, including at the WTO. Furthermore, states like Singapore that have launched AI self-governance mechanisms could share best practices on how these mechanisms were developed as well as evaluations of how they have helped policy goals be met. And these exchanges shouldn’t be limited to existing IPEF members. If the forum works well, countries that share strategic interests in the region with IPEF members, including, most notably, the European Union, may also want to get involved and further develop partnerships in the region.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Countering China&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Talking shop on digital trade should certainly not be the only objective of the IPEF. The US has made it clear that they want the message emanating from the IPEF ‘&lt;a href="https://www.business-standard.com/article/international/biden-to-visit-japan-for-quad-summit-to-have-bilateral-meetings-with-modi-122051900128_1.html" rel="noreferrer noopener" target="_blank"&gt;to be heard in Beijing&lt;/a&gt;’. Indeed, the IPEF offers an opportunity for the reassertion of US economic interests in a region where President Trump’s withdrawal from the CPTPP has left a vacuum for China to fill. Accordingly, it is no surprise that the IPEF has representation from several regions of the Indo-Pacific: South Asia, Southeast Asia and the Pacific.&lt;/p&gt;
&lt;p&gt;This should be an urgent policy priority for all IPEF members. Since its initial announcement in 2015, the &lt;a href="https://www.cfr.org/china-digital-silk-road/" rel="noreferrer noopener" target="_blank"&gt;Digital Silk Road (DSR)&lt;/a&gt;, the digital arm of China’s Belt and Road Initiative, has spearheaded &lt;a href="https://www.iiss.org/blogs/research-paper/2021/02/china-digital-silk-road-implications-for-defence-industry" rel="noreferrer noopener" target="_blank"&gt;massive investments&lt;/a&gt; by the Chinese private sector (allegedly under close control of the Chinese state) in e-commerce, fintech, smart cities, data centres, fibre optic cables and telecom networks. This expansion has also happened in the Indo-Pacific, unhampered by China’s aggressive geopolitical posturing in the region through maritime land grabs in the South China Sea. With the exception of &lt;a href="https://www.scmp.com/news/asia/southeast-asia/article/3024479/vietnam-shuns-huawei-it-seeks-build-aseans-first-5g" rel="noreferrer noopener" target="_blank"&gt;Vietnam&lt;/a&gt;, which remains wary of China’s economic expansionism, countries in Southeast Asia welcome Chinese investments, extolling their developmental benefits. Several IPEF members – &lt;a href="https://www.iseas.edu.sg/wp-content/uploads/2022/05/ISEAS_Perspective_2022_57.pdf" rel="noreferrer noopener" target="_blank"&gt;including&lt;/a&gt; Indonesia, Malaysia and Singapore – have associations with Chinese private sector companies, predominantly Huawei and ZTE. A &lt;a href="https://carnegieendowment.org/2022/07/11/localization-and-china-s-tech-success-in-indonesia-pub-87477" rel="noreferrer noopener" target="_blank"&gt;study&lt;/a&gt; evaluating Indonesia’s response to such investments indicates that while they are aware of the risks posed by Chinese infrastructure, their calculus remains unaltered: development and capacity building remain their primary focuses. Furthermore, on the specific question of surveillance, given evidence of other countries such as the US and Australia also using digital infrastructure for surveillance, the threat from China is not perceived as a unique risk.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Setting expectations and approaches&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Still, the risks of excessive dependence on one country for the development of digital infrastructure are well known. While the IPEF cannot realistically expect to displace the DSR, it can be utilised to provide countries with alternatives. This can only be done by issuing carrots rather than sticks. A US narrative extolling ‘digital democracy’ is unlikely to gain traction in a region characterised by a diversity of political systems that is focused on economic and development needs. At the same time, an excessive focus on thorny domestic policy issues – such as data localisation and the pipe dream of yet another mega-regional trade deal – could risk derailing the geo-economic benefits of the IPEF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the IPEF must focus on capacity building, training and private sector investment in infrastructure across the Indo-Pacific. The US must position itself as a geopolitically reliable ally, interested in the overall stability of the digital Indo-Pacific, beyond its own economic or policy preferences. This applies equally to other external actors, like the EU, who may be interested in engaging with or shaping the digital economic landscape in the Indo-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countering Chinese economic influence and complementing security agendas set through other fora – such as the Quadrilateral Security Dialogue – should be the primary objective of the IPEF. It is crucial that unrealistic ambitions seeking convergence on values or domestic policy do not undermine strategic interests and dilute the immense potential of the IPEF in catalysing a more competitive and secure digital Indo-Pacific.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Table: Domestic policy positions on data localisation and data protection&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Table.png/@@images/8e9a5192-5f6c-4666-8d78-e0863111534a.png" alt="Table" class="image-inline" title="Table" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right'&gt;https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2022-10-03T14:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy">
    <title>Getting Strategic about Openness and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy</link>
    <description>
        &lt;b&gt;This blog post by Tim Davies, Open Data Research Lead at Web Foundation was published in Open Up? on November 3, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the original post &lt;a class="external-link" href="http://www.openup2014.org/getting-strategic-openness-privacy/"&gt;here&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information is powerful.&lt;/b&gt; And in a world where the  amount of information generated, captured and stored has grown  exponentially in recent decades, getting hold of the information you  need, when you need it, relies upon having access to the data that  describes it. That makes the control of data especially powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modern transparency initiatives, promoting the idea of open data,  have been seeking to break the data-monopoly of privileged actors within  the state — unlocking key datasets and making them available for public  scrutiny and reducing the information inequalities that undermine open  public discourse. Opening up government data is *one* way in which  citizens can reclaim some power and reestablish the principle that “they  work for us”. Open government data gives us power to know how the  government is spending money, what companies are getting public sector  contracts and licenses, who owns these companies, what profits they make  and what royalties and taxes they pay. Yet, progress has been slow, and  we have faced substantial challenges in securing reliable and  standardised flows of public data that can be joined-up to give a true  picture of how public resources are being used, and key decisions made.  Although millions of public datasets have been placed online, the most  politically salient are often lacking. The &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;2013 Open Data Barometer &lt;/a&gt;found fewer than 1 in 10 accountability datasets were truly open.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, advocates of building a more open government need  to grapple with three other trends that are shaping discussions of data,  power and the state:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Firstly, and most important, the revelations brought to our  attention by whistleblower Edward Snowden have confirmed the extent of  the secret state and the profound imbalance of power between citizens  and their state created through mass surveillance. Whilst projects to  disclose even basic data on the state like public spending are  underfunded and ad hoc, billions of dollars are poured into tools and  technologies that violate basic human rights and that threaten trust and  security on the Web. Fundamentally the problem with secret mass  surveillance is that it destroys the checks and balances that are meant  to limit the power of the state over citizens.&lt;/li&gt;
&lt;li&gt;Secondly, and in part due to the discussion spared by Snowden,  public awareness of the data, and consequently power, held by  corporations has grown. The Web has become increasingly centralised, and  large companies now harvest large amounts of data on any individual  technology user. In parallel, in some countries such as the UK,  governments have sought to use open data agendas as cover for increased  proprietary sharing of public data with private firms, seeking to go  around established principles of consent to share publicly held health,  tax or student records with profit-making firms. Such data-sharing is  not inherently wrong if there are public benefits, but building citizen  trust in the state’s stewardship of personal data, and ensuring  safeguards are in place to warrant that trust, is a major challenge.&lt;/li&gt;
&lt;li&gt;Thirdly, concerns have been raised that some of the data  released through open data initiatives may also affect the privacy of  citizens. Some aggregated and anonymised datasets can be combined with  other data to reverse engineer identifiable information. Although early  calls for “raw data now” were clear that they were not calling for open  personal information, in practice the divide between personal and public  can be a narrow one.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;So, do these trends mean we should be more cautious about opening up?  Should the balance swing back towards a focus on protecting privacy?  Ultimately, a simple opposition of privacy and openness is a false  dichotomy. The question is not should we focus on openness, or should we  protect privacy: but is &lt;i&gt;Who should be open? And how?&lt;/i&gt; &lt;i&gt;And whose privacy should be protected, and how?&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, of the Centre for Internet and Society in Bangalore, has offered a key solution in the idea that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Transparency should be proportional to power, privacy inversely so.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is on this basis that organisations working for a fairer future,  with more vibrant public discourse, greater freedom, and better  governments, can campaign for both privacy and openness together. Those  who occupy public office, own companies, or tender for public contracts  must accept that there is a legitimate public interest in information  about their activities in these roles, whilst independent citizens must  be afforded space to form views and live lives without constant state  surveillance. Companies should not be considered to have a right to  privacy: their interests are already protected by other laws and  provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To deliver effective openness through open data, the Web Foundation is working to &lt;a href="http://www.opendataresearch.org/reports/" target="_blank"&gt;understand how data gets used on the ground in different settings across the world&lt;/a&gt;,  and, with Omidyar support, is working on the creation of inclusive open  data standards for public contracting data. Standards like the &lt;a href="http://standard.open-contracting.org/" target="_blank"&gt;Open Contracting Data Standard&lt;/a&gt; are part of building a new infrastructure of open governance, making it  possible to join-up data from different places, helping tilt the  balance of power towards citizens when it comes to scrutinising  governments and corporations. Through the &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;Open Data Barometer&lt;/a&gt; we keep track of the availability of key datasets that can be used for accountability, and we’re co-chairing the &lt;a href="http://www.opengovpartnership.org/groups/opendata/" target="_blank"&gt;Open Government Partnership Open Data Working Group&lt;/a&gt;, seeking to set high standards for relevant and usable data disclosures by governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By focussing on the civic use of data, we can better identify those  datasets that must be in the public domain. And by thinking about  relative power when considering privacy we can address genuine privacy  concerns, whilst not allowing corporations claiming privacy rights, or  public figures trying to hide their financial interests, from  diminishing the power of data to enable accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the Web Foundation leads the &lt;a href="http://www.google.com/url?q=http://webwewant.org/&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNFavRxYWPtWx7osZ9Psx24eNHkmWw" target="_blank"&gt;Web We Want campaign&lt;/a&gt;,  challenging mass surveillance and seeking to secure a Web where  individuals have the right to privacy, and the tools to secure it. And  increasingly transparency of what the state and companies do with  personal data can help increase the capacity of citizens to respond to  threats to their autonomy, and can increase oversight and safeguards on  state or corporate capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ultimately, our ongoing efforts to open up, and to protect individual  freedoms, have to be strategic. And keeping an analysis of power, and  Sunil’s maxim, in mind, provides a good starting point to guide the  strategy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy'&gt;https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-09T09:19:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
